That's why many suggest the plea bargain should be abolished.
It's just as likely that many cases that this technology was used in where never brought to court but settled in a plea agreement so discovery never occurred.
No, the police never claimed if what they were doing was illegal or legal. THEY DIDN'T TELL THE COURT ABOUT IT IN THE FIRST PLACE.
What's even worse, until this case the lawyers didn't find out how the case got to that point.
This is as bad or worse then the parallel construction we hear about the FBI/NSA doing. You cannot defend against what you do not know exists.
But the police didn't use the 'Phind my Fon' app. They used a fucking microcell that intercepted signals from everybodys cellphone in the area. If this where only about intercepting signals from that one particular phone there would be no issue here.
Add to that, the average semi drives 125,000 miles per year, 10 times the average car driver.
>Since soda cans can be returned for 5 cents each at the grocery stores
Only if you pay that 5 cents to the store in the first place. In the majority of the states there is no can/bottle fee.
Larger modern business are very price selective on how they ship. But shipping costs alone are only one part of that cost algebra. It is generally far cheaper per pound to ship via rail, but for many products it is cheaper over all to use a just in time inventory system to reduce warehousing space. Quick turn around trucking fits in with JIT systems very well.
>Because they originally turned iMessage on.
Completely erase your iphone and set it back up.
Setting up iMessage is one of the first 'default' screens that you come to in the processes. As in put your user and pass here with a little skip option on the bottom of the screen. They didn't explicitly find the setting and turn it on. It presents itself in a manner that leads the user to believe that it must be turned on.
NAT is not a firewall. Lets repeat NAT is not a firewall.
User controlled functions such as UPNP make is even less of one.
NAT does prevent first time outside access, but nothing beyond that.
Look at this scenario.
You visit http://hack.ed/. It launches a flash exploit that gets admin privileges. As admin it launches a UPNP function to allow port 40,000 to your internal IP. The rest of the world now has access to your computer as if it were directly connected.
Now if your NAT also has UPNP turned off and/or also contains a firewall that prevents NEW connections to any computer behind it, yes it a NAT enabled firewall.
I thought that was the Soylent Green bin?
And we still don't have SSL with PFS on
The document indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its U.S. counterpart, the National Security Agency. In the document, CSEC called the new technologies "game-changing," and said they could be used for tracking "any target that makes occasional forays into other cities/regions."
The CBC notes early in the article that the spy agency:
is supposed to be collecting primarily foreign intelligence by intercepting overseas phone and internet traffic, and is prohibited by law from targeting Canadians or anyone in Canada without a judicial warrant.
Predictably, CSEC's chief is quoted saying that they aren't allowed to spy on Canadians, so therefore they don't. As observed by experts consulted for the story, that claim is equivalent to saying that they collect the data but we're to trust that they don't look at it."
It's not about the storage, it's all about the index lookup speeds.
>The 2012 US election turnout was around 58%
What is the turnout in the primaries? People don't understand that voting in the final election is the least powerful vote they can cast. Power is in the primaries.
>Sorry, but modern browsers don't really address that.
Yes, they do, but so few servers use it yet that it's still a problem.