b) The woman for opening it and infecting the computer?
Yes, for abject stupidity.
That depends on how well the executable was disguised.
It depends on whether it launched when she opened the e-mail. It depends on the content and header of the e-mail itself.
It depends on the security of her home computer. Her own e-mail program or browser. The protection provided by her ISP.
Think it through.
Imagine yourself as the specific target of a malicious attachment. Crafted by someone who knew you well. Who "thinks geek."
I received an e-mail once from a respected open source project that linked directly to the Windows executable. Something I'd never seen from Microsoft.
Funny that is. I use my iPhone for all those purposes but never use it to listen to music. In fact the earphones are still in the box - are they any good?
In theory the GPS could be more fair in pricing. IE of my 20 mile commute 7 miles are on privately owned and maintained roads(30%), and another 5-10% is out of state. If we ignore all other issues with GPS, states should jump the gas taxes higher, and give tax rebates to everyone with a GPS gathering data for them (maybe a $1000+ yearly registration fee for alternative fuel vehicles, again with a "rebate" for GPS tracking data.) So only out of state electric cars get a free ride (at least until it's nationwide shared toll.) throw in some in road weight sensors, to slap those heavy/overloaded vehicles with a premium... Use the public GIS data to figure out the actual public use... Heck even figure out different rates, ie gravel roads cost $X, bridges cost $Y, paved $Z. Then they can get people to car pool/bus... through the $10/mile sections.
The problem is a series of precedents that, as legal scholar Richard Posner has observed, enable the government to do a two-step end run around the Fourth Amendment. In the 1974 case California Bankers Association v. Schulz , the Supreme Court ruled that the Bank Secrecy Act, which required financial institutions to collect certain kinds of information from customers, did not run afoul of the Fourth Amendment's privacy protections. (Similarly, Enhanced 911 rules implemented in 1998 required telecom providers to make their networks capable of pinpointing the locations of cell users for the convenience of 911 operators.) The Court reasoned that "the mere maintenance by the bank of records without any requirement that they be disclosed to the Government" did not constitute an "illegal search and seizure." But two years later, in U.S. v. Miller , the Court determined that individuals lost their "expectation of privacy" in such information once it had been turned over to a third party, such as a bank. And businesses such as banks, unlike individuals, could not claim Fourth Amendment privacy interests in their records.
That brings us to 1979's Smith v. Maryland , in which the Court determined that no "search" was conducted, for Fourth Amendment purposes, when police sought to obtain from telephone companies a list of the numbers dialed from a particular telephone. The Court's reasoning was two pronged: In part, the justices relied upon the "third party" rationale of Miller. But they also noted the ways that such information gathering was distinct from, and less intrusive than, eavesdropping on the calls themselves: "Neither the purport of any communication between the caller and the recipient of the call, their identities, nor whether the call was even completed is disclosed by pen registers."
Different jurisdictions have differed on how this logic applies in the case of cell tracking, where there's the added hurdle of language in the Communications Assistance for Law Enforcement Act that would appear to forbid using a mobile phone as a GPS device without a full-fledged search warrant. It seems likely that, at least in the near term, judges will rely on such statutory constraints to check such tracking. But it also looks like a good reason for the courts to revisit this whole line of Fourth Amendment jurisprudence, and reconsider whether, when so much data about us is stored in a variety of "third party" databases, it makes sense to presume citizens have no reasonable expectation of privacy in such information, even when the "third party" has pledged not to share it.
In order to dial out, it is necessary to broaden one's dimension.