33 Years of the Digest ... founded August 21, 1981
Copyright © 2015 E. William Horne. All Rights Reserved.
The Telecom Digest for Mar 5, 2015
|We shall strive for perfection. We shall not achieve it immediately but we still shall strive. We may make mistakes but they must never be mistakes which result from faintness of heart or abandonment of moral principle. - Franklin D. Roosevelt|
See the bottom of this issue for subscription and archive details.
|Date: Wed, 4 Mar 2015 09:45:28 -0500 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: To locate bank robber, FBI unusually asked for warrant to use stingray Message-ID: <C549E77E-D4D3-4A08-B1EE-96A7EE7C1211@roscom.com> To locate bank robber, FBI unusually asked for warrant to use stingray Newly uncovered court documents in a federal armed New Jersey bank robbery case that went to trial in late February 2015 reveal an unusual back-and-forth between authorities and judges - ultimately resulting in the FBI seeking and getting a warrant to use a stingray. The move illustrates a rare known instance where authorities met the probable cause hurdle need for a warrant in a stingray deployment. In 2012, federal prosecutors went to a judge to ask for a "pen/trap order," a lower type of permission than a warrant. Such an order would have effectively authorized the use of a stingray. But the judge pushed back and imposed usage restrictions "in a private place." In January 2015, two United States senators made public the FBI's position that the agency could use stingrays in public places without a warrant. http://arstechnica.com/tech-policy/2015/03/to-locate-bank-robber-fbi-unusually-asked-for-warrant-to-use-stingray/ -or- http://goo.gl/srxNvg|
|Date: Wed, 4 Mar 2015 09:31:44 -0500 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Apple and Android SSL is WIDE OPEN to snoopers Message-ID: <E31B207E-C157-49B8-A704-42B7AC95CFCC@roscom.com> FREAK out: Apple and Android SSL is WIDE OPEN to snoopers OpenSSL, iOS and OS X tricked into using weak 1990s-grade encryption keys http://www.theregister.co.uk/2015/03/03/government_crippleware_freaks_out_tlsssl/ -or- http://goo.gl/UKIxfb "FREAK" flaw in Android and Apple devices cripples HTTPS crypto protection http://arstechnica.com/security/2015/03/freak-flaw-in-android-and-apple-devices-cripples-https-crypto-protection/ -or- http://goo.gl/JCcJXa ***** Moderator's Note ***** Maybe we should bring back the Clipper chip, and get some standards and a public policy debate going. That someone is going to be snooping is now obvious; we need only to decide who and how. Bill Horne Moderator|
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit educational service offered to the Internet by Bill Horne.
The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright © 2015 E. William Horne. All rights reserved.
Finally, the Digest is funded by gifts from generous readers such as yourself. Thank you!
All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.