Sandisk Debuts World's Smallest 64GB SSD

From: Its from Onion <areda..._at_msn.com>
Date: Wed, 1 Sep 2010 00:14:55 -0500

>From - Sat Mar 02 00:57:18 2024
Received: by 10.66.78.161 with SMTP id c1mr68555pax.16.1351876699492;
        Fri, 02 Nov 2012 10:18:19 -0700 (PDT)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.68.212.6 with SMTP id ng6ls15644571pbc.4.gmail; Fri, 02 Nov
 2012 10:18:15 -0700 (PDT)
Received: by 10.66.81.98 with SMTP id z2mr935793pax.19.1351876695538;
        Fri, 02 Nov 2012 10:18:15 -0700 (PDT)
Received: by 10.66.81.98 with SMTP id z2mr935791pax.19.1351876695520;
        Fri, 02 Nov 2012 10:18:15 -0700 (PDT)
Return-Path: <bugs..._at_earthlink.net>
Received: from elasmtp-mealy.atl.sa.earthlink.net (elasmtp-mealy.atl.sa.earthlink.net. [209.86.89.69])
        by gmr-mx.google.com with ESMTP id q7si2373026paz.0.2012.11.02.10.18.15;
        Fri, 02 Nov 2012 10:18:15 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of bugs..._at_earthlink.net designates 209.86.89.69 as permitted sender) client-ip=209.86.89.69;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: best guess record for domain of bugs..._at_earthlink.net designates 209.86.89.69 as permitted sender) smtp.mail=bugs..._at_earthlink.net
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
  s=dk20050327; d=earthlink.net;
  b=EfWEDshC6A7aL+JRDck1ZcNxlDWC7XJtf7aQ5/MRQnR0U8r4TqAn9W4PLN2m1BTk;
  h=Received:From:To:Subject:Date:Message-ID:MIME-Version:Content-Type:X-Mailer:Thread-Index:Content-Language:X-ELNK-Trace:X-Originating-IP;
Received: from [71.220.168.15] (helo=rogerf2a1c21de)
        by elasmtp-mealy.atl.sa.earthlink.net with esmtpa (Exim 4.67)
        (envelope-from <bugs..._at_earthlink.net>)
        id 1TUKsn-0000i1-SA; Fri, 02 Nov 2012 13:18:14 -0400
From: "Roger at Bugsweeps" <bugs..._at_earthlink.net>
To: <bugs..._at_earthlink.net>,
        <TSCM..._at_yahoogroups.com>,
        <tscm-..._at_googlegroups.com>
Subject: Stingrays
Date: Fri, 2 Nov 2012 11:18:13 -0600
Message-ID: <058801cdb91e$0b0421b0$210c6510$_at_earthlink.net>
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="----=_NextPart_000_0589_01CDB8EB.C0732790"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac25Hed3n0JLgdPtSDuId/rL4NGh6A==
Content-Language: en-us
X-ELNK-Trace: 55ea6c94cbba2ed40cc1426638a40ef67e972de0d01da940bd57a4459640c4304756b0c7797d9372350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 71.220.168.15

------=_NextPart_000_0589_01CDB8EB.C0732790
Content-Type: text/plain;
        charset="US-ASCII"
Content-Transfer-Encoding: 7bit

New cell phone surveillance method raises privacy concerns

Published 1 November 2012

 

The FBI is using a new method to access cell phone customer data, but the
<http://www.aclu.org/> American Civil Liberties Union (ACLU) contends that
the method is overly invasive

The FBI is using a new method to access cell phone customer data, but the
<http://www.aclu.org/> American Civil Liberties Union (ACLU) contends that
the method is overly invasive.

The method, known as "stingrays," uses a person's international mobile
subscriber identity (IMSI) secretly to track someone's location using
stingray devices, known as IMSI catchers. The catcher mimics a cell phone
tower, but stingrays track the locations of all mobile devices in a given
area, including those which are not being targeted.

NBC
<http://www.nbcbayarea.com/news/local/Calif__privacy_groups_oppose_cellphone
_surveillance_device-176210751.html> reports that a big reason this scares
privacy groups is that an IMSI catcher can be built at home for about
$1,500, exposing a weakness in cell phone security to which most consumers
are oblivious.

In 2010 a communications expert was able to make an IMSI catcher and thirty
cell phones in the room attempted to connect to the make-shift tower. Anyone
who made a call while connected to the stingray received a message saying
that their call was being recorded.

On 19 October, a friend-of-the-court brief, filed with the U.S. District
Court of Arizona by the Electronic Frontier Foundation in San Francisco and
the American Civil Liberties Union of Northern California, argued that
stingrays are "highly intrusive and indiscriminate," and claimed government
investigators attempted to utilize them while giving Judge Richard Seeborg
only a few details about how powerful stingrays can be.

"The government prevented the court from making an informed determination on
the warrant application," Linda Lye, staff attorney for the ACLU of Northern
California, told the court. "Maybe the court would have said, 'No, I'm not
going to grant this at all because of the impact on third parties.' Maybe
the court would have said, 'OK, you can do this, but let's follow these
safeguards and procedures to make sure that third-party privacy is
protected."

Hanni Fakhoury, a staff attorney for the Electronic Frontier Foundation,
told the court that law enforcement deceived the courts in the warrants.

"If you read the warrant affidavit, it has absolutely zero mention at all of
IMSI catchers and stingrays or fake cell phone towers or any explanation of
the technology," Fakhoury told the court. "Courts are busy, judges are
busy; they rely on the government in good faith to explain what they're
doing."

Earlier this year a federal judge in Texas denied DEA investigators an
application to use a stingray, once he understood the technology.

"They did not address what the government would do with the cell phone
numbers and other information concerning seemingly innocent cell phone users
whose information was recorded by the equipment," Magistrate Judge Brian
Owsley wrote in June. "While these various issues were discussed at the
hearing, the government did not have specific answers to these questions.
Moreover, neither the special agent nor the assistant United States attorney
appeared to understand the technology very well."

NBC notes that the U.S. attorney's office in Phoenix did not comment on the
most recent case involving stingrays. Prosecutors stated in a 20 August
filing that they only needed to show how a communications device can show
evidence of criminal activity, but are not required to show what method
would be used to get the information.

"Defendant was perpetrating a multi-million dollar tax fraud scheme, and he
hid his tracks through the use of encrypted emails, money mules, layers of
false identities, forged documents, forged identification cards, and botnets
and/or proxies," the filing reads. " . The alleged inconvenience and
intrusiveness of the air card location operation (which went undetected by
an individual who appeared to spend a significant portion of every day
seeking to avoid detection or identification) was reasonable under the
circumstances."

http://www.homelandsecuritynewswire.com/dr20121101-new-cell-phone-surveillan
ce-method-raises-privacy-concerns

 


------=_NextPart_000_0589_01CDB8EB.C0732790
Content-Type: text/html;
        charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
_at_font-face
=09{font-family:Calibri;
=09panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
=09{margin:0in;
=09margin-bottom:.0001pt;
=09font-size:11.0pt;
=09font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
=09{mso-style-priority:99;
=09color:blue;
=09text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
=09{mso-style-priority:99;
=09color:purple;
=09text-decoration:underline;}
span.EmailStyle17
=09{mso-style-type:personal-compose;
=09font-family:"Calibri","sans-serif";
=09color:windowtext;}
.MsoChpDefault
=09{mso-style-type:export-only;
=09font-family:"Calibri","sans-serif";}
_at_page WordSection1
=09{size:8.5in 11.0in;
=09margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
=09{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal style=3D'mso-lin=
e-height-alt:12.6pt'><b><span lang=3DEN style=3D'font-size:16.5pt;font-fami=
ly:"Times New Roman","serif";color:black'>New cell phone surveillance metho=
d raises privacy concerns<o:p></o:p></span></b></p><p class=3DMsoNormal><sp=
an lang=3DEN style=3D'font-size:9.0pt;font-family:"Times New Roman","serif"=
;color:black'>Published 1 November 2012</span><span lang=3DEN style=3D'font=
-size:10.5pt;font-family:"Times New Roman","serif";color:black'> <o:p></o:p=
></span></p><p class=3DMsoNormal><span lang=3DEN style=3D'font-size:10.5pt;=
font-family:"Times New Roman","serif";color:black'><o:p>&nbsp;</o:p></span>=
</p><p class=3DMsoNormal><b><span lang=3DEN style=3D'font-size:10.5pt;font-=
family:"Times New Roman","serif";color:black'>The </span></b><b><span lang=
=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","serif";color:=
black'>FBI</span></b><b><span lang=3DEN style=3D'font-size:10.5pt;font-fami=
ly:"Times New Roman","serif";color:black'> is using a new method to access =
cell phone customer data, but the <a href=3D"http://www.aclu.org/" target=
=3D"_blank"><span style=3D'color:#C00000;text-decoration:none'>American Civ=
il Liberties Union</span></a> (</span></b><b><span lang=3DEN style=3D'font-=
size:9.5pt;font-family:"Times New Roman","serif";color:black'>ACLU</span></=
b><b><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman=
","serif";color:black'>) contends that the method is overly&nbsp;invasive<o=
:p></o:p></span></b></p><p class=3DMsoNormal><span lang=3DEN style=3D'font-=
size:10.5pt;font-family:"Times New Roman","serif";color:black'>The </span><=
span lang=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","seri=
f";color:black'>FBI</span><span lang=3DEN style=3D'font-size:10.5pt;font-fa=
mily:"Times New Roman","serif";color:black'> is using a new method to acces=
s cell phone customer data, but the <a href=3D"http://www.aclu.org/" target=
=3D"_blank"><span style=3D'color:#C00000;text-decoration:none'>American Civ=
il Liberties Union</span></a> (</span><span lang=3DEN style=3D'font-size:9.=
5pt;font-family:"Times New Roman","serif";color:black'>ACLU</span><span lan=
g=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman","serif";colo=
r:black'>) contends that the method is overly&nbsp;invasive.<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span lang=3DEN style=3D'font-size:10.5pt;font-=
family:"Times New Roman","serif";color:black'>The method, known as &#8220;s=
tingrays,&#8221; uses a person&#8217;s international mobile subscriber iden=
tity (</span><span lang=3DEN style=3D'font-size:9.5pt;font-family:"Times Ne=
w Roman","serif";color:black'>IMSI</span><span lang=3DEN style=3D'font-size=
:10.5pt;font-family:"Times New Roman","serif";color:black'>) secretly to tr=
ack someone&#8217;s location using stingray devices, known as </span><span =
lang=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","serif";co=
lor:black'>IMSI</span><span lang=3DEN style=3D'font-size:10.5pt;font-family=
:"Times New Roman","serif";color:black'> catchers. The catcher mimics a cel=
l phone tower, but stingrays track the locations of all mobile devices in a=
 given area, including those which are not being&nbsp;targeted.<o:p></o:p><=
/span></p><p class=3DMsoNormal><span lang=3DEN style=3D'font-size:9.5pt;fon=
t-family:"Times New Roman","serif";color:black'>NBC</span><span lang=3DEN s=
tyle=3D'font-size:10.5pt;font-family:"Times New Roman","serif";color:black'=
> <a href=3D"http://www.nbcbayarea.com/news/local/Calif__privacy_groups_opp=
ose_cellphone_surveillance_device-176210751.html" target=3D"_blank"><span s=
tyle=3D'color:#C00000;text-decoration:none'>reports</span></a> that a big r=
eason this scares privacy groups is that an </span><span lang=3DEN style=3D=
'font-size:9.5pt;font-family:"Times New Roman","serif";color:black'>IMSI</s=
pan><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman"=
,"serif";color:black'> catcher can be built at home for about $1,500, expos=
ing a weakness in cell phone security to which most consumers&nbsp;are obli=
vious.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN style=3D'f=
ont-size:10.5pt;font-family:"Times New Roman","serif";color:black'>In 2010 =
a communications expert was able to make an </span><span lang=3DEN style=3D=
'font-size:9.5pt;font-family:"Times New Roman","serif";color:black'>IMSI</s=
pan><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman"=
,"serif";color:black'> catcher and thirty cell phones in the room attempted=
 to connect to the make-shift tower. Anyone who made a call while connected=
 to the stingray received a message saying that their call was being&nbsp;r=
ecorded.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN style=3D=
'font-size:10.5pt;font-family:"Times New Roman","serif";color:black'>On 19 =
October, a friend-of-the-court brief, filed with the </span><span lang=3DEN=
 style=3D'font-size:9.5pt;font-family:"Times New Roman","serif";color:black=
'>U.S.</span><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times N=
ew Roman","serif";color:black'> District Court of Arizona by the Electronic=
 Frontier Foundation in San Francisco and the American Civil Liberties Unio=
n of Northern California, argued that stingrays are &#8220;highly intrusive=
 and indiscriminate,&#8221; and claimed government investigators attempted =
to utilize them while giving Judge Richard Seeborg only a few details about=
 how powerful stingrays can&nbsp;be.<o:p></o:p></span></p><p class=3DMsoNor=
mal><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman"=
,"serif";color:black'>&#8220;The government prevented the court from making=
 an informed determination on the warrant application,&#8221; Linda Lye, st=
aff attorney for the </span><span lang=3DEN style=3D'font-size:9.5pt;font-f=
amily:"Times New Roman","serif";color:black'>ACLU</span><span lang=3DEN sty=
le=3D'font-size:10.5pt;font-family:"Times New Roman","serif";color:black'> =
of Northern California, told the court. &#8220;Maybe the court would have s=
aid, &#8216;No, I&#8217;m not going to grant this at all because of the imp=
act on third parties.&#8217; Maybe the court would have said, &#8216;</span=
><span lang=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","se=
rif";color:black'>OK</span><span lang=3DEN style=3D'font-size:10.5pt;font-f=
amily:"Times New Roman","serif";color:black'>, you can do this, but let&#82=
17;s follow these safeguards and procedures to make sure that third-party p=
rivacy is&nbsp;protected.&#8221;<o:p></o:p></span></p><p class=3DMsoNormal>=
<span lang=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman","se=
rif";color:black'>Hanni Fakhoury, a staff attorney for the Electronic Front=
ier Foundation, told the court that law enforcement deceived the courts in =
the&nbsp;warrants.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DE=
N style=3D'font-size:10.5pt;font-family:"Times New Roman","serif";color:bla=
ck'>&#8220;If you read the warrant affidavit, it has absolutely zero mentio=
n at all of </span><span lang=3DEN style=3D'font-size:9.5pt;font-family:"Ti=
mes New Roman","serif";color:black'>IMSI</span><span lang=3DEN style=3D'fon=
t-size:10.5pt;font-family:"Times New Roman","serif";color:black'> catchers =
and stingrays or fake cell phone towers or any explanation of the technolog=
y,&#8221; Fakhoury told the court.&nbsp; &#8220;Courts are busy, judges are=
 busy; they rely on the government in good faith to explain what they&#8217=
;re&nbsp;doing.&#8221;<o:p></o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN style=3D'font-size:10.5pt;font-family:"Times New Roman","serif";color=
:black'>Earlier this year a federal judge in Texas denied </span><span lang=
=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","serif";color:=
black'>DEA</span><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Tim=
es New Roman","serif";color:black'> investigators an application to use a s=
tingray, once he understood the&nbsp;technology.<o:p></o:p></span></p><p cl=
ass=3DMsoNormal><span lang=3DEN style=3D'font-size:10.5pt;font-family:"Time=
s New Roman","serif";color:black'>&#8220;They did not address what the gove=
rnment would do with the cell phone numbers and other information concernin=
g seemingly innocent cell phone users whose information was recorded by the=
 equipment,&#8221; Magistrate Judge Brian Owsley wrote in June. &#8220;Whil=
e these various issues were discussed at the hearing, the government did no=
t have specific answers to these questions. Moreover, neither the special a=
gent nor the assistant United States attorney appeared to understand the te=
chnology very&nbsp;well.&#8221;<o:p></o:p></span></p><p class=3DMsoNormal><=
span lang=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","seri=
f";color:black'>NBC</span><span lang=3DEN style=3D'font-size:10.5pt;font-fa=
mily:"Times New Roman","serif";color:black'> notes that the </span><span la=
ng=3DEN style=3D'font-size:9.5pt;font-family:"Times New Roman","serif";colo=
r:black'>U.S.</span><span lang=3DEN style=3D'font-size:10.5pt;font-family:"=
Times New Roman","serif";color:black'> attorney&#8217;s office in Phoenix d=
id not comment on the most recent case involving stingrays. Prosecutors sta=
ted in a 20 August filing that they only needed to show how a communication=
s device can show evidence of criminal activity, but are not required to sh=
ow what method would be used to get the&nbsp;information.<o:p></o:p></span>=
</p><p class=3DMsoNormal><span lang=3DEN style=3D'font-size:10.5pt;font-fam=
ily:"Times New Roman","serif";color:black'>&#8220;Defendant was perpetratin=
g a multi-million dollar tax fraud scheme, and he hid his tracks through th=
e use of encrypted emails, money mules, layers of false identities, forged =
documents, forged identification cards, and botnets and/or proxies,&#8221; =
the filing reads. &#8220; &#8230; The alleged inconvenience and intrusivene=
ss of the air card location operation (which went undetected by an individu=
al who appeared to spend a significant portion of every day seeking to avoi=
d detection or identification) was reasonable under the&nbsp;circumstances.=
&#8221;<o:p></o:p></span></p><p class=3DMsoNormal><a href=3D"http://www.hom=
elandsecuritynewswire.com/dr20121101-new-cell-phone-surveillance-method-rai=
ses-privacy-concerns">http://www.homelandsecuritynewswire.com/dr20121101-ne=
w-cell-phone-surveillance-method-raises-privacy-concerns</a><o:p></o:p></p>=
<p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_0589_01CDB8EB.C0732790--
Received on Sat Mar 02 2024 - 00:57:18 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST