So, a MAC address can indeed tell you that you're looking for an Apple computer, as the first octet is the Vendor information. I can personally identify lots of component manufacturers's based on the MAC address of the device.
However, I'm not convinced this is what happened, although a simple spell check could screw up the affidavit and turn MAC into Mac.
Mike, the problem here is that is that if you offer a service to the public you MUST offer it to the entire public, and not discriminate who you chose. A store can't hang a 'no negros' sign on it, and a photographer can't have a 'no gays' policy.
This is basically exactly the same as the B&B not allowing gay couples to stay. If you don't want to take pictures of everyone, don't take pictures of anyone.
I'm willing to bet that the MPAA/RIAA products count in that $356 billion line. The danger is using information like this is that it cuts both ways, they will say that because the digital economy is such a large part of trade it must be protected at all costs.
Its a talking point that writes itself, unfortunately.
Unless they can prove that someone outside their organization (that they are not paying for the service) shipped those goods without their knowledge, the shipping of them was a deliberate act (no matter how accidental) and the customers are 100% legally entitled to their Vitas.
This is a terrible misnomer, because while the administration and diplomatic corps might set high level policy for what information they would like to have, its the NSA's internal organization that has (clearly) been making tactical decisions on what data to grab and what to leave alone.
This is an excellent attempt to make the conversation about whether or not the NSA *should* be spying on people, rather than the more nuanced, and more important discussion around *how* the NSA should be spying on people. And *who* those people should be.
As long as he can keep the conversation centered around "should the NSA be spying" he is going to win, because that's his charter. We need journalists like you guys to keep the discussion focused on what's important.
If I had to guess it was in a project pipeline for a subcontractor to implement. Generally 'lack of bandwidth' in official gov-speak means 'we never got around to it because other more important stuff kept coming up, but we will soon, we promise!'
The point being made however, is that the administrator is left in a position of the cheating husband, deny 'til you die because admission and getting caught carry the same penalties. Until we start rewarding folks, as a society, for coming clean they will continue to lie lie lie.
Re: Re: Re: This is supporting evidence that root CA is pwned
If only this was true. You don't know enough about SSL to be commenting. Yes, they do not store the private keys in their databases, what they do is sign Google's CA with theirs, and make the Google Internet Authority (Google's CA) an issuing server in their certification path. So all they have to do is sign the NSA's Google Internet Authority issuing server and voila! MITM attacks...