If Hillary had won, I'm sure that would serve as evidence of Russian hacking. Just to different people.
It's just because this has become so polarizing. The deep divide over two candidates, both of which will disappoint in different ways.
That would work about as well as asking every government agency to release all information about UFOs.
Crickets.
Conspiracy theories continue, and possibly are fueled by the silence.
Is it possible for providers to be getting fraudulent warrants that no judge has signed or even seen?
Password must have at least 12 characters, with at least one lower case letter, upper case letter, number, and special character "!@#$%^&*()", and must not have any repeated letters, numbers, or special characters.
Why no repeated characters?
Disallowing repeated characters actually diminishes the universe of allowable passwords. Isn't the idea of the requirements of special character, number and upper/lower case to force passwords into a larger space so that they don't all fall into the small space of lower case only words from the dictionary.
A government of the corporations, by the corporations and for the corporations.
Make American Corporations Great Again
Collection Society --> Extortion Ring
Collection Societies are happy to collect payment for music that they don't even actually represent.
Can you just change your DNS server to Google's 8.8.8.8 ?
Whoever does it, this time, it really might implode everything! Not just almost.
If you think that either Clinton or Trump would govern better, then you are mistaken.
The major difference is that they would govern poorly in different ways.
Given the choice, I would rather have someone sane and level headed in office, even if I like neither choice.
The government is like Unix. It started out as a few essential services.
The reason the system is rigged as you describe is related to: For Profit Prisons! Vacant cells reduce revenue. Fully occupancy results in higher revenue, thus higher profit, executive bonuses and increased shareholder value. Thus it's good for everyone to keep the prisons full for maximum profitability.
Is the device approved for ANY use whatsoever?
FCC approval?
Approval by the network operators who own the spectrum that Stingray is subverting?
Possibly stolen cryptographic keys and/or SIMs? (Subscriber Identity Modules) Other stolen proprietary information in order to make Stingray work?
O for the days when the major crime carried out in public was skateboarding.
Or a simple accounting error. The US Courts are not including the number of fraudulent wire tap orders that have forged signatures of judges. Perhaps because the courts do not have copies of the fraudulent wire tap orders.
Merge all US corporations together and call it the National Corporation.
Antiquated words like "Citizen" can be replaced with "Employee".
Voting in the new corporate democracy will be made easier. Employees can turn their votes in to their direct manager.
Just imagine! It will be wonderful!
Hypothesis about Stingray secrecy
Law enforcemnt is extremely secretive about Stingray. Why? Their suppliers even require them to sign agreements with extreme conditions. Why?
(Sorry, this is only quasi related to the lack of warrants. But the lack of warrants relates to the secrecy issue.)
1. The wireless network standards were designed when we were still using Windows 3.1.
2. The designers may have considered security, in some sense, but not in a way that can withstand 21st century attacks. The security may be in large part due to obscurity.
3. Stingray is not authorized by the mobile network operators who have not given Stingray any SIMs (subscriber identity module) or other cryptographic keys necessary to access the network. Those network operators have exclusive rights to spectrum which Stingray is subverting.
4. Stingray works by compromising the security of the network. Effectively a genuine hack or intrusion into the network.
5. There may be no effective fix short of redesigning the network.
6. If the mechanism of the hack were generally known, mass chaos could ensue.
7. The network operators are strongly against this but powerless to do anything about it, other than potentially litigate.
8. The secrecy of Stingray is largely due to several factors such as:
A. If the mechanism of the attack became generally known, there could be vast numbers of unauthorized "stingrays" compromising everyone's privacy -- including (OMG!) rich and powerful people!
B. It would be possible for a network of distributed "stingray" clones to disrupt mobile network service by tricking nearby phones to connect to fake networks. What if this were deliberately done during an emergency?
C. The creators / operators of genuine(tm) Stingray devices don't want to be exposed to the potential of litigation for actionable things that Stingray may be doing as part of its operation. Including disrupting networks, stolen proprietary or trade secret information, having compromised individuals into divulging network secrets, keys, etc.
This hypothesis would explain observed evidence about why those who built Stingray want desperately to keep it secret. Please consider. The secrecy is so important, that it leads to:
1. Dismissing or disposing of prosecutions rather than reveal any information about Stingray.
2. Binding agencies and organizations using Stringray to high levels of secrecy, including keeping THE VERY EXISTENCE of Stingray a secret.
3. Outright Brazen Perjury a.k.a. Parallel Construction, which is a euphemism for conspiracy to lie to the court and the defense, concealing discoverable information.
The behavior of those behind Stingray fits this hypothesis. They want to use it "for truth, justice and the corporate way", but are desperately fearful of the secret hack escaping.
My experience leads me to believe that tech savvy and audiophile are mutually exclusive.
Re:
The problem with that is that Obama promised to have the most transparent administration EVAR!
Which turned out to be quite a disappointment.