If we insist that the security services provide us with the best-possible cover against terror attacks, our liberties are expedient hostages
@leashless I guess I'm firmly of the belief that they're using it in the ways in which it deviates from the actual law. Which is cyber.
-
-
@emptywheel I'm sure it's being used illegally. Obviously. But cyber... Snowden doesn't mention *anything* to do with TOR or decryption. -
@leashless And how can you say Snowden didn't say anything abt cyber when he leaked PPD on cyberwar showing how comms cooperate? -
@emptywheel hang on, hang on - we're talking about the backdoor into Google, Yahoo etc? Or something else? _which_ doc? -
@leashless So your first Q should be, is analyst level access to bulk data ONLY a prob w/Google, or w/comms (incl telecoms) in general? -
@emptywheel You're right, you're thinking about this in much more detail. I'm simply assuming#PRISM type programs for *everything* in reach -
@leashless See how that, plus details of min procedures, changes picture of what they're using 702 for? -
@emptywheel No, not quite - please draw the conclusion for me. I've generalized my thinking to probably conclusions, lost detail! -
@leashless For starters, it's built to serve large data flow analysis, as well as making it easier to follow indiv terrorist phone lines.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.