@leashless No. Which is one of many reasons it's not primarily abt terror. But the actual structure of it is now abt cyber, not terror.
-
-
Replying to @emptywheel
@emptywheel I think it's simply we haven't seen data on the other programmes. I can't see PRISM being very good for cyber, frankly.3 replies 0 retweets 0 likes -
Replying to @leashless
@leashless I guess I'm firmly of the belief that they're using it in the ways in which it deviates from the actual law. Which is cyber.1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel I'm sure it's being used illegally. Obviously. But cyber... Snowden doesn't mention *anything* to do with TOR or decryption.5 replies 0 retweets 0 likes -
Replying to @leashless
@leashless And how can you say Snowden didn't say anything abt cyber when he leaked PPD on cyberwar showing how comms cooperate?1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel hang on, hang on - we're talking about the backdoor into Google, Yahoo etc? Or something else? _which_ doc?7 replies 0 retweets 0 likes -
Replying to @leashless
@leashless So your first Q should be, is analyst level access to bulk data ONLY a prob w/Google, or w/comms (incl telecoms) in general?1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel You're right, you're thinking about this in much more detail. I'm simply assuming#PRISM type programs for *everything* in reach2 replies 0 retweets 0 likes -
Replying to @leashless
@leashless See how that, plus details of min procedures, changes picture of what they're using 702 for?1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel No, not quite - please draw the conclusion for me. I've generalized my thinking to probably conclusions, lost detail!2 replies 0 retweets 0 likes
@leashless Thing is, indiv terrorists aren't on phones anymore, as you noted, not in the US anyway.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.