.@CTfinan on using new NSA CT data model for cyber: “Lawmakers would be crazy to open that debate in an election yr." http://on.wsj.com/MzFaEL
@Gorman_Siobhan Is that how you understand it? That leaving metadata w/providers would also allow for getting it on cyber targets?
-
-
@emptywheel I really don't know how he envisions it working other than setting a "precedent" for cyber. Sounds like he sees it as a model.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@emptywheel guess they could adjust cyber data exchange model to give cyber threat selectors to ISPs. That's difft fm what he's described b4 -
@Gorman_Siobhan Yeah, I had thought he meant just sharing malicious code w/"industry"--which would be critical infrastructure generally. -
@emptywheel Culd def be crit infrastruxur. But wonder if it's seen as way to make politically acceptable earlier props to filter via ISPs. -
@Gorman_Siobhan Could be--esp since Leahy-Sensenbrenner makes upstream unavailable for cyber purposes after 6 months (if it were to pass) -
@emptywheel I didn't realize that provision was in Leahy-Sensenbrenner. Interesting. -
@Gorman_Siobhan It's not explicit, but that seems to be the clear intent: http://www.emptywheel.net/2013/11/07/leahy-sensenbrenner-would-shut-the-section-702-cybersecurity-loophole/ … -
@emptywheel@Gorman_Siobhan Nothing in that language rules out 702 for cyberexcept to the extent that it requires "about" searches. -
@normative@emptywheel Does seem to limit collection on the topics of CT & prolif, but seems to allow targeting ppl for reasons beyond those - 6 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.