@Colinfreeze The "rules" question is where. NSA does upstream on datastreams that are foreign-to-foreign & 1-end-US coms, not both-ends-US
-
-
Replying to @charlie_savage
@charlie_savage Don't forget, this is not just abt terror targets. They do use it for cyber, which involves non-email targets.@Colinfreeze2 replies 0 retweets 1 like -
Replying to @emptywheel
@emptywheel@charlie_savage Sorry in what specific ways can cyberdefence cast a wider net and deviate from SIGINT in this way?2 replies 0 retweets 0 likes -
Replying to @Colinfreeze
@Colinfreeze I think@emptywheel's point is they may be using certain code associated with known malicious hacks as a "selector"3 replies 0 retweets 1 like -
Replying to @charlie_savage
@charlie_savage Yes. They do that.@Colinfreeze3 replies 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel@charlie_savage One Q: Cdn judges worry relevant law mangled by CSEC's in house lawyers, ie. used as "shield" not "sword" ...2 replies 1 retweet 0 likes -
Replying to @Colinfreeze
@emptywheel@charlie_savage ...using it for its stated intent of going after specific bad guys/ foreign intel targets. Is there US parallel?3 replies 0 retweets 0 likes -
Replying to @Colinfreeze
@Colinfreeze@emptywheel US law exempts foreign intel collection from most wiretapping laws except FISA (1/2)1 reply 0 retweets 0 likes -
Replying to @charlie_savage
@Colinfreeze@emptywheel And FISA only covers certain types of surveillance, leaving govt unregulated (except by 12333) for the rest (2/2)2 replies 0 retweets 0 likes -
Replying to @charlie_savage
@charlie_savage@emptywheel What's amazing (as how you've established) is how the exec clings to its powers even when ostsbly taken away.2 replies 0 retweets 0 likes
@Colinfreeze And the tech has far outstripped the ability for national boundaries to be the distinguisher as w/EO 12333. @charlie_savage
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.