Mystery: How did DHS get records of a #Google VOIP call using a #DEA database of telco records? https://www.emptywheel.net/2015/04/16/the-government-changed-its-mind-about-how-many-databases-it-had-searched-after-it-shut-down-the-dea-dragnet/ … via @emptywheel
-
-
Replying to @PatrickCToomey
.
@PatrickCToomey@csoghoian@emptywheel Aw, come on people. We've known for 10+ years that they have a direct tap into AT&T's switches.1 reply 0 retweets 1 like -
Replying to @WilliamOckhamTx
@WilliamOckhamTx So where does that call hit AT&T's switch?@PatrickCToomey@csoghoian1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel@PatrickCToomey@csoghoian Either as an IP packet or as POTS call, good chance it hit AT&T's network on its way out of U.S.1 reply 0 retweets 0 likes -
Replying to @WilliamOckhamTx
@WilliamOckhamTx Does that depend on what kind of call the Iranian was making?@PatrickCToomey@csoghoian1 reply 0 retweets 0 likes -
Replying to @emptywheel
@emptywheel@PatrickCToomey@csoghoian Lots of variables, but doing deep packet inspection on AT&T lets you launder through dragnet du jour5 replies 0 retweets 0 likes -
Replying to @WilliamOckhamTx
@WilliamOckhamTx True, but the whole point is that's not the program either DHS or DEA have described in the case.@emptywheel@csoghoian3 replies 0 retweets 0 likes
@PatrickCToomey But if so the 30% claims abt 215 are utter bullshit. @WilliamOckhamTx @csoghoian
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.