Transparency as Voyeurismhttp://www.lawfareblog.com/transparency-voyeurism …
-
-
Replying to @RosenzweigP
Is efficacy included in "checking malfeasance, misfeasance, and nonfeasance."
1 reply 0 retweets 0 likes -
Replying to @emptywheel
Good qu. Answer requires many more than 140 characters. Will try to share detailed thoughts soon.
1 reply 1 retweet 0 likes -
Replying to @RosenzweigP
TY, I'd add (since your example is cyber) we can't have a legit debate in this country until the public understands what spying norms are.
1 reply 0 retweets 0 likes -
Replying to @emptywheel @RosenzweigP
Best example is OPM, which was horrible failure on US part, but (as Clapper always pointed out) pretty normal among spies.
1 reply 0 retweets 0 likes
Replying to @emptywheel @RosenzweigP
I even have a hard time explaining that reason RU phishes Google emails is bc they can't get them via 702, which NSA can.
11:10 AM - 5 Sep 2017
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.