Nope. You forgot to mention the Verizon illegal warrant to collect cell logs and location history of ALL verizon wireless customers. In addition, it was confirmed that an identical warrant was issued to the other cell providers. All americans with cell phones were being logged.
Companies were not allowed to challenge the warrant as FISC was a roberts rubber stamp. They never turned down a request.
Also parallel construction. Im amazed, but not surprised, you left this out.
I know the guy who works for Verizon and coordinates with the alphabet agencies on this stuff. After he packages it there's no open names, phone numbers, or sound file access... in other words it's de-identified data. The PII (personal identifiable information) resides in other locked tables with no linkage. To link identity to records, or to open files, you need a court order. These court orders are not given lightly. Data linkage access is like 2 nuke keys... and I'm not kidding. What they use it for is finding associates or sympathizers of known bad actors. Let's say there's another attack being planned on NYC. A bad actor comes into the country and gets identified. They get a court order to tap his phone and monitor his data streams. His records get translated from ID:2342384 to ID:Achmed. They look for other records that are touching his, or have in the past. For instance, he received calls from a cell phone every Thursday night at 8pm from ID:234842935. They show the analysis to the judge and he signs off. They now know that ID:AchmedsGrandma is calling him Thurs at 8.. they can filter that one out now. They find some other IDs that intersect and get court orders for each. They now have names, phone numbers, recordings, locations, etc. They get evidence of impending attack and get warrants for physical arrest. They use Cell triangulation geolocation and bring them all in at once while counter-intel people watch for residual activity due to the bust.
THIS is how we've thwarted 400+ 9/11 type attacks since 9/11. I know, those who trade their freedom for safety deserve neither... I don't disagree. The fact that they used FISA against Trump shows that our data isn't safe despite all the checks and balances. Someone is bound to use it for evil one day, so we need to find a solution without crippling our intel efforts. People really should never forget however, that we are still the good guys. Don't live with a crazy gray perception, like the Left.
Not when they are collecting information on hundreds of millions of Americans with no due process, and handing it to the CIA, pal.
Nope. You forgot to mention the Verizon illegal warrant to collect cell logs and location history of ALL verizon wireless customers. In addition, it was confirmed that an identical warrant was issued to the other cell providers. All americans with cell phones were being logged.
Companies were not allowed to challenge the warrant as FISC was a roberts rubber stamp. They never turned down a request.
Also parallel construction. Im amazed, but not surprised, you left this out.
I know the guy who works for Verizon and coordinates with the alphabet agencies on this stuff. After he packages it there's no open names, phone numbers, or sound file access... in other words it's de-identified data. The PII (personal identifiable information) resides in other locked tables with no linkage. To link identity to records, or to open files, you need a court order. These court orders are not given lightly. Data linkage access is like 2 nuke keys... and I'm not kidding. What they use it for is finding associates or sympathizers of known bad actors. Let's say there's another attack being planned on NYC. A bad actor comes into the country and gets identified. They get a court order to tap his phone and monitor his data streams. His records get translated from ID:2342384 to ID:Achmed. They look for other records that are touching his, or have in the past. For instance, he received calls from a cell phone every Thursday night at 8pm from ID:234842935. They show the analysis to the judge and he signs off. They now know that ID:AchmedsGrandma is calling him Thurs at 8.. they can filter that one out now. They find some other IDs that intersect and get court orders for each. They now have names, phone numbers, recordings, locations, etc. They get evidence of impending attack and get warrants for physical arrest. They use Cell triangulation geolocation and bring them all in at once while counter-intel people watch for residual activity due to the bust.
THIS is how we've thwarted 400+ 9/11 type attacks since 9/11. I know, those who trade their freedom for safety deserve neither... I don't disagree. The fact that they used FISA against Trump shows that our data isn't safe despite all the checks and balances. Someone is bound to use it for evil one day, so we need to find a solution without crippling our intel efforts. People really should never forget however, that we are still the good guys. Don't live with a crazy gray perception, like the Left.
See my other post on the subject: https://thedonald.win/p/GvB650TO/x/c/15JTyeGxKm