David McCloskey
๐ค SpeakerAppearances Over Time
Podcast Appearances
Well, and Prism is the codename for this program. And I think it is important, very important to note that this is targeting individuals the communications of foreign nationals. The intent behind this is for the United States government, for NSA to be able to query this database, essentially, and to be able to look at email, et cetera, of foreign nationals who are outside the United States. But
Well, and Prism is the codename for this program. And I think it is important, very important to note that this is targeting individuals the communications of foreign nationals. The intent behind this is for the United States government, for NSA to be able to query this database, essentially, and to be able to look at email, et cetera, of foreign nationals who are outside the United States. But
Well, and Prism is the codename for this program. And I think it is important, very important to note that this is targeting individuals the communications of foreign nationals. The intent behind this is for the United States government, for NSA to be able to query this database, essentially, and to be able to look at email, et cetera, of foreign nationals who are outside the United States. But
As that's being collected, you're, of course, collecting the information of Americans at the same time, right? Who are sort of swept up in these searches. But you're not- They're not the target of it. They're not the target of it, right? It's sort of- almost being collected incidentally by the NSA.
As that's being collected, you're, of course, collecting the information of Americans at the same time, right? Who are sort of swept up in these searches. But you're not- They're not the target of it. They're not the target of it, right? It's sort of- almost being collected incidentally by the NSA.
As that's being collected, you're, of course, collecting the information of Americans at the same time, right? Who are sort of swept up in these searches. But you're not- They're not the target of it. They're not the target of it, right? It's sort of- almost being collected incidentally by the NSA.
It's got these logos. I would argue very easy to draw on. whatever conclusion you like from that slide deck.
It's got these logos. I would argue very easy to draw on. whatever conclusion you like from that slide deck.
It's got these logos. I would argue very easy to draw on. whatever conclusion you like from that slide deck.
And important to note, it was legal. The tech companies knew this was happening. So a lot of the outrage that came afterward from Silicon Valley was primarily that it was leaked, not that it was happening.
And important to note, it was legal. The tech companies knew this was happening. So a lot of the outrage that came afterward from Silicon Valley was primarily that it was leaked, not that it was happening.
And important to note, it was legal. The tech companies knew this was happening. So a lot of the outrage that came afterward from Silicon Valley was primarily that it was leaked, not that it was happening.
And the legal basis for this was something called Section 702 of the Foreign Intelligence Surveillance Act, which FISA, that act had been passed in the 70s, been updated, amended over time. The authorities that NSA was operating under, FBI was operating under, were, I believe, part of the 07-08 FISA Act.
And the legal basis for this was something called Section 702 of the Foreign Intelligence Surveillance Act, which FISA, that act had been passed in the 70s, been updated, amended over time. The authorities that NSA was operating under, FBI was operating under, were, I believe, part of the 07-08 FISA Act.
And the legal basis for this was something called Section 702 of the Foreign Intelligence Surveillance Act, which FISA, that act had been passed in the 70s, been updated, amended over time. The authorities that NSA was operating under, FBI was operating under, were, I believe, part of the 07-08 FISA Act.
And that Section 702 is what really compelled, in many ways, these tech companies to provide that information to the federal government.
And that Section 702 is what really compelled, in many ways, these tech companies to provide that information to the federal government.
And that Section 702 is what really compelled, in many ways, these tech companies to provide that information to the federal government.
Well, and I think it is important to note here, again, in Deadly Sin number four, Snowden, indiscriminate, leaking.
Well, and I think it is important to note here, again, in Deadly Sin number four, Snowden, indiscriminate, leaking.