US renews fight for the right to seize content from the world’s servers

Discussion in 'privacy general' started by lotuseclat79, Oct 17, 2016.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Always makes me laugh when government TLAs criticise companies for responding to the profit motive.

    Or complain about being "thwarted" in their investigations because they are (slightly) constrained by the rule of law and evidence, such pesky unnecessary things.

    Or fail to mention what normal civilised relationships between countries might involve - namely an efficient MLAT system that did respect the rule of law on both sides.
     
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Right. They do want access to all servers. Consider NSA's Belgacom hack :)
     
  4. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    That was their minions, GCHQ, in Operation Socialist.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    It's a subtle distinction, at this point ;)
     
  6. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Not so subtle - GCHQ is explicitly paid by the NSA for some services.

    Even worse, GCHQ seems to have gone down the obnoxious road of management consultese, talking about their "customers", and doubtless viewing themselves as a profit/cost centre desperate to justify their burgeoning budgets and empire by touting their feeds and tools to all possible "users".

    That the risks and damage associated with the use of the surveillance databases and tools increases dramatically as the location and security boundaries are crossed, and as information becomes available to larger and larger numbers of people without adequate audit, controls or penalties, this is a recipe for breach and many forms of improper use.

    And then they go & provide the data to other countries.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.