←back to thread

286 points 2OEH8eoCRo0 | 6 comments | | HN request time: 1.19s | source | bottom
Show context
basilgohar ◴[] No.42132069[source]
> and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders

Is this legal speak for saying, "They're using our backdoors without our permission."?

replies(9): >>42132086 #>>42132150 #>>42132199 #>>42132267 #>>42132292 #>>42132511 #>>42132544 #>>42132558 #>>42133159 #
1. sangnoir ◴[] No.42132558[source]
It's legal speak for "They are looking at who we have wiretaps on", which any country would be interested in, just to see which of their assets are being watched, for counter-counter-espionage purposes.
replies(2): >>42132767 #>>42132773 #
2. walterbell ◴[] No.42132767[source]
For cross-referencing with ground surveillance.
3. halJordan ◴[] No.42132773[source]
That is incorrect. While you're idea probably is interesting to them, they are indeed leveraging the infrastructure to "live off the land" doing their own collect. They are very much doing their own targeting.
replies(1): >>42132958 #
4. sangnoir ◴[] No.42132958[source]
How would their own targeting relate to "copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders"? AFAIK, telecoms enforcement requests subject to court orders in the US mean one thing, and one thing only: lawful interception of communication.
replies(1): >>42133132 #
5. basilgohar ◴[] No.42133132{3}[source]
There is no known limit to the scope of what LE can monitor, and there is no public record to access or analyze in the case of sealed documents. So it could, for all we know, be anyone and everyone.

Remember, way back when, AT&T just gave the NSA full access to their network.

replies(1): >>42133320 #
6. sangnoir ◴[] No.42133320{4}[source]
I'm not sure I'm following your argument in the context of this thread. Are you suggesting there were no surveillance court orders whose targets the Chinese found a d copied?