Even if you are a complete moron, and some of you are, given the attention that has been paid to eavesdropping on electronic communications would you use them to plot attacks?
UD: Just to be clear, pattern resolution parameters have changed since the current debate began. LSS Other people read history besides Americans. So the question I suppose I’m asking you, is how would you pull off this sort of job under current circumstances, which is precisely what the bad guys are doing?
Update2.2 To understand things a little better,
The second problem with this program lies in the nature of the DPI gear itself (if you’re not intimately familiar with deep packet inspection, I would highly recommend reading this introductory guide). As Ars Technica notes, “[c]urrent gear is so sophisticated that it can reconstitute e-mails and IM conversations out of asymmetric traffic flows” and can “essentially peek ‘under the hood’ of any non-encrypted packet to take a look at what it contains.” This being the case, it’s not hard to imagine how DPI technology might be used for more nefarious means like copyright filtering and general Internet monitoring. And lest we forget, monitoring traffic is the first step toward regulating and prioritizing traffic. Thus, DPI appliances can be seen as a core technological enabler of the non-neutral or “tiered” network.
The two issues almost seem dissimilar, net neutrality and FISA, but they are dovetailed either by design, or as seems to be the American Way, accident.
So shall we start discussing asymmetrical communication methods in the blogs?