These efforts are almost never to get access, as they already have backdoors built in, but rather to legitimize the data they’re already gathering illegally. Once it’s legitimized, they can present it as is in court, rather than needing to go through the process of parallel construction.
Plus, legitimizing the backdoors allows other lower agencies access to them.
These efforts are almost never to get access, as they already have backdoors built in, but rather to legitimize the data they’re already gathering illegally. Once it’s legitimized, they can present it as is in court, rather than needing to go through the process of parallel construction.
Plus, legitimizing the backdoors allows other lower agencies access to them.