cicerone imposter wrote:That is true, but that's the reason why we have FISA laws. duh!
I cannot believe you are unaware that enemy conversations, domestic-domestic, foreign-foreign, and foreign-domestic, are not known to be such by virtue of copies of their finger prints, their DNA, their photo IDs or their respective physical locations or exchanges. Generally, the same locations or exchanges are used by different people for both enemy and non-enemy conversations. Of course, copies of their finger prints, their DNA, or their photo IDs are unavailable or don't exist. In fact, the enemy goes out of its way, so to speak, to avoid using the same locations or exchanges, or anything else they can think of, more than once, to avoid detection.
So the intelligence services, via automatic means such as very high speed computers, must first develop lists of
suspects from what their automatic means deduce from words heard monitoring the content of millions of conversations -- enemy but mostly non-enemy. These suspects are then monitored more closely by both human and automatic means to infer or intuit enemy participants from the content of the conversations. Then the intelligence services closely listen to what they think are enemy conversations to determine the enemies' plans early enough so that they can stop the enemy in time to prevent bloodshed or other damage.
For this type of intelligence gathering to work well enough to stop the enemy before he strikes, literally millions and millions of initially non-suspect conversations must be monitored to detect those that warrant classification as
suspect enemy conversations. But much more monitoring time is required before
suspect enemy conversations are finally classified as
enemy conversations.