From the Intercept:

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted.

Apparently no hyperbole is too hyperbolic when describing the scope of the NSA’s massive data-vacuuming operation.

The Small Firm Scorecard example graphic.

The Small Firm ScorecardTM

Is your law firm structured to succeed in the future?

The practice of law is changing. You need to understand whether your firm is positioned for success in the coming years. Our free Small Firm Scorecard will identify your firm’s strengths and weaknesses in just a few minutes.

Leave a Reply