If it involves (a) identifying / filtering stuff they want to spy on (b) sending it back to one of the intelligence agencies, it seems like both would be hard to do well and secretly ... right?
If it involves (a) identifying / filtering stuff they want to spy on (b) sending it back to one of the intelligence agencies, it seems like both would be hard to do well and secretly ... right?