CC BY-NC-SA 4.0 License.
FED: Mark, I’m here to check up on you. How is everything going?
FED: I’m surprised. Our profile told us that it’d take you a while to get over the ethical dilemma of your position.
MARK: You mean how I’m sifting through metadata collected on US Citizens in an attempt to identify potenital terrorists? Well I’m not happy about it, but it’s certainly the easiest job I’ve ever had.
MARK: You guys gave me a list of things considered “suspicious events.” So far every person I’ve examined hits at least one of these activities. For example, the first item on the list is “uses Google.”
FED: I know that appears overbroad, but Google is the first resource terrorists use when they’re trying to learn how to construct bombs on the Internet.
MARK: The second item is “uses Facebook.”
FED: Social media is regularly used by would-be terrorists to share intelligence and plan activities.
MARK: The third item is “posts comments on YouTube.”
FED: Well come on.
MARK: OK, I’ll give you that one.