Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How do NSL's work in practice in large organizations? This might not make sense for a small organization like Truecrypt, but if someone like Microsoft or Google receives an NSL, presumably multiple people have to see it and handle it -- what keeps one of them from taking a picture of it on their cell phone and leaking it anonymously? (Of course they need to sanitize the embedded metadata and timestamps.)

If they can't prove which specific employee leaked it, who do they punish?



I'd imagine it goes straight to the lawyers




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: