Nobody needs to justify why they "need" a right: the burden of justification falls on the one seeking to infringe upon the right. But even if they did, you can't give away the rights of others because they're not useful to you. More simply, the majority cannot vote away the natural rights of the minority. Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
Edward SnowdenWhen we talk about computer network exploitation, computer network attack, we're not just talking about your home PC. We're talking about your cell phone, and we're also talking about internet routers themselves. The NSA is attacking the critical infrastructure of the internet to try to take ownership of it. They hack the routers that connect nations to the internet itself.
Edward SnowdenThere are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes.
Edward SnowdenIf I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
Edward SnowdenWhen you're attacking a router on the internet, and you're doing it remotely, it's like trying to shoot the moon with a rifle. Everything has to happen exactly right. Every single variable has to be controlled and precisely accounted for. And that's not possible to do when you have limited knowledge of the target you're attacking.
Edward Snowden