See, I'm personally of the same opinion. I couldn't figure it out, but then it hit me. It's the same line of logic that the military uses in their security clearances. Back in the day I used to work for a JAG lawyer, and have several friends that are/were in the military. So I do have some knowledge of the matter.
The way they do things is this. There's clearance and then there's need to know. So for instance one of my friends worked in network IT for the military. So had access to computers with "top secret" information on them. However, he wasn't allowed to access any of the information on the computers. Simply to use them for his job. Sound familiar to what the NSA is saying?
If there's other people on here that are closer to the military than I was please correct me, but it all starts to make "sense" when you think about it that way. I'm not saying it's right, in fact I think this system is likely problematic in a non military setting (and perhaps even within one as well)
I was in the military, with a clearance. You describe it reasonably well. A clearance means you can have access, if needed. I am completely against collection of information as they are doing because of time. A warrant gives them access to data from all time. This is a departure from current warrants that allow them to collect and examine data starting now (or as far back as it was stored by external parties). It's the difference between getting a warrant to wiretap a phone and getting a warrant to listen to every phone call ever made with a phone. In my mind, a warrant says we have have reasonable suspicion to collect more information as it stands right now, not reasonable suspicion to examine past behavior. Then again, I believe that the U.S.'s definition of rights are great and should be extended to all humans by the U.S., not just citizens or those on U.S. soil.
This is pretty basic stuff for those in the security industry. Read about mandatory access control if you are more familiar with discretionary access control (what happens in most off-the-shelf operating systems) as an interesting example of how things are done differently.
Access control is one thing but:
1) How can we guarantee that the control cannot be bypassed when everything is secret?
2) How can we guarantee that someone with clearance is not selling information to criminals?
The way they do things is this. There's clearance and then there's need to know. So for instance one of my friends worked in network IT for the military. So had access to computers with "top secret" information on them. However, he wasn't allowed to access any of the information on the computers. Simply to use them for his job. Sound familiar to what the NSA is saying?
If there's other people on here that are closer to the military than I was please correct me, but it all starts to make "sense" when you think about it that way. I'm not saying it's right, in fact I think this system is likely problematic in a non military setting (and perhaps even within one as well)