Here is what we do.
We do not start our investigations from selected data. We start them from factors that are related to threats.
If an identified target is implicated in potential terrorism or espionage, and if we see that that person is in contact with someone—certain information can be useful to us, like a telephone number—we can then check in the unselected data we have been authorized to keep. That is part of the process I explained to you earlier.
What people are afraid of is that we will be going on fishing expeditions.
There's no fishing expedition.
We cannot start conducting investigations based on unselected data. It is quite the opposite. We start with the data from our investigations and we then use the unselected data to ensure that the individuals we are investigating are actually associated with the threat. That information will often help us to establish that they are not associated with the threat.