They don’t have to contract it out to a private sector processor. They don’t need to apply to new cyber security audits or privacy evaluations because we already know how it works based on the earthquake and the flood warnings.

Keyboard shortcuts

j previous speech k next speech