There is a huge difference between what this DA is asking for and what hackers and the NSA (or the KGB used to) do everyday.
Invasion of user privacy takes four forms:
A. Direct or passive remote monitoring or intercept of user information and data — much like hackers do. Or, the NSA.
B. Active, targeted observation — e.g., wire taps (which are legal when authorized by a court), surveillance drones, wireless transmitters.
C. Active reading of phone or computer data via...