I read http://www.theatlanticwire.com/politics/2013/07/nsa-admits-it-analyzes-more-peoples-data-previously-revealed/67287/ a while back and a thought occurred to me which I thought I should record.

There is a terrorist who calls Comcast because he needs internet. I call Comcast and now I am two hops from a terrorist and am on the list.

I think it is fair to assume that at least one terrorist suspect has called all, or at least most internet providers, and phone providers because even terrorists need to call and check email. So it is also fair to assume that everyone who has called a phone or internet provider is two hops from a terrorist and as such can be monitored.

That is the only justification needed to abuse that rule, and I am sure there are even more justifications that could be used with all the other rules as well.