cisco IP communicator is a service that allows you to access your network from outside your network.
But in some cases, the company has been using the tool to spy on people, and it seems to have been doing it for quite some time.
In an incident published by The Intercept, the tool has been used to spy out-of-band on a person from outside their network.
According to The Intercept: The Intercept has uncovered evidence that Cisco is using Cisco IP communicators to spy for the National Security Agency, as well as for the FBI.
The Intercept reports that Cisco has been deploying IP communicons in the United States since at least 2010, but only in limited use for law enforcement purposes.
This is the second time Cisco has used the tool against a user, according to The New York Times, which notes that the tool is commonly used by law enforcement, and that the company is aware of other cases where the tool was used.
The Intercept also says that Cisco’s decision to use IP communicators has not only led to a huge increase in usage, but also an increase in the amount of information being leaked about the company.
“Since 2011, Cisco has deployed at least 17,000 Cisco IP devices in use in more than 200 countries and territories across the world, and more than 10,000 IP addresses on the public DNS,” the report said.
In some cases it seems that Cisco uses the tool for “unencrypted” access, where it sends packets to other IPs, including from a public IP.
But there’s also an issue of data retention that the documents show, which could have led to Cisco spying on a lot of people.
In the case of the NSA, The Intercept says that IP communications were collected in more ways than one.
One IP address was used to intercept two different communications.
The first communication took place in 2014, and was sent from an IP address used by Cisco’s servers in China, while the second communication was sent by an IP used by another Cisco server in the U.S. This was done in order to identify individuals, which the company says is part of the mission of its IP-enabled products.
But The Intercept also points out that Cisco didn’t use the tools against people directly.
The company used them to target people with specific keywords, or people with the same keywords as a person who the tool had identified.
This is the same tactic used by the FBI to target a person, but the Intercept notes that Cisco was able to do it without the person knowing.
A Cisco spokesperson did not immediately respond to a request for comment on the story.
The New York Daily News says that the surveillance was “staged” by Cisco in order “to keep the data out of the hands of law enforcement.”