Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  September 15, 2014 10:30am-12:31pm EDT

10:30 am
>> i'd like to invite the panelisto make a closing short remark, maybe expanding on a point you've already made about the role of consumers in driving change or collaboration, but i'd like to turn it over, brad, again to you, and then we'll just go down the panel, and uwe will have the last word. >> well, nancy, again, thank you for stimulating and bringing this group together for this important conversation. i think i will borrow from dr. reinhardt's famous paper about prices. that's not something i addressed in my opening remarks, but i want to encourage everyone to think about the role of your
10:31 am
insurer in the context of prices, because it is about the price at the end of the day. what we attempt to do as best we can on behalf of the customers who choose to pay us a premium to become our customer pursuant to that contractual relationship is to go into the marketplace and to negotiate the best price that we can yield combined with the best quality to make that available to the customer that is paying that premium. and that's what we've traditionally done. i mean, that may be an overly simplistic way of looking at any kind of insurance, but certainly health insurance. but that's, that's what we try to do. and we're going to continue to try to do that and leverage all of the wonderful technologies and innovation and collaborations and things that we can do to help bring, take pressure off of those, off of
10:32 am
those prices. so it's very important that we, that we continue to do that. and as we go forward, we all need to be vigilant about those that, as dr. reinhardt has alluded to, that have a vested interest in keeping those prices high. because as these innovative tools are rolled out whether it's a contractual arrangement or whether it's a particular device that's demonstrated to bring a price down, there are those that will advocate that we pass laws to prohibit them. and we are seeing those conversations spawn across america as these new mechanisms are being developed. therefore, as a consumer, all of us as a consumer, we need to pay attention to that very important health policy side. and that piece in particular and help all of us make the
10:33 am
judgments of where we want those trade-offs to be and either advocate for those prohibitions which will have a cop intention, or add -- consequence, or advocate against them so that we can have more and greater flexibility to deliver that consumer value which everyone is demanding. so, again, thank you for the opportunity to be with you. >> [inaudible] >> i'll piggyback on that comment, because i think that was a wonderful summary. and what i'd like to adjust maybe a couple of thoughts, and that is i can assure you that every entity whether it's a provider or a payer, the business community, in the legislative arena there's a pursuit of a new value proposition in the health care arena. i can speak for our organization, wellpoint, that we are very, very engaged with all kinds of constituents trying to vector toward a value proposition that best serves our
10:34 am
public. what is fascinating, and i think it was mentioned here a few times, is the reality of a public that has to become very educated with respect to how to access this new, this new, brave new world we've come upon. and when a consumer can't describe what a deductible is, we've got a problem. for all of the intentions that we're advancing around new devices, technologies and pharma, payments, methodologies that reward value, at the end of the day we need consumers that completely understand the system, how to access it to better their circumstances in terms of the health care that they are demanding to improve their circumstances. we, i know, are very engaged in educating the public, but it is a kind of a partnering responsibility, and i'd just close by saying that's a why i kept emphasizing the necessity
10:35 am
for collaboration in a spirit that we have not witnessed in this industry, well, at least in the four decades i've been part of it. so i'm hopeful that, i'm very, very hopeful that we're going to make great strides going to the future to improve circumstances for the consumers that we're serving in this new world. >> thank you, joe. ark -- avik? >> last week i was asked the speak at the americans for prosperity american dreams summit, the big koch brothers outfit that has grassroots activists from all over country. they came in by the busload, 3,000 of them. ted cruz had spoken the second day of the conference and said we will repeal every word of obamacare, and there was a one-minute-long standing ovation for ted cruz. the day before i spoke to a subsection of that group, and i gave the talk pretty much similar to the one that i gave you today. and i opened by asking the group raise your hand if you're on
10:36 am
medicare. and more than half the room raised their hand. i said, guess what? you're on single-payer health care. and they were kind of stunned by that. and, of course, this is a group that's very passionate about wanting to repeal obamacare. [laughter] the trojan horse for single-payer medicine in america, you might have heard. so i think what i would urge my conservative brethren to do is we have to do a much better job of explaining to the public that we didn't have a market health care system in 2009, 2008, that there were serious problems of access and cost in the health care system before 2010. and if our voters believe that repealing obamacare will fundamentally solve the health care problems in this country, it won't. and i don't think that we've done a good job of that, ask we have -- and we have to do a better job of that, and that's on us. >> uwe? >> one of the more encouraging remarks i heard this morning
10:37 am
from brad and joe is this issue of transparency. because that's been missing. i always sort of tell the way americans bought health care is a little bit like blind folding people, shoving them into macy's and say go and buy a shirt efficiently. and you come out with shorts that don't fit -- [laughter] and then half a year later you'll get some bill that you understand absolutely nothing other than pay this amount. and that's how it's been. and that is clearly not how you can run anything that wants to engage market forces even at the fringes. now, the europeans don't need price transparency because they negotiate fees that apply to every provider in their state or canton in switzerland and to every insurer. so you don't need the price,
10:38 am
they're all the same. you would need only quality. but here we need both price and quality and not hospital charges. we need, a, what we actually have to pay out of pocket in going to this hospital or that doctor, etc. ideally, i would like to know the total price, frankly, to pick up some drug, $26.95 co-pay, not a big deal. but i sort of ask, well, what's the total price, what fraction am i paying, and i'm not allowed to know. and i actually think i should know what the whole thing is. the other thing is there is now, we have self-insured at princeton, but we have insurance policy carriers who do the claims processing. what is it, tpa, we call that? and they have a cost estimator. now, where you can put the doctor and a hospital in, and it gives you -- but they're not binding prices.
10:39 am
they just estimate what they are. i looked normal delivery, i couldn't find it. i found that the insurance, can you help me find normal delivery, they couldn't either. the theory must have been that professors don't procreate -- [laughter] and we do. [laughter] we do. so some of these are not as good as they should be and, again, i would encourage my colleagues in the insurance policy side make sure these things really are reliable and that, in fact, if a patient has to pay more than your cost estimators say, that there is a way for the patient to tell you that so that you can see the varian minneapoliss and maybe talk -- variances and maybe talk to the provider and say what are you doing? something to really make transparency work. then we can have a little more market at the fringes. >> great. well, thank you and, again, i'd like to just thank all of you for joining us today. i'd like to give a special thank you to katherine santora and
10:40 am
carolyn meyerss, katie mcdonald and their team who helped put this on today. i'd also like to let everyone know that there'll be a recording available on our web site next week, nihcm.org, and then please join me now in a final round of applause for our wonderful panel. [applause] [inaudible conversations] >> you can also watch the panel if you missed any of it, if you want to go back and watch certain portions of it right online at c-span's video library, that's at c-span.org. [inaudible conversations] >> yesterday was the first in a seven-part series on the roosevelts by film maker ken burns that premiered on pbs. we'll have live coverage of his remarks today at the national press club scheduled for 12:30
10:41 am
eastern time. and live coverage of the house and senate today at 2:00 eastern. the house plans to take up a number of small bills, some dealing with financial services, and the senate has work scheduled on a pay equity bill. live coverage of the house on c-span and the senate right here on c-span2. "the hill" reports the house and senate are under pressure to pass funding this week to avoid a government shutdown and to reauthorize arming syrian rebels -- make that authorize syrian rebels. many lawmakers will be leaving washington, d.c. soon, though, to head off on the campaign trail ahead of the midterm elections. the president sent a request for authorization to arm moderate syrian rebels to fight isis. many members, though, of both parties want to hold separate votes on those issues. this week officials from the obama administration will testify on capitol hill to four house and senate committees to make the case for arming the syrian rebels. defense secretary chuck hagel and joint chiefs of staff chair,
10:42 am
general martin dempsey, they'll appear before the senate armed services committee tomorrow at 9:30 a.m. eastern on our companion network, c-span3. and secretary of state john kerry will testify before two congressional committees on the strategy to fight isis starting wednesday with the house foreign registrations committee -- relations committee live at 2:30 eastern. and last month the directer of the national counterterrorism center, matthew olsen, spoke at the american political science association. he defended the nsa surveillance programs and argued the amount to collect intelligence -- the ability to collect intelligence on americans who take up arms with isis abroad is crucial. next, that panel. >> okay, let's go. welcome to the plenary session on, quote, nsa: surveillance and its consequences. the theme fits nicely into the larger theme of the convention entitled "after the digital
10:43 am
revolution." the controversy surrounding the nsa deeply implication the uses and potential abuses of digital technology by government and nongovernmental actors. violent i jihadists use digital technology to build their movements, and states use it to trace these threats. as legal and national security scholar phillip bob bit has said, terrorist movements often reflect or mirror the resources, tools and aspects of the societies that they attack. they use digital technology to attack us, to build their movements, and we use it to track them. in a sense, we see the very forces that we're fighting. so digital technology has provided great benefits. it also enhanced threats. many say this paradox also
10:44 am
applies to the nsa. finish it, too, uses technology, digital technology to protect us from terrorism, but there is also potential for abuse. i'm reminded of james madison's famous statement in federalist 51 where he said that we need government to protect us, but at the same time, we need what he called precautionary or auxiliary precautions to protect us from the government. if, indeed, there are angels, they don't dwell on this particular earth. we're fortunate today to have a very distinguished panel to discuss the nsa and to set the stage for what i hope will be a very interesting q&a. i am donald downs, university of wisconsin, and i'm the moderator of this discussion. also especially given the situation in the world today, what's going on in iraq and in syria and elsewhere, the
10:45 am
discussion is all the more relevant. now, that's said to get a grasp on the nsa and what it does, it's difficult. for one thing, the government has moderated the programs due to political pressure, and adding to the fog is the classified nature of the nsa's work and the complexity of its interactions with the nsa, with the fisa courts, congress and the executive branch. in addressing the nsa question, we have to know enough trees, know what's going on, but also see the forest. and i hope the panel today will get the right balance. and if the nsa's watching this plenary session, welcome. [laughter] if germany's watching, welcome to you too. now, we'll give you a sampling of the questions we'll be dealing with. how legal are nsa's programs? how effective are they?
10:46 am
indeed, what are they? how serious are the dangers and threats that nsa programs address? and how do we define these dangers for legal and policy purposes? is there a way to obtain sufficient data without sweeping communications and information into metadata and other forms of data collection? or is such sweeping necessary? if so, what are the safeguards? how much should the rules and norms governing foreign intelligence gathering differ from the rules and norms governing domestic law enforcement? just how different is foreign intelligence gathering from domestic law enforcement? how much overview is provided by the system of checks and balances in our constitutional system? such as judicial review, congressional checking, public opinion, the press, inspector generals, the executive branch oversight?
10:47 am
and has such checks been sufficient? the nsa is often -- has often done its job with secrecy, especially in the past. so what is the proper balance between secrecy and openness in a constitutional democracy, and who should decide where that line is drawn? what is the role and legitimacy of whistleblowers and leakers in our system? what is the legal and normative status of edward snowden, whose leaks provided so much information especially about the metadata programs? what about other leakers and whistleblowers? if snowden returns to america, should he be punished, or is spending a few years with putin punishment enough? how has the simple growth of new technology been responsible for the nature of nsa programs? how does the press deal with the
10:48 am
publication of stories involving national security? how do public opinion and the press shape policy in the government response? and finally, what is the classic trade-off between liberty and security? or as benjamin wittens has said, there really is no necessary conflict unless we become unbalanced on one side or the other, that security and liberty actually should reinforce one another if properly done. now, before i introduce the panel, i want to say something very briefly about the programs to sort of set the stage, and the panelists will say a lot more about this -- about them. the nsa was officially established in 952, though it was based on previous intelligence operations. the core mission, as i said, is to gather foreign intelligence through surveillance. and this mission is distinct from the normal operations of domestic law enforcement. indeed, when the foreign
10:49 am
intelligence surveillance act was passed in 1978, itself based on a reaction to the previous abuses of surveillance by the government, its main objective was to give the government the power to do what's necessary when it comes to surveillance. at the same time, preventing that power from leaking over into the domestic sphere. american citizens are distinct from foreign intelligence dangers. of course, what happens when there's a third category, when american citizens are involved with foreign intelligence in and that's sort of that third area where a lot of controversy arises. much of the controversy over the nsa programs in recent times pivots around this congenital concern as non-foreign intelligence has often been swept into the intelligence gathered regarding foreign intelligence. now, since 9/11 for the most part -- this is sort of my father sarduci production of the
10:50 am
programs to a simple formula -- there are four basic programs that have been used. two of them are content-based surveillance of telephone and internet communications. section 702 of the fisa act amendments of 2008 addresses when the nsa may look into this content. if it's purely foreign intelligence, it lies beyond the purview of the fourth amendment. but if it's intelligence that pertains to american citizens, then there are legal standards, and such investigation needs to be covered by the law. the second set of programs involve metadata collection, both internet and telephone. now, it's my understanding -- maybe the panel will correct me -- that the internet program has been dropped or seriously modified, but the telephone program remains. this is largely covered by section 215 of the patriot act. the business records provision.
10:51 am
metadata has been stored by government and private communications providers. it includes such things as numbers dialed, time and length of the calls, the id of cell phones, cell phone information, web sites visited and the like. this data does not itself per tape to the actual -- pertain to the actual content of those communications, and at one time the supreme court held that such information is not covered by the fourth amendment because it's been given out to the public, and it does not deal with content. but those decisions occurred many decades ago when technology was not nearly as developed as it is now. so there's a greater concern with the new technology. in order to get into the content of this, a fisa court authorization is required. and there's a big debate -- our first speaker will address this -- as to whether or not prior authorization is required to even look at the metadata itself independent of the content.
10:52 am
now, the communications content provisions were ultimately approved by the fisa court after "the new york times" leaked, published information about them in the mid 2000s. mean while, the extempt of the meta-- extent of the metadata programs was not really known until edward snowden in early 2013. after the fisa amendment act of 2008, all four programs were given legal cover. but we now know that the fisa court and the nsa have been involved in a lot of back and forth in recent years over compliance. some say this tension shows the fisa courts are doing their job, others say it shows that they haven't been sufficiently, sufficient guardians of our civil liberties. in the wake of snowden's disclosures, the government in the recent months has discussed three different reform proposals. i won't get boo those now for --
10:53 am
into those now for reasons of time, but i assume that the panel will be talking about them, and it'll be interesting to see if they can go forth given recent events in the middle east. remember back in 2009 we had the christmas underwear bomber over detroit. reforms were in the making, apparently, back then, but as soon as that act took place, reforms were stopped. so there seem to be kind of a pendulum effect given the immediacy of terror threats and the strength of proposals for reform. let me turn now to the panel. it's a very distinguished group. i'll present them in the order that they will present their initial comments. first is professor laura donahue, georgetown university law school professor. she's written extensively on the nsa and related matters including two recent extensive pieces which i had the pleasure to read before the conference. she's advised leading privacy
10:54 am
groups and assisted in legal litigation. professor donahue will talk about the legal implications of mainly the bulk metadata program, but she'll probably also allude to section 702. seem to be two sides of the same coin in many respects, in my view. the second speaker will be matthew old seven, director of -- olsen, director of the counterterrorism center in washington, and before that he served as general come for the national security agency -- general counsel for the national security agency where he held the position of chief legal counsel. he also served the department of justice as an associate deputy attorney general and is responsible for pfsing and coordinating -- supervising and coordinating national security and criminal matters. mr. olsen's also had the honor of serving both the obama administration and bush ii administration. he will talk about the nature of terrorism, the threat it
10:55 am
presents and what the nsa is doing to collect intelligence to support our counterterrorism efforts. he'll also focus on the surveillance and the role of the nsa programs, the role they play in our ability to identify and disrupt terrorist threats. third speaker will be martin baron, executive director of the washington post. before that time he was the editor of the boston globe, the executive editor of "the miami herald" and associate managing editor of the new york times. a piece i encountered online asked is marty baron the man to fix the washington post? i assume that he is, but i know for sure he'll contribute to our panel. he will talk about the press and how the press deals with reporting sensitive national security stories and how it interacts and negotiates with the government regarding such
10:56 am
>> also the director of the duke program in america, an american grand strategy. from june 2005 to july 2007, feaver was on leave to be special adviser for strategic planning and institutional reform on national security, the national security council staff at the white house where his responsibilities included national security strategy, regional strategy reviews, other political/military issues. he's written widely on such matters as national security, civil military relations and the
10:57 am
cost of war. his remarks focus on the larger political and public dynamics in play in this issue area and how these dynamics impinge on policymakers' calculations. so our format's the following: each panelist will present -- we said five minutes, but they may bleed over -- their particular matters, and then we'll have an exchange where they'll reply to one another. and after that we'll open up to q&a there the audience. from the audience. so that's what we'll do. why don't we start with laura donahue. >> thank you very much. are the microphones working from -- okay, good. we've decided to discuss from the table today. so, first, i'd like to thank don for the introduction. it's a wonderful opportunity to come together to discuss these issues, and i'd like to thank my fellow panelists in advance. i'm looking forward to the discussion. as don mentioned, there are two central programs that have really captured attention.
10:58 am
the first is the bulk collection, section 215, matters and the second is section 702. so in light of our limited time today, i'm going to really focus on section 215. what i'll say up front about 702 is primarily my primary concern is constitutionally with how 702 is being exercised relate to the post-targeting analysis and the use of foreign intelligence organization in ordinary criminal prosecution without any of the protections one would otherwise see in a fourth amendment context, and i'd be happy to return to that during the discussion. don also mentioned a two-part series in the harvard journal of law and public policy, the first one was just published, the second will be publish inside a couple of months x these deal with 215 and 702, so as far as the forest goes, at 160 pages each, they're pretty much in the forest. so feel free if you want to take a look. if you have questions, comments, critiques, i welcome all of that on the articles as well. so let's focus on section 215.
10:59 am
what i'd like to say is three things about section 215, and particularly bulk collection under 215. first is it violates the whole purpose of the foreign intelligence surveillance act. second, that it's illegal under the statutory language passed by congress. and, third, that it's unconstitutional. so as you can see, i don't have a view -- [laughter] on -- >> other than that, we're doing okay. >> yeah. other than that, nsa top marks, right? and here's why. let me explain. first, it violates the purpose of fisa. in the 1960s and '70s there were a plethora of programs that all of us know well that had to do with the collection of bulk information on u.s. citizens. the nsa, for instance, in a program called project minaret collected information on a total, by the way, of 1,650 people, no more than 800 people at a time. in operation shamrock they intercepted all international communications and scanned about 150 cable messages per month
11:00 am
looking for ties for foreign intelligence. now, one characteristic of these programs is they started limited, so operation -- or project minaret, for instance, started by only monitoring americans traveling to cuba, but they quickly expanded to include anybody involved in civil disturbances, criminal activity, suspected drug activity, individuals of interest to protection -- presidential protection and so on. and this spurs congress and the church committee in particular really head the charge -- led the charge here to say they did not want opportunities for executive branch committees to collect information on citizens. that was the purpose behind fisa. they were also concerned that developments in technology would allow agencies to exploit ambiguities in the law to swriewd upon american citizens' privacy. these are the stated aims of this legislation. so to protect u.s. persons not just from nsa, but also fbi
11:01 am
programs or the u.s. army's operation conus or the irs programs, all of these, fisa established four important protections for u.s. persons. first, any information from electronic intercepts in particular had to be specifically tied to an individual, right? you could not just collect all electronic intercepts. second, that individual had to be identified as a foreign power or an agent of a foreign power prior to collection of information on that perp. finish on that person: minimization procedures had to be put into place, and the foreign intelligence surveillance court would oversee this process. now, initially, fisa dealt with electronic intercepts and gradually expanded to include intercepts, physical surveillance, pen rebellinger the and trap and trace, and that's really what's at issue; that is, the number one dials from one's phone and the numbers one receive ises on one's phone. that's trpp.
11:02 am
and finally, business records and tangible goods which also is of issue because this is the provision under which bulk collection takes place. now, in regard to what has happened under section 215, many of these basic principles and the approach of congress and the purpose of introducing fisa have really been countered by nsa's actions. first, there's no particularization prior to collection. the orders that are issued by verizon or to verizon just are bulk collection. there's no prior targeting, so there's no probable cause that the individual was involved in any sort of criminal or foreign intelligence-related activity. before they had to know the target to get information. the argument is that now they get the information in order to ascertain who the targets are. it's completely backwards from the approach that fisa traditionally has had. third, there is not a higher threshold for u.s. persons for the collection of information. and that's counter to the purpose of congress in fisa. and the role of fisk is shifting.
11:03 am
we're seeing a different role where fisk preponderances are being offered -- positions are being offered as -- [inaudible] okay. so that's the first argument is that this is really contrary to the principles of fisa. the second point i'd like to make is that it also violates the statutory language itself. and there are, in this regard, three ways in which it does so. the first one i want to focus on is the actual language which says that the government must have reasonable grounds to believe that tangible things sought are relevant to an authorized investigation other than a threat assessment. and this is 50usc1861 for the statutory provision. so, web, there have to be -- again, there have been to be reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation other than a threat assessment. so what's happening in this regard is the government argues that alltel phony metadata is
11:04 am
relevant to authorized investigations. okay, all telephony metadata is relevant to that. but that makes the phrase "relevant to" completely meaningless. if all telephony data is rell availability, then what iser relevant to an in authorized investigation? you must have republican grounds to believe that this is, that all records are relevant to an authorized investigation. it makes the prior clause, it reads it out of existence as a statutory matter. it also establishes a very concerning precedent. so if all telephony metadata is relevant, then so is all e-mail metadata, all internet metadata, all financial records are relevant, all communications, all social media. you could go on and on. all of this would be relevant to assessing a potential threat to the united states. so what is irrelevant? and this contradicts, very clearly contradicts
11:05 am
congressional seat belt. now, an authorized investigation is also part of that phrase, and the way that it's being read by the nsa treats the search of the data -- not the collection -- as the part that must be relevant to an authorized investigation. but the statute requires that the information to be obtained must be relevant to an authorized investigation. an authorized investigation under the attorney general guidelines requires a level of specificity prior to collecting information whereas bulk collection does not in this regard. in addition, the orders issued by fisk allow for the future collection of information, so the investigation might not have been yet authorized, and you are now granting the authority to obtain information without that investigation actually being in existence. the statute is very clear that it has to have already been established. so that's the first set of ways in which the statutory language is violated. the second set of ways relates
11:06 am
to subpoena -- [inaudible] the statute requires that the nsa, that the type of -- not just the nsa a, but anybody using section 215, that that information must be obtained, could be obtained under ordinary subpoena you cuts dee couple. it's pretty clear you cannot use subpoenas for a fishing expedition. i couldn't convene a grand jury in bethesda and just start collecting telephony metadata to see potential criminal activity. that type of use has been roundly rejected by the supreme court. in addition, subpoenas must be focused on particular individuals, and they're related to particular crimes. they're not just a search for information of potential criminal activity or of potential criminals who might be of interest, and there is an emphasis with subpoenas on past wrongdoing, on things that have happened or current wrongdoing and specific crimes that have occurred. the third statutory argument to consider with regard to the the
11:07 am
bulk collection is pen register and tap and trace. so fisa actually has extensive provisions for pen register and trap and trace information, so numbers called and numbers received on one's phone. reading section 215 the way it does, the government has done an end run around the pen register and trap and trace provisions, that statutory language where congress clearly limits and restricts and sets out guidelines for how that information can be collected. okay. so on to the third, final set of arguments which is the constitutionality of this. in my view, this is unconstitutional, and this is why: so the government relies in this case on case that don referenced, this is a case called smith v. maryland in 1979. this is a case, a local case, actually, for us here in d.c. up in baltimore, maryland. a woman named patricia mcdonough was robbed, actually, and at the scene of the crime she saw a 1975 monte carlo car.
11:08 am
and she told the police she saw the car, she had been robbed, she went home, and somebody called her on her home phone. he basically had stolen her purse, identified himself as the person who had robbed her and told her to go out on her porch. she went out on her porch, and a 19 75 monte carlo drove very slowly by her house. she called the police, and the police saw a 1975 monte carlo in her neighborhood. so they took a look at the car, and they said -- from the license plate they figured out who owned the car, and they went to the telephone company and said may we place a pen register on the telephone line. now, at that time there was no ability of telephone companies to actually record the numbers dialed from a phone or received by a phone. at that time local calls were billed in minutes. so it was because the police had this special device and gave it to the phone company that they could do this. and when the case -- sorry, when they placed the pen register on the phone, the next morning
11:09 am
michael myth, michael lee smith called her on the telephone. they used this information to get a warrant, went into his house, and there's a phonebook turned down, dog eared, to her telephone number in the phonebook, right? and they used this evidence in trial against him. so the supreme court says that michael lee smith had no privacy interests for purposes of the fourth amendment in the numbers he dialed from his phone because it was out of his control. it was in the telephone company's purview. and that gave birth or rise to what is known as third party doctrine in the law. so the government looks to this and says, look, the telephony metadata we're collecting is third party data. we're just recording this information that the telephone company has which includes not just numbers dialed and received, but trunk location. and this information has been collected 24/7, 60/60 for years, for years. okay, so what is wrong with the
11:10 am
reliance on this case? well, privacy interests implicated by current technologies are significantly different than the privacy interests that were implicated in 979. 1979. there are tens of millions, hundreds of millions of people potentially impacted by these orders. their location information and the ubiquitous nature of the surveillance and long-term nature make this call tate ily different than what happened 1979. now, the court has recently decided a number of cases under both cats and trespass doctrine, and i would suggest that under either approach, whether one adopts justice scalia's trespass approach or whether one goes to the higher bar of cats, under east approach, this is unconstitutional to simply collect bulk records on american citizens. on the trespass side, this is a general warm. this is exactly what gave birth to the revolution. in england it was seen as
11:11 am
protecting the rights of englishmen against general warrens, but the american colonies were directed to to use for evidence of possible criminal activity. and james otis was one who famously argued that this was the worst instrument of arbitrary power, he said, the use of general warrants. john adams, who was actually at the argument said then and there the child liberty was born. this was seen as the first shot in the revolution back to england saying we will not accept general warrants. so the virginia declaration of rights actually prohibited a conclusion on general warrants. virginia and new york and a number of states as a condition of signing the u.s. constitution said there must be a prohibition on general warrants, and that is what the fourth amendment came to embody, that is what madison said. so giving the government the ability to collect all telephony metadata without any evidence of criminal wrongdoing, that looks a lot like a general warrant x.
11:12 am
as a digital trespass on the private lives of american citizens. but one can also go to cats, right? justice scalia in a recent case, jones, who said one cannot read the fourth amendment to read rights out of existence at the time of the founding, so we can look at general warrants in this context. but there is as well an approach to this through cats. there was a recent case, user v. jones -- u.s. v. jones where a gp schip was placed on a car outside of the warrant, the ten days that had been required by warrant and outside of washington d.c. it was on a drug deal every's, suspected drug dealer's wife's car. and the court decided the case on trespass, justice scalia writing the opinion for the court, but there were five justices who came out and said that under cats one has to take account of a reasonable expectation of privacy and that technology is changing this picture, that technology is changing what these things look like, particularly justices alito and justice sotomayor.
11:13 am
they took on this point directly and said this is something different. justice sotomayor said she would overturn third party doctrine in light of the substance intrusivf these technologies. i'm going the wrap it up because i know we're on limited time, but there's a case which deals with thermal imaging. in 2010 we have u.s. v. rorschach which is a sixth circuit case looking at a reasonable expectation of privacy in e-mail, we have cotterman which is a ninth circuit case looking at personal information in digital form, we have justice cay can booking -- kagan looking at cats. we have this growing body of case law where the court is starting to recognize and say, wait a minute, there is a privacy interest in this digital information. this is a heightened interest and something different than what we have previously seep. so just to recap, section 702 my primary concern has to do with post-targetingage sis and use of the information for criminal
11:14 am
activity. for 215 i see it as contradictory to congress' purpose in introducing fisa as violating the statutory language and as unconstitutional. thanks. >> all right. well, i'm going to follow laura. it's not going to be easy, is it, for me as the nsa general counsel to follow laura in her -- she's done a lot of very extensive and interesting work on this. let me say that i'm here in some ways more as, in my current role as the director of the national counterterrorism center, and i'm going to sort of stay in that lane for a bit, although i'll talk a little bit about the law at some point. but i'm probably here primarily actually because my daughter is a now-junior at the university of wisconsin and took professor downs' class -- [laughter] and last year i had the privilege of speaking to professor downs' class with my daughter in it about national security and the first amendment. so as i look out at you all, i'm
11:15 am
hoping that you guys actually are easier than that group was on my argument. they had a lot of good questions. but so i'm going to be, i'm going to stay this the forest and not the trees for a moment, and i know we'll get down into the trees, and i look forward to having that discussion. look ata surveillance from an operational perspective. and the national counterterrorism center is, essentially, a clearinghouse for analysis of terrorism information. the subject of to today's talk s nsa surveillance and its consequences, and i do have a particular perspective now on the that surveillance. my view is that surveillance is absolutely indispensable to protecting the country. it's our daily bread. every day i get a threat briefing. i had one this morning. it lasts about an hour where we go around the world, find out what's happening. from a terrorism perspective. and one of the primary, if not the primary source of the information about terrorism
11:16 am
comes from the collection of information that nsa carries out around the world. it's really through these reports, nsa reports, that we have the opportunity to see the actual communications of the people who are targeted, the targeted terrorists that are seeking to carry out attacks against our interests around the world as well as here at home. so i approach these questions right now, as i said, from a particularly operational perspective. obviously, i understand that there's a lot more to it than just the operational side, and laura's remarks make that clear. but let me make a few preliminary comments. let me devote my preliminary comments to the nature of the threat. because as we have this conversation about striking the balance, professor downs referred to ben wittes' comments. i think you need to understand in thinking about that balance, what's the nature of the threat, what's the nature of the
11:17 am
adversary that we're trying to learn more about to protect the country? and i'll talk about that, and then i'll talk about how nsa surveillance fit into that, and then i'll touch on very, very briefly the impact of the disclosure of the stolen documents and how that's affected capabilities. so the short answer on the threat is that it's increasingly complicated, and it's persistent, and it's diverse, and it's geographically diffuse. it's changed a lot in the last ten years. it's much different from what we faced right after 9/11 and the years shortly thereafter where we really were talking about a monolithic threat coming out of the afghanistan, pakistan area. basically,al tide and al-qaeda's senior -- al-qaeda's senior leaders who had established a safer haven there. a diverse range of actors. not just core al-qaeda in pakistan, but a number of groups and individuals who have varying degrees of affiliation with al-qaeda and it's, you know, professor downs said you basically, you can't not see this today when you turn on cnn
11:18 am
or open a newspaper. you have groups that are officially affiliated with al-qaeda like al-qaeda in the arabian peninsula, the group that was responsible for the christmas day 2009 effort to take down a plane over detroit, you have al-shabaab in somalia, that's an official affiliate, al-nusra in syria, official a affiliate. you have groups that are aligned with or have splintered away from al-qaeda like boca haram in nigeria, isil or isis, the group that's primarily in the news right now. that's a group that splintered off from al-qaeda that used to be al-qaeda in the iraq. and beyond that you have a number of individuals in places like libya, egypt who have varying degrees of adherence to the ideology. you have people here in the united states who adhere to the ideology of al-qaeda.
11:19 am
so the way the threat picture looks now is much more diverse, much more fragmented than it was ten or really even four years ago. beyond that diversity you have a geographic diffusion. so as i mentioned initially, it's not just centered in the afpac region. this threat now spans a wide geographic area going from south asia, pakistan and afghanistan to the middle east, to the he vapt and across -- levant and across north africa all the way from the in the east egypt to mali and mauritania in the west. so this geographic diversity also presents a real challenge from a terrorism perspective. and then the third feature of the threat is it's proven to be quite adaptive. so where we were concerned ten, even five years ago about centrally-planned plotting from al-qaeda's senior leaders in pakistan, we're now, you know, increasingly concerned about the
11:20 am
change in tactics where they're looking to carry out smaller scale, less sophisticated attacks, but attacks that don't require people to travel or communicate directly with central planners or leaders in some of these locations. so they've changed their tactics. they've also changed their tactics in how they communicate. understanding that that's a vulnerability for them. so we have a threat that is increasingly diverse, geographically diffuse and adaptive. so the second thing i wanted to mention along these lines is why is nsa so important? why is it important for us to be able to to collect communications? and the reason flows directly there the nature of the threat. from the nature of the threat. it's very difficult to infiltrate these groups. they are inherently suspicion. they kill people who they suspect are spies. one of our primary ways then of being able to understand their intentions, identify individuals who, you know, block to these --
11:21 am
belong to these groups perceive the plotting that's taking place is to be able to get access to their communications. it's also the case that with the geographic spread of this threat that our ability to have sources, human sources is limited because we can't get to all these different places. it's another reason why nsa surveillance and collection so critical. a third is just the inherent reliability of this type of intelligence. so it's really a gold standard, right? we're not relying on someone to report what they here where they may have inherent bias or limitations on what they have access to. we are actually able to get the actual communications of the individuals we're seeking to learn more about. so we're getting their actual e-mails or telephone calls. and all of this really goes to the point, the fundamental point i started with of nsa surveillance as a general proposition is absolutely indispensable to our ability to
11:22 am
counter the threat that we're seeing and that's continuing to proliferate. a couple cases in point, syria. so, obviously, the news we're seized with what's happening in syria and iraq. in syria we have the unrest has head to really a magnet for foreign fighters. so we have over 12,000 foreign fighters going to syria. that number's going up all the time. more than a thousand of those coming from europe and more than a hundred coming from the united states. going to syria to join the opposition, and many of them joining the extremist groups like al-nusra a, an al-qaeda affiliate, as well as isil. our concern is that as these individuals go to these places, they are eventually going to get trained, further radicalized and then return home. one of our great challenges right now from an intelligence perspective is identifying these individuals, understanding what their intentions are, and if they are involved in plotting, being able to disrupt that.
11:23 am
that's why a very good example of where the types of intelligence we get from nsa is critical to our ability to understand this emerging threat. another point or example i wanted to share because it goes directly to what laura talked about in terms of the particular programs that i know folks are interested more in talking about section 702 and 215, and i know we'll talk about the legality of those because i have something more to say about that, but the more specific example that many of you will be familiar with is najibullah zazi. targeting an individual this pakistan who was connected to al-qaeda. by targeting that individual in pakistan, they intercepted an e-mail between the individual in pakistan and this individual they didn't know anything about, turns out his name was najibullah saz si living in
11:24 am
aurora, colorado, about how to prepare an explosive device. because of that intercept, because of that collection, they identified this individual in colorado, shared that information with the fbi. the fbi initiated an investigation of zazi. zazi, eventually -- he was days away from traveling to new york. eventually, he was arrested by the fbi as he was on his way to blow up the new york subway. in addition to identifying zazi, the nsa and fbi used section 215 to corroborate the identity of an accomplice of zazi by looking at the phone records for this individual. this, the attorney general called this one of the most serious threats we'd faced since 9/11. it was a plot that was real, it wasn't aspirational, and it was stopped because of nsa and because of these programs. so the third thing i want to say is, and i'll talk just for a
11:25 am
moment about this and turn it over to marty, is a word about the impact of the disclosures. the bottom line is the documents that were stolen from nsa and then disclosed have had an extremely damaging impact on our ability to collect information. we've lost the ability to intercept the communications of key terrorist operatives and leaders. look, we know these groups monitor the press, we know they're suspicious of our ability to collect their communications. it's not news to them that the nsa and the united states government, intelligence agencies around the world are trying to collect the their communications. but what this information did was essentially confirmed in excruciating detail the scale and scope of our capabilities. and in many ways, it revealed information that had nothing to do with the pryce or civil liberties -- privacy or civil liberties of americans. it was purely information about the capabilities, the technical capabilities of u.s. intelligence agencies.
11:26 am
we have specific examples of terrorists who have adopted greater security measures in the last year including various types of encryption. they've changed internet service providers, they've dropped or changed e-mail addresses, and they have otherwise in some cases just ceased communicating in ways they had before and dropped out of our ability to see what they were doing. so, again, extremely damaging impact op our ability to -- on our ability to collect these communications. so, look, we're at a point now though where we're dealing with this, and we -- the president has made significant changes, for example, in the 215 program. so it no longer looks like what laura described. but we have a lot of work to do to address the erosion of trust that's been created, and i think that's something that is part of why it's important to have discussions like this with informed and influential audiences like you all and why i welcome the opportunity to have
11:27 am
this discussion, so thanks. >> great. well, thank you, matt. so what i'll try to talk about here is how and why we decided to publish, how we went about our work and how we think about national security issues in our coverage. i'm not a lawyer, i'm not going to pretend to be one here or play one here, so i may be at some disadvantage, but i think i can speak at least in broad strokes about the role that we see for ourselves in coverage of this major national security, as you might expect, is an area of intense focus for us at the washington post. it's one of the greatest powers of government, that's the power to make war, to spy on people, to interrogate people, to prosecute, to incarcerate and kill. all of those are the greatest powers of all, and they are vested in our government as they
11:28 am
are in every government around the world. we have to cover the federal government, and in covering the federal government, those are not activities that we would choose to ignore. and nor are those activities that, in my view, we can simply defer to the government's wishes on what we should report, how we should report it, what not to report whenever the government asserts a national security rationale or whenever the basis for our coverage is classified material. the government has shown a remarkable -- maybe not so remarkable -- addiction to classifying documents of every sort, an enormous amount of information now is classified including a lot of information that is relatively innocuous. there can always be a rationale for keeping something classified.
11:29 am
and as a result, very sweeping government policies with profound implications for individual rights, the fourth amendment we've talked about here, the first amendment as well. those have been put, have been put into place in secret. you know, the constitution of the united states begins with the phrase "we the people," and it presupposes that the people will be involved in self-governance, that this will be a government of, by and for the people, and the premise of that is that the people actually have information about what their government is doing, that they have knowledge of that. so our purpose is to try to provide that information so that we can actually have self-government, self-governance in fact and not just in fame. in name. at the post we have a highly experienced national security staff. i think the people on this panel are aware of that.
11:30 am
they have a lot of sewer actions -- interactions with the people on our staff. we do rely on their expertise and their history of navigating the most sensitive subjects imaginable. we recognize that there is a tension between national, between self-governance in this country and national self-preservation and self-protection. there's no question about that. and we are not dismissive of national security concerns. we do take them very seriously. we are recognize that it's a dangerous world as we've heard already, we certainly know that. ..
11:31 am
there were 16 officials with our one or two reporters from pretty much every agency in government at the time. then on many occasions at the request of the government we have withheld information that might disclose specific sources and methods. withholding that information we ourselves are becoming to criticism from a certain segment of the population that we were denying the public information that it was entitled to half. however, we did not agree and would not agree to every request made by the government. had we done so we would've had
11:32 am
no stories whatsoever. because the intelligence agencies obviously would've preferred that we not published a single word on the subject at all. saw the director of national intelligence and leading congressmen have said i think chillingly that journalists reveal this information, the contents of these classified documents where the accomplices of snowden. that was a phrase that was used. one congressman suggested we should been prosecuted under the espionage act instead of being awarded the pulitzer prize for public service. thankfully i am here able to attend this panel and be in front of all of you. i think what we saw in the documents that we received from snowden was something that went beyond the specific sources and methods that the press have traditionally guarded on grounds of national security.
11:33 am
the documents had revealed that the nsa was engaging in and surveillance up i think breathtaking scope and breathtaking intrusiveness. to a degree that many in the public could never have imagined and certainly would never have approved. what we have here we believe was a national policy, not just sources and methods, and a policy that have dramatically shifted the balance toward state power and shifted the balance away from individual rights, including privacy. there have been no public knowledge. there have been no public debate, and knowledge within the government itself was sharply limited. so now we have that debate. we are able to panels like this and discuss what is appropriate policy, and knowledge is not limited to a select group of powerful individuals within the government. who are shielded from the people
11:34 am
they represent. i will turn it over. >> thank you, marty. it's an honor to be on a panel like this, even though i realize my presence diminishes the luster of the panel addressed the average seller as well. i'm just hoping my thesis on c-span and take steps to rebalance that last piece of the. i'm going to speak five propositions about someone, a group referenced in martin's remarks, namely we the people. what's the broader political and public opinion content for this issue? i'm going to make five propositions but the first proposition is that the public is not nearly as ron polish on this issue as the "washington post," the new york times coverage by make you think it is. by ron i mean tired of work and wanting to retrench at home and fearful that the government is a bigger threat to their freedom
11:35 am
and terrorists are. i commend to your attention a forthcoming chicago council paul that surveyed public on a wide range of foreign policy national security matters that can be released very shortly if it hasn't already. and the data are striking. this is a data collected before i so became a household name, before the most recent -- isil. most recent coverage. only one in three think the restrictions on the national security agency should be increased. more people think it should remain the same and is a small number that think there should be fewer restrictions. it's a plurality of public thinks that the budget for general information gathering for the nsa's budget, and matthew sadr, should remain the same. that it is now. seven and 10, a super majority say it's more important for the
11:36 am
federal government to investigate possible terrorist threats even if that intrudes on personal privacy. so they killed the privacy security -- tilt the balance in the direction of security. they want more to keep the gitmo rather than closer. so mark may win a pulitzer but the general public doesn't view snowden as a hero. put another way, this is a public that the nsa could work with. more of an nsa kind of public i think that a ron paul public. that are of course very outspoken minority groups that hold to a ron paul view, but in general the public i think is more sympathetic to what the nsa is doing. the second proposition is that the public is not hannah teter
11:37 am
about terrorism, nor is it sanguine about the terrorist threat. so the public is still quite worried -- this is 13 years after 9/11, still worried about terrorism and they are even more worried about terrorism and the event in a decade. that is, the 2014 data is higher than a decade ago. 34% say terrorists have a greater ability today and terrorists had on 9/11. at a decade ago you would've on had 24% who say that. about a third of the public thinks the president has made the country less safe in this area. all of these data is before i attorney general holder said that the isolate terrorist group was more frightening than anything he had seen -- isil, and before secretary hagel, the secretary of defense described the threat in apocalyptic terms. this is the public before the
11:38 am
most recent isil revelations. third, my third proposition, because of those first two propositions, the politics do not favor pooh-poohing the threat. and i think the president aired we need to smith's isil as a gp threat, jv team, and this is in his new yorker article, and you can be sure that if isil ever does succeed in attacking the u.s. homeland, that the lead in the "washington post" is going to be, isil, the terrorist group president obama dismissed as a jv team problem, struck the united states yesterday. the president i think understands that that was a mistake. certainly his communications team does the that's why they've gone to such extraordinary lengths to attack and deflect criticisms about how the president's choices and syria have contributed to the rise of isil. the president goes to really
11:39 am
remarkable lengths to attack people who say that, and that effort by him is going to get harder and harder to do because the more criticisms are not coming from members of his team, or former members of his team. so secretary of state clinton, deputy secretary of state steinberg, former ambassador ford, undersecretary michele flournoy. they of all registered very compelling and thoughtful critiques and many more of democrats have spoken, and anymore better way about the problem. it's impossible to dismiss this criticism as partisan. and paradoxically, the president or the recent success in terms of rescuing the ucd refugees on the mount tops -- ucd -- that's
11:40 am
going to increase in the intensity of the little guys what you think the president will find himself. that is, if isil does successful attack the u.s. homeland and the president has not authorized previous authorized strikes against them in syria and elsewhere, then the question will be, well, why didn't he use tools that were successful for him in iraq to do with the threat and isil was honored by cidou not be able to contain this threat indefinitely without confronted him in syria? so the political vice will tighten. the fourth proposition flows directly from the. these numbers, the poll numbers i described are likely to spike in favor of a more robust counterterrorism effort, and including a robust intelligence collection rather than the other way. i don't agree into a period where the public will be clamoring for even more
11:41 am
restrictions on the nsa. i think the trendlines point in the other direction. it's the you for me to imagine scenarios where the public concern about this will increase dramatically than it is for me to imagine scenarios where the public will become more sanguine. and that intensifies further the political pressures on the administration, particularly the pressure to be more expensive on the intelligence collection. one of the reasons that the bush administration and the fall of 2001 move as quickly as they could, accelerating and actually throwing out existing war plans and creating a new war plan in order to attack al-qaeda in afghanistan on an accelerated basis, the administration was very concerned that al-qaeda would go up to do nothing on u.s., they would get a second
11:42 am
strike in before u.s. have been able to avenge the first strike. they were concerned that in such a climate it al-qaeda have gone up 2-0 on the u.s., that the pressure from the public for an unrestrained, for an overwhelming response using all of its of national power including brown's even weapons of mass destruction, the nuclear option, the pressure on the administration would have been even greater. so part of the reason for moving so quickly was to bring the political environment back into allying with a more coherent and more reasonable counterterrorism strategy. and ironically, this president, president obama has put even greater pressure on the intelligence community. then roads who is the president's chief spokesperson in the national security area recently said -- this is about a week ago, that at the time there was no need to attack isil in
11:43 am
syria. and the reason that they didn't have clear indications and warning yet -- this was a week ago -- that isil was going to post a direct imminent threat to the homeland, but ben rhoades insisted that if we did get that clear indications and warnings then, of course, the president would authorize a strike. what that does though is put a tremendous amount of pressure on your indications and warning capacity. that was a shot across the bow of the intelligence community that quote, saying because that was in political terms saying we don't need to act on because the intelligence community has told us that we do not need to act. if we are wrong, if there's a strike intel is committed has to what is. setting the political predicate for a blame shipped which has
11:44 am
tremendous pressure on the intelligeintellige nce community to open the aperture and make sure that there's not a single one, a single possible threat that goes unnoticed. and so this leads me to my fifth and final proposition. that there is an interesting policy maker and academic gap in this area, in the study of this issue. let's stipulate for the sake of argument, we can argue whether it's true or not but for the sake of this panel let's stipulate that some level of homeland risk is irreducible. that even if they do all the work that there's some irreducible threat that remains, i virginia many academics accept that premise and to say what are we doing so much to reduce it? if there's some irreducible risk, why are we doing, going to such great length and accepting trade is on security and privacy from nsa, why are we doing so much to reduce it?
11:45 am
to policymakers i've interacted with see it in a mirror image. they say the threat is active irreducible level precise because we're going to such extraordinary lengths to reduce it and that's what have to maintain these extraordinary lengths so that the threat remains that whatever is the irreducible level. so i closed by saying i think the pressure on the president will increase in this area. and i call to your attention what the president said a day or two ago in a speech to veterans. he said that if isil killed americans, he would avenge their deaths. and no one should doubt his willingness to do so. and i accept that at face value. i certainly don't doubt his determination. you've proven you will use all elements of national power to avenge the death of americans. and americans do want the
11:46 am
president to avenge those deaths. but they want even more for the president to take all reasonable measures to prevent those deaths. they are not just interested in avenging. they want prevention. so go back to my political vice problem for the president. if the president does not take action against isil because he's waiting for clear indications and warnings of a homeland attack, and if he doesn't get those clear indications and warnings because of restrictions that have been place on the nsa, then in that hypothetical the blowback will be severe, and debates as to whether the fisa approval process is overly general, i don't think we'll have much resonance with voters. >> thank you, panel. very interesting. we want to see other any questions we have for each other. we have until 12 and we want to
11:47 am
have ample time for q&a. let me launch our discussion by asking the question building away peterson. given his assessment of the political vice, can we expect to see any kind of reform of nsa? and if so what would it look like? >> well, i will jump in. so i do think the president made a very important speech earlier this year in which he outlined the challenges that we face in this area, much along the lines we've all discussed. he identified, for example, his speech took us back to the american revolution, civil war, world war ii, talked about intelligence gathering, and the inherent difficulty that we have in trying to balance national security and private and civil liberties. one of the points i wanted to
11:48 am
make today that is crucial from my perspective, having worked on these issues for several years, including under the past administration, is this discussion didn't just begin with the post story or the guardian story last year. this is an ongoing debate, an ongoing debate with lawyers and policymakers and members of congress, the courts, and with the public. we can talk about how much can the public. but this debate has been going on. the president pointed out that in some big changes, the changes in technology, laura talked about, the fact that after 9/11 we talked about threats inside the united states, the factor biggest adversaries are no longer nationstates but asymmetric actors. those have put pressure on our system. led the president to announce a series of reforms in his speech earlier this year. so the quick answer then is yes, there will be changes. yes, congress has undertaken
11:49 am
legislation right now. that there were changes that we made on the executive branch that didn't require legislative changes according going to the fisa court for approval for every time we look at the data that is collected under 215. but notwithstanding laura's point about the ways in which 215 is out of whack with fisa, illegal under the statute and unconstitutional, the reality is that you may not realize it but it actually is legal and it is constitutional and did his chances with fisa because every judge was looked at it with the exception of one judge, but every fisa court judge has said so. as long as i'm in this state of the national counterterrorism center, as long as i'm part of the counterterrorism center, we're going to take advantage of those laws and policies and rules that allow us to do these things. so this may be where lord wants us to go but it's not where it is now. so there will be changes.
11:50 am
the president said we were and bulk collection but regard to congress and we put forward and worked with congress on legislation that will and vocal collection, but will still maintain an operation capability that is similar essentially what we have now. >> quickly may be yes or no. do you live with these dangers? >> some of the legislation that the house passed in the senate is considered now i think it is certainly within the range certainly within the ranges that we will maintain the operational capability, so yes. >> i'd like to highlight a political and the constitution reason why we have to have those reforms. marty referred to we the people. it's a problem when the law says you have to have reasonable grounds to believe that information is relevant for an authorized investigation and the terms of that all telephone calls are relevant. it's a problem when the law says you may not knowingly collect and how domestic conversations and the nsa says we know we collect tens of thousands of
11:51 am
conversations but in any one instance we might not know at that time so we're still going to collected. it'it's a problem when the law s you have to be able to obtain the fisa subpoena and no court in any district in the united states would allow you to collect for seven years all the data of the citizens living there. it's a problem for democratic governors when the losses one thing in inside a super secret classified world that only a handful of people have access to come something very different is being done in the people's name. the second point, so on the point, disclosure damaged intelligence collection i found a greek but so does the use of the law in a manner that looks so different from what it actually says on its face. that also creates a great damage and the damage done is the democratic governance. on a constitutional point, something we haven't touche toun in silent too. what's been done under 702 is it's not just information to or from -- section 72 deals with non-u.s. persons located outside
11:52 am
the united states, the collection of the commission on the. 703 deals with you as person outside united states and the domestic collection of their summation and 704 is use persons outside the u.s. and the international collection of their information and different standards apply to each category. 702 you're collecting information on non-u.s. persons. one of congress is concerned what this would be useful reverse targeting. they would say the concern is the intelligence agencies are targeting foreigners and we're going to collect all international committee cases but we're not targeting americans in the united states. we're just going to target overseas and use it to reverse target individuals in the country. that's what introduced these other provisions, other mechanisms to try to prevent this from happening. what is happening is this is being introverted not just information or to many occasions to or from targets overseas, non-u.s. persons that information about selectors
11:53 am
related to those targets overseas which is a broader understanding to collect more information. so if i communicate with somebody and there's referenced in the conference of mike cunning occasion, that information can be collected and mind for further information even though i never communicate with the target itself to this is called the to, from, or about interpretation. this has allowed the government to collect a lot more information than it would otherwise be allowed to collect and it is now allowed to query the database using u.s. person information. so names, affiliations, titles, it can be formulations and cori the data to see if anything comes of. you can query this database that the fbi has commingled with fisa and there's no record being kept at this. under the fourth amendment the right of the people, refers back to the people which is understood as a political entity of you citizens, not non-u.s. citizens. right of the people to be secure against unreasonable search and
11:54 am
seizure shall not be violated. we have this right and yet u.s. person identifiers are being used to query the database. the surveillance court offered reasons saying why there was not a war to require the collection of information in the first place. they were good reasons. when the purpose is not garden-variety law enforcement come when the government is interested particularly intends and where there's a high degree of probability if you were to require a war and it would hinder the government's ability to collect time sensitive information and would hurt u.s. national security but you can collected the information. none of those conditions hold and the fbi goes back to the database to see if there's any evidence of criminal activity linked to non--- in bin laden, the southern district of new york said it's hard to get warrants for four ounces collection overseas. it's hard to predict the international impact of seekingg award, there' the problem of fon influence officials being seen as implicit. there's a danger of notifying
11:55 am
enemies. when we have the information in our hands, it is hard to argue why you shouldn't be required to get the word to search the data for evidence of criminal behavior especially if it is unrelated to national security interest. the privacy and civil liberties board came up with a report where they said the fbi frequently does this and they don't keep a record of the. they don't go to a court first. there's no probable cause required and this amounts to an end run around the fourth amendment. we have to have reform to bring within our constitutional purview. >> i want to just change course a bit and maybe address some of the things that peter said, because i felt it was a bit of a characterization of what we think at the "washington post" and how we are and all that sort of stuff. so let me offer some help clarifying remarks. first of all we never said snowden is a girl, by the way. what we suggested was that in --
11:56 am
was a hero by the way. in the documents that there was information the public had a right to know. and that had an important public policy implications. and that probably should lead to a debate such as the one we are involved in here today. we never suggested the public not concerned about terrorist. we are concerned about terrorism. we cover it every single day. and by the way, we feel very acutely the individual was recently beheaded by the islamic state was a journalist and there are other journalists who are being held by terrorists throughout the world. so we're not pollyannaish about that subject. we didn't say that a majority of americans favor greater restrictions on the it is a. in fact, we conducted our own polls which showed pretty much what was reflected in the polls that peter cited. nonetheless, to say that one in
11:57 am
three say restriction should be increased. this is a substantial portion of the population and i don't think just because something doesn't constitute a majority, their views should be entirely dismissed. and we have said that, and you feel that this level of surveillance does raise important constitutional issues as the lord has been talking about. and its potentially subject to abuse. no question that we are in a period of terrorism threat, and there's a question that in a period like that individuals are willing to give up their rights in favor of security. but that's a decision that the american public makes the a debe such as this one. the american public can arrive at a policy that they think is
11:58 am
appropriate or i suppose if they choose in some manner to give up the rights, they can do so, although we do have the constitution of those things have to be contested and discussed in courts and in forums, and political forms and forums such as this one. i do agree with laura that while perhaps disclosure of these documents has had an impact and perhaps a very serious impact on the government's ability to conduct surveillance and intelligence, that feels it's important in the fight against hers and. nondisclosure of all of this, the fact that all of this was largely secret from the american public does in fact do damage to our civil liberties and our ability to govern ourselves. >> peter, any response? >> i think he just misunderstood when i was not there to bring
11:59 am
those to the use of the editorial board of the "washington post," distinguished as that is, but you're right that there's been a marked change in the tone of coverage of these issues. even sense the tragic beheading that the reporters that i talk to, their approach on this issue is different this week that it was even two, three months ago. and certainly at the height of the snowden revelations when the outrage was mostly directed at the nsa, and i think that has been sort of a return to more balanced, a more balanced perspective you just articulated. i think there has been since then. the public has voted on these issues, voted to reelect president bush. it voted to elect the people passewhopassed the patriot act. it voted to reelect president
12:00 pm
obama, and both president obama and president bush defended these kinds of actions irks and now there's obviously a lot of reasons why the public votes for a president. but the public, the gist of my, the distillation of my argument is that the public outrage at the nsa probably hit a high water mark is what i would say. hit the high water mark at the height of the snowden coverage, and that world events are likely to push the public away from that, further and further away from that, more likely to do in that direction and to push them more and more in the direction of, say, lowers can't. that doesn't speak -- loris camp. they have been made and there will probably be more tweeting
12:01 pm
on the margins and certainly if there is any new action, it will be much more tailored and restrictive than the original 2001. so it's not to say that the public will force the politicians to be unrestrained, but it is to say i think we are moving, the public is moving more in the direction of taking more risk to confront terrorism than it is accepting more risks than non-confronting terrorism. >> this is a political science convention and one of the teachings of law politics is the relationship between law and politics. if judges will often decide cases, somewhat different to based on circumstances, famous line supreme court follows the headlines. perhaps the press, at least in some terms of what it wishes. so there's a relationship between politics and the law.
12:02 pm
laura seems to be most uncomfortable with that proposition. is that fair to say? >> that the court follows politics? >> or that politics influences what the court to do. always been a separate domain. >> that's very difficult. constitutional law, which i'm about to start my course on tuesday, you are aware of the political context in which decisions are made and of the orientation of the justices but also the effort to reconcile propositions before with constitutional provisions. >> i just would throw out i think both about tradition and then have a question, the observation is that look, this really important discussion and laura's point where the law is heading, really interesting and important part of this debate. but i think it would be wrong and it's a myth that i think has
12:03 pm
been sort of widely shared more widely do that nsa is sort of lawlessly making these are you going forward on its own implementing these programs. the fact is on 215, for example, the fisa court, independent article iii judges, 37 times i believe have upheld 215, including since the revelation of the snowden documents and the debate in the public. that federal judges have looked at it, three out of four of them upheld 215. on a 702 side congress passed 702 fully understand after debate how it was being implemented. and the judges have looked, the one judge has upheld as constitutional, within the statute. so it may be the case that someday i'll review article that lower is writing will make its way into a court or into congress and change the law, but that day is not today. so from my perspective we have an obligation to execute the law
12:04 pm
in a way that protects the country and takes full advantage of the laws and tools that are on the books. i think it's a misimpression does it thes these are argumentn this it is make, ways and is a sampling these laws because there's a lot of people within the justice department, within the fisa court, within congress looking at these programs and validating and we authorizing them in determining that they are within the statute and within the constitution. i think it's an important issue and i'd like to build ask morty because i think the hardest part of this, and you may give a reasonable opening comment about, and agree with you have a "washington post" approaches these issues, about classified information that they have heard. the challenge i think is that the initial, or at least one challenge is the initial start of the "washington post" broke said that nsa had directly tap
12:05 pm
into the servers, central servers of internet companies, nine internet copies. this is based on the slides the snowden release. this turned out not to be true. this was the lead story. a lot of people might rightly think then and even today that that was the case but, in fact, what that prism programs like but with section 702 of eyes which had been debated, authorized and validated by the courts. i understand there's pressure on the press to publish when you have something like that based on what you know and then maybe time in his pressures as well. but the problem is i'm bringing that though because i turned out not to be true and you would be forgiven the if today it is true, that nsa tapped directly into the service of american internet companies. not true. just not true. but it was the lead paragraph of that initial story. it's very hard to change that impression once it's out there. i think there's real pressure and i know there's a back and
12:06 pm
forth, and maybe we've gotten better at it in sort of, and working with the press. the other problem is not an repress public is the "washington post" and "the new york times," and engaged in that type of discussion with the government in an effort to be responsible. that's my question. >> let me address that. first of all we discussion with the director before publishing that story. the second point is that was an actual nsa document that said they could tapped directly into it so it was an actual accurate account of what the nsa was telling its own people in its own documents. in addition to the store did not stop there. it actually said that the nsa and the government denied that he was doing that, and he quoted extensively from technology companies saying that they were not aware of this. it did not happen, so it did not
12:07 pm
stop by juicing the government can just willy-nilly tap into these networks. it actually quoted from the government saying it's not the case but it quoted from the technology companies saying it was not the case but also quoted from the actual nsa document and which it said it was the case. this was what they were doing. as far as every media outlet not being the "washington post," i appreciate whatever deference is there to the "washington post." the reality is that snowden could have done what was done in the case of wikileaks. it could have turned this over to wikileaks and all of this information without any mediator you be involved, the intermediary being us and the guardian and some other publications over time, he could've just posted it all, put it all out there for anyone to look at. any terrorist organization, any other country to take a look at
12:08 pm
and pour through and look at it to their hearts desire. for reasons that he has articulated, he gave it to us to exercise our judgment, and in exercising our judgment we spent an enormous amount of time with the government going over this information. and actually withholding information that the government felt was far too sensitive. you know, we spend months on some of these stories. we have spent enormous amount of time an enormous amount of money. we've also taken enormous precautions with the security of the documents that we have. i don't think that's an act of irresponsibility in any way. and i think that certainly the government would argue that nothing should be out there. that the government should essentially know everything. the public should know almost nothing.
12:09 pm
and that's not -- >> that's not my position. >> that is the position i think of some and that's not a position that a think it's consistent with the very critical of self-governance. >> we need to move towards the q&a. lore, one quick final point within will do the q&a. leased line up behind the microphone. >> so just to comment, on the foreign intelligence surveillance court. this reliance on foreign intelligence surveillance court concerns me in the reason why coming for look just across the board in the past 10 years of 20 judges on the court only three were democratic appointees to the court itself. of the judges on the foreign intelligence board of review, all the judges have issued these important decisions bring down for instance, of the wall between criminal and national security, to the judges on the three panel that brought down this law axa said fisa itself was unconstitutional in the first place.
12:10 pm
the applications that come before the court in the past decade this has ruled in 18,004 and 33 applications, only eight have been denied in all and only three in part out of 18,000 cases to come before the court. there is no advocate opposed to the government at the court. these are in camera export a perceived. there's nobody to argue against the government for these orders that are put into place. no advocate or advocate that may challenge this that orders are being put for but you see the impact of this. the judge that released opinions, one of the opinions when it treats, it spends a page and have as summarily dismissed if of any question of third party data with no treatment of advanced technology, of u.s. chose going to do the decent been handed down. of course, we have other cases that we can look to and none of this is being cited by there is no contrary opinion being expressed to the court at the
12:11 pm
time. i would add to this that they were not designed to be a court to great precedent answer for not a fourth amendment were exception which is what happened in regard to 702. they find there's a war and exception to foreign intelligence collection which has never been recognized at a domestic level and since 1978 place has controlled those collections. we have a secret court which is heavily skewed towards the one direction at least in terms of the appointment which tends to agree to all of the or to request that are put before it and these are secret, didn't look at that as president to a court that wasn't designed to precedent with no contrary counsel to rely on this as the state of the constitutional provision i find concerning. >> you would support and advocate? >> absolutely. >> let's go to q&a. >> my name is steve schiffer and i'm from the cornell law school. i a question about, i want to push back a little on the third
12:12 pm
party doctrine argument. i think the statutory arguments you made were absolutely compelling. on third party doctrine you argue that it's qualitatively different, and the argument is that it's an invasion of privacy. and it strikes me, i'm opposed to third party doctrine from the beginning. and third party doctrine knew there was a violation of privacy that said it's irrelevant. you can take people's trash, you can get their bank records, you can get their e-mail, you can get the bank records, including credit cards and so forth. you can get their telephone records. we know that in these privacy, but it's not within the scope, it's not a search. there's no reasonable expectation of privacy. so if it's qualitatively different under third-party
12:13 pm
doctrine, it doesn't make a difference. the second point is, it's not clear to me that it is qualitatively different. e.g. give me a choice between having the government get my bank records, my phone records, searching my trash and so forth, versus their knowing who i called, there's a much deeper innovation of privacy. it's qualitatively different in the sense more people are involved, but in terms of the particular invasions of privacy, the third-party doctrine already was doing greater invasions of privacy in the metadata of the nsa. the final point i want to raise with respect to this question. the requirements for a subpoena are not constitutional, and i'm
12:14 pm
wondering if verizon says you can't get this without a subpoena, what is the relationship between the requirement for a subpoena and probable cause? i ask that because i don't know. >> okay, so come and feel free to jump in. >> try to be brief because there's a lot of people. >> all right. so probable cause is not required for a subpoena. i had a discussion in the paper in the 215 paper of the subpoena cases that are relevant to this. the longest period the courts have agreed is two years focus on a particular individual doing money orders and chicago. that's the longest period of time and probable causes our part in that instance. on this border point where there's a distinction of qualitative difference, with information available that was not available been. social network analysis. when you put one path to see
12:15 pm
because some of those suspected of actually harassing, sexual harassing and robbing and so one, that is different from saying let's look at the social network and it was related to them in this network, who the important folks are. which once lived the most power with regard to others and whatever, that's the kind of information one can do. you can get trunk identified information. before when it land lines you couldn't help where michael lee smith went during the day. now with cell phones and so the tracking technologies that allow us to attach to each cell phone tower as we move around cannot pin point where we go. it's different kinds of information that one can get through these same third party records. i was the even their different from before in terms of the privacy interest. beyond this the type of information we now digitally hold with third parties is different to an icon the amount of information we put out about
12:16 pm
our private lives, our personal correspondence, our private dealings with others, the home, the concept of inside the privileges of the home, the filing cabinet is sacrosanct and needed a war to go into the filing cabinet. just because we keep the contents of that filing cabinet on her pocket, that's what this recent case was about whether he had his privacy interest in the sofa with a police arrest you or whether they need a work. the court said no, you need a board. similarly in the intelligence community the idea that just because we give information to apple or to google or two of it is too stored on the cloud, it's not a search for the government to go in and get it and, therefore, they don't need award. i think that doesn't understand privacy interest that an applicant by how technology has changed the context in which we live our daily lives. >> it's important to emphasize one point after laura, which is when the government seeks under fisa to obtain the contents of
12:17 pm
to communications of u.s. persons, they have to get it work. so nothing that we're talking about undermines the basic proposition that the government is going to get the contents of that information, they must do the work. >> leslie francis from the university of utah. this is a question about the contemporary structure of data and analytic techniques. with the surveillance in the area of health, you don't know what you are looking for and tell you see a pattern. you don't know whether there's something of significance or who might be the relevant entity. now, i'm actually very interested in privacy, and the question is to ask you, are there any ways given that feature of analytics to try to craft or form so that when you
12:18 pm
can't identify the target in advance so that we can figure out ways to think about relevance and the use of subpoena power and so on, given that fact about the power of data and analysis? >> so my thought in response to the, this presents a national security as a haystack argument. this is senator whitehouse is -- can't you just build a haystack to find a needle? do we need this information so that we can find the needle we are looking for in a haystack? that is a general ward. it allows you to collect a lot of information to try to find evidence of wrongdoing. as a constitutional matter i would say the criminal matter under u.s. law and the fourth amendment. there is the automation exception moreover. if the government were to put cameras in all of our bathrooms and to record us and they would say but we don't access it, we're only going to access it when we suspect this activity
12:19 pm
and would just look at general patterns of behavior outside of that. that would be a violation. the fact he build a haystack in computers and assume there's no human intervention that also is not established exception to the fourth amendment. while i understand your concerns in privacy, with regard to health law, looking for patterns, when it comes to criminal matters where you can imprison people give them underneath our doctrine that we have, this is something very different and that's what constitutional protections come into play. >> i would just add though this gets us up to an aspect we haven't talked about yet which i think will prove relevant, and that is while it's a fact that nsa is not targeting each of us individually in this room or on this panel, i'm pretty sure, we are, in fact, targeted by google, by facebook, by private
12:20 pm
companies who are actually doing precisely the things that you just described. they've assembled a haystack and they're looking for things and to get any doubts about the check out the ads that pop up when you watch pandora or whatever. are when you listen to pandora i should say. the internet companies do this and recognize there's an important constitutional distinction between the government doing this and private companies doing it and, of course, we all like that we accept that companies will do this so that makes it legal. but from a political point of view i think the public will get increasingly uncomfortable with that level of targeted surveillance and as you'll see, you may see pressure for reform coming in through that door and then maybe eventually migrating over to the national security area. >> hi. my name is jason. i am an ohio state university and it's been a great panel. thank you all very much. so i'm in international relations guy, so that underlies
12:21 pm
the thrust of my question to you seems like the nctc and the tears environment, or the tourist information date and time at the tide is the primary repository for seeking information. we know that the nsa is one of the primary collectors of that information, and i assume fees in ct, nctc that information but were also note the uss information agreements with other countries, and, in fact, there's a foreign partner extract of the terrorist watch list accessing its me like there's an interesting international dimension here. can you comment a bit on, i know you be limited on what you say on how foreign partners are actually benefiting from nsa surveillance activity. and is the nctc tied database becoming a global counterterrorism information clearinghouse? >> it's a pretty well-informed
12:22 pm
question. they know our business quite well. we have the responsibility and statute agreed as to maintain the governments consolidated database, a known and suspected terrorists. we share that, a subset of the classified database with the terrorist screening center which is then responsible for using it for very screening purposes, airports and the like. some of that information is shared under sharing agreements with other countries. i think the important point is that when it comes to you as person information that, for example, nsa collects, that they have a series of rules and laws and policies that limit what can be shared about u.s. persons and minimization procedures based on what they collect. so at every step in the process from the initial collection of information to its use in classified database is to its
12:23 pm
use for screening purposes and finally potentially sharing it with other countries, there are a number of steps all designed to protect the privacy civil liberties of euros persons -- civil liberties of u.s. persons undertaken along the way. i think that's about the best way to answer but it is probably a longer answer to get to the basis of your question, but again there's a number of safeguards built into that system to safeguard privacy and civil liberties of u.s. persons. >> thank you. i am from george mason university and i was wondering what reforms you think we could do to optimize both the need for the people to provide oversight to the innocent and also the nsa's need to protect ways and means? >> one that he didn't mention before but we touched on is a possible changes to the way the fisa court operates. one of the suggestions, the
12:24 pm
former chief judge of the fisa court wrote a letter that touched on this, addressed the issue. abdicating an amicus role. footprint of the court role in certain cases at the discretion of the corporate that seems to me like a reasonable way to increase public confidence in the work of the court. but the work of the court is necessarily classified, much of it. it is not a secret court. we know the court exists. we know who is on it but it does operate much of the time in a classified environment because the information that is being presented itself is classified. but one way to build additional trust in the work of the court were to be have an amicus role. i think that's one that i think makes sense. >> so i agree, but there are other, many other possibilities for reform. one of the problems on the court is they don't have the
12:25 pm
technological expertise and they don't have the resources to monitor the things they're asking the nsa and others to do. for almost three years the nsa was including data without reasonable articulable suspicion into the court had required. when the new administration came in in 2009 they realize what was happening. within a week reported it to the court and that's one thing i do want to say that although there's no country council, no advocate on the other side, msc at dj has been an example job and takes the job series of in terms of trying to present country arguments. the structure is not a denigration on the actual, people and try to carry out their due diligence and the responsibility. in this case, this is a great example of that in 2009 they found out the innocent including the database without regional suspicion as the court had required and told the court and there's all backlog of back and forth trying to sort that out. the reason they didn't
12:26 pm
understand it because they were relying on the nsa to police themselves. out of the courts can't or should today that. that's not their role is a are you doing so probably, nor should they be in an oversight capacity. they should be accorded the patient at the technological expertise. they should be someone with the x. \30{l1}s{l0}\'30{l1}s{l0} also to oversee what is being done -- with the expertise. and finding out they were domestic communications there. i think it's hard and they need to have some help in that regard. there's one more point i want to make and that's congress. i've been surprised by some would response is from different congressional members which is that of an ostrich. they say we didn't know this was going on. and the reason is remarkable to me as i think the executive branch has made it clear. you could argue in 2008 congress did not realize what they were authorizing with the faa, with the fisa in an act with section
12:27 pm
702. you could make that argument based on congressional member statements. many members of congress at it wrong when they portrayed what they were doing but they said this doesn't allow programmatic collection. those who did recognize programmatic collection objected on those grounds and nobody is supporting legislation was saying this abuse for programmatic selection and those who supported said we can't do this for programmatic the that my between 2008. i 2012 there were enough times the executive branch have gone to them and said look we're doing this, look, we're doing this. the fact that congressional members say it's hard to do it, i don't have enough staff, that's abdicating responsibility you better know how that legislation is being used. so i've been surprised by the extent to which certain congressional members have abdicated that responsibility so central in a liberal democratic state. >> i have to take issue with the idea it was an abdication of
12:28 pm
responsibility on the part of congress. in 2008 it was a full hearing of exact was going to implement a following, based on that legislation and congress understood it, pass legislation to understood in 2012 but it wasn't a matter of whether they couldn't go to a skipper couldn't read. they thought it was the right thing to do and those who voted for it, i don't see that as an abdication of responsibility by congress. >> well, thank you very much for coming. i know i'm going to look at future events along these lines with a much more informed year. [applause] [inaudible conversations]
12:29 pm
[inaudible conversations] [inaudible conversations] >> and last night ken burns' new series premiered on pbs. he's beginning today's luncheon at the national press club talk about this series which covers the life of theodore, franklin and eleanor your live coverage begins right now.
12:30 pm
>> [inaudible conversations] ..

61 Views

info Stream Only

Uploaded by TV Archive on