tv Politics Public Policy Today CSPAN February 26, 2013 6:00am-7:00am EST
6:00 am
. look at the petraeus affair and how lives were destroyed because of government leaks of what they thought were private e-mails and what law enforcement purpose was served by that? he put our lives at risk when the government can surreptitiously monitor all of our communications on the internet. there are not safeguards and they are not well understood protocols. law enforcement has the tools it needs but they don't need new tools and their tools need to be circumscribed to balance the civil liberties interests at stake and restore the reasonable expectation of privacy to the
6:01 am
way people communicate now which is more by e-mail than by snail mail. >> let me pick up on something you touched on which is the issue of secrecy and the secrecy surrounding government requests hrough isp's and the isp efforts in promoting transparency. perhaps you could talk about that. >> thank you for having me here today. transparency is something that is really important to us. we think the current debate is lacking good data about the volume and nature of government requests which we think would help inform the broader debate about updating. there's no question that government has legitimate interests in this data and legitimate needs. we also think our users in the
6:02 am
broader public could benefit from good data about the nature and types of requests we receive. the types of data that we respond -- that we return in response and how we push back is important. there is a percentage of times where we will not give any date in response to a government request. we released the first iteration of our transparency report in 2010. since then, we have seen a significant increase in the number of government requests that we received from governmental entities in the united states. since 2010, we have seen a 136% increase in requests. with the latest iteration of our transparency report, about five days after we released the report, we published a detailed
6:03 am
user faq so our users in the broader public and get a better understanding about our posture when we receive government requests. we try to provide more insight into the types of data that we might give to governmental entities depending on the types of protocols they are using. in response to a sabena would be be different than a court order or search warrant. we tried to provide data about the types of requests we are receives from governmental entities in the u.s. the second half of 2012, 68% of the requests we received weexpa from governmental entities were subpoenas. these are generally request for user-identified information. they were issued through subpoenas so they tend to be the
6:04 am
easiest types of data to get that because there tends to be no judicial review. on the opposite side, 22% of the requests we receive from governmental entities in 2012 or search warrants and those due involved judicial review under probable cause. the remaining 10% were from court orders which are commonly referred to as 2703d. that includes other forms of legal processes that were more difficult to categorize as they are included in that 10% in number. we're certainly not the only ones talking about this issue of transparency. about six months ago, judge william smith who is in the southern district of texas offered a piece in the harvard law and policy or is due in
6:05 am
which he deposited the data that exists. that is largely attributable to the fact that expa orders are often filed under seal and the orders to unseal those orders tend to occur when there is a criminal case. absent that criminal cases being filed, the underlying edxpa order remains sealed. in the case of worshak, that case was not sealed but there are many other cases where it would be similarly compelling. it is useful for the public to know about but the public does not get the benefit of seeing what might happen with district court for appellate review because the underlying order remains sealed. we are looking to reiterate in our transparency report and
6:06 am
improve the way we share data with our users so they can get a better understanding of how we handle government requests and the type of data we provide. >> what percentage of ecpa orders are kept secret? >> that is a difficult question to answer. judges met ventured a guess at that. -- judge smith ventured a guess at that and said there was somewhere in the area of 30,000 that remained sealed. some of them are perfectly legitimate and magistrate judge's have a certain amount of documents and requires an act to conceal those documents. >> we were talking a little bit
6:07 am
about the electronic -- salary -- the stored communications and you said there needs to be some serious thought given to the government's ability to access be stored communications. does the concept of stored communications actually make sense anymore? can we distinguish between stored communications in which people might have less of an interest, less of a privacy interest, and real-time communications? >> you see this distinction, real time vs. stored communications. you see it in the store to indications act. there are different rules for the government's ability to procure e-mails depending on whether those e-mails have been stored for more than 180 days or not.
6:08 am
another example is the penn register trap and trace. you have to go through a process to get a judge to issue an order to authorize the government to record outgoing and incoming calls in real time. you can get that historical information with a subpoena. you see that distinction built into a number of different statutes. we wonder if it ever made pristine sense especially now with e-mail and cloud computing whether it is a live concept and justifies a distinction. i think there is a practical side of it which is when you look at the stored communications act of 180 days.
6:09 am
until they change it, congress has presumably made the determination that you have more interest in those communications which are current but you have not taken the step of the leading which result -- of deleting which is a whole nother issue. that as a whole nother concern, as opposed to those e-mails which have been allowed to sit there. i have not looked at legislative ies to whether that works. you can abandon property in a storage unit for two years and maybe that is abandonment. you leave your e-mails for six months like all of us do, i don't know if that is abandonment. your question is a good one as to whether one could actually make an airtight logical argument for why that distinction is still good in
6:10 am
below. law. when you are getting it -- a live feed a phone numbers, that is more intrusive maybe that just knowing when somebody called group called somebody in the past. when this gets litigated, as it has and debated up on that hill, that distinction will be tough to be justified. >> do folks on the panel of something they want to add? >> the 180-day rule is outdated. you look at what we do in our daily lives -- i belong to a book club and i remember
6:11 am
someone's address and was not in my contacts and one of the members sent out a mailing list of all the book club members. i think we have come to expect that we are able to retrieve e- mail but i think we also talk about e-mail nowadays in several different ways. someone will ask you if you send something to your personal or work e-mail? why do we have personal e-mail? why don't we have an e-mail address assigned to every individual? we have personal e-mail because we have some expectation that we can talk about things that are more intimate on that e-mail account then we can honor work e-mail account. i don't think the length of time, given how long the storage life is on a cloud or on a
6:12 am
server for email, makes any sense right now. what we really need to look at is a warrant requirement for all of it. of course, allowing for special circumstances. we also have to have a suppression remedy so that if e- mail is improperly seized, it can be excluded if you are being prosecuted. the contents and all of these things deserve modern day protection similar to the ones that we have four male that goes for the postal service. >> in terms of the 180 day limit, the government takes the position that it can access a lot of your e-mails that are less than that time. as long as they are open. the 180 days limit itself is
6:13 am
quite permissible. -- permeable. i want to move a little bit from how you get into e-mail to what happens when you get to e-mail. coming back to the name of the panel, when the fbi was investigating the relationship between paula broadwell and general petraeus, it was able to access her regular e-mail account and per-share e-mail account. it was then able to look at all e-mails she had in her regular e-mail account. miss kelly who started off this whole scandal and complained about the cyber stalking, gave the fbi access to her e-mail and looking at her e-mail, they discovered her communication with general allan and that
6:14 am
story took off from there. should the government be required to minimize its invasion of privacy even when there is a warrant? >> i think the title might be under false pretences in the sense that petraeus may draw an audience. as an appellate judge, the fact that to have are all set in stone in the record. as far as i was able to tell just reading the news media, the facts of this event may not be set in stone at all. but a want to say anything that relies on a review of facts that may or may not be correct. the main thing is that assuming that i am correct that most of
6:15 am
this investigation was consentual and the accounts indicate that many of the people involved, once there were contacted, gave consent, it really would not address most of the doctrine as to what is protected from a compelled disclosure to the government or when there is a warrant, we have a well-developed a document as to what you can do with the warrant and what happens when you stumble on it. if i have a search warrant for an elephant and i go into your house, i cannot look into your jewel box for your diamond ring. if i have a search warrant for a diamond ring and i go into your house and i see an illegal elephant, there is no violation. the question here would be, from the way you put it, did the
6:16 am
government compel anyone to give us any information that someone else had a reasonable expectation of privacy? from the facts from the news media, i'm not sure that i could point to that. the thing to remember is the general doctrine that if i send you a letter, once you get it, you are the possessor of it. i no longer have a reasonable expectation of privacy. it seemed to me that most of what you are talking about mike, and under that doctrine. the specificity of the fourth amendment is that you have to specify in a search warrant, you have to have specifics as to what it is to be searched. this would be where an issue
6:17 am
arises. i've got one case from one magistrate in kansas who denied a search warrant or required to be limited saying you have to tell me something about what the subject matter is which you want so that if the facts or that you had a search warrant that said we are investigating cyber stalking and we don't want to limit it to something that has something to do with that, then you might have an issue. if it is consensual, or if it is within the basis of a search warrant that has been granted, i'm not sure there would be a problem. the facts of this are all in newspapers and not in a court record. >> this comes back to the one magistrates' opinion. one can imagine that a search
6:18 am
warrant would be restricted to certain terms. in the worshak case it could have been related to terms of his business and therefore potentially x good personal e- mails or health records or maybe tax information or things of that nature. >> it certainly could be. that would be up to the issuing magistrate and did they do indeed deny search warrants that require them to be limited. on the other hand, you have the general doctrine that you can't look for what you want anywhere it is reasonable to look. if you are looking for a drug dealers and drug records and you have a search warrant, you may be able to look at every book in his house to see if there are records hidden inside. you have this back and forth between those two doctrines and people can then say you're
6:19 am
execution of the warrant was too broad. i don't render any opinions on those because the facts are not before me but you have a doctor and that goes both ways. you have limitations and you can say you are required to look in my diamond ring case if you have a search warrant for the diamond ring. you can look in each jury box even though it may turn out that one may have drugs or something else. >> thank you. i want us to talk a little about prospects for reform. david, perhaps you can start us off since you have been involved with google working on ecpa reform. and if you could look at geo-
6:20 am
location as well. >> before it was enacted in 1986 and is beginning to show its age, the legal distinctions that ecpa may have made sense in 1986 but it is currently be lying users reasonable expectations of privacy in 2013. law enforcement does have legitimate needs for this data to prevent and prosecute crime. we fundamentally believe that the same procedural protections that apply when police want to search your home should apply when police want to search your online accounts for the same types of content and documents. there is no compelling legal or policy rationale in 2013 for making those types of distinctions. we believe that the updating ecpa should be the number one policy priority for the 113th congress and i think there is tremendous momentum right now
6:21 am
behind that initiative. that is driven in part by the general petraeus incident which awakened users to the real gap that exists between rebel lot is and where there is reasonable expectations of privacy. there are now over 80 members of the digital due process coalition which includes consumer advocacy groups, trade associations, and corporations. a fair number of those organizations and corporations and advocacy groups joined in the last four months. are notganizations always organizations that always agree with one another on public policy issues. many of them disagree on privacy policy issues but we are united because we think this is a law that digital due process coalition genuinely need to be updated. there is reason for optimism in that respect. i think we are seeing more
6:22 am
companies enter into the transparency debate. i think that has been a healthy development in the broader framework of updating ecpa. twitter, the drop box, and linked and have their own transparency reports and that has a salutary effect as far as in informing users and their posture in handling those requests. last year, under senator leahy's leadership on the senate judiciary committee, an ecpa bill was passed in a was a clean content rule and others are realized that at the end of the last congress, it was unlikely to move beyond the committee stage. it's still established an important precedent going until the 113th congress. i am hopeful it portends well with what will happen for updating ecpa this congress.
6:23 am
the chairman of the house judiciary committee indicated th housee tradition our committee will explore this issue. there is reasons to be cautiously optimistic about where ecpa 44 miss added. as users become more aware of law were -- where law actually is and the contrast with where the privacy laws, i think they will become more engaged in this debate on the location issue, the senate side has dealt more with the warrant for content issue. the houses had more history with the location issue. we don't tend to receive as many location request as the carriers do. some of the privacy interests with location privacy -- courts have had different views about this. there are distinctions that some courts have made between
6:24 am
historical verse as prospective data and even some raise questions about whether there should be distinctions made between initiation and termination date set like when you are engaging a cell hour or information that a phone is continuously sending to wait cell to our even when you are not using the phone. courts are still wrestling with this but we have been focused to having that scalpel approach that senator leahy has taken which clarified that nothing in that bill was intended as a rule of construction to conflict with or modify other areas of electronic surveillance. i think that would include fisa and the wiretap act. >> i think that is right. it is currently envisioned that
6:25 am
this would have a national security components. >> i will give you the last word on this. >> what would you like me to talk about? >> you can continue with ecpa and how you see prospects for its reform. the national security exception seems to be a means to talk about ecpa. many times when they talk about it, they talk about national security and law enforcement in the same breath. in fact, ecpa would not actually applied to national security cases so you would be looking at a situation where it would be four straight criminal cases. where do you guys come out on
6:26 am
that? >> we would like to make reforms to the patriot act and fisa. the position on ecpa is a bed of a compromise for us because we don't think there are adequate due process -- safeguards in the patriot act and in fisa. one area where i think it is less controversial is in the area of keeping track of how many, um, warrants are issued, how many subpoenas are issued, for what kinds of investigations. i think what we all want is a limit on fishing expeditions. we also want to feel that the basis of any law or update to
6:27 am
ecpa is that we have this fundamental right to privacy. right now, because of the third party doctrine, i don't think we can really tell people that there e-mail is private from the government. i think probable cause is still a very good standard. i think the government will be able get the information it needs for national security but i think it would be good to know how many subpoenas if you get and how many warrants you get. i think the public needs to understand the interaction between the government and private-sector. the private sector holds so much of our personal information. >> thank you very much. it is time for members of the audience if they would like to ask any questions. we have a couple of mics so
6:28 am
please raise your hand and make yourself known -- >> you are saying a judge needs to look at a request to go into a house or an e-mail. samem saying the procedural protections should apply when a judge in a criminal context -- when law enforcement in a criminal context wants to get access. same rules should apply in the online environment when a search is conducted with respect to the online account. >> are you saying google has an obligation for that information in court? >> there are legitimate needs
6:29 am
that law enforcement has. some of these subpoenas are issued as building blocks to investigations and enable law enforcement to obtain dat that helps them ultimately in investigations. what we are trying to do in the ecpa update we supported is to get a merrill carve out that would focus on our users communication. we think that is achievable and there's a broader debate about other issues including circumstances under which a subpoena can get at user identification. we focus on ensuring there is a warrant for content role with respect to all communications regardless of how long they have been stored or whether they have been opened. >> [inaudible] when i talk to people about google, they were surprised that
6:30 am
google did not challenge more about handing over information. >> there are circumstances where we push back on government requests. we don't always provide data when the government asks us for it. there are circumstances where we do push back on those requests but when law enforcement make legitimate requests under existing law, as a law-abiding company, we have to provide that data. it is not whether we choose or not. we are obligated under law to provide it. i think we provided some data in the neighborhood of 12% where we don't provide information to government requests. >> i am from npr.
6:31 am
[indiscernible] i was hoping you could provide a hypothetical what it is difficult and law enforcement circumstances to get a warrant from a judge and show probable cause? >> the question as i take it is -- why is it more complicated or difficult for law enforcement to have to go to a judge and establish probable cause and get a warrant that it is to do something shy of that and still get access to the information. ? one answer is time. whenever you have to put together showing probable cause to establish this, it has to get passed by an attorney that will agree and then goes to a judge
6:32 am
and all that takes time. if that were the silver bullet argument, it would write the fourth amendment right out of existence the. that is a real concern and if you look at fisa or the patriot act, people on both sides of the debate realize that is a real concern. when you place more burdens on investigators especially in the security context, it means there are more steps behind the bad guys. sometimes you are trying to prevent a crime in the future. that is what the burdens and the times those burdens take have an impact on the success of your operation. that is one answer. the other answer is there might be situations where you can i get probable cause. there is government testimony from the justice department that talked about a scenario where
6:33 am
they had a child pornographer who was swapping child pornography on an e-mail account and he had another e-mail account. they did not have any probable cause that the other in malakal was conveying child pornography -- that the other e-mail account was conveying child pornography. that is the burden of showing probable cause. it is there in the right cases for the right reasons. go back to bubble third-party argument -- the third party document applies as a constitutional matter. that is the end of the story. the question is whether congress should put additional requirements on top of the constitutional foundation. if that is the case, and it is not a constitutional requirement that there be probable cause for all content, you need to think about whether those burdens --
6:34 am
you have to weigh the balance of those burdens against the additional privacy. >> if there is a carve out for the patriot act and fisa, then we are talking about more routine criminal investigations. i think the probable cause arguments has -- as serve the the test of time. you would not have someone just kind of like knock on your door, like a police of sir, and to say you are acting suspiciously and let me come in and go for your personal possessions. why is it different for your personal communication? why do we have to lower our standards? white -- why can't we increase
6:35 am
privacy and if we have this standard in ecpa we are seeking, and law enforcement comes back and shows us cases where they have not been able to prosecute, vandal can be revisited. -- vandal look and be revisited. i don't think we should lower the standard in routine criminal investigations to make it easy to get our email records by subpoena. >> as an historical matter, it was not until cast that the court recognized privacy and telephone calls. you should keep that in mind in terms of whether we say there should be probable cause for all e-mails. >> cats was 1967, right?
6:36 am
it has been a pretty solid standard. >> i'm not picking on that. i get that. my point is, we don't have an unbroken line. all e-mails should have a probable cause standard before the government gets it. the main point is that if you have a car out for national security, does that address -- a carve out for national security reasons, the ability to get the information quickly is when you have a hot investigation is important. it is not necessarily a silver bullet. in the post-9/11 era, it is not clear what a law enforcement operation is as opposed to a
6:37 am
national security operation. you can take what were relatively segregated operations all law enforcement and national security and integrate them. now you have more of a continuum of operations from an intelligence operation through law enforcement where in order to take down the potential terrorists, you might use fisa or other national security tools but you might also use a good old criminal investigation. all the tools can be married. it is not as easy as it used to be to say this is a national security matter. it is not to say that it cannot be done but since the patriot act, there had been that distinction but that distinction was done away with. >> that does not necessarily
6:38 am
mean that we use the national security to bootstrapped into lower standards across the board. you look at how many of the tools that have been developed for national-security reasons are now being used and routine criminal investigations. the nfl is an example. >> i cannot see because of the lights. >> i am from the discovery institute and i want to go back to an article the anposner wrote in "the wall street journal." he talked about establishing probable cause with a terrorist that has not committed an act of terrorism. he recommended that the evidence in a terrorist investigation would be inadmissible and a
6:39 am
court of law. i'm wondering what the panelists think of the advisability and practicality of that. >> i think that goes back to my last point. it would cause some problems because the scheme we have developed since 9/11 is one that integrates law enforcement with national security operations. , for obvious reasons. you use the terrorism paradigm, the threat is emanating from overseas and therefore we can use fisa and other national security tools. they will either carry out that threat against our assets overseas or they will come here in which case, if we try to follow them here, we need to use the tools that apply domestically. we need to use law enforcement. it needs to be integrated. if you were to say that anything
6:40 am
you get from fisa could not be a wiretap or used in a criminal case -- like in the british case -- you might be affected and identify the bad guys but when you need to use criminal tools to arrest and prosecute them, you would not have your main evidence against them. if they are here, the way to neutralize them, we cannot fly drones around here so we end up arresting them. >> are you arguing to do that? >> [laughter] for the record, i am not. we need to use criminal tools arresting and prosecution and we would not be able to do that with the richest evidence we have which is what we pick up from fisa. >> that is a very interesting question. here we have this continual.
6:41 am
there are those of us that believe that terrorism acts are just a series of extreme criminal acts and so terrorists should be prosecuted in criminal court and not in military tribunals. we should come up with a separate kind of standard. we have seen the government make a lot of mistakes. we've seen them invest enormous resources in prosecution of people who were accused of terrorist crimes but who are really the keystone kops of terrorism. we have seen people end up on watch lists and no-fly lists without due process. it seems we are in an era of history where we will look back and we will say, wow, how did we slap everything with a terrorism moniker and therefore bypassing our values about due process and
6:42 am
lawful searches and seizures? i think your question is appropriately provocative but it would not passed the lab testing congress. i think we do need to challenge this presumption that we are living in an age of terrorism and we've got to change everything about our laws and come up with new systems. we need to have a system regardless of checks and balances. enforcement makes mistakes. judges and juries wrongly convicted people. there ought to be appeals. there ought to be some level of transparency. this is just going to make as a more just and fair society and people around the world will look at us and say, they really are prosecuting the right people. they are not doing a fishing expedition.
6:43 am
they are not claiming all arabs and moslems in south asia are terrorism suspects. i think we need to clean up even in the terrorism or realm the notions of due process and invite more due process in there. if we continue to allow this mission creep of terrorism into our routine criminal investigations, then law enforcement will have enormous tools that the public will not have any chance of fighting because of the presumptions. >> my question has to do with g- mail. it says global can read the contents of e-mails in order to serve advertising. -- it says google can read the contents of the mills in order to serve advertising. how does this affect privacy?
6:44 am
>> i don't think it affects the reasonable expectation of privacy. it is part of the service. the technology is what we used to scan for malware and viruses. think it affects our users reasonable expectations of privacy or diminishes their rights under the fourth amendment. >> do you care to comment on that? >> not really, i think the opinion was accurately stated. we addressed this in part whether it had to go through a third party. the part that i read addressed that. it does not in and of itself take away the fourth amendment protection. like all good opinions, we try
6:45 am
to limit it to what is before us instead of hypothesizing on every angle. in the opinion itself, we said the type of access given their to nuvox did not eliminate the fourth amendment protection. questioned >> in the front? >> imi law student at boston college. you have talked about the viability of the 180 days distinction. looking more proactive blade, -- looking more proactively, the content distinction that is there which is severely
6:46 am
implicated by conversations about the location data, isn't that a distinction about what can be included as non-content of data? us. vs jones, during the retrial, the judge who heard it said that she was helpless to suppress location data which the prosecution was able to get in through non-content the exceptions. >> on the non-content data, you can find out an awful lot about a person -- how often they go to worship services, whether they
6:47 am
make stops on their way to work, you know, whether they are heavy drinkers. we still have a problem with the non-content issue with regard to privacy. your e-mail titles and subject lines and the to and from and your web searching, that can reveal a great deal about an individual. i think there are challenges there. >> do you want to weigh in? >> there is an obvious point that that distinction has been drawn for quite some time. the supreme court has made it clear there is not a reasonable
6:48 am
expectation of privacy. my other function on this panel is to focus on the implications for law enforcement. that is the building block material for so many investigations. when you are trying to decide if you have enough to go forward with the case against a person, having that information helps to identify that there really is provocation to go forward to the next step. it also helped exonerate people. at an early stage, you can say there really are not connections between that person and bad actors. so we will not investigate that person. if you don't have that information -- there is non- content information and you can think about other records like bank records which are the building blocks for
6:49 am
investigations. if you were to have probable cause you can say there really, it could be cripp. >> many times, you get on lists you never signed up for. i have gotten on lots of lists from lots of people why don't want anything to do with and yet i am constantly getting e-mails from them. if anyone was looking at the tos and fromsd they will seek a lot of e-mails from people i don't care to be associated with. if the government investigate me, how will that look to them? they will think she is really into, i don't know -- jihad direct or whatever. how does that work? >> i have a next-door neighbor involved -- if you have the
6:50 am
misfortune to be involved with the next door neighbor that is involved in criminal activity -- the government does not take action on the prosecution unless there is intentional criminal association. if you're looking at the government taking non-content communication information and putting it into a scene that connection with other people, potential bad actors, the government has to account for the possibility that these are innocent communications. you are right but if you were to take that concern as a reason to deny law enforcement a tool, >> maybe i am not talking about prosecution because there are collateral consequences that happen when you get on the government's radar as being potentially connected to potentially bad actors. whether it is a watch list for a potential immigration consequence, there is a lot of things out there that one might
6:51 am
worry about because of those kinds of connections. it strikes me as being a little bit troubling. >> it is a very real concern. think about what the push has been since 911, to be more intelligence-driven. you connect the dots by getting more of those dots so you can put them together and see patterns and identify threats. the more data you pull together, you might see a datapoint that looks troubling but actually isn't. that is the cost of having an effective intelligence operation. that is what you have strict guidelines and every intelligence agency, oversight, making sure that the operators are thinking about the possibility that not everybody is guilty, not everybody is a
6:52 am
terrorist. >> i would love the fbi to be that painstaking and careful in the context of the program of racial mapping where it has sent people into mosques and other houses of worship to track what is being said and where people's conversations are being put into a file. to the't have to get issue of criminal prosecution to get into the difficulty of the government keeping data about people were you don't have a chance to know what is being said about you, or you don't have a chance to review the inaccurate information and, in an effort to root out terrorism, what we have done is alienate
6:53 am
communities because they are under such surveillance without end. i think this is damaging to a free society where you believe you have a right to worship how you see fit and you believe you have a right to privacy. you believe you have a right to express political beliefs that are not popular. all this stuff has a chilling affect on our ability to participate on a free and open society. i find a lot of the surveillance programs that the government uses to be very troubling. >> most people in the room had to agree through their internet access providers terms of service to allow themselves to
6:54 am
be surveilled. it has made many people in the room start using encryption and store their data were vague and -- where they control the encryption keys. doesn't that make it harder on legitimate law enforcement? >> absolutely, that's a very real concern. law enforcement is doing its best to make sure they have the technical skills to deal with the encryption but it is a problem. it is understandable why and people encourage their communications. it does not mean they are hiding something nefarious but when you have the fbi or any agency that gets email and it is encrypted, it is a challenge. it goes back to the point we're
6:55 am
talking about getting information earlier. >> a question in the back? >> briefly, do you taken issue with any of the four principles that the digital due process coalition state -- has united around? can you put faith in transparency and oversight and accountability? do you think we have enough? what do you think we need in terms of more accountability and transparency to make sure when we trust law enforcement we have reason to make sure they are doing what we think they are doing and not something else? >> let me step back and take a broader perspective.
6:56 am
the patriot act was hardly put in place because it had to be so it is not perfect. then we have the patriot act reauthorization process and fisa you saw a growing recognition that some of these safeguards and processes like the appeals process, the additional oversight from congress and the fisa court, that is a price worth paying. i think the executive branch recognize that it might be painful and burdensome but there is a real benefit for that extra safeguard to be in place because it gives the public confidence that there is a tool that they have been trusted to law enforcement that is being used responsibly. i think you have seen that play out.
6:57 am
i think you saw that in the fisa amendment act. that is just the reality. that is the only way the national security tools will be provided. people have a healthy and understandable skepticism about these tools. i can i give you chapter and verse of which safeguards were put in place but i would imagine that you would hear from the executive branch of willingness to listen to those safeguards as long as they can have a tool they can utilize effectively. and in terms of subscribing to the four principals, i have not committed them to memory. someone could list them for me, i would give you my position. >> we have been fairly focused on the first one, the warrant for content rule.
6:58 am
my recollection is one of the other principals dealt with requests about a number of users in a single request. i don't even recall the fourth one. >> it has to do with raising level of traps for real time. >> i think we have discussed all of them one way or another. >> did anyone else? i will ask you to join me in thanking our panel. [applause] thank you very much for being here.
6:59 am
[captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2013] >> federal reserve chairman ben bernanke will be on capitol hill this morning to deliver the semiannual monetary policy report. live coverage before the senate banking committee will be live on c-span 3 at 10:00 eastern. in a few moments, today's headlines and your calls live on "washington journal." the house of representatives is back in session at 10:00 eastern for general speeches with legislative business at noon. in about 45 minutes, we will focus on the automatic federal budget cuts known as sequestration with loretta sanchez of california. a number of the armed services and homeland services communities. then a republican from wisconsin and a member of the budget committee. at 9:00 eastern, we will look at
84 Views
IN COLLECTIONS
CSPAN Television Archive Television Archive News Search ServiceUploaded by TV Archive on