tv Key Capitol Hill Hearings CSPAN April 15, 2014 12:00am-2:01am EDT
12:00 am
after studying his paintings for 25 years, he's brilliant. >> how do you respond to critics who say you've destroyed their will to live in our society? [laughter] >> i would like to meet them. [laughter] what i'd like to meet them. if i destroyed anybody's will to live in our society, oh man, then you really -- maybe life wasn't for you. [laughter] >> do think we should charge people for health care by the pound? oh, oh boy, that that question. oooh! well, right now? considering what i weigh? yeah.
12:01 am
weigh, it would work out pretty well. no, i don't think we should do that. no. [laughter] no, not by the pound. i only said that because there are so many sad people in the audience. seder. is your passover [laughter] >> i'm coming back. at your passover seder, are you the wise son, the bad son, or the son who is unable to inquire? >> i am the son who didn't make it home. if you know the seder, you know they put out a cup of wine for elijah. there is a seat for elijah and he never shows up. i'm elijah. [laughter] >> elijah is meant to lead people to the messiah, so -- >>
12:02 am
yeah, i'm out looking. [laughter] he's not at the target. [laughter] >> donald trump will be at this day as soon. >> no! >> may 27, if you want to come down. what would you say to him? >> i would say to donald trump, oh, god. i did the thing on donald trump about three years ago on the daily show. i seriouslyof a -- can't remember what it was, but it was nice. it wasn't -- it was mean, it was funny. -- that's what i would -- aboutu, is next having him here. i got a call from his secretary. she called and said donald trump
12:03 am
wants to talk to you after did this thing. i was really busy and my parents are coming to town. i got my assistant to call his assistant and just say [laughter][laughter] , i'm a busy man. and then he called next day. i am a comic and i have too much to do to have a conversation with you. you are an entrepreneur, how can you have time? [laughter] so i said, don't call me again. [laughter] is he coming here to speak? >> right here. , i, no. he has had his time. zip it. when he kept with the birther it is it was like -- no,
12:04 am
self advertising. you are allowing self advertising. i didn't bring my cds here today. [laughter] [applause] >> should the redskins change the name? .> yeah i think they should. [applause] i was born and raised. how sad applause was that? [laughter] everybody else still on the fence -- i don't know. maybe when we get home we will talk about it. [laughter] ishink -- what interesting you are born and raised here. i have been a redskins fan all my life. it is not got any connotation to me, at all. it really means nothing to me. helmet. on the it is been there so long.
12:05 am
but, in terms of the reality of things, you know, everybody in the room knows if it was the --jeweyn julie jews jews, we'd say oh, i think we have to change that. i don't like what dan snyder has done with the team on any level whatsoever. it is one of the most irritating years i've watched in sports. oh, let's pay a hundred million dollars to somebody who's just going to lie down on the bench for three hours. -- areet steven spurrier you kidding? i know steven spurrier is not going to be a good football coach. what the hell do you have for brains? said that hesnyder was going to keep the redskin name. since that's what he wants, i'm
12:06 am
dead set against it. [laughter] [applause] >> should anthony weiner change his name? [laughter] >> no. i is to do a joke about anthony weiner. if you don't have your own joke, then you need to see a doctor. no, anthony weiner is one of the .ew people if summary shames himself in public and the something awful and goes away for three or four years and everybody kind of says well, what did he do. he looks a lot better now. he seems nicer and much more christian than he was before. you usually leave for that amount of time. he didn't care it i believe that anthony weiner could leave forever and it would make no difference. he could leave for 10 years. he comes back and you see that knows, you just go -- oh, there he is again.
12:07 am
>> how did you rate eric holder's backstage impression of you? >> eric holder did a great impression of me. havingually thinking of him do my next two performances. [laughter] just to see if my audience even notices. [laughter] >> what really makes you mad? oh... kind of what i was talking about earlier. stupidity really makes me mad. when you see the words legitimate rape. that sends me around the bend. i don't come back for a day. i'm like a barking dog.
12:08 am
?iterally, how do you even says when you're raped the woman will reject the ... you just go wow? when did they stop teaching science? that stuff, really. is thatlly makes me mad our educational system is 17th in the world. i think that is -- in the course of my lifetime, my generation, to its credit, took the greatest educational system in the world and got it to 17th. i think we can get it to the 25th by the time i dropped dead. [laughter] out to be always set a comedian or a satirist? >> no, i set out to work in the american theater, because my
12:09 am
parents would take me to see plays at what was initially the shubert theater. they would bring in shows thomas i got to see all these really -- i saw shows before they were going to new york and it got me intrigued in it. similar to new york and they would take me to shows. then my father got tired of seeing mainstream stuff, so he takes me at the age of 15 to a thing called the washington theatre club, which was really the first initial outside of arena, a real step forward. eunesco. i stuff by unesc got hooked on it and i wrote plays. i thought i would be a playwright. then i discovered that the fastest way that your plate to be read as if you actually took .our play and put in a bottle
12:10 am
and that if you threw in the potomac river, eventually someone would find it. i was pretty sure that once they got the play out of the bottle, they would read it. [laughter] >> what do you do for fun? >> i call my parents and pretend i'm somebody else. [laughter] just to keep them on their toes. [laughter] i try to read a bit. when i'm in new york i try to spend as much time with my and if i get an, chance to go to a show or watch somebody else work, it is always thrilling to me. i play golf, i wouldn't call it
12:11 am
fun, but your brain doesn't think about anything but stupid things. i don't think about this or that , what am i going to do or what is a joke going to be your, going to talk about that today. , have to remember when i swing i have to remember to breathe in through my house. ass. [laughter] aside from your mother or father, who inspired you as a youth? werece again, my friends really interesting people. they were, at the time. they are all really really funny. here's one for you. my parents were really great. in my youth, they didn't really do anything.
12:12 am
it is not like they hovered over me. where you going now? i would just come home and my mother would say it is nice to see you. now go away. play with people. she did track down who i was playing with and stuff. so, as a result, i was able to .et, unbeknownst to them i don't know why they never looked at it. i think the mayor looked at it. my mother will say i'm lying afterwards. but i got a thing called the realist. it was written by someone called paul krasner. brown paper wrapper like pornography. they wouldn't open it. i would grab it and open it up and it had a huge effect on me, because i was 14 or 15. i won't repeat what was in it. i have written about it in my book. it is one of the things he had that i can't tell you. i opened up the second issue i
12:13 am
-- and there was a map of i'm 15 or 16 and there are all of the disney characters done by a guy from disney, an artist. they are all doing the most perverse things you can imagine. mccue shooting up. -- it reallythen changed. for someone who was born and raised on david crockett, this put everything into perspective. [laughter] that really shook up my world. martin luther king, the marx .rothers --n kennedy in the sense of as a kid, a kid kid. well, he's great. you actually want to hear what
12:14 am
he has to say. oh, boy. that was extraordinary. all those people, there was a sense that you -- fulbright, wayne morris. i have an endless list. carlin, bruce, shelley berman, bob newhart. there are others or you can go to my website. >> thank you for the expensive answer. we are almost out of time. but before asking the last question, we have a couple of housekeeping matters to take care of. first of all, i would like to remind everybody that there are some upcoming events. we are dimensioned them. [laughter] but first, on april 21, next monday whatever herdsman, the outgoing chairman of the national transportation safety ll give her farewell address. on april 23, u.s. air force
12:15 am
chief of staff general mark welsh will discuss the future of the air force heard alsot breakfast. feway 27, as we revealed a minutes ago, donald trump, president of the trump organization, will speak at a luncheon, just like our guest today. next, i would like to present our guest with the traditional .ational press club mug >> oh, i'm going to sell it to my parents. [laughter] >> i'm going to arrange that we give a mug to your parents. [laughter] so don't leave without it. [laughter] we're going to arrange two mugs for your parents. [laughter] last question. let's presume that jon stewart is watching us here on c-span. please explain to him why he, too, should speak at a national press club luncheon. >> he won't do it? >> i don't know. here.n, lewis
12:16 am
let me tell you, you're really going to want to do this. .he pay is unbelievable to think it worked here an hour and i'm getting a hundred $50,000. and access to a really nice condo downtown. it was right across from the verizon center. free tickets to both the caps and the wizards game. by thery meal was comped press club. they give you a credit card, you really, lew. didn't want to do it. it, you'll get a kick out of this. you really will. if you do do it, i need 10%. [laughter] [applause] >> thank you. thank you. thank you so much for coming today.
12:17 am
we have three minutes. >> all right, this is going to be really fast. i really appreciate this. it is a privilege to speak here. i didn't know who i would be speaking to. i still don't know who you are. but i showed up areas i was honored to be here, and also, i the wanted you to know that only other thing i want to mention is the fact that -- i mean this, i did three uso tours. there is a big bill coming from the military. we have a lot to pay for for that war in terms of what those folks went through. you're going to have to pony up. there are no if's, and's or butts about it. i have spent a lot of time with them. they're unbelievable. their sacrifice is extraordinary. if every american had 10% of the
12:18 am
sacrifice of any of those in the military, then we would have no problems in this country today. thanks. [applause] >> thank you. thank you to all for coming today. thank you for those of you watching on c-span for tuning in. i would also like to thank the national press club staff, including the journalism institute and broadcast center for organizing today's event. also, if you like to get a copy of today's program, and maybe there will be a lot of request for copies of today's program, or to get more information about the national press club, please check out our website at w ww. press.org. thank you, we are adjourned. [applause]
12:19 am
12:20 am
investigative reporter dave wedge discussing their book about the attack. here is a look. [video clip] bombing, they had a decision to make. they can either go hiking or to the marathon. whenwere in this position the first bomb went off, bill richard, he knew it was a bomb. a lot of spectators and we have talked to, a lot of first responders thought it could've been a few things. transformer fire, a cannon that was used as part of the the -- a manhole fire as well. bill richard knew it was a bomb. he knew he had to his family away from there as quickly as possible. bill richard jumped the barricade and got onto the street because he thought his family would be much safer on the street than they would on the sidewalk. >> we should clarify. they were at the second bombing.
12:21 am
what happened is they heard the first one and bill reached over the fence and grabbed henry, the oldest boy. and he was a person that was the clear front of bill. as he was pulling henry to safety, he's reaching to his next child which is martin, and that is when the bomb and off. >> is interesting. we have learned that the bombing suspect had chosen that family, and targeted that family. there was an fbi surveillance film that shows him facing a family, going back and forth behind them before he dropped that backpack. ripped the heart of america? you choose an all-american family. that is what he did. martin was still alive after the bombing for a few seconds. the only words he uttered were -- where is jane? jane is his and her sister.
12:22 am
jane was almost torn apart. she lost her leg. her life was saved by first responders. their mother denise suffered severe injuries to her i and other parts of her body. one of the things that we found out in the course of writing this book was that the day of 'se bombing, as martin richard body remained on boylston street because it was part of the crime scene and the fbi would not remove it, his body was lying under a sheet as was the body of lingzi lu. of police were outraged. they want those victims off that street heard they want those victims reunited with their families, wherever they were. one boston police officer said that -- i'm not going to leave this kid. not tonight. i'm going to stay with him. i want his parents to know that he was never left alone. that is heroism.
12:23 am
those are the stories that i said we have learned over the course of the past year, and they still took us up when we recount them. it is incredible. summary people did in the wake of this on for sake of bull tragedy. >> you can see casey sherman and dave wedge discussed her book, "boston strong" on tuesday at 8:00 p.m. eastern. on tuesday. recess,e senate is in c-span2 features book tv in prime time. tuesday, a look at books on human intelligence. first, elizabeth colbert, author of the sixth extinction, and unnatural history. artificial intelligence and the end of the human era. the future of the mind. the scientific quest to empowernd, enhance, and
12:24 am
the mind. book tv on c-span2, all this at 8:00 p.m. eastern. edison was a plant scientist as well as his interest in the other sciences. the story is that he knew that it didn't freeze in fort myers, so a lot of the interest he had in this area were based on his love of plants. 1920's, the united states was relying on foreign rubber. we were headed into war. thehat point, they decided plant material and the process should be done in this country. edison, ford, and firestone are traveling all around the world collecting plants. in fact, they had hundreds of thousands of people around this country collecting plants and sending them back here to fort myers, to his laboratory, to find a source of plant material
12:25 am
that could produce rubber efficiently, effectively, commercially. so, the laboratory was put here because of that reason. because it could grow the plants here on site and to do the preliminary research on site. it is a really exciting project. the laboratory was interesting for many reasons. one of them was, at that point in american history, there is no ,atent process for plant chemical patenting. part of the reason this lab is so important was that it cost the u.s. government to come forward with what was called the u.s. patent law, which said that if you invented something that plants and it was a process that was worthy of patenting, it was issued a patent. this weekend, but to be at american history tv take a look at the history and literary life of fort myers, florida, including a stop at thomas edison's botanical research laboratory, saturday at noon
12:26 am
eastern on c-span two. sunday at 2:00 on c-span3. the 2014 pulitzer prize for public service was awarded today andhe guardian u.s. washington post newspaper for articles by martin gelman and others on the nsa's secret surveillance programs revealed by edward snowden. data a discussion on nsa collection and surveillance, with former cia and nsa director michael hayden. from the american university in washington dc, this is two hours. >> we are really privilege to have two people who know the nsa extremely well, from different perspectives. general michael hayden is a retired four-star general who served as the director of both the cia and nsa, among many
12:27 am
other illustrious appointments in his nearly 40 year career of public service. he was appointed director of the nsa by president bill clinton and served 1999-2005. after his tenure at the nsa, general hayden went on to serve as the country's first principle deputy director of national intelligence, the highest-ranking intelligence officer in the armed forces. may 2000 six, president george w. bush appointed him director of the cia, and he served there until 2009. he is a frequent commentator at many major news outlets, as well as having been a foreign-policy adviser to mitt romney's 2012 presidential campaign. he is currently a principal of the chertoff group, a distinguished visiting professor at george mason university. barton gelman is a two-time pulitzer prize winning journalist and lead reporter on disclosuresen's nsa
12:28 am
at the washington post. he has actually met snowden several times. >> in person wants. spent 20 one years on the staff of the washington post and has won numerous awards, which i will mention only a few. his first pulitzer was awarded in 2002 for reporting on the september 11 attacks. the second pullets are was awarded to him in 2008 for a series on dick cheney's vice presidency that went on to become the basis of his best-selling book. that book won the los angeles ames book rise and was named new york times best book of 2008. today he is a senior fellow at the century foundation and lecturer and author in residence at princeton's woodrow wilson school. he returned to the post temporarily in 2013 after receiving various nsa documents
12:29 am
from edward snowden. with his colleagues he has broken stories about many of the things that we are going to be discussing tonight. you joind like to have me in welcoming our distinguished speakers and a national audience of c-span. [applause] [captions copyright national cable satellite corp. 2014] [captioning performed by national captioning institute] to haveoing conversation amongst ourselves for the first hour or so, and then we will open it up to questions from you all. there are two microphones, i see one in the middle and one on the side over there. it seems to me that all of the on the nsa questions and privacy rotate around
12:30 am
balancing security and privacy. how have we done it so far? how should we do it? there is a further question of what privacy even means in a digital age. where every time you go to the store or use your easy pass, people are keeping track of you, let alone every time you use an e-mail on massive accounts. to make an informed judgment about the nsa programs, we have to know what they are. i want to spend a lot of the our talkingour about what those particular programs are, how they work, etc. but first, since we are hosting a political theory institute, i would like to start by asking a few normative questions around which i think all the others will revolve. i will askant to do, my first question to each of you
12:31 am
now, so you will have a few seconds to think while i'm asking the other. have tohat right do you publish secrets determined to be such by our duly constituted political authorities? how can you justify supplanting your own judgment for that of the people's government? and for general hayden, there is a parallel question. what right does the nsa or any other governmental body have to keep secrets in the first place? democracy is based on consent them and if we the people don't know what you are doing, doesn't that necessarily undermine democracy? >> i'm going to give an answer that starts with the proposition that my history and politics grades are no longer subject to change.
12:32 am
i will give a little bit of a theoretical or structural answer to that question. the structureith of self-government in a democracy. if the government is working for us, it is usually thought to have two elements, authorization and accountability. you get to be in charge for a while, and then we hold them accountable for their performance, not only for purposes of reelection but , civilout a constant society, political conversation in which the people get their say through a variety of mechanisms between elections. to me, the principal conflict here may not be between security and privacy. that is an important set of questions, but to me, it is between self-government and self-defense. both of which are core values. in fact they are both touched on by the time you get through the preamble to our constitution.
12:33 am
defense is fourth among the six principle purposes of the creation of this form of government. the first words are "we the people." secrets that are important to keep inherently for purposes of protecting ourselves. but information is essential to govern ourselves. have in mind is that nobody gets to maximize one interest or the other. they have to be balanced. it would be cleaner and neater if you had a model in which there was some trustworthy principal balance or who could do that balance for you, but there is not. i'm not elected. i'm not accountable to the people for decisions i make about what to publish. but it is also the case that for the president and everyone working for him, they are not competent to decide what we need
12:34 am
to know in order to hold them accountable. we cannot give them that power. we know information is power. secretly, the power to withhold an oscar information is a very great power, especially when combined with surveillance. -- the power to withhold and obscure information. we become more transparent and they become more and more opiate with the growth of secrecy that surrounds it. so the somewhat unsatisfactory answer we are left with, and i can go into this at much greater length, once you rule out all the other possibilities, is that there has to be a process of competition in which governments try to keep secrets, sometimes for good reasons and sometimes not. is nobody who works in the intelligence field -- and mike would agree with this -- that would not accept that there is
12:35 am
this massive overclassification. there are all kinds of things that -- things that are staying need to be. that. we can get into examples of that if you like. the ideas the government tries to keep secrets and would try to find them out. i guess i will just put it this way. there are trade-offs. we have studied one society very closely which maximized either security or the entrenchment of the state authority against all other interests. in thewas a tourist soviet union, and moscow in 1984, i was getting lost all the time. it turned out that they deliberately drew the tourist maps incorrectly, because in
12:36 am
case napoleon came by, he would take a wrong turn. it's not literally irrational to say were going to publish and in accurate map. principle ison in useful to the enemy. but that is not the model we have. tomorrow we have is not -- for example, jfk in his inaugural speech saying we will pay no rice, we will bear no burden to secure the blessings of liberty. we are prepared to accept some risk in order to govern ourselves. i find something out, or i get a , and i now documents know secrets that i'm not supposed to know, according to the government. is a cooperative process in which i then go and talk to people, like mike hayden when he held that old job.
12:37 am
every journalist covering this stuff with holes a great deal if the public interest of the subject is outweighed by the danger of disclosure. and i agree on an awful lot of this question. the most important agreement is that this is a conflict of values. of lightot the forces versus the forces of darkness. these are the things that free peoples have to balance all the time. frankly, where that line is is dependent on the totality of the situation in which we find ourselves. that line can move back and forth, depending on realities. when my public affairs officer or someone else would be aware that someone in bart's profession would have a story we felt really problematic, they outd come to me and lay it
12:38 am
and i would say all right, and i generally would call the editor. the callary would make and generally speaking, the editor would take the call from the director of the cia. the editor would come on the line, i really want to thank you for taking the call, and invariably, i would then begin the conversation with look, we both have responsibilities for the welfare and safety of this republic, but how you are about to exercise your responsibility, i believe, is going to make it much harder for me to exercise mind. so we really do need to talk. and we would have that dialogue that barth suggests. this is really tricky. he's got to have freedom of the press. there is a reason that is in the first amendment. on the other hand, the government has legitimate secrets.
12:39 am
human beings in government will make decisions that perhaps are less noble than we all want to be. as barth also suggests, when the post or the times the classifies information on their judgment, they are performing an inherently governmental act without the system of checks and balances and responsibility that normally go over here on this side of the equation. this is getting much, much more complicated in our society. bart mentioned the old question of accountability and how do you hold a government accountable without a great deal of transparency? arcme walk you through the of american history when it comes to american espionage. the american intelligence community isn't the only one that keeps secrets. the federal reserve -- they keep secrets.
12:40 am
there are a lot of organs of government where the general welfare is improved by the government being closed and secret. at the beginning of the republic, and in most western still, this espionage thing is pretty much contained in the executive branch. george washington was the nation's first spymaster. president after running the spy ring for the continental army him he insisted on a secret overt action budget. with very little, if any, congressional oversight. so espionage has generally been viewed as being a province of the executive, and the way the nation changed espionage policy was changed the executive. by the mid-1970's, there was broad agreement after the church commission that having this
12:41 am
responsibility, this knowledge, this oversight only within the executive branch was insufficient. and the great compromise of the 1970's was to create two bodies in congress and a rather unusual court to spread this transparency and accountability over all three branches of government. so we end up with the house permanent select committee and , andenate select committee by intelligence we end up with the fisa court. the theory was that that was sufficient transparency to legitimately get consent of the representative democracy. after all, this isn't ancient athens. that consensus in the grand compromise of the 1970's was adequate, has eroded. thesure we will talk about 215 program here very soon, and people are going to say wait a minute, has been authorized by two presidents, the congress
12:42 am
legislated it, it is the madisonian trifecta. we've got all three branches of government. and great swing in american popular culture right now, and i'm not just talking about out here on the wings, i mean sustained among thoughtful people, is that that no longer constitutes sufficient consent of the governed. feinstein, mike rogers, dutch ruppersberger, but you didn't tell me. we are kind of at that cusp in our political culture. i was director of the cia and i had a wonderful team of outside civilians. one guy got permission to use gave her a tough job. another subcommittee was doing i.t. and another doing recruiting. tough job.y a
12:43 am
study this problem and come out and tell me, will america be able to conduct espionage in the future inside a broader political culture that everyday demands for transparency and more public accountability from every aspect of national life? the study of for about four months and came back and gave me a firm, hardly speaking "we are not sure." which is a very telling answer. so here we are. with the national enterprise that i'm just going to assume we all believe is legitimate and necessary, american espionage, and a broader political culture that demands more transparency of an enterprise content demand secrecy for its very nature and its very success. that is white is why did now so difficult for all of us. , generaling up, bart hayden described what you are
12:44 am
doing or the release of this information as being inherently governmental function. into all the various checks that exist on the nsa and whether they work or not. but when you get that information, i guess there is no checks on you as a reporter, or are there? what is the process you go this fell determining on my lap, should i make it public or not? >> are there checks and what is the process? some of the same checks on us, not -- the defective checks are not so different than they are on the government itself, which is to say that a lot of what the government does or does not do is not because it doesn't have the power according to some
12:45 am
legal interpretation of the words on the page, but because it believes that there would be great public consequences, that public opinion would not support that. they would suffer reputational damage or political harm. nobody wants to be responsible for some terrible thing happening if we publish story x and the next day there are 10 people strung up in the square of some foreign country because we disclose their identities. at would be a really bad thing for the washington post, in addition to being a bad thing for the country. so there are checks there. the process is as follows. checks point, for any of the nsa stories that you have run, are you aware of any that consequences -- bad consequences? >> there is a bit of a
12:46 am
conundrum, which is to say that the secret has built and the washington post has published something. suppose you're inside the intelligence community and you know very specifically what some consequence was. his closing that knowledge itself, there are constraints from telling you about it. there areer hand, consequences that we would know about. that jameshe case clapper, the director of national intelligence, in a closed-door briefing used language quite different from what he usually said in public, that they went back and did a study and they found that over the years, there have been breaches and secrets lots of sometimes in the context of new stories or a foreign service disclosing something, or sometimes presidents disclose really sensitive secrets because they have a political reason for
12:47 am
doing so. for example, when ronald reagan played a recording or quoted a recording of a conversation that took place in libya in order to persuade european allies to allow american planes to fly over their airspace so they could bomb libya. he wanted to prove that we had , and very much against the recommendations of the intelligence community, he revealed that capability. they do a study, what is the damage assessment? clapper said that the damage assessments totally overestimate damage. it is not unnatural or abnormal for the nsa to gain and lose capabilities. technology is changing all the time. the channel that is working to listen in on a target stops working tomorrow because microsoft changes their network architecture, or the other country chooses a different vendor, or the target gets tired of that and switches to a
12:48 am
different company or whatever. or targets are trying to practiced mutation security, so they switch some things. the other thing that clapper said is that people will change their behavior, but they will make mistakes, and we will exploit them. the nsa is not in immediate danger of losing its global preeminence in signals intelligence. possible that it is that some of the stories published by some of these organizations sooner or later will have degraded the ability to listen in on something. and prepared to accept that i believe that you should be prepared to accept that, because at the same time, we are finding out things that have been doing that are completely contrary to what the public understanding was of what their job is and how they do it.
12:49 am
if there is a program going on and the executive branch has blessed it and a select few people in congress have blessed it and the fisa court has blessed it, then when it becomes public american people are shocked by it, and many people are angry about it, and they start telling members of congress and they start introducing bills to stop it, and it gets brought to federal court in the first federal judge to assess its constitutionality says it is orwellian and very theny unconstitutional, there is another way to tell the story of whether we had already considered as a society to this happening. i will stop there. >> general hayden, i know you're not not in government now, but are you aware of specific negative consequences from any of the nsa stories? >> no, i'm not in government, so
12:50 am
i don't know. >> are you being briefed on it? i do not go to get updated. >> if i knew this was outdated information, i would have chosen someone else. [laughter] >> there are three tiers of damage. one is operational. if i were in government, let me rephrase the question you just asked me. would you give me a list of all the communications you did not intercept yesterday? that is really the question you want me to give you the answer to. well, i don't know. thatee with bart intelligence is constantly moving. have penetration, you just whatever, youext don't have penetration anymore.
12:51 am
with encryption, you don't have that frequency anymore. just because people who build a communication path have a smarter way to spend a buck. we have simply accelerated the rate at which we will lose our current accesses. is notind, that arguable. that is one level. will remove cover it? sure. $10 billion in order to recoup. the second level of loss is -- let me just take with that for a minute. point thata good these things have informed the necessary national debate. have done more than inform. they have also misshaped. i know are going to dwell on 215. work, hisot bart's
12:52 am
flagship piece on this was 702. door withhed out the an incredibly detailed coverage of the front and, which is they got all your phone records. only over a period of several weeks did the back end story again to get out there into the public domain. so what is it they do with them once they have them? people let nsa would make the evenent you may disagree after you've gotten the back end story, but you really can't make an informed judgment until you have the whole context. i saw a recent poll that said over 30% of americans, because of the way this has been portrayed, over 30% of americans inc. the 215 program allows nsa to listen to the content of your phone calls.
12:53 am
operational loss. second losses in relation to foreign governments. the i'm not talking about admiral being really upset. -- about angela merkel being really upset. any other intelligence service around the world to whom we would go to for help and amount -- a matter of great sensitivity and a matter that would require great discretion, in which we say this is lawful, a little politically edgy, but it is the right thing to do for both our countries. come on, let's cooperate. we can keep a secret. there isn't another intelligence service in the world i should take that last sentence to the bank. fundamentally been eroded by
12:54 am
foreign intelligence services having no faith in our ability to keep things where they ought to be. the third level of damage has to do with american industry, who has been unfairly pilloried by this whole thing. you have young mr. zuckerberg calling the president and complaining about how his company is being treated in the global digital domain. american companies do nothing more for the united states than other countries do for their sovereigns around the world. microsoft, at&t, etc. do the same thing that deutsche telekom does for german security services, etc., etc. but it's only american information that has been put out there, it has been put out there in a way that suggests, almost eclairs, that only the americans are doing this. you thatuggest to practically the entire continent
12:55 am
of europe, including their elected representatives, now know more about american signals intelligence than they do about their own countries signals intelligence. balanceds not a discussion. >> there are lots of things that america might want to be for global preeminence on, but i don't think one of them is going to be that we are the most closed government and we are the best at keeping secrets. and we don't need it, because our security, we actually have a luxurybit of room, the of allowing democrat debate over bequest in slight should the nsa be collecting all of the records of all the calls that you and i make, are taking it out of the context of section 215, court authorize telephone program, what do we think about something
12:56 am
that is new that the nsa never did in its history on anything remotely like this scale, because the capabilities did not exist. and has takennts many steps to achieve a kind of comprehensive situational awareness of the world. it wants to be able to collect every electron and photon that passes over communications channels in case they might be needed. , althoughust metadata i think that is enormously important for privacy. it's also what they do overseas. the debate has been channeled somewhat deliberately in the current political context for the dutch torry kinds of surveillance. -- for the statutory kinds of surveillance. act,on 215 of the patriot
12:57 am
they collect all your call records. overseas they are not bound by statute, supervised at all by the intelligence community or court including the intelligence court. the operate solely under authority of a presidential executive order. since we had a little bit of a historical suite before about the 1970's, that me give you an additional point of view on that. 1970's, after a bunch of gross abuses that today's programs don't at all resemble, there was a deliberate misuse of surveillance for domestic, political, corrupt purposes. they created the structure of oversight in the foreign intelligence surveillance act. the idea was you can do what you like overseas, spy on the
12:58 am
foreigners, but you cannot do it at home. and you cannot do it from u.s. territories. so around the time that general , then became nsa director u.s. government started making the argument and executive started making the argument to congress, you need to change this because the structure of global telecommunications has --nged fundamental and he fundamentally. it's not american phone calls or e-mails, is just the nature of the distributed networks that you could be in germany and calling brazil and the call passes and transits through the united states, for example. so we need you to take the leash off. we need to have a lot more freedom to spy from u.s. territories. what they didn't say, and
12:59 am
congress change that law. what congress did not address is that lots of u.s. communications foreignfloating across services. if you're sitting here in washington and you send an e-mail to cleveland, it is literally quite possible unlikely that your e-mail is or a dataross ireland center in hong kong. the global internet balances its load by distributing in microseconds the communications flow and the path of everywhere.ns where it is allowed to resume people it is intercepting our foreign, it does things like this. the nsa with its british counterpart is breaking into the privately owned links that google has between its many data centers around the world. so a data center in hong kong,
1:00 am
one in latin america, they have private it is intercepting our foreign, it does things like this. the fiber that links them directly. nsa was breaking into that and intercepting the traffic that went through them, which is to say ultimately is able to reassemble the entire contents of the data center if it wants to. googling yahoo! won't say what percentage of their users are americans. let's say it is half or one third. you are talking about ultimately not only the metadata but also the content of hundreds of millions of people that are crossing into these flows that the u.s. feels free to dip into. is legal term for that incidental flexion. happens, incidentally, foreseeably, but not your actual purpose, is getting a lot of americans with it. once you have them in your , as wastank acknowledged in writing, the nsa
1:01 am
feels free to search through it in its own data repositories. if i say to you collectively in this room that i have a foreign target, i'm just going to collect everybody smart phone and download everything from it, all your appointments, all your the littlees, all confidence as you have exchanged with one another, your bank records, and i promise not to look at it unless i have a really good reason, and it turns out that two thirds or one third of you are americans, turns out that was incidental. it's perfectly legal, and you should be fine. it is not surveillance unless we're doing something with it. don't try that argument if you want to download movies. i have three terabytes of pirated movies and music on my hard drive, but i haven't
1:02 am
listened to them yet, so it doesn't count. that's not our ordinary understanding either of the law or of what it means to be understood violence. what snowden allowed us to do is say are we ok with that? in the clapper letter that reveal this, he pointed out that the committee actually debated whether or not they want to reauthorize the mystic approach, and they agreed that it had. so we are not putting the cart on the bottom of the deck here. it was known and consciously, specifically debated in committee whether or not that should continue.
1:03 am
what we used to call reverse targeting. , but don't think this was a renegade nsa. i'll try to be really efficient about this. an awful lot of these snowden regulations are pretty things out there, i frankly think some of them are mischaracterized or in accurately characterized. this is really complicated stuff. >> i would be over polite about sitting up there on the stage. --think a lot of the story >> you cannot entirely blame him because he only knows what he has been given.
1:04 am
[laughter] >> all right, then it is your fault. >> i'm given a piece of paper. i don't assume that it is authentic or that the facts contained therein are accurate. it turns out there are authentic documents in the world that are wrong. >> i used to get some of those pubic >> i and my colleagues do a lot of reporting around the material. a lot of the reporting, certainly a big part of it is to talk to the peoples who are the stakeholders in government who are running the program. mystic is the story the washington post wrote a couple of weeks ago and said the u.s. is intercepting and recording all of the telephone calls of an entire foreign country. they goillions of calls into this 30 day holding tank, millions get sent back to fort
1:05 am
process inast gordon their repositories. >> it's got to be a little country, right? >> we did not name the country and we did not give any hints about the country. we had already decided before we went to the u.s. government that -- i've gotgoing to to sort of hold things back from you. i've always done that from time to time in stories over the years. i could give some examples of that, but here it happens all the time. even dow yetaded talking to the u.s. government, that there were specific, concrete, foreseeable harms that would come from naming the country or saying what kind of country it was what kind of intelligence targets required this approach. raises can say is, this a big public policy question.
1:06 am
if you live in that country or work in that country or you have relatives or friends in that thei y and you make calls re, that your call is recorded. so now they are not just collecting metadata, they are collecting content. let's say they are recording your words and they feel free to keep whichever ones they want and search whichever ones they want because it was incidentally collected in the course of surveilling a foreign country. that is not something the nsa could ever have done before in recent years. it is a capability that the nsa did without and kept us safe throughout the cold war, and it is as the general says quite energy and worthy of debate. edgy and worthy
1:07 am
of debate. there is one last point to be made about oversight. of the fisadge court, the foreign intelligence surveillance court, said in his first ever interview with any news organization that the court nsa orothing unless the the u.s. government tells it. it doesn't have any independent fact-finding ability, that it cannot go out and invest gate. it doesn't have a former nsa that. like when the court found in 2009 at the nsa had been unlawfully running wannabes big row graham and had been consistently misrepresenting the facts of what it was doing to the court, the nsa response to the justice department was, you could make fun of it as these computers are so darn complicated.
1:08 am
the upshot of it was there was no one at the nsa fully understood the workings of the program and therefore was inadvertent that they were describing it incorrectly to the judge. so when you're saying a judge is is -- supervising it or that congress is overseeing in, the nsa is classifying almost all of the top-secret codeword level. there are fewer than 10% of members of congress who have a staff member cleared to read anything at that level. members of congress do not go into a 10,000 page intelligence studied danceand hearings and reports. they just don't. them don't get to talk to a staff member who is cleared to read what they are talking about. inthe level of supervision
1:09 am
some cases is pretty theoretical. >> i am falling way behind on my accusation countering count, so my turn. >> as i was saying, bart does this have to well and half of the time. even the best of folks are going to get some of this wrong. said, the nsa is so complicated it is hard to explain. not everyone is as conscientious on reporting these stories. a lot of people take the stories and run as quickly as they can to the darkest corner of the room. let's put that aside. let's just say that we can reduce all the stories that are out there to hard-core facts, that we have pulled a hyperbole and the misrepresentation out, and we can get it done. i'm not even going to argue about that's not what we're are doing. let's assume we can all get it there. you realize you're coming in late in the third real of a
1:10 am
complex movie and you are looking at the third reel. i'm assuming we have all the chaff out of the way. you're looking at the third reel and making the decision, i know the butler did it. and you really cannot make that decision until you walk back to the first real, and where did these things come from? our they developed? -- why were they developed? i'll try to be very efficient about this. i became director of nsa in 1999. we were being overwhelmed by the volume of modern communications. we were approaching communications away we had approached all of our previous life going after communications, which was burrowed down, get the right frequency and listen to the very specifically targeted call. now there we were with a tsunami of global data flying at us in a
1:11 am
way that was beyond our ability to control. you are all pretty young, you don't know what it was like communicating in 1999. before 9/11 that the only way we could deal with light pushing back a tsunami wave and saying let's try harder to keep the way from engulfing us. and swimd turn around with the wave and make the power of the wave your tool. collection and metadata. that is why we did it, it was in response to very specific challenge that if we had not dealt with, we would have gone deaf. two,ology change number the nsa spent most of his time watching the soviet union. there was not anyone regardless of your political or suasion
1:12 am
that was going to raise that much of a finger in civil liberty concerns, with communications coming out of , in soviet siberia while we are looking for interesting words to pop up on the net like "launch." of 21st century equivalent that isolated signal on a dedicated network being run by an oligarchic superpower, the 21st century movement of that signal are proliferator, terrorist, money laundering, child trafficker, narcotraffickers, etc. e-mails coexisting with your single, unified, global communication structure. there is no way nsa continues to do what it used to do for you if it cannot go out there and be in
1:13 am
the flow where your communications and mine are cold legitimately targeted communications. that is just the reality. the third change, and bart mentioned this already, that is the fact that the global communications grid changed in such a way that most global communication either resided or transited the united states just because of american dominance in global telecommunications. yet without the fisa amendment and you go from a bad man in pakistan to another batman in yemen, -- another bad man in , i don't think it was the intent of the founders and that is why the change in the fisa act.
1:14 am
the fact that the enemy was inside the gate, and that legitimate foreign intelligence targets were here in america. there was the joint inquiry commission that was made up of both the house and senate intelligence committees. one of their findings was that nsa, that would be my nsa, the one i was running before 9/11, was entirely too cautious in dealing with the al qaeda communications, and that would be al qaeda communications, one end of which was in this country. and the metadata program was , frankly, the lightest possible touch we could devise to know which of those communications entering or leaving this land would be the ones we want to go down -- drill down on for content collection. after having seen the whole movie now, you may still be
1:15 am
pretty confident the butler did it. you may still have kept any or all of those four things i just suggested, but they did not develop out of an nsa director like me or keith alexander, acting like mr. burns on the simpsons going "excellent." i've been waiting to do this for decades. they were logical responses to technological and operational challenges. >> picture life as a triangle for the subject. there are three sides of a triangle. a happy triangle is an equilateral triangle. it is in harmony. and the three sides are threat, technology, law, and policy. you got it? what you want is that if is responsive to the threat and used within the confines of agreed law and policy.
1:16 am
those three things never changed at the same rate. but they are changing at amazingly different rates today. and the problem that bart points out in his writing, and one that i will freely admit is that the other two sides change must faster than law and policy that -- the equilateral tribal turns into a violent looking isosceles thing because these things have areged while law and policy still struggling to catch up. that is kind of where we are in the debate. got a little bit lost with the triangles. >> i could do it again. i actually want to come back to the question and the point he has not yet actually supported, areh is the idea that we
1:17 am
getting it wrong a lot are we are getting out of context. that is certainly possible. it is possible there are things we don't know or that we are mischaracterizing something. there was one quite good story, i thought, that we were getting ready to publish and i was persuaded that it was wrong. i'm talking to sources and i'm talking to the government and i have very specific reasons -- i received very specific reasons to believe that i had the context entirely wrong and we simply killed the story. but what we are actually doing is trying to said light on the subject. we are trying to get it all the way that is not the case when it comes to the public debate on the part of the government. the government wants to keep the secrets and in a few outlying cases, people come out and say flatly false things to the public. ofryone knows about example director clapper and the question about whether the nsa
1:18 am
collects any kind of data at all about tens of millions of americans, and he said no. but much more often, there is this radically is leading information. information is provided that if a friend or family member did that to you, you would consider them to have betrayed you. to have deliberately lead you down the wrong path. here is an example. the collection of all the call records, it does keep coming back to that and not the overseas collection. for a long time, the government said we won't tell you at all hammy times we have used this power to collect business records. it would do great harm to the security of the united states if we told you the number of times we used it.
1:19 am
then congress passed a law requiring them to disclose how many times they used it. so they came out one year and said it turns out there's nothing to worry about. was 2009. they said we have only used it 24 times last year. don't worry about it. it turned was 2009. they needed for quarterly applications of this power to get trillions of records. large be that it is a fraction monopoly entirety of it. 24, it turns out it is trillions of records. they needed they say we only take it when it is relevant to a terrorist investigation. it turns out their meaning of the word relevant is all of them. everyone of them could possibly be relevant.
1:20 am
if they had been straight with the american people and said we would like to be able to collect all the call records and we will regulate our use of them as follows, if they had done that around the time they actually started collecting them, soon if they hador even done it in 2007, they might well have won public support for it. that they are doing it behind our back, and the highly misleading statements about it have led to a considerable degree of shock when people find out what they are doing. >> i would like to go systematically through a few things that we both referred to a few times. or five just take three minutes on each of the three things. first the fisa courts and how that works, second the 215 program, and third am the 702. starting with the fisa courts. my understanding that they were created in the 1970's, coming out of a recommendation which uncovered all sorts of abuses in
1:21 am
the american intelligence program before that. the spying on martin luther king and all of that. to prevent that, they said they're going to create this work -- the special fisa court. how exactly does the fisa court work? can someone who is an intern or relatively young person like edward snowden or one of the american university students who are interning at nsa or cia, can they send an e-mail to the fisa court and say hey, i would like some data on this person? what is the process to have a fisa request? how is the request made and what is the process? said aboutt thing the fisa court is incredibly odd. it exists. only western democracy that takes these questions to the third branch of government. other countries, last time i checked that were democratic,
1:22 am
like the united kingdom, issued these warrants within the ministries. it is a grand american experiment to involve the third branch of government and what is ofentially -- an exercise executive prerogative in terms of conducting espionage. what is unusual is that we do it this way. in order to do it this way, we put certain restrictions on this court because it cannot nearly be as open as other courts in our system. first of all it is not adversarial. on the other hand, tony soprano doesn't get a longer when the fbi comes up with a warrant on him. unfortunately, when we set up the fisa court, we used the useuage of law which we warrants in criminal proceedings inorder to go up on wiretaps fbi and other investigations. there is a sharp distinction often made in the public
1:23 am
discourse about this. there's an incredibly sharp distinction between doing surveillance for law enforcement and for foreign intelligence purposes. i read commentary very often of suspicionless surveillance. that word has absolutely no meaning to me as a foreign intelligence officer. onon't collect information foreign nationals because they are bad. on foreignnformation nationals because they are interesting. i collect information on foreign nationals because their thatnications contain data will keep americans more free and more safe. they do not have to be bad people. do not confuse the two. so now the court is designed to warn collection against protected persons. believe thatn to c is now the agent of a
1:24 am
foreign power. >> by protected persons you mean americans? >> no, american citizens anywhere in the world and anyone in the united states, including diplomats. themder to collect against from foreign intelligence purposes requires a warrant. in addition, because the two-year cheese of the way the iw was written -- remember told you it echoed the law enforcement statute? it put specific restrictions on collecting on a wire in the united states that do not exist for collecting on the air in the united states. >> when you want a warrant on a protected person, what do you have to give to the fisa court? >> the fisa court gets a request for warrant that looks like about the size of a phone book the city the size of cincinnati.
1:25 am
it's about that take. it is heavily laden with a lot of legal jargon. it is not all boilerplate. it requires a great deal of .pecifics you're trying to prove to the judge that the individual you want to target is the agent of a foreign power. --ecall in one instance that's what it was. >> it changed under the patriot act, which is a lot older. >> and the protect america act which came between the two. describing this old model that is irrelevant to every single story that has been written request that is not true, bart. you also need the courts permission because of the peculiarities of the way the law was written. >> the big packet of information you were talking about, is that
1:26 am
submitted by anybody at nsa or cia or department of justice? >> it will be crafted at the agency that wants the coverage. it will go through a whole series of your craddick stops. it ends up that the department of justice. >> one of the things that we hear about the courts is that they have approved almost every request that they have had. this gives the impression that it is a rubberstamp. it is an irrelevant process. not happyjudge is with the fisa application, it is withdrawn and redone. all right? no one who has been through the process would describe it as a rubberstamp. >> is this your understanding of > fisa process?
1:27 am
>> everything that mike is talking about still happens. that is not the stuff that people are writing stories about and what the public is debating. the old model for specific targets. we have something short of probable cause. we have reason to think that this person is not -- it used to be that they have to be an agent of a foreign power. now, it has to be relevant to the investigation of a foreign power and they have to demonstrate relevance. they want your records and my 2s.rds in 1s and theet's make that shift to
1:28 am
215 program. >> ok. there are four kinds of data. george bush ordered michael hayden to start collecting these after 9/11 without the benefit of a statute or court supervision for several years. until the justice department rebelled and people were about to resign because they deemed parts of the government to be illegal. this is the famous "warrantless surveillance. " of 2005. there is metadata. it is who talks to who when and what equipment they are using. there is content. they were collecting metadata and content for telephone and internet communications.
1:29 am
chats, documents you have stored in a cloud, video, the entire universe of content that travels the internet and the telephony is your phone calls. what happened after the justice department rebellion and some public knowledge began to lead the debate, the fisa court was asked to switch gears and did switch gears. they were issuing warrants for individuals and asked to authorize on a quarterly or annual basis huge programs of surveillance. the court would now say, once a year, that you may collect anything that you like from google, yahoo!, microsoft, provided that you certify that
1:30 am
it fits targeting rules and it is treated and handled to minimization procedures that are intended to protect the privacy of u.s. persons, consistent with the operational needs. there is some protection. i will not deny that. is as airtight as one may be led to believe. in any case, the court has a authority.h standing you do not have to tell me the names. you do not tell the court the names of any of the people that they are collecting. to know, there is not going be an individual work for that person. it used to be that, in the intelligence world, it was not wrongdoing necessarily. there had to be a specific showing that the individual is likely to be a valid foreign surveillance target. that is gone now. andfisa court has accepted nobodyeted the law that
1:31 am
in the public and, frankly, anyone in the unclassified world who studied this closely, and i count myself among them. several chapters of my last book was about this. i never suspected that the executive branch had told the court and the court had agreed that electing every single person's call records was a definition of relevant to a investigation. >> the description of what went on under the terrorist surveillance program when i was director of nsa is not accurate. that is about all i can say about that. ands right about the court the executive branch going to the court from lawrence that were brought, generalized towards, rather than specific targeted warrant against individuals.
1:32 am
the fisa act put restrictions on who you can target and the techniques of targeting inside the united states. most, if not all, of the generalized warrant's that are rants described -- wara that are being described are in the united states. we approach the court for approval. ss was createde geography. the nsa has procedures to minimize -- protect u.s. privacy. your question was, why metadata? so, the first warrant is in 2002
1:33 am
. the chief judge of the fisa court. it allows us to resume things that were the subject of heated previousns only the march. we did it by not relying on the presidential power to conduct foreign intelligence but, by involving an additional branch of government, the digital branch.-- the judicial it met the reasonableness standard of the fourth amendment. you and i are not protected against all searches. you and i are protected against unreasonable searches. the best way to do this within the constitutional structure was to go to a court that is familiar with surveillance and ask that question of a judge. in this case, the judge did issue a warrant. >> basically, the collection of
1:34 am
metadata is the collection of all the phone call records. the nsa would store this in their warehouses. all of these records. they would not access or read them, except when they had process from a fisa judge. but no. under section 215, the one we are talking about, after snowden but before the president's changes, these it nsa, under the fisa court, get metadata. those records that you have shared with the phone company. they do not belong to you. the nsa get these records. you are not identified. this number call that number at
1:35 am
that time for that long. and, you know, how many phone calls do 350 million people make in a day. you get the idea of how much data is coming in. actually, what was happening was, this program was set up one most people are making phone calls through land lines. it is much more difficult and .egally complex people want to wireless communication. it was difficult to get the same information in. as time went by, the percentage of american phone calls it showed up on a daily basis in the database was shrinking to about 25%. -- database is sailed off sealed off. they can only be approached by 200 people in the nsa.
1:36 am
the machines that they use are keystroke-monitor. take almost always, foreign number that shows up in yemen. we find literature on an individual that shows that he has affiliations with our qaeda and has a cell phone. we go and ask if the phone number shows up in their full -- in there. says, ine in the bronx talked to that guy once a week, the nsa asks that phone number in the bronx who they talk to. that is it. the change that is made is that they used to do three hops. next one. go to the the president made it to hops --
1:37 am
two hops. he said the nsa has to go to the court every time they make the query was up this -- query. this is unusual. keep in mind what the court is judging. not are judging whether or nsa has a reasonable suspicion that the four number collected through foreign intelligence is affiliated with al qaeda. it is not you that the court is checking on or you're right that it is double-booking. shoulderking over the of the intelligence professional to see if their judgment was correct. full yearowl year -- the nsa had records, and happened to hundred 88 times. 288 times.ned
1:38 am
>> people's eyes start to glaze over. let's take it down to fundamentals. i am not advocating a policy position and i do not know where the line should be drawn. i know that there are questions that belong in the public domain that we ought to collectively decide. transparency enables the checking power of civil society, lobbying, of, of voting, and of market power. people get to decide why they do business with a company as it is not say. companies respond by competing on privacy. let's look at the big picture. a wallet goes missing. what is the most efficient way to search for it? everybody gets surged on the way out the door. lots of societies do that.
1:39 am
the british did that in the 18th century. that, generically, is the idea of a general warrant and that was a principal cause of the american revolution and one of grievances. communications are enormous. they have never been able to do that before until recent years. most of these programs could not have happened before the year 2000 or so. the amount of data that exists in the world that has been produced and transmitted in the world since 2000 ghastly eclipses all the data that was ever produced in the world. there is a lot of it. all of it.ccess to they are not just collecting metadata. the programs that no one ever wants to talk about, overseas,
1:40 am
they are collecting content. lots and lots of contact -- content was up there is an access point called "muscular." -- content. there is an access point called "muscular." 14 strand of cable transmits times the print in the library of congress. anything that looks like an e-mail address book, and inbox, or a buddy list, they say "we want that." that is considered content under law. all the transmissions between google and yahoo! is content. k.at is being collected in bul the question is, are we comfortable with that? >> it is being collected and sent to a server? >> humans cannot lay eyes on all
1:41 am
of it. they collected. -- collect it. there is assumed to be billions of communications that are incidentally american. they feel free to store as much of it as they rationally believe they can use. they don't want all address books. they want address books of people where the formatting that gets transmitted lets them know what it is. useless forms of data, they throw out. they keep it and they circuit. -- search it. >> we should open up to questions. we have 40 minutes left. we will let people line up at the microphones. finish your answer. >> i'm glad we have an hour for this. >> ok.
1:42 am
all right. carriet i will last -- -- >> sounds good to me. >> i will ask you to identify yourself and ask a brief question. save speeches for the dorm. >> my name is ari. i am a graduating senior. my question is for both of you. at what point do you want to start collecting on a terror subject inside of the united states who is an american citizen? >> i will go first. >> that is the him my confidence. >> you mean like the boston -- beyond my confidence. rnaevu mean like the tsa
1:43 am
kids. we did not collect on them. y were not monitored. >> that is not why the fbi and others did not monitor them. they got the tip from the russian government. have been up could to no good and they did a preliminary investigation. they said, we do not see anything here and they stopped. they had a tip from the foreign government. 42 doave them lots of surveillance. of opportunity to do surveillance. >> given the coverage of the snowden revelation, there is a presumption that the nsa is sucking everything up. they are not.
1:44 am
barton is exactly right. they would have to have had a certain level of suspicion and go through the processes that allow them to be targeted. after boston, i get questions like, how did you not know they were going to those websites? -- >> wen routinely do not routinely look at these. sure. >> ok. here is the google data center. two different countries. here is the line between them. nsa goes between them and take in anything and everything it wants from that. even though hundreds of billions of those communications will be u.s. communications. >> let me make sure i understand the premise you are suggesting. you believe that gmail should be a safe haven for legitimate
1:45 am
foreign intelligence targets of the united states. >> is that my question? >> that is how i translate your question. wire, i am on that not collecting gmail users. barton said, and this hurts your head, we have spent the whole evening here and have not gotten off of section 215. >> we are now. >> the approach you use in collecting foreign intelligence looks like a funnel. you have access. p isnext stwe collect. the new process. you process. the funnel get smaller. often, people use the number out here that describes moveotential access and
1:46 am
that number up the chain to the more sophisticated and narrowly focused activities. i go back to my premise that gmail is not a safe haven. google is an international company. google is a u.s. person in certain circumstances. by the way, that is not their cable. it is a virtual cable that they use. i asked you the question, hotmail, gmail, safe havens? these are global e-mail providers that are used by everyone. is your theory that, you cannot touch it because eric schmidt will be very mad? line, there is a long distance to go from saying that
1:47 am
gmail should be a safe haven for terrorists and saying, on the other hand, that you should be, as the u.s. government, siphoning in all of the content that goes across that table. gradation.room for >> i gave you the gradation. not everything you collect is processed. not everything you process is reviewed. not everything you report is disseminated. >> the prison program, the first , gave theote about nsa more power than it ever has to get gmail, all of the cool content -- the google content, with authorization from the court. it had latitude. it was not allowed to sit
1:48 am
through everything in the server to see if there was anything that interested us. >> barton is right. binary is too strong of a word. there is a view of the world when it comes to american intelligence. there is protected communications and everything else. nsa has a lot more freedom of action going after communications. some europeans do not attach privacy to a particular sovereign. it is a more general human rights. i have that. that is a subject of discussion. the american approach to this and that it is a binary world. protected persons and persons who are not protected. -- nsa
1:49 am
it is quite powerful. >> let's take a question over here. >> this is something i worry about when i read newspapers. china is trying to segregate their internet and germany is thinking about doing this. what effect would this have on the nsa possibility to collect information or, is such a thing even possible? >> this is beyond my expertise. i have a few thoughts. first, there are a lot more people in countries talking hyperbolically about their desire to cut off the global internet and keep all their data at home than are actually taking steps to do it or will possibly do so. you are cutting yourself off from the world and it is damaging. it is not practical. there are countries that say google, yahoo!, all of the data
1:50 am
reduced by germans have to stay in german data storage and you cannot go anywhere else in the world. certainly not the u.s.. the fundamental structure of the internet does not allow that. there are countries like china or iran. orthat the extreme end, n korea. they want to cut themselves off from free debate and free information and are using the nsa as an excuse to strengthen that argument. it was possible, it would be cleaner. it would take us back to world war ii-era. you could break the german or japanese military code and it was a no-brain or. -- no-brainer. this is a code being used by the enemy.
1:51 am
in a war. now, if you try to break encryption, everybody -- almost everybody, uses the same stuff. the nsa knows about this or that entity. we are writing about stuff that has general public interest. if you are breaking the encryption standard that run the internet because we want to get the bad guys, you are breaking everybody's else -- everybody else's encryption. >> thank you for coming. . am edmund sweeney i may need of a pittsburgh. >> philadelphia. -- >> i am a native of pittsburgh. >> philadelphia. >> i have one question in two parts.
1:52 am
one for mr. gelman and one for general hayden. we talked about current and past. i want to talk about the future theup we know -- we future. the increasing demand for transparency and this general sentiment and people like julian assange and edward , what implications does this have for the future of organizations like the nsa and cia and how they will deal with those problems. grniture gelman -- for mr. ellman, how will the media respond and interact with this information? >> i will go first and go quick.
1:53 am
we have to recruit for the generation that produced bradley manning and edward snowden. that is a rowdy. -- reality. that generation has a different compass to transparency than my generation. that is a reality. my committee will have to deal with that. one of the major muscle movements in my community has been to generalized sharing. it used to be need to know. now it is need to share. this is hard. the other impact of this is that, when you undertake an espionage activity, you put what you can gain over here and what you can lose over there. let's talk about signal intelligence. welcome again? -- what can i gain?
1:54 am
i could hear the head of state. what could i lose? you could be embarrassed if that is public. you make that judgment. this hand is not a moral hand. it is a political and public-relations hand. this is what i would lose if it was made public. a gets multiplied. by the likelihood it gets made public -- it gets multiplied by the likelihood it gets made public. particularly when it comes to grabbing a signal out of the air, it is zero. it is undetectable. what we gain over here may not be massive. the potential loss is not measurable because you cannot figure out a way in which it becomes public. with edward snowden, that number over here will never be zero again. you have to factor in insider
1:55 am
threat that makes operations known that the target nations are never going to detect. that might be the strongest brake on aggressive signals intelligence collection against some countries. not american guilt or friendship. it is that calculus. that rall national interest "national- raw interest" calculus. keith alexander was the director of the nsa and he gave a talk. he said that he wished he could bring every american into his huddle and tell them the place iscalling -- plays he
1:56 am
calling. if he did, the bad guys would know. there is no encapsulated walled off communication and global affairs. when we didrue that find out what was happening inside of the huddle, a lot of americans do not like the place being called. that is among the reasons why the existence of a classified stamp does not end the inquiry when i am deciding that something should be public. there are all kinds of stuff that should be classified that are self-evidently triple -- trivial. i have a laundry manual that is stamped secret. i also have noticed that there are interesting variations on how classification works, depending on the forum.
1:57 am
there is an internal nsa report. i talked about the number of compliance incidences, the nsa calls it, errors or violations of law. there are statistics. how many times do we have this compliance problem or that compliance problem. it is classified as secret. it means that it would do harm to national security if we knew the number of times they screwed up. that is hard to defend. when they report to congress, it is classified, top secret, special intelligence. 91% of all congressional staffers could not read it and a greatly restricted the oversight possibilities. reacts american public
1:58 am
when there is something that the u.s. government is doing and something they did not know they were doing. something they might have accepted if they had known in advance. >> thank you. >> i want to return to the question of call-chaining. the multiplication in the program. 88 inquiries. 2 each of those, which until , aently was three hops thousand is the first top. the second would be a million. there is some overlap. i am extrapolating. not by orders of magnitude. if i'm correct, if you are talking about three hops, you are talking about 288 things.
1:59 am
that is close to the totality of medications. >> i'm relying on statistics that the former deputy director put out. words, and those inquiries, 600,000 numbers. i agree with you that that is not the right number of hops out. this is an investigation. it is just numbers. no other identifying data is there. they are looking for patterns that -- so, you have a spider chart. you have a number in buffalo. it is interesting when the --ond hop out of buffalo that is why it is done. it is done as an investigative process. you are looking for linkages that might merit further
2:00 am
investigation. chris inglis did not explain what he meant. in thes a saying newsroom that there is a danger when a reporter does arithmetic. go and touch only means that each number called an average of less than one percent a year. year.son a we have all heard of six degrees of separation. six degrees of separation on average. it is not just a play on a novel. computer science theoretical work that was done. the average number of hops that you have to do to reach every single person in the world to another is six.
86 Views
IN COLLECTIONS
CSPAN Television Archive The Chin Grimes TV News Archive Television Archive News Search ServiceUploaded by TV Archive on