Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  April 15, 2014 10:00am-12:01pm EDT

10:00 am
time for hard-working americans to send more of their money to washington. we need -- from senator ted cruz -- abolish the irs and tax they in three words. in fact the author of food politics will leave -- will lead the discussion on marketing and access to affordable health food. live coverage will begin at 2:30 eastern. at 7:00 eastern the u.s. supreme court had an oral argument worth -- argument where they struck down -- the court ruled those restrictions are unconstitutional. an unconstitutional violation of first amendment free speech rights. the moment of silence will mark the one-year anniversary today of the boston marathon bombings. three people were killed, 260 were wounded when two bombs went
10:01 am
off near the finish line of the race. at 8:00 eastern, a discussion with journalists who won the pulitzer prize for their coverage. members of congress, it is my great privilege and high honor and personal pleasure to present , hamadhis excellency karzai, resident to the islamic state of afghanistan. -- president to the islamic state of afghanistan. [applause] >> thank you. thank you. thank you very much. thanks a lot. please.
10:02 am
thank you for the great honor. speaker, mr. vice president, members of congress, distinguished guests, the great people of the united states of honora, it is my distinct to speak on behalf of the afghan people in this assembly. i think you and the people of this great country for your generosity and commitment to our people. you have supported us with your resources, with your leadership in the world's community. with theimportantly precious lives of your shoulders
10:03 am
-- of your soldiers. quick find more highlights from 35 years of house coverage. c-span, created by america's cable companies 35 years ago and brought to you today as a public service by your local cable or satellite provider. >> the washington post and guardian newspapers won a pulitzer prize for their coverage of nsa intelligence and surveillance. former director michael hayden recently joined washington post -- rter this two-hour event was hosted by american university here in washington dc. privileged toly have two people who know the nsa extremely well from different perspectives. is aal michael hayden retired four-star general who served as the director of the
10:04 am
many other, among electors opponents in his 40 year career of public service. he was appointed director of the nsa by president bill clinton and serve to 1999 2005. in 1990 92 2000 five. he served as the first deputy director of national intelligence, the highest-ranking intelligence officer in the armed forces. in may 20 -- in may 2006, george w. bush appointed him as director of the cia. he is a frequent commentator in many major news outlet. principal andy a a distinguished visiting professor at george mason university.
10:05 am
gelman spent 21 years on the staff of the washington post. he has won numerous awards. was awardedlitzer in 2002 for reporting on the september 11 attacks. the second was awarded to him in 2008 4 his series on dick cheney's vice president see that a best-selling book. that book won the los angeles times book prize and was named a new york times best book in 2008. today he is a senior fellow at the century foundation and author and residence at root -- at woodrow wilson school.
10:06 am
he returned temporarily and 2013 after receiving various nsa documents from edward snowden. with his colleagues he has broken stories about many of the things that we are bound to be discussing tonight. i would like you to join me in welcoming our distinguished speakers and the national audience of c-span. [applause] the format as we are going to have conversation among ourselves for the first hour and then we will open it up to you all. i see two microphones, one on the middle and one on the side here. it seems to me all of the rotatental questions
10:07 am
around balancing security and privacy. it? there is do the further question of what privacy even means in the digital age. people are keeping track of you every time you are using an e-mail. to make an informed judgment about the nsa programs, we have to know what they are. i want to spend a lot of time talking about what those particular programs are. we are hosting a political theory institute. asking like to start by if you big questions, around which all the others will revolve. i will ask my first question to
10:08 am
will haveu now so you a few seconds to think while i am asking the other. first, what right do you have to turn that tots, to determine to be such? supplantingjustify your own judgment for that of the people's government. hayden there is a parallel question. nsa or any to the other governmental body have to keep secrets in the first place? democracy is based on consent. if we don't know what you are doing, doesn't that necessarily undermine democracy? >> i will give an answer that starts with a profit -- with the provision that my history and politics rates are no longer subject to change.
10:09 am
i will give a theoretical or structural answer to that question. with the structure of self-governance in a democracy. if the government is working for us it is usually thought to have two elements, authorization and accountability. we authorize it in elections and say you get to be in charge for a while and then we hold them accountable for their performance, not only in the purpose of reelection but throughout a constant civil society, political conversation. people get their say through a variety of mechanisms between elections. to me the personal conflicts may not be between privacy and security. to me it is between self-government and -- both of which are core values. by thee both touched on time you get through the preamble of our constitution.
10:10 am
the first words are "we the people." you have this conflict, which is to say we have secrets that are important to keep for the purposes of protecting ourselves. information is essential to govern ourselves. the model i have in mind is nobody gets to maximize one interest or the other. it has to be balanced. cleaner and neater if you had a theoretical model in which there was some trustworthy print will balance. but there is not. i am notelected, accountable to the people for decisions i make. that foro the case everyone working for him they are not competent to decide what
10:11 am
we need to know in order to hold them accountable. we know information is power. the power to obscure the information is a great power, especially when combined with surveillance. what it sets up is a one-way mirror. we become more and more transparent to our government and they become more and more opaque to us. for some of us -- somewhat unsatisfactory answer we are you will a few other possibilities, is there's going to be a process of competition in which governments try to keep secrets, sometimes for good reasons and sometimes for not.
10:12 am
there are all kinds of things that are stamped with secrets that are to be. the idea is government keep secrets and we try to find amount. you can imagine the society. the security or the entrenchment of the state authority, against all other interests. when i was a tourist in the soviet union in 1984 i found out i was getting lost all the time wondering the streets of moscow.
10:13 am
he took a wrong turn but it is not rational to say we're on the publish inaccurate maps. all information is useful to the enemy. we will pay no price and bear no burden. accept somered to risk in order to govern ourselves. i will close here. documents, aile of 100 year storm. i now know secrets i am not supposed to know. there is a more cooperative process.
10:14 am
every other journalist covering this stuff withholds a great .eal of what they know >> three agree an awful lot on this question. most important agreement is a conflict of values. this is the same three people that these people have to balance all the time. of where that line is to -- line is is dependent on the totality of the situation in which we find ourselves. when my public affairs officer or someone else would be aware we felteone had a story really problematic.
10:15 am
since they had already worked with the reporter i would genuinely call the editor. my secretary would make the call. the editor would take the call from the director of the cia. i really want to thank you for taking the call. invariably i would then begin the conversation with, look, we both have responsibilities for the welfare and safety of this republic. but how you are about to exercise your responsibilities are going to make it much harder for me to exercise mine. we do really need to talk. we would have that dialogue that barth suggests. he has got to have freedom of the press. on the other hand the government has legitimate secrets.
10:16 am
no fooling things are over classified and human beings and government. it also digests -- they are performing inherently without the acts system of checks and balances and responsibilities that normally go over here on this side of the equation. this is getting much much more complicated in the society. how do you hold a government accountable without a great deal of transparency? let me walk you through the arc of american history. there are other secrets. the intelligence community is not the only one that keeps secrets. the federal reserve, they keep
10:17 am
secrets. organizationst of of government where the general welfare has improved. at the beginning of the republic and in most western democracies and in many walks -- many western democracies still, this espionage thing is contained in the executive branch. george washington was the nation's first spymaster. when he became president he insisted on a secret covert action budget. espionage has generally been viewed as being a province of the executive. the way espionage changed the policy is change the executive. there was a
10:18 am
broad agreement that having this oversight only within the executive branch was insufficient. compromise was to create two bodies in congress in a rather unusual court to spread this transparency and accountability over all three branches of government. we end up with a house permanent select committee and end up with the fisa court. was aeory was that that sufficient transparency to legitimately get consent of the governed. -- consent of the governed and a representative democracy. this isn't ancient athens. that consent was adequate. , people at the nsa are going to say wait a minute, it
10:19 am
has been authorized by two presidents, the congress --uthorized it did reauthorized it. that is the trifecta, i have all three branches of government. the great swing in american popular culture -- and i am not just talking out here in the wings, i mean sustained among that no longer constitutes sufficient consent of the governed. you told the mall but you didn't tell me. cost --ind of act that kind of act that cusp. i had a wonderful team of outside civilians. gave the subcommittee a tough job. one subcommittee was doing i.t., the other was suing the car that doing recruiting.
10:20 am
-- the other was doing recruiting. they studied for four months and cambe back and gave me a heartily, i'm not sure. which is a very telling answer. here we are with an international enterprise that i am going to assume we all legitimate and necessary. that is why this is so difficult for all of us.
10:21 am
>> general hayden described this as an inherently governmental function. when you get that information, i guess there is no checks on you -- or are there? what is the process you go determining, this fella my lap, should i make it public or not? >> are there checks? on the the same checks de facto checks are not so different than they are on the government itself, which is to say that lots of what the government does or doesn't do isn't because it literally doesn't have the power,
10:22 am
according to some legal interpretation, but because it believes there would be a grave public consequence, public opinion would not support that. the washington post cares a bit about its reputation for telling the truth and telling it responsibly. nobody wants to be responsible for some terrible thing happening. thee publish story x and in next day there are 10 people strung up in the square of some foreign country because we disclosed their identities, that would be a bad thing for the washington post. it's your checks there. him >> for any of the nsa stories, are you aware of any bad consequences? a it of a conundrum
10:23 am
here. a secret has spilled and the washington post has published something and suppose you are inside the intelligence community and you know specifically what some consequence was. they are constrained from telling you about it. hand there are consequences we would know about. he used language quite different than what he uses in public. study.nt back and did a over the years there have been breaches of secrets lots of times, usually in the context of espionage cases but sometimes in the context of a new story or foreign services disclosing something or sometimes the president's close secrets because they have a good
10:24 am
political reason to do so. one old reagan played a recording -- recorded a recording of a conversation that took place in libya in order to persuade european allies to allow your -- to allow american planes to fly over their airspace. he reveals that capability. they do a study. what is the damage assessment? the closed-door meeting was these damage assessments consistently overestimate damage. natural or abnormal for the nsa to gain and lose capabilities. stop working tomorrow because microsoft changes their architecture with the other country chooses a different vendor or the target gets tired
10:25 am
of that in switches to a different company. targets are trying to practice community and security so they switch. the other thing the clapper said people will change their behavior but they will make mistakes and we will exploit them. the nsa is not in immediate danger of losing its global preeminence in signals intelligence. i concede that it is possible that some of the stories published by some of the news have degradedwill the ability to listen in on something. say thatared to prepared to accept that. we are finding out things that they have been doing that are completely contrary with the public understanding of what their job is and how they do it.
10:26 am
if there is a program going on and the executive branch has left it -- have blessed it. when it becomes public the american people are shocked by its and they need people are angry about it and they start telling members of congress and members of congress start introducing bills to stop it. gets brought to federal court in the first federal judge to assess its constitutionality says it is orwellian and likely i will stoponal, there. know you are not in government now. are you aware of specific negative consequences from any of the nsa stories? >> three tiers of consequences,
10:27 am
all of them damaging. are you being briefed? >> i can speak freely at events like this. >> i would have shown someone else. >> i know how to read a newspaper. >> three tiers of damage, one is operational. if i were in government, let me rephrase the act -- rephrase the question you just asked me, which give me a list of communication to didn't intercept yesterday? that is really the question you want me to give the answer to. i don't know. the signals intelligence game is constantly moving. all advantage is transient. next whatever,he you don't have a penetration anymore.
10:28 am
level ofbuys the next encryption, you don't have the frequency and more. those communication paths have a smarter way to spend a buck. all intelligence is transit. simply accelerated the rate at which we lose our current accesses. to me that is inarguable. is one level. will be recovered? sure. how much? eight to 10 billion -- $8 billion to $10 billion. the second level of loss -- let me stick with that trayvon. -- with that for a minute. they had done more than informed the national debate, they have to 15, and this was
10:29 am
ot parts work -- not bart's work -- that was pushed out the door with an incredibly detailed coverage of the front end. ionly -- only over a period of several weeks did the backend story get out to the public domain. people would make the argument that you disagree, even after you got the backend story that you really can't make an informed judgment until you get the whole context. a recent poll said over 30% of think the 215 program allows nsa to listen to the content of your phone calls.
10:30 am
second loss is in relationship to foreign governments. not talking about angela merkel being really upset. i am talking about angela merkel's spy service or any other intelligence service around the world to whom we would go to for help in a matter of great sensitivity and a matter that would require great discretion, in which we say this is lawful, a little politically edgy, but it is the right thing to do for both our countries. come on, let's cooperate. we can keep a secret. there isn't another intelligence service in the world i should take that last sentence to the bank. fundamentally been eroded by
10:31 am
foreign intelligence services having no faith in our ability to keep things where they ought to be. the third level of damage has to do with american industry, who has been unfairly pilloried by this whole thing. you have young mr. zuckerberg calling the president and complaining about how his company is being treated in the global digital domain. american companies do nothing more for the united states than other countries do for their sovereigns around the world. microsoft, at&t, etc., do the same thing that deutsche telekom does for german security services, etc., etc. but it's only american information that has been put out there, it has been put out there in a way that suggests, almost declares, that only the americans are doing this. i would suggest to you that practically the entire continent of europe, including their
10:32 am
elected representatives, now know more about american signals intelligence than they do about their own countries signals intelligence. and that's not a balanced discussion. >> there are lots of things that america might want to be for global preeminence on, but i don't think one of them is going to be that we are the most closed government and we are the best at keeping secrets. and we don't need it, because our security, we actually have a little bit of room, the luxury of allowing democrat debate over -- allowing democratic debate over big questions like -- should the nsa be collecting all of the records of all the calls that you and i make, are taking -- or taking it out of the context of section 215, court authorize telephone program, what do we think about something
10:33 am
that is new that the nsa never did in its history on anything remotely like this scale, because the capabilities did not exist? the nsa now wants and has taken many steps to achieve a kind of comprehensive situational awareness of the world. it wants to be able to collect every electron and photon that passes over communications channels in case they might be needed. it is not just metadata, although i think that is enormously important for privacy. it's also what they do overseas. the debate has been channeled somewhat deliberately in the current political context for the statutory kinds of surveillance. that is to say under section 215 act andisa amendments
10:34 am
under section 215 of the patriot act, they collect all your call records. overseas they are not bound by statute, supervised at all by the intelligence community or supervise by any court including the intelligence court. they operate solely under the authority of a presidential executive order. since we had a little bit of a historical suite before about the 1970's, that me give you an -- let me give you an additional point of view on that. the 1970's, after a bunch of gross abuses that today's programs don't at all resemble, there was a deliberate misuse of surveillance for domestic, political, corrupt purposes. they created the structure of oversight in the foreign intelligence surveillance act. the idea was you can do what you like overseas, spy on the foreigners, but you cannot do it
10:35 am
at home. the restriction was on spying on u.s. persons, citizens, and green cardholders, and actually u.s. companies as well. and you cannot do it from u.s. territories. so around the time that general hayden became nsa director, the u.s. government started making the argument and executive started making the argument to congress, you need to change this because the structure of global telecommunications has changed fundamentally. there's now lots of foreign traffic that passes through the united states. it's not american phone calls or e-mails. it is just the nature of the distributed networks that you could be in germany and calling brazil and the call passes and transits through the united states, for example. so we need you to take the leash off. we need to have a lot more
10:36 am
freedom to spy from u.s. territories. what they didn't say, and congress change that law. what congress did not address is that lots of u.s. communications are now floating across foreign services. if you're sitting here in washington and you send an e-mail to cleveland, it is literally quite possible unlikely that your e-mail is going to cross ireland or a data center in hong kong. the global internet balances its load by distributing in microseconds the communications flow and the path of communications everywhere. where it is allowed to resume -- where the nsa is allowed to presume that the people it is intercepting our foreign, it does things like this. the nsa with its british counterpart is breaking into the privately owned links that google has between its many data centers around the world. so a data center in hong kong, one in latin america, they have
10:37 am
private fiber that links them directly. nsa was breaking into that and intercepting the traffic that went through them, which is to say ultimately is able to reassemble the entire contents of the data center if it wants to. google and yahoo! won't say what percentage of their users are americans. let's say it is half or one third. you are talking about ultimately not only the metadata but also the content of hundreds of millions of people that are crossing into these flows that the u.s. feels free to dip into. the legal term for that is incidental flexion. you are targeting foreigners of some kind or another, and as it happens, incidentally, foreseeably, but not your actual purpose, is getting a lot of americans with it. once you have them in your storage tank, as was acknowledged in writing, the nsa
10:38 am
feels free to search through it in its own data repositories. if i say to you collectively in this room that i have a foreign target, i'm just going to collect everybody smart phone and download everything from it, all your appointments, all your text messages, all the little confidence as you have exchanged -- all the little confidences that you have exchanged with one another, your bank records, and i promise not to look at it unless i have a really good reason and it turns out that two , thirds or one third of you are americans, turns out that was incidental. it's perfectly legal, and you should be fine. it is not surveillance unless we're doing something with it. don't try that argument if you want to download movies. do not say i have three terabytes of pirated movies and music on my hard drive, but i haven't listened to them yet, so it doesn't count.
10:39 am
that's not our ordinary understanding either of the law or of what it means to be understood violence. -- under surveillance. those issues were never debated publicly because we did not know about them. what snowden allowed us to do is say are we ok with that? >> the less point in a recent s describes the effort. in the clapper letter that revealed this, he pointed out that the committee actually debated whether or not they want to reauthorize the mystic approach, and they agreed that it had. so we are not putting the cart on the bottom of the deck here. bart is right. it was known and consciously, specifically debated in committee whether or not that should continue. ay the way, that is an edgy w
10:40 am
to do that. it gets close to what we used to call reverse targeting. decent argument, but don't think this was a renegade nsa. fully debated. i'll try to be really efficient about this. an awful lot of these snowden regulations are pretty things -- are putting things out there the way they are now, and i think some of them are inaccurately mischaracterized. this is complicated stuff. >> i would be over polite about >> i would not be over polite about it just because i'm sitting on the stage here. this was screwed up badly. [laughter] >> you cannot entirely blame him
10:41 am
though because he only knows what he has been given. >> ok, yeah, exactly right. [laughter] >> all right, then it is your fault. >> i'm given a piece of paper. i don't assume that it is authentic or that the facts contained therein are accurate. it turns out there are authentic documents in the world that are wrong. >> i used to get some of those briefings, too. >> i and my colleagues do a lot of reporting around the material. a lot of the reporting, certainly a big part of it is to talk to the peoples who are the stakeholders in government who are running the program. mystic is the story the washington post wrote a couple of weeks ago and said the u.s. is intercepting and recording all of the telephone calls of an entire foreign country. and storing them for 30 days. of the billions of calls they go into this 30 day holding tank, millions get sent back to fort meade to beast gordon process in
10:42 am
desk to be stored and processed in their repositories. >> it's got to be a little country, right? >> we did not name the country and we did not give any hints about the country. we had already decided before we went to the u.s. government that we were not going to -- i've got to sort of hold things back from you. i've always done that from time to time in stories over the years. i could give some examples of that, but here it happens all the time. we were persuaded even dow yet -- even without yet talking to the u.s. government, that there were specific, concrete, foreseeable harms that would come from naming the country or saying what kind of country it was or what kind of intelligence targets required this approach. what we can say is, this raises a big public policy question. if you live in that country or work in that country or you have
10:43 am
relatives or friends in that country and you make calls there, that your call is recorded. that would amount to millions of americans in any country in the world. so now they are not just collecting metadata, they are collecting content. let's say they are recording your words and they feel free to keep whichever ones they want and search whichever ones they want because it was incidentally collected in the course of surveilling a foreign country. that is not something the nsa could ever have done before in recent years. it is a capability that the nsa did without and kept us safe throughout the cold war, and it is, as the general says, it is quite edgy and worthy of debate. there is one last point to be made about oversight.
10:44 am
the chief judge of the fisa court, the foreign intelligence surveillance court, said in his first ever interview with any news organization that the court knows nothing unless the nsa or the u.s. government tells it. it doesn't have any independent fact-finding ability, that it cannot go out and invest gate. -- cannot go out and investigate. it doesn't have a former nsa person like that. when the court found in 2009 at -- that the nsa had been unlawfully running wannabes big programs and had been consistently misrepresenting the facts of what it was doing to the court, the nsa response to the justice department was, you could make fun of it as these computers are so darn complicated. who understands what they are
10:45 am
doing? the argument was there was no one at the nsa fully understood the workings of the program and therefore was inadvertent that they were describing it incorrectly to the judge. so when you're saying a judge is supervising it or that congress is overseeing in, the nsa is classifying almost all of this stuff at the top-secret codeword level. sometimes for very good reasons and sometimes not. there are fewer than 10% of members of congress who have a staff member cleared to read anything at that level. members of congress do not go into a 10,000 page intelligence budget or sit and studied dance -- sit and study dense hearings and reports. they just don't. they rely on staff for that. most of them don't get to talk to a staff member who is cleared to read what they are talking about. so the level of supervision in some cases is pretty theoretical.
10:46 am
>> i am falling way behind on my accusation countering count, so my turn. [laughter] >> go ahead. >> as i was saying, bart does this half well half of the time. even the best of folks are going to get some of this wrong. is he just said, the nsa is so complicated it is hard to explain. not everyone is as conscientious on reporting these stories. a lot of people take the stories and run as quickly as they can to the darkest corner of the room. let's put that aside. let's just say that we can reduce all the stories that are out there to hard-core facts, that we have pulled a hyperbole and the misrepresentation out, and we can get it done. i'm not even going to argue about that's not what we're are doing. let's assume we can all get it there. you realize you're coming in late in the third real of a
10:47 am
of a complex movie and you are looking at the third , reel. i'm assuming we have all the chaff out of the way. you're looking at the third reel and making the decision, i know the butler did it. and you really cannot make that decision until you walk back to the first reel, and where did these things come from? why were they developed? i'll try to be very efficient about this. i became director of nsa in 1999. we were being overwhelmed by the volume of modern communications. we were approaching communications the way we had approached all of our previous life going after communications, which was burrowed down, get the right frequency and listen to the very specifically targeted call. now there we were with a tsunami of global data flying at us in a way that was beyond our ability
10:48 am
to control. you are all fairly young and do not know what it was like communicating and nine teen 99. trust me -- a lot more protons than electrons out there now. we decided before 9/11 that the only way we could deal with volume was to quit acting like we are on a beach pushing back a tsunami wave and saying let's try harder to keep the wave from engulfing us. we decided turn around and swim with the wave and make the power of the wave your tool. that is collection and metadata. that is why we did it, it was in response to very specific challenge that if we had not dealt with, we would have gone deaf. technology change number two, the nsa spent most of his time watching the soviet union. there is not anyone regardless of your political or suasion
10:49 am
-- regardless of your political persuasion that will raise that much of a finger in civil liberty concerns, with communications coming out of moscow, in soviet siberia while we are looking for interesting words to pop up on the net like "launch." [laughter] the 21st century equivalent of that isolated signal on a dedicated network being run by an oligarchic superpower, the 21st century equivalent of that signal are proliferator, terrorist, money laundering, child trafficker, narcotraffickers, etc. e-mails coexisting with your e-mails in a single, unified, global communication structure. there is no way nsa continues to do what it used to do for you if it cannot go out there and be in
10:50 am
the flow where your communications and mine are cold co-mingled with legitimately targeted communications. that is just the reality. the third change, and bart mentioned this already, that is the fact that the global communications grid changed in such a way that most global communication either resided or transited the united states just because of american dominance in global telecommunications. yet, without the fisa amendment act am a an e-mail from a bad man in pakistan to another bad man in yemen, i don't think it was the intent of the founders and that is why the change in the fisa act.
10:51 am
the fourth change in reality, and this is 9/11, that is simply the fact that the enemy was inside the gate, and that legitimate foreign intelligence targets were here in america. after the 9/11 attack, there was the joint inquiry commission that was made up of both the house and senate intelligence committees. one of their findings was that nsa, that would be my nsa, the one i was running before 9/11, was entirely too cautious in dealing with the al qaeda communications of most importance to the united states. and that would be al qaeda communications, one end of which was in this country. and the metadata program was designed to be, frankly, the lightest possible touch we could devise to know which of those communications entering or leaving this land would be the ones we want to drill down on for content collection. after having seen the whole movie now, you may still be
10:52 am
pretty confident the butler did it. but they did not develop out of an nsa director like me or keith alexander, acting like mr. burns on the simpsons going "excellent." [laughter] i've been waiting to do this for decades. they were logical responses to technological and operational challenges. one more thought. picture life as a triangle for the subject. there are three sides of a triangle. by the way a happy triangle is , an equilateral triangle. it is in harmony. and the three sides are threat, technology, law, and policy. you got it? what you want is that if is -- that your technology is responsive to the threat and used within the confines of agreed law and policy. those three things never changed at the same rate.
10:53 am
but they are changing at amazingly different rates today. and the problem that bart points out in his writing, and one that i will freely admit, is that the other two sides change must faster than law and policy side -- the equilateral triangle turns into a violent looking isosceles thing because these things have changed while law and policy are still struggling to catch up. that is kind of where we are in the debate. >> i got a little bit lost with the triangles. >> i could do it again. [laughter] >> i am used to the curves on the diagram. i actually want to come back to the question and the point he has not yet actually supported, which is the idea that we are getting it wrong a lot are we
10:54 am
-- or we are are getting out of context. that is certainly possible. it is possible there are things we don't know or that we are mischaracterizing something. there was one quite good story, i thought, that we were getting ready to publish and i was persuaded that it was wrong. because i'm talking to sources and i'm talking to the government, and i have very specific reasons -- i received very specific reasons to believe that i had the context entirely wrong and we simply killed the story. but what we are actually doing is trying to said light on the -- trying to shed light on the subject. that is not the case when it comes to the public debate on the part of the government. the government wants to keep the secrets and in a few outlying cases, people come out and say flatly false things to the public. everyone knows about example of director clapper and the question about whether the nsa collects any kind of data at all
10:55 am
about tens of millions of americans, and he said no. but much more often, there is this radically is leading -- misleading information. there are comments made and information is provided that if a friend or family member did that to you, you would consider them to have betrayed you. to have deliberately lead you down the wrong path. here is an example. this 215 program -- the collection of all the call records, it does keep coming back to that and not the overseas collection. for a long time, the government said we won't tell you at all how many times we have used this power to collect business records. the business records provision. grave harm to the security of the united states if we told you the number of times we used it.
10:56 am
then congress passed a law requiring them to disclose how many times they used it. so they came out one year and said it turns out there's nothing to worry about. this was 2009. they said we have only used it 24 times last year. don't worry about it. it turned out that they needed four of those times quarterly , four applications of this power, to get trillions of records. practice -- the way the program worked in practice, it may be that it is a large fraction if not the entirety of it. they say 24, it turns out it is trillions of records. they say we only take it when it is relevant to a terrorist investigation. it turns out their meaning of the word relevant is all of them. every of them could possibly be one relevant. if they had been straight with
10:57 am
the american people and said we would like to be able to collect all the call records and we will regulate our use of them as follows, if they had done that around the time they actually started collecting them, soon after 9/11, or even if they had done it in 2007, they might well have won public support for it. but doing it behind our back, and the highly misleading statements about it have led to a considerable degree of shock when people find out what they are doing. >> i would like to go systematically through a few things that you both referred to a few times. if i can just take three or five minutes on each of the three things. first, the fisa courts and how that works, second, the 215 program, and third am the 702. starting with the fisa courts. my understanding that they were created in the 1970's, coming
10:58 am
out of a recommendation which uncovered all sorts of abuses in the american intelligence program before that. the spying on martin luther king and all of that. to prevent that, they said they're going to create the special fisa court. how exactly does the fisa court work? can someone who is an intern or relatively young person like edward snowden or one of the american university students who are interning at nsa or cia, can they send an e-mail to the fisa court and say hey, i would like some data on this person? what is the process to have a fisa request? how is the request made and what is the process? >> the first thing to be said about the fisa court, it is incredibly odd. it exists. we are the only western democracy that takes these questions to the third branch of government. other countries, last time i checked that were democratic,
10:59 am
like the united kingdom, issued these warrants within the ministries. it is a grand american experiment to involve the third branch of government in what is essentially an exercise of executive prerogative in terms of conducting espionage. what is unusual is that we do it this way. in order to do it this way, we put certain restrictions on this court because it cannot nearly be as open as other courts in our system. first of all, it is not adversarial. on the other hand, tony soprano does not get a lawyer either when the fbi comes up with a warrant on him. unfortunately, when we set up the fisa court, we used the language of law which we use warrants in criminal proceedings in order to go up on wiretaps in fbi and other investigations. there is a sharp distinction that is not often made in the
11:00 am
public discourse about this. there's an incredibly sharp distinction between doing surveillance for law enforcement and for foreign intelligence purposes. i read commentary very often of suspicionless surveillance. that word has absolutely no meaning to me as a foreign intelligence officer. i do not collect information -- particularly talking about foreign nationals. i do not collect information on foreign nationals because they are bad. i collect information on foreign nationals because they are interesting. their communications contain data that will keep americans more free and more safe. they do not have to be bad people. to not confuse the two. the court is designed to warned protection against persons. we have reason to believe they
11:01 am
are the agent of a foreign power. even though they enjoy protection under the fourth amendment -- >> you mean americans? >> american citizens all over the world and anyone in the united states of america, including diplomats, and any organizations composed of the above. to collect against them for foreign intelligence purposes requires a warrant. in addition, because of the peculiarities of the way the law is written -- remember, i told you it echoed the law enforcement statute? restrictions on collecting on a wire in the united states that did not exist for collecting out of the air in the united states. the fisa court gets a request for a warrant that looks like the size of a phone book in a
11:02 am
city the size of cincinnati. it is about that thick. it is heavily laden with legal jargon. dealquires a great specific. in essence, what you are trying to prove to the judge is that the individual you want to target is the agent of a foreign power. i recall, in one instance -- >> not anymore. >> that is what it does. that change in the fisa amendment, i think 2008. >> it is also a change in the patriot act, which is much older. youyou are describing -- are describing an old model that is irrelevant to every single story that has been written. but that is not true. a wirer to collect on inside the united states, you also need court permission .ecause of the peculiarity the packet of information -- is
11:03 am
that submitted by anybody at nsa or cia or department of justice? or does it have to go through a department of justice lawyer? >> it will be crafted at the agency that once the coverage. you have to go through a series of bureaucratic stops. the department of justice. all the ones i am aware of went through the white house for approval. the fisa courts have approved almost every request they have had. this gives the impression it is just a rubber stamp for an irrelevant process. that is why i was pushing for some of the details. >> if the judge is not happy with the fisa application, it is withdrawn and redone. all right? there is a dialogue there. no one who has been through the process would describe it as a rubberstamp. >> is this your understanding of the fisa process? >> almost everything that mike is talking about still happens.
11:04 am
and is accurately described, with one exception, i think. but that is not the stuff that people are writing stories about and what the public is debating. that is the old model. they still use the old model for specific targets. we have something short of probable cause. it could be a reasonable articulable suspicion under the law. but we have reason to think that this person is not -- it used to be that they have to be an agent of a foreign power. now, it has to be relevant to the investigation of a foreign power and they have to demonstrate relevance. but this is an individual target. they want your records and my records, with a name on them. and it is in ones and twos and threes, and there are a few thousand of them a year. >> let's make that shift to the 215 program. >> ok. there are four kinds of data.
11:05 am
george bush ordered michael hayden to start collecting these after 9/11 without the benefit of a statute or court supervision for several years. until the justice department rebelled and people were about to resign because they deemed parts of the government to be illegal. this is the famous "warrantless surveillance" of 2005. -- that was first disclosed at the end of there is metadata. 2005. it is data about data. it is who talks to who when and what equipment they are using. that is metadata. there is content. they were collecting metadata and content for telephone and internet communications. internet communications are not only e-mails. they are skype chats, documents you have stored in a cloud,
11:06 am
video, the entire universe of content that travels the internet. and the telephony is your phone calls. what happened after the justice department rebellion and some public knowledge began to lead the debate, the fisa court was asked to switch gears and did switch gears. no longer was it only issuing warrants for individuals, john and tom and mary. it was now asked to authorize on a quarterly or annual basis huge programs of surveillance. the court would now say, once a year, that you may collect anything that you like from google, yahoo!, microsoft, provided that you certify that it fits targeting rules and it is treated and handled to minimization procedures that are intended to protect the privacy
11:07 am
of u.s. persons, consistent with the operational needs. there is some protection. i will not deny that. not all that is as airtight as one may be led to believe. in any case, the court has a program with standing authority. you do not have to tell me the names. you do not tell the court the names of any of the people that they are collecting. you do not have to tell -- you know, there is not going to be an individual warrant for that person. it used to be that, in the intelligence world, it was not wrongdoing necessarily. there had to be a specific showing that the individual is likely to be a valid foreign surveillance target. that is gone now. the fisa court has accepted and interpreted the law that nobody in the public and, frankly, anyone in the unclassified world who studied this closely, and i count myself among them.
11:08 am
several chapters of my last book was about this. i never suspected that the executive branch had told the court and the court had agreed that collecting every single person's call records was a definition of relevant to a terrorism investigation. >> why was that done, all the metadata? >> the description of what went on under the terrorist surveillance program when i was director of nsa is not accurate. that is about all i can say about that. he is right about the court and the executive branch going to the court for warrants that were brought, generalized towards, rather than specific targeted -- that were broad, generalized warrants rather than specific
11:09 am
, targeted warrant against individuals. the fisa act put restrictions on who you can target and the techniques of targeting inside the united states. most, if not all, of the generalized warrants that are because aribed are lot of foreign conversations are in the united states. we approach the court for approval. the american-ness was created by temporary geography, not the communicants. bart is right. collection,mation there is collection of other individuals. the nsa has procedures to minimize -- protect u.s. privacy. your question was, why metadata? >> yes. said, the first warrant is in 2002. the chief judge of the fisa
11:10 am
court. it allows us to resume things that were the subject of heated discussions only the previous march. we did it by not relying on the presidential power to conduct foreign intelligence but, by involving an additional branch of government, the judicial branch, to determine whether what nsa was proposing met the reasonableness standard of the fourth amendment. you and i are not protected against all searches. you and i are protected against unreasonable searches. and it was felt that the best way to do this within the constitutional structure was to go to a court that is familiar with surveillance and ask that question of a judge. in this case, the judge did issue a warrant. >> basically, the collection of metadata is the collection of all the phone call records.
11:11 am
the nsa would store this in their warehouses. all of these records. they would not access or read them, except when they had process from a fisa judge. >> no. >> ok. program, take the 215 the one we are talking about. butr snowden's revelation, before the president's speech, how it existed, because it changes. the nsa, under the fisa court, get metadata. from the phone company, these are billing records. those areication is, records you have already shared with the phone company. they do not belong to you. the nsa get these records. you are not identified. all that is in there is fact of call.
11:12 am
this number called that number at that time for that long. and, you know, how many phone calls do 350 million people make in a day. you get the idea of how much data is coming in. actually, what was happening was, this program was set up one -- set up by me when most people are making phone calls through land lines. it is much more difficult and legally complex. the fact that cell phones do not have individual call billing -- it was more difficult as people went to wireless communication to get the same kind of information them. in.nformation as time went by, the percentage of american phone calls it showed up on a daily basis in the database was shrinking to about 25%. the database is sealed off. it can only be approached by 200 nsa, allzen people at specifically trained. the machines that they use are keystroke-monitor.
11:13 am
the nsa takes what they call a seed number. almost always a foreign number, number that shows up in a safe house in yemen. we find literature on an individual that shows that he has affiliations with our qaeda and has a cell phone. nsa goes to the database, and we ask, does the phone number show up in here? if someone in the bronx says, i talked to that guy once a week, the nsa asks that phone number in the bronx who they talk to. that is it. that is the metadata program. the change the president made in his speech is that the nsa used to be able to do three hops. the seed number to the bronx to who he called, to the next one. the president made it two hops. guy, to the bad
11:14 am
bronx, and one hopped out. the president also said the nsa has to go to the court every time they make that query. this is unusual. keep in mind what the court is judging. the court is judging whether or not nsa has a reasonable suspicion that the four number -- foreign number collected through foreign intelligence is affiliated with al qaeda. it is not you that the court is checking on or you're right that -- or your rights that it is double-booking. it is looking over the shoulder of the intelligence professional to see if their judgment was correct. the last full year in which the nsa has records, the yelling to the train something -- through the transom thing happened 288 times. >> people's eyes start to glaze over.
11:15 am
you are talking about nuances in law and operations. this is complicated and difficult. let's take it down to fundamentals. i am not advocating a policy position and i do not know where the line should be drawn. i know that there are questions that belong in the public domain , boundaries we collectively ought to defend. that is my ideology as a reporter. transparency enables the checking power of civil society, of the courts, of lobbying, of voting, and of market power. people get to decide why they do business with a company as it is not say. -- as safe as it used to seeing. companies respond by competing on privacy. let's look at the big picture. a wallet goes missing. what is the most efficient way to search for it? everybody gets searched on the way out the door. lots of societies do that. the british did that in the 18th century. that, generically, is the idea
11:16 am
of a general warrant and that was a principal cause of the american revolution and one of the main grievances. the nsa wants to be able to do -- have that kind of efficiency, because global communications flows are in norma's, and because it can. -- are enormous, and because it can. they have never been able to do that before until recent years. most of these programs could not have happened before the year 2000 or so. the amount of data that exists in the world that has been produced and transmitted in the world since 2000 vastly eclipses all the data that was ever produced in the world. -- in the world up until 2000. there is a lot of it. and they want access to all of it. they are not just collecting metadata. the programs that no one ever wants to talk about, overseas, they are collecting content.
11:17 am
lots and lots of content was up -- lots and months of content. there is an access point called "muscular." one strand of cable transmits 14 times the print in the library of congress. every second. it is huge data flows. they are sitting on that. anything that looks like an e-mail address book, and inbox, or a buddy list, they say "we want that." they suck that him. -- in. that is considered content under law. all the transmissions between google and yahoo! is content. that is being collected in bulk. the question is, are we comfortable with that? i understand why -- >> there are not people reading it. it is being collected and sent to a server somewhere. >> obviously, humans cannot lay
11:18 am
eyes on all of it. they collect it. there is assumed to be billions of communications that are incidentally american. they feel free to store as much of it as they rationally believe they can use. for example, address books. they don't want all address books. do not want odorless address books. address books. they want address books of people where the formatting that gets transmitted lets them know what it is. useless forms of data, they throw out. they keep it and they circuit. -- search it. >> we should open up to questions. we have 40 minutes left. we have two microphones, one here, and one over there. i will ask people to line up at the microphones, please. finish your answer. >> that is unusual. i'm glad we have an hour for this. >> ok. all right.
11:19 am
so, what i will ask -- >> sounds good to me. >> i will ask you to identify yourself and ask a brief question. save speeches for the dorm. >> my name is ari. i am a graduating senior. my question is for both of you. at what point do you want to start collecting on a terror subject inside of the united states who is an american citizen? >> i will go first. >> that is beyond my competence. >> you mean like the tsarnaev kids? we did not collect on them. >> i know that. >> and why didn't we? because they are u.s. persons,
11:20 am
and they had a first amendment right to visit any websites they wanted to visit. their web surfing was not monitored and would not be monitored, and there is not a program that allows us to monitor it. >> hang on. that is not why the fbi and others did not monitor them. when they got a tip from the russian government that that the older one might be up to no good, they did a preliminary investigation. they said, we do not see anything here and they stopped. if they had wanted to -- they had a tip from the foreign government. gave the months of authority to do the surveillance. it was not because they were protected persons. >> i am sorry. i was not clear. that was not the point i wanted to make. given the coverage of the snowden revelation, there is a presumption that the nsa is sucking everything up. the fact of the matter is they , are not. bart is exactly right.
11:21 am
in order to get that, they would have to have had a certain level of suspicion and go through the processes that allow them to be targeted. after boston, i get questions like, how did you not know they were going to those websites? because we do not routinely look at that. but the overseas collection of americans is much more interesting? >> sure. >> ok. here is the google data center. here is another google data center. two different countries. here is the line between them. nsa goes between them and take in anything and everything it wants from that. even though hundreds of billions of those communications will be u.s. communications. incidentally collected. why is that ok? >> let me make sure i understand the premise you are suggesting. you believe that gmail should be a safe haven for legitimate foreign intelligence targets of the united states. >> is that my question?
11:22 am
>> that is how i translate your question. if i am not on that wire, i am not collecting gmail users. bart said, and this hurts your head, we have spent the whole evening here and have not gotten off of section 215. >> we are now. >> the approach you use in collecting foreign intelligence looks like a funnel. you have access. the next step is collect. then you process. then you read or listen. you analyze. you draw up a report. and you disseminate. you get the picture? the funnel gets smaller. very often, people use the number out here that describes the potential access and move that number up the chain to the more sophisticated and narrowly
11:23 am
focused activities. that is not true. i go back to my premise that gmail is not a safe haven. google is an international company. a lot of people -- >> google is a u.s. person. >> google is a u.s. person in certain circumstances. by the way, that is not their cable. it is a virtual cable that they use. i asked you the question, hotmail, gmail, safe havens? these are global e-mail providers that are used by everyone. is your theory that you cannot touch it because eric schmidt will be very mad? >> i want to allow another question, but, in one line, there is a long distance to go from saying that gmail should be a safe haven for terrorists and saying, on the other hand, that you should be, as the u.s. government, siphoning in all of
11:24 am
the content that goes across that table. including all the american communications. there is a room for gradation. >> there is. i just gave you the steps. not everything you collect is processed. not everything you process is reviewed. not everything you report is disseminated. >> a thing to point out that exists here -- the prism program , the first story i wrote about the nsa, gives the nsa more power than it ever has had to get gmail, all of the cool content -- the google content, from the providers, under an annual authorization from the court. it had quite a bit of latitude. it was not allowed to sift through everything in the server to see if there was anything that interested us.
11:25 am
that is what it is doing in the overseas collection. >> bart is right. binary is too strong of a word. there is a view of the world -- ayman nietzsche and -- a manichean view the world when it comes to american intelligence. there is protected communications and everything else. nsa has a lot more freedom of action going after communications. some europeans do not attach privacy to a particular sovereign. it is a more general human rights. i got it. that is a subject of discussion. the american approach to this and that it is a binary world. -- is that it is really a binary world. protected persons and persons who are not protected. nsa possibility to work over , but noter 12333 without congressional oversight, is really quite powerful.
11:26 am
>> let's take a question over here. >> this is something i heard about, reading the newspapers, about various governments trying to segregate their internets. i know china is doing this and germany is thinking about doing this. what effect would this have on the nsa possibility to collect information or, is such a thing even possible? can you cut off from the world internet? >> this is beyond my expertise. i have a few thoughts. first, there are a lot more people in countries talking hyperbolically about their desire to cut off the global internet and keep all their data at home than are actually taking steps to do it or will possibly do so. you are cutting yourself off from the world and it is damaging. it is not practical. there are countries that say google, yahoo!, all of the data produced by germans have to stay in german data storage and you
11:27 am
cannot go anywhere else in the world. certainly not the u.s. the fundamental structure of the internet does not allow that. there are countries like china or iran. or, at the extreme end, north korea. they want to cut themselves off from free debate and free information and are using the nsa as an excuse to strengthen that argument. in some ways, if it was possible, it would be cleaner. it would take us back to world war ii-era. you could break the german or japanese military code and it was a no-brainer. if you could do it, nobody would see any downside to it at all. this is a code being used exclusively on networks being used by the enemy, in a war. now, if you try to break encryption, everybody -- almost
11:28 am
everybody, uses the same stuff. and by the way, when there is stuff in the file that shows the nsa knows about this or that entity that has its own homebrew, we are not writing about that. we are writing about stuff that has general public interest. if you are breaking the encryption standard that run the internet because we want to get the bad guys, you are breaking everybody else's encryption. that is just the way, fundamentally, it works. >> a question here. >> thank you for coming. i am edmund sweeney. i am a freshman in the school of international service. i am a native of pittsburgh. >> philadelphia. we need a visa to go to philadelphia. >> i have one question in two parts. one for mr. gelman and one for general hayden. we talked about current and past. i want to talk about the future
11:29 am
. world of wikileaks and edward snowden now, and i do not think that will be going away. my question is, in the future, years, theme, 30, 50 increasing demand for transparency and this general sentiment and people like julian assange and edward snowden, what -- with the release of information, what implications does this have for the future of organizations like the nsa and cia and how they will deal with those problems. -- those problems, and how they might change as a result? for mr. gellman, how will the media respond and interact with this information? >> i will go first and go quick. we have to recruit for the generation that produced bradley manning and edward snowden.
11:30 am
that is just reality. that generation has a different compass to transparency than my generation. that is a reality. that is something my old community is going to have to deal with, particularly since one of the major muscle movements in my community has been to generalized sharing. we used to have a principle called "need to know." been0 or 11 years, it has "need to share." then you have snowden. this is hard. the other impact of this is that, when you undertake an espionage activity, you put what you can gain over here and what you can lose over there. let's talk about signal intelligence. what can i gain? i could hear the head of state. i could hear the head of state's personal views. that is really cool.
11:31 am
what could i lose? you could be embarrassed if that is public. you make that judgment. by the way, this hand is not a moral hand. it is a political and public-relations hand. this is what i would lose if it was made public. that actually gets multiplied by the likelihood it gets made public. factor of thel likelihood of signals intelligence being made public, particularly when it comes to grabbing a signal out of the air, it is zero. it is undetectable. therefore, although the gain over here might not have been massive, the potential loss is not measurable because you cannot figure out a way in which it becomes public. with edward snowden, that number over here will never be zero again. you have to factor in insider threat that makes operations known that the target nations are never going to detect.
11:32 am
that might be the strongest governor, brake on aggressive signals intelligence collection against some countries. not american guilt or friendship. it is that calculus. that law -- raw "national interest" calculus. there is another factor over here. >> i will also try to be brief. in july, a month after the revelations started, keith alexander was the director of the nsa and he gave a talk. he said that he wished he could bring every american into his huddle and tell them the plays he is calling. if he did, the bad guys would know. and so that is too dangerous.
11:33 am
that is true. it is true that if he reveals his capabilities, everyone can hear it all stop -- hear it. there is no encapsulated walled off communication in global affairs. it is also true that when we did find out what was happening inside of the huddle, a lot of americans do not like the place being called. that is among the reasons why the existence of a classified stamp does not end the inquiry for me when i am deciding that something should be public. there are all kinds of stuff that is classified that is self evidently trivial. i have in my position a navy laundry manual for how you wash clothes on warships that is stamped secret. i also have noticed that there are interesting variations on how classification works, depending on the forum. there is an internal nsa report.
11:34 am
i wrote about it. general hayden did not like my story at all. i talked about the number of compliance incidences, the nsa calls it, errors or violations of law. there are statistics. how many times do we have this compliance problem or that compliance problem. the internal report classified that as secret, which by definition means that it would do harm to national security if we knew the number of times they screwed up. that is hard to defend. when they report to congress, it is classified, top secret, special intelligence. therefore, 91% of all congressional staffers could not read it and it greatly restricted the oversight possibilities. so, the american public reacts when there is something that the u.s. government is doing and something they did not know they were doing.
11:35 am
something they might have accepted if they had known in advance. or if it had been openly debated. >> thank you. >> i want to return to the question of call-chaining. i want to ask general hayden is my understanding of multiplication is correct in the program. you mentioned 288 inquiries. >> yes. >> each of those, which until recently was three hops, a over -- three hops, over the year, 1000 is the first hop. the second would be a million. there is some overlap. i am extrapolating. not by orders of magnitude. i just wanted, if that understanding is correct -- if you are talking about three hops, you are talking about 288 things. you are talking about many, many millions. that is close to the totality of u.s. communications. >> i'm relying on statistics
11:36 am
that the former deputy director put out. in chris's words, and those inquiries, 600,000 numbers. i agree with you that that is not the right number of hops out. but, you know this is an , investigation. by the way it is just numbers. , no other identifying data is there. what they are looking for are not --s that may or may so, you have a spider chart. you have a number in buffalo. it is interesting when the second hop out of buffalo hits a second hop out of schenectady. that is why it is done. it is done as an investigative process. you are looking for linkages that might merit further investigation. >> chris inglis did not explain
11:37 am
what he meant by 6000. it is almost -- there is a saying in the newsroom that there is a danger when a reporter does arithmetic. but it is hard to imagine you can go even one hop, with on the order of 300 numbers, and touch only 600,000. that means you are multiplying by only that means that each 200. number called an average of less per year.erson this is what chaining is, from a non-computer science person. we have all heard of six degrees of separation. six degrees of separation on average. it is not just a play on a novel. it is important computer science theoretical work that was done. it said that the mean number of hops you have to do to touch every single person in the world, to touch from any one person to any other person, is six. let's suppose, more conservatively, the 300 people call 100 people a year and you multiply that by a hundred and
11:38 am
that by 100 and that by 100. i don't do math. i count on my fingers. that is close to one million. >> i do math. it is a lot more than 6000. >> it is. that does not mean they did chain 100 number from each of the 300 numbers. they also said that it was fewer than 300 numbers in one year and the numbers have varied from year to year. you can be confident that the numbers have not very downward. -- not very downward. the statements are perfectly consistent with the possibility that some other year they had 5000 seeds. they would not have lied if they said it this way, but that is the exact kind of massaging of data in public statements that they have done and in other demonstrable ways. >> my name is harry. my question is less technical.
11:39 am
it is for both of you were -- or neither of you. it seems obvious to the casual observer that, every time there is a national tragedy, there is a reaction within the populace and government for a -- where we give up liberty for security. the patriot act, the internment of japanese americans. obvious examples. it takes some time and society scales this back. is it concerning to both or either of you that, we could -- given multiple 9/11's in a short time, we could end up giving up a lot of liberty for security. whether or not you agree with the programs. >> thank you. right behind you? >> my name is sarah harvard.
11:40 am
i am an aspiring journalist. i go to school at the school of international service. my question has to do with journalism in light of edward snowden. we have seen glenn greenwald and james rosen accused of conspiring with whistleblowers. congressional members have question for them to be put to trial. i was wondering what your thoughts were on investigative journalism. and, do you think that press freedoms are under attack by the obama administration? >> i would jump in on 9/11. here is where i do my moral calculus. despite my professional role, we are all responsible for our actions as human beings. my great fear is that we did not use the authorities available to us right now. i used the metaphor that, this
11:41 am
is the box you want us to play in legally. articles raise issues about national debate. the nsa will say that they have two houses of congress, a president, a court that says it is good to go. until otherwise, they will play section 215 out to the edges. we are going to take the hops however many they take us. the background ethical argument for this is that, if we do not play with in this box and we fail and we have another catastrophic attack on the homeland, the box you will demand, not the one you will accept, the one you will demand will be out here. in a reverse psychology way, playing this aggressively with in the law of now is actually protection against dangers to
11:42 am
civil liberties in the future. >> do you share that? the concern that if any of these revelations make it easier for another terrorist attack on the u.s., that in the future it will perversely lead to demands for much greater surveillance? >> everybody wants to talk about terrorism. that is not -- that does not account for nearly anything close to the majority of intelligence gathering. there are a lot of purposes. it is an emotional trigger. you can talk about all of this stuff as counterterrorism. some of it is and some of it is not. our society has always had and -- had pendulum swings. it is a cliché. the difference is, what happens under the regime of extreme secrecy? when you intern every japanese
11:43 am
citizen of the united states, they are in big interment camps, and everybody knows it. you have announced it. and they were behind barbed wire and you can take pictures of them and look at your history books and there are the pictures. we know when we overreached and come to a decision after a certain span of time. we say, i do not like that picture and that was not the right thing to do. the supreme court reverses. when you are doing everything in secret or large parts of it in secret, it is hard to decide if you have gone too far. we are still now, all these years later, we are trying to resolve the torture debate. the senate intelligence committee has now voted to recommend for declassification hundreds of pages of the executive summary of a 6000 page report. they cannot publish their report under the current understandings of the way these things work and
11:44 am
there is no law that says that only the president is the five -- gets to decide what is classified. classification is the artifact of an executive order. congress could pass a statute on it. it just has not done so. in any case, we still do not know what happened. very fully, there are 6000 more pages of conversation that they want to have. as of this date, they are not allowed to publish. when you have taken steps like, let's collect all the content that flows across this cable or all of this data about the phone calls that you make or, allowing us to put communications in our repository. we will decide what we can look at and when. we have good motives, trying to protect you. we do not get to debate those things. we would not be having these conversations it not -- if not for edward snowden. if it were not for stories that
11:45 am
disclosed things the government intended never to disclose. >> i have one minor thought. those americans in the room, you are citizens of the nation with the most transparent intelligence community. there is no one near us. it does not make barton's argument that there needs to be more transparency. i agree that it does. you need to understand the baseline that you are working at. you have more information about your country's espionage than any other citizenry on the planet. >> let's take two questions over here and close that microphone. >> my name is james manning. my question piggybacks off of that well. we have heard about an overclassification of data and a shock reaction about sources and methods. my question is, how do we go about having that debate without compromising intelligence undertakings with the methods being used while avoiding
11:46 am
shocks? as mentioned here. i will let general hayden answer. >> yeah. >> actually, the two speakers before me cover the questions i would ask. if someone else, from this side -- >> you did not answer my question. >> the one about the journalistic -- i would be happy to answer. i got distracted. one, therenalistic are some alarming signs. there have been more probes from prosecutions under obama. everyone has read this. more than all previous presidencies combined. they have used aggressive means of surveillance against the associated press and fox news. their legal construct is that a leak of classified information is a counterintelligence problem.
11:47 am
counterintelligence is a legitimate foreign intelligence surveillance target. therefore, that makes reporters doing reporting legitimate targets of intrusive methods of electronic surveillance. i spent a lot of my time trying to protect the security of my communications. not only from the u.s. government. that is been in my threat model as a reporter for a long time. but also from the foreign governments that want documents that i have that should not be public. they might want to come get them. all of that being said, i am sitting on a stage, a free person and not in handcuffs having a civil conversation with general hayden. you can read the espionage act or various other statutes. there are ways to read them. there are available theories of prosecution under which i could be charged. it is not because we do not have laws to prosecute journalists.
11:48 am
it is because we have a legal and political norm in this country that says that this is a line that we do not want to cross without reasons very different from what we are seeing right now. and, so, by the way, when you ask about sanctions or controls on me, i am well aware that if i published a story that clearly and obviously led to a security disaster, that could change the legal and political norm according to which i am not charged with a crime. >> i wrote an op-ed for cnn.com on the investigations. i do not come out close to where bart -- quite where bart is, but i am closer than you might think. i thought that the prosecution of the nsa collapse under its own weight because of overreach. some things deserved response from the government. not that. i was troubled by the scattershot subpoena on the associated press and the
11:49 am
identification of rosen as a co-conspirator. that is someone of my background. transparency, how do you make that work? it is very hard. i do not have a good answer. we are going to have to -- the intelligence community has to be more transparent than it ever has before. if we are not, you are not going to let us do this stuff in the first place. caveat. one by doing this, we will make you more comfortable. but it is inevitable that we will make usa. -- make you less safe. that is the deal. >> thank you for coming. both the president and the congress in the usa freedom act and several other bills have introduced the special advocate. this is a privacy and civil liberties advocate that we -- that would be placed within
11:50 am
the fisa court. and some proposals of this, you would be granted powers to appeal to the federal courts. -- appeal decisions of the fifth court of appeals to the federal courts, potentially ending up in the supreme court. i was open to get your general thoughts and comments on this position, in general. the potential effectiveness and, also, whether you think the granting of standing was going too far. >> one more. >> hi. thank you for coming. my name is alejandro alvarez. i am a sophomore in the school for communication. dick cheney spoke at our campus. he said that he believed that 9/11 could have been prevented if the nsa had capabilities back then that it currently has. do you agree with this statement? why or why not?
11:51 am
>> there has been enormous amounts of scholarship on whether 9/11 could have been prevented with the technology of today. it has been fairly well established and is the view of the 9/11 commission that 9/11 could have been prevented with what they had then if they had used it as designed and had the coordination between the fbi and cia had gone as it should have. but that is sort of beyond my qualification to speak. the issue of the fisc advocate is also beyond my competence. i follow and have read a lot of opinions now. i have read some fisa requests in the past. any preceding before a mutual -- any proceeding before a neutral arbiter is going to be, in the long run, working better and better if there is a checking power and an advocate. we know that the fisa court has
11:52 am
of big a number decisions for the first time in its history that said certain very large-scale programs were lawful. before, it was only individual warrants. we know that the first time that that a federal judge considered that program in a contested legal proceeding, it was found to be unconstitutional. another one considered it shortly after and said that it was constitutional. that is the whole point. a contested perceiving tends to -- proceeding tends to bring out the best evidence. in principle, i would before bein principle, i would for that. >> advocate for individualized warrants.
11:53 am
we do that in the criminal system. number one, and happens less frequently. -- it happens less frequently. it has implications. you want the benefit of the avid -- adversarial process. with regard to 9/11 what vice , president cheney was referring to was two guys in san diego. we, at nsa, intercepted seven or eight phone calls from san diego to a safe house. -- safe house in yemen. clearly, the selector, the target, was the safe house in yemen. we detected the call. there was nothing in the physics of the intercept or in the content of the call that told us that these guys were making the call from san diego. we have people speaking arabic calling to a safe house in yemen. i think one of them his wife was
11:54 am
, pregnant and he was asking about her welfare. we intercepted seven calls and pushed up reports on intelligence. again, the content of the call in san diego. with the 215 program, when you go through the transom, the phone number in san diego races is hand. -- raises its hand. that is what the vice president was referring to. barton is right. there are other ways we could have done better prior to 9/11. saying that we could have done otherwise is like saying, all i want to do is when things close. -- is win games close. no coach has that as a game plan. i would like to have the additional capacity. >> when you say the number would have raised its hands under the 215 program --
11:55 am
>> the metadata would have recorded the connection between the u.s. number and the yemen number. >> thank you. we have two last questions. one here, and then here. >> my name is chris ayres. i am a sophomore in the school of public affairs. my question is for mr. gellman. you mentioned the data that you have to protect because you are a target for the u.s. and outside countries. what do you do with the data that you consider to be too important to publish? you delete the data? do you keep that? do you know what the other main receivers of this data have done? >> go ahead. >> for the final question, thank you very much for getting into the details of this program. to return more to where we started talking about, we talked about how radically data collection has expanded in the last decade. mr. gellman, you pointed us to
11:56 am
this intercepted between google centers and bulk data collection. since data collection has changed so much, should our concept of surveillance and what it means to be surveilled change? we were talking about data going from a public company -- private company. we, as americans, have enough our data to private companies will stop should that mean the -- to private companies. should that mean the same thing? >> security, for reasons that are obvious, i'm not going into all of the details. [laughter] as a general proposition, what i have done, with the benefit of the expertise of some of the best people in the world on this because they have been available, i have kept the material physically secure.
11:57 am
there are physical barriers as to where it is. it is on encrypted computers with the best modern encryption. it is now, when you get to if frontal attack on encryption, the encryption still stands against any country in the world and it never touches a network. it is on a computer that never touches a network. there are other things. i'm not going to go any further than that. i have, actually, the ironic thing is, i have been asking since the first day of last year, for the more secure way to communicate with the government when i tell them what i have each time i write a story. i say, i would like to tell you about this story. i'm telling you every single fact that i am contemplating publishing.
11:58 am
i want to understand whether it is correct, in the right context, if you want to tell me anything about the damage that might be done. i have said, it is crazy to have this conversation on an open phone line or e-mail. and, nine months later, they have not provided me with a secure means of having those conversations. it is as simple as a key that is not -- it is not bureaucratically or legally simple for them. and so we have these odd 17, andtions about page a squiggly looking shape in the bottom left and words that rhyme with each other. i'm -- literally, words that rhyme with each other on the page. so as to avoid putting an all out on open phone lines. there are ways that this could be better approached. >> let the record show that bart retains the data. just like nsa. [laughter] >> if you think that is the
11:59 am
same, we have more to talk about. >> on the last question on the , meaning of privacy in the digital age, in an age where every time anyone uses easy pass or goes shopping, giving all sorts of information to companies voluntarily. we are comfortable giving away tons of metadata and content of data as everyone who has ever gotten a pop-up ad after they have made an inquiry knows. does this change how we think about these topics at all? >> of course it does. privacy is the line we continually negotiate between ourselves as unique creatures of god and as social animals. and that line changes.
12:00 pm
i think it is rapidly changing now with the digital, interconnected age. it is a nightmare for security services in a democracy who are sworn to protect reasonable expectations of privacy when the reasonable expectations of privacy when the definition of reasonable is a movable feast within a broader culture. >> there are two things going on legally and conceptually, in terms of privacy. one is a third-party doctrine. i voluntarily told verizon, who i voluntarily transmitted my voice over communications that cross all sorts of other companies, therefore, i have no lawful or moral reason to believe that that is confidential. privacy is relational.