62
62
May 8, 2014
05/14
by
CSPAN2
tv
eye 62
favorite 0
quote 0
all that information is telephone message data. -- metadata.the half to keep that for a certain amount of time that the government should not have use of that or for the purpose of killing for the use of the estimated. i beg reid is better to that extent but we ought to keep it at the disposal of the government which is the entire purpose of the amendment. it is not mandatory so it is not the worst amendment in the world but the government does not own all your personal data and doesn't have a right to any of its. unless there is some relevance to the satisfaction it goes against the spirit of the bill but it does harm security and privacy and goes against the spirit of the bill. and i urge my colleagues to vote against this amendment. i yield back. >> first, before saying anything further to express my appreciation but most particularly to mr. sensenbrenner who has taken the whole issues so seriously i know the hours he has worked to approve the situation although i will have amendments that might improve the amendments to give him what he des
all that information is telephone message data. -- metadata.the half to keep that for a certain amount of time that the government should not have use of that or for the purpose of killing for the use of the estimated. i beg reid is better to that extent but we ought to keep it at the disposal of the government which is the entire purpose of the amendment. it is not mandatory so it is not the worst amendment in the world but the government does not own all your personal data and doesn't have a...
66
66
May 24, 2014
05/14
by
CSPAN2
tv
eye 66
favorite 0
quote 0
at which point my description of the 250 metadata program is over. -- 215. that's all nsa is allowed to do with the data. there is no data mining. are no powerful algorithms chugging through it trying to imagine relationships. it did that dirty number call someone in the united states? last year innocent seoul records in 22, hhs 13 number shortly but in 2012, nsa walked up to the transom and yell hey, anybody talk to this number? 28288 times. that still may offend you but that's not what was described over there. [applause] >> alexis, i mean, come back on the. he's describing in a fairly minimalist system. you and others have described something that's pretty maximalist and a pretty scary. who is right to? >> well, i mean, you could listen to the technologist about this but as a technologist i'm telling you, yes, that metadata poses a very series of threat to us because it is simply being gobbled up, suck it up without any concern for due process, without any concern for the fourth amount of the united states, without any concern for our rights to privacy. i
at which point my description of the 250 metadata program is over. -- 215. that's all nsa is allowed to do with the data. there is no data mining. are no powerful algorithms chugging through it trying to imagine relationships. it did that dirty number call someone in the united states? last year innocent seoul records in 22, hhs 13 number shortly but in 2012, nsa walked up to the transom and yell hey, anybody talk to this number? 28288 times. that still may offend you but that's not what was...
76
76
May 11, 2014
05/14
by
CSPAN
tv
eye 76
favorite 0
quote 0
all of that is telephone metadata. you can learn a lot from metadata about a person and in day their privacy tremendously. now, it is inevitable that the phone company has to keep that record for a certain point of time for billing purposes, but it is not inevitable that the government ought to have that or have use of that or that they should have it for longer than they decide they need to for the purpose of billing, for the inevitable purpose of the instrument, and this amendment says they really ought to. it does not mandate it, i agree, but it says that they really all of hisep it, and private data ought to be at the disposal ultimately of the government. this is the entire purpose of the amendment. i do not agree. again, it is not mandatory, so it is not the worst of men in the world, but it goes in the wrong direction, and it goes against the spirit of what we are trying to say, which is the government does not own all of your personal data. the government does not have the right to any of your personal data, fr
all of that is telephone metadata. you can learn a lot from metadata about a person and in day their privacy tremendously. now, it is inevitable that the phone company has to keep that record for a certain point of time for billing purposes, but it is not inevitable that the government ought to have that or have use of that or that they should have it for longer than they decide they need to for the purpose of billing, for the inevitable purpose of the instrument, and this amendment says they...
5,191
5.2K
May 24, 2014
05/14
by
CSPAN2
quote
eye 5,191
favorite 0
quote 9
terrorism, quote, "the government does not cite a single case in which analysis of the nsa's bulk metadata collection actually stopped a terrorist attack." a presidential review panel appointed by president obama of his closest aides, on december 18th issued a report saying, "our review suggests that the information contributed to terrorist investigations by the use of metadata was not essential to preventing attacks and could readily have been obtained in a timely manner
terrorism, quote, "the government does not cite a single case in which analysis of the nsa's bulk metadata collection actually stopped a terrorist attack." a presidential review panel appointed by president obama of his closest aides, on december 18th issued a report saying, "our review suggests that the information contributed to terrorist investigations by the use of metadata was not essential to preventing attacks and could readily have been obtained in a timely manner
59
59
May 24, 2014
05/14
by
CSPAN2
tv
eye 59
favorite 0
quote 0
at which point my description of the 215 metadata program is over. that's all nsa is allowed to do with the data. there is no data mining. there are no powerful algorithms chugging through it, trying to imagine relationships. it's, "did that dirty number call someone in the united states?" the last year for which nsa had full records is 2012 - i'll get the '13 numbers shortly - but in 2012 nsa walked up to that transom and yelled, "hey! anybody talk to this number?" 288 times. now that still may offend you, but that's not what was described over there. >> alexis, come back on that. [ applause ] i mean, he's describing in a sense a fairly minimalist system. you and others have described something that's pretty maximalist and pretty scary. >> yes. >> who's right? "who watches the watchers?" >> well, i mean you could listen to the technologist about this. as a technologist i'm telling you, yes, that metadata poses a very serious threat to us, because it is simply being gobbled up, sucked up, without any concern for due process, without any concern for t
at which point my description of the 215 metadata program is over. that's all nsa is allowed to do with the data. there is no data mining. there are no powerful algorithms chugging through it, trying to imagine relationships. it's, "did that dirty number call someone in the united states?" the last year for which nsa had full records is 2012 - i'll get the '13 numbers shortly - but in 2012 nsa walked up to that transom and yelled, "hey! anybody talk to this number?" 288...
2,454
2.5K
May 24, 2014
05/14
by
CSPAN2
tv
eye 2,454
favorite 0
quote 9
the answer to that is bulk collection of metadata. another issue that is out there prominently is nsa is mucking about in those global telecommunication grids with your to that, the answer to that is bulk collection and metadata. "proliferator terrorist narcotrafficker moneylaunderer e-mails coexisting with yours and mine" another issue that's out there prominently is, you know, nsa is mucking about in those global telecommunication grids that have your e-mails! no one complained when nsa was doing soviet strategic rocket forces microwave signals. well, the equivalent of those soviet microwave signals are proliferator terrorist narcotrafficker moneylaunderer e-mails coexisting with yours and mine out there in g-mail. and if you want nsa to continue to do what it was doing, or csec to continue to do what it's doing, what it had been doing to keep you safe, it's got to be in the stream where your data is. there's a couple other things too. after 9/11, the enemy was inside my country. that's the 215 program metadata, who might be affilia
the answer to that is bulk collection of metadata. another issue that is out there prominently is nsa is mucking about in those global telecommunication grids with your to that, the answer to that is bulk collection and metadata. "proliferator terrorist narcotrafficker moneylaunderer e-mails coexisting with yours and mine" another issue that's out there prominently is, you know, nsa is mucking about in those global telecommunication grids that have your e-mails! no one complained when...
58
58
May 23, 2014
05/14
by
CSPAN
tv
eye 58
favorite 0
quote 0
we committed to ending bulk metadata collection. we committed to providing more targeted, narrow authorities so as not to put america at risk. we committed to provide and even more robust judicial review that exists today and process for that program. and we committed to providing more transparency into the fisa process and the decisions of the foreign intelligence surveillance court. the revised u.s.a. freedom act accomplishes the same goals as well. the u.s.a. freedom act provides the meaningful change to the telephone metadata that members of the house have been seeking. if we had the fortune of having a commander in chief firmly dedicated to the preservation of this program, we may have been able to protect it in its entirety. with that not being the case, and i believe this is a workable compromise that protects the core function of a counterterrorism program we know has saved lives around the world. i urge members to support this legislation. i want to thank all of those who came together to forge something that has been certa
we committed to ending bulk metadata collection. we committed to providing more targeted, narrow authorities so as not to put america at risk. we committed to provide and even more robust judicial review that exists today and process for that program. and we committed to providing more transparency into the fisa process and the decisions of the foreign intelligence surveillance court. the revised u.s.a. freedom act accomplishes the same goals as well. the u.s.a. freedom act provides the...
138
138
May 15, 2014
05/14
by
ALJAZAM
tv
eye 138
favorite 0
quote 0
known as metadata, detailed like phone calls and the time the call was made. members of congress said he made the country more vulnerable for attack. >> the insight that theyer gaining are making our job. harder. >> reporter: last week the first possible indication that america's enemies were indeed responding to snowden. a boston based intelligence firm, al qaeda has a history of developing its own secrecy software. in the six years before snowden's leaks, al qaeda released only two encryption tools. within six months after snowden's leaks, there were six packages. >> the nsa has turned it into a giant surveillance platform. >> helped glenn greenwald review snowden's documents. he says the new encryption might assist the nsa. >> this is good news for nsa because now al qaeda operatives are using home made stuff they can break. >> first to reassure americans that nsa's metadata collection program is legal and not a threat to u.s. citizens. >> nobody is listening to your telephone calls. that's not what this program's about. >> president obama also appointed a
known as metadata, detailed like phone calls and the time the call was made. members of congress said he made the country more vulnerable for attack. >> the insight that theyer gaining are making our job. harder. >> reporter: last week the first possible indication that america's enemies were indeed responding to snowden. a boston based intelligence firm, al qaeda has a history of developing its own secrecy software. in the six years before snowden's leaks, al qaeda released only...
159
159
May 17, 2014
05/14
by
ALJAZAM
tv
eye 159
favorite 0
quote 0
that the national security agency are chronicles metadata, time and location of where the call was madetop intelligence officials and members of congress repeatly denounced snowden's allegations. >> going to school on u.s. intelligence sources methods and trade craft and the insights that they are gaining are making our job much, much harder. >> reporter: last week the first possible indication that american agencies were responding to snowden. the report that al qaeda is stepping up the pace of producing encryption software. in the six years before snowden's leaks, al qaeda reportedly released only go encryption tools. in the six months after snowden's revelations, there were six updates. helped glenn greenwald review snowden's secret documents. he says al qaeda's new encryption may in fact assist nsa. >> now these al qaeda operatives are making home made stuff they can break. >> first to reassure americans that nsa's metadata collection program is legal and not a threat to u.s. citizens. >> nobody is listening to your telephone calls. that's not what the program's about. >> reporter:
that the national security agency are chronicles metadata, time and location of where the call was madetop intelligence officials and members of congress repeatly denounced snowden's allegations. >> going to school on u.s. intelligence sources methods and trade craft and the insights that they are gaining are making our job much, much harder. >> reporter: last week the first possible indication that american agencies were responding to snowden. the report that al qaeda is stepping...
29,171
29K
May 14, 2014
05/14
by
KQED
quote
eye 29,171
favorite 0
quote 23
once you could do that, you could use that metadata to select the information from all those tens of terabytes going by. >> narrator: but to make sure the nsa would not spy on u.s.
once you could do that, you could use that metadata to select the information from all those tens of terabytes going by. >> narrator: but to make sure the nsa would not spy on u.s.
4,930
4.9K
May 21, 2014
05/14
by
KQED
quote
eye 4,930
favorite 0
quote 8
. >> the prism program is not about metadata. it's about content. it's the photos and videos you send. it's the words of your emails. it's the sounds of your voice on a skype call. it's all the files you have stored on a cloud drive service. it's content, it's everything. >> narrator: the president was on a fundraising trip in silicon valley.
. >> the prism program is not about metadata. it's about content. it's the photos and videos you send. it's the words of your emails. it's the sounds of your voice on a skype call. it's all the files you have stored on a cloud drive service. it's content, it's everything. >> narrator: the president was on a fundraising trip in silicon valley.
20,635
21K
May 14, 2014
05/14
by
KQED
quote
eye 20,635
favorite 0
quote 23
kotelly eventually rules that this is legal: that the nsa can indeed collect all of the internet metadata going to and from the united states. and they used this authority that previously was used to trace numbers going to and from a single telephone... for everybody. >> narrator: kollar-kotelly's secret ruling relied on a controversial interpretation of
kotelly eventually rules that this is legal: that the nsa can indeed collect all of the internet metadata going to and from the united states. and they used this authority that previously was used to trace numbers going to and from a single telephone... for everybody. >> narrator: kollar-kotelly's secret ruling relied on a controversial interpretation of
125
125
May 31, 2014
05/14
by
KPIX
tv
eye 125
favorite 0
quote 0
just metadata.s been a popular defense of the nsa surveillance program. but one that many computer scientists dispute. >> there will be quite a lot you can learn about the ordinary american. >> reporter: metadata includes details like the number dialed, the time of the call, and duration. just how sensitive is that information? according to research done by stanford ph.d. student jonathan mayer and his partner, very. they created an android appear metta phone that asks users to volunteer their phone records to learn what can be uncovered from metadata. more than 500 people signed up. >> we began by identifying the organizations associated with the phone numbers in our dataset and we did that primarily using phone books provided by yelp and by google totally public and easy to access. >> reporter: with the help of facebook's phone directory feature, people searched services and google more than 90% of the numbers were quickly identified. >> we noted when a business was a firearms dealer. we noted whe
just metadata.s been a popular defense of the nsa surveillance program. but one that many computer scientists dispute. >> there will be quite a lot you can learn about the ordinary american. >> reporter: metadata includes details like the number dialed, the time of the call, and duration. just how sensitive is that information? according to research done by stanford ph.d. student jonathan mayer and his partner, very. they created an android appear metta phone that asks users to...
98
98
May 22, 2014
05/14
by
CSPAN
tv
eye 98
favorite 0
quote 0
we committed to ending bulk metadata collection. we committed to providing more targeted, narrow authorities so as not to put america at risk. we committed to provide and even more robust judicial review that exists today and process for that program. and we committed to providing more transparency into the fisa process and the decisions of the foreign intelligence surveillance court. the revised u.s.a. freedom act accomplishes the same goals as well. the u.s.a. freedom act provides the meaningful change to the telephone metadata that members of the house have been seeking. if we had the fortune of having a commander in chief firmly dedicated to the preservation of this program, we may have been able to protect it in its entirety. with that not being the case, and i believe this is a workable compromise that protects the core function of a counterterrorism program we know has saved lives around the world. i urge members to support this legislation. i want to thank all of those who came together to forge something that has been certa
we committed to ending bulk metadata collection. we committed to providing more targeted, narrow authorities so as not to put america at risk. we committed to provide and even more robust judicial review that exists today and process for that program. and we committed to providing more transparency into the fisa process and the decisions of the foreign intelligence surveillance court. the revised u.s.a. freedom act accomplishes the same goals as well. the u.s.a. freedom act provides the...
1,631
1.6K
May 15, 2014
05/14
by
ALJAZAM
tv
eye 1,631
favorite 0
quote 2
it's known as metadata. details like the phone number called and the time and location of the call made. top intelligence officials and members of congress denounced edward snowden's actions, saying he made the snags vulnerable to attack -- nation vulnerable to attack. >>... the in sights gained are making our job harder >>> last week recollects a boston base collection firm reported that al qaeda is stepping up its base of producing encryption soft yair. in the six years before edward snowden's leaks, al qaeda released two encryption tools, within six months after the revelations there were three enciption packages. the n.s.a. turned the internet into a giant platform. >> harvard's bruce, helped glenn greenwald reduce the documents. he says the new enciption may assist the n.s.a. >> this is probably great news for the n.s.a. now the al qaeda operatives are using home-made stuff they can break. edward snowden's revelations are promptless actions first to -- prompting actions. first to reassure that the metad
it's known as metadata. details like the phone number called and the time and location of the call made. top intelligence officials and members of congress denounced edward snowden's actions, saying he made the snags vulnerable to attack -- nation vulnerable to attack. >>... the in sights gained are making our job harder >>> last week recollects a boston base collection firm reported that al qaeda is stepping up its base of producing encryption soft yair. in the six years before...
1,733
1.7K
May 14, 2014
05/14
by
KQED
tv
eye 1,733
favorite 0
quote 1
it's metadata on the 215 program. it has nothing to do -- >> woodruff: without using the word "215". >> okay, so the metadata program only has the two phone numbers, the date and time of the call. you can encrypt it but there's no other information other than the number and n.s.a. doesn't know who the number is. >> woodruff: seems to me you talked to people in the agency and out. there's this fundamental divide between those who say what's going on, what you just described, this non-personal sweep of collection of so-called metadata. >> right. >> woodruff: and on the other hand there are those who say, yes, they do that and they listen, they have the ability to listen in on the contents of phone conversations. >> you bring out a great point. you see where the confusion arises. they have the ability and could be doing this, but what every review group, congress and the courts found out, is they're not doing it, and if we do find it out, we hold them accountable. the is it cases is important to point that out. the churc
it's metadata on the 215 program. it has nothing to do -- >> woodruff: without using the word "215". >> okay, so the metadata program only has the two phone numbers, the date and time of the call. you can encrypt it but there's no other information other than the number and n.s.a. doesn't know who the number is. >> woodruff: seems to me you talked to people in the agency and out. there's this fundamental divide between those who say what's going on, what you just...
61
61
May 5, 2014
05/14
by
CSPAN
tv
eye 61
favorite 0
quote 0
the ones that generated the most controversy is the metadata program, where the nsa has been secretly collecting the phone records of basically all americans all the time. it turns out not quite all. they are missing the cell phone records. the idea is they are not listening to your phone calls but their computers no everybody you are calling. who you are calling, when you are calling, where you roughly were when you talked to them. when they for that is have a call: from someone they think is a foreign terrorist, then they want to know everyone i'm talking to, everyone i have been talking to to see if i am part of a terrorist network to see if some of those connections might connect to other terrorists and they may be able to break a plot early on. that has been hugely controversial because it has been pointed out by the civil libertarian that if the governor -- the government abuses these powers they can learn a great deal about us that we might not want publicly known. are defenders who say it is very well controlled, it has been authorized and supervised by the president, the exec
the ones that generated the most controversy is the metadata program, where the nsa has been secretly collecting the phone records of basically all americans all the time. it turns out not quite all. they are missing the cell phone records. the idea is they are not listening to your phone calls but their computers no everybody you are calling. who you are calling, when you are calling, where you roughly were when you talked to them. when they for that is have a call: from someone they think is...
98
98
May 21, 2014
05/14
by
CSPAN
tv
eye 98
favorite 0
quote 0
s -- ction of metadata is a can't continue. now, while i'm pleased that the chamber is taking up legislation that's aimed at reining in the n.s.a.'s activities, however, while this bill does take baby steps towards restoring some of americans' freedoms that are so inherently part of our constitutional system, i'm very disappointed that it doesn't require the government to fully meet this standard, nor does it resolve this issue in any way, shape or form for the american people. the u.s.a. freedom act curtails the n.s.a.'s ability to monitoring conversation and the legislative intent is clear. to prohibit the collection of bulk data, such as the type that was occurring under the secret program revealed by edward snowden. however, the language in the bill falls short of accomplishing that, and none of the amendments that were designed to improve this bill and make it work to secure our privacy rights were even allowed to be discussed under this rule here on the floor of the house, which is another reason this rule simply must be
s -- ction of metadata is a can't continue. now, while i'm pleased that the chamber is taking up legislation that's aimed at reining in the n.s.a.'s activities, however, while this bill does take baby steps towards restoring some of americans' freedoms that are so inherently part of our constitutional system, i'm very disappointed that it doesn't require the government to fully meet this standard, nor does it resolve this issue in any way, shape or form for the american people. the u.s.a....
64
64
May 16, 2014
05/14
by
BLOOMBERG
tv
eye 64
favorite 0
quote 0
one of the first reports i did in our new journalist adventure was with how the nsa uses metadata analysiso determine who should live and die through the drone program. yes, there are a lot of very sensitive documents in the archive that he gave us that go beyond surveillance. >> he described the last piece of material you released it will be like a firecracker, the great finale. >> right. >> what consequences will come from the great finale? >> if you look at the surveillance abuses of the past, the principal question has always been, on whom is the government spying domestically and for what reasons? who are their targets? that's the missing part of the puzzle in terms of the reporting, who specifically are the targets domestically, american citizens, u.s. persons legally inside the united states. the investigation and the reporting we are currently doing that i do think will complete the picture is to answer that question in a very comprehensive way. >> when will that happen? >> as soon as it's ready. if i give you a timeframe, my editor will murder me. i don't want to put that pressure
one of the first reports i did in our new journalist adventure was with how the nsa uses metadata analysiso determine who should live and die through the drone program. yes, there are a lot of very sensitive documents in the archive that he gave us that go beyond surveillance. >> he described the last piece of material you released it will be like a firecracker, the great finale. >> right. >> what consequences will come from the great finale? >> if you look at the...
51
51
tv
eye 51
favorite 0
quote 0
mexico the philippines and kenya however while the mystic program reveals the agency's pursuit of metadata in all those countries some will get has enabled the n.s.a. to also record the contents of nearly every conversation in the bahamas and one other unnamed country the n.s.a. tells our t. that its efforts are focused on ensuring the protection of the national security of the united states its citizens and our allies through the pursuit of valid foreign intelligence targets moreover all of the n.s.a.'s efforts are strictly conducted under the rule of law and provide appropriate protection for privacy rights in one of the documents the intercept acknowledged the n.s.a. boasts over boasts of being able to log over one hundred million calls per day i was joined earlier by author columnist and activist norman solomon and i first asked him what he makes of the n.s.a. recording of conversations of citizens in other countries. well it's another mosaic in a large picture that shows just how committed the u.s. government is using the n.s.a. to collect everything including the actual content of ph
mexico the philippines and kenya however while the mystic program reveals the agency's pursuit of metadata in all those countries some will get has enabled the n.s.a. to also record the contents of nearly every conversation in the bahamas and one other unnamed country the n.s.a. tells our t. that its efforts are focused on ensuring the protection of the national security of the united states its citizens and our allies through the pursuit of valid foreign intelligence targets moreover all of...
39
39
tv
eye 39
favorite 0
quote 0
s mass spying programs go way beyond the so-called metadata when it comes to international surveillance going to top secret documents obtained by journalist glenn greenwald and more poydras the n.s.a. is recording every single phone call on the island nation of the bahamas you heard me right and this is recording and storing the audio virtually every phone call made in the country of about three hundred seventy thousand people without the knowledge or consent of the government the program is called so malo get and allows the n.s.a. to store phone conversations for up to thirty days which agents can then go back and listen to at their leisure now along with the bahamas get has been employed in one other country that we know of however according to greenwald may mean that country is a security risk and could be the fatalities as she's decided to withhold its name yet wiki leaks has criticized greenwald decision as threaten to release the name of the other country although it's unclear whether wiki leaks actually have the documents to do so but for now here's what we do know so mall get is
s mass spying programs go way beyond the so-called metadata when it comes to international surveillance going to top secret documents obtained by journalist glenn greenwald and more poydras the n.s.a. is recording every single phone call on the island nation of the bahamas you heard me right and this is recording and storing the audio virtually every phone call made in the country of about three hundred seventy thousand people without the knowledge or consent of the government the program is...
146
146
May 29, 2014
05/14
by
MSNBCW
tv
eye 146
favorite 0
quote 0
that has occurred here and there's not one shred of evidence that the metadata has been abused, not onethe first document he disclosed was an order to verizon for phone records as congress harmon pointed out, that's the only thing -- 1.7 million other documents about the chinese military, about the north korean missile still and leadership intention and syrian regime and al qaeda. what does that have to do with american's fourth amendment privacy and civil liberties? absolutely nothing. everything he revealed was about our adversaries. for him to say i'm a patriot, no, he could have just raised that one issue and said i believe that one piece of the patriot act is being misinterpreted and then stopped. i think if he had done that, stood in the public square in america, i think people would give him a little more leniency. >> the president now has said it went too far and asked for changes. >> on that one issue. >> the house was voted -- >> on the other 1.7 million documents, no, snowden has not revealed anything that has to do with your privacy or congresswoman harmon's civil liberties.
that has occurred here and there's not one shred of evidence that the metadata has been abused, not onethe first document he disclosed was an order to verizon for phone records as congress harmon pointed out, that's the only thing -- 1.7 million other documents about the chinese military, about the north korean missile still and leadership intention and syrian regime and al qaeda. what does that have to do with american's fourth amendment privacy and civil liberties? absolutely nothing....
43
43
May 4, 2014
05/14
by
CSPAN2
tv
eye 43
favorite 0
quote 0
it's been revealed that nsa holds its stores a lot of metadata information, particularly metadata information on not only for its citizens, which legally they are allowed to do into infinity. we forget this. they can watch any foreigner as much as they want, however much they please. whatever signals they can intercept, they are allowed to buy a ball, but u.s. citizens. we forget exactly what i just talked about, at&t, verizon, your carrier has all of this data. dave atta for a long time and use it to market you. why would we be more comfortable with the private company like at&t and verizon exclusively holding that data and the government speaks to you a somewhat irrational fear. we are afraid of being misidentified are afraid of becoming a false positive to government and falling under the lens of government surveillance and been accused of something we didn't do. the ironic thing is the more data you have, the more likely you are to cut down a false positives. in fact, we're more likely to be identified as a potential customer of a product we may not actually want to but could be coerced i
it's been revealed that nsa holds its stores a lot of metadata information, particularly metadata information on not only for its citizens, which legally they are allowed to do into infinity. we forget this. they can watch any foreigner as much as they want, however much they please. whatever signals they can intercept, they are allowed to buy a ball, but u.s. citizens. we forget exactly what i just talked about, at&t, verizon, your carrier has all of this data. dave atta for a long time...
53
53
tv
eye 53
favorite 0
quote 0
would love to portray the collecting of metadata as unobtrusive and knock us far from the case besides being able to paint a very clear picture of a person by uncovering all their associations and interests just consider what former n.s.a. director michael hayden recently said we kill people based on their. sounds like a real innocent surveillance tactic to me but here's the thing thanks to a stunning new report by the intercept that we now know that at least some of the n.s.a.'s mass spying programs go way beyond the so-called metadata when it comes to international surveillance and a top secret documents obtained by journalist glenn greenwald and more poydras the n.s.a. is recording every single phone call on the island nation of the bahamas you heard me right this is recording and storing the audio virtually every phone call made in the country of about three hundred seventy thousand people without the knowledge or consent of the government the program is called so malo get and allows the n.s.a. to store phone conversations for up to thirty days which agents can then go back and lis
would love to portray the collecting of metadata as unobtrusive and knock us far from the case besides being able to paint a very clear picture of a person by uncovering all their associations and interests just consider what former n.s.a. director michael hayden recently said we kill people based on their. sounds like a real innocent surveillance tactic to me but here's the thing thanks to a stunning new report by the intercept that we now know that at least some of the n.s.a.'s mass spying...
151
151
May 23, 2014
05/14
by
MSNBCW
tv
eye 151
favorite 0
quote 1
under the bill the nsa may seek metadata from phone companies but only with a court order. it is the first legislative response to edward snowden's leaks. >>> billionaire dallas mavericks owner mark cuban. he has apologized to the family of trayvon martin for what some are calling racially insensitive comments he made in an interview with ink magazine. >> i know i'm prejudice. i know i'm bigoted in a lot of different ways. i've said this before. if i see a black kid in a hoodie at night on the other side of the street, you know -- on the same side of the street, i'm probably going to walk to the other side. if i see a why guy with a shaved head and lots of tattoos, i'm probably going to the other side. chances are there's part of me that takes in account race, gender, and age. i'm prejudice. other than safety issues, i try to always recognize and be self-aware that, you know, my stream of thought is never perfect. and i've got to be careful. >> he's taking heat for that. good morning, richard lui. >> all right. good to see you. we made it to friday. going to start with the
under the bill the nsa may seek metadata from phone companies but only with a court order. it is the first legislative response to edward snowden's leaks. >>> billionaire dallas mavericks owner mark cuban. he has apologized to the family of trayvon martin for what some are calling racially insensitive comments he made in an interview with ink magazine. >> i know i'm prejudice. i know i'm bigoted in a lot of different ways. i've said this before. if i see a black kid in a hoodie...
222
222
May 23, 2014
05/14
by
KNTV
tv
eye 222
favorite 0
quote 0
under the bill, the nsa may seek access to metadata from phone companies and others, but only with the court order. it is first legislative response to edward snowden's nsa leaks. critics say the bill is watered down and does not go far enough. dallas mavericks owner mark cuban apologized to the family of trayvon martin for what some are calling racially insensitive comments he made in an interview with "ink" magazine. >> i know i'm prejudiced. i know i'm bigoted in a lot of different ways. i said this before, if i see a black kid in a hoodie at night on the other side of the street, you know, i'm probably -- on the same side of the street, i'm probably going to walk to the other side of the street. if i see a white guy with shaved head and lots of tattoos, i'm going back to the other side of the street, right. if i see anybody that looks threatening, probably chances are there is part of me that takes into account race and gender and age. i'm prejudiced. but other than safety issues, i try to always catch my prejudices and recognize and be very self-aware that, you know, my stream of
under the bill, the nsa may seek access to metadata from phone companies and others, but only with the court order. it is first legislative response to edward snowden's nsa leaks. critics say the bill is watered down and does not go far enough. dallas mavericks owner mark cuban apologized to the family of trayvon martin for what some are calling racially insensitive comments he made in an interview with "ink" magazine. >> i know i'm prejudiced. i know i'm bigoted in a lot of...
51
51
May 23, 2014
05/14
by
CSPAN
tv
eye 51
favorite 0
quote 0
this goes beyond just the telephone metadata program. the prohibition will apply to all records, from e-mail communications to firearms purchase records to financial records. at the same time, the bill ensures the federal government continues to have the tools it needs to identify and intercept the tax. -- attacks. it will also guarantee transparency of our gathering operations. for example, it requires the federal government to report the number of orders issued annually. it also authorizes tech companies to publicly report national security request from the government to inform their customers. the terror threat is real and ongoing and we must always be aware of the threats we face. at the same time, congress must ensure our individual liberty is not sacrificed in the name of national security. the usa freedom act allen's is these concerns, protecting both -- balances these concerns, protecting both our individual liberty and safety. we will now hear from chairman sensenbrenner, a tireless advocate to and bulk data -- to end bulk data
this goes beyond just the telephone metadata program. the prohibition will apply to all records, from e-mail communications to firearms purchase records to financial records. at the same time, the bill ensures the federal government continues to have the tools it needs to identify and intercept the tax. -- attacks. it will also guarantee transparency of our gathering operations. for example, it requires the federal government to report the number of orders issued annually. it also authorizes...
654
654
May 14, 2014
05/14
by
KQED
tv
eye 654
favorite 0
quote 7
once you could do that, you could use that metadata to select the information from all those tens of terabytes going by. >> narrator: but to make sure the nsa would not spy on u.s. citizens, binney and the other analysts had built in privacy protections. >> it anonymizes who it's listening in on, unless there's a court warrant that makes the identity of that person clear. >> if you knew that it was u.s. person-related, it would be automatically encrypted. that was part of the design of thinthread. >> it had a data privacy section. that was working very well, protecting citizens and innocent people by encrypting the data and not allowing analysts to look at it even. >> narrator: drake was ecstatic. the experimental program could monitor massive amounts of data, but the encryption would protect the privacy of individual americans. he took it upstairs to the top deck. >> in those short days and weeks after 9/11, i put together a two-page classified implementation plan to put thinthread into the fight, and i presented it to maureen baginski. >> narrator: baginski was drake's immediate su
once you could do that, you could use that metadata to select the information from all those tens of terabytes going by. >> narrator: but to make sure the nsa would not spy on u.s. citizens, binney and the other analysts had built in privacy protections. >> it anonymizes who it's listening in on, unless there's a court warrant that makes the identity of that person clear. >> if you knew that it was u.s. person-related, it would be automatically encrypted. that was part of the...
123
123
May 22, 2014
05/14
by
FOXNEWSW
tv
eye 123
favorite 0
quote 0
it was 303-121, very strong bipartisan vote that metadata would be held privately by phone companies. supporters call it a good compromise between national security and civil liberties. senators are praising the bipartisan vote in the house but want to go further. you can expect as the senate works on this issue over the summer they're going to try to include more reforms. bret? >> mike, thank you. >>> the irs says it will probably make some changes to a proposed rule dealing with the political activities of tax exempt groups. the agency says it received more than 150,000 written comments on it. the irs is still dealing with the repercussions from a scandal over its targeting of conservative groups for special scrutiny. >>> russia is reportedly considering a deal to build up to eight more nuclear reactors for iran. reuters reports russia plans to sign a contract to construct two additional reactors at the site of the only currently working reactor, also built by russia. talks with western powers ended last week with little progress. the u.s. military says some of the 80 american drops
it was 303-121, very strong bipartisan vote that metadata would be held privately by phone companies. supporters call it a good compromise between national security and civil liberties. senators are praising the bipartisan vote in the house but want to go further. you can expect as the senate works on this issue over the summer they're going to try to include more reforms. bret? >> mike, thank you. >>> the irs says it will probably make some changes to a proposed rule dealing...
161
161
May 9, 2014
05/14
by
CSPAN
tv
eye 161
favorite 0
quote 0
workthin this framework we to accommodate the administration's request for a limited telephone metadata program. program may be used only for counterterrorism purposes. it will require a case by case judicial determination of articulatable tick suspicion above the government acquires a single call detail record. in this january 17 remarks at justice,tment of president obama observed that point oute right to that without proper safeguards, bes type of program could used to yield more information open our private lives and the door to more intrusive bulk collection perhaps in the future. we agree. we built those safeguards into proposal. and with the additional reporting declassification and transparency requirements, also bill, wein this believe the government would be hardill advised and pressed to attempt to expand this new authority beyond our narrow attempt. i believe that we have arrived at a compromise that represents thelegitimate consensus of congress and the support of the american people. there is certainly more work to do. in future hearings, we should take more time to examin
workthin this framework we to accommodate the administration's request for a limited telephone metadata program. program may be used only for counterterrorism purposes. it will require a case by case judicial determination of articulatable tick suspicion above the government acquires a single call detail record. in this january 17 remarks at justice,tment of president obama observed that point oute right to that without proper safeguards, bes type of program could used to yield more information...
122
122
May 11, 2014
05/14
by
CSPAN
tv
eye 122
favorite 0
quote 0
the president announced his desire to and the bulk collection of telephone metadata. in march, president obama outlined his proposal to allow access to non-content elephant records held by telephone companies. situation,mergency government would retain the access from with the pfizer court. access would only be within two hops of the selection term being used and the government's handling of any records it acquires would be governed by minimization procedures approved by the court. also correctly acknowledged that reforms to these programs must be implemented to legislation passed by congress. the house judiciary committee is taking the first important step toward his goal today. the terrorist threat is real and ongoing. cognizant of the threats we face. at the same time, congress must ensure the laws we have enacted are executed in a manner that protects national security while also protecting your civil liberties so we can re-create -- so we can regain the trust of the american people. i'm confident today the minute he -- the committee will do just that. i'm happy t
the president announced his desire to and the bulk collection of telephone metadata. in march, president obama outlined his proposal to allow access to non-content elephant records held by telephone companies. situation,mergency government would retain the access from with the pfizer court. access would only be within two hops of the selection term being used and the government's handling of any records it acquires would be governed by minimization procedures approved by the court. also...
104
104
May 29, 2014
05/14
by
FOXNEWSW
tv
eye 104
favorite 0
quote 0
metadata, and a lot of voice calls, and 250 million calls, they can gather at one time. what snowden was saying, whiching don't think he clarified it as specifically with other nsa programs. he said that the remote turning on of the phone and the camera is more targeted. but it's such a political hostile environment that anyone who sends political e-mails or tries to get money from donors or friends, and you think of someone in opposition who is in power, and it's kind of crazy that they have these tools at their access, and the laws are -- and guidelines are not necessarily -- >> we want these fancy gadgets and with the convince comes the compromise. >> we love the technology, absolutely, but we want to be able to trust the companies who are giving us this technology, but even their being compromised by the access the government has found. >> amazing, amazing, kennedy, the star, the show is the independents, they make you think about stuff that you probably have not thought about but you should. it's a great show. she is a great host. >> if we're not going to get in the
metadata, and a lot of voice calls, and 250 million calls, they can gather at one time. what snowden was saying, whiching don't think he clarified it as specifically with other nsa programs. he said that the remote turning on of the phone and the camera is more targeted. but it's such a political hostile environment that anyone who sends political e-mails or tries to get money from donors or friends, and you think of someone in opposition who is in power, and it's kind of crazy that they have...
363
363
May 22, 2014
05/14
by
FOXNEWSW
tv
eye 363
favorite 0
quote 0
it would end bulk collection of metadata on nearly every phone call placed in the u.s.. sandra, back to you. >> thank you, jon. we'll be watching. >> i may be outnumbered, but in terms of this story, hollywood is known for big stars with very big paychecks but it could be suffering from a gender pay gap. at least that is the question today. comedians, after can americans and bollywood star top 10 biggest paid actors. no women made the cut. jersey seinfeld, $101 million. tom cruise comes next and johnny depp and tyler perry closely after. i think there is one reason for this. it has absolutely nothing to do with the gender gap. i think we blame it on cinemagoers, predominantly men. big blockbuster action movies take all the money. that is led by male stars. of course they get paid more because that is how hollywood is tom nated. >> i have a different opinion on that. the average age of folks you saw, the top five actors with the largest net worth, all of them over the age of 44. most of them over the age of 50. if you were to go into the top 10, klimt eastwood makes the
it would end bulk collection of metadata on nearly every phone call placed in the u.s.. sandra, back to you. >> thank you, jon. we'll be watching. >> i may be outnumbered, but in terms of this story, hollywood is known for big stars with very big paychecks but it could be suffering from a gender pay gap. at least that is the question today. comedians, after can americans and bollywood star top 10 biggest paid actors. no women made the cut. jersey seinfeld, $101 million. tom cruise...
51
51
May 22, 2014
05/14
by
CSPAN
tv
eye 51
favorite 0
quote 0
and so the move to block the federal government from storing metadata and still allowing for them toable to set up under a fisa warrant a query through privately held data is the right way to go. it's a conclusion i drew early on in the many hearings i've been to, both classified and unclassified hearings. i quizzed the witnesses. i put my mark down on those committee hearings, but what happened was the process moved quickly and over a weekend there was an intense job to write a bill that turned into a substitute amendment and a debate in the judiciary committee referred over to select committee on intel, both committees acted quickly. i offered an amendment before the judiciary committee. it was voted on, but i have to say that in my opinion it was not considered in the fashion that would have allowed for the full judgment of the judiciary committee to weigh in. my amendment is set up that allows for the intelligence community to negotiate with the telecoms, the telecommunication providers for a period of time longer than required by the f.c.c. i think it's not possible for anyone w
and so the move to block the federal government from storing metadata and still allowing for them toable to set up under a fisa warrant a query through privately held data is the right way to go. it's a conclusion i drew early on in the many hearings i've been to, both classified and unclassified hearings. i quizzed the witnesses. i put my mark down on those committee hearings, but what happened was the process moved quickly and over a weekend there was an intense job to write a bill that...
67
67
May 23, 2014
05/14
by
LINKTV
tv
eye 67
favorite 0
quote 0
passed a diluted version of the bill to curb the nsa's dragnet surveillance by keeping telephone metadata and the hands of phone companies. the critics, including "the new york times" editorial board, say the bill has been so weakened under pressure from the obama administration that it could allow much of the bulk surveillance to continue. an analysis by "the washington one" found half of the hundred 52 lawmakers who cosponsored the original bill have turned against the latest version. republican congressman for jim sensenbrenner acknowledged some weaknesses. >> that me be clear, i wish this bill did more. amend toleagues who change this, i agree with you. the privacy groups who are upset about lost provisions, i share your disappointment. the negotiations for this bill were intense. we have to make compromises, but this bill still does deserve support. don't let the perfect become the enemy of the good. >> the senate has confirmed a judicial nominee who co-authored memos providing the legal justification for killing u.s. citizens abroad. david barron, former justice department official,
passed a diluted version of the bill to curb the nsa's dragnet surveillance by keeping telephone metadata and the hands of phone companies. the critics, including "the new york times" editorial board, say the bill has been so weakened under pressure from the obama administration that it could allow much of the bulk surveillance to continue. an analysis by "the washington one" found half of the hundred 52 lawmakers who cosponsored the original bill have turned against the...
77
77
May 12, 2014
05/14
by
CNBC
tv
eye 77
favorite 0
quote 0
a metadata, stock got destroyed do down. are there other names? i don't think i have to go back to twitter and guess the momentum will continue when fundamentals are slower. what's interesting for those stocks, alibaba. stocks got destroyed last week. opportunity in lots of place es. >> thank you. twitter having a big day today. bob peck on the show later today and upgraded the stock and can't wait to hear from bob. meanwhile, a jump in chinese stocks. let's go to dominic chu. steve was just talking about chinese internets. what are you thinking? >> it came roaring back. and surging amidst speculation the government will act to bolster financial markets. it was the biggest upside mover of chinese stocks in seven weeks. the chinese composite and hong kong both moved. check out the large fund, the fxi, up 2% today. you look at some of the u.s. listed charges stocks, internet stocks, baidu, yokoo sudu on the rise. and a real standard up 8% today. this stock just ipos last month, ten bucks a share and now fell on today's move. back to you guys. >> it'
a metadata, stock got destroyed do down. are there other names? i don't think i have to go back to twitter and guess the momentum will continue when fundamentals are slower. what's interesting for those stocks, alibaba. stocks got destroyed last week. opportunity in lots of place es. >> thank you. twitter having a big day today. bob peck on the show later today and upgraded the stock and can't wait to hear from bob. meanwhile, a jump in chinese stocks. let's go to dominic chu. steve was...
84
84
May 19, 2014
05/14
by
LINKTV
tv
eye 84
favorite 0
quote 0
of age in the era of the edward snowden documents of wikileaks, of government surveillance on the metadatasts and millions of people in this country and around the world, i would say that william worthy is the single most important journalists that they have never heard of. i think if bill worthy was a white journalist and had not been an african-american journalist, he would be much better known than he is right now. i actually came across william worthy by accident. i was researching the correspondence of david belanger who was one of the most famous .pacifists it was during the 1968 democratic convention in chicago. the correspondence between him and the founder of the catholic worker movement door the day, and of course it was founded in the 1930's with the anarchist, pacifist movement within the catholic church. and they both had traveled to in fidel early on castro's first few years in office following the cuban revolution of new year's. in the course of reading the correspondence between david dellinger and dorothy day, they were debating what the position of pacifists should be on
of age in the era of the edward snowden documents of wikileaks, of government surveillance on the metadatasts and millions of people in this country and around the world, i would say that william worthy is the single most important journalists that they have never heard of. i think if bill worthy was a white journalist and had not been an african-american journalist, he would be much better known than he is right now. i actually came across william worthy by accident. i was researching the...
113
113
May 28, 2014
05/14
by
MSNBCW
tv
eye 113
favorite 0
quote 0
the house just approved of going ahead with maybe ending bulk metadata.erent practice that probably wouldn't have happened if we didn't have these leaks. there's good in terms of the outcome, and wills some public opinion supporting that. what's the scope of the leaks that allow for that, and are we comfortable with that or do we need to say that is a crime? on one end of the spectrum maybe you have elsberg leaking documents. at the other end of the spectrum you have chelsea manning, leaking documents and unlocallieding everything she could on to a cd and just giving them to the public. edward snowden seems to be in between. glen and some of the journalists that have disgorged this information have leaked things like routine surveillance on unfriendly companies. stuff like intercepting the phones of russian officials. things that we kind of all know happens in the course of diplomacy and espionage. the question is for edward snowden and his supporters, why? why that as well? >> i think what bothers a lot of people is this idea that not only, you know, to
the house just approved of going ahead with maybe ending bulk metadata.erent practice that probably wouldn't have happened if we didn't have these leaks. there's good in terms of the outcome, and wills some public opinion supporting that. what's the scope of the leaks that allow for that, and are we comfortable with that or do we need to say that is a crime? on one end of the spectrum maybe you have elsberg leaking documents. at the other end of the spectrum you have chelsea manning, leaking...
47
47
May 22, 2014
05/14
by
LINKTV
tv
eye 47
favorite 0
quote 0
install them on internet service providers at the service provider and use them to scan and record metadataming into and out of the entire provider's network. presumably, filtering out and only recording and transmitting back the information that is related to the targeted account. in that statute is a technical assistance provision, which traditionally means identifying the line, providing physical access, helping the agency install the device. in my particular case, the agents believed that included the authority to demand my ssl encryption key. when i first appeared in court, the judge agreed with me that something as proprietary and secret as a private encryption key did not qualify as technical assistance. -- heat is important is said in that same hearing that that was why i signed a sea search warrant for that information. well, after that hearing, which i was forced to appear at without a lawyer because i wasn't given adequate time to find one who could legally di representing a courtroom, i was able to hire a lawyer and file a motion to quash that search warrant. we had a hearing on
install them on internet service providers at the service provider and use them to scan and record metadataming into and out of the entire provider's network. presumably, filtering out and only recording and transmitting back the information that is related to the targeted account. in that statute is a technical assistance provision, which traditionally means identifying the line, providing physical access, helping the agency install the device. in my particular case, the agents believed that...