83
83
Jul 29, 2017
07/17
by
CSPAN2
tv
eye 83
favorite 0
quote 0
we kill people based on metadata.metadata is data about data, data about where you are from and where you send a text message, where that messages sent. data they identify at time of day, the subject of the email and even the device use decided. state goes openly through selling fiber-optic networks, easily from ether and connected together and this data when process is algorithmically spoken for in ways you wouldn't want to speak. in the quotation that begins the chapter former and sat michael hayden alerts us to how metadata can be spoken for ask is, produced by a terrorist. that is was metadata can be compared against the pattern, that signature in the parlance of the us intelligence community and metadata fits within the signature of a terrorist template, one might find oneself at the end of a predator drone strike. his database attack is a signature strike. it's a strike that requires no target identification but rather an identification of quote, men who bear certain signatures or defining characteristics associ
we kill people based on metadata.metadata is data about data, data about where you are from and where you send a text message, where that messages sent. data they identify at time of day, the subject of the email and even the device use decided. state goes openly through selling fiber-optic networks, easily from ether and connected together and this data when process is algorithmically spoken for in ways you wouldn't want to speak. in the quotation that begins the chapter former and sat michael...
77
77
tv
eye 77
favorite 0
quote 0
it is just he metadata it is not your personal phone call and it might stop terrorism.booing] educate me. >> the government's collection of metadata is just as dangerous as its collection of content. if the government were collecting content i would think that that's a bad thing but metadata is actually bad. people need to understand with metadata they can figure out what you're doing throughout your life. they can figure out who you're calling. figure out whether you have a medical condition. think about all the phone records that you have and all of the ways in which the government can decipher based on who you're calling, when you're calling them and how long you're talking to them, what you're doing each day. john: fellow republican, former house intelligence committee chairman, said, this program is used to stop a terrorist attack in the last few years. people do want to kill us. >> there are people on the intelligence committee who will say just the opposite. who say that this program hasn't been effective. it is not useful. even setting all that aside, even if it
it is just he metadata it is not your personal phone call and it might stop terrorism.booing] educate me. >> the government's collection of metadata is just as dangerous as its collection of content. if the government were collecting content i would think that that's a bad thing but metadata is actually bad. people need to understand with metadata they can figure out what you're doing throughout your life. they can figure out who you're calling. figure out whether you have a medical...
27
27
Jul 9, 2017
07/17
by
BLOOMBERG
tv
eye 27
favorite 0
quote 0
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and government -- it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to stay one step ahead of the hackers who, frankly speaking, have gone from the guy in the basement, that is a hobbyist, to a sophisticated enterprise. and it takes all that we can do to do it, and we do not think our users should have to think through all of this stuff. it is not practical for people, and so we try to stand up for users and stay one step ahead of these guys. emily: you said cars are an area ripe for disruption. how important is it that apple not miss out on cars? ♪ emily: let's talk about the world's second-biggest economy, china. ho
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and government -- it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to stay one step ahead of...
47
47
Jul 2, 2017
07/17
by
BLOOMBERG
tv
eye 47
favorite 0
quote 0
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and government -- it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to stay one step ahead of the hackers who, frankly speaking, have gone from the guy in the basement, that is a hobbyist, to a sophisticated enterprise. and it takes all that we can do to do it, and we do not think our users should have to think through all of this stuff. it is not practical for people, and so we try to stand up for users and stay one step ahead of these guys. emily: you said cars are an area ripe for disruption. how important is it that apple not miss out on cars? ♪ emily: let's talk about the world's second-biggest economy, china. ho
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and government -- it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to stay one step ahead of...
73
73
Jul 13, 2017
07/17
by
KCSM
tv
eye 73
favorite 0
quote 0
that was a misreading of the metadata. metadata shows whoever sent it to her got interactive the from our site once we published it. in fact, the person who forged it, he said he took it from our site, put it into a photoshop erase our text and enter the text he erased. we published the documents are everyone can see it. it is a valid warning from rachel maddow to make sure we authenticate document as journalists we get in the mail, but i don't to get merited the strong any wonder that this is some highly sophisticated operation on the part of some high-level trump official to publishingedia into false stories. amy: just to be clear, because it is hard to follow this when you talk about metadata, you are talking about the document you posted online from an anonymous source, which many are saying was reality winner talking about voter information that was leaked, that that piece of paper that showed where it came from -- this is the whole controversy around the intercept posting the original online -- this forger took and t
that was a misreading of the metadata. metadata shows whoever sent it to her got interactive the from our site once we published it. in fact, the person who forged it, he said he took it from our site, put it into a photoshop erase our text and enter the text he erased. we published the documents are everyone can see it. it is a valid warning from rachel maddow to make sure we authenticate document as journalists we get in the mail, but i don't to get merited the strong any wonder that this is...
45
45
Jul 29, 2017
07/17
by
BLOOMBERG
tv
eye 45
favorite 0
quote 0
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and governments -- i mean, it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to try to stay one step ahead of these hackers that, frankly speaking, have gone from the guy in the basement that is a kind of hobbyist, to a sophisticated enterprise. and it takes all that we can do to do it, and we do not think our users should have to think through all of this stuff. it is not practical for people, and so we try to stand up for users and stay one step ahead of these guys. emily: you said cars are an area ripe for disruption. how important is it that apple not miss out on cars? ♪ emily: let's talk about the world's second-
because likely metadata exists.etadata, if you are putting together a profile, is very important. emily: can we assume that apple is always working to make encryption even stronger? tim: the reality is that the cyberattacks on people and governments -- i mean, it is happening left and right everywhere -- these affect your safety, your security. so it is not just privacy. it is not privacy versus security. it is privacy and security versus security. and so, we are always working to try to stay...
110
110
Jul 8, 2017
07/17
by
MSNBCW
tv
eye 110
favorite 0
quote 0
look at the metadata here. check this out in terms of timing. the suspect in the intercept leak goes to jail on saturday. gets arrested on saturday june 3rd. saturday, june 3rd, the fbi interviews and arrests reality winner, this nsa contractor. she has not -- she has been in jail since saturday, june 3rd. the intercept published they are story around 4:00 p.m. monday, june 5th. the foshlged document that we got sent to us appears to have been created in that narrow window of time between those two events. after reality winner got arrested and before the intercept published the document with its identifiable printer dots and the crease in the paper that appear to have been lifted off that same document that the intercept published. they were working from a document that was not yet publicly available. they would have started creating that file or they would have started that file after reality winner's arrest and before the intercept published it to everyone. then sent it to us two days later. from what we can see from the metadata, we believe t
look at the metadata here. check this out in terms of timing. the suspect in the intercept leak goes to jail on saturday. gets arrested on saturday june 3rd. saturday, june 3rd, the fbi interviews and arrests reality winner, this nsa contractor. she has not -- she has been in jail since saturday, june 3rd. the intercept published they are story around 4:00 p.m. monday, june 5th. the foshlged document that we got sent to us appears to have been created in that narrow window of time between those...
164
164
Jul 7, 2017
07/17
by
MSNBCW
tv
eye 164
favorite 0
quote 0
look at the metadata. the suspect on the intercept leak goes to jail on saturday, gets arrested on saturday, june 3rd. saturday june 3rd, the fbi interviews and arrests reality winter. she's pleaded not guilty but she's been in jail since saturday june 3rd. the intercept published their story two days later, around 4 p.m. that monday, june 5th. the forged document we got sent to us appeared to have been created in that narrow window of time after reality winter got arrested and after the intercepter published its documents. our document appears to be a cut and paste forgery derived from the intercept's document. we cannot know for sure. but if that is the case, then whoever did that work to create that forgery was cutting and pasting to create a document, working with a document that was not yet publicly available. they would have started creating that file or they would have started that file after reality winter's arrest and before the intercept published it to everyone and then sent it to us two days la
look at the metadata. the suspect on the intercept leak goes to jail on saturday, gets arrested on saturday, june 3rd. saturday june 3rd, the fbi interviews and arrests reality winter. she's pleaded not guilty but she's been in jail since saturday june 3rd. the intercept published their story two days later, around 4 p.m. that monday, june 5th. the forged document we got sent to us appeared to have been created in that narrow window of time after reality winter got arrested and after the...
48
48
Jul 31, 2017
07/17
by
CSPAN2
tv
eye 48
favorite 0
quote 0
metadata it is data about data l.i. query were from or where you send the text message it has identified through in the mail or the type of device you have used to send. so if they were plucked from the ethernet when processed it is spoken for ways to would not wanted to speak former chief michael hayden alerts to us how it could be spoken for as of produced by a terrorist and then to get that pre-existing pattern and that signature if it fits with did that signature of the terrorist template you define yourself a the end of a the predator drone strake that has no target of a vacation of the groups of men who have certain signatures associated with terrorist activity so with this in mind we call people that the war of terror does the rest so with the strong program the strikes were targeted with a suspected individuals to their voice or their name the and the drone operator blocks sit on that individual but in 2008 following the frustration from the pakistan me state policy the u.s. the changes the guidelines that only
metadata it is data about data l.i. query were from or where you send the text message it has identified through in the mail or the type of device you have used to send. so if they were plucked from the ethernet when processed it is spoken for ways to would not wanted to speak former chief michael hayden alerts to us how it could be spoken for as of produced by a terrorist and then to get that pre-existing pattern and that signature if it fits with did that signature of the terrorist template...
44
44
Jul 5, 2017
07/17
by
CSPAN
tv
eye 44
favorite 0
quote 0
that is the metadata. but they do not have the ability to turn over the messaging in and unencrypted form, or in some applications, the messages have whatsapp,d like under and there's nothing to turnover. with the government is arguing for and what this resolution is arguing for is that tech copies have to go further. they have to organize themselves so they have the ability to decrypt with a duplicate key all of the data that gets transferred so that they have the ability to store things that you think you have deleted so they can turn it over if there is a request. the fact of the matter is, under the constitution and the traditions of this country, we do not require people to organize their lives so they store everything they say and write so it can be available if somebody want to -- wants to come along later and investigate them. what are we talking about? in thet values constitution, we are talking about national security. if you open up the newspapers, what you see is you have foreign nature -- fore
that is the metadata. but they do not have the ability to turn over the messaging in and unencrypted form, or in some applications, the messages have whatsapp,d like under and there's nothing to turnover. with the government is arguing for and what this resolution is arguing for is that tech copies have to go further. they have to organize themselves so they have the ability to decrypt with a duplicate key all of the data that gets transferred so that they have the ability to store things that...
46
46
Jul 9, 2017
07/17
by
CSPAN
tv
eye 46
favorite 0
quote 0
that is the metadata. but they do not have the ability to turn over the messaging in and unencrypted form, or in some applications, the messages have whatsapp,d like under and there's nothing to turnover. with the government is arguing for and what this resolution is arguing for is that tech copies have to go further. they have to organize themselves so they have the ability to decrypt with a duplicate key all of the data that gets transferred so that they have the ability to store things that you think you have deleted so they can turn it over if there is a request. the fact of the matter is, under the constitution and the traditions of this country, we do not require people to organize their lives so they store everything they say and write so it can be available if somebody want to -- wants to come along later and investigate them. what are we talking about? in thet values constitution, we are talking about national security. if you open up the newspapers, what you see is you have foreign nature -- fore
that is the metadata. but they do not have the ability to turn over the messaging in and unencrypted form, or in some applications, the messages have whatsapp,d like under and there's nothing to turnover. with the government is arguing for and what this resolution is arguing for is that tech copies have to go further. they have to organize themselves so they have the ability to decrypt with a duplicate key all of the data that gets transferred so that they have the ability to store things that...
84
84
Jul 7, 2017
07/17
by
MSNBCW
tv
eye 84
favorite 0
quote 0
maybe the metadata has been faked or wrong in some way. i don't know. there are other things that are wrong in the document, too. that raised red flags for us. but they're subtle. there are little typos. there are some weird spacing that just doesn't look right. it has a date on it in terms of when in the future it can be declassified. that doesn't really make much sense if it was produced when they said it was produced. the big red flag for us is that the document we were given, this is part of what seemed to make it red-hot, it names an american citizen, the document we were sent which we believe to be a forgery names a specific person in the trump campaign as working with the russians on their hacking attack on the election last year. and the specific name of the trump campaign person is irrelevant. i'm not sharing it now because we believe from how the nsa works from multiple conversations with current and former officials, we believe a u.s. citizen's name would never appear in a document like this. even if the typos and the weird spacing and the ot
maybe the metadata has been faked or wrong in some way. i don't know. there are other things that are wrong in the document, too. that raised red flags for us. but they're subtle. there are little typos. there are some weird spacing that just doesn't look right. it has a date on it in terms of when in the future it can be declassified. that doesn't really make much sense if it was produced when they said it was produced. the big red flag for us is that the document we were given, this is part...
100
100
Jul 8, 2017
07/17
by
MSNBCW
tv
eye 100
favorite 0
quote 0
maybe the metadata itself is faked or is wrong in some kway. i don't know. there are documents that are subtle. little typos, there are some weird spacing, that just doesn't look right. it has a date on it in terms of when in the future it can be declassified, that doesn't really make much sense, if it was produced when they say it was produced. the big red flag for us is that the document we were given, this is part of what made it seem so red hot, it names an american citizen. the document we were sent, which we believe to be a forgery, names a specific person in the trump campaign as working with the russians on their hacking attack on the election last year and the specific name of the trump campaign person is irrelevant and we believe how the nsa works with multi-pell conversations we believe that a u.s. citizen's name would never appear in a document like this. even if the typos and the weird spacing and the other odd stuff had snuck through for some reason, an american citizens name would not have snuck through. not at this level of an nsa report. tha
maybe the metadata itself is faked or is wrong in some kway. i don't know. there are documents that are subtle. little typos, there are some weird spacing, that just doesn't look right. it has a date on it in terms of when in the future it can be declassified, that doesn't really make much sense, if it was produced when they say it was produced. the big red flag for us is that the document we were given, this is part of what made it seem so red hot, it names an american citizen. the document we...
47
47
Jul 13, 2017
07/17
by
CSPAN
tv
eye 47
favorite 0
quote 0
internet address that had been used in previous tax, the accidental inclusion of russian language metadatan some of the leaked files. the department of him at security issued an unusual public statement. -- the department of homeland security issued in any public statement. -- issued an unusual public statement. the report did not address the hacks of john podesta. this is "the washington post." a report they put together after the president was asked last week in poland about russian meddling. the headline is "here's the public evidence that supports the idea that russia interfered in the 2016 election." you can read it yourself. let's go to david in texas. david says no as well. tell us why, david. caller: i have a question for your viewers. , has thet to question united states ever interfered in a foreign election? is infamousd states for interfering in foreign elections, the washington post, -- everyage organization under the sun puts together these conspiracy from supposedly neutral or unbiased newspapers. they don't even exist anymore. journalism in this country has become a joke. yo
internet address that had been used in previous tax, the accidental inclusion of russian language metadatan some of the leaked files. the department of him at security issued an unusual public statement. -- the department of homeland security issued in any public statement. -- issued an unusual public statement. the report did not address the hacks of john podesta. this is "the washington post." a report they put together after the president was asked last week in poland about russian...
74
74
Jul 16, 2017
07/17
by
CSPAN2
tv
eye 74
favorite 0
quote 0
. >> a metadata is a level playing field. and the cable they can enjoy the advantage and with public opinion but to what joy that strategic advantage , it is about building that strategy for the future with the president or a senator so far these political debates are all a round of the short-term or with those midterm elections that is not the way to move forward such a combat that comprehensive vision of the future. because we can make it happen and looking for a long term strategic solutions to the problems that are popping up all the time. >> i will take the opportunity to quote from your book that you trust job people growing up with technology to be smart about this and your advice is a hope you'll take this as an invitation to take an active role to create the future you want to seek. >> i a appreciated to and how that changes that in the wrong direction. >> a kid to do gary kasparov of. [applause] former world the chess champion and author of the new book and keep thinking. -- a deep thinking also thinks for your grea
. >> a metadata is a level playing field. and the cable they can enjoy the advantage and with public opinion but to what joy that strategic advantage , it is about building that strategy for the future with the president or a senator so far these political debates are all a round of the short-term or with those midterm elections that is not the way to move forward such a combat that comprehensive vision of the future. because we can make it happen and looking for a long term strategic...
43
43
Jul 9, 2017
07/17
by
BLOOMBERG
tv
eye 43
favorite 0
quote 0
some headwinds for metadata. let's put the trade story aside for a second and go to geopolitics.eaders aren some pointing to. they have been able to secure deals when it comes to syria, for example. those are expected to come into effect. how will that change the course of the syrian conflict? what are the wider implications for the region? jean-paul: the optimist in me would hope that would be quite positive for syria, but this is a crisis that has been going on 2011. geopolitics, it is just the cost of doing business in the middle east, and not just syria, it is libya, iran and qatar now, as well. i think investors with exposure to the middle east are custom to -- are accustomed to geopolitical risk. we just hope for the best. tracy: we've seen cease-fire agreements and syria before, one thing that makes this agreement slightly more interesting is the idea of a soft partition of creatingd maybe by de-escalation zones, you see different geopolitical powers a sickly lay claim -- basically lay claim to the region. is that something investors should be watching? jean-paul: a partit
some headwinds for metadata. let's put the trade story aside for a second and go to geopolitics.eaders aren some pointing to. they have been able to secure deals when it comes to syria, for example. those are expected to come into effect. how will that change the course of the syrian conflict? what are the wider implications for the region? jean-paul: the optimist in me would hope that would be quite positive for syria, but this is a crisis that has been going on 2011. geopolitics, it is just...
142
142
Jul 9, 2017
07/17
by
CNNW
tv
eye 142
favorite 0
quote 0
all of these suspicious meetings that they picked up by metadata, whether in prague, the netherlands and on and on, i mean, we are beyond the just smoke phase. it's starting to look like the fire. and no one has come forward, the trump administration, and explained this, or explained payments going to man jaesafort millions and millions of dollars. we haven't even gotten to the deutsche bank money going into the trump business empire, and on and on and on. it just gets worse and worse. we call it a drip drip drip. the question is, when are we going to declare it. the sooner the better. otherwise this president simply can't represent this country until it's cleared up. >> a spokesperson for trump's legal team says that they believe it could have been an effort to create an appearance of inappropriate connections between the trump and his family members and russia. the quote i have to read you is, we have learned from both our own investigation and public reports that the participants in the meeting misrepresented who they were, and who they worked for. again, this is the spokesman for
all of these suspicious meetings that they picked up by metadata, whether in prague, the netherlands and on and on, i mean, we are beyond the just smoke phase. it's starting to look like the fire. and no one has come forward, the trump administration, and explained this, or explained payments going to man jaesafort millions and millions of dollars. we haven't even gotten to the deutsche bank money going into the trump business empire, and on and on and on. it just gets worse and worse. we call...
87
87
Jul 15, 2017
07/17
by
CNNW
tv
eye 87
favorite 0
quote 0
it, and he will, because he's going to get their phone calls before, after any contacts made, the metadata and a good investigator properly motivated will get to the bottom of this story. >> do you think mueller will be interviewing people on the russian side of the meeting as well? >> i don't think we'll ever see them again. they have a lot to say. i don't think they're going to show up in the united states. this clearly -- i'll go back again and say with almost 100% certainty, this was a russian intelligence operation run out of the kremlin. it has all the hallmarks. you know, can i prove it right now? no. but it certainly looks that way. >> again, you have that experience of a cia cop ratiope. what you just said is what we heard earlier. so you guys are saying the same thing. there is a lot of focus on donald trump jr. specifically because he is the one who was the connector in this meeting. but jared kushner was at that meeting, too. he actually works in the white house as we speak. do we need to hear from kushner himself? >> jared kushner's presence at this meeting makes it more probl
it, and he will, because he's going to get their phone calls before, after any contacts made, the metadata and a good investigator properly motivated will get to the bottom of this story. >> do you think mueller will be interviewing people on the russian side of the meeting as well? >> i don't think we'll ever see them again. they have a lot to say. i don't think they're going to show up in the united states. this clearly -- i'll go back again and say with almost 100% certainty,...
73
73
Jul 1, 2017
07/17
by
CSPAN3
tv
eye 73
favorite 0
quote 0
[applause] this holiday weekend on american history tv on c-span3 metadata clock p.m. eastern on the civil war -- historians discuss new york city during the civil war. and 1863 draft riots. >> these draft riots really were a kind of organic perfect storm of resentment that had been building maybe for half a century. john, you were saying that this is not so much an irish riot or ethnic right, but a working men's right. >> philip lee discusses locations associated with george washington, including riverfront land on virginia's northern neck. >> george corbyn washington had sold the property off. there were still family stories about the land, but they were getting fewer. the washingtons themselves were living further away. it is sort of a retreat. there wasn't a lot on the land to recall where the buildings were. >> monday at 8:00 p.m. eastern, the 1977 documentary men of bronze about soldiers in the all-black 369 u.s. infantry regiment known as the harlem health fighters. -- harlem hell fighters. rifles.anteens, our and our helmets. these are french helmets my instead
[applause] this holiday weekend on american history tv on c-span3 metadata clock p.m. eastern on the civil war -- historians discuss new york city during the civil war. and 1863 draft riots. >> these draft riots really were a kind of organic perfect storm of resentment that had been building maybe for half a century. john, you were saying that this is not so much an irish riot or ethnic right, but a working men's right. >> philip lee discusses locations associated with george...
48
48
Jul 1, 2017
07/17
by
CSPAN
tv
eye 48
favorite 0
quote 0
still don't know the nationality or location of the individual because all you have is electronic metadata and it takes individualized research to figure out the location and the identity of those people, is that also correct? >> that is also correct, yes. sen. whitehouse: so in order to find out who was swept up in this, what you would need to do is to look at your roster of legitimate 702 targets, query every single person they have been in touch with, which would reasonably be a massive undertaking, then do address by address to figure out who was on american soil at a given time. is that the problem to this? >> that is right. there is often not a lot of electronic information to determine who they are or where they are. sen. whitehouse: and the fact data has beenthe sitting in a place where no one has looked at, if we pull up that data to look at this count, that is looking at their privacy in another way. there are human eyeballs on that , whereas before, they were just in electronic database and may have never turned up to any human eyeball. >> correct. we would have to do research o
still don't know the nationality or location of the individual because all you have is electronic metadata and it takes individualized research to figure out the location and the identity of those people, is that also correct? >> that is also correct, yes. sen. whitehouse: so in order to find out who was swept up in this, what you would need to do is to look at your roster of legitimate 702 targets, query every single person they have been in touch with, which would reasonably be a...
60
60
Jul 5, 2017
07/17
by
CSPAN3
tv
eye 60
favorite 0
quote 0
still don't know the nationality or the location of an individual because all you have is electronic metadata. and it takes individualized research to figure out the location and the identity of those people. is that also correct? >> that is often correct. >> okay. so in order to figure out who is so-called swept up in all of this, what you would need to do is look at your roster of legitimate 702 targets, query every single one of them, for everybody they have been in touch with, which would presumably be a massive undertaking, and then do the address by address individual identification to figure out which ones were americans or on american soil at the time. is that the problem of trying to get to this? >> i think that is right. oftentimes, there's no electronic information to understand, for the other commune -- communicants, who they are. >> and the privacy of suddenly we started pulling up that stuff to do this count, that is actually looking into their privacy in a different way. whereas before, they were just in an electronic database. they may have never turned up to any human eyeball
still don't know the nationality or the location of an individual because all you have is electronic metadata. and it takes individualized research to figure out the location and the identity of those people. is that also correct? >> that is often correct. >> okay. so in order to figure out who is so-called swept up in all of this, what you would need to do is look at your roster of legitimate 702 targets, query every single one of them, for everybody they have been in touch with,...