262
262
Aug 26, 2010
08/10
by
CNN
tv
eye 262
favorite 0
quote 0
ask wanda about working for the nsa, the national security agency. you? >> i worked for the nsa.. top secret clearance, all that stuff. >> larry: doing what? >> i have a degree in marketing so i was a procurement specialist. basically i shopped all day. just bought things. >> larry: what did you procure? >> anything from, like, office furniture to, like, you know, intel equipment. >> larry: what do they do at the nsa? >> basically, they collect intelligence. yeah. they didn't get much from me. you know. >> larry: adjacent to the cia? yes, cia, they're more with people. you know. yeah. and nsa is more with -- >> larry: nsa is equipment. >> yeah. >> larry: and you were a procurement officer. it sounds raunchy. anyway -- >> raunchy? i wasn't buying hookers. >> larry: i don't know what you procure. in another tweet. >> i was a -- yeah, larry. >> larry: what are your hopes for prop 8 reaching the supreme court and what -- you think eventually we're going to have gay marriage in america? >> yes, i do. i mean, i did -- the team we have, you know, fighting it now, mr. olson, it's -- i th
ask wanda about working for the nsa, the national security agency. you? >> i worked for the nsa.. top secret clearance, all that stuff. >> larry: doing what? >> i have a degree in marketing so i was a procurement specialist. basically i shopped all day. just bought things. >> larry: what did you procure? >> anything from, like, office furniture to, like, you know, intel equipment. >> larry: what do they do at the nsa? >> basically, they collect...
108
108
Aug 26, 2010
08/10
by
CSPAN
tv
eye 108
favorite 0
quote 0
in particular, what should the role of the nsa be? the aclu got a view is an cessation not get anywhere near civilian cyber security. it is a military organization, publicly accountable, a record of illegal interference in private -- publicly unaccountable. it has the mission of spying and the defending networks. we cannot have confidence that if it, for example, discovers a certain vulnerability that it will spread to give award to millions of people to fix that will vulnerability when it is tempted to keep that vulnerability see the so it can exploit it for spying. defenders of the nsa says they bring two things to the table. they have a tremendous center of expertise in server security and the u.s. government, and i say if that is the case then that expertise it needs to be spun off to another institution that does not have the club -- conflicting roles, not part of the military and does not have the tremendous history and institutional culture of reflexive secrecy. number two, defenders say, well, the nsa has access to a lot of se
in particular, what should the role of the nsa be? the aclu got a view is an cessation not get anywhere near civilian cyber security. it is a military organization, publicly accountable, a record of illegal interference in private -- publicly unaccountable. it has the mission of spying and the defending networks. we cannot have confidence that if it, for example, discovers a certain vulnerability that it will spread to give award to millions of people to fix that will vulnerability when it is...
214
214
Aug 31, 2010
08/10
by
CSPAN
tv
eye 214
favorite 0
quote 1
in particular, what should the role of the nsa be? role of the nsa be?
in particular, what should the role of the nsa be? role of the nsa be?
174
174
Aug 31, 2010
08/10
by
CSPAN
tv
eye 174
favorite 0
quote 0
defenders of the nsa says they bring two things to the table. they have a tremendous center of expertise in server security and the u.s. government, and i say if that is the case then that expertise it needs to be spun off to another institution that does not have the club -- conflicting roles, not part of the military and does not have the tremendous history and institutional culture of reflexive secrecy. number two, defenders say, well, the nsa has access to a lot of secret threat signatures. that may be true but we don't know because of their secrecy to the extent it is true so we can judge the benefits and costs. but if you take all of the different threat signatures and knowledge of different cyber security threats, there is some subset of those in -- by an essay and a subset of the nsa was that they must keep secret that opposed to the ones they habitually keep secret but could share without harm. that subset of the subset, how big of an advantage are we getting from this and as a secret intelligence about cyber threats -- nsa cigarette in
defenders of the nsa says they bring two things to the table. they have a tremendous center of expertise in server security and the u.s. government, and i say if that is the case then that expertise it needs to be spun off to another institution that does not have the club -- conflicting roles, not part of the military and does not have the tremendous history and institutional culture of reflexive secrecy. number two, defenders say, well, the nsa has access to a lot of secret threat signatures....
274
274
Aug 9, 2010
08/10
by
CSPAN
tv
eye 274
favorite 0
quote 0
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject matter of deterring or stopping terrorism. guest: that is a great question. you use the phrase "co-mingling mingling database systems." when something happens, we often hear about the failure to share. i think you are referring to how much we are willing to share information. frankly, we shared better, certainly than prior to the 9/11 attacks, but there are some fundamental issues here. it is unlawful to use information for purposes other than which the information was originally acquired. so beyond some bureaucratic inertia, which i believe we have largely overcome, there are policy issues that cannot allow you to dump this into one common data base and have everyone playing in the s
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject matter of deterring or stopping terrorism. guest: that is a great question. you use the phrase...
191
191
Aug 10, 2010
08/10
by
CSPAN
tv
eye 191
favorite 0
quote 0
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject matter of deterring or stopping terrorism. guest: that is a great question. you use the phrase "co-mingling mingling database systems." when something happens, we often hear about the failure to share. i think you are referring to how much we are willing to share information. frankly, we shared better, certainly than prior to the 9/11 attacks, but there are some fundamental issues here. it is unlawful to use information for purposes other than which the information was originally acquired. so beyond some bureaucratic inertia, which i believe we have largely overcome, there are policy issues that cannot allow you to dump this into one common data base and have everyone playing in the s
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject matter of deterring or stopping terrorism. guest: that is a great question. you use the phrase...
241
241
Aug 10, 2010
08/10
by
CSPAN
tv
eye 241
favorite 0
quote 0
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject tter of deterring or stopping terrorism. guest: that is a great question. you use the phrase "co-mingling mingling database systems." when something happens, we often hear about the failure to share. i think you are referring to how much we are willing to share information. frankly, we shared better, certainly than prior to the 9/11 attacks,ut there are some fundamental issues here. it is unlawful to use information fo purposes other than which the information was originally acquired. so beyond some bureaucratic inertia, which i believe we have largely overcome, there are policy issues that cannot allow you to dump this into one common data base and have everyone playing in the same t
he was on my advisory board at nsa while he was out of government. we go back a long way. moscow we have lot -- host: we have lots to talk about regarding security, wikileaks, security. let's begin with the first phone call. patrick in west valley, utah. caller: i was wondering if anything has been done in a reference to combing data base systems -- co-mingling database systems in the subject tter of deterring or stopping terrorism. guest: that is a great question. you use the phrase...
268
268
Aug 10, 2010
08/10
by
KRON
tv
eye 268
favorite 0
quote 0
you're still seeing some companies out there been a nice, easy ride the train ran nsa 21 minutes on yournovato and the city limits. wrapping up with a shot of the james lick traffic is moving just fine in the southbound, he's done directions just fine, run the city and towards sfo. james. >> thank you, let us go back outside i think we have live pictures from jackie sissel shot out and alameda. there we have it. san francisco's firewater about is now on the scene you can see a bird soaring to water. that year as been on fire for least the better part of the half-hour they belonged we've been waiting for san francisco fired two or ride on the scene. to get water on the part of that year that is burning. now that the fire is on the scene we're back to start to douse the adapter hopefully that will make short order and quick work during this fire out. there is water is now arriving where it needs to be, and looks like the water that was coming from the fire truck has been stopped i do not see that shooting from the rights of the screen anymore. this is a developing story san francisco fire
you're still seeing some companies out there been a nice, easy ride the train ran nsa 21 minutes on yournovato and the city limits. wrapping up with a shot of the james lick traffic is moving just fine in the southbound, he's done directions just fine, run the city and towards sfo. james. >> thank you, let us go back outside i think we have live pictures from jackie sissel shot out and alameda. there we have it. san francisco's firewater about is now on the scene you can see a bird...