comparemela.com

Card image cap

Prudence and theres great work to change the way we finance our campaigns so that candidates and elected officials are more responsive to the people that they are hoping theyll be elected to represent. So and theres more. Their efforts to expand run off voting and implement voter registration. Theres work being done. We have to make sure we are engaging the 85 of americans and i bet you right now we are only engaging a number of that. Even in the last year, theres the largest i forgot the term. The largest civil disobedience in congress ever not just in democracy ever and we had hundreds of people getting arrested, so 1300. Were you one of them . Great. I think there is promise and theres hope. Ultimately people power will outnumber the very, very wealthy that want to keep that want to keep control of their power and the more we are able to organize and activate, the 85 of us out there, i think, will see change. Thats a great point. Whenever they want to ask, do you want to make it easier to vote, more early voting days, easier to register to vote, do you want absentee voting, do you want to be able to register online its always very popular, all of these prodemocracy reforms are very popular whereas on the other side the people that are passing voter id laws and restriction laws are having to do it mostly under the radar because they know when polls may show people support voter id because people dont understand it that well, once there becomes debate in media and people dont like it. People like democracy. They want more of it. Thats why im in the end despite of assaults hopeful on this stuff. All right, so i wanted to give it up for zach ross. Thank you very much for joining us today. [applause] i really cant say enough about the book for anybody who personally know me, i dont read that much. I read this in a couple of days. I loved it. It was awesome. It really is a great comprehensive overview of the state of our democracy, not just today but throughout history and after i read it, i thought everyone i know should be reading this. Please, i encourage you. You can purchase the book out of the bookstore and zach will be signing books right here today and we appreciate all of you coming. Thanks to ronna and every voice. [applause] [inaudible conversations] and here is a look at upcoming book fairs and festival happening around the country. Next saturday book tv is live from madison for the wisconsin book festival. Look for author discussions with prize winner discussing career of scott walker. On saturday october 29th. Its the louisiana book festival held in bat own rouge at the state capital. Coming up in november live from usa tin to the texas book festival with the likes with likes of alberto gonzalez, Colombia University law professor and orange is the new black actress dian guerrero. Later in november book tv will be live from the miami book fair, thats november 19th and 20th, our coverage include author discussion and columns including senator bernie sanders, fox news host dana parino and for more information about the book fairs and festivals book tv will be covering and watch previous festival coverage, click the book fairs tab on our website booktv. Org. You guys all set . I wish i was. Hey, everybody, welcome to the noon panel, it is called security without backdoors, the future of digital privacy. We have an amazing panel. People who youve probably read, pe people who have been on my podcast. Im host a podcast called note to sell. Thats my biggest fan on the front row and its not my mom, so what we do on note to sell is we look at how technology is changing human behavior, sociological look on it and its becoming large parts of our behavior, what we buy, how wer download, how we are in touch with loved ones and how we do everything. Before i begin i have been instructed to tell you that the books by three authors can be purchased by barns noble immediately and they will be signing books in front of the billing. Okay, so i want to ask, how many of you are here because you dous have privacy concerns . Okay. Thats like im going to go with 80 . Cspan viewers, you cant see the audience. This is being carried live by cspan2 which is exciting. How many are here because nonfiction is my jam . Nobody, come on. [laughter] dont raise your hand if thats not the case. Youre in the right place, obviously, so what we are going to do is have each of the authors give sort of 5 to 10 minutes. I asked for readings but they all decided to decline to read. Its a serving for all of our books. I know, how will they knoww that they should get their money out afterwards. No, no, i want to tell you about it. Maybe thatly choose select passages. Having read the majority of all three, they are informative, enlightening, frightening butt also optimistic in their own special way. Let me introduce everybody and. Then we will they will do their thing and have discussion here and i definitely want to make time for you to ask questions. Im sure there will be many of them but we want to make sure we get to as many people as possible. Again, table h. So fred is going to kick us off. Fred security analysts and hes here to discuss his dark territory, the history of cyber war. Te next to him is bruce, one of the world east most security experts, data and golyath and laura next to me, professor of law at georgetown University Law and director of georgetowns center on National Security and the law and she is director of the center on privacy and technology and her most recent book is the future of foreign intelligence. Privacy and surveillance in a digital age. Please lets welcome them and then we will get started. [applause] so i past, present future. The thing to keep in mind when youre reading the headlines today is that all of this might be new to you but its been going on for a long, long time. It goes back the dawn of the internet. In 1967, 67, almost 50 years ago the precursor of the internet. There was a man name willis and he had been a pioneer in computer. He worked at princeton and Advisory Board of nsa. He wrote a paper, it was secret at the time, its been declassified and the thing about putting information on a network or you put information online, it might have been the first use of the word online, online from multiple unsecured locations is that youre creating inherent vulnerabilities, youre not going to be able to keep secrets anymore. When i was doingra search from my book, i said, did you read williss paper, i knew willis, what did you think. I took it to my team. In oh, god, dont create a security requirement for us too. Look how hard is where weve got. Its like telling the Wright Brothers telling that they have to travel 50 miles and carry 150 passengers. It did take decades, two and a half to three decades by which networks had grown up with no provision for securityth no whatsoever. Now, it took a while for securities to start happening. By the time they started happening in 80s and 90sing ia this became national securitr directive signed by Ronald Reagan which was spurred by his viewing of war games and asked if Something Like that could happen which basically reads like things today read, Computer Systems face vulnerabilities, electronic intrusion from terrorists, foreign spies, criminals, not much was done. By the 90s there was a war game simulation where 25 reads teams of the nsa using commercially Available Technology hacked into all of the defense departments networks including the links between secretary of defense and president of the United States because there was no provisions no protocols, no nothing while the nsa Defense Network they ran across a few ips from france. F france was hacking up in 1997. After that the pentagon starts putting intrusion detection systems on the computers, guess what they see, intruders, russia and pretty soon china. When you read descriptions of whats going on now and we canou get into more of this in the question period but it has been anticipated for 50 years, it has been actually occurring for 25 years. Its been in secrecy, all within the National Security agency and other organizations that you never heard of which are byag nature everything about them extremely secret so its only recently that we are beginning to be aware of this and to think about the strategic implications and some possible solutions. Of so thats thats the set up. I guess im present. This is the christmas carol. Yeah, right. My book is data and golia. I look at data and surveillance both corporate and government, how it arose, how to deal with it, privacy in the world wherew our cell phones are most indicate mate object we carry. This device knows, you know, where she lives, where she works, where she was today, where she slept last night. We all have one. E. So who she slept with. These devices know that, they have to know that to turn them on. The Search Engine here is an intimate device. I use today say my engine knows more about me than my wife does. It never forgets things. And so i look at all of this data we are producing and whats happening to it and what we should do about it. What i want to talk about here in a few minutes is the title, back doors, theres an aspect of this thats very interesting. 2004 greece, greece has Cell Phone Network like everyone else does. In the greek Cell Phone Network there were surveillance capabilities built into the equipment, the manufacturer was erikson, the capabilities were part of erikson switches. They didnt want capabilities but were part of software inbr equipment deliver today greece, in 2004 someone turned them on and we dont know who. Spot on greek politicians for about a year. Thats a backdoor. Thats a surveillance capability in a piece of equipment thats being used by somebody who is like not legitimate user of the equipment. Its access not the primary means, for data or to control. Its either accidental or deliberate. Accidental backdoors are bugs, vulnerabilities, we hear a lotoi about vulnerability to follow this issue. These are programming mistakes that are in Computers Like this one, like your computer, the ones that microsoft fixespu patches tuesday and apple downloads patches for that can be use today spy on systems and then there are deliberate backdoors which are like the iricson or what the fbi wanted apple to do. So who wants the back doors . Lots of people do. Cyber criminals want them, terrorists want them, hacker activists want them. Some of the data los angeles you read about come through back doors, the dnc leak, back door in the system, im not sure exactly how, we believe the russian government used to access the systems. Police want them to, rival government wants them so theres this debate about what to do about back doors and the debate very much mirrors the nsas two missions. They the nsa is the agency with two separate missions. Actually until recently they were very separate. The Second Mission which is the intelligence mission, spy on their spy and the info mission, to protect our stuff. These missions were much easier to separate when our stuff and their stuff were different. When the russians didnt have the same internet we did, it was easy to protect the internet and spy on whatever the russians had. The problems is that today we all use the same stuff. Its one world. We all use Microsoft Windows ant tcp ip and chrome browers and when you think and secure the systems securing us and them, do we want to leave them open. Thats the fundamental debate we have here. Sometimes youll here a term called nobas. Nobody but us. There might be vulnerabilities that nobody but us could find and what we know is that that seems not to be the case. Once theres a back door we cant control who uses it. Something else you might hear in the news is stingray, a stingray is a its a trade name for for a stake cell phone tower. This is secret technology and has been for a couple of decades. The fbi has used this to basically spy on cell phones without a warrant. T. They can put a stingray and they can know who is in this room. It was a big fbi secret for many years. They would not prosecute people who threatened to release evidence about that in their defense, theres one point when the state of florida is going to release some documents and federal marshals came and seized them. Stingray run devices and run by against foreign embassies, not run by us. You actually now can go alibaba. Net and buy your own devices, cost about a thousand dollars and you can conduct this kind of surveillance. This is the problem. Todays top secret nsa program are tomorrows thesis and hacker tools. Once you have a backdoor, everybody can use it. One last example early on the snowden documents. I was involved in writing articles about them. Theres something called quantum, quantum was the big secret the nsa didnt want us ti release. Quantum is the system by which nsa intercepts your internet request to sites like facebook and slipping malware allow to go take over system. N kind of cool technology. [laughter] it is sort of neat. This was their big secret, they were using this for a lot of really good spying missions. Theres a hacker tool called air pond that does the same thing, you can download it and it was part of undergraduate homeworkpa assignment at mit, these are capabilities that slow downhill. If, indeed, we are choosing between security for everybody or vulnerability for everybody,l the question to ask is, what makes us safer . Us in the United States, industrialized world, Internet Security is so important that we are safer securing our systems even if it means losing intelligence capabilities. I think ive set you up nicely. [laughter] i didnt do my job. Can i just pass these downs . You gave us the right ones. I know who you are, i want to make sure everybody else does. Thanks very much. For those for the three for whom nonfiction is your jam, thats also mine. It can hardly be otherwise. For the 80 of you or more who have privacy concerns i share this concern and thats why i wrote this book. In my view the attacks on privacy are the most serious threats to liberty in the United States today and i dont say that lightly. I feel in my days the encryption debates an smaller debates we have been having section 702 is we are watching the shadows on the wall, there are bigger issues at stake. In particular in the book i talk about three that are coming together that are really changing the right to privacy. First is over the past 15 years we have seen a radical expansion in National Security authority despite efforts by congress and the courts to rain in the executive branch in in Intelligence Surveillance act, the executive responded by 9 11 by acting outside the law altogether. When the actions became known they tried to shoe horn back to provisions an proved exceedingly ill fit. Aiding by new laws that gave more power as well as broad secret, legal interpretations that stretched the ordinary meaning of english language. The government managed to reintroduce general warrants which the founding generation for good reason sought to prohibit in the Fourth Amendment. The second factor coming together is that the weaker standards that are being adopted in National Security are now bleeding over into criminal lawa with profound implications for rights across the board. I talk about this in the book at great length. Third, the Fourth Amendment doctrine is failing to provide a backstop for the changes that we are seeing particularly because new and emerging technologies does not account for them in the background. The most indicate mate details as bruce pointed out, that means that they can be accessed, combined and analyzed even as the resource constraints which protected privacy have dropped away. The Network Convergence is accelerating the process and the dichotomy that the court have used and there are four dichotomies, personal space versus public space. Content versus noncontent. Personal information versus thirdparty data and domestic information versus international information. These all break down in light of the new technologies that have emerged. Now these three factors the broader surveillance authorities, the failure of Fourth Amendment doctrine are leading to an airing of our rights really in my view at stake as future privacy in the United States. I just want to say a word and a general warrant. This is why we have the Fourth Amendment. General warrant is a document thats issued by the court or executive branch which gives officials the Broad Authority to search for and seize prior products without any evidence of wrong doing. It does not specify the person or place to be searched or the papers or records to be seized. Its not supported by affirmation of any wrong doing. It amounts to a fishing expedition to find evidence of illegal activities. And for centuries prior to the american founding englishr scholars rejected as the worst exercise of power and this idea was closely linked to thes home sancticy of the home. Every mans house is called his castle, why . Be because it is surrounded by a mote or defended by a wall . No, the poorest manmade in his cottage defiance to all the forces on the crowd. It may be frail, the wind my blow through it, the storm may enter, but the king of england may not enter. All his forces dare not cross the threshold of the ruined this time in the form of assistance. So james ottis taking famous in american history. He attacked the idea that the crown should have this power. He said i will to my dying day oppose with all the powers and faculties god has given me all such instruments of slavery one hand and villany on the other. General were the worst instrument of arbitrary government power, the type of power that cost one king of england his head and another hia thrown. And concerns about the sanitity of the home and importance of ensuring privacy for security. One of the most essential branches of liberty is the freedom of ones house and a mans home is castle and wellleh guarded. John adams was present at the time and later wrote about otis and state constitutions were to prohibit and madison took on the bill of rights he vowed to create a prohibition on the use of such warrants and so we have the Fourth Amendment which establishes the right of the people to be secure in their person, houses, papers and affects against unreasonable search and se chuirs. Common law of which general violated the common law. So the government could not collect private information, they could not just enter into your home and they had to have a warrant and they had to be specific in the second part of the Fourth Amendment lays out particulars of exactly what has to bert included for that warrant to be valid. No warrant shall issue but upon probable cause supported by oath or affirmation and particularly describing the place to be searched and the personal things to be seized. So with that history in mind, we could perhaps be forgiven foris being surprised in june of 2013 to wake up to the Guardian Newspaper announcing that the United States is collecting meta data and the phone records of millions of americans. Requires verizon to collect between United States and abroad and entirely within the Unitede States issued by the secret court. The order did not name any individual of wrong doing. It did not specify a crime. There was no oath or affirmatioo. In fact, it did not appear to be tailored in any way whatsoever. Any one search with the order was obligated to comply andd rather than starting at the outset with information indicating that illegal behavior was under way orders were being used to find criminal activity. In short, it was a general warrant. Now some people have argued that the information thats collected under this order is not private and so it doesnt deserve the protections of the Fourth Amendment, that statement does not survive scrutiny for two reasons. S. First, this is not the only program under way. There are a mirror aid of collections under way trying to collect information about u. S. Citizens and running algorithms to try to find out try to find evidence of illegal activity, but the second reason in here, im actually going to read do it. A short passage from the book because meta data provides enormous of information. Bruce has said data is content but meta data, meta data provides the context for everything we do. It can reveal the most indicate mate details of our lives and far easier to swift through than general content. Meta data absolutely tells you everything about somebodys life, he continued, if you have enough meta you dont really need the content. Its sort of embarrassing how s predictable we are as human beings. Former nsa director put the point more strongly. We kill people based on meta data. Why is meta data so important . It offers consistently allowing for more accurate descriptive and analyses of who we are and what we have done and what we are likely to do, during one phone call to Credit Customer service line the content makes problem in recent billing cycle, repeated calls may signal unresolved Financial Difficulties even single calls reveal insight. Meta data is sensitive even when collected on just over 500 people for a few months. The scientists were able to infer a range of medical conditions based on telephone meta data. One participant spoik at length with a cardiologist and talked for a short time and received called from pharmacy and a reported to hotline for a devici. One person telephoned you have to wonder, they did know they were in a study. They volunteered. A hy [laughter] im from california. Two days later one monthar later called it a final time, the meta data provided inside tt participants, heart conditions, gun purchases, Cannabis Cultivation and decision to have an abortion. The advent of big data in potential of these analytical tools. But technology has catapulted our world forward in the process has made what happens to the future privacy in the United States one of the most pressing questions of our time. I should mention laura is watching her book tomorrow actually. [applause] shes doing it debate with michael hayden. If you are in d. C. So weve got a law professor, the photograpphotograp her, journalist and what i want to ask each of you can assert if your land somewhere Public Opinion stands right now in light of what happened last night in manhattan. Thank you in the United States, a lot of us feel very and settled by this. I hear from my listeners that its really creepy when they say to there has been issued by more almonds and an ad for almond turns up on their laptop or phone. We are not at the point in france where they have asked ended the Emergency Action in terms of privacy being overwrote since whats happened over the summer. Fred, will you kick a southward some distinctions need to be made. A lot legitimately so about metadata. Really a very, very small part when this fiveman commission that obama appointed, the biggest reform that, metadatas created by phone companies. They can draw on it. Its been taken out of their hands, put in the, back in the phone companies, and the nsa can gain access to it only by asking for specific information. The person who proposed that as a compromise reform was the director of the nsa at the time, general keith alexander. Alexander, right. Because metadata hadnt helped that much. Because theres another provision called section 702 which is not metadata, its data. And while the commission, and its from foreign stuff, and the commission concluded that there had been no connection to a terrorist found through metadata. They found there were about 48 cases where the 70 to 2 data 702 data actually had helped in capturing terrorists and in forestalling terrorist notes. Plots. Thats something that isnt noted much. And i think a lot of people bruce, youre shaking your head. 51, actually, not 48 one, actually. No, youre thinking of the metadata. No, no. Ill take a different tack, we dont know. Im just say what the commissions report no, the commissions 51 cases in which 702 data that helped forestall terrorist activities. This can be in my book, there is a footnote to it, you can look up the page. [laughter] but the point is a lot of people are willing to give up certain things if they think that a terrorist not is going to happen. One other point i just want torr make, and ill be very briefed. So brief ill be accused ofll being oversimplified. Why is the nsa interested in whats going on in domestic stuff overall . What im about to say is not a defense, an excuse, its an explanation. The way the internet works, you know, when you send out an email or a cell phone conversation, it busts up into a zillion little packets ask and comes back together at the end. Its kind of a miraculous thing. The internet flows where the internet is concentrated. 80 of all internet traffic in the world with at some point goes through the United States. So if a terrorist in pakistan is talking with a terrorist in yemen, at some point its likely that communication is going to be somewhere in the United States. The nsa at one point figured we dont need to have listening posts in these places where we have no access, lets intercept this conversation in modesto, california, where the packet is going through, and well hop onboard. That was the reason for wanting to hop on the backbone of the internet through the prism case and so forth. F again, the if you look at the Fourth Amendment literally, it does violate the Fourth Amendment because nest domestic conversations do pop to up within this. Its very hard just to grab, ohe heres the foreign ones, theres the domestic ones. There are legal safeguards within the agency to get rid of the domestic stuff but, hey, ins the add managers of President Trump administration of President Trump and attorney general christie, they could say forget about those safeguards. Were dropping them. Do whatever the hell you want. So the potential for abuse is massive. The actual incidence of abuse so far is fairly isolated. Depending on how you count. Its, what youre hearing here c is what i talked about, this notion that were all in the same world, that you cannot spy on the Russian Submarine communications without getting a conversation from topeka, kansas. You just cant. Ho its on the same communications networks. So you asked about Public Opinion, and i think thats worth talking about. Because we all have these theres a lot of things going on here. Were talking a lot about government surveillance. We didnt mention corporate surveillance. Look up to vacatin hawaii and you get at for the next year. For the things you see are very tailored, more pervasive. How much do we want these companies knowing about us and our fears and the things we worry about and think about and use that to try to sell us things. Our comfort but that tends to change. Theres a lot of we feel this way. Its a creepiness we dont like and how did they know that . Who told them not . I didnt tell them not. How did the phone company know where he was an predict where i will be . Weve seen in the past few years, snowed in in the documents really pushed this out for government. A lot of surveys that show people are very concerned about this, not sure what to do about this. Privacy is a dont have a cell phone, dont have an email address. You cant be a fully functioning person in the 21st jury. Even though facebook makes their money spying on you. Thats their business model. We cannot engage but that is how we interact with other people. The most interesting survey i saw was about a year ago which looked at what people dead because of the revelations. All international 700 Million People around the world the changes in their behavior because of the event and other surveillance that came in the wake of snowden. A lot of them didnt do anything useful. Maybe they meant to do something and said they did. To me that number is 700 Million People felt like they should do something. I cant think of another issue that moves that many people on the planet at a time. Smoking didnt happen that fast. I think there is going to be moving. We are all just a little too scared. When you are scared, youre willing to have things done to you, even if they dont help because you think they might get the fact that all the surveillance doesnt actually make us safer or doesnt percolate through. Something must be done. Therefore we must do it. Thats what we had because we are scared. My guess is in an election or two this becomes a serious issue that the important of the real reasons why we have these security measures, both limiting the law and the actions of the forprofit corporations that manage the infrastructure we need to function. Our papers are no longer in our homes. The more secure our papers are, the more likely they are in somebody elses can either in the cloud. These old notions dont work. I think Public Opinion is very much changing it is going to be a decade or two, but we wont get the privacy because thats where we get security. I want to point out one thing. We are going to go to your question. There are two microphones here. Please go ahead and lineup of laura answers the question as well. I take your question along the lines of what is most people are afraid. I think we should do her own thing regardless of what other countries do. The bill of rights is meant to protect against the majority over writing. Even if most people would be willing to trade privacy, that the point. Thats why we have the bill of rights. The government may not go beneath that solar without amending the constitution and that was the point of the antifederalist said we have to set a floor to the government does not read its powers beyond the rights. On 702, one of the arguments with sausage given when the government uses certain secrets. They scan the internet traffic looking for the selectors and they do it offshore. You have heightened protections in the United States, but she done overseas. They can do this overseas because Communications Traffic is all going overseas and they have certain targets. One order before the 90,000 targets are not about order they stand traffic overseas to look for these key selectors. Theyve been very private about what the sailors are. One of the arguments often given if its not people reading it. Its a computer. Your privacy is not violated. The argument is that no human being to say, there is no privacy intervention. Only when they pick a possible threat that if a human being a human being season at which point you have some sort of reasonable suspicion or some criminal at tivoli. Ive always found this argument perplexing because if the government were to come into our homes and put a camera in the shower and say we are going to record you in the shower, but we are not going to look at it. We will they look at it if we have a really good reason to do so. That would not personally make me feel any better. Privacy is determined by the person under surveillance, not by the first active of the person doing the surveilling. There is no automation exception in the Fourth Amendment to take account of privacy being violated. I think ill probably just leave it at that. I would just add that i really interested in this idea of each person defining what privacy means to them. That is something i want to explore on our show and also we did a great episode about stingray and the guy who figured it out the two were actually using this weapon. If youre curious to know more about that, please check it out. Lets take a question. My question is direct did to the nsa in the security agent gave are really not capable of doing this job without this terrorism thing, without massively violating peoples rights on so many levels. They are just not capable of doing that. Because you look at the idea that james bond, for example, of actually doing the work in finding these thousand people, that has gone completely off. I think you are right in your assertion that basically we are going to have to have an encryption and are because unless the people, round to the philosophy that privacy is a central bedrock to our republic, to our whole way of life, the governmengovernmen t agencies have no reason to stop. These guys are smart technocrats. Congress isnt quite as top than or bring them in any significant way, especially if theres any kind of terrorism threat or people are confused about solving. So yes i think youre right. How would the encryption standard work and what sort of encryption should be moving towards until the people catch up to what they need in the political system responds correctly. Will probably lose because of the audience. I want to talk about your notion that the nsa cant do his job without surveillance. We know more about the fbi. Esb right now the fbi is in a position that we need to get data off suspect cell phones. And i think there is a box of expertise and a little bit of laziness that before cell phones you had to collect data manually. You had to go and investigate crimes. Now while you did is the cell phone. Theres been about 20 years, 15 were the fbi lost a lot of its investigating capabilities. And now there is this lack of expertise and not argue that what the fbi needs is not backdoors. Nonaccess to everything that they need to reengage the investigative techniques that theyve lost but are still capable of. I dont think its gone forever. If you put in legal restrictions on mass surveillance, you would get back this expertise. I dont think all hope is lost yet i think you have to push back on these easy technique to violate so many liberties and force the Government Back into the older techniques that worked then, work now and will work tomorrow. Assured im not come in the encryption debate in many ways is about the basic question, is there any such thing as private digital data . Is there any such thing for that in some ways is what this is all about. The second point i want to make of this started out in San Bernardino as a National Security issue and that quickly in the criminal law. Another example of how it starts out for National Security purposes to weaken the standards and expand the powers and then it becomes the norm for all criminals. Theyre hundreds of Police Departments that want to open phones and they treat them on a casebycase pieces for ordinary criminal at cavities. The third point is direct your commie has repeatedly over the past few months that says we always had the authority to break into your phone to obtain affidavits, to get evidence from you for evidence of criminal at cavities. That is not true. From the founding of the country until 1967, over 200 years, theres something called the mere evidence rule. The government could not issue a warrant even if it was particularly supported by the affirmation describing what he sees. If it was going to be used as evidence in a trial for evidence of criminal activity, they could only get the information through the fruits of crime when you steal something, the painting of the middle east would be the fruit of the crime and instrumentality would be if you killed someone. This revealed the things you could get by warrants until 1967. In that case the court said we are going to step back but we worry the government will begin using more and to get evidence of criminal activity to use in court. We have not always had this ability from the log first met perspective to get the information and the reason was because the founding generation worried about protecting a sphere of intimacy within people could develop their own thoughts, their own ideas. They could mediate relationships and decided they were going to bring into their lives. They could develop their ideas then this is the fundamental and side. The people change their behavior when they think what they say and do is be recorded and watched by others. The founders worried about that. Most importantly the harm created by giving the government and tied into the private lives. This could be used to find individuals who might be political opponents have been the target to undermine them and head off political opposition and used to override the structural protection in the United States. This is what motivated the founders to create the prohibition. I want to point out that its killing me would only have five minutes, technically less. I feel equipped to go all day just order food and stuff your luscious take one more question. We may have time for another. Just a quick comment. The comment is a sad commentary on the American People if they are willing to feel more comfortable to fight for their constitutional right to no longer these intrusions could reach into the cake the harder they are to fight. My question is several of the panelists have mentioned we either have completely secure, completely open, but cant it be a little more sophisticated msn that it seems that they develop within Thread Program which would have been very fact that at catching terrorists and ive done a good job of preserving constitutional liberties and the Bush Administration rejected it in favor. I think the trailblazer which didnt do a good job of catching terrorists in a poor job of catching terrorists. Trailblazing has been replaced. Ive been to a lot of people are very sympathetic that this Program Actually a scale up to the would need to do the kind of surveillance thats needed and all World Wide Web world. There is a lot more you can do. Were simplifying a lot up here. But yeah, i think we need to because otherwise we are not going to be able to reach 99 of the population and its effect in them in ways that never has. I commend you for simplification. We do use math first. This question is for bruce. Im a huge fan. I know that the undermine privacy bileca said i feel like i need them to function as a 21st century individual. Do you have any advice . The advice as you make your tradeoffs. Im going to say this on whatever, cspan2. I played pokemon go. So we are forever making our tradeoffs Online Banking versus not, email versus voice conversation. Politicians decide. Our decide. Or save us an email or make a phone call . We are all making our tradeoffs. The world is such that we are being shunned to insert directions. I choose not to be on facebook. But im a freak. A lot of us have to be. My advice is you make your choices and you have to be okay with it. If you want better protection, its not what you do. If the systems around you. You have to fight for better legal protections, corporations because thats where the battles are. The battles are not about your practices. Thats where the battles are. I agree with the importance of making tradeoffs. You have to know what is going on in order to make informed tradeoffs. One of the big problems is a lot of National Security laws dont know whats going on. The big surprise is the government could apply tangible goods with the information being thought was relevant to an authorized investigation. That language was read secretly behind closed doors to mean that all telephony metadata is potentially relevant to investigations generally therefore we are going to collect everything. So if you are going to make relevant decisions, any greater transparency. Just after these revelations came out, right now the government said in a case called clapper, the Supreme Court that clapper did not have standing to challenge 702 because he couldnt show he was under surveillance by the government. The solicitor general had represented during oral arguments that if the government played somebody under surveillance using section 702, they would be told during the trial. Thousand 2013 before the documents came out. Six months later 702 is released and it turns out people are not being told when section seven of two data is used in the trial which is why challenge the number earlier because theres so much we dont know. The fbi continues to refuse to release the definition of what to write for an information. You kind of dont know if the governments using this information again to you. We need more transparent the issues and how we want to protect privacy in our lives. To have a yes or no question . Yes. [inaudible] it seems the executive branch is getting more and more private. You see an inverse relationship between the privacy of citizens and the secrecy of the government keeps . Yes or no answer. Sorry, fred. Yes. Whatever that means. I know. What can i do. If we say, what are they going to do . Okay, though. Just answer. Sometimes the government, for example, the whole business of the nsa is like looking for vulnerabilities in systems no one else has founded and the white house made this decision when you find they would have stayed great, lets explain it. Now it has to go through generations he to decide whether they should close this vulnerability are exploited. They have to answer five questions. Probably not yes or no questions. I am told it has been used sometimes. This is a very interest and am much more significant than it may sound for the government is actually not doing something to extend the powers or at least asking a bunch of questions before they do not answer just by the direct or of the nsa, but by the National Security adviser and the president of the United States. The difference is the power dynamic. You have the corporation of the people. Privacy increases your power. Surveillance decreases power. If what we wanted liberty is the least difference between the government and the people. Surveillance and the people reduces their power, private individuals decreases. Government secrecy increases bad. Government transparency decreases difference to you best way to think about it. For me its more than transparency. One of my colleagues at stanford wrote what is the best title. He let that how the more safeguards built into the system the less secure they become. Because the social shirking occurs. That is inside his National Security. What he noticed about the redundant the is the more people to look at the problem it doesnt get better. You need more robust, better oversight of this program tonight is the position we find ourselves. Im manoush zomorodi. Thanks for being here. [applause] find the people in front of the building for barnes noble will be selling their books. [inaudible conversations] heres a look at some books that are being published this week. Columbia law professor tim wu argues americas rapid growth has led to excessive advertising and consumption in the attention merchants. In true vine, beth macy recalls the kidnapping of two africanamerican brothers in 1899 from virginia who were forced to perform in a circus side show. Bates College Professor margaret cryington looks at crichton looks at the assassination of William Mckinley in the electrifying fall of rainbow city. Bobby seale and photojournalist 1250e67b james provide a history of the black panthers in power to the people. Also being published this week, the life of edith wilson, wife of president Woodrow Wilson and her influence on the presidency in madam president. Historian tyler [inaudible] looks at how new york city became a desired destination for immigrants in city of dreams x. Be Daniel Gordis provides a history of israel from its origins to today in israel. Look for these titles in bookstores this coming week and watch formany of the authors in the near future on booktv on cspan2. Youre watching booktv on cspan2 with top nonfiction authors every weekend. Booktv, television for serious readers. Cspan, created by americas Cable Companies 35 years ago and brought to you as a Public Service by your local cable or satellite provider

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.