vimarsana.com

Transcripts For CSPAN2 Key Capitol Hill Hearings 20141017

Card image cap

Fib director james comey said today that encryption features built into new cell phones by google and apple could hurt Law Enforcement efforts. Thats next on cspan2. Then a conversation on voter i. D. Laws and their potential impact on the midterm elections. Later, a debate for colorados senate seat. Wisconsin is known as americas dairy maintained because we make the most cheese and the beseeches. The industries developing in wisconsin from what was a homestead cheese, where everybody each farm family made cheese for their own use. It was recognized that we had an ideal environment for raizy dairy cattle, and cheese was really just a way to take that perishable product, before refrigeratorration, would only last three days. If you make cheddar cheese, can last for a decade. This is late 1880s when the industry got started in wisconsin. Generally farmers in the neighborhood would form a cooperative. They would build a Cheese Factory and they would hire a cheesemaker, and the cheesemaker would work for the cooperative on share us. The cheesemakers to move around a lot, and there were thousands of them in 1930, over 2,000 cheese plants in wisconsin. As transportation and road system and improved, there was consolidation among the smaller plants, and that continued until 1990, when there were only 200 cheese factories in wisconsin. There are concerns in the Law Enforcement community that some Encryption Technology is hampering criminal investigations. Fbi director james comey spoke about the topic at the brookings instance station. This is just over institution. This is just over an hour. Good morning, everyone. Welcome to brookings. I think this event will probably set a brookings record for the height differential between guest and host. Im kidding. The director is actually not that short. So, im actually going to be very, very brief, because we have limited time, and the more of it that i use, the less of it we can use for dialogue between you guys and the director. Director comey is here to talk about encryption and the problems it creates for Law Enforcement. This is a subject that a number of people here testified due to the amount of interest in the subject, all over the place right now, post snowden, post a lot of debates about surveillance reform. Mr. Comey has a different perspective, which is about the impact related to federal and state Law Enforcement. The format is very simple. He is going to give relatively brief remarks. Im going to ask were going to move to a conversational format. Im going to ask a few questions and then well go to you and were going to use as much of the time as possible for questions from the audience. When i do that, were going to do that in a as trying to do it in as ininterrupted form as possible. So please, signal me if you want to get in, and when wait for the mic to come around, and introduce yourself by name and organizational affiliation, keep questions very brief, and in the form of a question so that we can have as significant a discussion as possible. With that, i will turn it over to the director, who needs no introduction to this audience. Welcome back to brookings. Small difference. Im going to adjust the mic. Thank you, ben, and good morning. Its great to be here at brookings. Im told also im going to be the subject of a recorded podcast for blog fair, which i read every day, and thats the real reason why im here. Id like to share some thoughts with you, and then the most important part is our conversation together. So i thank you in advance for asking whatever is on your mind. Ive been on this job now for one year, and one month. Sometimes i joke and express my tenure in months remaining, as if im incarcerated or something, but i dont mean that. I have what believe is the best job in the entire world. I get to come to work at the fbi every day. Over the last year i confirmed what i long believed, the fbi is a remarkable place, filled with amazing people, doing amazing work all over the country and all over the world, every day. And ive also confirmed what i have long known, a commitment to the rule of law and severely liberties i at the core of the fbi if believe its the organizations spine. But as you know, we con front serious threats, threats changing every single day, and i want to make sure i have every lawful tool available to make sure im addressing those threats. So see this as an opportunity to begin a National Conversation that is affect though investigative work we die. Want to talk to you about the impact of emerging technology on Law Enforcement. Within that context i think its important for me to talk about the work we do at the fbi, what we need to do the work that weve been entrusted to do. I believe there are a fair number of misconceptions in the public discussion about what we in government collect, especially we at the fbi, and the capabilities we have for collecting information. I think my job is to try to explain and to clarify where i can the work of the fbi. But at the same time i really want to get a better handle on your thoughts because those of us in Law Enforcement cant do what we need without your trust and your support and we have no monopoly on wisdom. My goal today is not to tell people what to do. My goal is to urge our fellow citizens to participate in a conversation as a country, about where we are, where we want to be, especially with respect to Law Enforcement authorities. Let me start by talking about the challenge of what we call going dark. Technology has forever changed the world we live in. All of you know that. Sever angel day were online, in one way or other, all day long, of us are online at night. Our phones have been reflections of our permits. They reflect our interests and our identities. They hold much of what is important to us in life. Accomplish with that comes a desire to protect privacy and our data. We want to be able to share our lives with the people we choose to share our lives with. I very much feel that way. But the fbi also has a sworn duty to keep every american safe from crime and from terrorism, and technology has become a tool of choice for some very dangerous people. And unfortunately the law has not kept pace with technology, and this disconnect has created significant Public Safety problems we have long described as going dark. That means those charged with protecting our people arent always able to access the evidence we need to prosecute crime and prevent terrorism, even with Lawful Authority. We have the Legal Authority to intercept and Access Communications and information pursuant to a court order. But we often lack the technical ability to do that. We face two overlapping challenges. The first concerns Realtime Court order erred interception of what we call data in motion, such as phone calls or emails or live text or chat sessions. The second challenge concerns court areordered access to data stored on our devices, such as email or Text Messages or photos or videos. What we call data at rest. And both realtime communications, data in motion, and stored data, data at rest, are increasingly increpted encrypted. I want to start about the court orders and then the challenges posed by different means of communication. In the past, doing electronic surveillance was straightforward. We identified a target phone, used bay bad guy, with a single carrier. We got a court order for a wire tap. And under the supervision of a judge we collected the evidence we needed for prosecution. Today there are countless providers, countless networks, countless means of communicating. We have laptops, smartphones, tab lets. We take them to work, to school can from the soccer field to the starbucks, over many Different Networks using many different apps, and so do those conspiring to harm us. They use the same devices, the same network, the same apps to make plans to target victims, and to cover up what theyre doing. And that makes it very tough for us to keep up. If a suspected criminal is in the car and he switches from cellar coverage to wifi, we may be out of luck. I he switches from one app to another, or from a cellular Voice Service or messaging app we may lose him. We may not have the capability to switch between devices, networks. The bad guys know this and take advantage of it ever day in the wake of the snowden disclosures, the prevailing view is that the government is sweeping up all of our communications. That is not true. And unfortunately, the idea that the government has access to all communications at all times has extended even more unfairly to Law Enforcement. That is working to obtain individual warrants, approved by judges, intercept the communications of suspected criminals. Some believe that Law Enforcement, especially the fbi, has these phenomenal capabilities to access any information at any time. We can get what we want, when we want it, by flipping a switch. Thats the product of too much television. It frustrates me because i want people to understand that Law Enforcement needs to be able to Access Communication and information in a lawful way to bring people to justice. We do that pursuant to the rule of law, with clear guidance and strict oversight. But even with Lawful Authority, the going dark problem is we may not be able to access thed and information we need. Current law governing the interception of communication requires that telecommunication carriers and broadband providers build interception capability into their network for courtordered surveillance. With that law the Communications Assistance to Law Enforcement act was enacted 20 years ago, lifetime in the internet age, and it doesnt cover at all new means of communication. Thousands of companies provide some form of Communication Service and most are not required by statute to provide lawful intercept capabilities to Law Enforcement. What that means is that an order from a judge to monitor a suspects communication may amount to nothing more than a piece of paper. Some Companies Fail to comply, some companies cant comply because they have not developed the capability, other providers want to provide assistance but have to take the time to build interception capabilities, which takes not just time but a lot of money. The issue is whether companies not subject currently to the act should be required to build lawful intercept capabilities for Law Enforcement. To be clear were not seeking to expand our authority to intercept communications. Were struggling to keep up with changing technology and maintain our ability to actually collect the communications we are authorized to collect. And if the challenges of Realtime Data interception threaten to leave us in the dark, encryption threatens to lead us all to a very, very dark place. Heres what i mean by that. Encryption is nothing new but the challenge to Law Enforcement and National Security officials is markedly worse with recent default encryption set examination encrypted devices and networks, all in the name of increased security and privacy. For example, with apples new operating system, information stored on many iphones and other apple devices will be encrypted by default. Surely after apples announcement, google announced plans to follow suit with its android operating system. This means the companies themselves will not be able to unlock phones, laptops and tablets to reveal photos or documents or email or stored text or recordings in those instruments. Both companies are run by good people who care deeply about Public Safety and National Security. I know that. And theyre responding to a market demand they perceive, but the place this is leading us is one that i suggest we should not go without careful thought and debate as a country. At the outset, the good folks at apple Say Something that is reasonable, which is, its not that big a deal because Law Enforcement can still get the data from the cloud because folks are going to back up their devices to the cloud, and the fbi, with Lawful Authority, can still access the cloud. Heres the problem with that. Uploading to the cloud doesnt include all the stored data on the bad guys phone. Which has the potential to create a black hole. Second, if the bad guys dont back up their phones routinely, or if they opt out of uploading to the cloud, the data will only be phonal on the encrepted devices themselves, and its the people most worried about what is on the device who will be most likely to avoid the cloud and make sure that Law Enforcement cannot access enincriminating data. Encryption is part of a Marketing Strategy but will have very serious consequences for Law Enforcement and National Security agencies at all levels. Sew fess tick indicated sophisticated criminals will counsel on this. Its a safe deposit box that cant be opened. A safe that cant ever be cracked. My question, to facilitate this conversation is, at what cost . Let me try to correct some misperception is think are connected to this. The first is good folks say, youre still going to have access to metadata, which includes telephone records and Location Information stored with the telecommunications carrier. And thats absolutely true. But metadata does not provide the content of any communications. Its incomplete information, and even that is difficult to access when time is of the essence. I wish we had time in our work, especially when lives are the line. We usually dont. There was a misconception that building a lawful intercept solution is about building a back door, one that foreign adversaries or hackers to crime. That also is out in not true. We want to use the front door with clarity and transparency. We want clear guidance provided by law. We are completely comfortable with court orders, and legal process, front doors, that provide us the evidence and information we need to investigate crimes and prevent attacks. Cybers are varies, theres no adversaries are going to use any it makes sense to develop intercept solutions at the front end in the design phase, rather than resorting to Patchwork Solutions when Law Enforcement comes knocking after the fact, and with the sophisticated encryption there may be no solution at all, leaving the government at a total dead end, all in the name of privacy and network security. Another mr. Perception is folks say, but you could guess the password or break it with a brute force attack. Heres the truth. Even with a super computer, we would have difficulty with todays high level encryption, and some devices have a setting where the encryption key is is erased after too many attempts to break the password, no matter how big the computer. And sometimes i heard reasonable folk as this question. Cant you compel the owner of the device to give you the password . Thats a reasonable question but unfortunately, no. Even if we could compel them, think about the choice that bad guy has to make. Imagine a Child Predator in custody, choosing between a 30day consent. Sentence for refusing to comply with the direction from a court to hand over the password, or a 30year sentence for the production and contribution of child pornography, and that choice is not hard to predict. So let me talk about case examples i hope will illustrate what im worried about. Think about your life without your smartphone, without Internet Access or without texting and emailing or the apps you use every day. Im guessing most of you would feel lost or left behind. Im told that people much, much cooler than i, which is nearly everyone, calls this fomo, or fear of missing out. With going dark, those of news Law Enforcement and Public Safety have major fear of missing out. Missing out on predators who exploit the most vulnerable among us, on violent criminals, on terror cells, a whole lot of other bad people. The more we in society rely on these devices, the more important they are to Law Enforcement and Public Safety officials for reasons i think makes sense to you. We have seen case after case, from homocides and car crashes to drug trafficking, child abuse, child exploitation, and exoneration, where Critical Evidence came from smart finances, hard drives, and online communications. Let me just give you some examples of cases that involve the content of smartphones in louisiana, a known sex offender posed recently as a teenaged girl to entice a 12yearold boy to sneak out of his house meet this supposed young girl. The predator posed as a taxi driver. He took this young boy, murdered him, and then tried to alter and delete evidence on both his and the victims cell phones to cover up the crime. Both phones were instrumental in showing that the suspect enticed this child into this taxi, and that suspect was sentenced to death in april of this year. In louisiana, excuse me. That was in louisiana. In los angeles, Police Investigate the death of a twoyearold girl from Blunt Force Trauma to her head and there were no messages. Text messages on her parents cell phone, between them and family members, proud the mother caused the death, that the father knew mat was happening and failed to stop en. The Text Messages show they failed to seek medical attention for the little girl for hours after she convulsed and the painted her with blue paint to cover her bruises before calling 911. Because of the evidence the parents pled guilty, in kansas city, the dea got search warrants for the smartphones of members of the group, and the found Text Messages that outline the distribution train and tied the group to the supply of lethal heroin that caused five overdoses. In sacramento, young couple and their four dogs were walking down the street when a car ran a redlight and strike them, killing off four dogs instantly and severing the young mans leg and leaving the young girl in critical can. The driver fled the area. The suspects smartphone was taken. It showed he fled california right afterwards. He is convicted and serving 25 years to life term for murder. It has been used to exonerate innocent people in kansas, data from a cell phone was used not long ago to prove the innocence of several teens accused of rape. Without access to thephone or the ability to recover a deleted video, several innocent young men could have been wrongly convicted. These are cases,. Just a few examples i pulled together in which we had access to the evidence we needed. But were seeing more and more where we believe significant evidence on the phone or laptop and we cant crack the password. If this becomes the norm, i suggest to you that homocide cases could be stalled, suspects walk free, child exploitation, not discovered, and prosecuted. Justice may be denied because of a locked phone or encrepted device. Here are my personal thoughts about this. I am deeply concern about is, as both a Law Enforcement officer and a citizen. I understand in of this thinking in a post snowden world, but i believe it is mostly based on a failure to understand why we in Law Enforcement do what we do and how. I am a huge believer in the rule of law but believe no one in this done there should be beyond the law there should be no lawfree zones in this country. I like and believe very much we need to follow the letter of the law to examine the contents of someones closet or the contents of their cell phone. But the notion that the marketplace could create something that would prevent the closet from ever being opened, even with a properly obtained court order, makes no sense to me. I think its time to ask, so where are we as a society . Are we no longer a country that is passionate both about the rule of law and about there being no zones in this country beyond the reach of that rule of law. Have we become so mistrustful of government and Law Enforcement in particular, they were willing to let bad guys walk away, willing to leave victims in search of justice. I know there will come a day where it will matter a great deal to innocent people that we in Law Enforcement cannot access certain types of data or information even with Court Authority. We have to have a discussion about this before those days come. I believe people should be skeptical of government power. I think this country was founded by people who were. Who knew you do not crust people in power. So they divided the power among three branches to set interests against interest, and then wrote a bill of rights to ensure the papers papers and affects of the people are secure from unreasonable searches. The way i see it, the means by which we conduct surveillance, threw Telecommunications Providers or internet provider, is an example of a government operating the way the founders designed it, with the executive, the legislative and judicial branches, proposing and acting, executing and overseeing legislation pursuant to the rule of law. I suggest that its time that the post snowden pendulum be seen as having swung too far in one direction in a direction of fear and mistrust. I think its time have an open and honest debate about liberty and security. Some have suggested that theres a conflict between accomplish security. You have to give up a little of one to get some of the other. I reject that framework. I think when we are at our best in Law Enforcement in National Security Public Safety, we are looking enhance security and liberty. When a city post Police Officers on a dangerous playground, the freedom to play without fear. People in the fbi are sworn to protect both security and liberty. It isnt a question for us. We care deeply about protecting and safeguarding the citizens were here to project protect. So finding a space and time in tower lives to understand them is hard. Im so grateful to brookings for carving out stuff. Smart people disagreeing to come to the best answer. I have never been, i dont think, anyone who is a scare monger. But im in a dangerous business. So i want to ensure that we discuss the impact of limiting the court authorized Law Enforcement tools we use, and that we talk about what are the losses associated with our inability to collect information. We at the fbi will continue to throw everything we have at its challenge. Its costly, ini efficient but well work to make sure we can but we need to fix this problem. We need assistance and cooperation from companies to comply with lawful court orders. So the criminals around the world cannot seem safe haven. We need to find common ground. We care about the same things. I said it because i meant it. The companies we talked to, we talked to are run by good people who care about the same things. We know an adversarial posture wont help us make progress. We understand it is not our intent to stifle innovation or undermine u. S. Companies but we have to find a way to help these Companies Understand what we need, why we need it, and how they can help whileprotecting privacy rights and network security. We need our private sector partners to take a step back to pause, to consider, i hope, a change of course, but we also need a regulatory and legislative fix here to create a level Playing Field so that all Communication Service providers are held to the same standard so those in Law Enforcement, National Security and Public Safety, can continue too do the job you entrusted us to do in the way you want us to dod. Perhaps most importantly we need to make sure the American Public understands the work we do and the mind by which we do it. I really do believe we can get there. I really do believe that we can find a reasoned and practical approach, and that we can do it together. I do not have a perfect solution to suggest to you. But i think its important to start the discussion. I am very happy, in fact eager to work with congress, with our partners in the private sector, with my Law Enforcement and National Security counterparts, and with the people we stoffer find the right answer, to find the balance we need to find both liberty and security. So, thank you for being here today to participate in this conversation. Thank you for carrying about these issues. I look forward to your questions. Im going to ask a culp a couple questions. The question is, why now . The crypto wars people thought there they were solved 20 years ago. All of a sudden this whole thing has been reignited. Why . Thats a great question. I think it is an accumulation, another brick in the load of the going dark, that especially hit me when i took this afternoon year ago and got briefed on our capabilities and the limitations on them. I do think a catalyst for i can only speak for me personally was the announcement of the default encryption on the devices which are ubiquitous, and i thought theyre responding to a market imperative but holy cow, where are we going in so that energized me to have a conversation about this. You left government last in three 2005. You were not in the on the investigative side but you certainly had a sense of how light and dark things were. How different is it today than it was when you came back into government, how much darker is the world than before you left . My sense is dramatically darker, especially because of the proliferation of socalled nontraditional communication means. The proliferation of different apps for communicating, peertopeer communication, the outside act communication channel dish dont have a number but increased dramatically since 2005. So, you describe in your remarks that you wanted not a back door but a front door, and im trying to understand what that means technically to have an ability to decrypt with an order that does not create technical vulnerabilities that others could exploit, either Foreign Intelligence Services or i think probably lot of people believe our own intelligence services. What do you envision when you talk about building in a front door lawful intercept decryption capability. Im not smart some of to give you a reliable answer. But im told, anytime theres a door, theres a risk that someone will try to pick the rock and get into the door, but if the door itself transparently in the front, designed into the product, the chances of a vulnerability being unseen are much lower than if it is at the end after the device has been created. So this undergoing to providers and saying can you build one, their response is, justifiably, heat a risky thing to do and smart people tell me the best way to do it, far less risky, is to build it at the front end. Youre not talking necessarily about a revival of the idea from the mid90s. Youre speaking more themeaticly than that . Thats correct. Id like too see the act written so a Communications Provider to build an intercept capability into the product they provide. Not that we hold some universal key. One of your 60 minutes interviews its on every sunday night. The jim comey show. You were asked whether all of these interceptions take place with a warrant. I was actually a little surprised at your answer. You said, categorically, the fbi does not do interceptions without a warrant, and i was a little puzzled by that because i can think of at least a few situations in which you guys are authorized to do interceptions without a warrantment i was wondering, is there some policy that you have adopted that you categorically dont do surveillance without a warrant or when you said that, were you incorporating various warrant exceptions into your remarks . Thats a fair question. When i was asked the question i gave an answer i thought was fair and accurate, and people gave me feedback saying it was insufficiently lawyerly, should have been it remains true in the over, over, overwhelming number of our cases, we have Court Authority to collect the content of emails or telephones but there are exceptions to the warrant requirement. The two are important. One is that consent, where someone gives us consent to monitor, we can be reading the content of emails or listening to telephone calls made to the consent party. And, second, where there is collection on a nonu. S. Person overseas, enough section 702, fisa 702, that is authorized by the court, if an american is communicating with that person, that communication is going to sit in the governments database, and my a little agents doing an investigate will query that database and see that email and read it. They do not go back to the court and get authority for their look at it, our view being it was collected lawfully in the first place, burt thats an exception that if i thought about it in the moment i would have messengered it. A lot of people are going to say, we have this fight in the 90s. The idea was lost because building in insecurity is inherently a bad idea. And that if you want things to be secure, you got to build security, not build other ways in. In the same 60 minutes episode, or maybe the other one, you said there are two types of American Companies. The companies being hacked by the chinese and the chineses that dont know theyre being hacked by the chinese. Isnt there a tension here between, on the one hand, the concerned about Cyber Security, and on the other hand, the insist citizen that we the insistence we have to build in a certain larry of insecurity for one particular set of actors . Are we facing a choice between a secure internet and an insecure internet . I dont think so. This comes back to what said in response to the first or second question. Its about relative risks. There is much more risk associated with the after the fact intercept capability being built in. There is nonzero risk associated with building it in the first place, and also a risk to society by foregoing the ability to collect that information with Lawful Authority. So my view, and other reasonable people may disagree the Risk Mitigation associated with building at the front expend the risk of avoidance by not having a dark spot that is spreading across our entire country, makes sense. Lets go to all of you. We have a lot of questions. Lets start with chris. When i call on you, please wait for the mic, and keep questions short, and lets frame them in the form of a question. Hi. I am kris chris, work for the aclu. Over the last few years we learned the lawful intercept systems at google and microsoft have been hacked by foreign governments. Google and microsoft were hacked by the chinese and then microsoft Law Enforcement team was subsequently hacked by the syrian electronic army. These are companies that invest vast sums in Data Security and the leading companies on the security front. Whether you want to call its front door or back door, if these companies are delivering encrypted communications the only logical way to provide Law Enforcement access is to have a key, if the keys are there, whether theres in Law Enforcement hands, third party, or the companys hand, people will try to steal them. Last year, Foreign Policy ran an article in which they described the fbi a team of fbi agents backing a trash truck into the czech embassys facilities and stealing a crypto graphic machine and the Keys Associated with it. Many people dont understand that the fbi is also in the business of stealing Encryption Keys in its capacity as a foreign intelligence organization. So, given that you know that keys can be stolen, given that the companies are constantly having sophisticatedded are sears trying to steal their private information, and given we have multiple acknowledgeses of what gives you confidence some small sill son cohn Valley Company silicon Valley Company can build a secure intercept system. Thank you for the question. I dont think anybody with complete confidence can build an interceptionproof system. Thats what meant when i say the risk is nonzero. I sympathy thing when simply think the alternative doesnt make sense, saying we cant eliminate risk, therefore a universal encryption and not just a going dark but a complete darkness for Law Enforcement is a place we want to go. I agree with you. Theres risk associated with what im suggesting. I think given the other risks involved, that it makes sense. Thank you, dr. Comey, david sanger from the new york times. You talked about the enforcement side and you mentioned the pendulum swings from the snowden disclosures. You didnt talk very much about the nsa and others. One thing we have learned from the snowden disclosures is that the nsa found ways around encryption at google and other places by going in to the communications between the servers and so forth. So when apple and google make these announcements, the kind youre concerned about, clearly theyre trying to demonstrate to the germans or to the brazilians or anybody else who was outraged by these disclosures there is no hole, they have deliberately thrown away the key so the nsa couldnt do that in their systems. Thats essentially what is going on here. I havent heard yet from the administration any kind of guarantee they that if you created the kind of portal you described, front door or back door there would then be assurances the nsa didnt do again what was disclosed to have been doing before . Tell us about the discussion inside the administration about how you provide those assurances. Thats a good question. I dont think im in a position to talk about discussions inside the administration. It actually in my 12 months, is not has not been extensive because lots of other things going on, and i goods i probable my wouldnt tale you anyway, david, what was going on inside the administration. I dont understand i understand totally. No trying to jump on the companies. I understand totally the market imperative. Ive worked for two companies before coming back to the government. I get it. But i think that i think we can address their concerns by being transparent as a country about, here are the lawful authorities by which the government can enter through googles door or through apples door so they can assure their customers, no one is getting in here except through clearly understood channels. Director comey, im garrett mitchell. I write the mitchell report, publication with a slightly smaller circulation than mr. Sangers. And can you read it . It is interesting to hear you talk in the abstract about presumably the chief executive officers and members of the csuite in the companies that are clearly at issue here, as being wellintentioned, mate trot patriotic, et cetera. I wonder and yet, they dont want to go where you want to go. I wonder if you could characterize for us the nature of the argumentation that they use, that the logic, if you will, of their perspective, and as you said, you know, one of the wonderful things about a democracy is that people can do that. One of the not so wonderful things about a democracy is that people can do that. And so we get nowhere. So i would be curious if you could characterize for us the point of view, the sort of internal logic, that those the people that youre dealing will have, and the soundness of that point of view even if you disagree with it. Thats a good question. I dont want to talk about particular conversations because i want to make sure that conversations are robust. Maybe in general. I would draw from some of thes here and things i alluded to in any remarks. Theyre responding to a market imperative, where theyre getting bead up around the world because the American Government is reading everything on your systems and their competitors are using it against them all around the world, and theyre trying respond to that by saying, thats not true. Our stuff is protected. I get that. And that makes sense for them to advocate that position. Theyre not responsible for the other risks we have talked about. And so theyre advocating in good faith a view that makes sense to me from their perspective. The thing theyre not able to advocate is the safety tradeoff, the security tradeoff. Probably the best way to describe it. Yes, right here in the front. Thank you very much. Director, paul joel from id like to ask you a question based on my previous experience. One as a federal Law Enforcement officer as well as the Senate Intelligence committee next past next 70s and 80s we had a lot of debates concerning Civil Liberties and protections and the activities of our intelligence service. There was a response with attorney general guidelines to put in place rules and regulations until the law basically was changed or catches up. I understand the problem with the act. In the internet of things it doesnt address the problem wes have. Just like aristotle said in this writings, should a city have walls, we have an obligation to, one, protect privacy. We also have an obligation to allow Law Enforcement to do its job to protect citizens. Are you taking any steps, short of a law change to try to put in systems that will assure the American Public that were going to do a better job at protecting their privacy . Thats a good question. The fbi has a ton if i get any complaints prom from my troops that we have an overwhelming amount of policy that governs their able to obtain information in investigations of all kind, my response to my folks issue get your frustration but i like that. I like the restraint. So im not i look at the restrictions on fbi agents able to conduct investigation, to collect electronic evidence, and theyre pretty darn extensive and no one suggested an improvement. So im focused on trying to get the law changed so for those whom we enter act with are able to comply with it. General mar go his. What we tell us not bureaus plan to update the act . Not much more than i just told you, which is hopefully we can now start a dialogue with congress on updating it. There have been an effort, gather, underway before i took this job, that got blown away in the post snowden wind, which i understand, but i think now its an opportunity to maybe stand in that wind a little bit and have that conversation. So i think the first step is to talk to responsible, thoughtful people on the hill, about what makes sense and how to get that kicked around. Cam harris. Thank you, director comey, im cam carey and here at brookings as a visiting fellow. When i was at the commerce department, i was part of that effort, went back and forth with your predecessor about some of the potential warms to the, a. A lot of issues that have been raised today were part of that discussion. But i want to ask about one other. As we deal with the explosion of data. Theres also the phenomenon, a widespread concern that were also going bright. Theres tremendous amount of Digital Information that is available to companies, into governments. And part of one of the issues that we face in whatever we do in addressing Public Policies to deal with that data is the impact on international norms. So, my question is, if its parallel some of the Cyber Security questions. If we go down this road and take steps that would break the encryption, what is the impact on more repressive countries around the world that will follow that example . A good question. I dont think its something i have thought about but frankly not well enough to give you an intelligent answer at this point. I think thats got to be part of the discussion. Ive also heard that. People say, well, we can have transparency in the United States defined clearly what access is given and when but thats a precedent for other regimes to get whatever they want. Others say they get anything they want anyway as a condition of doing business there. I dont think i know enough at this point to give you good enough answer. Thank you, sir, for taking my question. I am ananson and an author. I read a lot of newspapers. I have a question about my situation. Everything that i do the whole day, i can see as a technical being everything that i do. I dont know whom to contact but this kind of i missed the last part everything that i do in the whole day i can see as a tv serial, as a technical dream, and for this kind of i dont know who to contact. I have no idea. Probably somebody another brookings. I dont know. Its its not my job. Lance hoffman, George Washington university. I edited a book called billing and big brother and seems like were in the same movie a again, but maybe a little different. You said, what is the cost . And me question for you is, back then, we didnt have any to my mind, serious cost benefit analysises that really people could trot out and say, here are the tradeoffs. Has your organization or any other organization yet made some serious analysises not only economic, which are important but also the social cost and Law Enforcement down time and Everything Else . The answer is, not to my knowledge. Ive identified only a cost and benefit in the rough order of magnitude way but not in any quantitative sense. Im sure smart people have. It would be a useful part of the discussion. Director, would you acknowledge perhaps some of the distress you just spoke about, comes from the government not being truthful about what is was doing, referring to clapper, the testimony in congress, and even the fbis own history with National Security letters. So perhaps the distress comes partly from that. Would you acknowledge that maybe part of the problem here. Before i give you a yes, want to take apart your question, evan. I dont agree with the predicate that your characterization of jim clapper in particular, who we can talk about offline. A think a lot of it comes from justifiable surprise on the part of the u. S. People as to the extent and nature of the surveillance being conducted, in the name of the United States. I said u. S. People. I believe very strongly that their elected representatives had complete insight into it. So when people talk about that i can understand people being freaked and surprised, but i also think ive yet to she the rogue conduct, the lawless conduct that folks talk about. I see the government operating with all three branches, but that doesnt mean that folks arent ufeebly reacting and saying, theyre doing what . So i think that more than anything else has fed what call the post snowden wind, which makes sense to me. The scope of it can be breathtaking. Yes . My name is leah. I really appreciate can be here. Now you got to know i submit evidence to the department of justice and dont give a response. So now my question is, you say you talk about three branches. Now post snowden and we are talking about a lot of surveillance, we are talking about peoples email or something has been hacked, so now my question is, can you agree a base on that fact and you identify who is us, email or accounts or social media. I dont think anytime a position to answer that. Greg. I am craig from the center for democracy and technology. Talk to us a little bit more about the International Implications of these ideas . For example, if youre apple or youre selling androids you cant sell an nsa, fbi ready iphone in europe. So, what are you going to do . Are you expecting them to build two kinds of iphones . Two kinds of android phones . Are they going to have to build three oar four or six kinds when other countries follow our lead and impose the same kind of mandates youre talking about . And what happens in the indias and the united kingdoms of the world. A great question. I dont want to repeat the answer is gave earlier. I dont think id market it as an fbi or nsa ready phone. Maybe an fbi ready phone. We may have a better brand around the world. I havent gamed this out in my head completely but i could imagine them saying, we corporations will comply with the lawful process, ebb enacted pursuant to law enacted bier congress, we will comply with requests of the u. S. Government for information in connection with lawful investigations. And it wouldnt be about marketing the phone. It would be about them retain something capability to be able to access the information. Again, im not smart enough to figure out how that would work but Something Like that. But i think its a serious conversation to have. About how they would do it in particular. Now, going to a place where the u. S. , through its congress, says, you know what . We need to force this on American Companies, and maybe theyll take a hit. Someone in some other country will say, we sell a phone that even with Lawful Authority people can get into, but we as a society are willing to have American Companies take that. Thats why we have to have the conversation. Time for a couple more questions. Im going to try to get a few people, and then let the director wrap up. Sir. Im with abc. You talk about the balance and sort of cost benefit, and you brought up the hypothetical example of the kid being kidnapped and trying to access the information. Do you know of any specific cases where someone was in danger, was rescued but wouldnt have been rescued had you been blocked from the information youre talking about today . Good question. Four cases where the information on the phone, which would be blocked if it was encrypted, would not have been available to us. [inaudible question] i dont think i know yet. Ive asked my folks to canvass local and state partners, there examples i think i see enough but i dont think ive found that one yet. When i was preparing the speech, one thing i was inclined to talk about was to avoid those kinds of sort of edge cases because im not looking to frighten people. Logic tells me theres going to be cases just like that, but the theory of the case is the main bulk of Law Enforcement activity. With that said i dont know the answer. I havent found one yet. Have time for one more question. Over there, sir. Thank you. Lucas thomas from fox news. Absolutely off topic sir. There is any credible evidence that terrorist can you ebola as a bioagent here in the United States . Thank you. No. Do you have any want to wrap up . We are going there the way that democracy should. I want to thank the director for coming in and having this conversation. Please stay in your seat while he makes his way out. Please join me in thanking him. [applause] [applause] [applause] [inaudible conversations] a few live events to tell you about on cspan2. The chair of the Nuclear Regulatory commission, Alison Mcfarlane will be part of a conference on u. S. Policy in the diplomacy. You can watch this coverage tomorrow at 8 00 p. M. Eastern. Then the Brookings Institution building a conference on the effect Marijuana Legalization could have on International Drug treaties live at 10 00 a. M. Eastern also here on his bantu. Later a conversation on the obama administrations approach to combating the militant group isis in the middle east. Its hosted by the Hudson Institute live at noon eastern. Next come a conversation on voter id laws and their potential impact on the midterm elections. We will hear from the Legal Defense fund and a senior legal fellow at the Heritage Foundation. This is one hour. Good morning. Welcome to the National Press club. E worlds leading professional organization for journalists. I am myron belkind, and i am the president. The midterm elections just a few days away. Since the last election cycle, election and voter id laws have been put in place in a number of states. And there have been numerous rulings on the validity of these laws that some herald as necessary to ensure the integrity of the voting process and that others condemn as they suppressing voter turnout of making it more difficult for the poor, minority groups and the physically challenged to cast their ballots. We will hear from experts on both sides of the issue. With Sherrilyn Ifill, as president of the naacp defense fund, she served as a fellow with the american Civil Liberties union and a Voting Rights attorney with the Legal Defense fund and is on leave as a professor of civil procedure and constitutional law at the university of Maryland School of law. She is able wellknown Voting Rights litigator and a civil rights strategist and author of the book, on the courthouse lawn, confronting the legacy of lynching in the 21st century. Hans von spakovsky is manager of the election on reforming initiative and senior legal fellow fellow at the Heritage Foundation and he has worked on tort reform and Civil Justice in the insurance industry. He served as consul to the assistant attorney general for civil rights from 2002 until 2005 herriot and he was a member of the federal Election Committee for two years. He is coauthor of the book, whos counting. How eurocrats put your vote at risk. He has testified before various committees in favor of the Constitutional Rights of state to establish procedures with the conduct of their elections. And if you roundels. After our speakers make their presentations, we will remind you that only credential media and press club members may propose questions. Please identify yourself when you recognize that your organization before asking your westerns. I will now turn over the proceedings to our first speaker, ms. Sherrilyn ifill smack into to the National Press club and newsmakers. I am delighted to be here talking about the subject today and it is particularly fitting that we are talking about this issue of Voter Suppression and voter rights today. Just yesterday our lawyers along with a team of lawyers from other civil rights organizations and law and filed an emergency motion in the United States Supreme Court asking the court to vacate what was granted by the fifth circuit to keep in place the texas voter id law for novembers election. Later in the day yesterday the United States filed a similar motion with the court. And what happens in this case in texas in many ways will determine how these cases came to develop over the country. But the whole issue of voter id itself. Every argument of new restrictive voter id laws was made in the case of texas. Texas a formidable resources behind the defense and the case was decided on april record for three weeks of trial and expert witnesses. And about the evidence is a way to frame the conversation around voting. Which i think in this country has become entirely upside down. And rather than what this country needs and what every function should want, which is a robust conversation about how to ensure that every eligible voter in our country can participate fully in the electoral process. We spend most of our time and most of our effort and recently most of our laws focused on how we can keep people from voting. So we knew in the texas case that we had a hard road to hold and that we had to engage and confront every myth that has been developed around voter id. And we did it in that case. And i would like to briefly talk about some of those myths is a way of framing a conversation. Because many of these beliefs about voter ids are held not by ideologues and not by people on the right or the left, but they have penetrated the conversation of average americans. Things are very obvious to people that makes them understand what the controversy is. For very often people will say that most people have a photo id. Most people have a drivers license or some other form of id that they use. And that may be true, but that belies the fact that this is not whether you need identification to vote but what kind of identification you need to vote. And the state decided to impose what has been called by a federal court the most restrictive voter id law in the country. Requiring enumerating particular kind of id and excluding what she had been used in the past. And this includes those who never shouldve used very university id to vote. This now denies them the right to use their student id to vote. And thats why we showed more than half a million eligible voters in the state of texas black the requisite id in the vast majority are black and latino. Some say that its not like that come everyone can afford to get their idea. But a trial we put on a witness that couldnt afford the 42 it would cost for her to obtain a birth certificate. One of the documents that she would need to get the government issued photo id. And she testified that she had to make a choice between feeding her family were spending the 42 on a new birth certificate. We dont believe that in a democracy in this country, that any citizen should have to choose between eating and voting. And yet texas, as it was shown at trial, has only managed to provide a free id for about 200 eligible voters. And so the federal court in texas found that it does function as a poll tax. Everyone has a birth certificate, people say. We put on the testimony of this woman at home in her 70s whose birth certificate that was filled out at home was in error and she has no means been no witnesses and no way of getting a new birth certificate. And so although she has both voted for her entire adult life, she has now been effectively dissing disenfranchised by voter id laws. This is also, as many have said, about voter fraud. The state of texas has all of the Resources Available to work in this litigation and they were only able to identify two instances of voter fraud since 2002. Of the millions of votes cast in that period. This is a problem that does not list and a solution in search of a problem and a fantasy and a phantom that has been utilized to more than half a million voters. Finally people say this is not about Racial Discrimination but about partisan politics and for that i say that partisan interests are at stake with the racially discriminatory intent and partisan politics have always been entangled with racial discriminatory voting. Our organizations for successful rights came in the 1940s when we challenged an allwhite primary used by the Democratic Party in texas. Texas fully understood the effects of this voter id law on minority voters in this law is not much different than historical teams used by texas to different black and brown voters. And this includes the poll tax, voter purges and interestingly in every instance the rationale offered by the state of texas was that what they were seeking to prevent a voter fraud. So according to this case they found that texas has engaged in an unbroken line of Racial Discrimination in voting. She issued a 147 page opinion with clear opinions based on the evidence and if devastating but essential reading for you and for all americans to digest. Shelby decision the Supreme Court decided two years ago, the Voting Rights case in which the court called out this provision of the Voting Rights act, was premised on the idea that Racial Discrimination in voting is a thing of the past. But times have changed. While times have changed, but the terrible a careful decision has been made, times have changed indiscriminate discriminatory voting. So what is at issue . If this date is not listed in this case we will all bear witness to the knowing disenfranchisement of more than half a million and some say 800,000 eligible voters in texas for this novembers election. Based on a lobby federal judge has found one intended to discriminate against black and latino voters. Just think about a halfMillion People being disenfranchised. That is the state of maryland in its upcoming election decided to disenfranchise every voter in the city of alton. Stunning moment, whether you are a democrat or a republican, black or white or from the south or the north. If you are an american you should be alarmed by this. And what that means is that we should shift our conversation about voting to a conversation about how we enfranchise rather than disenfranchise our eligible voting population. 60 of americans who are eligible to vote, 60 are registered come in nearly 30 are not registered. Millions of voters who are absent from this process and what voter id laws have created are essentially a regulatory Obstacle Course for those that we want to participate in this democracy. I hope that todays conversation will help to shift the narrative and to help engage us in the conversation about how we enrich voting in this country rather than deprive voters of the opportunity to be full citizens. Thank you. I would like to call upon hans von spakovsky, who will give his side of the issue. Thank you. I do want to thank the press club for inviting us here to talk about this. We actually did this a couple of years ago to talk about this issue. And that brings up a very important point. And all of the claims being made by Sherrilyn Ifill were made by naacp eight years ago. And we now have the data to show that these claims are not true. Georgia passed a voter id law as some people like to term it acquiring government issued photo id to vote and it was first effective in 2008 president ial election. And so we now have more than six years worth of data on what happened in georgia including three federal elections and local elections and one of the handouts outside that is a paper that i did that shows what has happened in that state and the advantages is that it was one of the states covered under section five and they keep racial data on all of the registered voters. So rather than the surmises and guesses and other things going on including those recent ones, we know exactly how many whites and hispanics and black georgians turned out to vote after the voter id law went into place and we can compare it to prior elections where there was no voter id laws and what you will see is that rather than the turnout, for example, it went up dramatically in after the voter id law went into place and the same thing happened in 2010 according to the u. S. Census bureau, many note that it is a survey after every election that looks at voters and provides a chart in a table that breaks it down according the survey information and it showed in 2012 elections that he voted at a higher rate than whites or blacks than in the state of georgia. And we have the law all the way in the United States Supreme Court. At the time it was one of the strictest in the country. The court upheld the law and said that it was constitutional and wired and id and it was not a substantial burden on voters and in the end it was like every other state that passed a law like this to provide a free id to anyone who doesnt have one. Contrary to what you may think, that opinion was not written by by the five conservatives on the court. In fact, the majority opinion was written by the Justice John Paul stevens, with where he retired from the court. And we have data on indiana also in the 2000 election when the law was in place for the first time, indiana had one of the largest increases in democratic turnout of any state in the country. In 2010 it went up again in 2012 again and this is not me or my opinion but the u. S. Census bureau. It reports that blacks voted at a higher rate than whites by 10 . And so this idea that will suppress peoples rights to vote we know is not true and also on the table outside you will find another paper that i publish about a year or so ago in which i did something that was kind of interesting and i went back to the original georgia lawsuit filed by the naacp. And they lost that lawsuit and the court throughout the case saying that the voter id law was either not constitutional or discriminatory under the Voting Rights act. One of the problems that they had in that case was they were unable to produce a single witness that would be unable to vote due to the election and they had a number of individuals that came forward as witnesses and those who came forward and all of them claimed that they didnt have an id and that they wouldnt be able to get one and they wouldnt be able to vote. Well, about a year ago i went and i said of those witnesses all of whom had swarm sworn under oath to check the official voting records and found that all of these individuals who claimed they wouldnt be able to vote had been voting in election after election in georgia after the voter id law went into place. And this is a commonsense reform it is remarkably uniform and americans support this across even party lines and they dont see it as a problem. Why . Because they know in everyday life you need an id for so many things, including your Second Amendment rights to buy a gun and your right to get married and that is considered a fundamental civil right and the Supreme Court said so in a case called regina versus loving and if you want to get married in any state you can check the requirement on city webpages and you need a government issued photo id. And opponents would like to say that there is no voter fraud. I wrote a whole book with my coauthor that those case after case on voter fraud prosecution in this country. Is it the only answer to stopping fraud in elections . Of course not. And at the end of the book there is a whole series of recommendations and this is just one of them. Referring to every function in democracy. And we are one of the only functioning democracies that dont require that to vote. And Justice Stevens is the Supreme Court supports it, it could make a difference in a close election and we have many close elections in this country and that was the conclusion of the commission which was chaired some years ago in which they also looked at this issue and also there. Ohio, which as you know, has been trying to get a voter id law in place, lasser and their local elections they have Something Like 30 local elections decided by one vote. And that is where could make the difference. Voter id not only can prevent things like impersonation fraud and fraud committed by those who falsely registered under a false name but it could prevent people from illegally from voting and it can do other things in the Supreme Court. That is it helps to maintain the accuracy of the voter rolls and it helps to maintain Public Confidence in the election process, which is also fundamental to democracy. And my point is that we have many years of data on states that have voter id law in place and that data is the official turnout data showing that the idea suppressing peoples right to vote is not true. Texas was just mentioned. On the table outside you will find the paper that i did looking at texas. It was in place in the state elections last year. And that state election is comparable to a election held in 2011 and there are very similar issues on the ballot and the turnout in texas after the voter id law went into place, it nearly doubled. And if you look at that paper of mine you will see that i have looked out at turnout at some of the counties in texas that are counties with very large hispanic populations in counties with large black populations and in many of the counties the turnout went up even more. And that includes election returns across the state and its not an academic production or gas, which is what youre getting in this lawsuit in texas that was decided. We know because this law was in place that all the predictions once again, that it is turnout but simply does not happen. Voter id has been perjury by many as part of a republican attempt to suppress the vote. If it is, which i dont agree with, it seems to have done the opposite and spurred turnout. The rhode island passed a voter id law in this state in which the Democratic Party controls the state four to one against republicans in kansas which past this and the majority of democrats voted in favor of the law. And this is an effort to make sure that system that we have is one that is securing and is free and fair and it will not keep people who are eligible from voting from being able to vote. Thank you. We have gotten about eight minutes ahead of time. So i would just like to use the president s prerogative and ask that each of the speakers would like to give a two to three minute response to what they have heard this morning. And then we will start the questions probably 1030. We usually allow a halfhour for questions. And i thought i would give you each a chance to have a journalistic practice. Okay, where do i begin . I think that what you just heard really in many ways, almost all of what it said is a diversion and ive been in academia and ive also been a litigator. I dont consider litigation and the findings of a federal judge an academic that. What i learned in law school is that you have evidence at trial and one that is accepted and found by a judge in this and what i described to you or to facts. They are not my opinion or ideology. The reality is that at the end of the day for what are the reasons that he himself says relate to what he calls confidence and in the possibility of an election turning on one vote, we are talking about the disenfranchisement of hundreds of thousands of voters. Its impossible for me to see how that balances out. And the issue of turnout, this is something that he has written about and talked about for some time and it bears some conversation because turnout is actually not the proper measure to determine whether or not the restrictive voter id law disenfranchises eligible voters. And a political scientist will tell you that turnout is driven by a whole series of factors and their many communities than in the 2012 election, they say it is a badge of honor. The increased turnout that they could accomplish despite this Voter Suppression measures and this is precisely because there is an effort and that includes remembering those long lines, standing on line for sometimes six hours in florida to vote. And everyone has the opportunity to vote and participant in the process. The increased turnout numbers that we cite are a result of those who have resisted the Voter Suppression efforts. So crawford at the time was the most restrictive order ideologue, but it certainly is not today. There was not really a factual record of the effect of the foggy law in that case. Even just the seventh Circuit Court of appeals who wrote the appellate decision in the crawford case would say today that they did not really have enough evidence and the record to understand what the effect of that voter i. D. Law would be. So all of this kind of obscures the facts. We go in and out of cases. Sometimes a matter. Sometimes their academic guesses spirit and dressed directing you to the case that was decided last week in the evidence that the judge walks through the you can find on a website. Read it. If you disagree with it, fine, but it is facts. What we need our thanks to anchor this conversation about this important issue in our democracy. Thank you. In that range. You have a decision from a texas judge. But the majority of federal courts that have looked at this issue have all concluded that voter i. D. Is both constitutional and nondiscriminatory. You want to look at those cases, those are federal cases in tennessee, georgia, indiana, ariz. , and South Carolina. As you all know, the Justice Department objected to South Carolinas voter i. D. Law saying it was discriminatory under the Voting Rights act. At three judge panel in 2012 through that climb out and said it was not discriminatory. And so the law is in place. As been in place next since 2012. The 2012 election but has been in place in local elections. And you can go will surge this and you will find that there have been no reported problems with the. That is an important issue again which is that when you look at the actual data it shows there is no problem. Now, well, back when the indiana case was decided in 2008 it was in as applied challenged. Those of you are lawyers know that is when you file a lawsuit and said a law on its face is unconstitutional and that is correct. The court said, it is constitutional. But let me point out, it has now been six years. In place. It is now been six years that the georgia law has been in place, and yet there has been no supply challenge filed against either of those lawsuits. If color in fact, the effects were has claimed then the civil rights organizations and the Justice Department would have no problems filing lawsuits saying that this we now have six years experience. As apply this law is discriminatory and needs to be tossed out. No such lawsuit has been filed. And that tells you something about what the evidence is on that issue. Thank you, again, to both of our speakers, panelists. And i now turn over for questions. Please identify your organization. As i always say, please keep your questions sink. No speeches please. I am looking for the first question. Yes, if you could. Whoever is ask the question, will step aside. Come forward. Yes, please. Hi. I am a freelance journalist. When you said the turnout has increased, well, one question, actual numbers or percentages . The other question that i have is, as you done any research about people who are not able to vote because of the photo id loss . And i would also like to comment. There was a recent gao report that just came out the said that the affect of these photo id laws is to actually suppress the vote and keep the vote down. If you could comment. The first part was directed at you if you would like to incident. You could check with the secretary of state. The percentage of voters when up. In the percentage of voters, particularly hispanic and black voters went up at a higher rate than the census shows the growth of population. On the gao report, a gao actually should be embarrassed that the issue such a report. Let me point out a couple things. They only looked at tennessee in kansas is voter i. D. Laws were only in place in 2012. You have to wonder why that didnt look at georgia or indiana. There is lots of data. If you want to know how bad that report is you have to wonder, they compare tennessee and cans is to force states. Delaware, ark. , maine, alabama because they said there were similar states the law but they are not at all. The issues on the ballot were not similar in all. One quick example. Kansas in 2012 had no statewide races. You all know what drives turnout is competitive races. There was no competitive state race. There was no senate race. This year, there was no Competitive Senate race in kansas in 2012. In maine, which the state is being compared to there was a Competitive Senate race. As you all know, a longtime republican senator retired and it was an open seat, which would mean you have a different driver turnover in the state of maine. The last time and so there were basically comparing apples and oranges. The last time in kansas you had a president ial Election Year with no statewide competitive race like in the u. S. Senate race in kansas was in the year 2000, and in the year 2000 apparently the turnout was 66. In 2012, very similar conditions, the turnout was 668. The only difference being in 2012 there was a voter i. D. Line place. If you look in the appendix of the 200 page gao report you will see letters there from secretaries of state in kansas, arkansas, and tennessee pointing out the major problems with the gao analysis, which includes the fact that as opposed to going to the secretary of state in getting their certified turnout data and getting an uptodate copy of their registration last, no, gao contacted this workout to a third party who not only provided them with data but apparently the algorithms used for what they called experimental analysis. He was the third party . A Company Called catalyst. Have your word of catalyst . Started by harold. On his website it says it as no other mission and to service the data needs of the progressive community. If you want to know how accurate their data is allies suggest you do a global search between catalyst, virginia, and dogs. You will find a series of stories in 2012 about how catalyst provided the data to the Democratic Party and Democratic Candidates in the state of virginia who used that ted sent letters out to people that catalyst said were eligible voters were not registered to vote. Well, this came out because all of these people in virginia started complaining to the state election board that they were getting letters for suppose the people in their homes and needed to get registered to vote who were dead, who have moved out of state, and they were getting letters addressed to their dogs and cats saying they should get register and vote. That is the kind of data catalyst has, and they were the ones providing the data for this report. You should read the secretary of state letters. They point out all of the many problems, and you have to wonder, why did they compare them to those as opposed to other states that do not have voter i. D. Such as west virginia, hawaii, new york, new mexico, all of whom, by the way, had lower voter turnout in the 2012 election that kansas. Your response. I will be brief. So i would direct you again to the opinion of the District Court in the texas case which includes some of the testimony about people who dont have voter i. D. And why they would have difficulty getting that friday. At the gas polk already about the issue of the cost of getting the underlying documents. A lot of states have been thrown out, the states mesa been thrown out. It is important to understand. Voter i. D. And voter i. D. So there are different kinds of voter i. D. Their required. So for example, trouble in the South Carolina a example in the litigation in South Carolina. The reason it was upheld is because the state of South Carolina during the litigation changed the voter i. D. Law, i think he was 34 in order to create a voter i. D. Regime that would not 55 disenfranchises many voters as the original plan did. South carolina now provides the opportunity for voters to present evidence of hardship or reason why they could not obtain the at the that allows them to still be able to vote. That happened in the course of the litigation. South carolina is not a great example. And we are talking about different states and what they require, and that is why i am saying, you have to pierce through all of the allegedly did that is being thrown out and get yourself into a fact situation in which you can get your hands around what is happening. I am suggesting you use taxes because we just had a trial. It is regarded as the most restrictive. By the way, you know, texas was all in. If there was evidence coming here is a stake with a large minority population, a large immigrant population commending restrictive voter i. D. Lot of state in which the attorney general to hours after the Shelby County decision to leave his intention to reimpose the voters read the law that had been struck down under section five of the act just a year before. Passionately engaged in upholding this voter i. D. Lie in this case. And yet there were only able to produce two instances of in person voter fraud . What about all these states just mentioned whether is not voter i. D. . Where are these rampant examples of voter fraud, in person voter fraud, mind you. That would justify the disenfranchisement of hundreds of thousands of dollars. So the question you have to ask yourself is to what is the motivation for this . Where does it come from . In the texas case the federal judge issued a finding that is a very rare finding and that sets that case apart from every other case. She found that the state of texas intentionally discriminated against blacks and hispanics in the imposition of taxes voter i. D. Low. That is a constitutional violation. That should be repugnant to every american. That should never stand and allow the state to justify based on the possibility of one or two instances of voter fraud and the possibility that there may be an election in which one or two votes might make a difference. That should never be justification. And i have yet to hear a response. I am a little bit of a student. I read all of this stuff. And i am still waiting for the article that is about how we get people to vote. I am still waiting for the focus of someone who is a legal scholar in the area of voting, how we enfranchised people, how we make this democracy more accessible to people. Have not seen that article yet. I am interested in it, and that would be willing to partner if there are some ideas about how we open up the process, not how we restrict the process. Thank you. Another question please. Talk radio news. I was wondering, the mission of states with voter i. D. Laws that have offered to give rietis to people who dont have them, i was wondering if all states offer this and if so, what type of idg they offer . Is it a special one for the circumstances, or is it just redirection . Thank you. Every state that has passed a voter i. D. Law provides for free eddy for anyone who does not have one. And it is typically, you know, anybody can go to that dmv in get and non drivers license. Looks just like a drivers license. As your photo. In georgia you can get one of those that only at any dmv office, but that in the county election office. Naturally, the state provided when the law was first in place to my dont know if they still do it today. They basically equipped a mobile van. In any group in the state that was doing a Voter Registration drive could call up to stay and get the van to come to it, but the point is, it is a photo i. D. , non drivers license photo id. By the way, in georgia those numbers, and i know you have heard numbers, 10 , 20 percent of americans dont have id. In georgia, 6 million registered voters in the next eight years since they have been issuing nit to anyone who does not have one, the average rate per year to have people coming in for a free ideas 5101 percent of the number of registered voters, a tiny percentage. I just only say that once again that was an issue in the texas case. They had the upper j. D. Come forward and tell us because they have a free guide the program. And somehow they have only managed to issue 200. So i would i have some concerns about the will and the willingness of states to aggressively pursue this, to enfranchise their own voters when has been clear for some time that we have been talking about voters who dont have access to this id in the hundreds of thousands. It is nice to sit here and say you just go to the Motor Vehicle office, but if you know anything about the state of texas, it is a pretty big state that people in rural areas have to drive and in many cases very long distances. It is a problem that our students face as well in various campuses. If they dont have access to a car. Then, of course, the cost of the underlying documents. It will just give you the election identification card. He still have to be will approve and provide the underlying documentation that they seek. And that has its own cost as well and also can require going to various offices to get the underlying documents like birth certificates and so forth. Another question. Yes, in the back. Thank you. Hi. I am just wondering what you are expecting in terms of impact on the midterm elections, the laws that are in place currently, not just to override the laws, but early voting, registration, audis see these impacting the upcoming election . Why dont you go first. Well, time will tell. In some ways it harkens back to my earlier comments about 2012. The reaction in 2012 was that in many jurisdictions people really decided that they were going to come out and there was increased organization, which i expect is happening now, increased Voter Registration and has been happening, and activism around getting people love to vote. But when you drop early voting, as in ohio when you drop that, the kind of sundays soul patrol for africanamerican voters as, we look at the situation in texas and of course we will find out surely this week whether the Supreme Court less than a state permit were talking about early voting talking on september 20th and texas. We are talking about soon. And how people will be able to respond and react. Obviously in texas if you need a photo id and do not have the you will not be voting. So were talking about we just had this trial last month. And so were talking about more than half a Million People will not deal to participate in the political process. What does that mean for midterm elections . It remains to be seen in terms of every various jurisdictions. Turnout is driven by many factors, some of which have to do with whether or not youre registered to vote. The photo id, some of which has to do with whether there is a hotly contested race, organizing at the local level, with the Political Parties are doing in terms of organization and the weather. So it remains to be seen, but certainly, you know, in places where you have large numbers of citizens who do not have the requisite friday or who are unable to take it vantage of the expansive early voting that they had been accustomed to, particularly thinking about people who work two jobs, who have children, who really do not have available and flexible free time, it can really make a difference. Lets go back to the u. S. Census. Does a survey after every federal election. But they do is go out and survey people who did not vote and try to find out why they didnt vote. Those census surveys are interesting and are worth looking at because all of these claims that you constantly hear that the reason people dont go to the polls, have higher turnout is because of all these procedural difficulties that they have in trying to vote or because they cant get to the polls is not borne out. The number of individuals who cite some sign some sort of procedural issue that kept them from voting is like one of the tiniest percentages on the survey. The vast majority of reasons people give for not voting is, frankly, a Cultural Society when witches, they are not interested in the elections. Theyre not interested in the candid its. They dont think whoever gets they dont think it doesnt matter who gets elected. They dont think it will make a difference in their lives. That is the biggest reasons people tell the u. S. Census for not voting. This whole fight in ohio over the fact that they lowered their early voting days from 35 days to 28 days is, frankly, ridiculous. Early voting is relatively new phenomenon. There was not in the early voting two decades ago. This is something that has been put in, but there are a large number of states where there is no relief voting. At 28 days in ohio still had more early voting days than almost any other state in the country, and the idea that that is going to somehow keep it out of the polls is not borne out by the data. The center for the study of the american electorate and American University has a number of studies comparing early voting to states without early voting for nofault absentee balloting. Looking at what happened to turn out in the states. And those studies pretty clearly show this was confirmed by another report i think just a year ago by the university of wisconsin. Early voting does not actually increase turnout. May hurt turnout. I know that sounds counterintuitive, the what they found when they look at all 50 states was that in general elections where the turnout rate across the country has gone up like in 2008, in states with early voting it does not increase at as bigger rate as in other states, and in general elections where the turnout rate goes down from the prior election it goes down even steeper in early voting they dont really know why, but the theory for that is that, as you know, campaigns and parties to spend the majority of their money in a couple of days before election day in their get out the vote effort. And if you have all along early voting timeframe of several weeks to a month to month and a half, that kid out the vote effort gets dispersed and diffused over much longer and it may not be quite as effective. The end result is that you apparently have a slight deviation in early turnout. It is a small percentage, but this idea that early voting somehow would help increase turnout, studies show that that is simply not the case. Did you have was there one more question from this side of the room . Did you have the followup . Different types. There are different types of voter fraud, and i often think that i am confused as to whether were talking about Voter Registration fraud or actual voter fraud. Actual voter fraud is somebody who goes in and attempt to vote based on inaccurate information, whether they are misrepresenting or saying that they live someplace else. So what i would like to know is, what are their rates of Voter Registration fraud, what i am calling voter fraud, and how much Voter Registration from actually translates into people who attempt to illegally voted an election . Thank you. We are coming up to within six minutes of the end. So if you could each give a sustained and informative response in a minute or so. Faq so much. Well, i dont know why you differentiate. Consider Voter Registration drive to be voter fraud. If you want to know how that can be used to adjust a year or so ago a city election in california was overturned when the court determined that enough voters had voted in the election to have claimed to reside in the city you actually did not live there to overturn the election. There was clearly Voter Registration from. The miami mayors race in 1997 was overturned by a federal court because of a massive absentee ballot fraud. One of the things they found in that case was that there were many people engaging in Voter Registration fraud by claiming to live in the city because they wanted to vote in the election but did not do so. I can cite you more cases like that. That is something that unfortunately happens. We just discovered 17 individuals in fairfax county, virginia, where i live weather records show have been voting in both states, virginia and maryland in elections illegally, which is a felony under federal law. So Voter Registration fraud can lead to a fraud in the election process. Our response . You best a very good question. What kind of fraud youre talking about, its important because voter i. D. Loss, the only kind of fraud that is really relevant to the voter i. D. Law is the in person voter fraud. And that is to minimus. In fact, even their registration fraud also does not occur at a statistically significant high. So the registration fraud is not a rampant problem, but in person voter fraud is even less in occurrence than Voter Registration. Secreting entire apparatus of voter ids to address a problem that does not exist is really, i think, the heart of the issue. When youre faced with an apparatus that has been put in place, the solution that has been put in place that transform something that has been in effect all this time, we have not had voter i. D. Laws in texas for ever and ever and ever and suddenly we needed them. Are all those elections before somehow when firmed . Why do we suddenly need them of the elections in new york are in from ben and all the other states that were cited . Where does this come from . Why do we suddenly need this . When we ask that question and start peeling back the onion we end up looking in right in the face were judge ramos left us in the texas case. But the purpose of this law was designed to try and suppress the vote of minority voters, as other schemes have been designed in texas in years dating back through the past century. Another question from our attendee. I would just like to ask the 90s question, but listening to both of you, you spoke about partner in. And i think you both have the objective of insuring that the u. S. To mock receipt fulfills itself to the utmost during elections. In that general election more than 200 voters in 1967. You spoke about james baker, secretary of state, republican. Jimmy carter, former president and democrats working together. Is there a way that the both of you could Work Together . The aclu and the Heritage Foundation to come up some guidelines on this issue . Two minutes left to go. Up the question is appropriate. Stand by my earlier offer. My organization remains in the tradition of thurgood marshall, john lewis, and all of those who have fought for the enfranchisement of americans, particularly those for whom the vote is their voice. They dont have the money or the power or the influence. That is the way that they express themselves in a democracy. And i am of the belief that our work should be focused on how we can insure that as many of our citizens as possible have the ability to participate in the political process and vote. I do not understand why a 18yearold young man would have to get to the post office and register for Selective Service when he turns 18 but does not have to go to the post office and register to vote

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.