comparemela.com

Enslaved or even exterminated. Weve seen that and its what weve been thinking of and its what we dread. So lets be triumphant about either religion or secularism. Were meeting seeking creatures. We try and discover meaning and we also miniaturize, especially, as the world gets more complex, perhaps, the moment we need to miniaturize psychologically. Lets be aware of that. Briefly, please. If we are going to determine another meeting and other so i think we have to talk about centralization of islam, as well. Because we complain about polarization of islam. We have been discussing this issue of almost one century. But now, unfortunately, its it has become a topic of an issue of second laization. So what are we going to do with religion. What are we going to do with islam. What are we going to do with islam in european countries. As you said, i was. Its very extremely important, we have to deal with it. Three points, one is muslim world, does not see itself necessarily as the muslim world as in when we meet each other, we speak with each other, we have a lot of hatred and now were friendly, we dont see ourselves as almost united. Theres not such a thing. We see ourselves in our nationality and different point of references. The muslim world does not see itself as its been referred to and does not experience ets in that way. We love each other, we hate each other. We annoy each other on that second. Maybe going to going back to the french the crew said and the spanish occupation is too long. Politics has an immakt on whats happen. Has an impact on whats happening. When you look at iraq it is destroyed right now. It is utterly destroyed. You cannot separate that destruction in america, in that destruction from the anger and the hurt and the pain that is feeding into it. It is, indeed, interrelated, i would argue and push towards politics what has happened right now rather than the historical one. And i do think there is we all need to reflect on ourselves. The western world needs to reflect, about its own meaning of freedom and own meaning of liberty and all of that. Because these values are being threatened right now by the west within the west. And i do believe muslim world is does need to be forced to not force, does need to reflect on itself as well in this point of identity and thats to the point of all of these things, there does need to be self reflection and how do we come out of it. It is a point of intention right now and were all part of this cocreation of it. Whats going to happen, i dont know. Its a problem of identity. It is a problem from lifing in the world. It is partly has been basically landed on them in recent times. Within our lifetime. It can change the map as we know it. Even in this country it can play a very important force in terms of the kind of politics that that will dominate. Its not just about understanding. It really is a bigger political problem and in some ways, i think, were at the point where, you know, these kind of identity politics is a problem for everybody. And it requires much much bigger, much Bigger Solutions Going Forward. So if i were to say, you know. Many things have been told about islam aphobia. In the end its a reflection of the polarization and being intolerant. What we made about the failure of secularism, which i would love to have discussed for longer time because i really do think thats not wanting your culture its about coexist tense. But when we come to islam aphobia, i think we should also be thinking about how this radicalism is going to a stage where we can talk about issues. Otherwise its today its islam aphobia but there are many phobias within the culture. Youre going to applaud them, were going to move stage right, were then going to pull down a screen for a three minute sneak preview of a video, weve been preparing here as part of our effort to debunk islam phobia in the United States. You have the hashtag, which is beyond islam phobia, this is not going to be distributed yet broadly except for the Television Cameras at the that are at the bag, and were still going to make some edits and changes to this. Well actually take your advice, make this an interactive conversation both about the panel what youve heard today. Also any additional ideas that you would have for this three minute video of things we ought to be saying about muslims around the world. Round of applause for our panelis panelists. Now conversation from a group called the constitution project on government surveillance and the proper balance between security and Civil Liberties. I want to welcome you all here today. I want to say how pleased we are to be able to cosponsor this event with google. Theyve always been a terrific partner and we hope to continue to partner with them on many other things. I also want to thank all of our panelists, but i want to thank jake who is constitution project expert on these issues and whose brain child this event is and he is going to step up here, now, jake, where are you. There he is. And give you some more details on the event, but, again, thank you for attending. From google, senior Privacy Policy council. I promise i will be brief, thank you for everybody for coming here today. We think its an important discussion to be having and clearly theres going to be an ongoing debate about the issue that were talking about. And we believe theres a role for congress to play in fashion appropriate policy solutions around this collection of this information. Again, thank you all for attending and were on this were looking forward to this discussion. Hello. Thank you everyone. Were in sort of unprecedented age of collection and surveillance, one of our panels likes to refer to as the golden age of surveillance, the conclusion project wants to examine not just how we can limit collection, but also important areas of post collection reform opportunities. And what we see as one critical component of this post collection form is for intelligence surveillance, especially in the post 9 11 World Without the wall. The wall being the legal administrative barriers between different agencies and between intelligence agencies and Law Enforcement that existed previously to 2000. This was removed after 9 11 to facilitate information sharing to sort of what we refer to now as giving giving the government the ability to connect the dots. But this goal has also led to an unexpected blending of Law Enforcement which typically and intentionally has been far more restrictive in surveillance capacities which has been treated in a much more loose manner in terms of the restrictions that exist. What we would like to ask is can we create instead of the law chain link fence to replace it, something that can permit to degree but also restore the type of use restrictions and limits on Law Enforcement use through post collection reform than we have previously. Washington, d. C. Office, he leads the firm global Cyber Security. Hes also the firms National Security practice group, a member of the and prior to his service at nsa. Thanks for focusing on issues like digital privacy. From writing the peace at the constitution project thats on law fair, a chain liked fence which is really what inspired him to organize this event and its worth a read if you havent. So no doubt, theres been a great deal of focus on intelligence collection. I think theres been relatively less intention paid to the post collection treatment of intelligence, how is information used, how is it shared. How long is it retained. We have had a few flash points in the Public Discourse to think about queries of information. To think about the use of intelligence and criminal prosecutions. But by and large, issues about use, sharing retention, are a little less sexy than the collection issues that have dominated the headlines. Given that were in an era of data, era of iot objects, collecting object, area of social media clearly use is data in intelligence is the topic for today we couldnt have a more qualified panel with us. Let me introduce them and well get started. Immediately to her lift, peter is the golden age of surveillance guide, in case you caught that reference. Hes also a senior fellow with the future of policy form. Peter served as a member of one of five members of president obamas review group on intelligence and communication technology. Sharon, serves as the executive director of the privacy and Civil Liberties Oversight Board since september of 2013 right when the action started. Sharon previously ais joining the board. She served for eight years as Senior Council at the constitution project, so very familiar with these issues. While she was there, she worked on a wide variety of matters, including privacy and Civil Liberties, Cyber Security and government secrecy issues, shes served as a member of the subcommittee for the department of homeland security, data privacy and Integrity Advisory committee. Focus on surveillance, privacy, youre welcome we kept you busy for the past years, prior to joining the aclu, nina worked in the chief of staffs office concentrating on National Security and civil rights issues. Shes worked as adjudicator for civil rights at the the department of agriculture and was an Investigative Council with the House Oversight and government reform committee. So judging by those backgrounds, you can see we have an amazing array of perspectives and experience. With that, why dont we get started. Most of you know the Intelligence Community has considered post collection protection for u. S. Person information in the form of something called minimumization procedures. Theyre designed to minimize, as the name suggest, the collection, retention, dissemination of u. S. Person information. These sorts of things that are required by statute and by executive order. Two of the most relevant places where they are required is section 702, which well talk about in a few minutes and executive order, 1, 2, 3, for other types of collection, maybe to make sure were all on the same page and give us a baseline. Could you provide us a sense of what those authorities are and what are the basic built in Civil Liberties and privacy protections for things like section 702 and executive order 12333. Thank you to everyone being here and for the invitation. We want to make sure were starting with the baseline. Designed to minimize the u. S. Persons, we start with 702 where were meant to be targeting foreign persons outside of the United States with the assistance of u. S. Providers, these are people that are foreigners outside the United States. Theres two ways that we do that collection, theres the one thats been referred to as prisonism. This is where were going to the u. S. Providers, the other one is referred to upstream and this is where were doing this on sort of the backbone of the internet with the assistance of those u. S. Providers. There are for upstream also, we only retain the information for two years. In the prisonism, the queries can be done. But those have to be done, if weve articulated what the that we expect to receive in foreign intelligence. Based on recommendations, i think sharon will probably talk about, weve made some of those requirements more explicit, and the most recent set of minimumization procedures. As a way your son last year, as we reported in the transparency report, was issued in may 2016. We did t in the metta data context, its noncontent data. We did roughly 2,300, 23,000 queries. For 702 prisonism, the retention is five years and we have Strong Compliance Program and we have a reporting process, when theres a problem report those and we remediate it. Often will say if you have incidents, youre not complying, you must not be doing the right thing. A Strong Compliance Program, you want to make sure people are reporting it. If you have zero compliance since then, you will have totally ineffective compliance program. We want to sort of set the stage to understand that when folks have incidents that theyre reporting those, theyre all human, we make mistakes, thats an important one. Executive order 12, 333. Slightly different process, were collecting outside the United States against u. S. Persons and generally there are no queries in this. There are few exceptions. Against nonu. S. There are no u. S. Person queries, did i get that right . I dont want to think the government is targeting u. S. People under 12 triple 3 data. It was collected outside the United States. Were looking at foreign information, a foreign country and unlike in 702, youre not allowed to do u. S. Person queries. I say generally, because there are exceptions things like hostage, if you have consent, if youre going into a war zone or where theres battle and you might have military, you know, in concern, youll want to do that. Generally speaking, theres no u. S. Person queries. In that instance, or retaining that information for five years. On top of that, then we need to overlay ppd 28 which was issued in january 2014. It basically provides privacy protections to all people around the United States or around the world, excuse me, and that is and what that has meant is a couple of things. In that document were being transparent. Were explaining how were doing our business, we put forward both collection, reasons we would use bulk information. We explicitly give six of those, terrorism, counter proliferation, threats to military, those sort of activities. In addition, it says that well provide comparable productions and safeguard to average foreigners. So we have, in essence, done things retention for that information is explicitly five yea years. Before we could have kept the information, in theory, if you thought it was information about foreigners, thats no longer the case. So all of those things put together that you overlay that ppd 28 across 702 and 123333. Those are the basic protections that are there and how those work. Thank you. Im sure well be returning to some of those topics over the course of the afternoon. Peter, if i can turn to you next, you served ton the president s review group. Can you talk a little bit about the focus that you and your fellow members had on post collection issues, how dominant was it in your conversations and recommendations and your thoughts generally. Thanks. First, its a word on this golden age that got mentioned twice. That was in the encryption setting, i wrote a paper that was published by the center of democracy and technology about six years ago now. And its gotten picked up as contrary to going dark. Instead of going dark, we have lots and lots of sensors, lots of ways to collect information and then the answers are, if you have the surveillance, how do you build a system to try to stop bad things from happening. And to that extent it seems to be similar to 702. 702 could collect lots of data, upstream could collect a lot of data at the technical level, theres lots of checks an balances built in, part of the review group going in, we have top and so one coming in from outside to look at how things work. This is in 2013, one thing we found was looking at concrete cases that 702 seemed like quite a useful program. We had real doubts about the section we thought when you target specific people that are not in u. S. , that are not u. S. Persons and you go through the procedures and the compliance things that exist, thats getting Important Information for an intelligence National Security purposes, thats just one thing. We also had some concerns so one our set of concerns were really about ways is stirs kun kuz sp ke should purge certain information when we find out about it unless theres a clear foreign intelligence value. We said if we find u. S. Person information in the database thats 702 has been collected from, then we should purge it u. S. Person part and talking to becky before now, it sound like the fiveyear retention is what applies to that. Chain link fence, theres stuff that can get through chain link fence, as i understand the image, we recommended that evidence against u. S. Persons collected under 702, because they were never targeted, you cant target u. S. Persons under 702. If you find evidence incidentally. We said we should have a proto lactic rule. We shouldnt use that evidence against the u. S. Person. And that the idea there is if you want to be paranoid about Law Enforcement people and everyone has their dial about how paranoid they are. If you want to be paranoid. You can imagine a Law Enforcement system that says, this is great. Lets use 702 to the maximum, get a huge database with lots of u. S. Persons stuff and then just use it to prosecute against u. S. Persons. Basically youll be using the foreign intelligence back door to get into this ability to do things against u. S. Persons. One way to cut that back is reduce the use of it, you couldnt use it as evidence in court. In this hypothetical. About 702. That might be a fun place to go search if you were Law Enforcement against u. S. Persons. Weve collected the it wasnt suppose to happen about u. S. Persons, the whole thing targets nonu. S. Persons, if youre going to go into this database about u. S. Persons, then you should have a warrant. Of the right level of cause of that. Talking before the administrative reasonably likely standard, and reasonably likely. Theres a fun rule in the sense of Law Enforcement, there has to be a reasonable showing of it having value because its a foreign Intelligence Database. And theres published standards for other agencies, do we know what any other agencies have said on that . Yes. I bet sharon will cover that. I dont want to take her okay. Its really complicated. Its hard to say it right. What i said turns out to be. It might or might not be true this week for other agencies. Its what the review group tried to figure out. Couldnt be a better panelist to sharon. I think what i would like you to start with, is how is the club talk about post collection restrictions and what recommendations have been made and changed things. Thanks, and i also want to thank for inviting me to participate today. So for those of you who may not be familiar with the privacy and Civil Liberties Oversight Board, our agency is a fairly new independent Agency Within the executive branch created based on a recommendation of the 9 1 is 1 commissi 1 analyzing program, which included ten recommendations, i wont go through all of those here today, two of them relevant in todays discussion they did focus on the process of querying information that had already been collected. And as im sure you all are familiar, this is looking at once you have the collected 702 data, how can an analyst go through and look at that and when they conduct searches using particular identifiers that may be associated with a u. S. Person, we call u. S. Person query. This program does not initially target a u. S. Person cannot, so the u. S. Persons are collected incidentally because they ore tennessee other end of conversation with a target, for example. First the board recommended that the minimumization procedures should be updated to more clearly reflect the fbis actual practices, including the frequency with which section 702 data may be searched when making routine queries as part of fbi assessments and investigations. The second part of the recommendation was that some additional limits should be placed on the fbis use and dissemination of section 702 data in connection with nonforeign intelligence criminal matters and ill get to that in a little more detail in a moment. Alg and there the board recommended that queries using should only be permitted if the query is based upon a statement of facts showing that it is reasonably likely to return fourn intelligence information as defined and the board also recommended that their agencies issues guidance. Decent on a fortune of this recommendation stating that she would not extend a new requirement to this effect to meta data queries. As an aside here, the queries can be conducted to the contents of the respoz and so she made that distinction of this recommendation. Now, for both of these recommendations Board Members wrote separately to further refine their views and on recommendation two, regarding the fbi, this consisted of additional short statements by each of the members, explaining what they meant by the additional limits they would like to see on the fbi on when they conduct those queries. And on recommendation three with regard to the nsa and cia, there was a further divergence on then chairman nadine to jointly recommend that beyond the text recommendation 3, they would further recommend requiring additional restrictions on u. S. Person queries conducted for foreign intelligence purposes mainly seeking the Court Approval for United States persons identifiers that could be used for such queries, they wanted to have a neutral and detached judicial officer approve these u. S. Person queries. U. S. Person identifiers, thats a little bit different from the review group that peter was just talking about in that although both would seek a judicial approval, then chairman and member wald would applied to lower standard than a full probable cause standard and use the same standard that currently applies at the reasonably likelihood to return for intelligence information, whether they wanted the neutral decision maker. Board members also wrote separately to explain that they would not which we have accurately characterized. Before i turn this back, i want to pick up a little bit on what has happened since the board made the recommendations. So back in february of this year, the board issued a short recommendation assessment report looking at where we stand on implen mentation recommendations. With regard recommendation two on the fbi, the board board has been implemented. This was done back in november of 2015. The Court Approved revised updated procedures for the fbi that incorporated changes that were designed to address both parts of the boards recommendation. The first part of the boards recommendation making more clear how frequently they would use these kind of queries, was addressed by a certain footnotes that do appear in the declassified version. Of min mization procedures that were released this past summer and with regard to the recommendation for additional limits and i have gotten this cleared unclassified. You can look at the black out and make your assessment with regard to recommendation three, on the cia and nsa, this was also addressed when the Court Approved min mization procedures for both of those agencies and both of those agencies included additional language designed to implement the boards recommendation about the standard and the board assessment that did, indeed, meet that those are both available in the declassified version of those procedures that came out this summer, one aside here and the board did assess the recommendation was still being implemented because with the cia as we set in the february report with respect to the queries using u. S. Person ie with regard to meta data queries. That will get in the weeds on the standards and nuances of the different agencies, but over all. Thats great. Thank you, sharon. Youve seen these changes being developed and participated or the review group and Public Discourse over the past few years. And the of course know what the agencies are doing and put out publicly. What do you see is some of the big picture issues coming up when it comes to post collection use of intelligence information from your seat at the aclu. First, i want to talk about whats the world that i worry about . Whats the word that the aclu worries about. I think when we think about the nsa collection, we worry about a world where theres a whole lot of collection. Were not talking about a dozen emails or transactions a year, but on the order of millions, and we worry about those databases being used in part for domestic criminal enforcement right. Not to protect National Security, not to find information about, you know, upcoming potential terrorist threat, but in your every day normal criminal enforcement, in which case, generally police will be required to go to a neutral judge and get a warrant demonstrating the problem cause of someone who is actually making it a crime, has been accused of committing a crime. And we worry about all of that happening in a world where even if that information was gained and even if it was used in a criminal court. They dont even know. I think the nsa may have collected this. I would like to challenge it because i think my rights have been worry about. I think we talk a little bit about why i think some of the procedures are inadequate and are leading us closer and closer to this world. Foreign intelligence is incredibly broad term. Who may have talked about issues surrounding Foreign Affairs. First of all, were dealing with a situation where were foreign intelligence, i think much broader than the public thinks when they think foreign intelligence, they think stopping terrorist attack and thats not what it means in under many of these authorities. Okay. Now we have this information, right, and were going to allow agencies such as the fbi who to run queries on it. Theyre running queries on database that include in your normal criminal case. We dont know how many times because despite many requests, we dont have a sense of how many of those type of searches are performed. What we do is that it may be substantial because that data is culminating with other databases. If im an fbi agent and im beginning an investigation, i might do a query and that query might involve databases that include foreign intelligence information. And then the third layer that were seeing increasingly come up is, you know, now i worry that not only have you collected the information, youve queried it and you want to use it for in a criminal case, maybe not a criminal prosecution, but maybe to effect Something Else in my life. But just looking at lets say, apparently at some point there was a reexamination of doj policy and theres been some notice that, we dont know how that notice is being interpreted and whether, really, those provisions that require notice under section 702 are making sure that everybody who has had information used against them knows that and gets that, so they can challenge constitutional surveillance. In other context, we havent seen they have an obligation, under executive order, if information through the course of that surveillance is ultimately used in a criminal prosecution, we dont know whether the government takes the position that, yes, they must disclose that to the defendant who can then challenge it. You know, i raised these example to i say demonstrate the increasing evidence the authorities that have been developed and premised on the idea, we need this information to protect our country against terrorist threats or proliferation and those authorities are increasingly bleeding into every day general Law Enforcement and prevent against that bleed. It can be easy to dragged and particular authorities and particularly questions. I wanted to start our discussion now with a basic principle and see how folks react to it. When lawyers in the Intelligence Community think about minimumization procedures, theres a holistic view. Thats the legal approach taken. In other words, whats the collection regime at issue, do the restrictions on collection align with the restrictions on use sharing dissemination. In other words, viewing the use of information holistically. The implication of that, if you have a broader ap which you are aperture, and if information is collected in more narrow way, theres more freedom to use that information. Ill be curious to get prospectus. Is that how we should be thinking about it. Should we be thinking about restrictions on use and sharing and dissemination separate and apart from how its collected . And if anybody would like to start, thats general sense, if you would like to start . Sure, i would say two things, i think looking at the front end for thinking about the back end, so to speak. I think we have to think about not the quantity of information, i think it is relevant that we are not talking about 20 or 30 emails a year, we are talking about millions of email and millions of communication transactions over the year. Thats relevant because it increases the likelihood and the implication and the number of people that the second thing thats important is to think about is what is the front end protection. The process that you have to go through to collect the information is less than what would be required in a general court. Under executive order, the government is not going to abide a neutral arbitrary to say this type of target is permissible. Under 702, it is not an individualized review. You have to think about the lack of over site and restriction on the front end which assess the back end and the risk of using the information. I think it is important to think about if something we dont have data on. And the type of collection we do. You know lets take a hypothetical scenario where most of your target comes from a different country. Your accidental collection maybe likely is get information of individual families in those countries. If we have hearing procedures that are sort of dealing with this data stuff that may have implications that have whether communities are impacted differently. We should think about whether thats happening. If it is happening, what are some of the solutions . Yes, absolutely. The wholistic approach is what the board looks at and this comes under a source of the Fourth Amendment. The board declined to express the opinion as a whole whether there is foreign intelligence as a exception, something that the Supreme Court has not applied on but looking on the Fourth Amendment reasonable to test which is a totality of circumstances tests. That will look on at the collection stage, what is the standard and how high is the bar and what do you need to show and thatll absolutely have an impact when look at the totality of circumstances for when and how the government may access that information post collection. Things like query standards are relevant. The Board Members reached a different conclusion of reasonableness does not necessarily lead all Decision Makers to the same conclusions. Then chairman mcdean and member walsh there is not a individualized determination made of the target thats not a nonu. S. Person. When you have a u. S. Person query, there should be an individualized determination by a neutral magistrate before conducting a u. S. Person identifier. Now, member brandon colins looks at this a little differently. The criminal contact and we talked about notice, if it were to get that stage where the government wanted to use evidence arrive from 702, they did recommend where our current policies do not already require the approval of the assistant attorney general, they would require before section 702 information is used in this context. They distinguish where they do not want to create greater barriers and you discover information they would need. At that stage whether to use a criminal prosecution and looking at that kind of analysis. One of this things i just pointed out, the board looked at this and the Fourth Amendment noted, the boards role is to look as a policy matter at are we appropriately balancing National Security with privacy and Civil Liberties. Test is very much the kind of in query. Thank you. So i think we absolutely use this process today. If we look at other 702 and 12 triple 3 or even if you start of what is now under the u. S. Freedom act. We have looked at totalities and applying different safe guards to protect the persons privacy. This question of the uses, it is important to keep in mind there is different tensions where we are holding our community to know that things should ever happen. That puts a level of incentive to do as much as possible with no intention of some of these possible impact but we are sort of setting this expectation is up and so we want to think about how do we build those safe guards in and then not turn around when the next thing happens and say well, you could have connected these dots because these were here. And so every one of these policy conversations that we have, it is important to keep both of those in your head. We need to have both of these. We cannot have all National Security without any privacy is left it is equally not going to lead us in those place. If we have those conversations. Those questions of how do we take those both. I think the wholistic view has been our approach. We see those in u. S. A freedom act in terms of thats one of the first places that we first have started to draw those lines in this context. Those are hard conversations. Those are hard policy discussions that our policymakers need to have. We want to think about how do we get to build those and where do you make sure that ultimately we are not using foreign intelligence for some of these downstream issues. I would like to talk about collection limits in the commercial sector. They get talked a lot about over there and that may shed some light. There is a process of the do not track process. When you are surfing the internet, what do they collect about you and you say please dont track me as we do it. It turns out the way the internet works now, there is a tremendous amount of collection that just happens in logging your website visits and cookies and making sure that add tertizes are replacing properly. There is an unbelievable amount of collection that did not exist ten years ago and we did not have the internet at some point. You are trying to figure out what it means and more protection of privacy. You get used to pushing it. And i think that part of why we are having this talk of usage under 702 where in a world of sensors and a lot of place of logging for both commercial and non commercial purposes, we are going to have a lot of collections in ways that it did not happen. How often are you going to be on cameras compared to 10 or 20 years ago. There is a tremendous amount of collection as it happens. This project is post collection used discussion. This is what this is really important. In the world of internet of things and there is sensors everywhere and huge baby that happens just because it happens for a lot of reasons. This is a good set up for the next question. We have this question of tailoring restrictions on use of sharing or desemination. What are the types of factors folks should be thinking about. Is it the nature of the data at issue, is it how the information can be used or not used for certain context. Is it the standard freezing for that data, we discussed reasonable probability and probable cause whether is a u. S. Person information or non u. S. Information. What are the kind of the key vectors that we should be thinking about thats important for the Intelligence Community to incorporate in these restrictions. I dont think anybody has a start. Lets start with you, give it a go. All the things you listed are relevant and focusing on one or two that are most important. You know one i think that really ensuring that there is some type of over site whether it is a review. When the government seeks to query information or to use information is important. In the 702 context, there is not a ton of front end judicial over sites. The reality is that theyre not at least approving an individuals target. We dont have that initial program thats approved. When you are talking about u. S. Person information that, the government seeks to query that information. It should be going to get a court order for that. I see that as one of the most important restrictions. Foreign intelligence, thats awfully broad. We had these conversations during the u. S. Freedom act. Most people are thinking of terrorism. We need to narrow that definition and hone in on what is the uses that the government thinks are most key and how can we serve cabin of the type of seminations that we are going to have. Third, we need to think about whether we have wholesale prohibition on use of domestics. You should have that. We should not be using information thats collected for intelligence purposes for general everyday, you know, domestic Law Enforcement because we have a process for that. You know Law Enforcement goes to court and they get court work and warrants to do that. Those are sort of some of the top line things that i think of as reformed issues when we talk about whats important. Sharon. I would say yes to all of those that listed. I knew why i like you sharon. The nature of the data of this context that when we are talking about difference of collecting content or meta data. Everyone here is familiar of section of 2015 and our phone record program, that was meta data. The board did talk about how that also can be highly reviewing of Sensitive Information and having privacy implications as well. There is a consensus that people treat content as typically being more revealing and greater privacy implications so content is usually treated differently than meta data. Whats the front end restrictions and post restrictions and how the information is used. We distinguish again if you have foreign intelligence purposes, it is being collected for that. Thats what the nsa and cia is all about. When you bring in the Law Enforcement function, then you have much more front and Center People for the Fourth Amendment rights. There is criminal procedure rights of this evidence can be used against them. Likely you are going to have different standards, i talked a little bit about how some of the Board Members of criminal context being implicated. You know whether it is a u. S. Person or not. Now, this is changed some what with president ial policy directed of 28 that becki talked about a little bit of the issue back in 2014 as a policy matter to provide enhanced protection to non u. S. Persons, but typically, historically grounded in the Fourth Amendment and the fact that u. S. Persons are the ones who are recognizing to have Fourth Amendment rights. We have applied greater protections to information regarding u. S. Persons. That has even through continue to be tb case that u. S. Person are considered to have rights. I am curious of beckys response. First of all, it is sort of nice to have you Say Something nice about the review group report. You know this was a report where there is a lot of skepticism of our efforts from a lot of Civil Societies when we started. I think people found some reasons to see some usefulness and a lot of our things have been accepted. The two themes that i think neema and the review group agreed on is we want to be careful of using these data in criminal trials against the u. S. Person. We want to be careful of the database being used and searched. Those are areas where there are concerns having intelligence criminally leaked. Those are issues that deserves discussions. I do want to talk about u. S. I have spent a lot of my time, europe is not thrilled with with the nsa surveillance. In europe, they have some concerns. I am going to talk about pd 28 in this context. Here is a reason to really be extra specially careful about u. S. Person. One is the Fourth Amendment applied. Beyond that when you thinking of checks and balances and surveillance, you dont want to have your Surveillance Agency to go after it is a bad idea. The Democratic National committee, so when you have that kind of attack on political opponents, you can could be on a slide of bad things. And, thats especially careful of u. S. Persons in terms of checks and balances against political abuse. Whats happening with europe the last few years of 2013 especially is european is saying hey, we are people, too. I am german and british and french, we deserve to be treated as members of a rule of society and not target of u. S. Surveillance. Have some thoughtfulness. Sure go after the terrorist suspects but dont go after the butcher and the baker and the candlestick maker we basically said were going to expand it to our allies and now germans or french or whatever, have many countries be listed yet . No, countries have been listed. So once theres the right certification but the point im heading towards is if we have our post collection debates in the United States i bet the europeans are going to say, hey, what about us . Dont just protect u. S. Persons but stop searches for criminal proceedings or for searching more generally. Stop those more broadly. And have pretty much the same protections for the european allies as well and ill not sure that washington is ready for that discussion. Ill not sure people have worked through what would that mean and what is doable about it and maybe you can tell us that we know the answers but i think that europe will push back as part of the 2015. Theyre very aware. The European Commission is very aware that 702 is up for renewal next year and the u. S. Government hasnt even mentioned if you dont like 702 today wait until next year and you can weigh in on the process. Its going to threaten our ability to say u. S. Persons only because for Foreign Affairs reasons well have some way to talk to europe about why they deserve the same respect for their sids as the u. S. Gives to its own citizens. Okay. So maybe ill work my way down. All the way to the bottom. Or all the way to the top. Did i hear that you thought we should have something any time we do a query or is it just on u. S. Persons . Because im not sure why we have a Foreign Intelligence Agency if we have to go every time i have a foreign intelligence query i want to do. So i was referring to u. S. Person queries. I think in the context, i think that i heard you and others say they dont run them on content. I dont know if we have more information on whether theyre run on me at a data but to the extent that theyre being run on meta data thats also concerning. So i just wanted i mean, i understand that. I dont think we want to have an Intelligence Community where every time were looking at foreigners outside of the United States that were going to do a query because you would stop the Intelligence Community i think largely there. The europeans might. The europeans might and those are going to be interesting conversations. They have a very different approach to what it is i want to make sure that were not losing the u. S. Persons protections for r that historically that hasnt worked well for other countries and we want to be thoughtful as we have these conversations that we arent diminishing the protections that we do have in place for u. S. Persons so under 12333 generally speaking there arent u. S. Person queries that are allowed and right now i understand when you look at all the different procedures that we have in place it can be difficult to point to that so department of defense issued new guidelines for generally under 12333 in august. Theyre being now worked now that we have the broader document and youre not having to back your way through that process but you have to draw a couple of lines. Its not clearly obvious. Were trying to work on the next one. When we do training thats one of the big training ones. All nsa employees have to take a number of different training courses i take all of that training and i just finished it earlier next week because its going to expire and its these really important things. But that is a u. S. Person query and a key function. When i get to foreigners if you tell me i cant do any foreign queries, peter, what are are we doing . Its something that you will hear. Yeah, i think thats right. In the 702 context, 702 we have to have a foreign intelligence purpose against the foreign person outside of the United States. We have to document that. Thats one of the requirements put in there not every foreigner is targeted under 702. You have to have gone through that process and it is not the bulk collection on all foreigners everywhere under 702 so we put that but because its not that you have fewer protections around some of the u. S. Person inquiries. When we get to 12333 its a broader collection but then we started to put more controls and safe guards in there. We have an Intelligence Community designed to protect the United States from my number of different issues and we need to have a discussion as policy makers about what you want your Intelligence Community to do. If were not comfortable with the authorities we have given the Intelligence Community that is absolutely what we need to be thinking about as a democracy and thats when we have to think about how are the different forms of government really engaging in that conversation . A lot of conversation was had after snoeden about how much does Congress Really know . Those are great conversations and thought pieces we need. Not everybody in the United States can have access to intelligence to the level and degree. We wont have any intelligence. The foreign targets are going to go figure those things out. I cant put all the good people of the United States over here and tell you what the Intelligence Community is doing and then say okay my list of bad guys over here you dont get to know this. It doesnt work that way. So we have to think about how do we build these in theres a number of overseers in this area. We have the privacy and Civil Liberties Oversight Board now. Thats relatively new folks here. We have the fisk. We have the director of National Intelligence and congressional committees. And then internal at nsa we have a number of folks that are specifically focused on oversight and compliance in addition to the Inspector General so one of the questions as we go through the discussions is we should say well are all of our oversight functions working . Are we putting do we have too many of them . Do we have not enough . Are people held accountable and responsible for those activities . Ive seen a few times folks say well if i had one more person checking to make sure if this was really the right target then well make sure that were only, we have all the targets correct. It turns out people start to lose accountability the more people up the chain they think are going to find the problem. So we want to think of so how do we design these different activities. Can i go back . Something we lost a little bit in the conversation. I think we lost what a large shift 702 fundamentally was in the term, in the way it approached foreign intelligence collection and how some of the procedures havent been efficient to protect that shift. Youre talking about switching where an intelligence Court Approved individual targets. And you had to show someone with a foreign power or agent of a foreign power. Its a negatively criteria and you shifted to a program that provided much less on the end and approving procedures and not the tart. Youre able to target them for a variety of circumstances. I think thats very relevant and we think of looking at the word that you used before and the front end before and that affects what you have to do before and affects whether we think queries without the over site and theyre appropriate. Thinking about whether protections for the nonu. S. Persons needs to be higher given the Global Reality of us sharing information with the foreign entities and not wanting to create a global race for the bottom. I want to make sure that were not losing and were in a different moment now in terms of collection and that affects how we think about the programs and whether the protections are sufficient. And in the debates and how Technology Changes the standards, theres two ways to talk about the status quo. Youve correctly said heres why we have it. We used to have warrants and judges and individualized decisions and now we have 702. Another perspective is that there are communications between pakistan and otherwise, and now its through the United States and intercepted through the United States. In the old days thats a 12333 and now its raised up 20702. To the extent that 702 is about the foreign targets for people that are over seized, you can see it in the standards of what it used to be. Because its being done in the United States, its lowering the standards. Each side has a good claim for why they have lost something in this new thing that we have seen 2008 and section 702. I just want to say one other thing thats changed for the good in this case is the Greater Transparency now. So the perhaps Silver Lining or im not sure what the best term is on the un authorized disclosure is that theres a public debate. Because of that unique context and being a lot of leaked information, the Intelligence Agency made an extreme effort to try and declassify a lot of information that was previously classified and with the boards report on section 702 we were able to obtain a lot of information and put out a pretty comprehensive description and we do have in greater commitment to the transparency and the creation of beckys commitment and that she is here on the panel is really, i think a seed change. As we come into this debate in 2017 over reauthorization of section 1702, the good thing to look at is now theres a very informed public debate and how the Program Actually has been operating and a commitment by the Intelligence Agency to engage and have that debate and theres still classified details and theyre classified briefings to o the over site committees. I think thats also an important change that should be recognized. Yeah, there definitely has been a shift to the transparency and there are key facts of information that are miss asking need to have this debate and one of those key pieces of information which becky knows about and is near and dear to my heart is the number of u. S. Person that is have it collected under section 702. This is something in the report that they mention they did have the information. Its something that, you know, civil liberty groups are keen to have to have a sense of what is the scope of zmchgs how did that impact on what are the very real rights and implications for the u. S. I would expect that we want to information for some 333 programs. She talks about maybe things have shifted. It would be great do that and is the 12333 problem not as big as i fear and others fear . I think the only way to have that conversation and test the things that were saying is by having the data. Before i open it up, please think of some questions. I will in a moment. I wanted to come back to this since we talked about it and its up for reauthorization this year and its really been a flash point in the post discussion and its amazing how peoples reaction that dont think about this vary depending on how the issue is presented to them. At this is the term that we use. It seems like a loophole. On the other hand, we talk to an analyst at the nsa and they say that we have the authority to collect all of this information. I can read it from front to back. I am supposed to. I am behind. Im 10,000 pages behind. If i can read this and supposed do that and obligated to do that, how can you tell me why its the case that i need a warrant to do my work more efficiently . I am curious how do we help the public bridge what are the two groups and whether theyre an intervention or a level of standard. You can see how people view them differently, and so i would ask you to think just about or articulate for folks here which direction is micked and why. Can i just briefly. The review group we finished the report near 2013 and the clubs are fantastic and very large report on 702 happened after that. We have moved to the program and theres no, sir sags for the queries. We have seen the models that we move it, and in many ways thats a different beast zbierly. Should we look to the 215 program on the model and queries . I think the question goes back to the totality and the approach before and how you look at that and what extent do you want to balance that with a post collection and how you want to and what kind of standards that you want to create and different people are going to see that differently. How would you defend a person on the streets doing a search on my name . I dont know that im hoping for a conversation like that any time soon. Were relatively new into this construct of transparency with the Intelligence Community. My job is new. I have been there two and a half years, and we have a officer at cia and these are new rules and figuring out how to be more transparent is going to be an ever changing process. And one of the things rather than sort of as peter said we have looked at and increased the amount of protection because its under 702 and then the perspective that you decrease and then we just have it under the Fourth Amendment. One thing is to talk about the same set of facts and the extent of those are not classified, and we really worked to do that. Whether you think that you should have a warrant to do the u. S. Person query or not based on sort of how we think about these things, what i think has been really positive is the fact that were now talking almost about all of the same so neiman and i can disagree on this, but its because of the perspective and not the facts. Thats where we want to be because of the transparency. I dont know if i am going to defend if there should be or should not be a warrant. Thats what the standard is today. And whether that should be Going Forward or not. We can have that discussion and thats a really important aspect of the sort of where were going in this space. We will have to sort of test how transparent can we so that were not giving up the methods, but were able to say okay how do i bring these two what appear to be disparent activities and i want to have surveillance and privy and how do we bring those two together and how do we build those . Im not going to defend one thing or the other, but were able to have that conversation. How would you talk to the analysts and youre saying to interview this stuff and saying that i have to get a warrant to look at it. Yeah when you explain to an everyday person and say in the context youre going to get and then use a different standard. I think that when we do that, we have to understand i am an attorney and the in flux has an affect on that. We have seen people say that, and we have seen documentations on the report and knowing that the nsa can reflect that. I think thats one of the reasons that, you know, we have a higher protection and then its closer to the criminal context because for the person that has the affect, its the same. The information maybe chilled or used in a criminal prosecution and to the criminal Law Enforcement and we cant use the reality and the affects can be the same for some people regardless of the method that were using. I think the panel has laid out and you have becky on one end and some are stuck in the middle. And through all weve been hearing about it. It is security versus privacy. There are factors that i am wondering and peter with the group that you were considering when youre going through the reviews and the impact of the american businesses on a global scale. We have seen, you know, you have the harbor and taking a hit because of that and the impact of the u. S. Representation and the liability on being able to expel the freedom and not having the other countries saying you do this and do that. With that part of the consideration and not the privacy verses security and the other factors. Its maintaining the trust and then trying to stop the leaks. Our report is in the world. One of the things is we recommended a process in the white house and adopted it and sensitive intelligence collection for heads of state. There would be a white house process thats more thorough and rather than having at the extreme, a low level analyst saying, lets go in and head of state, i dont think that it worked that way before and now there is more thorough process before that happen. Thats bringing in Foreign Affairs and other kinds of concerns. Our report said not to do that. The United States does do surveillance in the realm of commercial for things like sanctions against iran. Otherwise its hard to enforce sanctions. But its not used to be for u. S. Business. Theres been, and if you go through and i have writings but there are numerous ways on which the administration i think is thoughtfully made changes to say, this is how we are trying to have an overall information infrastructure that works for our multiple goals. And its not just security and privacy. We have to have an internet that works for free speech and disent and congress and many other things. So unlike the group that really that that, our board focused on the National Security firms and the policy analysis gt context is meshed up with the Fourth Amendment reasonableness test. I will note that a number of the Board Members have engaged with the leader from other countries in the eu and have travelled and spoken in the affairs there and have pointed out in the context and so our nation is trying to take steps to conduct the over sight and maybe we have one up on them as well. I dont know where it is to me, but i will look back for the moment. I dont think that anybody would describe me as the National Security person. I think its all a matter of and then the amendment and its trying to make an emotion and the Fourth Amendment violation and through the tree, is the judge thats hearing the moisten because its a constitutional issue. It does not allow you to file it and if i dont ever get noticed because the governments interpretation is so narrow, the individual defendant does not get noticed and cant take it to their attorney and the attorney can not file that and saying that the evidence should not be permitted in court because it it was collected unconstitutionally. In that sense, its a relevant and how the government arrived. And we dont have the legal and say heres how we notice our obligations. And we notice like 215, the government said we dont have notice obligations. I dont know if ive answered your questions but thats how i think it is really relevant to people affected by the collection. I want to talk about something thats becky richards. I was a target of surveillance. I didnt understand it until i saw the snowden movie. Aid nervous breakdown and then i just ride and did not know what to do. I tried to get lawyers and help and then theres nothing that you can do and then i went to the members of congress and i found out that i did not do anything and i get it. What i wanted to always find out, i found out in my situation. People wanted to be future political appointees have access to this data. Is there any way that we can protect that data, on american citizens . And i want to fight that. They said youre like a rape victim. You need to get some justice. Neighbor only justice i can get to s to make sure political appointees, people who want to work in politics are not being targeted. Thank you. And if you have any comments, i would be grateful. Let me reframe the question. I dont think, correct me if im wrong. That there is any potential for employees to have access to raw intelligence. You can tell me whether thats there. How do we protect against abuse of Intelligence Data . Thats a really important question that we worry about all day every day. We have a number of layers of processes, starting with training, training our employees when they walk in the door with what the authorities are how do we protect those and then having compliance checks all the way through process. Whether it is something as two people have to put their eyes on it before we decide that we want to target an individual for a selection, or whether there are things like the technical post query reviews. A number of the safeguards in place as it relates to specifically, and thats just within nsa. Then you have a number of these different oversight organizations that are then making sure that what nsa has said they are doing and those protections are in place. Whether it is by congress or now by the privacy Oversight Board. So there are a number of very specific oversight mechanisms put in play. Then making sure that its consistent with the authorities. We also spend quit a bit of time in our office in the privacy office. If they have any concerns that either they have done something wrong or they feel someone else is doing so there is a place for people to have those conversations. We raise this idea of it being something to avoid. I hope what youre saying is a sad story. I dont know the facts of your story. We also specifically did a lot of look to see whether there was any sign of political targeting of any of the nsa stuff. We had among our five members, two people with years and years of experience in the Intelligence Community. And we looked for this. Because if we found political tampering, thats super worrisome. We found no evidence of political tampering. Its something ive written about for years. I found no evidence to think that it was being used that way based on our review. And the boards review did not find any such abuses of that kind. I think that the question speaks to a broader problem. Lack of retres. It is a National Security exception. In the u. S. , if you have a xhanlt. What are your opportunities for redress . I think thats an area where we need to do a lot more work. Their my name is tyler. There is at least some reference made to internal training procedures. You mentioned post query review. I wouldnt if there is been any conversation about more post talk analysis and the way the date is being used. The main thing you can do aside from just querying it. For all the same reasons that collection has become ubiquitous, presumably they apply to the use of the system. Such as the use heres are conducting this analysis are themselves generating data. To actively monitor how these strems being used . Apart from things like that. Actually doing investigations on how this date is used . Thanks. Ill just say that there are a number of different within nsa activity thats occur. Also our Inspector General goes through and is sort of hook at different ways the information is being used to make sure it is squint the authorities. We spend quite a bit of time. Were part of the Senior Leadership at nsa. Were not buried somewhere down but i report directly to the director. And we look agent these questions. I have, say, a selector and do i a query is a pretty simplistic approach to intelligence. We want to use the same date analytic thats are being used in the private sector. But we have an equal responsibility to make sure those are consistent. We have a number of different mechanisms at that one level. At the level for the date. A i think your second one had to do with, are we looking at audit laws to see if people are being consistent with those uses. And there are different situations where yeah, that would absolutely be used. So the board did not make any specific recommendations with regard to audits, although that is something we look at. At a higher level, one of the boards recommendations in the 702 report focused on efficacy. It was assessing the efficacy for Counter Terrorism programs. Not just the 702 program but more generally. Are you getting what youre for . When you have any kind of privacy intrusion, to make that worthwhile as you balance. The program itself should have some value in getting the Counter Terrorism, the purpose for which you have this program. So at that level, is it effective . I have something more specific. This research, im relying on from someone that i didnt check. In question, the consideration of 702 certificate applications, i thought they said something about doing a sample of targeting decisions that would allow the retrospective look. Yes. Yes. Thats to have the fisa court. The board did recommend in the contech of targeting, that the fisa court should have more information about actual practice. Thats what i was thinking. And it reported the oversight as well as sample tasking sheets and query terms. It is in the ballpark with the question. Somebody going back afterwards and seeing what actual queries are being done. Thank you. Yes, sir. Thank you. And thank you for a great panel. Im the director of Government Relations for the American Library association. It is the foundation of democracy essentially. If you have the chilling effect, you dont have the intellectual freedom. Against that back drop, ive been very interested in the natural tendency of the discussion to dichotomy a little bit. Saying on behalf of the public, show us. Becky not unreasonably, and you, with respect to the analysts say trust us. So how do we bridge that gap . So we have a perspective. And im asking this question. As someone who has been around washington a long time and run all kinds of issue campaigns and done a little guerrilla fighting, you want to figure out what the other side is saying and how you undercut their arguments. If i were you, i would say, what maximizes trust . Well, what is the other side saying . Warrants. So my question is, why isnt the Intelligence Community, maybe it is, sitting around saying how do we absolutely maximize the use of warrants in the process so people trust us more so we wont to have get a warrant every time we want to query information overseas. In other words, isnt the bridge form divide process from a trusted entity like the courts and therefore why wouldnt we want to use the warrant . As a practical matter as was noted, there are 94,000 targets under 702. So as a practical matter, i would agree with you that trust us is not an accessible answer. For give me. Youre asking me 94,000 warrants is tough and thats respect to the u. S. Citizen. With respect to u. S. Citizens. If were going back to the queries and for 702, i will just say that theres many different perspectives on it and im not going to give it to you one way or the other. I hear what youre saying. We had roughly under 4,500 u. S. Person terms that were used in 2015, so the tart up stream is 94,000 a year. So you get numbers one and a million for people outside of the United States depending on where you do it. I dont know whats the population of baltimore and washington . 3 million or 4 million . That means three or four people in all of washington are targeted under 702. So appreciate the scale but no u. S. Person in washington. So if we were in paris. It would be ten. That might not be enough in paris given theyve some problems there. Plus each person person would be in contact with. Throws the targets. But that would be warrants true too. If we had a trap and trace, you would get everybody they talk to. Absolutely. Different protection. Hi, i am the director of the National Program in the third way and one of the drafters of 702. When we wrote it, we were very careful about the use of foreign intelligence. Because the jurisdiction does not include judiciary and use in the Law Enforcement context, the ways in which congress thought about protections for u. S. Persons were not as clear. And were not as well articulated and thoughtfully thought so with the limitations on the intelligence side. I know theyve gone back and looked at the case where 702 information was used. But i think concerns about the use in the Law Enforcement context and the failure to notice and how that information translates, how intelligence without a warrant translates into a Law Enforcement context where a swarnlt required is the concern that makes most americans really fwhevs the statute. So did they go back and look at the questions or did you intend to go back and look at the questions of the 702 information and whether or not in the context and then theres a right to the bridge and then the right to travel and then the 702 and then how you were noticed to the person and then sort of related to and when will they release the 12333 report. Thanks. So i will take the second one first. I dont know. On the first one as nema said its to provide the notice and thats to provide notice when the section 702 information is used in a criminal proceeding and as i mentioned and this is an issue that split our board. They all called for additional restrictions on fbi queries that run across 702 date in the nonforeign intelligence criminal context. So this is collected for foreign intelligence purpose. It was a foreign intelligence crime on one side. Then looking very much at the issue and then its more traditional crime and this is used and then theres access to it. All of the Board Members agree theres a restriction and those range. Members wrote that they thought that a collum of approval and the agent that was not in that foreign intelligence and that they wanted to have the approval of the kind of queries. Its a difficult question and its something in the board. Did you take a different view of the application of the constitution to foreign intelligence verses nonforeign and crimes on the u. S. Soil in saying that well, if you need supervisory review for nonforeign intelligence crimes because you thought or did they think there was a lesser standard because of some additional leeway in the National Security space or were you aapply for the standard for foreign intelligence crimes occurring on the soil . So the entire constitutional analysis is under the circumstances test, and the board made clear that its similar to the policy and they did not ultimately draw and in this context to looking at the fbi queries, its how the members weigh the consideration. Thats for the intelligence purpose and thats the predicate that theyre showing when doing it in the first instance. When you look at a secondary use for not a foreign intelligence crime. Its more divorced from what is showing from what you made at the front end and thats where they felt the additional protection is because it was further removed from the intelligence collection. Can i just make a point about the baselines and status quo. One is any time that the government gets evidence about any american, you need a warrant. Another is to do it in all kinds of ways without a warrant. When 702 is related to information you may pick up of a crime from someone walking down the street or the United States or paris, then theyre wear of the information and it does not need a warrant. You have to decide whether 702 touches and the u. S. Person goes to warrant and whether some of it is stuff that they stumble. You can have a really different view on whether you think its natural for the government to see it from the other eyes or whether you need a warrant to get the access and 702 is in the middle because its a foreign for the information thats collected and then thats the vacation thats happening outside of the United States. Thats a long way toward nonwarrant land. If you assume its nonwarrant, then guys are pushing back from people that are not warrants. Time for one more here. Green marcus and National Press club and just quickly thank you for bringing up the issue of the journalists and american journalists and the u. S. Sources et cetera et cetera so two quick questions and one is were First Amendment issues addressed in any of the discusses and did anyone bring up the Impending National shield law that congress has been batting about for a while and held up by the revolutions and the revelations and the National Shield law. Whether that ever came up. The second part is less important than the first. That sort of addresses the First Amendment questions. What i would say is that those when youre looking at the question of privacy and the First Amendment and, you know, the natural next steps and so depending on the type of information that youre collecting and the type of uses you really it does match nicely in the terms of analysis and what they are. If the government has not connected information, youre not going to have those concerns. Ppd 28 was really putting that out there to address the foreign communities in those questions. And one other thing to the extent that a lot of the rules are to protect the democracy for the abuse and the surveillance. Thats got a lot do with the amendment. Whether you and your friends can decide what you want to do and take the action politically. The First Amendment are in the reo port as part of how you try to keep the democracy from being abused. Well i hope that you all will join me in thanking the fantastic group for the lively discussion. [ applause ] when you grow up in an environment like i did, you need a lot of people to play heroic role in your life to have a chance. I had my aunt and my sister and others. This is really the story of how they impacted my life in a lot of positive ways. Sunday night, the author walk the growing up in a poor white family that has its roots in an appalachian a. So there wasnt this connection between education is that opportunities. Even the people who did pretty well in school didnt necessarily make a whole lot out of themselves. You saw so many people not really making or having the opportunities, it was hard to believe the school really mattered that. Sunday night at 8 00 eastern on q a. Next week, American History tv in prime time. Monday, we look at the history of congress. First, the former senators, bob dole and nancy castlebon. The National Historic preservation act. And the Thomas Edison statue in the u. S. Statuary hall. Next week cspan3. Starts monday at 8 00 p. M. Eastern. If you missed any of the president ial debate, go to cspan. Org using your desk top or tablet. You can watch the entire debate choosing between the split screen or the switch camera options. You can even to go specific questions and answers from the debate. Finding the content you want quickly and easily and use our video clipping tool to create clips of your favorite debate moments to share on social media. Krx spann. Org original your desk top, phone or tablet for the president ial debate. The Federalist Society held a discussion on Political Polarization and the role of pluralism in the u. S. Well hear from lawyers and academics in this twohour long discussion. The. On behalf of the religious Freedom Center of the newseum institute, i want to welcome you to our humble abode. We also welcome our cspan viewers and those of you joining us via abc news. Com. Well, thank you all for being here. I think we can all agree is a timely and much needed discussion about one of the most challenging questions of our time. And that is, of course, how will we live with our deepest differences . We are very pleased. I would like to you please join me in acknowledging the president of the Federalist Society who is here with us today. Modestly in the back. And a special thank you to the John Templeton foundation for helping to make this possible. I havent seen david but if he is here, i want to acknowledge him. Lets acknowledge the John Templeton foundation for their support. Captions Copyright National cable satellite corp. 2008 captioning performed by vitac

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.