comparemela.com

Matthew olson first of all, welcome, to all four of you. Matthew olson is cofounder of cyber security. Previously serving as the director of National Counterterrorism center where he briefed the National Security council and reported to president obama on counterterrorism actibeing aaci. Mr. Olsen also served general counsel, nsa, focusing on surveillance, law and cyber security. Under the bush administration, mr. Olsen served as acting assistant attorney general, National Security division, doj, mr. Olsen also served as executive director of Guantanamo Task force, special counsel director of the fbi, and served as federal prosecutor for more than a decade. Hes a graduate of the university of virginia and harvard law school. Adam klein is robert m. Gates Senior Fellow Center for new american security, widely published in areas of National Security, surveillance, counterterrorism law and policy. He was previously an attorney at International Law firm and also worked on National Security policy at Rand Corporation in the 9 11 Public Discourse project, the nonprofit successor to the 9 11 commission. Mr. Klein served as the law clerk for Justice Scalia and is and graduate of Northwestern University and columbus columbia law school. Elizabeth goiteen is of the liberty and National Security program, the New York School of law, previously miss goitein served as council to russell finecoal, chairwoman of the Senate Judiciary committee. Miss goitein also served as a Trial Attorney in the federal programs range as a Civil Division of the department of justice and she graduated from yale law school. Elisabeth collins is serving her second term as board member of the privacy and Civil Liberties Oversight Board. Previously, she was an attorney in private sector at two International Law firms and served as the republican chief counsel for Supreme Court nominations for senator judiciary committee. Miss collins was also an assistant attorney general and legal policy, the doj, where she provided advice and counsel relating to National Security and other issues. Miss collins is a graduate of the university of chicago and harvard law school. Well proceed to my left and my right. So mr. Olsen, proceed, please. Thank you very much, chairman grassley. Its an honor to be here this morning. Let me put the bottom line up front. As the former National Security adviser, i can attest to the fact that section 702 has significantly contributed to our ability to prevent terrorist attacks in the United States and around the world. This is consistent with the testimony that you have heard from the panelists, the witnesses in the other panel. Similarly, the former general counsel of the nsa and a former department of justice official, i worked to ensure that we implemented 702 in a manner that protected the privacy and Civil Liberties of americans. I will make a few brief remarks and i will focus those remarks on three points all addressing how section 702 has worked in practice. First, the operational value of 702. As this committee is well aware, we face a persistent and adaptive threat from al qaeda and isis and other groups. Just since september 14, isis claimed credit for 40 terrorist attacks outside the caliphate in syria and iraq. The online environment where potential extremists communicate with isis handlers and recruiters plays a Critical Role in providing the direction to the individuals and mobilizing extremists toward violence. So to combat this dynamic threat, our ability to conduct surveillance under 702 has proven vital. The key point is this, our best opportunity to identify and stop these attacks before they occur is through good intelligence. Thats often derived from the surveillance authorities such as 702. As the director of nct, i rely on a daily basis to information collected under 702. In the morning briefings, the analysts often reported critical information came from section 702. In its landmark report, the privacy of the Oversight Board identified approximately 30 cases where 702 was the initial catalyst that uncovered previously unknown terrorist operatives and plots and more than 100 cases where 702 helped to lead to the arrest of individuals on terrorismrelated charges. This is a truly extraordinary record in just the past few years. My second point is oversight. When congress amended fisa in 2008, i was at the department of justice. Congress established the unprecedented oversight regime for 702. And under this regime, as you have heard now, all three branches of government exercise authority to ensure that the deposit is properly using this authority. The oversight has been strengthened over the past several years to both congressional and executive branch action. This rigorous oversight regime reflects the careful balance that congress struck in 2008. To ensure the effectiveness of this authority. In my experience, the statute has been effective in doing both. The third point i would like to make is to suggest that calls from major reforms are not warranted. One issue that the committee has heard about this morning is the socalled incidental collection issue. A person targeted for surveillance under 702 who speaks on the phone or sends an email. And will communicate with someone in the United States. This is incidental collection. Some raised concerns about the such collection. I can tell you from my experience from the ability to obtain and use the communications is provening vital to disruption of plots to those in the United States. The azazi case is an example of this. I believe congress should estrict the governments ability to acquire and use such information concerning u. S. Persons. A second issue involves the ability to search 702 with the u. S. Person identifiers such as names and email addresses. I believe these queries are oo essential means to identify critical intelligence that would otherwise be inaccessible. From an operational perspective, when intelligence analysts seek to identify operatives in connection to suspected terrorists, would be one of their very first steps. So if the fbi suspects a person here is moving toward violence, the ability to query 702 information enables the fbi to move quickly to identify communications that the government has already lawfully collected to find vital clues. I believe this approach reflects an enduring lesson from the 9 11 attacks. That is the impairment for the government to effectively and use relevant information it holds in its databases in order to connect the dots. Some are now urging congress to impose probable cause requirements on the intelligence abiliticies before they can search section 702 data with the u. S. Person identifiers. In my view, this would i understand mine the ability of the agents to move quickly to identify terrorist information. At the early stage of the investigation, it may be impossible to establish probable cause and therefore such data would be beyond their reach. And so, mr. Chairman, the authority of congress established under section 702, has played an indispensable role in protecting this nation and allows them to collect private information and protects the Civil Liberties of americans. Thank you. Thank you, mr. Klein. Senator feinstein and members of the committee, thank you for allowing me to testify today. In a recent report, two coawe tho coauthors and i. We concluded that section 702 is a valuable intelligence tool that should be reauthorized with existing statutory authorities and impact. But we also proposed enhancements to oversight, transparency and privacy. The public should know that section 702 is already subject for rigorous multilateral oversight from all three branches of government. Few Government Programs receive such close scrutiny. That said, its always worth considering what more to do to protect privacy and strengthen public trust and programs. This is not just a privacy issue, it is important for National Security. Programs that lack public support will not be politically sustainable in the longterm. The challenge is to do this without diminishing section 702s effectiveness as an intelligence tool. Broadly speaking, there are three areas of opportunity. The first is institutions that oversee 702, including the fisa court and the Oversight Board. The second is greater transparency, so about how 702 affects americans, how agencies query the 702 information and how the government uses the 702 information in the criminal justice system. The third area is to strengthen accountability for those who receive signals intelligence reporting to ensure that classified material is handled responsibly and never used for inappropriate purposes. Including political purposes. I would also like to mention one thing i hope this process will avoid. One of the 9 11 commissions key messages was the intelligence agencies need to be able to connect the dots between various pieces of information they have collected. I worked for tom cane and lee hamilton in 2004 during the process that led to the creation of the dni and the nct. I know that congress and the Intelligence Community has moved heaven and earth to break down information of the stove pipes in the ioc. With the grave terrorist threat still confronting us and the allies, it would be hard to reverse course on that progress now. We should not create these agencies from stopping the terrorist attacks. Im happy to provide more detail on any of these points during the q a. Thank you and i look forward to your questions. Thank you very much. Chairman grassley, chairman feinstein and thank you for this opportunity to testify. On behalf of the Brennan Center for justice. Congress goal when it passed the fisa Amendment Act in 2008 was to give our government more powerful tools against government threats. The government used this authority to monitor suspected terrorists overseas, to trace their network and interrupt their plots. Thats exactly as it should be. We are here today because of the other things that section 702 has been interpreted to allow. The government is not simply monitoring Foreign Terrorists or powers. Instead, it is scanning the content of almost all of the International Communications that flow into and out of the United States and acquiring hundreds of communications each year, including a large, though still unknown, number of Americans Communications. In addition, despite being required to minimize the retention and use of americans data, the government keeps the data for years and routinely searches it for information to use against americans in ordinary criminal cases. Indeed, current rules allow the fbi to read americans emails and listen to their phone calls without any factual predicate to suggest wrongdoing, let alone a warrant. I dont believe this is what congress had in mind when it passed section 702. But in writing the law, congress entrusted the executive branch and the fisa court with significant discretion. For instance, Congress Allowed the targeting of any foreigner overseas, trusting the government to focus its efforts on those who pose a threat to our interests. Congress also left it to the executive branch and the fisa court to fashion specific minimization rules. I dont mean to imply that this trust was misplaced. In fact, weve seen essentially no evidence of intentional misuse. But what we have seen is mission creep. So allow designed to protect against foreign threats has become a major source of warrantless access to americans data and a tool for ordinary domestic law enforcement. This outcome is contrary not only to fisas original intent, but to americans expectations and their trust congress will protect their privacy and freedoms. There are several Reforms Congress could enact that would shore up proexits for americans while preserving the core of section 702, the governments ability to collect the communications of suspected terrorists and others who wish us harm without a warrant. Event when the communication transit through or are stored inside the United States. Ill touch on three of the key reforms here. First, congress should narrow the scope of surveillance by requiring the government to have a reasonable belief that the target is someone worth targeting, such as a foreign power or suspected terrorist. This would be an internal determination that would show no probable cause with fisa court approval. This reform would offer critical protection, not just to lawabized foreigners but to americans. When the government can target any foreigner overseas, that enables a massive amount of collection of innocent conversations between americans and their friends, relatives and associates abroad. Those communications then sit in huge databases where they are vulnerable to data theft, hacking, negligent mishandling and potentially abuse. This reform is also vital for the United Statess tech industry. The governments ability to target any foreigner overseas is one reason courts have validated agreements between u. S. And european companies. Thats why 30 major u. S. Tech Companies Including google, microsoft and facebook, signed a letter urging congress to limit the scope of section 702 surveillance along with other reforms. Second, congress should require the government to obtain a warrant before searching section 702 data for Americans Communications. Contrary to what mr. Evans said earlier, restrictions on searches of lawfully acquired Digital Information are the constitutional norm. Even when the government has a warrant to seize and search digital data in a criminal case, it cannot run a different search of that data for other reasons without obtaining a warrant. It certainly should not have that freedom when it obtained a warrant based on a premise that its only target is foreigners. Third, congress should end the data collection. This practice has no basis in the statute or legislative history. Its a small part of upstream collection which is itself a smart part of 702 surveillance. The privacy concerns it raises are significant. This is clearly a case where the risks outweigh the benefits. These basic changes would better align the statute with the goals it is meant to serve. Ill stop there and look forward to taking your questions. Miss collins. Chairman grassley, Ranking Member feinstein and members of the committee. Thank you for the opportunity to testify today. I provide this testimony in my capacity as an individual board member of the privacy and Civil Liberties Oversight Board, an independent executive Branch Agency commd with providing advice and oversight with respect to federal counterterrorism actions. From 2013 to 2014, our fivemember bipartisan board conducted an extensive examination of the 702 program. In july 14 we concluded a report to show the 702 program is valuable, statutorily authorized and at its core constitutional. We set forth the legislative foundation for the program. The implementing procedures that govern the operation of the program, and the extensive oversight structure that accompanies the program. We also unanimously voted out ten policybased recommendations. Each of which has been implemented or is in the process of being implemented and none of which required legislation. My oral and written testimony draw heavily from the boards report, which continues to be a valuable resource for understanding and assessing the program. The board conducted both a legal and policy analysis of the section 702 program. We unanimously concluded that the program has a limited scope. It does not authorize or result in bulk collection. Instead, it authorizes the government only to engage in targeted collection of telephone and Internet Communications of nonu. S. Persons located abroad who are likely to communicate information about courtapproved foreign intelligence topics with the compelled assistance of providers. Although u. S. Persons may not be and are not targeted, u. S. Person information may be incidentally collected. In that aspect of the program was a core focus of our attention leading to key recommendations on minimization procedures. We also weighed the privacy implications of using u. S. Person identifiers to query 702 data. The queries are consistent with years of direction to the Intelligence Community to connect the dots but also through raising significant privacy implications. We made recommendations designed to address those implications. The board also focused on the judicially approved minimization procedures governing the program. We noted the special protections afforded to u. S. Persons and made recommendations designed to tighten certain aspects of the procedures. Finally, we considered the labored oversight that accompanies the 702 program. Oversight occurs in all three branches of government and can only be described as rigorous. Although we identified no instances of deliberate abuse, there is always the possibility of human or technological error, as would any complex program and robust oversight is essential. We concluded that the program is statutorily authorized and the program is constitutional. Although certain features of the program push it close to the limits of Fourth Amendment reasonableness. Specifically, we raised and addressed concerns about incidentalcollection and the use of u. S. Identifiers as board terms. The board also expect significant time understanding the value of section 702. It has helped the United States learn more about the membership, leadership structure, priorities, tactics and plans of International Terrorist organizations. It has enabled the discovery of previously unknown terrorist operatives as well as the locations and movements of suspects already known to the government. It has led to the discovery of previously unknown terrorist plats directed against the United States and Foreign Countries enabling the disruption of the plots. Overall, we came to appreciate the flexibility that section 702 affords the executive branch while still within the framework of judicial approval and oversight. The boards report and recommendations are consistent with what has been called a clean reauthorization of section 702. We made serious recommendations, each of which we thought necessary to enhance privacy and Civil Liberties protections but none of which required legislation. Each of these recommendations has been or is being implemented. I personally view section 702 as a valuable tool in the fight against terrorism and believe the current framework for section 702 provides the necessary protections to ensure that our American Values are not compromised. I look forward to answering your questions. Let me start with a question for all of you when to some extent, each of you or maybe i shouldnt say each of you, but some of you touched on this. You heard me mention earlier some suggesting that the government should have to get judicial approval or even a warrant before searching lawfully collected 702 information using u. S. Person information. Yall come from different perspectives and you also have different backgrounds. I would like each of you to answer the question, is there any legal or constitutional reason why we should require judicial approval of a warrant before section 702 collection can be searched using u. S. Persons information . Thank you, mr. Chairman. First, i think the answer is no. Judge of the fisa court addressed this head on. To permit the fbi to conduct such searches without going to a court in the first instance to obtain a warrant or any other judicial approval. I would point as a hypothetical example to the zazy case. An individual in colorado who was in touch with an al qaeda courier in pakistan. If somebody said to the fbi, this person zazy is in the midst of plotting to carry out an attack on the new york subway. The fbi wore barred from searching its own databases if a connection was between zazy and this courier in pac. It allows the fbi to determine what else they need to do. And i would suggest imposing a judicial requirement would bar that information from the fbi being able to access it. Mr. Klein. This is certainly not a trivial privacy question. That said, i agree entirely with mr. Olsons analysis of that. One point i would like to add, we now have information in the Public Domain about the scale of this problem. How much foreign intelligence information is coming through this channel into the criminal justice process. And we know from the most recent ic statistical transparency report that there was only one case in 2016 where an fbi agent actually pulled up 702 information in a u. S. Person query in an ordinary criminal case. Given that the scale of this is very limited, i think it would be a significant overcorrection with major consequences for National Security potentially if we were to impose a court order requirement. It is not a trivial privacy question. We can have more transparency about why these queries are necessary. We could have more information about precisely how often the bureau does them. And how often they return information. Weve proposed a possible slight narrowing of these queries in some cases in my written testimony. But, by and large, i think the current practices need to continue. Were talking about this information. As if it somehow landed magically in the government databases. The way the government got this information without requiring a warrant in the first instance, even though it knows it will be pulling in Americans Communications incidentally, is by also proing the fisa court, by certifying its only interest is in the foreign targets. It has no intention, no interest in any particular known americans. If it, instead, went to the fisa court and said there are particular known americans whose communications we are hoping to read as a result of this collection, then the government would have to get a warrant. So, to me, warrantless backdoor searches are a violation of the spirit, if not the letter, of the reverse targeting prohibition. I will also say as a constitutional matter this is only quite recently been looked at by any courts outside of the fisa court, but the notion that once data is seized, the Fourth Amendment is done and the Fourth Amendment doesnt apply to any leader searches is actually not correct. You can tell by analogies to criminal cases in which data may be seized under a warrant but if the government wants to conduct a separate search later for different reasons, it actually does have to go get another warrant, even though its already collected data and its sitting lawfully in the government databases and i can provide that case law. Based on the boards analysis, i do not believe prior judicial review for a u. S. Person query is constitutionally required or advisable as a policy matter. We spent a tremendous amount of time on the issue of u. S. Person queries. And we made a number of recommendations designed to enhance privacy protections. These recommendations, which have been implemented, impacted the nsa, the cia and the fbi. But after extensive discussion and consideration, the majority of the board declined even in the most difficult case which is the instance of a query by an fbi agent in an ordinary case to recommend a warrant requirement. We were concerned that such a requirement would raise the threat of rebuilding the socalled wall between intelligence and criminal investigations. And that criminal investigators needed to be aware of potentially relevant 702 information. We did, however, recommend additional restrictions on the use and dissemination of any such queried information. Senator blumenthal, should i call on senator lee while youre getting really or are you ready . Okay, go ahead. First of all, regarding the fisa court and the mitchy missy brief, the role that they play, i have long been concerned about ensuring that the fisa court, which authorizes and oversees government Foreign Surveillance activities under section 702 as you know and other authorities, has sufficient information about the Civil Liberties and privacy implications of the decisions that it makes. In 2013, i proposed legislation to establish a special advocate to assist the court in that task. And i think its fundamental that the fisa court hear different perspectives and the weighty statute concerns in this area. In 2015, congress, as you know, passed the usa freedom act which created an institutional freedom process for participation of amicus curi to provide the fisa court with information about Civil Liberties and privacy concerns when the court is presented with novel or significant questions of law. The court has i understand appointed five amisi to fill this purpose. So my question is do you think they have played a helpful role, how could this process be improved, and what do you think are the next steps for fisa Court Reforms in regard to bringing these different perspectives to bear . And thats for the whole panel. Thank you, senator. This is something ive written about. I agree with you entirely that the amicus development is a good thing. I work in the space so i read the fisa court opinions. I read the u. S. Courts transparency reports. I know rigorous oversight. If you talk to ordinary people, theyre skeptical. There are two reasons. Because its in secret and that really cant change by and large, although the declassified opinions are a good thing. The other reason is because in most cases only the government gets to argue. And people are used to a court where both sides get to argue. The usa freedom act adding amicus is a good thing. As we know, its in the courts discretion. So given the significance of the annual 702 resort ification resort resort ification proceeding, one thing i have proposed i think would help strengthen the Public Confidence, that that is rigorous oversight. To require the court to appoint an amicus. Which is problematic oversight. This is a way to build trust in 702 that people know its getting rigorous scrutiny. It wouldnt affect the governments implication of the program, which is what were all concerned about, one bit. Thank you. Senator blumenthal, i want to thank you for your leadership on that specifically. I think it was an extremely important contribution of the usa freedom act. I think its clear from the act that congress intended for the fisa court to make use of amici, really any case in which there was a novel or significant legal issue unless there was some extraordinary circumstances. For the most part, the court has done that. There were a couple of occasions in which the court has found participation inappropriate based on the rationale the court didnt need help. I dont think thats consistent with what was intended. But thats been rare. Thats something i think this committee should keep an eye on. I do think it makes sense to have participation in the annual certification process. Be mandatory. And the one other thing i would suggest is theres currently no provision for amici to appeal rulings of the fisa court if the amici arguments were rejected. And sometimes thats important. I think we saw in the fisa courts decision on backdoor searches, there were a number of, to say the least, very novel legal issues there that would have benefited from review. I think congress would usefully provide a Provision Requiring automatic supervision to fisa court of review in significant cases where the amicis arguments are rejected. Thank you. The privacy and civil libertys Oversight Board spent a significant amount of time looking at the workings of the fisk and we addressed the Surveillance Court both in our 702 report, which is the subject of todays hearing, and our section 215 report. We made a series of recommendations which were designed primarily to enhance Public Confidence in the workings of the fisk and the oversight that body provides. We supported the concept of a special advocate. It was one of our recommendations. We did ultimately leave it to the discretion of the article 3 judges who sit on that court. But to miss goiteins point, we did also recommend consideration of a mechanism for appeal, although not as of right. As you know, my initial proposal was for a special advocate and that it be, in fact, at the advocates discretion whether to be engaged not at the courts discretion. So i would welcome thoughts as to how to improve the present process. Did you have any comments, mr. Olson . No, thats all right. I would simply add, somebody who has appeared many times before the fisa court on behalf of the government, that the characterization of the court as a rubber stamp or insufficiently cognizant of the array of issues before it i think has been unfair. That said, i agree with the benefits from a public legitimacy standpoint of including the opportunity for these judges to appoint amici in appropriate cases. I largely agree with my colleagues here, how thats worked out over the past couple of years. We all know the best judges who are not rubber stamps welcome the advocacy strong and vigorous advocacy on both sides of an issue. Enables them to make better decisions. Their worst nightmare, in fact, is a defendant who is unrepresented, or is representing himself in many respects. I agree. Thats the way the system works. Thats the spirit that led me to make this proposal. Thank you all, very, very much. Thank you, mr. Chairman. Senator lee. Thank you very much. When senator lees done, ill just have one question and then i think well be done. Miss goitein, id like to start with you. Why is it concerning if agents decide not to use information that they obtained when doing a backdoor search . In other words im sorry . What kinds of concerns does it raise when youve got somebody doing a backdoor search, whether they use it or not . Why is that a problem . I see your point. The point is the search itself is a violation of americans privacy. Thats the heart of the Fourth Amendment, is that the government has to have a warrant before entreating on an americans reasonable expectation of privacy. And whether or not they find something as a result of that does not affect the privacy intrusion. It has other effects potentially. But, you know, if the government enters your house without a warrant and doesnt find anything, theres no argument there that somehow your privacy wasnt invaded because the search was fruitless. So i think we have to understand the nature of the privacy intrusion when the government is allowed to search Americans Communications without a warrant. Okay. What kinds of things can information be used for . What kinds of investigations could incorporate information obtaineded through a back door search . Well, we dont know exactly for a couple of reasons. One reason is because the list of crimes unrelated to National Security, that the department of justice is authorized to use section 702 data when prosecuting, that list is not public. All we know is its serious crimes. We dont know which crimes those are. And despite repeated requests, with the statutory requirement that it notify criminal defendants when using evidence obtained or derived from section 702. The governments interpretation of derived from appears to be quite generous, perhaps creative. But once again the department has refused to make that interpretation public. Its fighting requests for that interpretation tooth and nail. What we do know is there were no notifications given at all until 2013 and then when the government was essentially caught telling the Supreme Court that it notified defendants when it doesnt, it changed its practices. Since then, i think there have been eight cases in which there were notifications. Despite the fact the fbi routinely searches section 702 data in certainly National Security cases, and there have been hundreds of National Security prosecutions during this time. So we have an information deficit here. In fact, we dont really know, we dont have any idea how often this occurs. You know, the Organization Recently signed a letter to the director of National Intelligence expressing dismay as to why he was choosing not to provide an estimate as to the number of americans who were subject to these. Yes, and if i could, i would like very much to speak to the notion that this is somehow infeasible or at least not without drastically violating americans privacy. There are three kinds of collection under 702. The first is collection of telephone calls. It is a simple matter to assess, to estimate, whether someone on one end of the call is an american and thats by looking at the country code. Its not perfect. But were not looking for perfection. Were not looking for an exact count. Were looking for an estimate. It is certainly sufficient for that purpose and involves no privacy intrusion. The second kind of collection is upstream internet collection. When the government conducts this kind of collection, it must first run a filter to try to filter out wholly domestic communications. It doesnt do this by doing a lot of research that invades americans privacy. It does this using ip addresses and some comparable technical means. In doing so, it manages to filter out enough. Domestic communications that it can comply with the constitution. So if this method of determining the american versus foreign status of a communant is sufficient for purposes of complying with the constitution, i think it should be sufficient for purposes of giving americans a rough sense of how many of their communications are collected. Sure. The Third Program is where there are more complicated issues. Even for that program, the privacy community is unanimous is saying that conducting a onetime limited sampling under careful conditions would be a net privacy gain. Thank you. By the way, mr. Chairman, id like to submit that letter that i referenced a moment ago for the record. As the letter notes, senator widen has been requesting this information since 2011. The House Judiciary Committee and privacy groups have been requesting that information now for nearly two years. And members of the house of representatives were promised, i believe, by director clapper and director coates that the estimate would be forthcoming. So we have yet to receive that information. Sounds like you certainly share my concern with the fact that notwithstanding those assurances and notwithstanding the Public Interest in this, theres no information yet. Theres no information. But there was a lot of progress. Under the previous administration, there were several meetings that the Intelligence Community had with house members, with members of civil society. They discussed methodologies. They were considering there was a tremendous amount of progress on this. And the letters from the members of the House Judiciary Committee confirmed their understanding that the administration had committed to providing that number in early 2017. Hopefully by january, and, in fact, all accounts, public and private, suggest they were on the verge of launching that count towards it is end of last year. We had a change of administration and the government has now backed off of its commitment to provide that information. Thank you very much. Thank you, mr. Chairman. Senator, i just have one question, it will be for miss collins. I believe that transparency and government leads to increased accountability. I suppose all of you believe that too. One of your boards recommendations was to provide additional transparency surrounding how often nsa obtains and uses incidentally collected communication of our citizens. I also understand that in february 2016, the board described the recommendations as being implemented. So this is the question. The boards last report on this was about a year and a half ago. So can you walk us through the specifics of the five things the board recommended in this area and provide us an update regarding the status of implementation by the executive branch . When we did our report on section 702, we spent a lot of time on the issue of incidental u. S. Person collection because it has both policy and constitutional implications. And we ultimately did identify five measures designed to provide insight into incidental collection. And these are collectively reflected in recommendation nine of our report. It has been partially implemented. Without getting into too many details, i can address this in further detail tomorrow in the classified briefing. To miss goitiens point, the recommendations that involve telephone data are easier to implement. Its just more feasible. I am sympathetic to the arguments of the dni and the nsa, that there are operational hurdles. There are technological hurdles to providing some of the information that has been requested. Im sympathetic that there are certain methodologies that have been suggested that would increase privacy concerns. But i would add my voice to those who urge the dni and the nsa to continue to find a way to provide some quaint ification or some estimate of incidental u. S. Person collection. I want to thank all of you for your participation and thank the audience and all the staff that participated. Well proceed well proceed some place online. Thank you very much. Tomorrow night at 7 00, American History tv. Well be joined by top museum staff to learn about exhibits. Preview. So in this gallery then, we kind of unpack the story of the declaration of independence. We have a small theater which explores the actual process of drafting and passing the declaration of independence. We rotate on display printings of the declaration. Of course, were all familiar with the engrossed copy on parchment you can see in washington, d. C. At the national archives. But other than members of congress, very few people ever saw that document. Certainly in the 18th century. Most people encounter the text of the declaration, either from newspaper, broad side printings or having it read out loud in the various communities. So we rotate on display different printings of the declaration. Right now, we have one of the rarest actually is a german language printing here in the center. There are only two copies of this july 1776 printing of the declaration in german that have survived. This has been shared with us by Gettysburg College in pennsylvania. And then its side by side with a salem, massachusetts, printing of the declaration. We also explore the promise of equality. So this notion that all men are created equal endowed by their creator with certain inalienable rights. Thats language that of course has to be, each person has to decide does that apply to me. So the people who wrote those words maybe didnt actually recognize the revolutionary potential in them. Actually some people like john adams we think probably did realize when you declare that all men are created equal, people might say, well, what about women. What about enslaved people. Laboring men. And so we try to explore that story through this wall here where we look at the status of laboring men, of enslaved people, of women, including abigail adams. Determined to overwhelm the rebellious colonies learn more about the exhibits and ask museum staff about the american revolution. Tomorrow night at 7 00, live on American History tv on cspan 3. Now, a forum on government corruption around the world. Especially in developing countries. And its potential effects in the United States

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.