In this material and other types of material. And create a blind spot and intelligence collection. You have to think about the technical complexity you are suggesting so this is segregated in some way, treat it in some way. That could lead to a training issues. We actually do it in a way that would be different from other types the we handled. One brief point to this, the last decade and at half, they were set up to investigate after a variety of terrorism events 9 11, fort hood, the underwear bomber and so on, consistently everyone of those commissions has found that we need to eliminate barriers to making use of information that is lawfully in our possession to better protect the nation and requiring some kind of additional process before we can query this information directly contrary to the recommendations of all those. I see my time is up. I never had a chance to introduce the panel to the benefits that they are familiar to us and benefit the audience. We have jim baker who is gen
Hopefully the technology will work for us and we havent been hacked in the interim. Here we go. To move on why a book about cybersecurity and cyberwar and why now . For me, its best encapsulated by two quotes. The first is from president obama. He declared that cybersecurity risks posed quote a most serious economic and National Security challenges of the 21st century the second quote is from a former cia director who said quote rarely has something been so important and so talked about with less and less clarity and less apparent understanding. So that cross between something that is in front of me and important but less and less understanding again you can see it in all sorts of different ways and all sorts of different fields. For example 70 of business executives, and not 70 of cto circe s. Oz but executives in general have made some kind of cybersecurity decision for their Company Despite the fact that no Major Business Management Program teaches it as part of the normal responsib
Get that information. And that is the overarching order that goes to the company. And complied with taskings. That asked my colleagues. The statutory term. And operational term to refer to Something Like an email or phone number, Legal Process, tasking being internal government terms for how you started the collection on a particular sector. Building on that what is the rationale for collections . If the target is the email account or the phone number, what is the justification for gathering communications between two persons who were discussing the phone number or email address, there is no to or from their email address or phone number. Why is that targeting permissible under the statute . The conclusion in a typical case, if you are targeting bad guy google. Com, you are targeting that persons account, their communications. It is not necessarily communication to or from that bad guy but that selector and so what the court has concluded is when the statute uses the term targeting a p
Or if its a phone number, that phone number. When we say selector, its an arcane term, its phone numbers, email addresses, things like that. Targeting means thats the one youre trying to get. They may be in communication with other email addresses or phone numbers. Those are not the targeted numbers or accounts. They are incidentally acquired because they are on the other end of these communications. Thats what target is the one you are going after. The statute requires that target be a nonu. S. Person located overseas. Thats the important determinations we are looking at. We go to great lents to make sure that target is a nonu. S. Person and overseas. Tasking . When youre going and saying, ok, i want to task this account, you he want to collect nfingts from that account. Thats the collection you have the selector. You have the selector. Thats when you take that selector to the company and say this ones been approved. We conclude it belongs to a nonu. S. Person overseas. And then we go
To enter, because they are [indiscernible] on the issue of territories being shifted around, for example, to that. I dont think youll find the chinese standing up and shouting for the russians. Anyone else . Roger . In terms of the second part of the question, it is hard to understand exactly what pivot to asia meant. It was a phrase and it has floated out there and there have been meetings about it. It is not altogether clear, to me, at least, what it has meant. But i think what president putin has presented the west with is a strong case for looking again at the transatlantic alliance, looking again at the defense budget, looking again at the fact that the european neighborhood is not so safe and secure that we can simply transfer our attention elsewhere. I think china has a very ambivalent response to what has happened. It doesnt like borders changing. They have abstained. That is an indication. I do not expect a scenario of world war iii. I do not expect some chinese move on taiwan