dramatically,in fi tes mally small chance you re going to have this problem going forward, any individual would. and the way we deal with it are perhaps in the future they ll put countermeasures on civilian aircraft. in the meantime count terrorism operations and just hoping that the luck will keep going the way that it has. for the most part. obviously there are sop aberrations. and don t go over dicey air space areas. you definitely don t want to fly over a war zone unless you have a really good reason. poor people never saw it coming. that wasn t restricted air space where they were, but it was nearby. buck, good to see you. good to see you. up next, the tv reporter working for russia today quitting her job over the plane shootdown. we ll explain more after the break. pay your auto insurance premium every month on the dot. you re like the poster child for paying on time. and then one day you tap the bumper of a station wagon. no big deal. until your insurance company jacks
shia. that was a mistake. we could debate that for years to come if that was his i do think it was a serious mistake, but we helped condition his behavior. right now the threat is to the united states and to our european allies and a rising al qaeda army. these are not monkey bar terrorists out in the desert planning some very low-level attack. these are sfisz indicated command and control seasoned combat veterans who understand the value of terrorism operations, external to the region. meaning europe and the wraits. that is about as dangerous as you can put together. for us to say maybe some else needs to deal with it, we will deal with it, but it is a matter of what it looks like. iran, there s a lot of talk. the president of iran talking yesterday about, well, we ll get involved and maybe we ll work with the u.s.
bipartisan basis to establish an oversight structure for cyber operations, for terrorism operations, and for sensitive military operations. and after oversight structure that allows the department to have the flexibility it needs to operate in a volatile, rapidly changing world and still give us the ability to exercise our duties under the constitution. now, the basis for all of those in all three of those areas is that we get timely, accurate information from the department. and this failure even if it was ordered by the white house, undermines the ability to have that sort of oversight structure. i ve been a member of the intelligence committee for ten years. our work depends on getting accurate, timely information from the intelligence community. if the president can violate the law and say no in this case we re not going to give you the information, it undermines the oversight process that we have
napolita napolitano. he s nominating jay johnson. former pentagon lawyer. this doesn t come without controversy. barbara starr is live at the pentagon with more details. good morning. reporter: good morning. jay johnson, very well known here at the pentagon where as the top lawyer he oversaw a staff of 10,000 pentagon attorneys around the world. very much a legal expert with a back ground in terrorism issues. he has spoken extensively about he believes the american people need to change the way they think about the war on terrorism, that it s becoming much less about military operations and much more about law enforcement and intelligence, very much in line with president obama s thinking. he s very much a supporter of using drones overseas for those targeted, very specific killing of suspected terrorists. he s even talked about the circumstances in which he supports the killing of americans overseas involved in terrorism operations.
the foreign intelligence surveillance court, something i worked with and supervised attorneys in the justice department when i there was and have to do a court order and request from the court which reviews your reasons for it and the legal basis for it, what it is you want. let s be clear, your honunder tt order, all they are getting is the meta data, who called you, the numbers, the duration of the phones, not authorized to collect the content or listen to the content of that phone call, and, in fact, for some reason they develop additional probable cause, they have to go back to the court and seek the court s permission to use the content. they use the tell phony data and meta data to identify affiliations. that s why you hear the senior administration official say it s played a critical role in count every terrorism operations. that shouldn t be a surprise. do they have a responsibility