comparemela.com
Home
Live Updates
Transcripts For CSPAN2 Capital News Today 20130710 : compare
Transcripts For CSPAN2 Capital News Today 20130710 : compare
CSPAN2 Capital News Today July 10, 2013
Subpoenas without
Court Approval
for documents relevant to an authorized inquiry. In addition, grand juries have authority to subpoena the records potentially relevant whether a crime has occurred and the grand jury also dont require
Court Approval
. In addition to for the amendment doesnt require a warrant when the government seeks purely transactional information or medved ai as the states content of communications. This information is voluntarily made available to the phone company to compete the call and for billing purposes and for the courts have therefore said a reasonable expectation as private. I would stress however section 215 is more restrictive than the constitution demands because it requires the approval of the federal judge. While the medellin is extraordinary in terms of the amount of data required its also extraordinarily protective in terms of the strict limitations placed on accessing the data. For these reasons i think the program is entirely conducted in a manner that appropriately respect the privacy and the
Civil Liberties
of americans. Thank you. Thanks for the invitation to participate. Since these programs were disclosed much of the public debate has focused on issues of policy and i think thats understandable. No government has ever trained this kind of surveillance power on its own citizens. Until quite recently none had the technological capacity to do that. We need to think carefully about how the exploitation of the technologies could affect liberties that generations of americans have fought to protect. What i would like to underscore today is the surveillance programs are not just on why is the but they are unconstitutional as well and i would like to focus principally on the 215 program with the hope we will be able to return to the seven note to leader on a. Under the program the nsa collect the data about every phone call me or received by a resident of the
United States
. They are collecting the medved data as well making the notes of every email he or she receives. The program is a massive dragnet, one that raises many of the concerns associated with general warrants that is many of the concerns have led to the adoption of the
Fourth Amendment
in the first place. You might say that the orders are general warrants for the digital age. The president and the dni emphasized the government is collecting medved data, not content. But the suggestion that the content is beyond the reach of the constitution is wrong. For
Fourth Amendment
purposes the crucial question is and whether the government is collecting dennett data or content but whether it is invading the reasonable expectations of privacy. And here it clearly is. The recent decision is instructive. In that case a
Unanimous Court
held that longterm surveillance of an individual location constituted a search under the
Fourth Amendment
. The justice has concluded in
Different Reasons
at least five justices viewed the surveillance and french and reasonable expectation of privacy. Justice ensured trekking in and
Vegetables Movement
over a period of time allows them to generate and quote a precise comprehensive record that reflect the wealth of the detail about her political professional religious and sexual associations. They are taking place under the section 215. The records can reveal personal relationships, metal issues, political and religious organizations. The data may be more revealing allowing the government to learn which websites a person visited, precisely which article she read, who she corresponds with and who those people correspond with. The surveillance constitute a search for the same reason the longterm surveillance of the location was found to constitute in jones. It was found unconstitutional in jones was narrow and shallow than the surveillance taking place under the section 215. It was meant to further a specific criminal investigation into the specific crime and the government collected information about one persons location is a period of less than a month. Its an indiscriminate program that is already set up the communications of millions of people over a period of seven years. Some argued section 215 the program under section 215 days lawful which upheld the criminal investigation. But the pen register in smith was very primitive and attract the numbers being dialed but it didnt indicate which calls were completed alone the duration and the surveillance was directed at someone to the cussing will criminal suspect. The police or not casting a net over the country. Another argument offered in defense of the program is that the nsa collected immense amount of information, it examines only a tiny fraction. But the
Fourth Amendment
is triggered by the collection of information not simply by the clearing above it. The same is true of the
First Amendment
because the
Chilling Effect
of government surveillance stems from the collection of information not nearly the analysis of it read the constitution isnt indifferent to the governments accumulation of the quantities of
Sensitive Information
about americans lives. Neither should the board be. Its worth remembering in the context of that other countries have inspired a total awareness of their citizens associations, movements and believes. The experience of those countries serve as a caution, not as a road map. Thank you for inviting me to participate. I look forward to the questions. Thank you. Thank you for inviting me and giving me the opportunity to participate today. I want to take this opportunity to raise some overarching concern is i hope the board will address before making specific recommendations about the necessary changes to the section 702 or 215 and begin by quoting the senator who in 1974 as the author of the privacy act noted that the more the government knows about us, the more power it has over us when the government knows all of the secrets we stand naked before official power the bill of rights then becomes just so many words. I think it is not debatable secrecy increases the danger that the government will over reach. Nor is it debatable but the foreign intelligence activities depend to some degree on the secrecy and that a democracy must continually work to figure out ways to provide for the
National Defence
while respecting
Civil Liberties
and preserving the constitutional government. The increase in technological surveillance capabilities, global connectedness and reliance on
Electronic Communications
of daily life has made during this more complex and even more important. I want to ask, however, whether or not the expansion of the government surveillance and secret legal authorities especially in the last 12 years requires us to ask whether we are witnessing the serious erosion of our constitutional system of checks and balances and the system of the secret law decreed by the courts, carried out in secret, enabling the creation of massive secret government databases on americans personal and political lives. As you know quite well the system of checks and balances relies upon first the existence of the conference which engages in and is influenced by a public debate. It relies upon the existence of courts, which have to slides to the question and know their opinions are subject to appeal and subject to public critique. And the executive branch who will be called to account should they ignore or violate the law. Fundamentally all of this depends upon the existence of an informed and engaged press and public. So why does it matter . I think it matters fundamentally for two reasons. First the system is set up in order to prevent the government from breaking all and to ensure that if it does so that will become known and the executive branch will be held to account for doing so. Second, the system is meant to prevent the government from using its surveillance capabilities to target its political opponents, to kill the political dissent and limit the political debate and options in this country. This is not a theoretical concern of course in my lifetime. It has happened many times already in this country. Perhaps later on i could detail what i found to be the shocking revelation of the history of the programs beginning in 2001 and resulting in where we are today. We only learned from unauthorized leaks that there is at least one secret opinion authorizing the massive collection of telephone that the data and we still dont know what the secret list all ages about the collection of the massive amounts of internet mehdi the although we know that presumably this
Administration Stopped
that. We have no idea whether or not the law would permit that to resume. I think the question we need to ask is whether or not the system of checks and balances needs to be reaffirmed so that it acts as a safeguard to these harms. There is the history of the date on the issues over the past few years demonstrate the debate has been incomplete. Its been informed by inaccurate information about the government. Its not deliberately. Finally, i just want to know that ive worked on these issues for almost a quarter of a century. And i think that probably of the many
Civil Liberties
and voices that have been raised to the programs i am maybe one of the least likely to be labeled an alarmist. I know that you had more you want to get to that any of the panelists and in the public can submit written comments to the board so if you like to submit, you are welcome to do that. Judge robert some . Thank you. I should probably first state that i am a member i am now and have been a member of the
Security Committee
of the constitution project which wrote a report in september of 2012 expressing some alarm about these programs and i signed the report and stand by it. But its not primarily what i want to talk about today. I did sit on the court for a few years. I asked to be appointed by the court frankly to see what it was up to. And i came away from it deeply impressed by the careful scrupulous work that the
Justice Department
people and the nsa and the fbi agents involved with it did. The fisa court is not a rubber stamp. The number of how many warrants get approved do not tell you how many were sent back for more work before they were approved. So i know firsthand, and i wish i could assure the
American People
that the project process has integrity and that the idea of targeting americans with surveillance is anathema to the judges of the court to which they call the fiske. But i have a couple of related points to make to the first, the process is ex party which means it is onesided. And that is not a good thing. Second, it now includes programmatic surveillance, and that i submit and will discuss for a few minutes i do not consider to be a judicial function. Now, judges are learned in all and all that. But anybody who has been a judge will tell you that a judge needs to hear both sides of the case before deciding. Its quite common in fact it is the norm to read one sides argument and think that sounds right until we read the other side. Judging is choosing between adversaries. I read the other day that one of my
Court Colleagues
resisted the suggestion that the approval process accommodated the executive or maybe the word was cooperated. Not so, the judge replied. The judge said the process was at adjudicated. I very respectfully take issue with that use of the word. The ex
Party Process
here is only one side. And what the fisa process does is not at adjudication. It is approval which brings me to my second and closer related point. The approval process works just fine when it deals with individuals applications for surveillance warrants. Because approving search warrants and wiretap orders and trap and trace orders and foreign
Intelligence Surveillance
one at a time is familiar ground for judges. Not only that but at some point a search warrant or wiretap order if it leads on to the prosecution or some other consequence it is usually reviewed by another court. But what happened after the revelations in late 2005 about the nsa circumventing the fisa process was the
Congress Passed
the
Amendment Act
of 2008 and introduced a new role for the fisk for the surveillance programs. That change in my view turned the fisa court and
Something Like
an
Administrative Agency
which makes and approves rules for others to follow. Again, that isnt the work of judges. Judges dont make policies. Ave review policy determinations for compliance with statutory law, but they do so in the context once again of the adversary process. Now, the great paradox of the
Intelligence Surveillance
process of course is the undeniable need for security. Secrecy, especially to protect the
National Security
Community Calls
sources and methods. That is why the
Supreme Court
had to refuse to hear
Amnesty International
. The plaintiffs couldnt prove the communications would likely be monitored so they had no standing. That is a classic catch22 of the
Supreme Court
jurisprudence. But i submit that the process needs an adversary. Its what the aclu or
Amnesty International
perhaps itself could have a role as a kind of institutional adversary to challenge and take the other side of anything that is presented to the court. I would like to focus my remarks today on when the authority of section 02. I would like to focus my remarks on the act and section 702 that was described earlier. The recent disclosures regarding the program have raised questions in some quarters about the appropriateness and the legality of the international with the
Internet Communications
traffic. With some expressing surprise the collection of that type and scale is taking place. In the view of the
Amendment Act
and as the record reveals however that the internet collection appears to be exactly what was contemplated when the
Congress Passed
the statute in 2008. I would like to take a moment to remind ourselves about the act and the reason it came into being in the first place. In 1970 to congress created a process by which electronic surveillance of the foreign powers and agents must first be approved by the court to be in doing so the congress recognized it had to balance the need for the judicial review process for domestic surveillance against the governments need to conduct them overseas for a constitutional protections do not apply. They sought to accomplish this by opposing the statute surveillance directly against persons within the u. S. And leading the
Intelligence Community
free without the undue burden of the court process. With the changing technology over the years since of this past however that foreign domestic distinction started to break down and the government found self expending significant manpower and the applications for the surveillance against persons outside of the
United States
the category the congress intended to exclude when it imposed the process requirement in 1978. As the problem got worse particularly after the 9 11 attacks, the government assault increasingly unable to cover its surveillance needs. Congress to its credit took up this issue in the spring of 2007 and over the next 15 months or so the numerous of officials including steve, rather bury myself and others spent hours testifying meeting with members and staff on the hill. And after a thorough analysis and deliberations the congress provided relief in the form of the
Amendment Act
which passed in the summer of 2008. Section 702 created a new process. The new process by which categories of support and surveillance targets can be improved for surveillance. Under the process the attorney general and the dni provided and will certifications identifying the target categories and certifying that all statutory requirements for surveillance of the targets have been met. The government intern designs procedures which are the operational steps that it takes to determine whether each individual surveillance target is outside of the
United States
as well as the procedures david described that limit the handling and dissemination of any information relating to u. S. Persons. The government then submits the certification as well as the targeting procedures for review by the court and the
Court Confirms
what theyre all stitch it really required steps have been taken in compliance with the
Fourth Amendment
. This process succeeds bring the operation back into line with its original intent. It supervises the use on many u. S. Person here or abroad or targeting any person believed to be inside of the
United States
to be conducted pursuant to an individualized court order. However it allows the government to conduct surveillance of the target overseas without the need to secure a individualized
Court Approval
. And it does so at the same time giving the court and
Important Role
in assuring the authority is used only against those persons who reasonably believe to be located outside of the u. S. In addition, the faa tasks various levels of conducting significant and meaningful oversight over this authority. The
Court Approval<\/a> for documents relevant to an authorized inquiry. In addition, grand juries have authority to subpoena the records potentially relevant whether a crime has occurred and the grand jury also dont require
Court Approval<\/a>. In addition to for the amendment doesnt require a warrant when the government seeks purely transactional information or medved ai as the states content of communications. This information is voluntarily made available to the phone company to compete the call and for billing purposes and for the courts have therefore said a reasonable expectation as private. I would stress however section 215 is more restrictive than the constitution demands because it requires the approval of the federal judge. While the medellin is extraordinary in terms of the amount of data required its also extraordinarily protective in terms of the strict limitations placed on accessing the data. For these reasons i think the program is entirely conducted in a manner that appropriately respect the privacy and the
Civil Liberties<\/a> of americans. Thank you. Thanks for the invitation to participate. Since these programs were disclosed much of the public debate has focused on issues of policy and i think thats understandable. No government has ever trained this kind of surveillance power on its own citizens. Until quite recently none had the technological capacity to do that. We need to think carefully about how the exploitation of the technologies could affect liberties that generations of americans have fought to protect. What i would like to underscore today is the surveillance programs are not just on why is the but they are unconstitutional as well and i would like to focus principally on the 215 program with the hope we will be able to return to the seven note to leader on a. Under the program the nsa collect the data about every phone call me or received by a resident of the
United States<\/a>. They are collecting the medved data as well making the notes of every email he or she receives. The program is a massive dragnet, one that raises many of the concerns associated with general warrants that is many of the concerns have led to the adoption of the
Fourth Amendment<\/a> in the first place. You might say that the orders are general warrants for the digital age. The president and the dni emphasized the government is collecting medved data, not content. But the suggestion that the content is beyond the reach of the constitution is wrong. For
Fourth Amendment<\/a> purposes the crucial question is and whether the government is collecting dennett data or content but whether it is invading the reasonable expectations of privacy. And here it clearly is. The recent decision is instructive. In that case a
Unanimous Court<\/a> held that longterm surveillance of an individual location constituted a search under the
Fourth Amendment<\/a>. The justice has concluded in
Different Reasons<\/a> at least five justices viewed the surveillance and french and reasonable expectation of privacy. Justice ensured trekking in and
Vegetables Movement<\/a> over a period of time allows them to generate and quote a precise comprehensive record that reflect the wealth of the detail about her political professional religious and sexual associations. They are taking place under the section 215. The records can reveal personal relationships, metal issues, political and religious organizations. The data may be more revealing allowing the government to learn which websites a person visited, precisely which article she read, who she corresponds with and who those people correspond with. The surveillance constitute a search for the same reason the longterm surveillance of the location was found to constitute in jones. It was found unconstitutional in jones was narrow and shallow than the surveillance taking place under the section 215. It was meant to further a specific criminal investigation into the specific crime and the government collected information about one persons location is a period of less than a month. Its an indiscriminate program that is already set up the communications of millions of people over a period of seven years. Some argued section 215 the program under section 215 days lawful which upheld the criminal investigation. But the pen register in smith was very primitive and attract the numbers being dialed but it didnt indicate which calls were completed alone the duration and the surveillance was directed at someone to the cussing will criminal suspect. The police or not casting a net over the country. Another argument offered in defense of the program is that the nsa collected immense amount of information, it examines only a tiny fraction. But the
Fourth Amendment<\/a> is triggered by the collection of information not simply by the clearing above it. The same is true of the
First Amendment<\/a> because the
Chilling Effect<\/a> of government surveillance stems from the collection of information not nearly the analysis of it read the constitution isnt indifferent to the governments accumulation of the quantities of
Sensitive Information<\/a> about americans lives. Neither should the board be. Its worth remembering in the context of that other countries have inspired a total awareness of their citizens associations, movements and believes. The experience of those countries serve as a caution, not as a road map. Thank you for inviting me to participate. I look forward to the questions. Thank you. Thank you for inviting me and giving me the opportunity to participate today. I want to take this opportunity to raise some overarching concern is i hope the board will address before making specific recommendations about the necessary changes to the section 702 or 215 and begin by quoting the senator who in 1974 as the author of the privacy act noted that the more the government knows about us, the more power it has over us when the government knows all of the secrets we stand naked before official power the bill of rights then becomes just so many words. I think it is not debatable secrecy increases the danger that the government will over reach. Nor is it debatable but the foreign intelligence activities depend to some degree on the secrecy and that a democracy must continually work to figure out ways to provide for the
National Defence<\/a> while respecting
Civil Liberties<\/a> and preserving the constitutional government. The increase in technological surveillance capabilities, global connectedness and reliance on
Electronic Communications<\/a> of daily life has made during this more complex and even more important. I want to ask, however, whether or not the expansion of the government surveillance and secret legal authorities especially in the last 12 years requires us to ask whether we are witnessing the serious erosion of our constitutional system of checks and balances and the system of the secret law decreed by the courts, carried out in secret, enabling the creation of massive secret government databases on americans personal and political lives. As you know quite well the system of checks and balances relies upon first the existence of the conference which engages in and is influenced by a public debate. It relies upon the existence of courts, which have to slides to the question and know their opinions are subject to appeal and subject to public critique. And the executive branch who will be called to account should they ignore or violate the law. Fundamentally all of this depends upon the existence of an informed and engaged press and public. So why does it matter . I think it matters fundamentally for two reasons. First the system is set up in order to prevent the government from breaking all and to ensure that if it does so that will become known and the executive branch will be held to account for doing so. Second, the system is meant to prevent the government from using its surveillance capabilities to target its political opponents, to kill the political dissent and limit the political debate and options in this country. This is not a theoretical concern of course in my lifetime. It has happened many times already in this country. Perhaps later on i could detail what i found to be the shocking revelation of the history of the programs beginning in 2001 and resulting in where we are today. We only learned from unauthorized leaks that there is at least one secret opinion authorizing the massive collection of telephone that the data and we still dont know what the secret list all ages about the collection of the massive amounts of internet mehdi the although we know that presumably this
Administration Stopped<\/a> that. We have no idea whether or not the law would permit that to resume. I think the question we need to ask is whether or not the system of checks and balances needs to be reaffirmed so that it acts as a safeguard to these harms. There is the history of the date on the issues over the past few years demonstrate the debate has been incomplete. Its been informed by inaccurate information about the government. Its not deliberately. Finally, i just want to know that ive worked on these issues for almost a quarter of a century. And i think that probably of the many
Civil Liberties<\/a> and voices that have been raised to the programs i am maybe one of the least likely to be labeled an alarmist. I know that you had more you want to get to that any of the panelists and in the public can submit written comments to the board so if you like to submit, you are welcome to do that. Judge robert some . Thank you. I should probably first state that i am a member i am now and have been a member of the
Security Committee<\/a> of the constitution project which wrote a report in september of 2012 expressing some alarm about these programs and i signed the report and stand by it. But its not primarily what i want to talk about today. I did sit on the court for a few years. I asked to be appointed by the court frankly to see what it was up to. And i came away from it deeply impressed by the careful scrupulous work that the
Justice Department<\/a> people and the nsa and the fbi agents involved with it did. The fisa court is not a rubber stamp. The number of how many warrants get approved do not tell you how many were sent back for more work before they were approved. So i know firsthand, and i wish i could assure the
American People<\/a> that the project process has integrity and that the idea of targeting americans with surveillance is anathema to the judges of the court to which they call the fiske. But i have a couple of related points to make to the first, the process is ex party which means it is onesided. And that is not a good thing. Second, it now includes programmatic surveillance, and that i submit and will discuss for a few minutes i do not consider to be a judicial function. Now, judges are learned in all and all that. But anybody who has been a judge will tell you that a judge needs to hear both sides of the case before deciding. Its quite common in fact it is the norm to read one sides argument and think that sounds right until we read the other side. Judging is choosing between adversaries. I read the other day that one of my
Court Colleagues<\/a> resisted the suggestion that the approval process accommodated the executive or maybe the word was cooperated. Not so, the judge replied. The judge said the process was at adjudicated. I very respectfully take issue with that use of the word. The ex
Party Process<\/a> here is only one side. And what the fisa process does is not at adjudication. It is approval which brings me to my second and closer related point. The approval process works just fine when it deals with individuals applications for surveillance warrants. Because approving search warrants and wiretap orders and trap and trace orders and foreign
Intelligence Surveillance<\/a> one at a time is familiar ground for judges. Not only that but at some point a search warrant or wiretap order if it leads on to the prosecution or some other consequence it is usually reviewed by another court. But what happened after the revelations in late 2005 about the nsa circumventing the fisa process was the
Congress Passed<\/a> the
Amendment Act<\/a> of 2008 and introduced a new role for the fisk for the surveillance programs. That change in my view turned the fisa court and
Something Like<\/a> an
Administrative Agency<\/a> which makes and approves rules for others to follow. Again, that isnt the work of judges. Judges dont make policies. Ave review policy determinations for compliance with statutory law, but they do so in the context once again of the adversary process. Now, the great paradox of the
Intelligence Surveillance<\/a> process of course is the undeniable need for security. Secrecy, especially to protect the
National Security<\/a>
Community Calls<\/a> sources and methods. That is why the
Supreme Court<\/a> had to refuse to hear
Amnesty International<\/a>. The plaintiffs couldnt prove the communications would likely be monitored so they had no standing. That is a classic catch22 of the
Supreme Court<\/a> jurisprudence. But i submit that the process needs an adversary. Its what the aclu or
Amnesty International<\/a> perhaps itself could have a role as a kind of institutional adversary to challenge and take the other side of anything that is presented to the court. I would like to focus my remarks today on when the authority of section 02. I would like to focus my remarks on the act and section 702 that was described earlier. The recent disclosures regarding the program have raised questions in some quarters about the appropriateness and the legality of the international with the
Internet Communications<\/a> traffic. With some expressing surprise the collection of that type and scale is taking place. In the view of the
Amendment Act<\/a> and as the record reveals however that the internet collection appears to be exactly what was contemplated when the
Congress Passed<\/a> the statute in 2008. I would like to take a moment to remind ourselves about the act and the reason it came into being in the first place. In 1970 to congress created a process by which electronic surveillance of the foreign powers and agents must first be approved by the court to be in doing so the congress recognized it had to balance the need for the judicial review process for domestic surveillance against the governments need to conduct them overseas for a constitutional protections do not apply. They sought to accomplish this by opposing the statute surveillance directly against persons within the u. S. And leading the
Intelligence Community<\/a> free without the undue burden of the court process. With the changing technology over the years since of this past however that foreign domestic distinction started to break down and the government found self expending significant manpower and the applications for the surveillance against persons outside of the
United States<\/a> the category the congress intended to exclude when it imposed the process requirement in 1978. As the problem got worse particularly after the 9 11 attacks, the government assault increasingly unable to cover its surveillance needs. Congress to its credit took up this issue in the spring of 2007 and over the next 15 months or so the numerous of officials including steve, rather bury myself and others spent hours testifying meeting with members and staff on the hill. And after a thorough analysis and deliberations the congress provided relief in the form of the
Amendment Act<\/a> which passed in the summer of 2008. Section 702 created a new process. The new process by which categories of support and surveillance targets can be improved for surveillance. Under the process the attorney general and the dni provided and will certifications identifying the target categories and certifying that all statutory requirements for surveillance of the targets have been met. The government intern designs procedures which are the operational steps that it takes to determine whether each individual surveillance target is outside of the
United States<\/a> as well as the procedures david described that limit the handling and dissemination of any information relating to u. S. Persons. The government then submits the certification as well as the targeting procedures for review by the court and the
Court Confirms<\/a> what theyre all stitch it really required steps have been taken in compliance with the
Fourth Amendment<\/a>. This process succeeds bring the operation back into line with its original intent. It supervises the use on many u. S. Person here or abroad or targeting any person believed to be inside of the
United States<\/a> to be conducted pursuant to an individualized court order. However it allows the government to conduct surveillance of the target overseas without the need to secure a individualized
Court Approval<\/a>. And it does so at the same time giving the court and
Important Role<\/a> in assuring the authority is used only against those persons who reasonably believe to be located outside of the u. S. In addition, the faa tasks various levels of conducting significant and meaningful oversight over this authority. The
Authority Procedures<\/a> and oversight preside have been in place since 2008 and just last year they were real nice. Prior to this the communities of both houses agreed on a classified details of the implementation and the same briefing was made available to all members. As the history demonstrates it was a carefully calibrated piece of legislation that addressed in operational need while at the same time maintaining the privacy protections of the original statutes afford it to the domestic communications. In a recent
Public Disclosures<\/a> about the
Prison Program<\/a> we are now seeing the statute in action. Not surprisingly we are seeking exactly what was counted when congress considered to pass the faa which is a program that focuses on the surveillance of the foreign
National Security<\/a> targets which is where the executive branch has the greatest latitude conducted well within the sound of the
Fourth Amendment<\/a> that is carried out with the knowledge and engagement of all three branches of government and that is monitored with multiple levels of oversight and that is exactly i appreciate the opportunity to address these to the and i look forward to any questions the board may have. Thank you. We are now open to enter into the second phase of our program and that this each person on the panel gets two minutes to respond to any of the comments were to make their own comment about what other panelists have said. We will get that going to give steve . Thank you. Just click, responding to a few points that were made first, he said he thought no other country conduct surveillance like the nsa. I dont think anybody here should leave today assuming that statement is correct. In terms of the 215 telephone that the
Data Collection<\/a> he described as a dragnet. It has massive amounts of content in the communications not the medved data. He talks about the jones case which is a tracking device put on a particular individual. Theyre falling around tracking a particular individual. Until the specific numbers and into the database and the targeting of the 702 order is only focused on the nonu. S. Persons believed to be outside of the u. S. It is a case involving a primitive device and focused on individual. And its been applied by the lower courts more broadly and also the fact of this focused on an individual there is more constitutionally significant than the general collection of the data. I want to talk for just a minute about some of the comments that judge robertson made about secrecy and the rise to the secret law and also the room of the court and programmatic orders etc. Its important to understand the constitutional background. The surveillance for the foreign intelligence purposes is conducted by the president without
Court Approval<\/a> and the courts have consistently said the president has the authority with the
Court Approval<\/a> where the target is of foreign intelligence threat. But the level that kind of surveillance between all articles records in the review and approval and commerce the oversight greeting the intelligence oversight. The individual questions that will come about leader. Last year the government repeatedly said it coming and they said this in the lower court as well they said the assertion that it was engaged in largescale surveillance of the
International Communications<\/a> under the section 702 or speculative and even paranoid and now the program has been disclosed and everybody can see they are engaged in exactly that and the
Intelligence Community<\/a> and i would include mr. Wainstein in that category. This is what was contemplated by the statute. At devotee knows this is what was all about. In this moving target a year ago it was paranoid and now there is nothing to see here that was part of a pattern for the members of the larger the
Intelligence Community<\/a> have repeatedly misled the public about the scope of the surveillance law and the safeguards that are in place or are not in place to protect an individuals privacy. And on a related topic i think it is very important that under 702 the government can target only
Foreign National<\/a> by the
United States<\/a> but nobody should take that to mean that
Americans Communications<\/a> arent being collected in the course of collecting the communications of people outside of the
United States<\/a> and the nsa collect
Americans Communications<\/a>. That too, that assertion was something characterized by the government and the amnesty that is speculative and provide the minimization procedures that have been disclosed over the last few weeks i think make it clear that that is exactly what is taking place. Okay. So, i just want to reiterate that i think that ken illustrated the importance of the history and looking at these programs. The description of that history i think the important question here is not under what circumstances can the nsa collect and use communications by foreigners overseas. The important question that weve always tried to focus on is under what circumstances is the nsa going to collect and use in secret information about americans usually gathered in sight of the
United States<\/a> and is including both medved data which is extremely revealing of their associations and private life and the content of their communications we were especially communications with people located overseas. To repeatedly focused on on or to state the purpose of the surveillance is about the foreigners overseas i think is confusing at best about the issues that face the
American People<\/a>. I think the issue that is underlining here is that its not only a question of collection of course, but its a question of how the government uses information. Many of the regulations are secret about how the nsa and the fbi is allowed to use them to the extent that there are public regulations that are complex to figure out which set that the government is in a position to use information about americans against americans. And thats the issue that needs to be addressed. Perhaps two quick points. It is certainly true that a government request for
Business Records<\/a> is not a search. But i think we all need to
Pay Attention<\/a> to what jameel said about the subject and about the jones case because modern
Technology Enables<\/a> analysis of the data that wasnt possible bill before hitting it reminds me of something that ben bradlee is supposed to have said about woodward and bernstein. He said if you give them enough steel wool they would net a stove. Second pivoted to kenneth wang xins point that weve got exactly what
Congress Asked<\/a> for, thats true. But after the snowden leaks and this establishes the we need to have a wide open debate about this in our society and thankfully we are beginning to have the debate in this meeting is part of it. I would like to start by responding to jameels suggestion that i or others misled in any way about the collection of u. S. Person communications. That is wrong. I spent 14 or 15 months with steve and others on capitol hill explaining the intricacies of the procedure that in that up being adopted in in the
Amendment Act<\/a>. We answered every question on the record and in meetings and forearms like this with privacy groups about the implications of the collection, and it was abundantly clear to everybody. We said numerous times that this would be focusing on the foreign targets overseas collecting their communications that they were overseas or also if they happen to come into the
United States<\/a>. What he is getting at is the concept of the incidental collection targeting a foreign person overseas you will get that person if he or she is talking to somebody pitted you will also get that communication if you receive calls of somebody in the
United States<\/a>. That is all priced collection and the collection of the u. S. Persons communication is acceptable. That is what happens in any form of off a modest collection if you look at the title iii of the criminal world that allows the criminal wiretaps. The same thing happens if i am a criminal suspect the
Court Authorizes<\/a> the title free wiretap on me the government is also going to get the communications between me and the pizza delivery man michael to get people with other criminal colleagues. Said that is the reality of any kind of surveillance and there was something the was fully vetted and they cleared up the
American People<\/a>. Second point that i would quickly make which is kate talked about the collection and use of the information and secret and the concern about how the information is used. One thing that isnt touched on a sufficiently is the value of oversight. You can take a look at itself prescribes a four or five or six different types of oversight and all these programs are carefully overseen by the court and by congress and importantly within the executive branch itself. That oversight is important and meaningful in terms of preventing abuses. Thank you. Thank you. Okay. Thank you. Pat and i will ask some questions of the panel. We sort of agreed in the sidebar here that since we have a bit of time we can be a bit more flexible with the length of the responses to questions but lets try to keep it not be on three minutes. We dont need to be so strict about it. My first question deals with the relevance standard and section 259 particularly interested in all of your views about that. Each of us will have a question open to all of you so you can answer if you want. If you want to pass on a question, that is fine, too. It authorizes an order for tangible things that are relevant to an
Ongoing Investigation<\/a> and i have several questions to that. One is whether wilentz can attach the government seems to be asserting to the entire set of data or whether the relevance seems to attach to any record that is collected. One of the things the
Congress Seems<\/a> to be packed in with the kind of haystack approach or to a particular record. And then related lehane the deal with criminal backgrounds i would be especially interested how that compares to the way the relevance is understood in the criminal context or even in the several litigating context is a definition of the understanding of relevance broad. So steve, if you want to start with that. Thanks. I began to touch on that i think in my opening remarks. And of course individual members of
Congress Might<\/a> say i didnt have in mind this specific concept when i voted for something that set of relevance. But i think in adopting the word relevant, the congress embraced a broader context in which that word is used frequently and commonly in other situations come administrative subpoenas and civil investigative demand by the agencies that regulate industries can be extremely broad. Civil litigation a lot of folks involved in the litigation understand that a party in litigation get a broader right for example including a compass of the database of information where particular items of data in that database may be useful in that litigation and the parties work out an arrangement that maintains that database so that it can be searched for potentially useful documents. That is under a concept of relevance. The grand juries have an extremely broad concept of relevance when they can go after any potential materials that are relevant. For the simple after the boston bombing were of their position concern about a followon attack or collaborator, a grand jury could subpoena without
Court Approval<\/a> all the airline and tests of the flights in and out and passengers flying in and out of boston had a particular period of time because one of the people on one of the flights might have been relevant. Communications similarly. So the concept of what is relevant to an investigation is natural we understood to be broad and lots of context and i think its reasonable that that is what is incorporated in the statute when the congress adopted it. I agree with some of that relevance that is a lot of the broad standard. But there are haystacks and there are haystacks. If you think about the example but mr. Bradbury provided, for example but grand jury subpoenas a flight manifest in and out of boston for a particular period of time, that is not anywhere near the scope of the program that we are talking about here. And i can say with confidence, and i sure everybody on the panel would agree with me that there is no subpoena case out there which the court has approved on a relevant standard surveillance on this scale. This takes us across in front year. This is orders of magnitude broader than any surveillance that has ever been approved under nason for a criminal subpoena. Spend a quick followup to that since the panel was focused on the legality of the alleged current programs. Where would you draw the line of the haystack is too broad but its if the argument is not that each individual collected a record as relevant what line to exercise . I dont think that its possible to sit out the line with any more clarity than to refer to the relevance. The surprising thing is in the the court is playing a relevant standard but that it isnt. In the clear language requires it to apply the same standards that apply the court has approved the government to collect everything and i think its fair to say relevance doesnt require the kind of specificity probable cause does that everybody agrees it is supposed to be an element and i think it does obvious it isnt doing that work with respect. On the question of whether the congress and the
American People<\/a> understand with the use of the board relevance i think it is pretty clear that until the past month the
American People<\/a> had no idea section 215 relevance was being used to collect all of the telephone data on americans phone calls. And i assume that it was also being used to collect all of the internet that the data and i think the fact that not only did we not know that, but our assumption during the debate on the
Amendment Act<\/a> is that there was not happening. That had been a part of the warrantless program and had been revealed and stopped. I think a further indication of that is that in the bible, which i commend to you on the statute written by mr. Chris and willson, a description of section 215 orders during the relevant time period describing a very limited number of orders and if you were to read the description coming would never suspect the government was using the 215 orders to collect millions or billions of records on americans. Finally in response to the question, rachel, about well what should be the standard of course to 15 is about all different kinds of records. Some of them are more revealing than others. Communications, but television and the internet are among the most revealing kind of record covered by 215. One possibility is to go back to what was until all before 2001 and require a showing that the collection of
Communications Data<\/a> is collected to a specific suspect in the incident, specific plan. That requirement was deleted. Finally on the analogy to the criminal context i strongly object to that and algae and the criminal subpoena context there are two key factors that are not present. One is that at least after the subpoena is served and sometimes during the service its public and that leads to all kind of restraints on the objection to the use etc. Second, there is the possibility of the true adversarial at adjudication in the way that the judge talked about it in a criminal subpoena that does not exist under section 215 and will not exist even if you allow the recipient of the order to go to the court because the recipient of the 215 order is not the party that has the interest in the order, the person whose information is being sought are the persons who need to have the right to show up in court. If my question was more on the haft ethnology and what are the relevant standards the same, do you have a view on that whether it is relevant in to 15. And the criminal context during the civil litigating context is the same. You know, i dont know. I dont think it is a relevant question with all respect. I think the relevant question is a great question and i would love to know whether the court has ever considered the question when every field of the program. Relevance is usually raised. Usually comes into question the legal proceeding if there is an objection but there is nobody there to object. I would like to make two quick points. Something steve mentioned about the statements that we heard from the former members of congress saying i didnt intend that when i voted for 215 that it would apply in this way. Just to make it clear that isnt unique to the situation that former current members of
Congress Might<\/a> now be voicing some concern that the way the statute as applied isnt exactly they see it before the passage of the statute. Use of that with the authorization of the military force back in 2001. Ive seen it in my career with statutes like the
Racketeering Organization<\/a> act which was initially passed and many members thought it was going to be primarily focused on the traditional organized crime and then has now been applied to the broader criminal liked the the what many people saying i didnt think about that when we passed the statute thats the way that it was going to be applied to the use of this is not an anomaly. It is a common phenomenon. The second point i would want to make is she argues the criminal grand jury subpoena is different and you can have more comfort in the government use of the subpoena and their interpretation of the relevance for purpose of using one. The grand jury process right and center and indictment that goes back to the evidence as tested in court and there is a good chance that the subpoena will be turned over in discovery and then test from the hearing or trial. The best case there are a lot of a grand jury subpoenas over the case that never see the light of day because the sequence doesnt happen. A good break on the analogy between the subpoena and the 215 that steve made. I would like to delve into the constitutionality on some of the facets of the constitutional analysis of one or both programs to give you a chance to elaborate on something you might not have been able to catch up on the earlier segment. We already talked a little bit about u. S. Nurses jones and whether the opinions of the
Supreme Court<\/a> justice. In fact the majority opinion as the d. C. Circuit which preceded the
Supreme Court<\/a> which suggested that in fact when you have an extensive surveillance of location in that case. But a kind of mad of data over a long period of time and reveals enough of a persons personal life so that you may it may indeed constitute a search requiring
Fourth Amendment<\/a> compliance but there are a couple of the arrests of constitutionality that have been brought up. I think this was raised by senator feinstein and that is whether or not there are less interested alternatives. In other words was brought up with the 215 do you have to cease the data are required to have it would be less intrusive it inquiry the data existing in the hands of the communication provider . And infected the executive order which governs intelligence conduct activities generally speaks of requiring the least collection technique feasible whether or not specifically applies we can debate that pitted with the general principle why isnt it sufficient that convey in query the communications that have the data rather than requiring that they get all the data. Indeed theres possible constitutional questions about, and i think kate may have raised this if the program that is under 215 is okay on the telephone data that are there any inherent limits and to 215 . Are there other kinds of data, the fact of bank records and various other kind of records . What ive left out but im going to save this for my next question is the whole court area and what might possibly followup on jims and. Could anything be done . Is it better that we not have the
Court Getting<\/a> into the programmatic analysis at all and if not, where are the protection is going to be . But that is a question for another day and in this case i am giving you a lot. Okay. Is the last question for another day . I have a lot to say so i hope you do ask that. Everybody get six minutes. On the jones case i already talked about that. But on the question about the database and would it be less intrusive if the
Telephone Companies<\/a> just maintain the database and what can we get
Business Records<\/a> and what ever. I dont think it is a question of intrusiveness. I dont think it would be less intrusive. Would be far less efficient and less costly perhaps less effective. He would have to have more data bases that the
Telephone Companies<\/a> and for business purposes they dont retain this data for as long as the government needs it to be the this is
Business Record<\/a> data that they maintain for billing purposes. They dont have a separate
National Said<\/a> the reason for keeping it to get us we have to create they dont have the servers. As of the government has to create the database which evidently under this alternative would be housed with the private company. And of course the government would still have to control the inquiry because you arent going to tell the
Telephone Company<\/a> what youre going to do to the database. Thats
National Security<\/a> investigatory information. They dont need to know that. So its more efficient. The government already has facilities in place and it can segregate them and ensure that all the protections are honored and that the data isnt being accessed for other reasons, etc. So it is an efficiency question. One followup question. Are some of those criteria that you talked about in your view more sort of convenient things or are they necessity . Because when we are talking about the constitutional analysis are they necessary to the feasibility for which the program is laid out . And the cost and that kind of thing to the senate i do think they are very real practical feasibility requirements. I dont think the constitution would see a difference between the data being housed in the data or elsewhere that the government controlling it and controlling access and ensuring its preserved, etc. But the 215 s focused on
Business Records<\/a>. So you have to be talking up the kind of database information that a business is maintaining for its own business purposes. That may be different with respect to the email people have been alluded to the email mehdi the under to 15. Telephone
Companies Maintain<\/a> these for billing purposes and may be very different in other contexts. I dont think you can just easily say they must be using this for other things, too. These are restless records that have to be in excess cents in a separate business for separate business purpose. Should i leave the court question for later . Lets come back and do fisa. To point out the obvious, i think that the least restrictive means question is an important question and a question the board should be asking. But it assumes the government has some overriding
National Security<\/a> interest and access to the information at the same time but it is somehow crucial to protecting the
National Security<\/a>. And that is something that i think many people have been pressing the
Intelligence Community<\/a> to cooperate. But thus far nothing convincing has been said to establish this information is actually crucial. I understand the government pointed to the case and it turns out not to have turned on that kind of information at all. If there is a case to which this information was in fact crucial i dont think the government pointed to it yet. To go back to the question if we assume the information is crucial than it is a question about the least restrictive means of getting the information. And on that question deutsch have a problem if a centralized database, the creation of the centralized database in the hands and here i will take the opportunity to agree with something that mr. Wainstein said earlier which is the authority treated for one purpose isnt uncommon at all to find out that they were used for another purpose. That happens all the time. The same thing is likely to happen with this database even if this true right now that the government inquiries it very rarely and that they are quite narrow and only 300 have been made thus far, even if all of that is true and all of that satisfies you for coming deutsch, with those safeguards are going to look like three years from now or five years from now. If there is another significant terrorist attacks you can imagine the pressure members of congress will come under to change the parameters for the
Intelligence Community<\/a> to change the parameters that govern access to the database and that massive database of americans most
Sensitive Information<\/a> will be forever available to the
Intelligence Community<\/a> to access under whatever standards prevail at that particular point in time. So that is just to say there are problems that arise from the existence of the centralized data base. I think the truth is as you know the
Supreme Court<\/a> has not answered these questions that if you start from the understanding that in order for the government to cease or obtain information in spite of the
United States<\/a>, it needs to meet the
Fourth Amendment<\/a> requirements. Then you end up in one place to of course there are many situations it has been held not to apply to the government seizures information. The ability for the government to obtain information and create massive databases reses serious constitutional issues not yet addressed by the court and not just with amendment issues theyre also
First Amendment<\/a> issues about the impact that has on peoples exercise of the
First Amendment<\/a> rights. I took the other constitutionally significant fact is that the seizures are being done in secret and i know some of us that work on the 1994 amendments which allowed secret searches of americans homes and offices but in a particular artist way with a particularized warrant objected to that authority because it allowed secret searches of americans homes and offices which would never be revealed to the people whose homes and offices had been searched. That amendment was enacted before the
Supreme Court<\/a> held in a criminal context of the notice of research was required and not just required as a matter of criminal law. One of the questions is the applicability of that basic understanding to this kind of search and seizure and i think on the question of less intrusive alternatives that jameel is correct but the last question is less intrusive than what . There is no doubt if the government is able to create as large as a data base as possible and use a sophisticated analytics as possible that it will be able to generate information that will be useful from time to time in combating terrorism. There is no doubt about that and we have seen that in other countries. I dont think that is the question. I think it is a much more complex question that requires looking at the actual threats the
United States<\/a> opposes including the scope of the threats and looking at different ways to meet those threats and looking at the different alternatives that exist other than creating a data base that is always available. I want to express some agreement with me and we cant allow too much agreement so well have to put a stop to that. He did made the point, you put legislation in place and it adapts to the situation and adapts to the needs of the time. Thats the way legislation is supposed to be and that why you have courts to make sure any adaptations remain true to the enterintent of the the intent of the original legislation. What i find concerning is the notion that if you have a small, but lawful and appropriate investigative tool in place now, you should think twice. Maintaining us because of some speculative term down the road it could be misused. Its a recipe for dollars. If we recipe for disaster. If we take that approach, were walking into another 9 11. That is a concern you see in some of the opinions out there in the real world. I think instead we need to do exactly what i believe we learned, the value of oversight, and oversight is a
Government Employee<\/a> it drove me crazy. I spent half my life running up to congress, answering questions, talking to the fisa court, and i would have much preferred to stay in my office and work. Many of my former colleagues probably feel the same way. But we learned the importance of oversight and made sure the legislative tools stayed true to the constitution and also helped ensure the confidence of the
American People<\/a>, when they knew the oversight was effective, they had confidence in the tools. So instead of taking the approach of scaling back on the strength of appropriate investigative tools now out of some speculative misuse in the future, just make sure built in the safeguards and oversight that will not per mate that permit that kind of bruise. Im going back to the statute again. I apologize if this seems like a quiz. I want to get the benefit of your views. My question is whether section 215 can be interpreted to allow the government to get ongoing production of notyetcreated
Business Records<\/a>. The document that purports to be a leaked 215 order would require the company to provide on a daily basis records. At a future date. So they havent been created. And the language authorizes that production of any tangible things, et cetera. Even though this doesnt use the term
Business Record<\/a>, everyone understands those be a businesses records provision. Later in the section, theres a proviso that it can only require the production of a tangible thing if such thing can be obtained with a subpoena, grand jury intend. So id like you authorities on that, and relatedly, theres two sections earlier in fisa is a provision which also is based on the relevance standard. Theyre ongoing and realtime, unlike a
Business Records<\/a> subpoena. And the limitations of the language in 215, do you think if this weak order is actually correct, the language of 215 permits that . Yes. I think it does. I dont think the statute distinguishes when the tangible item is created there are lot of production orders under a relevance standard that require ongoing production of relevant materials common in litigation, common in an administrative investigation. The items are created and are records by the time theyre turned over, and the order is focused on a known, existing category of records, that is constantly being refreshed, but they are tangible, they are in existence, theyre
Business Records<\/a> when theyre obtained under the order0. So i dont think thats a distinction the statute requires or points to. In terms of pen registers, trap and trace devices, thats a different technology. Thats for when communications are occurring, youre picking the addressing information, the calling party number, et cetera. Those pen registers would be somewhere out in the network or on the switches, et cetera, in real time, collecting all of the calling party number type information when calls are being placed, and this is a
Business Records<\/a> order because its actually with the
Telephone Company<\/a>, much more efficient go to their existing database where they maintain this information youre looking for, for billing purposes. Can i say one quebec thing . Jamaal has used the word surveillance. This is not surveillance. Surveillance is a defined term under fisa. That includes getting the con at any time of comnications usually when theyre being transmitted across a wire, for example. This is not content. This is just metta data. Its not surveillance and its not accurate to use the word surveillance. I think that people can decide whether its surveillance or not in the same way they can decide for themselves whether its torture or not. The statutes can define these things but the terms also have ordinary usage. I have a different view of how the statute can be read. I dont think the statute was meant to allow the government to require the production of records on an ongoing basis. If you take grand jury subpoenas as the relevant comparison, i dont think its typical of a grand jury subpoena to require ongoing production, and if you look at the legislative history of the stat constitute, statute theres no hint that any considered the pocket this statute could be used for the purpose its now being used for. In fact there was this testimony that thenattorney general
John Ashcroft<\/a> gave to wrong, way back in 2004 or and he was asked about the outer limits of the section 215, and at one point somebody asked, it could even be used to require the production of dna . And he said, yes, i suppose it could. And that was sort of the outer limits and nobody even asked the question, it could be used to require ongoing production of any of these things you just said it could be used to compel the production of. Nobody even contemplated that possible. So i dont think that the statute can be read that way. I dont think that members of congress who are advocates of this provision thought it would be read that way, and represtive sensenbrenner thought of as the grandfather, father of this provision has spoken out, saying it never occurred to him it would be used this way. So i think theres really very little to support the proposition that the statute is now being used for the purposes it was designed for. It seems pretty clear that the government has argued that section 215 can be read this way, and that the fisa judge has agreed with that argument, and i would in order to evaluate and respond to that argument, i think it should be disclosed and then we can have a discussion about whether or not that interpretation by the government and the fisa court is a reasonable or correct one, especially given the existence of overlapping authorities under fisa, for pen trap collection. Ill pass. Ill second what steve said. Back to fisa. This is a threepart question. Maybe well open with jim and then everybody will get a chance, but since he covered this in his opening remarks. My initial question is whether or not judicial eeffective judicial review is necessary to the constitutionality of a program or a statute. Thats a general overview question. As one of the ingredients, but, jim, you felt that the court really had no legitimate role in passing on programattic issues as opposed to the individual applications, and so to you, im directing the question, what would you put in their place . If you took that particular kind of review away from the fisa court, would you be happy with just leaving it with congressional oversight and internal governmental what would you do, and the third question to all of you, including jim, are its been suggested in some of the comments today, maybe you could beef up the fisa court by having some kind of ex parte amick cuss, ex parte, somebody representing the interests of the people involved. They dont know theyre part of a proceeding. And the other one would be on appeal technically the only people who can appeal a fisa order is either the government if it doesnt get what it wants, or the holder of the records, although many of them complain they feel they are hindered because they dont even have access to the secret targeted original targeting record. All theyre getting is tasking orders and they dont know they dont feel theyre equipped to do that, even if it was in their interests to do it. But even more specifically, the question has been raised in congress about and kate races raise is it again goodis there some way we can find out what the fisa court does because a majority of its opinions are secret. I think in the last congressional reauthorization in december, there was the request made, and sort of a promise given that they would see the government would see whether or not some form of redaction or opinions could be given, but that hasnt happened. The question is whether theres some form of declassification which would give us the benefit of what the legal analysis is, especially when you are dealing with a program of great magnitude, such as the 215 alleged 215 program appears to be. Okay. Take it away. Well, thats about a quintpart question. I snuck it in. Let me take the last part first. I was frankly stunned when i read the story about the microphone. I was stun when i read the story about all the common law being developed within the fisa court, because i frankly had no familiarity with that, and everybody knees to understand it was eight years ago i was on the fisa court, but in my experience, there werent any opinions. You approved the warrant police the warrant application or you didnt. There was one famous opinion that was reviewed and reversed by the court of review back in 1902, but a body of law and a body of precedent growing up within fisa is not within my experience, and i am not i dont know what the answer to that question is, how we get ahold of it. Im more comfortable dealing with your question about, should there be some sort of an institutional amicus or opponent that deals with fisa issues. And i think i would like to say the answer is yes. My problem is, i dont know what it would be or exactly how it would work. I wasnt kidding when i suggested that perhaps some tweaking of the statute establishing the pclob might make the pclob that institution, but youre not going to ask for that, and i i dont know who it would be. I mean, there is, for example, within the defense department, a group of people who are dedicated to the defense of detainees at guantanamo. They are defense lawyers, defending detainees being prosecuted by the other part of the defense department. So there is some precedence for it. Whether there would be some
Institutional Office<\/a> adverse to the office that brings these applications to fisa or not, i dont know, but its conceivable. Im going to pass on your question of the big constitutionality. I dont think the fisa court itself is im not even sure they have the jurisdiction to pass on the constitutionality of the statute that theyre carrying out, but im not aware of any constitutional challenge to the fisa statute that has ever been brought before the fisa court itself. Its going to be handled, i think, by article 3 courts. I dont know if that answers all of your questions. Goes partway, thank you. The rest of the panel, anybody that wants to take a whack at any part of the questions . Ill take a whack. In terms of whether judicial review is required by the constitution, to the extent the
Fourth Amendment<\/a> in a particular
Situation Requires<\/a> a warrant, supported by the particularized probable cause, proved by a approved by a judge, then, yes, judicial review is necessary and it usually is ex parte. The government comes in with an make, an affidavit, and the a judge sciences a warrant without an opinion, particularly, and the fisa court is analogous to that model, and there are a few, very small number of opinions, that as judge robertson suggested, most of the time it goes back and forthand then finally approved by the court with the judges signature. It may be memos internally at the court analyzing issues. I do think that bob, the general counsel of the dni said in congressional hearing, theyre scrambling i mam they are to declassify as many applications and prepare white papers and explain legal analysis to the extent consistent with
National Security<\/a>, and i think theyre doing that. In terms of replacing the court involvement, i think that, again, we need to understand the constitutional background is that foreign
Intelligence Surveillance<\/a> 1,978th, occurred without court involvement. It was unilateral action of the executive branch. That led to lots of abuses and sometimes the authority being used focused on domestic targets. Fisa was a big compromise between the branches to bring courts in and to the extent feasible and consistent with
National Security<\/a>, to involve a court, like a warranttype situation, in approving surveillance that used to happen without any
Court Approval<\/a>, and then to create the intelligence committees on congress for extensive oversight. So congress can be briefed in, in secure facilities, et cetera. And it is a very unusual animal, and i agree with judge reportson it raises significant questions, with problematic approvals. But prior to 702, the fisa court was overwhelmed with individualized orders focused on foreign targets. The court didnt understand why it was spending so much time worrying about nonu. S. Persons privacy outside of the
United States<\/a>. So the 702 process was intended to make it easier, whether its just focused on foreign targets to collection the communications in and out of the
United States<\/a> to those targets. So its workable. I think it is a great story that
Congress Passed<\/a> this legislation, and when congress did pass it and consider it, all members of congress were given the opportunity to be briefed on all the classified details of these programs, and all he members of the intelligence committees were briefed. Finally, on the amicus participation, im not sure thats feasible. The amicus would have to in the details of them request. The court is witting of lots of classified information supporting the probable cause determination or the reasonable suspicion determination the context of the surveillance. The amicus theres not a feasible a security clearance . For instance, the in the detainee analogy at some somebody raised, the government has a defense lawyer, as it were, and they do have security allows them to look at none, the defense lawyer is only given access to what the government is going to what is relevant to that particular prosecution, and the government, of course, always has the choice not to prosecute if the disclosure of some particular information to defense counsel is too worrisome, in this context, were talking about doing surveillance of the most sensitive threats, based on the most sensitive
National Security<\/a> information, and the executive branch is only making available to the court and to the congressional committees, because its required to, by statute. And its so sensitive that you need to have an amicus that is a permanent probably have to be an officer of the government, whether of the court or of the executive branch. That would be fully participating in the process and cleared into the same things that the court receives. Just inject one other idea into your comments. Perhaps this has ban alluded to. The federal public defendanters office is part of the judiciary, essentially. Hired to oppose the government and i wondered if
Something Like<\/a> a model like that would be feasible. How about smarter
Panel Members<\/a> . I think in the usual case before the fisa court, it would be good to have somebody with access to information who could play an adversarial role went the process that already takes place. Im not convinced that with respect to broader legal questions like, is it consistent with the
Fourth Amendment<\/a> for the government to collect all american telephone metadata. Im not convinced that kind of question has to be decided behind closed doors. I dont see why the court couldnt articulate that question publicly, notify the public that it was going to consider the legal implications of a proposal to collect all americans telephone metadata and allow anyone who wanted to to file an amicus brief. I think mr. Bradbury starts from a different assumes. His assumption is that everything that is classified is properly classified. That is not my view. My view is that a lot of well, some of the programs been disclosed over the last few weeks and few years, should never have been secret in the first place. They should have been disclosed to the public, at least the general parameters of the program should have been disclosed to the public. Both because its important that the political leaders who put these programs in place be held accountable, but also so that the judicial process can actually function in the way its supposed to in an adversarial fashion. And then just to expand on something that judge robert sewn said earlier, if were asking the question whether fisa whether the oversight of the fisa court is sufficient. I think its important to keep in mind that there are structural limitations on what the fisa court can do. Even apart from the questions about, is it appropriate that the chief justice of the
Supreme Court<\/a> appoints all of the fisa board judges . Even apart from questions like that, there are structural limitations on what the fisa court can do. Some have to too with the courts jurisdiction. The court doesnt have the just disk to consider
First Amendment<\/a> implications of the governments proposed surveillance. It doesnt have the jurisdiction to consider the facial validity of a statute like the face a
Amendment Act<\/a> and the court said that in one point made public a few years ago. The court doesnt have the authority to consider the constitutionality of the limits on its own jurisdiction. One of the arguments we made in our constitutional challenge to the fisa amendment, was that the role that the court was playing with respect to surveillance under section 702 was different from the role that article 3 courts are permitted to play under the constitution. They werent considering individualized suspicion allegations. They werent making determinations of probable cause. The government wasnt appearing before the court identifying proposed surveillance targets or proposed facilities to be targeted. Instead the court was making these, and is making these judgments about the appropriateness of the governments programattic procedures relating to targeting and minimize sayings and thats something that no article 3 court has if done in the past and is quite foreign to the kinds of things that article 3 judges are accustomed toking too. That argument we made before the initially before a judge in the
Southern District<\/a> of new york, but it wasnt heard because our plaintiffs were found ultimately to lack standing. The point im the narrow point im trying to make, that is a question that the fisa court doesnt even have the jurisdiction to consider. The fact that other courts arent considering it, i think makes it all even more problematic. So i dont know the answer to your question, judge. But i do think its important to distinguish, and probably limit, the role of the fisa court. I think that it was created as judge robertson said, to issue warrants in a way that judges have always issued warrants. The fact its now creating a body of common law is extraordinary. And im not sure that is an appropriate function of the court. The fact that that body of common law is being created in secret of course compounds the problem of it being created ex parte. And the fact that the administration, although i take that their promise to try to disclose more information is sincere, i wish that they would work on that before they describe to the
New York Times<\/a> and the wall street journal legal opinions which are still classified. We could use the legal opinions themselves. But fundamentally we need some kind of system where a traditional article 3 court not the fisa court is looking at these questions that have to do with, what does the law allow and what is constitution. I just, in that connection, want to push back on the notion that somehow this might be legal
Even Without Court<\/a> involvement, because it was done that way before 1978. I disagree with that, but i think more importantly is that we must not forget that in during the bush administration, when the fisa statute was exclusive, it explicitly said, you may not conduct this kind of surveillance except pursuant to a fisa court order, and if you do so, it is a crime. The bush administration, in secret, violated those provisions, and made up a series of flimsy legal arguments for doing so but most of all, forgot to tell the
American People<\/a> it was taking the new view that it was no longer bound by fisa, and we only found that out as a result of leaks to the press, which is not the way the system should work, about and similarly, just to because mr. Wainstein keeps talking about the efficacy of oversight here. We have a situation during the this administration where two members of the oversight commit yeast have repeatedly raised questions about what was happening. They have been repeatedly blocked from bringing those questions to the public. Now here we are as a result of an unauthorized leak. Okay. Ken, you get the last word. Thank you very much. Judge. Id like to address the idea there should be some other party that would take the side of the person who is to be surveilled in a particular fisa application. A couple points to keep in mind. One is something that steve mentioned a few moments ago. Keep in mind the notion of a judge receiving and assessing an application for a search is not new. As steve said, this is exactly what we do on the criminal side. When i go to judges, like i did with judge robertson, to get a search warrant as a prosecutor, or to get a title 3 wire tap, warrant against somebody, that was done ex parte. It was the prosecutor, maybe the agent, and nobody on the other side, nobody representing the person whose house was would to be searched or the telephone calls to be listened into, and thats the paradigm, and its important to keep that in mind you. Might be able to sense a theme of mine, which is that this construct on the
National Security<\/a> side for these investigative activities, all is drawn from parallels and origins on the criminal size. So this ex parte is not out of the ordinary. In fact its the norm. The fact is we trust the judges to scrutinize the showing and in the case of a warrant, make sures theres probable cause to support that warrant, and i can tell you from experience that the judges on the fisa court, the article 3 judges, and theyre contrary to what some people suggested, not at all in the governments pocket. They are very independent and put us through our paces to make sure that what we give them measures up to their standard and the standard inside in the law. But putting those keeping those two points in mind, the idea of some sort of counterparty is an increasing one. Think steve i right there are a lot of practical issues with that in term office the sensitivity of the information, that the fisa court judges see. They see the most
Sensitive Information<\/a> in the
Intelligence Community<\/a>. But to the extent that would help establish
Greater Public<\/a> confidence in the process, i think its something that the board and others should look at. In in addition, kate mentioned the concern about transparency. Same point there to the extent that the government can be more transparent with its legal theories, or if the fisa court i dont know whether it can, but if the fisa court can disclose should sanitized version of these opinions, its just its good for
Public Education<\/a> but good because these programs only work so long as we have the confidence of the
American Public<\/a> theyre being conducted honestly and reasonably and consistent with the statute. Thank you. Thank you. My clock here says 11 17. Were scheduled to go to 11 30. Do other members of the panel have questions . I have a question about the 702 program. That program, by definition, the target is nonu. S. Persons outside the
United States<\/a> but inevitably some of those conversations are with u. S. Persons in the
United States<\/a>. My question is whether that raises a
Fourth Amendment<\/a> issue by collecting and using that information involving this person, and if so, i are the minimization procedures in place sufficient to meet the
Fourth Amendment<\/a> concerns . Well, i guess im going to go back a little bit to history again. Theres been some discussion, ken mentioned changing technology. Prior 1978 and when fisa was first en, ad, almost all
International Communications<\/a> in and out of the
United States<\/a> were carried by satellite. Not even covered by fisa. Over time that migrated to fiberoptic cables in and out of the u. S. Suddenly if youre conducting that surveillance on a wire in the u. S. , even though its international communication, its suddenly covered by fisa and individualized orders are required, and that was okay and workable. Then 9 11 hit. Huge problem. We suddenly needed to know about all
Suspicious Communications<\/a> from thousands of potential terrorist dots outside of the
United States<\/a>. One of whether communicating in or out of the u. S. That led to the president s special authority to conduct the surveillance. Verve controversial. The disclosures, debates, congress grappled with it, ultimately resolved on a statutory solution, 702, which is targeted at nonu. S. Persons reasonably believed to be outside the
United States<\/a> but is focused on communications in and out of the
United States<\/a> because just after 9 11 when the president gave the authorization, those are the most
Important Communications<\/a> you want to know about if youre talking about a foreign terrorist suspect communicating to somebody you dont know inside the
United States<\/a>, potential planning, et cetera. And 702 enables court involvement, review, approval of procedures to ensure the targeting is focused outside the
United States<\/a>. I dont think the
Fourth Amendment<\/a> and the particularized warrant requirement of the
Fourth Amendment<\/a> would apply to those communications if youre targeting a nonu. S. Person reasonably believed to be outside of the
United States<\/a> just because some of the communications happen to come in and out of the u. S. If youre not focused on a u. S. Person whose privacy interests youre attempting to invade, and whenever you do get into that sphere, fisa specifically requires individualized surveillance orders that are very much like warrants, supported by probable cause. I still wouldnt say theyre warrants because its not probable cause to believe a crime is being committed or has been committed. Its focused on use of a facility and also important to remember that 702 is not limited to terrorism and counterterrorism. What
Congress Authorizes<\/a> in 70 is any foreign intelligence gathering purpose, so it can be much broader, and its not its actually much broader than the president s special that, in that regard. Special authorization in that regard. The government conceded in clapper that surveillance, particularly under 702. Imimplicates the
Fourth Amendment<\/a> and they filed a
Summary Judgment<\/a> brief explaining their view that the statute was reasonable in part bass of the minimization procedures you referenced. At the time we didnt have the procedures. Now we do have the minimization procedures and one thing that it is clear is the use of the word inadvertent and incidental is highly misleading. The collection of americans data is not incidental or inadvertent. Those communications the government is most interested in, the minimize sayings procedures allow the government to retain that information. If its foreign intelligence information, forever, and if its not, up to five years. The procedures allow the government to collect and retain and disseminate attorneyclient communications. There are some restrictions for communications between attorneys and clients who have been indicted in the
United States<\/a>, but thats a very narrow category compared to the larger category of attorneyclient communications. So the statute was designed to the procedures reflection that design and the government cop sealedded the
Fourth Amendment<\/a> is not irsvelte to the request whether the statute is lawful or not. So i think youre asking the right question. My answer is the procedures are insufficient to protect americans private. Can i say one quick thing . I if said this i misspoke. I did not mean to say the
Fourth Amendment<\/a> is not relevant or does not apply. I meant to say the warrant requirement would not apply. It would still have to be rome under the
Fourth Amendment<\/a>, and thats a special analysis in the foreign intelligence context. Well, i would agree that the
Fourth Amendment<\/a> applies, and i think theres a serious question about the applicablity of the warrant requirement when the seizure is taking place in the
United States<\/a>, its intented to get the communications of americans located in the ute, and and the argument that was made during consideration of 702 is that the reason why you didnt need a warrant was that an american talking in the
United States<\/a> to somebody else doesnt know whether or not their conversation is being eavesdropped on because that other person could be the subject of a warrant and be wiretapped. What you due know and what you, i think, have a right to know, is that if youre communicating inside the
United States<\/a>, with someone, the governments not collecting the contents unless it has a warrant on you or a warrant on the person youre talking to. And so that is not the case under 702. Then the question becomes, well, what about the practicalities, how do we do is . And i would urge the board to look at proposals that have been talk about by exnsa officials, which basically would set up a system whereby the information might be acquired by the computers, but before the government could access the communications of americans, it would need to go back to the fisa court and make a probable cause showing and get a fisa warrant. That indeed is one of the recommendations of the constitutional project report that i mentioned when i made my openings remarks. This concept of minimization. At it one of the great classic euphemisms of our time. Nobody knows exactly what it means and i think the board could profitably study that subject in great detail and for weeks. Just like to clarify one point. Kate mentioned, and i might have the phrasing a little wrong but the surveillance under 702 could be intended to collect communications of persons in the u. S. Make clear, this is actually a specific provision in 7 02 that says you cannot do reverse targeting. David, you mentioned that. You cannot the nsa cannot target somebody who is overseas for the purpose of collecting a communication within the
United States<\/a>. What 702 does permit, and this is, i think, kate and i are on the same page you can target somebody overseas, but also with communications that are inside the
United States<\/a>, which often, as steve mentioned, are the most valuable or concerning communications because they might indicate the existence of a plot. You have to keep in behind if you were would try to impose a warrant requirement of some kind, to protect communications of the u. S. Person who might be communicating with someone who is rightly targeted overseas, that same notion would apply to presumably to our collection around the world where we fisa was drafted specifically to work around that collection to make sure that didnt get hindered by the fisa warrant requirement and that could be applied to title 3. So it would be major paradigm shift in our collection. Quick response from kate. I just want to i think ken and i would agree that the reverse targeting prohibition in 702 prevents the government from using 702 surveillance in order to obtain the communications of a specific known american. But if the intent of the government is to target someone overseas in order to find out, and obtain the communications of people they dont know in the
United States<\/a>, who are talking to somebody overseas, that is the purpose of 702. Were almost another of time for the panel. I know beth has one question. If we could just make a quick response. Way at the risk of assigning homework, going to ask that yall consider my question and if you are so moved to provide information afterwards to keep us on track. This is following up on some of what weve been talking about. We came close to what i was thinking about. But looking at what happened in 2006, with multipoint or roving surveillance, when there was some uncertainty as to how an authorization that was granted by the court would be implemented in a given case, a return requirement was imposed. My question is whether or not, when youre dealing with these bulk authorizations white be appropriate to impose a return requirement through statutory provision, so whether its for 702, or whether it would be for this sort of more programattic collection, so i would appreciate your thoughts and i would also be part of panel 3 so come back for panel 3, and hopefully well have something in that. Just to add to beths point, 702 provide ford judicial review of directives, and the question is can the jumps judges review the targeting requests or just the broad program and if not, should hey be able to under 702 . Thank you very much to all the witnesses. I have an observation and homework as well. My observation is, up until the very end, we really only heard one concrete recommendation for what might be changed, which was judge reportsons suggestion about creating, at least for some activities of the fisa court, some adversarialness to the process. ll just say i think at it incumbent upon the
Civil Liberties<\/a> community, of which i consider myself part, i guess, but the really incumbent upon the
Civil Liberties<\/a> community to develop some concrete recommendations for moving forward here. It might be that your bottom line is the 215 program is inappropriate and should be ended. Completely. But i think that whether its 702 or 215, you really have to get more granular, and more specific in terms of some concrete suggestions. Now, at the tail end we started to get to another one here, which was this idea that is apparently reflected the the constitution project report, about acquisition versus a second search, the search for particularized search. That is another concrete change. Ill say one thing to steve and ken. I think its very important for people like you to engage in that process as well, and, again, ken started to at the end, in terms of engaging with the idea about theded adversaril process. The way it was set up, we had two critics of the program and two defenders of the programs. I really think that theres a role for form ever government officials to play. It cant be that everythinges perfect. It cant be that no changes can be made, that no additional improvements or checks and balances or controls, et cetera, can be made. I know youre put in this position of somebody says its terrible and you have to say, its great. I really think both the
Civil Liberties<\/a> community has to be more specific in its criticisms and its forwardlooking suggestions, and i think former government officials, including those who helped design these programs, have, i think, a role to play in offering concrete suggestions for how to improve them. And then my sort of followup, my homework assignment, i guess, to take beths term, i would like to see more specific engagement on the question of minimization. Judge robertson is 100 correct in terms of the misunderstanding, at least, or the use of that term in a way that it becomes a mantra and no one really has dug in on that. There is a document online, whether its valid or not, whether its still right or not, i think theres a document online that, assuming that minimization procedures looked like what is in that document, what is the reaction to them . How do they play out here . Is it good, bad, indifferent . Secondly i think theres followup to be done on legislative history. Everybody talks about relevant relevance. Relevance didnt come into the statuten in 2005 in 2001 the statute said the documents are sought for an authorized investigation. Relevance came in 2005, and its wore thinking about what was the possible seven congress in shifting from sought for an investigation, to specific and articulable facts give you reason to believe they are relevant to an investigation. Did that have any impact . Should it be viewed as having an impact . And then on the case i would like to see some whatever there is on the
Public Record<\/a> in terms of jameel mentioned, id like to see somebody anything and spell that out for us. Thank you all. Were out of time. As i mentioned before, anyone on the panel or in the audience is welcome to submit written comments, thank you. Thanks. Were going to take an hour break for lunch and resume at 12 30. Good afternoon. Were going to begin the second session of our program today. This is the session that will focus on technology issues. Jim dempsey and i well be comoderating this, and ill put it to jim to make introductions and kick things off. Good afternoon again everybody, and thanks to our afternoon panels as well for giving their time us on this important set of issues. Our panelist for the afternoon are four of the leading experts and one of the questions and challenges facing the pcl bo which is bridging the gap between and policy. We have steve kellerman, steve steve bellovin. Secondly is mark rottenberg, longtime president and head of the electronic privacy information center, and again, a nationally and internationally recognized expert on privacy issues. Ashkan soltani is an independent researcher on privacy, and security issues. Among other things was consultant to the wall street journal on its extensive series of articles on internet privacy issues. And finally, danny weitzner, currently at the
Computer Science<\/a> and
Artificial Intelligence<\/a> lab at m. I. T. , former white house science and
Technology Policy<\/a> adviser, cofounder of the center for democracy and technology, and, again, a longtime participant in these debates. So, again, we will adhere to the rules we established this morning. Fiveminute opening remarks from each of the panelists, followed by a twominute response by the panelists to the comments made by their fellow panelist, and then questions by chairman david meddine and myself, and the record of this proceeding will remain open until august 1. Several of the speakers on the second panel have already submitted either final or draft comments, which were grateful for, but they will have, like everybody else, until august 1 to, as they say on capitol hill, revise and extend. So, steve, please. Thank yous, jim. Let me add a brief disclaimer. I wear many hats in this town. Today the only one im wearing is the private citizen. What were saying is based on my draft written remarks. You have copies of them. And on my web page, find it easily with your favorite search engines. These are draft comments. I just have to make sure i have the facts right. This is still a draft. So im a
Computer Scientist<\/a>, not the lawyer, which means when i look at a system i look at it from a technical perfect and when i see a system, the first two questions i ask are, why was it built that way and what else can do with it . Thats why i became a
Computer Scientist<\/a> because thats in my personality. Gee, pretty. What can i make it do . As a privacy scholar and technologist, i also know that one of the things that is the biggest problem in privacy is not the primary uses of
Data Collected<\/a> for a legitimate reason but the secondary uses that are often found later on for some particular database. And that is another part of the when i looked at this large database of phone records and presumably internet metadata as well, my first question is, why did somebody need to build such a large database of phone
Company Records<\/a> when the phone company has these records. I can come up with three possible answers. One is, retention. Perhaps the phone companies do not retain the data for as long as is necessary. The e. U. Has a
Data Retention<\/a> law for two years, covering a wide variety of communications of metadata, but that in itself is controversial. The u. S. , one reason why it will be controversial is we dont have workshops and hearings as much on what private companies are allowed to do with their data, unlike in europe. Having a large
Telephone Company<\/a> retain data for a long might be worse for privacy. I dont know. But it certainly is an issue. A
Data Retention<\/a> law is not an automatic answer to a privacy question. A second possible answer that occurred to me is the efficiency of search, particularly the indices. If you have a large amount of data its often organized to make it efficient answer the kind candidates of queriries you need for your business purpose. Arguably the phone company does not have the right indies indices for the types of inquiries needed to be done and thats rome for the phone company not to they dont have the same questions. Its also harder to say what should be done bat that other than a copy, asking a phone company, can you build this index for me, is reviewing of the kinds of questions an intelligence agent analyst might want to ask and could very applause by be seen as a serious security issue. The third answer, and the one to me that i think poses the most difficult legal and policy questions, is the machine learning, data mind, call it what you will. Just think of the phrase, you have all seen in the press, heard on radio, npr stories on big data. This is big data. What can you do with it . What can you learn from it . Its a powerful technique but also one very susceptible to abuse. Machine learning finds another by correlation and not causality. And can find out very surprising things. Best example, read last years
New York Times<\/a> article on target. And the kind of analysises they were able to do on their customer base. One the thing that makes its most relevant thats an interesting word here, isnt it . Machine learning often requires a very large collection of data that defines normal prosizely so you can say, this is abnormal because its different than normal. This means that by extension, everything is relevant, which makes for an interesting reading of the law. Its not necessarily wrong from a technical perspective. I dont know what it means to do a
Fourth Amendment<\/a> search, which requires particularity when its data that is already there we need have a legal understanding what i relevant and particularity means in the context of date a mine data minding. Im runningre short or time. Metadata i look at from a technical and legal perspective, third party documenting something im giving to somebody else, can i look at this and say this piece of the technical data is going to somebody else . Turns out its a very detailed
Technical Analysis<\/a> to understand that cannot be done easily. Theres a lot of invisible things that can change the answer, as ridiculous as the expe but looking at the technical organizational roles of the
System Administrator<\/a> is a very important thing that the board needs to look at to understand the
Real Security<\/a> of the system and the privacy against insider misuse. Thank you. Marc . Thank you very much. I want to begin by saying, following steve0s comments i am not now a
Computer Scientist<\/a>. I was and decided to go to law school to help address the lawyer shortage in washington, dc, and i have corrected contributed that time to solving the problem. In me statement smidt i outline submitted i outline the steps taken and made some recommends to the oversight board. I do want to say that over the years ive had the opportunity to work with many great
Computer Scientist<\/a>s and technical experts, and the one thing they have taught me is a healthy skepticism of
Technical Solutions<\/a> to what are ultimately social or policy problems, which is a point ill come back to. In brief, let me first describe the steps we have taken. This may be of interest to the oversight board. As many of you know we filed a mandamus petition with the
Supreme Court<\/a> challenging the
Legal Authority<\/a> under which the verizon order was issued by the foreign
Intelligence Surveillance<\/a> court. This or the was based on section 215 of the patriot act and require this
Telecommunications Firm<\/a> to provide on an ongoing basis all of the call detail records the phrase in the order also described as telephone metadata for all verizon custom issues on an ongoing basis. We looked very closely at the statute. We concluded the court did not have the
Legal Authority<\/a> to issue that order. We believe that the
Supreme Court<\/a> was the only court we could bring this claim to, and that is a very important part of the analysis, i think, even as we talk about changes in the law, we have to answer the question, under current law, is this surveillance activity lawful . The second thing that has been done toes begin the formal. Petition process to the nsa director, general alexander. The nsa is subject to the administrative procedures act, and when it engages in a substantial change in
Agency Practice<\/a> it actually has an obligation to notify the public of it determination. Now, of course, theres certain rules. Almost unique rules that apply to the nsa, and we understand that. But that doesnt get the agency out from under its fundamental responsibility to be accountable to the public and as we did with the department of homeland security, when they made the decision to deploy the airport body scanners for primary screening, and that challenge was ultimately successful in the d. C. Circuit, we think on a similar basis the
National Security<\/a> agency should give the public the opportunity to comment on this domestic surveillance program. We have also asked the federal
Communications Commission<\/a> to determine whether verizon may have violated section 222 of the
Communications Act<\/a> when it turned over the customer records to the
National Security<\/a> agency. The fcc plays a
Critical Role<\/a> in saveguarding the american telephone consumers and we pursued a series of freedom of information act requests for some of the key legal documents that have been thus far kept secret. If you how if you have suggestions what else we should do, were very interested. Let me summarize the key points of my written statement. The first point id like to make, we think the
Legal Authority<\/a> was exceeded in a section 215 activity. Its set out in the petition in considerable detail. Summaried in our statement. The second point as to metta data, is that this information is far more detailed and for more revealing of personal activity than typically the underlying content and the communication. And in this sense, current lay, u. S. Law in particular, is almost upsidedown with respect to privacy interests. As many of crowd know our laws have evolved following a paradigm which distinguishes between the content of a message, what is in envelope, and the header information on the exterior youre of the envelope, and we cared that forward with the content of a telephones communication as opposed to the call detail information. But that analysis which might have worked 40 years ago when smith versus maryland was decided, was almost unrelated to current circumstance. Because in a digital world, as opposed to an analog world, its the digital data, its the transactional data, that enables the linking, the chaining, the profiling, the matching, the assessing, the ranking, the rating, all the an analytical techniques employed to assess personal information are most useful as against transactional data. Underlying communication requires interpretation and assessment and its a slower process. So, the second point that the metadata, which has been said as something of less privacy interest than the content, in fact the opposite is true. And i think that is the view widely held in the scientific community. The third point to make is that this type of data, unlike underlying content, generates additional uses. Ive said in the past that data chases applications. Which is to say that once you have information collected and stored in the database, you will not surprisingly find new uses for it. In fact it would be surprising if you didnt find new uses. Now you can through law attempt to restrict and legislate the way in which the data that you have collected may be used. But over time, almost certainly boundary points will be pushed further and further as applications for the data are found, and i think the conclusion to draw from this point is that a threshold is crossed once the data is gathered, because it is at that moment you created the opportunity for future applications. Whether you choose at that moment the time to permit those applications, is a saveguard you can put in place, but theres no guarantee that safeguard will remain over time. The final point ill make, its very tempting to imagine there are
Technological Solutions<\/a> to privacy problems and we have been on the front line to promote technologies and protect privacy. We started over freedom to use encryption, we supported deidentification, all of these methods are very important but theres no question that at the end of the day, the most effective safe garretts are the legal safe garretts and i want to share with you a quote from former president of m. I. T. , the first signs advisor to president kennedy, was asked to testify before the u. S. Congress on the hearings on the privacy act and he was asked there are
Technological Solutions<\/a> to the problem of privacy . And he said there are those who hope new technologies can redress these invasions of privacy that
Information Technology<\/a> now makes possible. But i dont share this hope . To be sure its possible and desirable to provide technical safeguard. It is even conceivable computers could be parade to have their memories fade over time. And hsu saveguardshe legislative and
Legal Systems<\/a> of this country. We must face the need to provide adequate guarantees for individual privacy. Thank you. I wanted to echo marcs points. I agree that the metadata is actually more sensitive sometimes than the content, and the retention of this information exposes, even with policy safe guards, the existence of this information collected where it normally wouldnt be collected, and hanging a pay an know piano over may head may be legal but exposed me to being crushed by the pea an now. Want the piano. I want to talk about four points and i wouldnt even comment draft comments on me blog which you can submit them by the first. Im expecting there is probably more revelations being made and id like to incorporate those before i submit. So, the point i want to make is one that traditional ideas about geography and borders dont translate on the internet, and that most of our modern activities take place in part through some kind of digital medium. Create data trails about our activities. In fact the nsa in 2002 they remarked that only 1 of the 2089 gigabytes of internet traffic at the time was out of their reach. Thats in 2002. And to the point that the
Computer Systems<\/a> dont inherently understand law. They dont understand borders. They dont have the same limitations we do or understanding we do. And that they work under guidance of their operators, and these operators are empowered under a
Legal Authority<\/a> which i feel like might be confused or lack underou technical capables. One is the metta data big data has more capables than we lonelily infer, but just other understandings of how the technology operates and so id like to expand on that a bit. One other point of clarification from this mornings discussion was that theres been a couple different and very clever pushbacks and a culp different revelations but the meta
Data Collection<\/a> was not just the nsa going to at t and saying show us your call records you collected there was a multiple times, the equipment the nsa implantedded a key
Internet Exchange<\/a>s and key junctions at
Service Providers<\/a> in order to themselves create this metadata and collect it, and we want to be mindful of that hook. Its a very different issue than just going to verizon and saying, give us call records. This is generating call report, generating ip metadata and the process is problematic. Computers dont understand law and dont understand the difference, we say, they do understand the difference but very small distinction between an ip header and the email content itself. The same equipment is often very easily able to capture that same data, and we have some understanding they were actually collecting email content from the wire. So im going to start expand on the first point. On a quote that former nsa director hayden himself made where he said lets keep in mine that
Global Structures<\/a> geography doesnt mean what it used to be. Things in a place may not be of a place. The internet actually lacks geography and this is his statement from the kind of telling. The person who spearheaded these projects himself doesnt believe theres an inherent geography to the internet, and we kind of need to push on this a bit, because in fact we want to understand that nsa is collecting information about kind of any geography and then are taking technical measures to limit the amount of information they use on americans. And to do this its kind of inreliable. A describe a couple ways where this breaks down in my comments around things like users using vpns, switching email addresses, for example, the nsa maintains a database of identifiers on u. S. Citizens, which in itself is information about americans. Not anonymous information but, for example, phone numbers, mac addresses, internet ip address identify who is an american and often times these things theyre problematic and to a degree theyre wrong, ininadvertently collecting information. The other thing is that the systems in place using these identifiers, these selectors can be implemented improperly. We know that targets of interest could be anything anybody that has affiliation or interaction with someone else of interest. If could potentially be a target of interest by my communication with someone of interest. But you find that most of the modern internet systems we use, skype, or spot these they connect with anyone on the internet for the purpose of providing the service. But so if i and a member of al qaeda like the same
Brittany Spear<\/a> song, does that actually put me as a target . Under this contact chaining . And so the system would say yes because i had some sort of communication with that target, some sort of data sharing with the target. We want to be mindful the systems are limited in the way they understand geography. And i want to make a point i make in my comments as well, i feel like we might look to congress and look at the policymakers, like why they have had repeated opportunities to shut down and push back on these programs and havent. And we might infer that to mean they think these programs of justified or think that they are effective or worth the tradeoff. One other explanation i want to propose is that, again, people dont understand the implications and the raw elements that go into these systems, so the policymakers dont understand the tech nick capabilities of these infrastructure and what data they ingest, and because of that lack of understanding, it seems generally okay. The geeks have a key to the castle. Where theyll give you an explanation, of course the system wont collect information, but if you look under the hood you would realize there is quite a bit of domestic surveillance going on, a lot of inadvertent
Data Collected<\/a>. A lot of misuse from books. And i think that lack of understanding might explain why there hasnt been kind of tighter controls. Family of
Research Going<\/a> around the
Computer Science<\/a> world. Ic to functional goals to think about how accommodation of technology can shape the system we talk about. You have asked us to concentrate on the to do 15 and 702 programs but it is important to see these in a larger context to dry in data from a much larger system and i think the ability to draw boundaries of those systems is not nearly as easy as she g section numbers in a statute. We need to look at it a broader context but two goals we should pay special attention to be should be thinking about to enable under the rule of law the process of finding a needle in the haystack without privacy risk. A and number two, given that intensive information to create an environment where theres genuine
Public Confidence<\/a> based on an oversight that is effective and a meaningful sense of transparency. I think if we look over the last month it is the lack of transparency and continued revelations of more data that has caused people to feel more and more uneasy that causes allies to be more and more uneasy and citizens and companies so having a real sense of transparency is important. It is important to think of transparency in two dimensions. The first panel spent a lot of time talking about reasonable transparency for the process associate with the programs. But this panel can address perhaps an a more focused way is transparency of the actual data usage how do we know what is going on in the systems . Talk about the technical challenge of having that kind of transparency. Within certain bounds it is safe to assume the government will have more and more data. The constitutional process of legislative process will determine how much more but it will be more and that is just the trend in the world that we lived in. So the challenge with the statement he is very up front and
Public Statement<\/a> that the
Intelligence Community<\/a> collects all the data to find a needle in a haystack to have to have the haystack. We wonder if you have to have all the haystack all the time we can see the development of
Government Programs<\/a> as an example to move to having all data in one place. That the oversight challenge for organizations for the courts and congress and ultimately the public, is to have a sense of confidence that all that data is held onto klay only a tiny bit is used that the rules are it here to. But these are rules governing the usage of information, not the access to our collection of. In the larger
Privacy Policy<\/a> debate, we can see more and more recognition that many of the privacy challenges will have to be addressed by usage limitations not just a collection the petitions because all the data of interest has been collected. Very briefly, i would say if you look at the computational techniques to address these challenges in
Computer Science<\/a> we were quite good at controlling who has access to what data. And steve is one of the experts on those techniques but what we are not good at is the ability to examine the system and how that is used and whether the use is in accordance with whatever the appropriate rules are. Several years ago, my
Research Group<\/a> at m. I. T. Took on the challenge whether there is a way to actually characterized information in a formal constitutional sense if you can apply those rules or see if they could be adhered to with any
Information System<\/a> for the we have developed
Research Prototypes<\/a> that enable us to detect those violation of rules
Law Enforcement<\/a> information sharing rules and on privacy rules such as copyright. It is in the written remarks a description of this research that is no and active
Community Around<\/a> the world at work on systems like this. Like to stress one thing, i think we know a fair amount of the systems but much less how to deploy them a large scale. I dont think we will in tel we do that. That wont happen until the entities that hold the affirmation are told they have to be accountable. Lets hold the right there. I was generous on the five minutes on the first round now let me simply ask does anybody feel compelled to save something at this moment before we get to questions . Thank you. I just want to followup on some of the points that he just made because a very troubled by his description and his proposal. He seems to be arguing there is really no need or purpose or likelihood of success for limitation rules. So let me stipulate that. If that is true, what is the
Legal Authority<\/a> and for which u. S. Agencies are currently allowed to collect all the data . What is the basis . I used to think a search having some
Legal Standard<\/a> you think there is such a
Legal Standard<\/a> and secondly secondly, if you dont think there are any
Legal Standard<\/a>s that prevent collection are there any boundaries . If the nsa would go and say we want all credit card information all live search everything you possibly have in common than we will sort out usage conditions you have a problem with that . Let me make sure no one misunderstand i am not suggesting we should eliminate all collections but i am suggesting our current
Legal Standard<\/a>s will have the collection of large amounts of information and i said i think it is for the legislative process to sort out how broad that is. But my belief is agencies have reasons i also think it is challenging based on the comments to understand where the limits will be. We need those but what i would suggest that i would submit have been practical that it is hard to store data and i believe we need to replace them with very clear usage rules. It is not either orbit it is equally distinct to assume you can solve this problem with collections. Just a quick comment. I am not a fan of usage or audit but technical transparency mechanism for the agency whose bread and butter with analysis should analyze the usage. That is a nobrainer. They can tell us what percentage of the information was relevant. However i want to push back on the use of technology as a placebo or panacea of policy limitations. Of it does is make it more expensive but it rarely does it make it impossible. We found with enough resources and efforts almost every securities advancement there has been some vulnerability. We can talk about the abuse scenario but honestly i would rather focus on the non abusive. Absolutely. But look at the database that ising corrected but the subject of a suspected terrorists it is the only lead. But it contains millions of records of innocent individuals, americans. But in a scenario we have technical limitations but he think we would not overcome those . That is a good question. For my first question geography. A couple of you mentioned the internet that wax geography. We have a law, the 702 based on the geography of the people and lets assume for now an individual, so in individual the existing one place at a time. We have a system based upon assessing where that individual is and if they are outside the
United States<\/a> and can be subject to a collection under 702. My question is what is the best and what is the worst indicators of whether a person is outside the
United States<\/a> . There are several technologies that are commonly used. Most common is the database saying we have different it addresses those used by a gambling sites to see if you are in the blackout area. Dont forget technological. The imperfect technology is 85 percent accurate more accurate with the country level than the city level. The nsa has a technique that uses the roundtrip time from geographical points, the speed of light i dont know if theyre using it but a patent they were granted on this. But the david doesnt respect
National Boundaries<\/a> as it moves to the cloud and if you are operating with large data warehouses, you want to disperse geographically with the blackout one of the migrations nobody is controlling where this goes. The geography is very poor. We have a lot that ignores the geography of the data. But theyre not perfect especially business travelers with
Virtual Private Networks<\/a> that make it appear in the u. S. Are not in the u. S. It is not a particularly useful paradigm there is a lot of stuff out there that is easily attributable to a particular person because of the twitter handle and the database has privacy risk. I want to echo at steves comment new zealand it address becomes borderless it can appear to come from the u. K. Or u. S. Or have access to bbc or hulu. Com. And they render it based location. Able to you the source of the equipment but not the individual. Email addresses dont have the same property. It is inherently have a nationality they you can infer from the email address. Maybe a country code or a nationality of the name but with most email between copywriters to go to g mail even though you see the locker icon mingy mail delivers that it is transmitted through the servers in the cloud. Anyone with equipment or a large
Internet Exchange<\/a> could get that the data or content. So how do they determine whether it is a u. S. Citizen or not . There is some indication they do have a database also that there is other data in furred and you are looking at the data that you have looked and process the data which when you decide it might be american but that it is after the fact ended rigo under section five that if you encounter any illegal activity, you can then handed over to other lawenforcement agencies. See you can render the problem of the real identity let me see if i can give you a more precise answer shaking my
Computer Science<\/a> background cobwebs. But a typical sulfone can be located 93 techniques the second is the gps and the third is the wife i access. But you talk about the individual using the device and that is a problem you need a big table of all u. S. Citizens then you need a unique link to the user in time coz by the way a person who holds john smith device may not be john smiths you have too often to keep the user to the device but then it allows them to be a u. S. Citizen. But i suspect the nsa has given considerable thought because they need to address that challenge to satisfy the 702 requirement. Also i participated several years ago at a workshop something called of e. D. And day but it would be possible to uniquely link every activity on the internet coming every keystroke to the identifiable user who did what when. Is perfect. Like total information and awareness. But heres the problem. It is why i think we have gone too far down this road to distinguish between u. S. Citizens and on u. S. Citizens for the
Fourth Amendment<\/a> doesnt draw that distinction. Almost all privacy laws regulate the conduct of the police in undertaking
Law Enforcement<\/a> activity. But it is the
Police Conduct<\/a> were regulating. What pfizer introduced is in the collection of foreign intelligence we needed to safeguard the privacy interest of u. S. Citizens. And in that introduction attempt to build a barrier against the overreach. If i could come back to the question of geography geography, the law focuses on persons reasonably believed to be outside the
United States<\/a> that is the first filter. When i am asking is in terms of how that assessment is made, you dont care about the identity of the person but the location recently believed outside the
United States<\/a> can someone give us a list of the most reliable factor answering just that question and the least reliable factors . I will go to dna that i will yield to david because we have to move on but to me personally it would be helpful to have some way to go back to nsa had to make this determination will be looking at what is technologically more reliably and reliable so when you get to the second question it turns out it is a person in the
United States<\/a> it is a citizen. How you first make this judgment of geography . I want to suggest that perhaps the more reliable and less reliable may not be the best paid to do but the more contact you have the more reliable the determination should become and in these uncertain cases lets take the 85 percent accuracy the no reliability levels for different it we can give you that the nsa obviously knows it but does in the agency as they develop more information, do they act on it . If that they are u. S. Persons who we should treat them the way . Can reestablish the epidemic threshold . The in the service learns overtimes it is reasonable to expect and be accountable to the hard cases will be the one that changeover time and when is that recognized . Is the point i made that there isnt a reliable method that the internet is without geography and you need
Additional Information<\/a> to prove that sometimes requires a looking at the contest with the targeting guidelines the standard is guilty until proven innocent unless youre a u. S. Citizen you can hold it and analyze it for later analysis. The two things together is about geography and in tel you can prove it is not u. S. Week ago on this forever. I want to go back one of the boards responsibility is to oversee programs we heard the issues with regard to a collection and use, access and disclosure of information. So where in
Technology Addresses<\/a> those concerns . Or how this technology and lot interact together to address those concerns is a free work going forward. Technology at best to implement a policy. I have to know whether the things i am trying to do . Depending on the problem i can come closer or not so close from a technical perspective. On the flip side how do you verify people stay within the rules . Electronic medical records if anybody has looked at these you cannot acquire strunc of the dictation civil walking into the emergency room in case of emergency brake the glass and looked at the data there will be an audit process after the fact was this reasonable for this doctor or nurse to have done at that time . And then it will catch were punished those but the policy comes first after that technology will have to function. I did not mean to suggest that
Technical Solutions<\/a> are not appropriate obviously they are necessary but i dont seeing that it is an ultimate solution into the legal safeguards but i listen to the panel this morning i was struck by the comments from
Daniel Weitzner<\/a> how the fire is a process was similar to the traditional wiretap process he said rialto are targets of retry to give information over the course of the investigation said he is right with that respect but what also struck me having studied the oversight mechanism is how many of the things are in place for the traditional title three wiretap . It is true. What do you do . The courts have to report on an annual basis a number of wiretaps authorized and how long they took place the outcome and that cost and what percentage of non incriminating information was gathered and all of that data is made available to the public. Not investigations pacific but the enormous amount is made available to the public about the scope and use and effectiveness of those traditional wiretaps. But we have almost none of that information we have a letter that says roughly in 2012 there is 1784 applications submitted one was withdrawn and then modified or approved were subject to modification because ultimately they are all approved so the key point with the legal safeguard it is necessary inappropriate no one is disputing that but there are many more ways to establish meaningful oversight within the fis said that we have not even scratch the surface with the law versus technology you would essentially need an
Intelligence Agency<\/a> to monitor the
Intelligence Agency<\/a> still technically capable actors or bill dane audit mechanisms to measure exactly what the agency is doing so this is the number of email addresses and it addresses what ever is collected how this information relates to the investigation actually having someone from the outside but to provide in tel if theyre doing their job this could be technical. Things like what they have described as is giving their own audit logs. Evade not classified as individual who probably want the independent team. Is also an argument with the analysis before will on a larger scale normally technology has something as opposed to waiting after the fact. Absolutely that goes back to prove the programs that gives the fis and orders do you know, the numbers how much was over collected there is no mechanism to the fisk or congress that how will you trust the nsa that this is working dray and the algorithms are on their adult figure heavily to say and called out bs on that. I think we have 21st century intelligence and 20thcentury accountability and enforcement methods. We have to get the privacy of force and the kids of today and of the ticket requires creating another
Intelligence Agency<\/a> but i do think requires a much more intensive approach to auditing with the way of looking at the results of those audits to have transparency and access for independent entities but there would have to be more than five. I think we should raise our expectations to detect the anomalies the way the agencies operate i am very to blend together the question of intelligence effectiveness and privacy rules. So yes if the agency will spend a lot of money on day that it analytics they should not waste of money but just because the system is effective it doesnt mean it passes the privacy test we should keep those two questions on separate tracks but there is a lot that can be done to have better accountability but it comes back to the original point that the rule has to be clear and not dependent on a technical accidents as if it is g relocatable or not. You have anything to offer . I started but. You said we have barely scratched the surface on the fisa project either off the top of your head curry you pick off a couple of items or submit them for the record please or anything off the top of your head . We could improve public reporting through the availability of more statistical information that does not compromise any program or activity but it gives the public a better picture of how the programs are used overtime but we found with respect to the wiretapping it is useful to see the trend and why a narcotics investigations today are the primaries so in the regions of the country and it leads to a more informed public debate because people who think these are necessary tools have the lead to a debt to support the point. We dont argue in the dark. Anything for the you could submit along those lines would be great. Content versus non content i am not personally convinced yet that the non content is as repealing or more revealing the and the non content. Often with the government collects the content is the not associated is well but i get it i called the cancer testing clinics been 10 minutes later i called the
Oncology Department<\/a> then 10 minutes later i called the
Insurance Company<\/a> then i called the drug store in the
Oncology Clinic<\/a> every week for three months. Said you infer that i have cancer . And they have called in said my mother is 90 years old and she has cancer what can we do about it . Much of the sixers old and she has cancer i will bring period every day. It would be far more revealing it seems to me to have that content in the and reliable in france and there is a privacy law that this is no distinction because i thank you fall into the argument that content is so powerful he make the argument as to why they need it one is that metadata could be highly misleading. Can i speak . I would just amended slightly that metadata at scale is at least as revealing as content even a single set of metadata can be misinterpreted two years ago to students of mine did as a final class project they looked at the m. I. T. Network and facebook included for relatively accurately few of the 25,000 person who was gay or straight. Based on the strength of the friendship relationship of a link analysis and was an affirmation that was available for the vast majority publicly or privately you could not getting it without a warrant but you could infer it with a better data. My degree that the micro level to be wrong that the macro level the amount of useful information you glean from the metadata is far more valuable than the interline content the simple way to understand is the paradigm shift of the analog world to the digital. It does not lend itself to analysis to analyze analog information you need to transform it into a representation it is now digitized and transform to be analyzed as a digital representation but once in digital format, you have the opportunity to examine or compare our record analyze and coming from a
Computer Science<\/a> background it is absolutely fascinating we concerned you did not even think you look for at the outset. I would be surprised if people are not uncovering things they did not anticipate they would find. But the critical point is the hard policy problem the value of the data that drives the programs it is also the risk to privacy that has raised the need to update privacy laws to reflect the interests of digital data and one final point barely dylan to lose this one, we think a lot about the communications rolm in linking of identities through investigations which is appropriate but these
Large Data Centers<\/a> are user profile individuals including american travelers entering the
United States<\/a> to aside a threat to index posing a risk to the country. Said taking that data you can assign a score and allocate resources in that is another way it is used. Is a that a good thing . That is the converse of your argument that the goal here is to find a terrorist the data is good at that does that support the governments argument we need to amass the data . But we have the answers of
Consumer Privacy<\/a> laws like the fair credit reporting act better good at managing the analysis of data that it tends to be fair like youre not allowed into the country people have the right to respond there are obviously there has been some progress but i dont aim to have gone far enough and there are adverse consequences people should have the right to respond and correct the record not hide from what history but to make sure that the inferences are accurate. It is not digital data but it is structured data. Anybody knows how bad computers can be but structured data is extremely valuable you can process it a efficiently and gas to have much more data and retrospect fully prepare wanted to keep call detailed records. The
Intelligence Community<\/a> has known more it has got worse content is great but it is harder to get. Data on think we should necessarily make assumptions in the unclassified of environment of the capabilities to analyze large volumes of voice data. I dont know but i dont think we should necessarily assume their limitations because there have been a lot of the variances in
Voice Recognition<\/a> and processing very large streams of digital data of this sort. I would propose a different perspective rather than saying content is cold and metadata is less but come up with a thousand pieces come up but this and this information so to see the impression is accurate oftentimes but they will be a reliable. Bias or code words. Is not a
Gold Standard<\/a> of the trees. The information revealed but then to have some level of confidence. Way you could infer that a stone my pack to v are promising as jim said fed are in the environmental of large data youve proved their algorithms and make the princess. In some cases it can be effective. You have calling patterns that reveal just based of those who make the inbound calls but does the information revealed to some degree is it does","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia600709.us.archive.org\/29\/items\/CSPAN2_20130710_030000_Capital_News_Today\/CSPAN2_20130710_030000_Capital_News_Today.thumbs\/CSPAN2_20130710_030000_Capital_News_Today_000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240619T12:35:10+00:00"}