vimarsana.com

Card image cap

Colleagues will join us to act on it. Are we likely to see any debate clacks it is Democratic Leaders have been promising for months they would bring this to the floor but wednesdays procedural vote is still not expected to advance the bill and thats a good digestion terms of the politics for both sides, the republicans created the democrats voting based on the polls. The congressional leadership correspondent for the National Journal follow his reporting it nationaljournal. Com. And other congressional news the Washington Post reports new york congressman Michael Grimm turned himself in on the band is expected criminal charges. Charges are expected to be released later today. Those charges will be related to the ownership of the manhattan restaurant which has the ties to a fund raiser to raise more than 500,000 some of which were allegedly improper. The housthe house will begin tot 2 p. M. For the consideration of a number of noncontroversial bills. The senate will meet at 2 p. M. And begin general speeches and both related to the judicial nominations are set for 5 30. The Associated Press reports this morning that the white house is saying they are sanctioning government officials and 17 companies with links to Vladimir Putins inner circle. They are levied because russia failed to live up with commitments on the International Accord and the escalating the crisis in ukraine and in addition to the sanctioned the u. S. Is revoking export licenses for the hightechnology items that could contribute to the military capabilities. We will keep right on this for a further update. When you are living in a world you dont have monopolies anymore and multiple companies are competing for their options on tv for example, that really doesnt work when they form a monopoly negotiation and so that is one of the reasons they dont have as many options as they could have and by the prices are still going up for your television and vide video servid where they should be going down. There is a lot of competition between the different companies. When you are getting Internet Access or watching tv it used to be you watch tv or had a Cable Provider and now theres everything from Cell Phone Companies Offering Services to Satellite Companies to just doing it over the internet with Everything Else like hulu so there are more consumers aware today but that still means of course we need to have an antitrust approach and make sure there are enough monopoly providers that engage in the activities. What we are wanting to do is make sure that they release all of their information in a timely manner. We are going to go through an entire process of reforms this year. We think the agency should be more transparent and focus on what they are doing with spectrum and licensing as the core mission. We dont want them going off into next neutrality to have governments in the internet. We dont want them offering privacy and Data Security issues those go to the ftc so its time to narrow the focus and get back to the mission. Members are considering this session tonight on the communicators at eight eastern on cspan2. A discussion with a team of journalists from the Washington Post and london Guardian Newspapers that recently won a Pulitzer Prize for the reporting on the links give you two weeks in the nsa data on american phone records. In the presentation came during a panel hosted by the Washington Post looking at the nsa surveillance and recent revelations. This is about two hours. We are proud of the recognition and especially proud of the coverage. We also recognize of course that there are sharp divisions and opinions about the source of the documents that form the basis of the coverage from Edward Snowden and also about the controversy that has been intense at times and i expect we will explore all of that here today. Awarded the pulitzer along with the addition of the guardian of great britain, the Pulitzer Board and raised the idea that it served the Public Interest and that had a reaction of its own. The new yorker magazine and he gave it a sin is and is yesterday endorsing the award wrote this. This was a defining case of the press are invited is supposed to do. The president was held accountable and he had to answer questions that he would rather not have any when his repl anyow unsatisfying to the public and in some cases rainfalls his administration had to change its policies. Congress had to confront its own failures of oversight, private companies had to rethink their obligations to their customers and Law Enforcement and people had conversations at home and at school and pretty much everywhere about what they themselves would be willing to let the nsa do to them and journalists have had to think about their own obligations to the law, the constitution, the readers and even in the practicf reporting in the age of technical tracking the sources they might expose or make foldable. The representative declared awarding the pulitzer to snowden enablers is a disgrace and suggested that we should be prosecuted under the espionage act. A reader in a letter that we published last week quoted he was disturbed the paper should be published for disclosing classified information that has resulted in a lessening of the countrys security. I dont think the post should be able to wrap itself in the text of the amendment and give itself and in unity at the cost of citizen safety. So much to talk about here and we will talk about how it came to be coming how and why we decided to publish and how we went about our work and how we think about issues of National Security in the coverage. Certainly National Security is an area of focus and that should be no surprise. The governments power to make to interrogate, prosecute and incarcerate, kill range as the greatest powers of all if we are to copy the federal government these are not activities we can ignore and these are not activities in my view we ca can detebesure to the wishes on whae report. What we dont report or how. When the government asserts National Security or whenever the basis for the coverage is classified material on the ground of National Security the government has secretly implemented sweeping Government Policies with profound implications for individual rights and we have an experienced National Security staff. This organization relies on their expertise and history of navigating the most sensitive subjects imaginable. We take National Security concerns seriously. It is a dangerous world and we know that. Reporters communicate regularly with the pentagon, the white house intelligence agencies and private companies. On the nsa documents we spent many hours on each stories into detailed conversations with highlevel officials and on many occasions the request of government officials we withheld information that might disclose very specific sources and methods. We didnt agree to every request of every sort made by the government. Had we done so, there would have been no stories whatsoever. The intelligence agencies were opposed to publishing anything at all. What we saw is something that went beyond specific sources and methods as guarded on the National Security. The documents revealed the national securitthat thenationas engaging in surveillance and Data Collection of breathtaking scope and intrusiveness. What had transpired was a dramatic shift towards the state power and against individual rights including privacy with no Public Knowledge and no public debate. With that im going to turn it over. For the National Post focused on Telecom Policy from internet privacy and social impact of technology on families. She joined the post eight years ago on the mercury news where she was a technical reporter. She began her career as the bureau chief in office and in new york as a Financial Markets reporter. Its all yours and thanks again all of you for coming. [applause] thank you for the words and support [inaudible] it involves people who are not here at work behind the scenes from the graphics to the designers and editors and reporters and im pleased to announce the panel. These reporters that did work on the story. Martin is a Pulitzer Prizewinning reporter and author. Hes a senior fellow. Hes one of three journalists that received classified archives. Gellman has led to the nsa coverage of the post and is writing a book on the surveillance industrial revolution. He is also being humble in his submission. Nakashkima covers issues relating to intelligence, government surveillance and Civil Liberties and shes written about the nsa and the evolution of cyberpolicy in the u. S. Government. She served as a Southeast Asia correspondent for the Washington Post between 2002 to 2006 and shes reported there on the Islamic Militant networks on the indian ocean soon on me. Since joining she also covered the white house and the Virginia State politics. She grew up in hawaii and attended the university of berkeley. Ashkan soltani is to your right hand is aand is an independent r and consultant focused on privacy, security and behavioral economics. Understanding the abilities of the commercial and government surveillance is. She served as a technologist for the division of privacy and identity protections as the federal trade commission and also worked as a primary technical consultant for the washington journal what they know an investigative series and is working with the Washington Post on their coverage of the nsa. She also covers privacy, security and surveillance in the digital world. He came to the Washington Post in 1998 and has done stints as a political reporter and correspondent covering africa. He is also the author of the book tinderbox west spots the epidemic and have a world can finallworld canfinally overcome. Thank you for joining us. I would like to start with two minutes from each of you to just talk about what the response has been that you have received the Pulitzer Prize. This seems very long ago. My friends like to send me the stories of what an outrage it is. There are serious criticisms to be made as described and we are not immune from that house was anybody else that we covered and there are people that a number of commentators have said that this was undeserved. There are others who are very happy for the validation of the idea of the debate and the financial boundaries about what the secret intelligence can do in a Democratic Society needs to be decided by the people that the government is working for and that information is power and the secret information although very clearly u. S. Intelligence cannot operate entirely in the open by any strain of the imagination. Its fundamental limits boundaries rules and regulations have to be subject to public debate. I dont have much more to add to say that reaction has been generally quite positive from the Civil Liberties communities and rather muted from the sources on the Intelligence Community that overall, i think the general public has been appreciative. From the kind of Technical Community to the response being the understand technolog the tey and are bringing technical people from the basement to explain things more as we see a lot more of our interactions in the Digital Media and they respond being able to highlight how those things work and bring them to public debate and mystified how the technology is no different than it was years ago and a sense of how it impacts your life so we should be able to explain that. That has been kind of a valuable response for me. It has been humbling and inspiring realizing you had a small role but its also been a reminder about how fractured my wife is because i was supposed to coach my sons baseball game tonight but other guys looked at me and said what kind of things . I got a role in the fillets ar pulitzer it has been fun to share this and understand how much he played tracks in the newspaper and in the rest of your life. Thanks. I should note there will be plenty of time for questions to have almost 40 minutes and will be available as well. You should see a package if you would like to ask a question that we may not get too we will continue to ask questions and post answers online. After the Panel Discussion there will be two people with microphones will be available to please raise your hand if you do have a question and to stand up when you are posing your question. Tell us a little bit about the development of the story. Youve been away from the post for actually a few years when you did receive the documents to the story coming in the next time come in your absence, marty baron was appointed to the editor. I understand you didnt know each other well. What happened to lead the introduction of the story to the post into the decision to Carry Forward . Stomach its not obvious from the coverage but im not a Washington Post employee. Im on contract after having worked here for 21 years i left in 2010. Win over the course of the first half of 2013, i developed a correspondence with the man i later learned to be Edward Snowden and i knew there was only one place to the story for me. It was going to require sources and the decades of experiences here in the mutual trust of people i worked with for a long time, but it was a harder risky decision to be made. And the boss is the one guy that i didnt know so i walked into the room and figured out who marty was by process of domination. So those are the lawyers. This must be marty. And i was asking him to take on risks and put his trust in someone who hes never laid eyes on and a story of the magnitude was going to need a lot of lawyering and careful thoughts about how to balance the risk of disclosure with the big policy decisions before the public and there are going to be hard problems that are journalistic. How do you verify . You have a piece of paper that says it is an nsa document. How do you know any of that is true x. How do you know even if it is authentic but its accurate . How do i know that he used to be a contractor for the nsa is either of those things. I was asking the paper to devote resources and to accept security measures they have not had to have before and i was thrilled at the answers that marty understood what h hes getting into. He is very thoughtful about what the decisions would be had with a subsequent steps would be and he embraced it. It was a revelation when you explained the fillets are speech in the newsroom some of the resources even on the it side that was involved. Can you quickly talk about that . There are some things i wouldnt talk about, but we have the ability to protect material for things we didnt think would be disclosed in the said in every story we are holding back certain elements and we are not doing that because someone told us we have to. We are doing that because having consulted with the government and having thought through the implications, we decided we agree, we should withhold this stuff. And if youre going to hold Something Back and read it on a network or a hard drive where any actor can come in and take it. So they stepped up their game in terms of the physical and Digital Security encryption and stuff like that and really want to get into the details. What was your role in the coveragand thecoverage as the rr covering the nsa . Talk about when you came in with your guiding mission was on the story and about how this coverage has affected its change in the government. Of the disclosure certainly has had an impact on the policy process and most significantly on the public awareness. I want to make a few observations upfront about how the landscape has changed from the perspective of the reporter who didnt receive the documents at least not directly and how certainly we are engaged in the debate that is on precedented and that wouldnt have happened for the disclosures. But it isnt for the want of trying by the lawmakers, journalists and others. About the existence of the secret law under the patriot act which the law passed after 9 11. But he was bound by classification rules from going any further from explaining his discomfort with interpretation. And he and other lawmakers continued over the years to warn about the secret law and journalists, including myself and others tried to pry from the government officials and former officials for some insight into what the secret law under section 215 of the patriot act could be. But they are bound by classification rules. They have families, they have jobs and to no avail the Civil Liberties groups, the aclu, the Electronic Foundation that titled lawsuits to try to force government to be more transparent on the law. Nothing worked until Edward Snowden came along and i remember the day well the first document emerged and it was a court order directing the company to turn over all records to the nsa. We know that isnt just the content of the phone numbers into the duration. You quickly become apparent that this is a program in terms of collecting the data of americans and many of them are law abidi abiding. This is what they had been warning about for so many years and it was quickly followed by more disclosures into stories by bart into ashkan and others come other Surveillance Programs in the nsa. Its going over seas collection attempts to gain the communications by breaking into the data centers. From my perspective i started to see that it took the function of Edward Snowden and the leaks and a degree of transparency from the government. After june 10 of the declassified interest in that progratheprogram and subsequenty thousands of pages of court documents, opinions, compliance reports, a lot of them documents of months earlier officials have been telling me that it was pretty difficult to release because so much of the classified material was intertwined in the legal analysis. The question is a newfound transparency a permanent change in behavior or as some suspect a tactical shift to the disclosures back one of the smartest observations that i heard came from a former Inspector General at the nsa who said the antipair of grace, that by withholding the existence of the Metadata Program, the government may have avoided a war obtained a shortterm benefit in terms of not tipping off terrorists that it missed an opportunity to secure a longerterm strategic goal of Winning Public support which is so important to the Intelligence Communitys activities. Thanks. [inaudible] so, ashkan you are a Technology Expert and were wrought on in many ways to help the decode some of the slides. Some of them or amateur. Itwere amateur. Its interestinf these slides and the public was like really are they part of an nsa slide . I would like to pull up one slide. Stick a little drawing in the clouds. If i could say one thing i have seen a lot of government power point most of them not classified and one of the things that might be authentic is it is the kind of crowded graphics. Here we go. So okay. A ashkan can you walk us through some of these in particular . How does one slide like this lead to the story on october 302013 last year titled infiltrates links to the data Centers Worldwide ensure that his appearance to you from seeing the slide that is the story. The National Security agency has broken into the Main Communications links that connect yahoo and google around the world according according to Edward Snowden and officials. By tapping those links the position is to collect hundreds of millions of accounts many of them belonging to americans. Later in the story you see two engineers have close ties exploded with profanity when they saw the drawings. I hope you publish this, one of them said korea talk a little aboutalks a littleabout how youe of the bar and please chime in as well. Its really difficult where the nsa was extremely cryptic and there are secret Program Names under multiple levels of security and the security and they go to Great Lengths to classify or hide their operations. On the other hand, there is kind of not obvious that some want a appearance of these are engineers attacking technology that you and i use and so if you are a Network Architecture or cell phone that works for you know some of these technologies they all look the same if you draw them out. So these are one of the first documents that bart flag, that we reviewed. We really thought there was something there but we werent sure. And again from a Network Engineering perspective it took kind of, this is like essential to have the cloud works. This is a cloud system for many of the major cloud providers works. Theres a point at which the data from a user and the cloud provider, say google, is encrypted and theres internal traffic behind the scenes, behind the door that they handle. Thats not encrypted. The assumption being that its private and so theres no reason to encrypt it. We poked our heads around, tried a bunch of theories, look at architecture diagrams, look at documentation both in terms of what was in the slides as what is publicly available about how this stuff work. It finally clicked. We got a bunch of theirs and it made sense. In fact, they were tapping the cables and private cables between data centers in the cloud. Why that was interesting and surprising, and again he would have to think from a Hacker Network engineer perspective whereby they are given a set of constraints can legal constraints and technical constraints and theyre given a mission to collect data on targets they find interesting. What they did is the exploited kind of a property of the cloud architecture which is if you are here in d. C. And your connecting to the Google Data Center in North Carolina or in mountain view, your communications will stay in the u. S. Because of the way google architects their networks such that your data is replicated to all of their locations in the world in the event of a power outage on the west coast, they will collect the same data that would be illegal are not available to them domestically. They will be able to connect and access the same data overseas. They essentially find ways to exploit the architecture of the cloud that its insecure on the backend and redundant and immediately replicated and they collect that data. That became kind of a fun angle. The thing that was most surprising to me and all of this was not the geek terms and the secret terms but the definitions for words you and i use everyday, words like collected. So under this, these mechanisms, the data isnt actually collected just when his recorder or saved to disk. Its only collected once its been processed by human or processed by system that kind of analyzes that. Again based on the legal definitions and based on these vulnerabilities and Computer Networks they are able to perform these tasks that would otherwise seem illegal to ask. I just will add a couple words about this one. A time when i found this slide is right around the time that i persuaded marty baron to hire ashkan to help figure this stuff out. I see many of you here are lay people not involved in this will. When you come across that cartoon you can see this got to be a story here. Theres a little smiley face that says, its an encryption. Encryption is added and removed here. Theres something going on. The reason why engineers we talked to erupted into profanity the family newspaper version of the conversation, is because of the smiley face. The smiley face was a declaration of victory. It was the spiking of the football in the face of the company engineers. We found a way around your security. Ashkan and i, took, it was either five or six weeks to figure out what that cartoon meant. First of all it was an illustration taken from a document called google clout exploitation. We had the illustration but we didnt have the document. There were lots of times when there will be a slight and a powerpoint that is taken from some of the thing which will clearly and to all the questions you have but you dont have that other thing. Youre trying to put pieces together. What it means to say is that theyre removing encryption. Are they stealing the certificates from the companies . Have it figured out a way to break encryption, deciphers or standards of the world thinks is secure . Are they spoofing them . Are they pretending to be google when you connect to them . We tried and discarded a bunch of different theories and were not going to get the edge within the four corners of that one document or even in a combination of documents. We had to get out in the world which is what the post does, to report on all sources but it was wasnt until we interview people who were intimately familiar with the architecture of these systems and then run that through our computers with ashkan that we figured out what was happening. You know, this was a real moment for the Tech Industry as well, craig, and response they had to this. This particular story. Can you talk a little bit about the evolution of the Tech Industrys response to all these stores . We were talking to them in the beginning. What a you talk about . We dont know what youre talking about, a real roller coaster. My role in this was a little different to i worked for the financial stuff so i did some surveillance reporting but my main responsibility arguing was keeping an eye on google and facebook and yahoo and what did you. I was the recipient of some very unhappy phone calls a day after prism is the first prism story, the story barth did that made clear that government had access to all the private data that the cubbies were collecting for other purposes. Let me tell you, the companies were really, really mad companies were collecting. It took a while to figure out exactly what this juncture was. But what i watched happened over the course frankly of months was the industry gradually realized they had been had. They knew about some of information that was being transferred and how but i think its clear a lot of it was happening through Court Procedures that were secret to us but not a secret to them. I could remember exactly the story they were just talking about, about the google and yahoo datalinks being tapped into overseas, and suddenly everybody in the Tech Industry at once said uhoh. They did know Intelligence Services had wired into the brains. They started in mad at us and eventually they were really mad at the u. S. Government for both because they felt, they felt as though their place in the world had been jeopardized. You use google services, you imagine its private, kind of private. It hurt them economically from industry point of view to be seen as somehow a conduit to the u. S. Intelligence services, but it also, there was a visceral quality. They really felt betrayed on a felt like personal level, that they had built th these systems, theyre supposed to resist hackers and yet you had these uber hackers and u. S. Government who were breaking into it and find every way possible, and in ways that were frankly often imagined. They were good at this. And Companies Working by the time we got towards the end of the Year Companies were thanking us but theyre saying were really glad. We know that in whole bunch of new encryption measures. We dont know and we may never know if they are sufficient but its clear the defenses are a lot stronger now on a corporate level and where was all this weekend. Talking about some of the biggest American Companies not on Technology Companies but American Companies spending a lot of money and engineering talent in a deliberate effort to thwart the efforts of their own government to spy on their users. On the one hand, you can say that their philosophy is nobody gets to spy on our users but us. But this is a big moment. They are not trying to stop the government from doing any kind of targeted surveillance. Even if what theyre doing is perfectly effective by encrypting their internal links. The government can still go to them and get information about any individual target. Another way to say is the nsa most available to spy on anyone but it will not be up to spy on everyone. One of the big differences between the prism story and the data links story between google and yahoo is the prism, the company knew, they did know the codename prism but they were over a lease their National Security people were aware of the program and they were under court orders to comply. This is the result of a program that had been debated for years on the hill. Culminated the passage of the ice and act section 702. But with this data centers stories they were completely taken by surprise. They felt betrayed. This was not the result of any public debate. There was no fisa debate over whether the nsa could or should gain access to the links between the data centers. That was taking place entirely outside the domestic surveillance law we have under president ial authority exclusively. That is actually an issue that i think deserves a lot more exploration because what we are seeing, one of the big benefits of the snowden disclosure over the last year is this heightened awareness of the nature of government surveillance. Since 9 11, and as a result of advances in technology, we have seen a fundamental shift in approach moving from individualized warrants and other protections at the front and, to vast collection with limits on use at the back end. And at the same time there is this, because of the Global Nature of the networks, the communications of people like you and me are mixed in with communications of terrorists and legitimate foreign targets. So as a former directive of the nsa said, today there is no home game. There is no away game. There is just one game. And that raises questions of whether not those back and protections sufficiently protect our privacy. And, of course, the companies have much to lose reputation only. You want to add one thing . A key point, which is one additional thing that disclosures kind of helped motivate is investment in security both on the backend and the front end. So secure the experts have been warning about the ability to collect data thats not encrypted for years. There is a personal vendetta to get yahoo , for example, to encrypt their email communications for a number of years. Earlier story we did prior to the muscular story was about how the nsa was collecting address books of public internet connections. One the company, they were the number of address books collected a day, it was like 500,000 a day, and one company was 10 times kind of, at 10 times more kind of address books collected and the other. In our conversation they wanted to comment on the record, conversations, why are we being targeted out . The obvious answer was that you guys have foregone security tools. You dont build security into your product. This is why. The disclosures made it very clear and made that very standing and tractable. Rather than give us a response, a statement, the statement was were going to begin encrypting our yahoo mail starting at the end or the beginning of this year, the end of last year. In one line . In the front row here, let a Large Campaign of activism and technology to get yahoo to scramble its connections from their computers to yours. For years, and this was to protect among other things against ordinary hackers. Because we dont encrypt then its your credit card data, your email, all this does include text over the web, anybody can read it. And for four plus years now who said no, dont think so. On the day that the muscular story ran yahoo announced that it would encrypt all connections to users by the fall. Barred [applause] thats correct. Bart, the question clearly that we have the most and that we got through messages ahead of this event was how did you come and the editors, marty baron, kevin and others, et cetera, how did you by National Security concerns with the Public Service of uncovering the sweeping government Surveillance Programs . What is the post, the right to publish stories about the classified government materials . Even just friday to New York Times columnist was asked about the pulitzer the guardian we see. He said the press coverage and whether it deserves recognition i have complicated uzbek im a little nervous by the fact that they really did benefit from what i think is a repellent unpatriotic act. The questions that you the post by tony, if youre here, can you please explain why this important work of journalism does not negatively impact National Security . What is your response to tony and maybe even david brooks . Theres a lot of pieces to that. I think anyone in you wants to ask that should ask it again, less politely. Well try to get it in pieces at different times. A lot of people have this reaction, its classified, its secret. Thats the end of the discussion. Dont put it in the paper. Well, there is now you to understand what that would mean. Theres no bilateral estimates more classified information, classified by the u. S. Government banned the entire contents of the library of congress and all other open libraries in the world. There is more classified and unclassified data in the world. I have a classified navy laundry menu. Im not making this up. There is nobody even the strongest defenders of National Security disciplines, ive never met anyone who would not say that theres massive overclassification. Thats one thing. The second is that having covered diplomacy and military affairs and Intelligence Matters for a long time, i can tell you its only a little bit exaggerated to say that almost everything i want to know, every story, could be classified somewhere. By the way, i think i could that have my stories as an appendix publish stories with classified stamps on them. Also not making that up. The problem is that company, all bureaucracy wants to control information. But when youre working in the secret world you have this mechanism, this has to deal with stand. Almost everything that has to do with our relations with the world for our military threats or Intelligence Matters, even policies that is not testified in congress, not in a press release that is not in this conference is classified. We simply couldnt cover some of the biggest expenditures that the country makes, the hardest decisions, the ones that involve the greatest risk and that allow us to hold accountable our leaders for the way that they use their power. You just have to cut out they would be big blank spots in the paper. Snowden leaks are too generous. Theres nothing like it but weve had stories, thousands of stories in the time i worked at the Washington Post that touched on something classified. We cant let the stamp itself be the sole decider. We have to try to weigh what are the stakes are . There are stories weve killed over the years, even consider publishing. Theres lots, theres an archive we didnt consider publishing. That was my first conversation with the director of National Intelligence office on the first document but just we know everything between pages 1724 were not considered because its specific, operational but it reveals targets, specific techniques. The publication of which would end of them. They would no longer be useful at all. What we want to do is write about the stories that describe big Public Policy decisions, like the ones we have talked about before. For example, is it okay, do we think as a society its a good idea to allow u. S. Intelligence services to collect overseas where no statutory laws apply, where theres a sticker core, no fisa court overseas it, where congressional Intelligence Committees dont get reports are supervised activity, is it okay for them to break into data centers or the links between them . Although theyre not targeting americans, the specific usage for language, theyre not targeting us. Incidentally, they are collecting substantively all of our, they are at least passing through the collection systems almost all of the content of the internet. What action was trying to explain before was that google, yahoo , summary of the biggest companies, they have these giant fortress facilities all over the world. Theyve got biometric locks and guards and walls and fences and they look like giant factories filled with computer servers are theres one in ireland and one in hong kong, singapore, as well as a bunch of them on the north american continent. They are synchronized. If you sit on the cable that synchronizes these two data centers its the same thing as if you just reach into the data center itself in terms of what you get. So i its okay with us to say te nsa will collect at will from all of our communications in the service of its foreign intelligence mission. Seems like thats a big Public Policy question that needs to be debated. Those are the stories were looking to do. Ashkan, did you want to add to that . Just a touch on a Public Policy perspective, theres also this disconnect between again as i said earlier definition. So what the public would believe to be implied when you say collect and what the government means when they say collect are two different things. We did this story on collection of an entire countrys phone calls, recording of an entire countrys phone calls for 30 days. One of the core attitudes of that story was that it is not collected until its actually processed. It would be like i could record this, our conversation to any of you, but its not recorded, collected and its not surveillance. Until you listen to. Those othe are the things, so ik the public realizes without the definition, i think a lot of people would push back and say no, thats not actually what we thought we were approving. And we saw this with a number of the comments from senators and policymakers that approved of these programs. A lot of the comments and commentary was we didnt realize we were approving that. And what the end run was around definitions or on technical capabilities that the nsa kind of loophole the nsa would use to kind of engaged in a particular practice that people were aware of. I think thats the value in reporting it. The story Pashtun Community when she was published last montmonth but its going nsa Surveillance Program reached into the past to retrieve and replace phone calls. That was just last month. Why are we still sing the stories today . And the real i ask is theres the impression that, theres a question actually as of the documents were received. Wasnt one big dump . Is snowden still involved in the process . If you still releasing information . A question many people have come is he calling the shots on some of the releases and the editorial decisions and . I guess i should be the one to address that. Snowden gave me the documents late last spring. He has not handed over any documents to anyone since approach with that time period. He did not even carry them with him when he left hong kong, when he thought he was transiting russia but its been a long transit. He does not try to direct, suggest, hint at what should be written and when he gave, he gave, his a general agreement that i made with them, which didnt require an agreement because its what i would have done anyway, is to look through the material and weigh it carefully. Not dump high volumes of it out there, to consider what the ballots ought to be. One other quick element, we will get into it later if you want to, we at the Washington Post on not sitting in our armchairs making up thoughts about what would be harmful to security and what would not. In fact, we are usually pretty good at anticipate what the government will be worried about, we consult with government on every single store and every fact in every story. They have the opportunity to tell us this might look innocuous to you, like its not. Sometimes they will tell us what. Sometimes they will tell us things we dont know in order to help explain to us why they believe we shouldnt publish something that we do know. Those conversations are very successful. Theres kind of a good enough outcome on both sides where maybe they will say this whole thing should be, you should mention that all. I will say theres a huge Public Policy question in that, but i dont need to do this or that if that something, or thats not especially relevant to the point i think the public needs to know about. The point is, we dont just guess what would be a security hard. We hear from the Us Government very directly and exactly what they think would be a security harm. And a number of times when we publish something after getting those kind of concrete arguments is tiny. South beach but it is your question snow does not continue to dribble out doctors. He did not attempt to control the coverage or the pace of the cubs. The reasons for us to come out is theres a lot of material and were not casual about putting it on the public record. For sure we could go through this material a lot faster if i said, lets just dump the whole thing on the internet. Will crowd sourcing. The whole world will help us understand what it means. It would be faster if i say, lets take the 50 people in the newsroom to know the most about this kind of stuff, lets give them all free access to the whole archive and well put our heads together. The stories would come up faster but because theres so much material in there, we have much more control than that. Is there much left . There is more. This is the tip of the iceberg in terms of how the revelations affect government, as well as the discovery of more consumer surveillance efforts and that something craig, youve worked on. Can you talk about how this has expanded our thinking about even private sector forprofit surveillance efforts in which a covert . Thats a good question. I had covert surveillance on and off for your so when all this broke loose, and they used to debate with other people, like should really care more about what google and yahoo are doing or should we care more about what the nsa or the Justice Department are doing . Pretty soon after all this stuff came to light, it dawned on me that the distinctive is not all that meaningful because everything that google and yahoo and facebook is collecting, the nsa is eventually getting hands on. Certainly they can get their hands on it. The consumer stuff and the government stuff really blend together to a degree that i dont think any of us fully appreciated until these documents came out. Is interesting what weve seen. Theres been such a focus over the past 11 months on the nsa collection because of these Amazing Stories that there has been a little less focus on consumer connection, gmail, they serve ads based on what is in your stuff a whole host of issues, should you post pictures of the kids on facebook . All of these issues i feel more and more prominent part of the conversation and what i was doing, and with all been shifted over to try to make sense of what weve learned about the innocent with the u. S. Government is doing. But i do think that the time is approaching where we will have to wrestle with these questions about what are we all voluntarily, or voluntarily giving up to these companies to get Free Services we all want . How much data is on our smartphones . Every once in a while i said that if they do everything thats on my iphone. It is scary. I dont have a huge number of secrets, but the precision about me and my life and my family and my friends that are encoded in the location data, emails and facebook postings, its really stunning. I do think, id like to think anyway that theres a moment coming when the conversation welcome back to life. Where we will have, we will be reengaged on the question of how much is too much to be out there and in the cloud that anybody has access to. Ellen, how about your thoughts on surveillance even beyond the nsa in terms of u. S. Government . What are you exploring and what are the areas you see other ever surveillance . Theres always the debate and disclosure over the past year. Weve also heard that the bulk collection extends beyond the nsa. That the cia has also engaged in bulk collection of money transfers, and, unfortunately, we do not have a lot of disclosure about the protections and rules for that. Other than its done under section 215. You asked earlier about whats changed. I wanted to say that its not just been all talk over the last year. Wind section 215 telephone Metadata Program was first revealed in june of last year, president obama you may recall came out and defended the program and said he believed it was legal, it was effective, was subject to rigorous oversight. And intelligence insiders i spoke to said they felt fairly confident he was going to continue to back them in that program. Then the debate just took off and we started to see opinions move in july of last year. The house fell 12 votes a shot of into the program. In the fall a federal judge in d. C. Ruled that the program was probably unconstitutional. And in december the president s own surveillance review board concluded that the program has by january this year obama was ordering his subordinates to come up with a way to end the program as it currently exists. Thats concrete results of the disclosure leading to debate, leading to a policy change. And there have been others. K. Each of you briefly talk a little about about how every person, every consumer, everybody in this room, how does this affect you . How do these revelations affect you . How should you think about this . As ive been reading this story, outrageous innocent or what have you, what should they be thinking about and take away from this coverage of . I truly dont want to tell people what they should think ill tell you what i think some the things we put on the table are. We are vaguely aware as a society that theres a lot of information about us out there, that we just leave this digital exhaust, but we think of ourselves as sort of often on the one hand, sort of normal and uninteresting. Why would they be bothering with me . Or we are basically good people, we dont have anything special died, or so what if somebody sees my Kids Birthday Party picture . And i think the more you learn about how much is know about us, how closely we are tracked, the more most people i talk to start to feel a little bit squeamish. Ill give you a quick example. Theres a guy i live and work printed in new york to a guy in the office there who thought he didnt care about this sort of stuff, that he wasnt worried about digital privacy. All things i just said to you. So he uses twitter a lot. Post a lot. Yet locations broadcast turned on on a sweater again. Theres little to online you can download called creepy your and i downloaded it and i pointed it at his twitter account and i got three months worth of date and time stamped locations for this guy. I uploaded it to google maps. I made it a private matter so you cant go look at it. And i spent about one hour playing around with a look at it and i went in and i said okay, months of your life. We know you work here. Heres where you live. Heres where the kids go to school. Heres we go once a week im not even asking. Theres your inlaws, telephone, and bowyer up late that night. And he went straight to his twitter account and only did all the locations which twitter unfortunate allows you to do. I said thats great, but twitter still those. Twitter can still sell that and monetize that data and this is 1 of 1 of what all these companies you use everyday know about you. So thats a great case for being much more discreet online. Ill speak a little to the institution, i cover the nsa. Its taken a beating over the last year, and morale has dropped tremendously. I know theres, its the temptation to demonize them but i was struck by a post written by geoff stone who is a cardcarrying member of the aclu on their advisory board, and is one of the members of the president S White House advisory surveillance review panel. Same one that said the 215 program was not essential for preventing diversion. He said that over the months that he and other members of the panel spent interviewing Intelligence Community members and giving to know the nsa, he came to the conclusion that the nsa employees, officials were wellintentioned, did not come to work everyday wondering welcome whose privacy cannot violate today . But they had made mistakes. He said he felt they deserved americans respect, but not their trust. He said, we should never ever trust the nsa. Because the distrust is essential to the foundation of democracy and Holding People accountable. I thought that was a very interesting, you know, observation from this member of the panel. I think its worth thinking about in terms of the public, and to really try to understand the issues that are at stake, and not try to personalize or demonize or in cute ill intent to any but to understand where its coming from, what the issues are at stake and to hold them accountable, as accountable as we can. Thats our job. Ashkan . Both of those, to combine them or bring them together, i see essentially kind of three things to consider that kind of we are expensing. One is as i mentioned we leave data exhaust everywhere. Is no practical way to use Technology Today and not leave a digital trail of some sort. Theres obscurity tools you can try but even those are foldable and essentially every interaction you engage in by email, by just carrying a cell phone, by driving a car now or walking industry with cameras leaves some sort of digital trail. Thats one. Number two, we essentially as result of these digital trails and in a network so slightly, collection of the state becomes incredibly cheap. If i wanted to surveil you i would have to allocate men and people to follow you around or to take notes, take photographs of you. Its gotten incredibly cheap because these digital trails exist. When you search on google, when you use twitter, when used services they created, a trail that the nsa or some other government from across the world and also monitor and collect or some company. And three, the thing that ethics is most with regard to nsa, the mandate they have been given is not to reduce terrorist attacks or to kind of keep 9 11 attacks to one in every 10 years. All costs event attacks on u. S. Soil. And so these three factors, affected it is not ever come is incredibly cheap to collect and the mission, once legally prohibited from do best to prevent all attacks but those three things in tandem create an invite or even if you are not that interesting, the likelihood that you might get swept up into some sort of system because of the mandate, because of the cheapness of which can be trusted and because of the prevalence of your data has got up and thats something we have to contend with. The only thing restriction that are legal forces, legal restrictirestricti ons. Thats kind of world we are in now. Its har hard to top all of. That strikes me as bad on. I will say that it struck me throughout this how surprised loss of people were. I was surprised by the detail of it but like google was really surprised and u. S. Senators were really frightened to u. S. Senators on the Intelligence Committee in some cases seemed kind of surprised. It just makes you wonder how its possible in a democracy such as ours, are what we imagine our democracy to be, thats something that surveillance is so sweeping a powerful could grow to become as robust as it clear he has become. Without all sorts of important people doing it and having some sort of say in whether its a good thing or bad thing or what the natural limits of it were. If we had this been a year ago, think about what we knew about what our government was collecting about people all over the world and whether not we were targeted and intentionally all of us. I have to say, i find that a little unnerving asked about how little we knew before that. Whether you think we were right or wrong to publish this particular set of documents, you know, i do sort of feel like it is the inherent function of the democracy to place these issues in the public sphere so as citizens we can wrestle with it and come to some of more enlightened decisions on what the limits are. Maybe people dont want more limits, but i get the sense of people do. Theres no possibility of that if we dont know enough to even imagine where one might draw these lines. It wasnt an accident that we didnt know. And its not, there are no evil motives at all but the were very deliberate effort to mislead us when anybody got any where near the trail. Okay, so the program which collects all the records of all the phone calls that all of you make, thats whats been referred to as section 215. Its a provision of the patriot act. It had been a controversial, not because anybody have any idea about this. People were with the fbi would use to get to Peoples Library records and what books people were checking a. For a long time ago but said even the number of times we use this provision of law is classified and would do grave harm to National Security if we told you how may times we used to. That was the position for several years. Eventually they were mandated by congress to disclose the number of times. Theres nothing to about, section 215, they said they only used it i think they said 29 times. So whats the big deal . We used it 29 times. It turned out in 12 of those times you could get a trillion phone records. So thats not an accident. Thats a deliberate effort to distort a public debate because i think what theyre doing is important to their worried you might ask them to stop so they dont tell you. I have a selfpromotion area. Do you know who wasnt surprised, the security geeks. For a long time warned look, this Technology Makes it possible that these systems are vulnerable, that you can essentially get peoples phone records by hacking into another telco remotely. So they warned a lot of these things and they think given us known was a security guide and he saw quite a bit of these tools and the countryside to highlight them, i think that indicates not just a deliberate misleading, but this technical misleading where a Technical Committee and can use their prowess and understand technology and loopholes and the way the systems work to skirt around Public Perceptions because people dont know. People dont realize. I think thats another gap that needs to be informed. I just want to add to that, there were people who knew. Senate Intelligence Committee, judiciary, house and senate, the fisa court, Justice Department, executive branch agencies. The problem is these committees and the court were all sworn to secrecy. They couldnt disclose anything publicly, so if there oversight conducted entirely in secret, how does that aid public understanding and enable us to hold the government accountable . I think thats the crux in part of this issue, and one that we still have a really good answer for. You create another independent Oversight Board . Is that boards want to secrecy . Whats the point . Clearly this is about so much debate and so much we could talk about summit of areas and recover a lot of graduate this is your chance now, please raise your hand and we have t. People here on each side, who will come with their hands raised. You can stand please. Stand please when you ask a question, and if you have one directed straight for one of the panelists, please ask binding. We also have marty baron here as well. [inaudible] sorry, the mic is not on. Can you hear me now . Go ahead. I actually have three questions. I guess they are all for barton gellman. One is, do you wear a bow to safety because of what you know, either from terrorists because they know you have all this information, or from nsa . Second question is, what do you think should happen to mr. Snowden . And the third one is, do you and reporters at the guardian consult with one another . How do i want to divulge in terms of Security Issues . No, i dont fear for my personal safety. I worry a lot that, i have good evidence that there are actors, usually unknown, were trying to get into my material digitally. I mean, i cannot feel my entire life off of the internet and put something on the network and somebody topic and into. I dont put secret stuff there. But i got a warning from google that a state sponsored hacker was attempted to cover cover mys computer and my account. Google then wont tell you whos doing it on what you can do about how they know. Ive had a number of other fairly specific indicators that people are coming after my stuff. That is different from physical security. You can say you told me so if i disappear one day but im not worrying about that. What should happen to snowden is, im the last person you should ask her type of relationship with him of reporter to source. Im not his judge, and theres a lot more people with a lot more interesting things to say and i have about that. And no, we do not consult with any other news organizations about what to publish when, what to hold back. I have made those decisions independently. That includes not through any third parties, theres no sort of secret counsel. And essentially we are competitors with them. Next. I find that the average person a lot of times gauges what side of the debate there on depending on whether they were supporting bush or obama. You know, its who do you trust to have that information and what theyre going to do with it. And whether they trust them as the deciders or you as the deciders of whats going to be divulged. I think back over, like for instance, the whole debate over torture. And that it was finally disclosed that it really wasnt that effective over the period and im wondering whether ultimately is this nsa gathering of information effective in protecting this country . How they really forwarded thwarted some attacks or plans for that, and how does that way into the decisions that are being made . So what has been the practical benefit of the nsa program for the nsa perspective . Does anybody want to tackle that . We can both talk about it. Certainly theres been a lot of debate about the effectiveness of the two major domestic Surveillance Programs that have been discussed. Section 215 Telephone Records Program and section 702 of the fisa, part of which is called prism which bart wrote about, and the heads of innocent last year on the hill initially came out and said that the programs contributed to awarding over forwarding over 50 attacks, terrorist attacks. And when senators, including ron wyden pushed back on that, eventually he and other intelligence officials clarified okay, well, you know, 702 present was responsible for thwarting most of those, but a lot of them were overseas. Section 215, the telephone Metadata Program which obama says he wants to end, boca collection, was responsible, or wouldve had a role in maybe only 12 of those domestically. And of those, maybe only one in which it actually yielded some information that was useful to a terrorist investigation, and that one case involved a san diego cabdriver convicted of Material Support to terrorism for sending 6500 to someone in somalia, alshabaab, which did not involve an attack on the u. S. At all, the homeland coordinate attacks was ever carried out, which led not only to surveillance review board to conclude that the program was not essential to preventing terrorist attacks, but also the privacy and Civil Liberties Oversight Board to say that had not contributed one case to preventing any terrorist attack on homeland. Just another quick few words. Clearly from time to time the government is going to exaggerate the importance of a program that its trying to defend. On the other hand, having spent lots of time with material and done lots of interviews, how sad would it be if they were spending 109 a year, 3000 people in on some of the greatest talents in the world, mathematical and Computer Science and linguistic and all sorts of other things and accomplished nothing . Thats clearly not the case. They find out a lot of information that is essential to our security. There are a lot of things in the files that i would guess almost all of you, if you knew them, would say wow, i did know they could do that. Glad they did it. That seems like a legitimate operation. And if i publish it you would say, i wished you hadnt done that because now they cant do it anymore. The art Success Stories in the documents. The problem is there exactly the kinds of things the government least wants me to write because they couldnt be replicated afterwards. But the point you made about bush and obama, actually that isnt issue of trust, is snowdens own fundamental point, which is that even if youre prepared to accept that the people who have this enormous power right now are responsible, you also expecting the people and ask people at that will have the same or more power. We have plenty of samples in this country a very serious abuses of a specific kind of power problem. J. Edgar hoover, one of the articles of impeachment against nixon was domestic surveillance, and ive seen documents that have now been declassified at their decades and decades old, experiments, drug experiments to these experience on human subjects, deliberate exposure of American Service people to radiation and stamped highly classified that will specifically said in a this would create problems for us either in law or Public Opinion if people found out we are exposing our soldiers to radiation. You dont want to give the sole power to anyone to decide what we can know. I dont want to leave the miss reputation but section 702 that you may have heard as the wireless wiretapping program that broke in 2005 in the New York Times. But then the subsequent we put under statutes by congress. And that program so has come is considered quite successful and useful. In barts report, one of your documents with someone i think it said it contributes, the bulk of the Presidency Daily brief for a majority of the intelligence that goes into more than any other single source. So it does, there is some utility. One last point on this issue of trust, i think bart is correct in the issue of trust. Future administrations but even the trust with other nationstates are other actors or other kind of those with malicious intent. So in addition to collection, just the mere collection of the data we have learned the nsa, has weakened standards for Computer Security or does not disclose to companies when their systems are vulnerable. So the fact and if they can exploit data center links between google, overseas, means that of the pictures can also do that. The fact that the government has chosen not to disclose that or not to secure those but instead take advantage, collect that data. One of the questions asked is, is it effective . But at what cost . At what cost to our National Security, our infrastructure, our safety. Lets take another question over there. Over here. And dont forget you do have a card we can write a question and we will answer it later online. My question involves, we learned this week that general clapper has issued a new directive that makes it unacceptable for any member of the intelligence establishment to talk to any reporter about anything that is either classified or unclassified, and under pain of being fired or impossible even prosecuted. And my question is, number one, have they learned anything . It seems like all the want to do is make it harder to leak. And number two, does this have a Chilling Effect on your ability to cover the news . Cover this National Security. Anyone, please take it up. When i saw that order i thought come into, really . Trying it again. I mean, we see these periodically, and after this a big story, video leak investigation theres a crackdown, more polygraphs come here proud they will be doing polygraphs unannounced on people and ive had sources tell me they have to report any time they get a call from the press, including me, things like that. I think these things go in ways. It does have a somewhat of a Chilling Effect. It reminds people that theyre being watched. They shouldnt talk to the press but i think ultimately its futile. I may be more concerned about it then you are. I certainly take your points, but heres what the order says. If you were anywhere in any of the 15 intelligence agencies, you may not speak to a member of the press, or buy liquor anyone whose job involves disclosure to the public so that would involve a number of lawyers and so on. About anything related to intelligence, whether or not its classified and that if you do, then you will probably hoosier job and your security clearance. So lots of organizations, eithei think even the Washington Post would frown upon its employees speaking for the company or after disclosing the internals of the company and ice was you could even do it that you get yourself fired. But what the post cant do is a Death Penalty your career to our 4. 1 million jobs in this country that require a classified clearance. Across the government, 4. 1 million. So if you run into me at the promotion ceremony of some general and as a Cocktail Party and we talk about whats happening in crimea these days, purely unclassified conversation, and you dont log that and report it, then you could lose your ability to work anywhere in your chosen field. I think that may end up being a pretty significant deterrent and a real shame because a lot of the context and the richest of the stories that you get from the reporters that you admire, suppose theres any you like reading, that a lot of what they know, a lot of the ability to tell you the story relies on informal nonclassified background conversations about the way things work in the world. And the officials, the savvy ones, understand that and thats why think theyve been rather feel to it is selfdefeating because the smart officials know that the better informed we are as reporters, the better informed our coverage will be. It ultimately rebounds to the data, to their benefit, to give us as much of understanding their perspective on the issues. And that comes through, as bart said, sort of informal context, just relationship of trust built up over the years. You cant do that just by going in the front door every day and requesting an interview through the Public Affairs office, which is staffed by wellmeaning people but they cycle through. People dont often know theres a vast number of conversations behind even one paragraph that not even a quote. Lets take another question. Id like to panel to comment, isnt our Security System fundamentally flawed that someone this young at this low level in the government could release this amount of materials, is a massive amount of materials . Doesnt he mean our secure the system is fundamentally flawed . Id like to panel to comment on that. Ill try to be brief so we can get tw to more questions. For sure it didnt work the way they wanted it to work. You wouldnt want to see sort of an open sale in every secret in government. As i said we dont think everything should be published. There are huge problems and sort of, these are giant institutions. There are tradeoffs. If you batten down the hatches securely that there is next to no possibility of a breach like this, it means that lots of people around the government are not going to no information exists thats vital to their job. At what point did you realize or start to believe this was the story you needed to tell, and at any point did you doubt that belief . Thats a good one for you too, barb. I had lots of doubts. Anybody who tells you that its obvious where to draw the line on what should be published or what shouldnt, i would strongly disagree with. So i worry all the time about where to draw i the line. I dont worry that ive made a mistake or the post has made a mistake by deciding to put resources and attention and time and space into this subject. I dont worry at all that we shouldnt have touched the story at all. I thought from the beginning that it was going to be very significant and important and also really, really hard to really, really hard. [inaudible conversations] yes. I commend you very much for your work in dealing with the difficult question of where someone has provided you with unauthorized information and youve done a marvelous job in responding to that. My concern is with a different situation where citizens who have lawfully attempted to call attention to major issues are not getting attention by the press. I refer specifically to the fact that in 1992 congress unanimously passed a law requiring the disclosure of Jfk Assassination records. Thousands of pages of Jfk Assassination records still remain withheld by the National Archives acting at the behest of cia. Does it require an Edward Snowden to get public attention focused on the release of those records . I add that in 19 in 2013 i on behalf of a number of prominent citizens including the former chief counsel of the House Select Committee on asaws nations assassinations wrote a letter to the Washington Post about this. The letter was not even acknowledged. Sir, were going to try to keep this pretty focused on the nsa project that our panel worked on. So do you have a question specifically related to this . [inaudible] does it take an Edward Snowden to get this stuff out . Im sorry, its not a subject i have any expertise on. Im going to take a question from the middle. I think you guys are getting neglected over here. Right here. Oh, no, im sorry. Right here. We get a mic into the center aisle, please . Weve got somebody who stood up. Okay. If you could expand a bit on your publish or not publish decisions, particularly focusing on the issue of revealing sources and methods. I looked at that cartoon of muscular, and it seemed to me as though that drove right to the focus of revealing sources and methods. So im curious about your decision process. Yeah. Thats a, its a plausible surmise to make from looking at the cloud or at the drawing for a layperson. But respectfully, sir, nobody who is involved in intelligence gathering or Telecommunications Networking would think that that drawing itself or the idea that there are places on the internet that are encrypted and places where its not, no one would think that thats revealing anything to an enemy that the enemy doesnt know. I mean, anybody who works in that field, thats fairly elementary. The clue was toward what they were doing, and there are lots of things that i actually thought were highly sensitive because im a layperson too, and i would hook at that and say, well look at that and say, well, i had no idea that was possible. And i realized as we proceeded through. And in consultation with the government that its not actually very sensitive at all. And then there would occasionally be things where it didnt strike me at all that they would be worried about, and then they would explain to me why. So sources and methods, look, the reason we withheld an elementary fact from our last story on the, on the fsas nsas ability and practice of recording every single call in an entire country is not just to avoid alerting the country about being a target, but it had to do with specific operational surmises that might be made by others if they knew which country it was. And i cant actually get into even most of the reasons. But we were very concerned to avoid blowing a capability. I mean, there are certain what were trying to do is enable a debate, not cause a result. And there are certainties closures that are certain disclosures that are selfexcalling. I would executing. I would strongly defend weve never done it, and the government doesnt claim we have. And just to add on the Google Data Center coverage, the nsa can still under 702 get information about individualized targets or, you know, broader than individualized selectors from google legally through prism through their 702 program. So the, that capability on googles infrastructure still exists to collect data. You know, we described a program where it seemed like they were going after the same piece of data through multiple means, some more legal. I have a question right there. Um, id like to i mean, a lot of things, you know, that would have been revealed in this discussion as well as through the revelations of snowden throughout the year have shown that, i mean, these programs have been defended by the executive office all the way down throughout the brass. At the same time, it was brought up that nixon was impeached, you know, for an infraction which was relatively much more minor in comparison. And yet at the same time, you know, there has been no discussion within, you know, the mass media, within the political establishment to even, you know, hint at the level of criminality which, you know, a former president was removed from office for, yet it is currently going on within our society. And, you know, at the same time its asserted that we have, you know, a democracy, a democratic process occurring. I just wanted to know if any of you wanted to comment on that. Well, since im the one who mentioned nixon, i want to clarify i did not say and do not believe that a what nixon did was trivial in comparison to whats happening now. What nixon did, the article of impeachment said was that he used National Security surveillance tools to spy on and crush enemies. There is absolutely no evidence of that happening now. Belief me, if believe me, if i saw that, that would be the first story i would be trying to get at. [laughter] unless maybe it was about spying on journalists. So the issue here is not that we have big brother in that abusive sense, its not the as the city which is trying to control, suppress dissent. And yet it is a set of powers that exceed anything that orwell could have imagined. And so you have to worry about, you know, what might become of that. And im not going to be commenting, i dont think any of us are, about whether so and so broke the law or ought to be prosecuted. Thats just not our job. We had a question right here. Thank you very much. For the work that you have done. Im daily amazed, my wife and i are just so pleased at what youre letting us know. Im a retired radio journalist from maryland. I interviewed sixth district congressman Roscoe Bartlett hes retired since about his repeated volts against the patriot votes against the patriot act. And he said the thing that trumped it for him was once you let the government into your house, youll never get them out. Is there any hope that we could turn the clock back and have them not spying on us . I dont know what the outcomes going to be, but i think that its not, its not that be some embarrassing newspaper stories and then theyll change their minds. Thats not the way our whole setup works. I mean, were supposed to belief in checks and balances in terms of market capitalism and in searches of self terms of selfgovernance. What transparency has done is enabled people to do something. So silicon valley, which, by the way, makes a lot of political contributions and has a fair amount of sway both within the executive branch and in Congress Just in terms of its and has the ability, as weve discussed, to make changes that thwart some of the programs if they think theyre illegitimate, the transparency has caused many of those Big Companies to change their policies. As well as their technologies. It has created an environment in which there are all these privacy startups so that you might actually be able to buy email and not pay for it by having them sell your data. It has enabled lawsuits to proceed that were getting thrown out of court before because the plaintiff lacked standing, couldnt prove they were affected. Now they can prove theyre affected. Now for the first time federal courts can decide what the constitutional lines are, proof that congressional oversight was dysfunctional before consists of the fact that the same congress is now proposing and voting for completely different measures in the light of the Public Disclosures than it was proposing and passing before we knew what was happening. And down the list. I mean, we have lots of checks and balances that arent the ones you learned in civics class, and theyre all operating now because of the information. Somebodys been patiently waiting back there. Thank you. In december, in hes der spiegel reported that the nsa intercepts amazon packages and sells spyware on laptops. Do you think the story strays too close to the line of revealing nsa techniques . Did you hold back on the story or would you have . I havent commented op other peoples on other peoples journalism because i think im not the right person for that. I cant play press critic on a story that im covering. Ill distinguish that story from the things weve been focusing on. First of all, if youre intercepting a particular package, its not that theyre intercepting all the shipments of all the computers, right . Theyre not planting chips on every time you order an update. So those are, by definition, targeted operations. Generally speaking, we have not been writing about targeted operations. And certainly not we dont want to reveal either the method theyve using or the identity of the target. In other cases, and this is not our story, others have written about ways that the nsa has undermined encryption standards, for example. I hi those are harder calls i think those are harder calls, but i see a strong case to be made for publishing those. Go back to world war ii. Japanese used i think i wont mix this up. Japanese had a secret code they used called purple, and the germans had, was that ultra . But they were home grown. They were used exclusively by the military commands of those enemy countries with whom the United States government was at war. Now almost everybody uses the same encryption. Good guys, bad guys, you know, my health records, my bank accounts, terrorists, foreign governments use the same thing. If they make your job easier to listen in on your targets by undermining the encryption that all of us use, that raises some pretty big Public Policy questions even if you can legitimately say you are revealing a technique that theyre using. Youre revealing it in order to say is that a good idea. And by the way, revealing it doesnt stop them from doing it again because its just a matter of technical competence. We have a question on this side of the room. Right . Or no. Here. Hi. Does nsa now know aside from whats been revealed in your stories what snowden took . I cant know that for sure. It appears from the the variety of interviews theyve done, very recent ones, that theyre not sure. I think that they have a very strong picture by now of what he had access to, what he could have touched or did touch. I dont think that they know with any confidence what he actually took. If they have claimed that he, at some points that he took 1. 7 million documents. If thats the case, and i do not know, that is a much larger number than anything he gave any combination of journalists. We have a question up here in the front. Thank you for taking my question. So youve talked a lot about how much youve sort of selfcensored, you know . We call it editing, not censor. [laughter] censorship for the good, lets say. So youre going to write a story about this aspect of what you know, but youre not going to reveal every aspect of that story. And i get the sense that, like, there are things that youve got documents from snowden, and youre just not going to touch at all. Youre just not going to write a story about that at all. So its commendable that you selfedited, you said. He didnt, obviously. He may not have sent you 1. 7 million documents, but i get a sense he sent you quite a lot. Certainly more than youre going to publish. What is your view of the fact that he did it, that and not just because legally he should have, actually, sent you nothing, but he felt that there was a Public Interest in you covering some of that stuff, he sent you clearly more than he should have. Trusting that you and your colleagues at the post, and we know its a big team, and at the other news outlets, guardian, etc. , the this you were all that you were all going to be very careful, have good judgment, not get hacked, not put this stuff on the network, not talk to their girlfriend, etc. , etc. , etc. Okay, so im not his lawyer, adviser, spokesman. Ill just speak to the factual parts here. He did give me and others, two others, a lot more than he actually believed should be published. If he wanted it tock public to be public, hes pretty good at computers, he could put it up on the web. He could put it up in ways that could not be taken down around the world and so on. He doesnt want that. It is not uncommon, actually whats unique, which i think never has happened before, that someone would turn over this many secrets on the scale of this sensitivity. But it has been routine in my reporting career for people to tell me things that they did not want me to publish and that they that i wouldnt publish for the purpose of enabling me to understand the stuff i was going to publish. Suppose this prism document, right . This is the program under which the u. S. Government gets information directly from nine u. S. Companies, big Technology Companies like facebook, google, yahoo and so on. He knew that i would have to read that whole thing in context, that examples would help me be able to understand what was happening and, crucially, what was not happening. So sometimes people tell me things off the record for the purpose of making sure i dont write something thats wrong rather than for letting me put something in thats right. And he also knew that i would be deeply suspicious if he gave me a document that had all kinds of scissors marks and blackedout parts. What youre not telling me, does that undermine the basis of the story . There are lots of reasons why people tell you more than what they want you to publish. Except the government. Is it a black mark. Yeah. Question back there. A question about the journalistic approach to this and the philosophy that you have here. Youve been criticized in some places, there was a piece in the new republic saying that this is not deserved, that, you know, you were a passthrough thats a former Washington Post employee. I read that one. A source for an agenda as though there are other kinds of sources. That, you know, if you could speak and say a word about that. But i also want you to know that i have an understanding that thats not what occurred, because when you discussed the muscular slide and the work that went into it, the five to six weeks of just trying to figure out, okay, what is this, clearly that is reporting that had to occur that as opposed to the Wikileaks Dump you had to bring expertise to bear to figure out and analyze what was going on. And secondly, if you can also say a word about the traditional journalistic approach that youve adopted to not advocate for a result, to say that, you know, i am a reporter with, you know, the voice from nowhere as its sometimes called. Im here to start the debate, not to advocate on behalf of Edward Snowden. Are you limited by that in some ways . Thank you. Okay. You guys should really pitch in here anywhere you want to. Agenda, advocacy. First of all, i dont care what my sources motive is. What i care about is understanding the sources motive, because i want to triangulate. I want to verify, authenticate, find context. Lots of times, i mean, if i know someone is telling me something because they hate their boss and theyre trying to embarrass him, that doesnt decide whether or not i put it in the paper. I want to get the truth of it, and then i want to talk to the whos, and i want to to the boss. And actually it turns out hes got his hand in the cookie jar, whatever it is. I want to know what motive he or she has so that i can cure it in terms of understanding the full context of the story. But many, many great, important stories that whatever your values are that you would think should have been published have come from scurrilous people with scurrilous motives. And as far as whether withholding my own advocacy or my own point of view arms the journalism, i think putting it out there, putting out i mean, where i dont have a view from nowhere, and this is the idea that reporters in the traditional way just do a he said she said, and they dont try to, you know, to try to, i dont know, referee that, thats not at all what were doing when it comes to facts. Were not saying, you know, joe says its white, and jean says its black. I mean, were trying to find out and say what it is. Im not trying to say what you should think of to it. Right. If i could just add to the point on the reporting and dumping documents, you know, so a lot ive had a number of journalist friends approach me and tell me theyre desperately trying to, you know, contact snowden and get copies of the documents, and they feel like theyre, you know, this this hue thing that this is this huge thing that landed and they want a piece of. And its true theres a lot of insights in the documents. Youd be mistaken to think, you know, with the exception of one or two of the early stories like the verizon order where it was clearly, the order itself was in plain english readable and clearly a story, but the reporting is much more like, you know, like wheel of fortune where you have, you know, three letters and a clue. Its about the nsa, and you have to guess the word or the phrase, right . And a lot of it involves, like, piecing together little bits and pieces, and you get a thread of a, you know, kind of a program name that you suspect is somewhere near the u. S. , and you want to kind of link it. And it involves a lot of kind of weeks of work. If youve noticed the time it takes each subsequent story has been kind of slow, slightly growing because the teacher, harder story deeper, harder stories are basically harder to piece together. While snowden did collect quite a lot of documents, it wasnt the case that its a comprehensive map with, you know, index and syllabus and, like, dictionary. It takes quite a lot of reporting, and this is where, you know, the other journalists have come in and really kind of colored and provided context and done sourcing and gotten kind of sources on the record to help fill in all of those missing letters. We have time for about two more questions. One right here. Thank you. I have a question. Ive read virtually every single article that the post wrote on nsa. And what i found out is that it was all onesided against the nsa. My question is why didnt you do it fair and say lets look at the other side . Namely, the threat and how bad is the threat and how hard did nsa work to prevent this threat . Well, we do have an nsa relater here whos covered the nsa quite a bit. Ellen, would you like to talk about that . Well, i think in terms of the stories i did which have tried to get at the policy debates of, you know, i think i tried to be, i was fair, tried to be fair, strived to be fair and honest about what were hearing and reporting. You know, there has been and its a legitimate debate to have as to whether just having this discussion about prism, about section 215 program, encryption methods, cyber offense, whether that in itself harms National Security. The extent to which it does, you know, i think is difficult to discern. I would just, this is an extraordinary volume of reporting by us and everyone else on threat material. North korea missile launches and Nuclear Weapons development and terrorist plots and, i mean, theres a huge volume of that and has been at an accelerated pace since 9 11. But, you know, dating from the cold war. It has dominated coverage of National Security parties. And what of, you know, the biggest part of the word news is new, and what is new is a lot of inside material about the u. S. Response, about u. S. Surveillance, about the nsa that we didnt know before. So what im doing now is certainly focusing on that. But if you look at the whole package of reporting in the Washington Post and dont think youre seeing threat information about Dangerous Things happening in the world, then, you know, id be happy to direct you to several articles a day. Last one. We have time for one more question. Take one right here. This man. Quite patient. Thank you. I think the key is to whether or not you have warrants. I dont see any reason or any benefit for having a priority of gathering of data. I understand and believe that you can get information by analyzing data, but i dont see why you have to do it without a warrant. So thats really one question. The other question is who in the government has been held accountable . One of your panelists had made a comment about keeping people accountable. Id like to know who was accountable, has been held accountable. First of all, to your question about warrants, you know, that is one of the big points of contention and has been through the focus of lawsuits, constitutional, about the constitutional the city of some of these programs constitutionality of some of these programs. The government believes that when youre collecting socalled metadata, the phone numbers or the call durations and call times but not the actual content of the conversation, then taking that, collecting that does not require a warrant because it is not seen as sensitive as actually hearing the words of a conversation. We have done reporting as well about how, you know, just collecting that sort of metadata can, you know, in large quantities can have the potential to disclose all sorts of things about who we are as people, our habits, where we, you know, where we shop, what our religion is, what our preferences are and who we might visit at night when our spouses dont know. Anyway [laughter] those are, you know, that is one reason why some people feel that metadata is actually deserves more protection than just, you know, certainly shouldnt just be collected on a vast scale as a way government had been doing without a warrant. Holding accountable the administration has said repeatedly that it has not found, you know, any willful abuse of the authorities by the Intelligence Community, by the nsa. That when theyve made mistakes, and they have made mistakes, and when there have been compliance violations, and there have been serious ones, those have been reported and corrected. And that in one level of accountability, i guess with, the question is how accountable are they to the public for just the overall of just, you know, the balancing of the intrusiveness versus the benefit to National Security, that level of transparency has, so key to accountability, and we havent had that. Were only starting to see a little bit of it now which has led to efforts by the administration to rein in a little. Besides obama saying he wants to end bulk collection, hes also talking about, hes ordered that there be Public Advocates now before the Foreign Intelligence Surveillance Court which traditionally hears only from the government on surveillance issues. He wants to have advocates to give sort of the Public Interest side of surveillance issues. Hes ordered that there be stronger privacy protections more foreigners whose data is incidentally collected and that collection on dozens of heads of state be halted. A lot of that was in reaction to some of these stories about, you know, eavesdropping on angela merkel. So thats, you know, some measure of accountability i guess you could say. But, you know, it certainly doesnt go as far as some would like, some reformers who want to see not just an end to the nsas collection of phone metadata, but an end to all bulk collection by the Intelligence Community. Theyd like to see a warrant requirement for searches of Americans Communications in the program called prism. Theyd like to see greater disclose enough of disclosure of what the other bulk collections are and Greater Transparency around the overseas collection which were only now starting to learn a little bit more about. Clearly, we could continue talking for a long time. There seems to be still many questions, and you can fill out those cards, again, with a question. We will answer those online after this event. I really would hope that you all continue to talk about this issue and, please, join me in thanking bart gellman, ellen nakashima, Ashkan Soltani and greg timberg for really letting us walk through and also to marty baron who is a huge supporter of what was an enormous, difficult, hard and you saw the nuts and bolts of how difficult this reporting was over the last year and letting barton

© 2024 Vimarsana

vimarsana.com © 2020. All Rights Reserved.