Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: Same thing with overseas. Mass surveillance did not stop the London bombings. It did not stop the Madrid bombings. Mass surveillance has no proven track record. It should not be part of the policy, it should not be pursued. It should not be funded, because it takes resources away from things, method and mechanisms of investigation that we know work and that we know are effective. This is a very timely analog to the torture case. We know that rapport building interrogations work. We know that we becoming friends with these people and saying the interrogator is your advocate against your captors works. And all the intelligence that we got from the program that was beneficial was gained before we applied torture techniques, and yet we did not end it anyway. We funded it to the tune of millions of dollars. All of these individuals and all of these officials have never been held to account for what are unambiguous war crimes.
Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: The first thing that I would say is Google actually needs to stand in solidarity with the competitor here. And they need to get on the same page as Apple and say were going to encrypt –Now I believe the reason they have not done this so far although they don’t want to talk about it so far is probably because the benchmarks that have been done on their phones that have --encryption enabled, shows there is a pretty significant performance impact because they have some kind of driver problem, or – hardware--, whatever.
Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: Someone said previously it was not going to be about compelled disclosure, it is to be about remote exploitation using actual of flaws in websites, in devices. For judges to say, I think, this is the is >> and we are going around this is welcome for the government to say in this particular case we will authorize you to commit the criminal act hacking into this device for the purposes of a limited investigation, which is analogous to the way they tell police we will grant you a warrant to do a sneak and peek on this house or to kick in the door and search it. I think that is the biggest thing.
Edward Snowden
whistleblower
CSPAN 12/12/2014
➢ Snowden: Someone said previously was it’s not going to be about compelled disclosure, it’s going to be about using exploitation using actual, remote exploitation, basically flaws in services, flaws in websites, flaws in devices. For judges to say, I think, I suspect that this is the direction we are going, there will be debate around this as well. For the government to say in this particular case we will authorize you to commit the criminal act, hacking into this device for the purposes of a limited investigation, which is analogous to the way they tell police we will grant you a warrant to do a sneak and peek on this house or to kick in the door and search it. I think that is the biggest thing.
Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: Beyond that we need end to end encryption that Google is well on it’s way to do it, but many of us on the internet need to do it. They need to commit to guaranteeing they will protect the certificates that protect sort of their, these sort of end to end communications. Eric Schmidt made a reference to sort of 28 bit encryption certificates. And this is for the HTTX a little lock icon you’ve seen-- If the government or any government or any criminal group or adversary can gain access to this certificate, suddenly that encryption is meaningless. I think if you commit that, to saying alright we’ll make best efforts to protect this within our network, to make sure it’s not hacked, but they also need to say if we receive a secret order from any government, any jurisdiction, we will fight this publicly to the highest court of appeals to prevent that. I think those are the obvious best step with relatively less effort.
Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: (Section 309) Some could read, to be providing sort of a legislative halo, sort of a congressional recognition of EO 12333. That is an authority that only exists on an old piece of paper signed by a couple of Presidents. It basically says you can do whatever you want overseas. Don’t sweat it. If it’s not happening over there, it’s fine to do whatever you want. The problem with that authority is that it actually collects Americans' communications as well, because of the global internet of course. Our own communications go to, for example, Google’s data centers, mentioned earlier, that are outside our borders and then they bounce back and come to us. So the NSA has in the past used this authority to sort of do an end run around congress and collect information about Americans, although they’ll say it was not targeted, of course, that not need to be reported, because EO 12333 is not required, there’s no congressional reporting requirements on how it’s applied -- because it is not provided through legislature.
Edward Snowden
whistleblower
CSPAN 12/12/2014
Snowden: But we do have, again, Mr. Litt, from the DNI who has said on the record, and I hope everybody makes a historical footnote of this, that there was no legislative intent in providing that kind of halo. So if we’re to have any faith in our institutions, we have to assume that this will be accepted and that his statements can be accepted and -- relied upon. If that’s the case then let’s go with that. Maybe it just does restrict the activities but not authorize them.
bad 0