Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Soltan: (NSA) actually been able to capture the data without going to the companies or without the company's involvement. By possibly through the company's negligence,, but in fact the truth of the matter is rather than having to go knock on a door with a legal requirement, they can just collect it themselves. And in fact they are over-collecting. Chen: how much? Soltan: So we’re told they are collecting on any given day somewhere around 440,000 email addresses from yahoo... Chen: 440,000 a day? Soltan: address books a day. Somewhere in the 700,000 a day address books from various big four web mail providers.
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Soltan: What’s not clear is what the minimization guidance is or what the target guidance is. We know from other leaked documents that for example minimization guidance or targeting guidance on the 702 precedent is that you can effectively - it's not a precedent, the 702 guidelines allow you to collect information on anyone who is corresponding or has in their address book a foreign intelligence suspect. So what happens here, it's not clear what information they are collecting, but -- Chen: or why
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Soltan: The other thing to realize is the distributive nature of these web mail providers are not restricted to geography. So when you’re interacting with google from New York, it's not necessarily the case that the servers you are talking to will be located in the U.S. oftentimes communications are distributed, they are in the cloud.
Ashkan Soltani
Washington Post contributor, Independent researcher and consultant focused on privacy, security, and behavioral economics
ALJAZAM 10/16/2013
Chen: weed this out, it's splitting hairs. Is it really that difficult, would it be that difficult for them to isolate just the information that they need? Soltan: Not the way they are collecting it. They are connecting it from the backbone of the internet. They collect it as the data goes by rather than data at rest. As data goes by through these pipes, through what are known as SIGADs, these links between the internet of various countries. They are able to collect this data and record it and access it.
Showing 1 through 4 of 4
Page 1