Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Barton Gellman
Journalist, contributing to the Washington Post
MSNBCW 08/30/2013
Gellman: continued: say, You're not our friend anymore, then they'll have less visibility and less influence there. But if they say out loud in Congressional testimony that we're very worried about Pakistani nukes, that we're worried about the fact they seem to have a program of -- sort of a systematic program of nonjudicial killings and so on, Congress is going to cut off the funds. So what you have here
Barton Gellman
Journalist, contributing to the Washington Post
MSNBCW 08/30/2013
Gellman continued: is a disparity between what they really believe and what they say. This is exactly what the transparency at a higher level into the budget allows there to be a public debate. Is their strategy right of knowing there are big problems but still saying, yes, we want to keep paying them? You know, 20 some billion dollars we've paid in the last 12 years.
Barton Gellman
Journalist, contributing to the Washington Post
CSPAN 08/31/2013
Echevarria: what is known as the Black Budget for intelligence and spy agencies, this information was provided to them by Edward Snowden. They have a follow up story in this morning’s paper looking at the cyberspace war saying U.S. intelligence services carried out 231 offensive cyber- operations in 2011, the leading edge of a clandestine campaign that embraces the internet as a theater of spying, sabotage and war, according to top-secret documents obtained by The Washington Post. That disclosure, in a classified intelligence budget provided by NSA leaker Edward Snowden, provides new evidence that the Obama administration's
Barton Gellman
Journalist, contributing to the Washington Post
CSPAN 08/31/2013
Echevarria continued: growing ranks of cyber warriors infiltrate and disrupt foreign computer networks. The scope and scale of offensive operations represented an evolution in policy, which in the past sought to preserve an international norm against acts of aggression in cyberspace, in part because U.S. economic and military power depend so heavily on computers. Quote, “The policy debate has moved so that offensive options are now more prominent,” said former deputy defense secretary William J. Lynn III, who has not seen the budget document and was speaking generally. “I think there’s more of a case made now that offensive cyberoperations can be an important element in deterring certain adversaries.”
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Gellman: Yesterday General Alexander, the head of the N.S.A., denied that the N.S.A. is tapping into the servers or databases or data centers of Google and Yahoo! That's not what we said. What we said is they're tapping into the traffic that's between data center here and the data center there. So they're capturing the data as it moves across the net, not in storage where it's at rest.
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Gellman: they're using a -- what they call a signal intelligence address or activity designator which just means a place and program from which they're tapping the data. we don't know where it is. we don't know exactly how it is. The evidence we have-- besides them saying so in their own documents that they're doing it, is that they are seeing things that don't exist on the public internet. That exist only in the cloud that belongs to Google or belong to Yahoo!
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Gellman: Their internal systems don't ever touch the public internet. They have private fiber optic cable, private systems that transmit the data back and forth. They're seeing things in special formats that are used by Google and Yahoo! to move their own data that they couldn't see anywhere else.
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Gellman: If you want to tap into communications from a place inside the united states on u.s. territory you have to have -- you have to do it under either FISA authority or what's called transit authority, but in general you can't just bulk collect information that would reside in a database of yahoo! or google. if you're doing it from overseas different rules apply. You're not relying on statutory authority. you're not relying on the FISA court. Instead you're relying solely on presidential authority under executive order 12333 and there the rules are a little bit different and when you're tapping into a foreign access point you're allowed to presume legally through the N.S.A. that the people using that foreign access point are foreigners.
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Ifill: What you're saying is that they did is not illegal because it involved international networks? Gellman: well, it's a rough analogy but if your -- your accountant would say you're allowed to avoid taxes not evade them. So they're taking full advantage of the rules as they interpret them. There are some outside surveillance lawyers who say it may raise some interesting questions about lawfulness but on its face I don't see any evidence they're flouting the law. They're using it in ways that the companies and public did not expect.
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Gellman: We've changed the law after 9/11 to say just that it's okay to –it's okay to collect information from U.S. facilities because lots of foreign traffic passes through there. We have not added restrictions because a lot of Americans' traffic passes through foreign switches. We now have this global internet and so you can be sitting in Boise and log on to your Yahoo! account or your Google account and you're actually talking to a server in Finland which is getting information from a data center in south America. So the information in your account is being synchronized across the data centers so as it moves across you can have five years of e-mails packaged up moving across the wire and this program will intercept it. Whether they keep it and under what circumstances, all those rules are classified.
Showing 11 through 20 of 33
Page 1 2 3 4