Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander (answering Sen. Flake 5 yr. data scrubbed?): For NSA, it depends on the type of data. So in the metadata repository for 215, as you stated, aged off after five years by court direction. If there's a report, that, of course, would not be aged off that report will stand just like other intelligence activities.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander (answering Sen. Flake 5 yr. data scrubbed?): Within the Executive Order, 12333 metadata repositories, it depends on the size of the repository and the type of data that’s being done. But generally speaking it's five years. There may be pieces of information that we retain longer that are intelligence value overseas that is different than the ones we have in the United States. But that's all that NSA has in those areas.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander (answering Sen. Flake metadata kept more than 5 years?) : From my perspective. Those would be with other agencies. Clapper: (Overseas) Alexander: The overseas is the one I explained. So, does that make sense? Flake: OK Alexander: So I don’t have any other telephone. There was an old program that we talked about. You know, that was stopped a few years back and all that data was destroyed. That was on email. So we don’t have any. Flake: There’s no more programs that I know of, you would know of them. Alexander: Hopefully, so. Especially after the last three and a half months.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander: bulk records that we would need, like the phone. I do think as we look at the phone data we’re going to have to look at how that changes as we bring mobility in. And that has been the question of it. So we released to the intell committees toda,y clarifications so they understood the difference on locational data and those requirements. I do think that right now we’re going to have to evolve as the threat evolves but I cannot think of any. That was a long winded, I can’t think of any. i apologize.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander: As NSA previously reported to the Senate House intelligence oversight Committees, NSA does not collect locational information under section 215 of the Patriot Act. In 2010 and 2011 NSA received samples in order to test the ability of it’s systems to handle the data format but that data was not used for any other purposes and was never available for intelligence analysis purposes. In a 25 June 2013 closed hearing with the Senate Select Committee on Intelligence, NSA promised to notify the Congress before any locational data was collected
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander: In the Foreign Intelligence Surveillance Court’s most recent opinion, I think it’s called footnote number 5 on the program, the government would also be required to seek the Court’s approval of the production of locational data before acquiring it, under this program. I would just say that this may be something that is a future requirement for the country but it is not right now because when we identify a number we can give it to the FBI. When they get their probable cause then they can get the locational data that they need. And that’s the reason we stopped in 2011.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander: I apologize I’m not familiar, Senator, with CFPB. Cruz: consumer financial protection bureau. (Does NSA have access to CFPB?) Alexander: not that I know of, Senator, no. In fact, if we, to be clear, if we have to go after any U.S. person, it would almost always be an FBI, not an NSA lead. Has to have a probable cause warrant and you would have to go to the probable cause whether it’s under a regular court or the FISA court depending on the type of action . Cruz: And is that answer the same for voice mail content and text messages? Alexander: Voice mail, all content, any targeting of a U.S. person would have to be done that way
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Hirono: General Alexander, is PRISM the only intelligence program NSA runs under section under FISA section 702? Alexander: Well PRISM was the, well yes, essentially the only program that you know was PRISM under 702 which operates under that authority for the court, but we also have programs under 703, 704 and 705.
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN2 10/02/2013
Alexander: There are cases where the FBI might start a terrorist threat in the United States. If there's a terrorist threat in the United States and they get a warrant to go after that or a FISA then we can use (spicma?) to go after that. we can use this to look at hostages overseas U.S. hostages. We can look at this to track industries because U.S. companies are considered U.S. persons under this law that are the targets of terrorist communications. What we aren’t doing we’re not creating social networks on our families. We aren’t doing that and the insinuation that we’re doing that is flat wrong. I take exception to that.
Patrick Leahy
U.S. Senator (D- Vermont), Judiciary Committee Chairman
CSPAN2 10/02/2013
Leahy: Is what you're doing being reviewed by the FISA court? Alexander: Not in all cases. Some of these cases that deal with Executive order 12333 that fall under the business records 215, 3 &4 would be. These would not be reviewed but they are reviewed by the administration and audited by our people. Leahy: My time is up. You have raised well – Other Senator: one of the problems we have is this -- with this program is there is not enough transparency. Leahy: Thank you. I worry. You say it's executive authority not FISA court authority. Does anybody have oversight of other than the executive branch? congress too.>> Has this been reported to the congress either the Intelligence (committee's? )
Showing 31 through 40 of 61
Page 1 2 3 4 5 6 7