Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Gwen Ifill
Co-Anchor and Managing Editor, PBS NewsHour
KQED 10/21/2013
Ifill: The French government called on the American Ambassador today to explain the latest revelation involving the U.S. National Security Agency. The French newspaper
Gwen Ifill
Co-Anchor and Managing Editor, PBS NewsHour
KQED 10/31/2013
Ifill: U.S. intelligence agencies have gained access to hundreds of millions of Google and Yahoo user accounts by secretly tapping into company data centers. Late today, six top tech companies-- Yahoo, Google, AOL Apple, Microsoft and Facebook-- sent a letter to Congress, calling for enhanced privacy protections. Barton Gellman broke the story for
Barton Gellman
Journalist, contributing to the Washington Post
KQED 10/31/2013
Ifill: What you're saying is that they did is not illegal because it involved international networks? Gellman: well, it's a rough analogy but if your -- your accountant would say you're allowed to avoid taxes not evade them. So they're taking full advantage of the rules as they interpret them. There are some outside surveillance lawyers who say it may raise some interesting questions about lawfulness but on its face I don't see any evidence they're flouting the law. They're using it in ways that the companies and public did not expect.
Gwen Ifill
Co-Anchor and Managing Editor, PBS NewsHour
KQED 01/15/2014
Ifill: Since at least 2008, the national security agency has been using secret technology to hack into and take control of computers not connected to the internet. These revelations come from the trove of documents leaked by former N.S.A contractor Edward Snowden. Late today the N.S.A said in a statement, “continuous and selective publication of specified techniques and tools used by the NSA to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies”
David Sanger
New York Times, Chief Washington Correspondent
KQED 01/15/2014
Sanger: and so this technology puts a small radio transmitter into say a thumb drive or sometimes even into a circuit board in the compute that can broadcast back to a facility called a night stand. It's basically the size of a briefcase that would pick up the data and also allow the NSA to insert malware as they did in the Iranian case. Ifill: Physically insert, presumably in the production process or at some point like that.
David Sanger
New York Times, Chief Washington Correspondent
KQED 01/15/2014
Sanger: In the production process or maybe in the shipping process or you know, a scientist is at a trade show or a scientific conference and gets a thumb drive or there is a maintenance person who comes in. And in the course of my reporting on Olympic games, the program against Iran, it was clear that some device like this had been used back and forth. We withheld a few of the details at that time at the government's request but then the papers came out and Der Spiegel published some of the details of this several weeks ago. Ifill: In fact Der Spiegel published an actual catalog of these kinds of devices.
Col. Cedric Leighton (Ret.)
Former air force intelligence officer and deputy training director for the NSA
KQED 01/15/2014
Leighton: For the most part it is simple surveillance, but it can also be used in, as a means, as a precursor really to an attack. So for example, if the United States decides to go into what is known as computer network attack, then they could use the information that is gleaned through technologies like this to serve as the pathway in order to conduct an attack of that type. So that's what they're doing. They're looking at, they're recoinoutering the network, they’re doing a reconnaissance mission and then if they need to attack for whatever policy reason then they can do so based on the information they gain from techniques like this.
Col. Cedric Leighton (Ret.)
Former air force intelligence officer and deputy training director for the NSA
KQED 01/15/2014
Ifill: Are techniques like this only limited to potential warfare or are they limited to keeping an eye on foreign governments or is it also applicable domestically? Leighton: It is, technically it would be applicable domstically, but policy wise and from a legal standpoint it is not used domestically. These techniques are only used for foreign intelligence purposes. Now, at least by the NSA. Now when it comes to the targets itself, that is based on intelligence priorities and those intelligence priorities are decided not only by the Director of National Intelligence but also in the White House by the President.
Gwen Ifill
Co-Anchor and Managing Editor, PBS NewsHour
KQED 05/13/2014
Ifill: Europe's highest court has issued a ruling that could shake up the search-engine industry. The court said that in some cases, Google must remove personal information from search results linked to someone's name, if the person requests it. A Spanish man had found his name still linked to debts from 1998. One of the judges said privacy is paramount. Judge da Cruz Vilaça: ( translated ): as the data subject may, in the light of his fundamental rights request that the information in question no longer be made available to the general public. It should be held that those rights override, as a rule, not only the economic interest of the operator of the search engine but also the interest of the general public in finding that information. Ifill: The ruling is not subject to appeal. In the U.S., some limited search deletions are already required, especially regarding crimes by minors. But it's up to the site that published the information, not the search engine, to remove the link.
Gwen Ifill
Co-Anchor and Managing Editor, PBS NewsHour
KQED 06/02/2014
Ifill: The government may be able to force a
Showing 1 through 10 of 10
Page 1 2