Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using Internet Archive TV News service.

Speakers

Mike Rogers
Representative (R-Mich.), Chair, House Select Committee on Intelligence,
KNTV 07/28/2013
And that tells me this is one program that works to protect your privacy and live up to our constitutional obligation in Congress that says we must provide for the general defense of the United States. We have found how to do this and protect your privacy. Remember most people think these phone calls are recorded. They're not. Most people think their names are associated with these phone numbers. They're not. It's just a whole list of phone numbers with no names and no addresses.
Mike Rogers
Representative (R-Mich.), Chair, House Select Committee on Intelligence,
KNTV 07/28/2013
no names and no addresses. When a terrorist number, just a terrorist number is found, they plug it in to these numbers and it pops up with somebody they may be talking to in the United States. Again no name and no address. What we do with that is say, Oop, that's bad we're going to give this to the FBI to determine who that person even is. And so that's the way we protected privacy and that’s why there's been zero privacy violations with this, and it's been able to used to stop 54 violent terrorist attacks.
Mark Udall
Senator (D-Colorado) Member of Select Committee on Intelligence
CSPAN2 07/30/2013
Americans in recent weeks are coming to understand what it means when Section 215 of the Patriot Act says that the government can obtain -- quote --
Mark Udall
Senator (D-Colorado) Member of Select Committee on Intelligence
CSPAN2 07/30/2013
I have seen no evidence that the bulk phone records collection program alone has played a meaningful role, if any role in disrupting terrorist plots. I have yet to see any convincing reason why agencies investigating terrorism cannot simply obtain information directly from phone companies using a regular court order. It may be more convenient
Mark Udall
Senator (D-Colorado) Member of Select Committee on Intelligence
CSPAN2 07/30/2013
If the government can use these powers to collect information on people who have no connection to terrorism, then where does it end? Is there no amount of information that our government can collect that would be off-limits? What's next? Our medical records? We must be able to put in place reasonable measures that allow our law enforcement agencies to pursue enemies who would try to harm us while protecting our rights as Americans.
Mark Udall
Senator (D-Colorado) Member of Select Committee on Intelligence
CSPAN2 07/30/2013
I'm calling on the White House to begin to make the administrative changes to end the bulk collection of Americans’ phone records and conduct the program instead through direct queries to phone companies where there is a connection to terrorism or espionage. Under this more targeted approach, our government would retain its broad authorities to investigate terrorism while ordinary Americans would be protected from overly intrusive surveillance activities.
Mark Udall
Senator (D-Colorado) Member of Select Committee on Intelligence
CSPAN2 07/30/2013
We need to strike a better balance between protecting our country against the threat of terrorism and defending our Constitutional rights. The bulk records collection program, as we know it today, does not meet this balanced test and that's why I believe it must end.
Glenn Greenwald
Guardian Reporter
CNNW 07/31/2013
Tapper: This one with the catchy headline NSA tool collects nearly everything a user does on the internet. It's called "Keyscore." Greenwald: it's a program used by the NSA to collect all internet activity everything they can collect, store it, and allow their low-level analysts with access to terminals to search what it is they want and fit out what your e-mails say, what Google search terms you entered, and pretty much anything else you do on the internet. It's an all-purpose (buying device.)
Glenn Greenwald
Guardian Reporter
CNNW 07/31/2013
Tapper: This one with the catchy headline NSA tool collects nearly everything a user does on the internet. It's called "Keyscore." Greenwald: it's a program used by the NSA to collect all internet activity everything they can collect, store it, and allow their low-level analysts with access to terminals to search what it is they want and fit out what your e-mails say, what Google search terms you entered, and pretty much anything else you do on the internet. It's an all-purpose (buying device.)
Glenn Greenwald
Guardian Reporter
CNNW 07/31/2013
Tapper: Clapper's office today released its own set of stunning documents. Among them a previously classified Congressional briefing paper outlining the Patriot. act provision allowing for an early warning system involving logging all the domestic e-mails and phone conversations of Americans, with this attempted assurance, only a tiny fraction of such records are ever viewed by NSA
Showing 311 through 320 of 1708