|
Terms and Conditions May Apply (2013)
cold feet and a tie
rise to the occasion a million tiny flashlights I gotta turn it off cold feet and a tie rise to the occasion a million tiny flashlights I gotta turn it off for a while I'll keep my place but tonight I'll stay so late oh sleep for a while too much conversation too much information I gotta turn it off oh sleep for a while too much conversation too much information I gotta turn it off for a while I'll keep my place and tonight I'll stay so late and here we are gotta turn it off gotta turn it off gotta turn it-- [narrator] just about every time we use the internet, A communication link, or an app, We agree to some very long terms and conditions. But what exactly are we agreeing to? You guys! You gotta help me. These business-casual g-men are trying to kidnap me! What? It's crazy, dude! They're saying it's because I agreed to the latest terms and conditions on itunes! Why? What did the terms and conditions for the last update say? I don't know! I didn't read them! You didn't read them? Who the hell reads that entire thing every time it pops up? I do. Can you tell-- Can apple tell how many people actually read it? Well, they have to say that they agree. We can't know for sure if they've read-- We try to make it in plain english and very short. If I were trying to make a user agreement uninviting, I would choose a small font, A sans serif font, and I would set it in all caps. Because what happens then is that you have type That becomes a texture rather than words and spaces. No one has read the terms and conditions, No one in the world. No one. Even the lawyers who wrote it wrote it like this. [laughter] You come to a website and they have a set of rules Usually described in a terms of services, And then they have a privacy policy. And as soon as you start using the service, In essence, you have agreed to the terms of service and the privacy policy. Do these terms and conditions that we sign up for even apply? They do. I think if they didn't apply, I think the web would topple over. And so, to the extent there have been contract decisions, They've held that these terms and conditions are valid. [narrator] and this concept is pretty new. For instance, you never had to sign a user agreement For an old-fashioned land line, Or to watch tv, or to read a book. But if you use a smart phone, a kindle, Or you watch hulu, then you do. Violet baby, don't you sign anything there! What's this all about? Standard form of contract. Don't talk to me about contracts, wonka. I use them myself. They're strictly for suckers. Yes, but you wouldn't begrudge me a little protection. [narrator] in fact, if you were to read everything you agreed to, It would take one full month of work out of every year. That's 180 hours you'd need to spend every year. And according to "the wall street journal," Consumers lose $250 billion Each year due to what's hidden in fine print. Here's an example from linkedin's terms. You grant linkedin a nonexclusive, Irrevocable, worldwide, perpetual, unlimited, Assignable, sublicenseable, fully paid-up And royalty-free right to us to copy, Prepare derivative works of, improve, distribute, publish, Remove, retain, add, process, analyze, use and commercialize, In any way now known or in the future discovered, Any information you provide, directly or indirectly To linkedin, including, but not limited to, any user-generated content, Ideas, concepts, techniques or data to the services, You submit to linked in, without any further consent, Notice and/or compensation to you or to any third parties. [narrator] so linkedin takes pretty much everything forever. You'll find this kind of language in google, pinterest, facebook-- Pretty much anything that people consider free. Instagram is finding that pictures are worth Much more than a thousand angry words, After the company updated its user agreement to say It would have the right to sell posted photos Without compensation for use in advertising. [narrator] and even if you are paying, Companies have the ability To make you accept just about whatever they please. In 2009, gestation, Company in the u.K., Put some pretty sneaky stuff their terms. They didn't take mon, or your firstborn child. But for one day, their terms stated: By pcing an order via th website, You agree to grant us a non-transferable option to claim, Now and forer more, your immortal soul. The contract was only live for a day, But gamestation happened to rake in the lives of 7,000 immortal souls. This was of course a joke. However, it makes you wonder. What if there were more serious consequences That might result from not reading terms and conditions? What if your phone came with these long terms and conditions That said, well, if you use the phone the government can wiretap you. That would be insane. But that's the kind of world we're living in. [narrator] a world where the government can wiretap you Because of terms and conditions? So if you look at the iphone user agreement, Wiretapping isn't mentioned. But in at&t's privacy policy, They say that they can use data to investigate, prevent, Or take action regarding illegal activities. Prevent? you'll love the stuff we're made of, pizza hut! [narrator] in 1994, Pizza hut became the first major chain To accept a delivery online. Suddenly the internet needed a way to remember who you were, Where you lived, and how you were going to pay. My question is, what the hell? Like, how do they know who you are? Yeah. Okay, there are these things called cookies, Where, like, if you go to a site and buy something, It will remember you and then create ads for other stuff You might want to buy. So it learns information about me. Seems like an invasion of privacy. [narrator] it wasn't until the late '90s That companies began voluntarily adding privacy policies To explain what was happening with this data. Then, in 2000, an online company called toysmart went bankrupt. But they had an idea. They tried to sell their database Of 195,000 users to another company. This included names, billing information, Shopping preferences, and family profiles, Even though their privacy policy said they would never share information. People felt like they were being duped. [man] lawmakers tell you time and time again That every time they go back to their district, People are telling them that they want Some internet privacy laws. They want some protection. [narrator] in early 2001, Over a dozen bills were introduced in congress To protect privacy online. [george w. Bush] these acts of mass murder Were intended to frighten our nation into chaos and retreat. But they have failed. [narrator] all of the privacy legislation was killed or abandoned, And the patriot act was of course initiated. [bush] the bill before me takes account of the new realities and dangers Posed by modern terrorists. This new law that I signed today Will allow surveillance of all communications used by terrorists, Including e-mails, the internet, and cell phones. The patriot act expanded the ability of the federal government To do surveillance in a lot of little ways. You don't need a judge's approval, for instance, To find out what website someone visited, What search terms they typed into google. The question of your, if you will, information, being retained by google Is not really at this point a google decision. It's really a political or public-policy decision Enforced by different governments in different ways. [narrator] what if privacy policies weren't about protecting privacy at all, But rather, taking it away? Let'e's privacy policy around this time To see if any changes were made. So here's google's privacy policy from December of 2000. "google may also choose to use cookies To store user preferences. A cookie can tell us, 'this is the same computer That visited google two days ago', But it cannot tell us, 'this person is joe smith', Or even, 'this person lives in the United States'. And here's the privacy policy from one year later, In December of 2001. "google does this by storing user preferences in cookies And by tracking user trends and patterns of how people search. Google will not disclose cookies to third parties, Except as required by a valid legal process, Such as a search warrant, subpoena, statute, or court order." Now it's important to note the fundamental difference Between these two policies. One says that you're totally anonymous. The other says, when necessary, you're not. But here's what's strange. So the first screenshot you saw of google's oldest policy Was taken by a non-profit internet archival service. It records what websites used to look like By taking snapshots, and it's been doing it since the '90s. Now, google also lists the history of its privacy policies On its own official archive page. In their archives, they state that they've got every privacy policy That goes back to the beginning. But what google shows as their original privacy policy Doesn't match that of the archive service. Instead, they show the policy from December of 2001, The one that says users are not anonymous. Google claims this is their first privacy policy, which it isn't. So why would google not include its original privacy policy On its own archives page-- The one that said you would remain anonymous? What if the data collection that the patriot act required Became the foundation of a whole new business model, And the foundation of the modern internet as we know it? Would that be something worth covering up? And even though we don't write checks to google, And that's one of the reasons we kind of like the company, It doesn't mean that google's really free, Or that we are free in the liberty sense when we use it. It might feel very different if google was effectively A $500-a-year service, Because that's the value of the data that you're providing. I mean, that was a really critical finding, That advertising could be targeted based on information That people were somehow supplying about themselves. Suddenly, you didn't have to wonder, Was somebody watching my commercial? You knew. Someone clicked on my ad. That meant that they paid attention to it. [narrator] in 2012, google was one of the most valuable stocks in the world. And mark zuckerberg, the founder of facebook, Had become one of the richest men in america. My job is to help investors figure out for themselves What this thing's worth. So I look at what facebook has as an asset, Which is 900 million people and a ton of data on those people, And I say if they use 10% of that data, They're going to be the most valuable company ever. [narrator] when personal data is worth this much, Why would google, or any free internet service, Be opposed to the data retention that the patriot act required? Anonymity wasn't profitable. People who are willing to give up information In exchange for having access to something that's free, Or something that's fun, or a free taco. I don't think that ever changes. You always want something free. And plenty of people are willing to provide information to get that. [narrator] and plenty of companies picked up on this fact. Let me give you some very practical tips. First of all, I want everybody here to be careful About what you post on facebook. What the default settings are on facebook, This is how most people use this technology. When these companies are building these systems, they know that. [audience member] so why is it the default for everything sharing, Every photo, when I start facebook? Why isn't it just for my friends? Why is the default for everybody? Because it's really confusing for my mom to figure out How to just share to her friends. The way we've designed the site is that, It's a community thing, right? So people want to share with just their friends, But a lot of people also want to share with The community around them. Right. Right. I want to share with everyone who works with me at facebook. I want to share with everyone who went to my college, Everyone in the village around me. And those people aren't just my friends. [narrator] even mark's explanation doesn't make any sense. He says he wants to share with the school, With the quaint village next to him. He doesn't say he wants to share with the entire world. And yet, that's the default. The challenge with defaults Is that you get comfortable with whatever the default is. When the default is public, You actually can adapt really beautifully and deal with it. When the default is private, You can adapt comfortably and deal with it. When the defaults change, that's when problems emerge. [narrator] and in fact, that's what facebook did. In 2009, facebook made changes to their privacy policy Without telling anyone. Doing a privacy change for 350 million users is-- Is not the type of thing that a lot of companies would do. We decided that these would be the social norms now, And we just went for it. [narrator] you might remember the fan page with over a million people Who tried to get the policy reversed. What was the big deal, you might ask? Well, over the course of a night, Facebook turned what was once private information Into totally public information. These platforms have an incentive To keep as much information About you and make it as visible as possible. It's almost the question then becomes, What's the less forgivable sin, Having this crazy one night stand Or not knowing how to use facebook properly. Most relationships in your life, It's very good that the other person doesn't know everything You've ever said, or scribbled, or thought. When you choose to share a photo album, You go to facebook and you choose to put those photos there. Just have an opt in on every single thing. Opt in-- Opt in-- Opt in. I'm okay with facebook behaving like a company. But I think we need to treat it like a company, And not treat it like some benign public utility. [narrator] these are the default settings on facebook in 2005, Divided into 12 categories. As time passes, more and more information is shared by default. In 2009, facebook began automatically sharing personal information With the entire internet. By 2010, everything was shared by default, Except for your contact info and your birthday. We could, if you did a search, and a gmail, And a youtube and so forth yesterday, And you did it from your home-- I'll give you the worst case. You did it from your home, and you only have one computer in your home. In theory we could cross-correlate those And get all three together. We don't do that and we're not likely to do that. [narrator] but in January of 2012 Google made changes to tir privacy policy, And they did just that. Google combined l of the information Any of the services had collected about a person And put them into one ngle profile. What eric schmidt had said was the worst-case scenao, Gole had actually done. How can you honestly sit here And tell this committee this is not a growing problem? A good deal of what I was trying to say Is that I don't think there's evidence of market failure Or consumer harm from the legal and legitimate use Of personal information in commerce. I don't think there's evidence of it. There are companies that you've never heard of, like acxiom, That claim to have about 1500 points of data on the average american citizen, Everything from, you know, whether you're right-handed or left-handed, What kind of dog you have, What your sort of psychological outlook is, And all of that can be used to inform decisions That businesses make about us as well. These are the types of companies that a potential employer Would go to to try and run a background check on somebody Before they hired them. They're able to connect the fact That you went to site a, And then later to site b, And then eventually to site c, And create this detailed history Of what sites you visit online. [man] they don't put your name in the cookie. They put a unique serial number in the cookie That can then be linked to your name in their database. I don't know if you've ever seen the picture Of the ad network ecosystem That shows all the parties in the ad network ecosystem. It's a bit overwhelming. The information is valuable to different people for different reasons. What if you buy a lot of alcohol? You know, they might want to raise your premiums Because they think you're at risk for alcoholism or something like that. The company might use it in a way that actually harms you. [narrator] for example, in 2008, Thousands of people suddenly had their credit limits reduced, Seemingly for no reason. While on vacation, one wealthy business owner from atlanta Saw his limit plummet from $10,800 To just $3,800, ruining his vacation. The letter he received said this: "other customers who have used their card At establishments where you recently shopped Have a poor repayment history with american express." This means companies like wal-mart. And in minneapolis, a father came into a target Outraged that they were sending his teenaged daughter pregnancy coupons, Coupons that were addressed to her. The man thought that target was trying to encourage his daughter to get pregnant. As it turned out, thanks to her shopping habits, Target knew that this high-schooler was pregnant before her own father did. The father later apologized. And in the netherlands, data was being used to harm customers in a whole new way. Now, while you're driving and using a gps, That gps is sending back signals to tell how fast you're moving. It's really useful for helping us avoid traffic. But that got a little company called tomtom wondering Who else might be interested in knowing the speed of traffic. And so in the netherlands, the data that people were willingly trading To find a faster way home was being sold to the authorities To give those same drivers tickets. Is the reason we don't have any baseline consumer privacy law Because of the fbi? No. That is largely due to lobbying by companies That have built extremely lucrative businesses Around these business activities And don't want to do anything to disrupt that. Under facebook's terms and conditions, A user must be 13 or older. Despite this, according to a recent consumers' report study, An estimated 7 1/2 million users were younger than 13. First of all, we don't allow people to have accounts under the age of 13. And my reaction to that is that's just absolutely indefensible. I mean, it's unbelievable that you would say that. Well, senator, I just want to say we-- we really emphatically agree with your points. They say that facebook sent an army of lawyers So that the final privacy legislation that emerged In 2011 was watered down significantly In a way that wouldn't affect facebook's business model. My name is alan davidson, and I am the director of public policy For google in north and south america. My message today is simple. As we've heard, mobile services create enormous social and economic benefits. I reject the notion that privacy protection Is the enemy of innovation. It absolutely doesn't have to be, and isn't. [narrator] it was an expensive year of lobbying for these big companies. Google spent five times as much as the year before, And facebook spent four times as much. Senate bill 242 will protect users of social networking internet sites. It will protect these users from identity theft And from unwanted contact by keeping their private information private, Of course unless they agree to share it. I know that many members including myself Do not want to negatively impact A very important industry for the state of california. Individuals involved in this industry Don't want to see any regulation whatsoever, So I think that's really the key. And one of the most interesting things I've found in these conversations Is that many members of the legislature Don't even have social network sites Because they're concerned about their privacy. And at the time the bill was being heard, Although lobbyists were in the committee room For the entire hearing, they did not come forward to speak. So it was sort of an interesting process, Sort of a stealth killing of the bill, Without the opportunity for the public to really see Who was in opposition, So people like google and facebook Were in strong opposition. Facebook in particular. What did facebook have to lose? You know, I really do not understand their logic, And you'd have to ask them about that, But when I analyze an issue like this-- I'd love to ask them about that. They won't talk to me. [laughs] I'm not surprised. I don't think-- I don't think the rules of law and regulation Necessarily apply when it comes to interacting with a company That wants to sell you something. Yeah. We should be worried. [narrator] but worried about what? Sure, the data collection allowed by privacy policies Had fueled commerce. But was there something more serious we were agreeing to? [narrator] total information awareness. A program initiated by the government in January of 2002. Its mission? To collect every digital transmission imaginable. And yes, this was their real symbol, They eye of the pyramid, scanning the earth with a laser beam. It actually looks oddly similar to what's inside mark zuckerberg's hoodie. Making the world more open and connected. Oh my god! It's like a secret cult! Total information awareness was a program designed to connect the dots, To link banking activities to flight searches to online activities. [reporter] but the pentagon is clearly moving to create The largest electronic eye ever, To look at any and all americans. You're looking for trends and transactions That are associated with some potential terrorist act. They believe that with enough data, That they can predict who would be engaging in nefarious crimes. [narrator] the public was outraged. Congress was outraged. The program was shut down. The lesson that the government learned After the failure of total information awareness Was that if you're going to create a gigantic spying program, Don't give it a creepy name. There's nothing to prevent them from developing the same capabilities, Just in smarter ways, from their standpoint. [bush] a wiretap requires a court order. Nothing has changed, by the way. [narrator] but in reality, lots had changed. How we were told one day in late 2002 That an nsa representative was coming to the office. Mark klein came to us at the electronic frontier foundation With data and documents that showed that At&t was engaged in a wiretapping program. The nsa is much different from the cia. First of all, it's about three times the size, It costs far more, It's tremendously more secret than the cia, And what it does is very different. It's focused on eavesdropping, On tapping into major communications links. They actually had a secret room in their facilities, And they were creating a copy of internet traffic and sending it to the nsa. So in a sense, they are vacuuming up, scooping up every-- They are blindly vacuuming up everything going across those links. And you're certain of that. I'm certain of that. [narrator] so president bush owned up to it. I authorized the national security agency To intercept the international communications Of people with known leaks-- links to al-qaeda And related terrorist organizations. It's taken less than 24 hours after the bush presidency ended For a former analyst at the national security agency To come forward to reveal new allegations About how this nation was spied on by its own government. The national security agency had access To all americans' communications, Faxes, phone calls, and their computer communications. Is there a recording somewhere of every conversation I had With my little nephew in upstate new york? Is it like that? It would be everything, yes. Um-- it would be everything. [narrator] but then a beacon of hope arrived in the white house. Hi, senator obama, I appreciate your giving us The opportunity to ask you questions. I'm an attorney who represents federal whistleblowers, And I was very disappointed when I learned That you supported the bill That lets phone companies off the hook When they've helped the federal government, Without warrant, wiretap phones. I recognize that some people feel like, Yeah, well, the phone companies still were complicit in this; They should be held accountable still. I understand that argument. But the problem was that the surveillance program Is actually one that I believe is necessary for our national security. So they were immune, but that means that the programs were still shut down, right? The-- the programs were shut down? Yeah, e wiretapping programs. I have no reason to believe That the wiretapping programs have been shut down. No, if the wiretapping programs had been shut down Then I don't believe that the government Anat&t would still be fighting in court For the lelity of it. So barack obama has't changed anything? No, barack obama did not shut those progrs down After he took office, Even though he had threatened to before he became president. [zuckerberg] when we got started just in my dorm room at harvard, Um, the question that a lot of people asked was, Why would I want to put any information on the internet at all? Like, why would I want to have a website? And people have really gotten comfortable Not only sharing more information and different kinds, But more openly and with more people. And that social norm is just something that's evolved over time. You may have seen the "onion" take on facebook, which was, The cia has just announced its most recent handy invention-- facebook! According to department of homeland security reports, Facebook has replaced almost every other Cia information-gathering program since it was launched in 2004. After years of secretly monitoring the public, We were astounded so many people would willingly publicize Where they lived, their religious and political views, And alphabetized lists of all their friends, Personal email addresses, phone numbers, hundreds of photos of themselves, And even status updates about what they were doing moment to moment. It is truly a dream come true for the cia. You know, the fbis and the nsas of the world Are appreciative of the fact that google and facebook, You know, have built business models around collecting user data, Because it makes their jobs much easier. That article in time started with this anecdote: They're sitting in their transparent cubicle In their open space, in facebook. Robert mueller was the one man in the room with a tie on, And he was older, in a suit. And he comes in and he says, I was just in the building And I wanted to say hello to mark zuckerberg. So he says hello to mark zuckerberg, A little chitchat and then he leaves. And everybody's saying, what the hell was that? Now, nobody asks the question, Why was mueller in the building? He's the head of the fbi. So on the one hand, mark zuckerberg has said He wants to create a more open society, And facebook is a way to do that. On the other hand, you know, There's a lot about the way facebook uses information that people don't know. [narrator] if only there was a way of knowing How much information these companies were storing about us. Well, in the case of facebook, We learned some pretty interesting things Thanks to one student in austria. And, unlike the us, europe has a law that requires a company To tell a customer what data they have stored on them If that customer wants to know. And facebook, unlike most major internet companies, Had actually built a headquarters in europe. Apparently we're like, the only three people that were like, Pushing hard enough and asking again and again and again And going through also the irish authority To finally get at least like a bigger part of our data set. We still didn't get everything right now. Got it right here, just to have an idea of how much it actually is. That's like, just to picture it to see how much it is. Can I hold it? Wow, this is more than a baby. Yeah. That's 1,222 pages. I'm a member of facebook for three years, But I was using it more intense For like the last one and a half years or so. What's interesting as well is that I didn't post too much, actually. I'm a person who posts something like once a week or so. With this giant ream of information in front of me, Is it hard to go through it and actually find specific details about a person? No, that's super-easy, 'cause it's-- I mean, we just used the search function in the pdf file. So you just type in one word, Let's say "demonstration" or "sex" Or political party or something, And within a second you find the right information. So within a couple of minutes you can figure out what people voted for, What, I don't know, psychological problems they have, What parties they've been to, All these informations are like really easy to find, actually. While using that service for such a short time, You still had a data file that's bigger than anything that Any cia, fbi, or, I don't know, Stasi ever had about an average person. If you hit the remove button, it just means it's flagged as deleted. So, um, you hide it actually from yourself. But anyone like facebook or any government agency That wants to look at it later can still retrieve it and get it back. And that means that it's there for an indefinite time, Um, even though you hit the delete button And they ask you three times if you really really want to delete it. It's not actually gone? It's not actually gone. It's still there. So we've ultimately adopted roughly the following rule. We-- think of it as we anonymize the information within 18 months. It might be anonymized within 18 months, But all of the searches we've ever done are still there. The underlying data is still there to be de-anonymized at some point. [narrator] and de-anonymizing search records turns out to be shockingly easy. That is, taking private searches and finding out whose records they are. In 2006, aol turned over a bunch of these anonymized search records Of their users to the public. And it only took a few short hours For a reporter to decode who user number 4417749 was. Between searches for things like "numb fingers", "'60s single men", And "dog that urinates on everything," The reporter uncovered a woman named thelma arnold. She was age 62. But then there's user 17556639, Who looked up "how to kill your wife", multiple times, Along with "decapitated photos", And then in the middle, the user actually looks up "steak and cheese." Steak and cheese! And there were plenty of users online Who were quick to judge what was going on here. It was murder. Rainey, easy. Hey, old friend! So let's take a seat and I'm gonna show you something. Okay. What I'm showing you here is a list of anonymized search records. Um, these records were released by aol. Have you-- are there actually things on this list That you know you've searched for before? Um, sure. Yeah, I've definitely looked up "car crash photos", I've definitely typed in "decapitated", I've definitely looked up "dead people photos", "wife killer" I've definitely looked up "wife killer". In fact, I've looked up every single search term I'm looking at here. [narrator] you see, jerome had been a writer on "cold case", A tv show where each week cops have to solve a murder mystery. Well, that's always what scared me When I was entering those search terms, Was if there's some sort of automated system That just red-flags you based on the search term. They're not gonna look and say, Oh, yeah, he was probably working on a tv show, And that's why he was just googling "how to murder my cheating wife." What? I just wanted to confirm that I had not murdered you and that you are alive. No, I am allowed to come out of this room. And our baby's safe. Okay, good. And he has a clean diaper. Oh, thank god. So we can rest assured you are not a murderer. I am not a murderer. You're a writer. I am a writer. Okay. Glad we could clear that up. Glad we could clear that up. [narrator] so what would happen if that red-flag system did exist? If a dad like jerome might someday have his door knocked on Because his search records became public? The consensus seems to be That the retention of this kind of information Should be greater than zero days. And the reason has to do with police actions, terrorists, Patriot act, all those sorts of things. Turns out that in this environment, The digital environment, There's a loophole to the 4th amendment, Which is, if a third party collects a lot of this information, The government doesn't have to go through those same hoops. It's called the third party doctrine. The third party doctrine means that when you the consumer Share data with a bank, With an email provider, With a search engine, With any kind of technology company, You have basically given up What would have been your 4th amendment protections over that data. For the government to get information from a google or a facebook, Is a lot easier than the government doing it itself And putting a wiretap on our phones. Large companies like google and facebook Receive thousands of requests a year from government agencies. Facebook has 25 employees doing nothing but surveillance, And these companies routinely receive requests, They process the requests. You may be surprised to hear that secret searches of email By the government seem to be commonplace. The law that governs when the government Can get electronic communications, Like emails and things that are stored remotely, Was written in 1986, and could have effects That allow the government to at least claim That they should be able to get location data without a warrant. Or at one point the government was claiming That it doesn't need a warrant to get emails that you've opened. Well, in the spring of 2011, the department of justice, And in particular the fbi, Made several requests to internet companies as part Of an investigation relating to individuals associated with wikileaks. We released 400,000 classified documents. [narrator] for those of you who don't know who julian assange is, He started wikileaks. Now, in the past, wikileaks has released secret documents Related to the iraq war, Guantanamo bay, and afghanistan. And that's, you know, obviously a positive development For those of us who think that information Should be more accessible almost no matter what, And obviously is a threatening development To those institutions, like corporations in many cases, That depend on secrecy. I condemn the action that wikileaks has taken. It puts at risk our national security. Twitter received an order that requested data Regarding certain twitter users. These were all users that were related to The whistleblower website wikileaks. However, it wasn't just an order. It was actually a d-order and it came with a gag order. It required that twitter never speak publicly About the fact that they had received this request. [reporter] denouncing the move, Assange said he believes other american internet companies Such as facebook and google May also have been ordered to disclose information. Companies like amazon, yahoo, dropbox, Even facebook, will be capable Of handing data to the government without first informing users. Even if you think what the people are doing is wrong, That's why the first amendment exists. To protect unpopular people Engaging in unpopular speech. [narrator] but twitter fought back. They released the information to the users, And let them know ahead of time. And they were successful in getting the gag order overturned. Meanwhile, amazon, paypal, mastercard, and visa- They all gave in to the pressure regarding their users. You know, a culture of loyalty to not you, But a greater cause, Is important to be successful, it seems like to me, And it's disloyal, in this case, to the country. [narrator] while president bush might think it's disloyal, Thanks to twitter standing up for the rights of activists Like julian assange, You can now be shown this. Today, we released over 287 files Documenting the reality of the international mass surveillance industry, An industry which now sells equipment To dictators and democracies alike In order to intercept entire populations. 9/11 has provided a license for european countries, For the United States, Australia, canada, south africa, and others To develop spying systems that affect all of us. [narrator] the spy files show the massive industry That surrounds selling to the us government And governments around the world. Instead of having something called the total information awareness act, With this big symbol with the eye of the pyramid, Looking at everybody, Scanning the world with its sinister laser beams, Instead they just have a bunch of companies that exist That are providing bits of those capabilities, And they're provided under different contracts But you go up to the same agency, the same people. One of the most popular is called massive intercept, And basically what governments are trying to do with this Is get as much information as possible From our communications So they can analyze that and detect patterns in that. It's interesting, in your article, That you really talk about the secretive nature of the business. Right. They sell through trade shows Which are not open to the media. [narrator] but we actually went to one of these conventions. It was pretty easy. We just called and asked for a pass. So we talked to the representative from one of these companies, A firm called cellebrite. They were included in the spy files. They're a company that sells cell-phone extraction tools To every major government sector in the us. So my name's christopher shin. I'm the vice president of engineering for cellebrite usa. Today I'm presenting to you the cellebrite u-fed system, To my right here. It is a device used to extract countless information From mobile devices, so text messages, Pictures, video, audio, call logs, that kind of thing. It's used by agencies across the United States and the world. Yeah, the iphone specifically stores a lot of information; More than your normal handset. It really is a digital store of your personal life, Your business life, And this is why the field is actually, It's been growing exponentially Over the last couple years. So as the devices get more complex, They can hold more information. This is one of the most personal devices to you today, Even more than your laptop, so... We think of ourselves as basically a tool manufacturer. Just like, you know, glock or beretta is producing a firearm, We're producing a tool that does a certain task, And we're marketing that tool only towards-- Just like you can't go out and just buy a handgun without credentials, We're not just selling it to everybody. But could you conceivably sell it, or are there laws against it? There are no laws against selling this to someone That's not in law enforcement or government, Something like that. If someone was to dump my phone tomorrow, They might get a good laugh out of the content in it, But I don't think I'd be put in jail. So I think that it really depends on how you look at it. I mean, there are privacy concerns, But I'm a little bit more on, I guess, The liberal side of my privacy being exposed. I mean, other people, of course, That's a completely different-- That's a completely personal view. My phone itself, I mean-- I actually take that back; I have a lot of work-related information on my blackberry, So if this information did get out, I probably would be pretty concerned. The surveillance vendors target two types of customers. They target governments directly, And then they so target internet service provirs And tecommunications carriers Who are tasked with the responsibili Of spying on their own customers. [narrator] for ample, There was a little piece of software That h been installed on every phone in america. This software was called carrier iq. And thankso a little video That a systems administrator from connecticut posted on youtube, The world now knows that this software Had been monitoring our every keystroke. [electronic voice] five fifty-three, and so on and so forth. [narrator] according to carrier iq's chief marketer, They're aware that his information is sensitive, And call it a treasure trove. It became big enough of a deal That al franken decided to take this issue to congress. Mr. Director, millions of americans have smart phones With preinstalled software designed by a company called carrier iq. Recent research has shown That it captures a broad range of sensitive information. Let me start off by saying We have neither sought nor obtained any information from carrier iq In any one of our investigations. Not directly from carrier, But what about from the wireless carriers? No, I don't believe so. If you're-- if you're specifying the use Of the carrier iq software in-- By a wireless carrier, have we sought that? I do not know, And the information we seek from wireless carriers or what have you, And I'm not talking about carrier iq, I'm talking about wireless carriers. Right. We may obtain information That in some way carrier iq may have been involved with. [narrator] why would the fbi Need carrier iq to send them all of this information? After all, they could be using any of these services That were included in the spy files. Take this product, for instance. Scan and target, which claims that it can search through the sms, The ims, twitter, emails, facebook, blogs and forums, All while analyzing huge volumes of information in real time. Or finfisher, which demonstrates how police Can infiltrate anyone's system Through a variety of videos That used to be available on their website. They even show the agent Hacking into google and facebook in their demo. Who has this kind of equipment? Massive interception equipment Is sold by surveillance vendors around the world. It's really up for grabs for anyone who wants it and can pay the price. [narrator] the finfisher system Was sold to egypt to monitor people who opposed their leader. These are the actual documents. It even includes training for two to four people For the low, low price of about eleven grand. Or the hacking teams project, Which advertises that it can track hundreds of thousands of cell phones, All on one system. Or software like kapow, That analyzes all social networks, With features like the ability To search out key words and phrases. Everything that happens on facebook, And it shows the frequency of conversations Between one person and another and all that kind of thing. That allows for a lot of profiling, It creates massive databases For law enforcement to exploit, and often misread. [narrator] with hundreds of companies offering these services, Why would the fbi need to use carrier iq? Everything coming from a cell phone, Everything coming from a computer, Anything that's going over the internet, Out of the country, or even internal within the country, Can be monitored using this kind of equipment. If you look at news stories now about what they call "big data"-- Big data is really looking up the question Of how can government and corporations Work with that data in order to look for anomalies And predict when you're gonna do something So they can stop you from doing it? [narrator] and the government isn't even that secretive about it. If you visit their business website, There's an application there looking for developers To create better tools for mass surveillance for online activity. Examples for surveillance include but are not limited to Fox news, cnn, msnbc, twitter, facebook, etc. Which brings us back to that word you'll find in many user agreements. It's the word that sent us down this whole path in the first place. "prevent." So this might make you wonder: What potential threats would all this surveillance we agreed to Actually prevent? Basically, January the third, 20 days before I go on holiday, I tweet, "are you free this week for a gossip / prep Before I go destroy america?" Ended the tweet with a kiss, As threatening as that is. Um, 20 days later, I get on a flight, Go to lax, we had a hotel on hollywood boulevard, We were just going to party around for a week, Just looking around, just be tourists. Get off the plane, went through the passport control, Swiped my passport through and they were like, Can you come this way? And I was like, It's 'cause I've got an irish passport, I thought maybe, Irish people, it's like stereotype, ira bombers. So they went through my suitcase, and I was like, ugh, What are you doing, and then when they pulled me into the holding room, I was questioned for five hours about whether I had a twitter account. And it was like, are you being serious? Are you actually holding me because of a tweet? And they were like, 'what do you mean by "destroy america?"' And I was like, to party? It means to go wild, get drunk? Any moron that could read that tweet Could see what it's meant as, like it ends with a kiss. I'm sure, like, hitler doesn't end his memoirs with a kiss or whatever he did. So then they moved us to a holding room, But then at midnight, the staff changed over, And they weren't aware of what we were there for, So they handcuffed us, stuck us in the back of a police van, And then took us to a downtown prison detention center. Innocent people shouldn't be treated like absolute dirt, And they were dragging us round, pushing us into walls. Sounds like a horrible vacation. Is the government refunding you, at least? No! They won't comment on what happened. Well, if I'd put I was going to paint the town red, They'd have me down for graffiti as well, wouldn't they? When I go to other countries, this is gonna show up that I got refused from america, So more than likely I'm now gonna get dragged off at every airport And questioned about what happened, And then I'll have to explain to them that it was a tweet. I'm italian, irish, french, portuguese, native american-- Plant-- I'm even like one-eighteenth avatar. [narrator] this is joe lipari. Joe lipari had had a rough day at the apple store. He had been forced to wait in line for four hours before finally leaving. So I get home from the apple store, still a little irritated, Smoke a little dope, put on fight club, Just trying to relax, go on facebook. [ed norton in fight club] and this buttoned-down, oxford-cloth psycho Might just snap and then stalk from office to office with an armalite ar-10-- "semi-automatic weapon," and I said the same thing, but except the apple store. [norton] pumping round after round... And, you know, basically word for word except for where. Hangin' out on facebook, getting' ready to go to yoga class, And there's a "shave and a haircut, two bits" knock on my door. So I was like, hey, maybe somebody's here to watch fight club with me. [chuckles] Open it up, boom, nypd s.W.A.T., bulletproof vests on, Their guns drawn, and they tear the place apart, You know, they really go through everything. The one cop finds the box that has all my, like, military awards. He comes bringing it down, he says oh, you were in the military? And we start talking army talk, he sees that I speak the language. And that's when he asks me, do you know what an armalite ar-10 is? And I was like, that's why you're here, guys? You're here because I made a bad joke on facebook? Like I, you know-- it blew my mind. It's the ultimate buzzkill, really, your facebook page brought s.W.A.T. To your house. They told me not to like, you know, go far from new york 'cause I'll be needed for all these court cases for a year. They claim one of my facebook friends called 911. Which is another thing I think is bogus. So I asked for the 911 tape, which they keep on file. They have to. And it's my right, It's my stuff. They have to give me my mug shots if I want. So they come back and say, oh, turns out it wasn't someone who called 911, It was someone that just walked into the police station, And that's something "we don't keep a record of." And how'd you get my address? I'd lived there for like 10 days. You know, like, I didn't update my mailing address yet, Like, all my banking stuff is still going to my old apartment-- There was nothing saying I lived there except for a verbal agreement. [boy] 'three minutes after being done with my lunch, I was told to go up to the office, And then I was sat down inside the vice principal's office, And I wasn't told what was going on until maybe ten minutes later. [woman] my phone rings, and I look at it and it was the number to his school, And I answer it, and it's the school security guard-- Just giving me a fyi, you know, for your information, Just to give you a heads-up, the secret service is here With the tacoma police department, and they have vito And they're talking to him. [vito] a man walked in, in a suit and glasses, And he said that he was part of the secret service, And he told me it was because of a post that I made, And it indicated as a threat toward the president. [narrator] yes, a seventh-grade boy was visited by our fbi Because of a red flag that came up in their spy system. I was saying how osama's dead, And for obama to be careful, Because there might be suicide bombers. [narrator] it didn't consider his age, or that his comment About obama needing to watch out was one of concern. The machine simply determined that based on a series of words, Vito was a potential threat. Pre-crime, the belief in this potential breach of the peace, Their belief that you might cause a crime. There's those pre-crime arrests in minority report. [tom cruise in minority report] mr. Marks, by mandate of The district of columbia pre-crime division, I'm placing you under arrest for the future murder of sarah marks, Due to take place today, April 22nd, At zero eight hundred hours and four minutes. No! I didn't do anything. This arrest happened on the royal wedding day When I attended a zombie flash mob wedding picnic-- - Great. - And myself and four other zombies Were arrested preemptively for a potential breach of the peace. Even if you dress up as a zombie, it seems to me That the crime isn't really committed until you've eaten some brains. Yeah. To be fair, we did have some brain cake. So there's that. How did they know that you were going to be dressing up as a zombie this day? Could it have been emails, or anything really? It could have been. It's hard to know, yeah. - I think that's the toughest thing, right? - That's the scary thing, yeah. The indication that they were monitoring private social networks Came in the way they were reacting to certain things and asking about certain things. So they were asking about maggots, and they were asking about climbing gear, Which they must have heard about through some exchanges on the internet. Neither of which was true. Nobody had maggots or climbing gear. And not something that was itself posting a hazard to the royal wedding celebrations; We were nowhere near the royal wedding celebrations, And we had no plan of going near the royal wedding celebrations. Anything that wasn't part of the official, ostentatious, Joyous, expensive, celebrations Of this wedding of two strangers Was prevented from happening, And that seems deeply disturbing. You can see that surveillance measures are being used To silence protests before they even happen. And this was of course the royal wedding. We'd all helped pay for the royal wedding, it wasn't just a private wedding. [from tv] you're arresting a professor of anthropology That runs a street theater group. One o' kings, one o' kings, one o' kings-- We couldn't believe this was happening. It was just-- we werso obviously a street-theater troupe. Some of us hadctually gotten costume on, you know? So we were locked away in lewishamolice station for 25 hours. Once the whole wedding was safely over, we were let out. For the first time, as far as I'm aware in this untry, A number of us-- something like fifty of us--- Were arrested, and in most cases incarcerated For thinking about protest, For thinking about, in this case, some street theater. A lot of-- a lot of life is based upon trust. I mean, if you have a conversation with your inner circle On a key strategic decision that is vital to your company And you read about it in the newspaper before the decision is implemented, In other words, you get preempted from acting Because somebody inside your company has talked, You're not gonna like it, and it'll hurt. [narrator] the activists didn't need to commit any crime. They just needed to text and to email, and to call each other About potentially protesting. But I think that the answer is not to take away the capacity of Looking at the public actions of citizens and keeping a record of them. The solution is to make sure that we elect better governments. Well, I know this argument, And it is not very new. It's old-fashioned, saying, "we are complying with rules and so what happens?" Between leading my-- leading the sinful life I would like to lead, And hoping that governments will protect my privacy, Or, assuming that no one's going to protect my privacy And leading a less sinful life, I'll go with the latter. It's simply just the odds of success seem higher to me. I congratulate the people who say they have nothing to hide. I don't believe them, And I also say they're probably hiding something from someone. We all do. You have nothing to hide till you do. And you are not necessarily going to know What you have to hide or not. [narrator] you might remember the case of milly, A teenaged girl in britain who disappeared in 2002. [announcer] police in surrey say they're growing increasingly concerned About the safety of a thirteen-year-old girl Who hasn't been seen since Thursday afternoon. [narrator] before the police found her body, her parents were holding on to hopes That she might still be alive. I'd say if someone has taken milly and is holding her, Then please, please, give her back to us. [narrator] why is that, you might ask? Well, because according to phone records, Milly had checked and deleted her voicemail. We were sitting downstairs in reception and I rang her phone. - Yes. - And it clicked through onto her voicemail, - So I heard her voice. - Yes. And I was-- it was just like, I jumped-- she's picked up her voicemails, bob! She's alive! And I was just-- it was then, really. [narrator] as it turned out, members of rupert murdoch's corporation Had been hacking into milly's phone, Trying to be the first to reveal details of this national news story. I think this is the watershed moment, when finally the public start to see, And feel above all, just how low and how disgusting This particular newspaper's methods were. This was a murdered schoolgirl, And the thought that a very tight-knit circle Of very senior politicians Linked up very closely, intimately, with the police And with the media mogul rupert murdoch. [newscaster] for 30 years, as british prime ministers came and most certainly went, A constant character in their worlds was rupert murdoch. The billionaire media mogul-- [narrator] for years, celebrities, and individuals like milly, Had the voicemails they thought were hidden and private Accessed by rupert murdoch's corporation, at the expense of people like milly's parents. And it took nearly a decade to expose the misuse of this highly personal data. Transparency, which, you know, bonds us together and gives us all so many friends That we didn't know before, but all these friends that are connected, Gives the state an absolutely unparalleled in the history of humanity Ability to know what's going on in its citizens, to find out who the dissenters are. The government is making whistle-blowing a crime. They are making dissent a crime. Especially when it embarrasses the government and calls the government to account. If sources are gonna get discovered, And if whistleblowers cannot securely and anonymously provide That information to journalists, We as a society won't know when our rights are being silently violated. Of course, the president has defended his administration The only way he knows how. If we can root out folks who have leaked, they will suffer consequences. [audience laughing] You look at a technical perspective, the technologies of maintaining privacy Are actually running ahead of the technologies that break it. For example, encryption, Which can maintain your privacy, is running ahead of decryption. [narrator] but what if there was a way to store information until it could be decrypted? U.S. Intelligence officials will soon be allowed to keep information on u.S. Citizens Much longer than they used to, even if those citizens have no known ties to terrorism. Under new rules, the government can store data it gathers for five years. That's up from the current limit of six months. General alexander, if dick cheney were elected president And wanted to detain and incessantly waterboard Every american who sent an email Making fun of his well-known hunting mishaps, What I'd like to know is, does the nsa have the technological capacity To identify those cheney-bashers Based upon the content of their emails? The-- in the United States, we would have to go through An fbi process, a warrant, To get that and serve it to somebody to actually get it. But you do have the capability of doing that. Not in the United States. There are new questions about the national security agency's massive spy center Under construction in the desert of utah. Once finished, it'll be five times the size of the u.S. Capitol building. The nsa is not allowed to spy on americans, But now a whistleblower has come forward, saying that the agency is doing it anyway. This massive agency that's collecting a tremendous amount of information every day By satellites and tapping of cell phones and data links On your computer or email links and so forth. And then it has to store it someplace, And that's why they built bluffdale. It's gonna cost two billion dollars. It's being built in this area on a military base Outside of salt lake city in bluffdale. As I said, they had to actually extend the boundary of the town So it would fit into it. And the whole purpose of this is the centerpiece Of this massive eavesdropping complex, This network that was created after 9/11. The reality of information technology is it progresses exponentially. Only information technology. Exponential growth starts out very slow, Looks like nothing's happening, you're doubling tiny little numbers, And suddenly, it takes off, and we've seen that with paradigm after paradigm, Like social networks in recent times. [narrator] in 1984, to store one gigabyte of data cost $85,000. By 2012, it cost about five cents. In the city of chungking, there are about 500,000 cameras. In 2012, the cost of permanently recording a high-resolution feed was $300 million. By the year 2020, the projected cost is less than $3 million. [man] the u.K. Being one of the cultures that's introduced cameras Most ubiquitously and most quickly, So far the population seems fine with it. If they weren't, they know who to call. All of which feed into this control center housed in a secret location. And I can call up, in real time, All instances where a camera caught someone wearing a red shirt. This is the shape and the size of a potentially suspicious unattended package. Many police departments set to use controversial new devices Capable of scanning people's faces, Then checking that information against a criminal database. When we're at war, when you're protecting your society Against people who want to come in and kill civilians, You have to be able to defend what we're doing. You have to be able to defend our way of life, And you have to put these powers into somebody's hands. [narrator] according to the brookings institution, This kind of pervasive monitoring will provide what amounts to a time machine, Allowing authoritarian governments to perform retrospective surveillance. For example, if an anti-regime demonstrator Previously unknown to security services is arrested, It will be possible to go back in time To scrutinize the demonstrator's phone conversations, Automobile travels, and the people he or she met In the months and even years leading up to the arrest. [chris soghoian] the government is using the existence of terms of service To justify the surveillance state that we now live in. The messages are free to use, and most importantly, they're encrypted, So the police can't actually get in there to decrypt what happened. So that's prompted calls to shut down the entire network. [narrator] it's easy to justify using these technologies to stop a riot. But shouldn't we be concerned when the government is able to read our emails, Text messages, phone calls, search history... To track our movements and limit our free speech? What crime did that seventh-grade boy really commit? Is having zombies at a royal wedding really so bad? What about milly's parents? And what happens when these technologies are used to watch peaceful protesters, Like all of the people that occupy wall street, or the tea party folks? What happens if the government doesn't like tents being set up? [yelling, screaming] Despite all of this, it was starting to seem like, so what? So what if the government can acquire all of this information? Maybe it's good they can keep the peace when riots are happening. And besides, maybe it was already too late. I mean, it's certainly dying. Whether or not it-- For privacy to-- I mean, privacy's going to remain dead Unless there's a really fundamental shift in... The dynamics by which that's decided, by which I mean, The only really effective response is to monitor and to change the behavior, The tendencies of the intelligence industry And law enforcement and all that, and even companies. And that's very, very unlikely. I don't know exactly who the 'us' is, but I'm very critical of us. I think that this is an area In which we have allowed ourselves to be smitten, We want this technology to grow and grow, And we don't want anything to rain on our parade. And we have woken up to the privacy concerns... In my view, at least four years too late. I mean, is privacy dead? Yeah, without question. Without question, yeah, it's dead. It's safe to work under the assumption that nothing's private. You know, anything that's been digitized is not private. And that is terrifying. When this becomes the size of a blood cell, And I can just send them into my brain And my body through the bloodstream, This'll become quite ubiquitous, And it really will be part of who we are. People say, well, okay, That's gonna be a real threshold to move beyond, But I don't think so. It's a very smooth continuum From, you know, when I was a student And I had to take my bicycle to get to the computer To having it in my pocket to having it in my body. It's a convenient place to put it; I won't lose it that way. But they say if you put a frog in a pot of water And slowly turn up the heat, The frog'll just die, because it doesn't realize it's boiling. And I think that, like anything else, I think we're opting in a centimeter at a time, And, you know, pretty soon you' prerey far down the road, You look behind you and you sort of wonder how you got where you were. I think that's true. It's just completely out of control. I mean, it's just-- sky's the limit, you know. They know everything about us now. It takes someone-- it takes someone who is in charge of laws Having what is being done to american citizens Done to their email account or to their facebook profile. Right, if it's personal, they're gonna pay attention to it. All of these powerful institutions, They're not subject to the same invasions of privacy as the rest of us are. Eric schmidt, the ceo of google, once said, "if you have something that you don't want anyone to know, Maybe you shouldn't be doing it in the first place." Then he got very angry when cnet, Which is owned by cbs, published a picture of his house. [mouse clicking] When you ask google about "do not track," They claim, "we have to understand how to define that Before we can implement any technology." "do not track's" pretty simple. It means we don't want to be tracked. The only reason google doesn't understand it Is because google doesn't want to implement it. Unless someone comes and makes it No longer practical for them to engage in that kind of activity, Pressure is put upon ceos of the companies, They're going to engage in it. [mouse clicks] We're going by the facebook campus right now. Really have no idea what to expect. Have not had breakfast. Um... Zuckerberg. He'll know that I checked in here, too, so that's good. He knows that I'm right next to his house. Let's see, we have a--here's the exact quote from mark. So: "having two identities for yourself is an example of a lack of integrity." Lack of integrity. They just did a knock-up on his door, So it seems very likely that we might get A mark zuckerberg sighting today. I mean, you might not be wrong, vince, ben. He might actually have a tunnel. There's some definite motion in the yard. Is it the dog? - Here we go. - That's him. Mr. Zuckerberg? Hey, I'm working on a documentary. Got a little blog here, But wondering if I could just ask you a couple questions? No, I-- sorry. Really? I have to be at work. Can I ask, do you still think privacy is dead? What are your real thoughts on privacy? Are you guys recording? Um-- we are. Could you please not? Um-- I can stop, yeah. All right. [narrator] mark zuckerberg had asked me to please not record him. So we shut off the main camera. But since mark doesn't seem to mind Storing our data after we think it's been deleted, this only seemed fair. Can you please not? Um-- I can stop, yeah. All right. Can I come by your front desk, though, And ask about setting up an interview? Yeah, I mean-- we have a department Where you can talk to people about that. Yeah, I know, I've tried going through it a few times, And I never hear back. [narrator] there's a major difference here. Mark loosens up after he thinks we've stopped recording. And you see that? That right there. That's a smile. Mark zuckerberg smiled at me. And you know why? Because he thought I had stopped recording, And he was relieved. Imagine what a relief it would be If all of these companies and the government Stopped recording everything we do. If we could just make a simple request to them-- Something that mark zuckerberg knows how to ask for. "can you please not?" Can yopleau not record us, Monitor us, and share our information, unless we ask first? We need terms and conditions that are reasonable, And we need privacy policies That promote the most basic principles of our democracy, Rather than taking them away. Or, as a young senator once said, Back before he became president: We need to find a way forward To make sure that we can stop terrorists While protecting privacy and liberty of innocent americans. We have to find a way to give the president The power he needs to protect us, While making sure that he doesn't abuse that power. And that simple principle, That there's somebody watching the watcher, Whether that's on an issue of freedom of the press, Or it's an issue of warrantless wiretaps, That simple principle is one that we can't give up And we don't have to give up. [narrator] well, mr. President, we are watching. And I guess we have to ask ourselves one simple question: Do we agree? cold feet and a tie rise to the occasion a million tiny flashlights I gotta turn it off cold feet and a tie rise to the occasion a million tiny flashlights I gotta turn it off for awhile, I'll keep my place but tonight, I'll stay so late Washington is caught in its very own episode of spy versus spy. The tactics once employed By top intelligence-gathering teams at the cia, Sifting through ip addresses, emails, and fake dropboxes, Have now been turned against the intelligence community's top official. oh sleep for a while too much conversation The fbi uncovered evidence of an affair Between petraeus and his biographer paula broadwell. That's right. Petraeus had an affair with the author of his fawning biography all in. These did not implicate criminal activity; These did not implicate national security; These were not a threat to david petraeus the person, Or to general petraeus, The director of the central intelligence agency. Those are not my words; those are the fbi's words. But instead of actually sending those emails, In many cases they wrote them as drafts In a gmail account they both had access to, And that way they could both log on and check the draft folder, Never having to actually hit "send." It's very embarrassing for the obama administration And for its national security command. It's troubling because There are laws that the fbi has to follow, And he has the right To be protected from an unwarranted, Unjustified investigation by the fbi or anyone. People don't really know how they're being monitored, And they think, hey, if it's working, If we keep stopping another 9/11, Then it's--then it's quote "worth it." The greatest fear that I have regarding the outcome For america of these disclosures is that nothing will change. |
|