Intelligence
-

Sponsored by the Taiwan Democracy Project and the U.S. Asia Security Initiative at the Asia-Pacific Research Center (APARC)

Abstract

During the recent meeting between PRC President Xi Jinping and Taiwan President Ma Ying-jeou, the “1992 One China Consensus” served as a mutually acceptable paradigm for maintaining “peaceful and stable” conditions across the Taiwan Strait.  For Xi Jinping, the warmth of the visit thinly veiled a message to Taiwan’s leaders and electorate, as well as to onlookers in Washington.  Chinese officials and media clearly link the talks and confirmation of the 1992 Consensus to “the great rejuvenation of the Chinese nation”—a concept that is increasingly unpalatable to many in Taiwan.  Xi hopes to keep DPP presidential candidate Tsai Ing-wen (and perhaps even future KMT leaders) in the 1992 Consensus “box” and to co-opt the U.S. in this effort, but perhaps underestimates the political transformation underway on Taiwan. 

The Xi administration has also hardened its position regarding “core interests” such as Taiwan, embodied in a “bottom line principle” policy directive that eschews compromise.  Although many commentators and most officials across the region have shied away from stating that the PRC and Taiwan are at the crossroads of crisis, the collision of political transformation on Taiwan and the PRC’s “bottom line principle” will challenge the fragile foundations of peaceful cross-Strait co-existence.  Changes in the regional balance of military power brought about by a more muscular People’s Liberation Army compounds the potential for increased friction, providing Beijing with more credible options for coercion and deterrence.

This talk will consider the politics and principles involved in cross-Taiwan Strait relations in light of the upcoming 2016 Taiwan elections and the policies of the Xi Jinping administration; and will discuss some of the possible implications for China’s national security policy, regional stability, and the future of cross-Strait relations.

Bio

Image
Cortez Cooper
Mr. Cortez A. Cooper III joined RAND in April 2009, providing assessments of security challenges across political, military, economic, cultural, and informational arenas for a broad range of U.S. government clients.  Prior to joining RAND, Mr. Cooper was the Director of the East Asia Studies Center for Hicks and Associates, Inc.  He has also served in the U.S. Navy Executive Service as the Senior Analyst for the Joint Intelligence Center Pacific, U.S. Pacific Command.  As the senior intelligence analyst and Asia regional specialist in the Pacific Theater, he advised Pacific Command leadership on trends and developments in the Command’s area of responsibility.  Before his Hawaii assignment, Mr. Cooper was a Senior Analyst with CENTRA Technology, Inc., specializing in Asia-Pacific political-military affairs.  Mr. Cooper’s 20 years of military service included assignments as both an Army Signal Corps Officer and a China Foreign Area Officer.  In addition to numerous military decorations, the Secretary of Defense awarded Mr. Cooper with the Exceptional Civilian Service Award in 2001.

2016 Taiwan Elections and Implications for Cross-Strait and Regional Security
Download pdf
Cortez Cooper Senior International Policy Analyst RAND Corporation
Seminars
-

Abstract: A number of senior Intelligence Community (IC) officials describe compliance as one of the IC’s biggest problems, perhaps the biggest. The underlying legal and informational issues are bound to become more acute and complex.  How can AI help? The IC protects our nation by analyzing the relationships between people, places, and things - essentially "connecting the dots.”  Doing so while remaining compliant with policies such as Executive Order 12333[1] and Presidential Policy Directive 28[2] is a balancing act. The interpretation, implementation, and enforcement of policy vary across organizations and administrations.  This frequently leaves analysts struggling to determine what data they can and cannot look at. The Internet, mobile, and “Big Data” generally further complicate the problem. The sheer volume, velocity, and variety of data that is constantly being generated necessitate automation, and even AI, to manage.  However, the benefits of analytic automation over the data deluge will remain limited, until the IC finds a way to scale the processing of legal judgments at a comparable rate.

Before we consider the potential benefits to AI-based methodologies we need to understand two things: Data Rights and Application Uncertainty. Data rights are data attributes derived from laws and dependent institutional policies.  Data rights include but are not limited to classifications, access policies, source limitations, “privacy” constraints, etc. While such data rights are entailed in the data itself, the interpretation and application of these rights are contextual and will vary.  More specifically, application of laws on a data set may be indeterminate: they may vary by time, user, and/or geography; the Second Circuit may issue an unexpected, divergent opinion; access may occur before or after a seminal FISA decision; the Office of Legal Counsel may change its mind; the legal state of a data set at the time of collection may be indeterminate; etc. 
 
About the Speakers: As Executive Vice President at In-Q-Tel, Bob Gleichauf supports technology advancement programs. He is also Director of IQT’s Lab41 initiative, a unique Silicon Valley-based challenge lab that provides “innovation through collaboration” in the area of Big Data analytics. Gleichauf joined IQT from Cisco Systems, where he spent a decade working on the development of secure network infrastructures across a variety of the company’s products. Gleichauf, who has more than a dozen patents in network security, served as CTO for the Wireless and Security Technology Group at Cisco, and is respected globally for his work in information security. He previously served as head of product engineering for the WheelGroup prior to its acquisition by Cisco. Earlier, he was with IQ Software, a leader in the development of database report writing tools. Before making the leap into technology, Gleichauf pursued a Ph.D. in Early Human Prehistory at the University of Michigan, where he earned a fellowship and had the privilege of working in East Africa with the celebrated Leakey family.
 
Joshua H. Walker is an Intellectual Property (IP) partner at Greenberg Traurig, LLP, handling all aspects of IP strategy and transactions, and a legal informatics entrepreneur. Josh has built his career at the nexus of law and computer science. Historically, as an analyst, his work has included helping prosecutors convict orchestrators of the 1996 Rwandan genocide to, now, as an attorney, helping many of the largest and most dynamic technology and financial entities in the world improve IP and data rights outcomes in the M&A, licensing, strategic litigation, and network theft contexts. To help clients solve IP governance, transactional, and risk management problems, Josh cofounded the first law and computer science lab in the country (CodeX), at Stanford University, as well as the top “big data” company for IP litigation (Lex Machina; founding CEO & Chief Legal Architect). However, data wins neither cases nor negotiations. We focus on client collaborations employing engineering efficiencies, design thinking, and empirical data to enhance and advance traditional legal practice. Josh’s IP work has been featured in The Wall Street Journal, The New York Times, The Economist, The Financial Times (listed, 2014 Top Ten Legal Innovator for North America), and numerous other publications. He co-taught “IP Analytics, Strategy, and Decision-Making” at Berkeley Law School, and an advanced IP media transactions seminar at Stanford Law School (“SIPX”). He received his J.D. from the University of Chicago Law School, and an A.B. in Conflict Studies (Special Concentrations) from Harvard College, m.c.l.

 

Bob Gleichauf Chief Scientist and Director of Lab41 In-Q-Tel
Joshua H. Walker Co-founder CodeX: The Stanford Center for Legal Informatics
Seminars
Authors
News Type
News
Date
Paragraphs

U.S. national security faces rising challenges from insider threats and organizational rigidity, a Stanford professor says.

Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution, wrote in a new study that in the past five years, seemingly trustworthy U.S. military and intelligence insiders have been responsible for a number of national security incidents, including the WikiLeaks publications and the 2009 attack at Fort Hood in Texas that killed 13 and injured more than 30.

She defines "insider threats" as people who use their authorized access to do harm to the security of the United States. They could range from mentally ill people to "coldly calculating officials" who betray critical national security secrets.

In her research, which relies upon declassified investigations by the U.S. military, FBI and Congress, Zegart analyzes the Fort Hood attack and one facet of the insider threat universe – Islamist terrorists.

In this case, a self-radicalized Army psychiatrist named Nidal Hasan walked into a Fort Hood facility in 2009 and fired 200 rounds, killing 13 people and wounding dozens of others. The shooting spree remains the worst terrorist attack on American soil since 9/11 and the worst mass murder at a military site in American history, she added.

Insights and lessons learned

Zegart's study of insider and surprise attacks as well as academic research into the theory of organizations led her to some key insights about why the Army failed to prevent Hasan's attack when clues were clear:

Image
• Routines can create hidden hazards. People in bureaucracies tend to continue doing things the same old way, even when they should not, Zegart said, and not just in America. In the Cuban missile crisis of 1962, for example, U.S. spy planes were able to spot Soviet missile installations in Cuba because the Soviets had built them exactly like they always had in the Soviet Union – without camouflage.

In the Fort Hood case, she said, bureaucratic procedures kept red flags about Hasan in different places, making them harder to detect.

• Career incentives and organizational cultures often backfire. As Zegart wrote, several researchers found that "misaligned incentives and cultures" played major roles in undermining safety before the Challenger space shuttle disaster.

Zegart's earlier research on 9/11 found the same dynamic played a role in the FBI's manhunt for two 9/11 hijackers just 19 days before their attack. Because the FBI's culture prized convicting criminals after the fact rather than preventing disasters beforehand, the search for two would-be terrorists received the lowest priority and was handled by one of the least experienced agents in the New York office.

• Organizations matter more than most people think. Robust structures, processes and cultures that were effective in earlier periods for other tasks proved maladaptive after 9/11.

In the case of the Fort Hood attack, the evidence suggests that government investigations, which focused on individual errors and political correctness (disciplining or investigating a Muslim American in the military) identified only some of the root causes, missing key organizational failures.

Hasan slipped through the cracks not only because people made mistakes or were prone to political correctness, but also because defense organizations "worked in their usual ways," according to Zegart.

Adapting to a new threat

In terms of organizational weaknesses, Hasan's Fort Hood attack signaled a new challenge for the U.S. military: rethinking what "force protection" truly means, Zegart said. Before 9/11, force protection reflected a physical protection or hardening of potential targets from an outside attack. Now, force protection has evolved to mean that the threats could come from within the Defense Department and from Americans, she added.

"For half a century, the department's structure, systems, policies and culture had been oriented to think about protecting forces from the outside, not the inside," Zegart wrote.

In the case of Hasan, the Defense Department failed in three different ways to identify him as a threat: through the disciplinary system, the performance evaluation system and the counter-terrorism investigatory system run jointly with the FBI through Joint Terrorism Task Forces.

"Organizational factors played a significant role in explaining why the Pentagon could not stop Nidal Hasan in time. Despite 9/11 and a rising number of homegrown Jihadi terrorist attacks, the Defense Department struggled to adapt to insider terrorist threats," Zegart wrote.

Difficult to change

Another problem was that the Pentagon faced substantial manpower shortages in the medical corps – especially among psychiatrists. So the Defense Department responded to incentives and promoted Hasan, despite his increasingly poor performance and erratic behavior.

In addition, Zegart found the Defense Department official who investigated Hasan prior to the attack saw nothing amiss because he was the wrong person for the job – he was trained to ferret out waste, fraud and abuse, not counterterrorism, which is why he did not know how to look for signs of radicalization or counterintelligence risk.

"In sum, the Pentagon's force protection, discipline, promotion and counter-terrorism investigatory systems all missed this insider threat because they were designed for other purposes in earlier times, and deep-seated organizational incentives and cultures made it difficult for officials to change what they normally did," she wrote.

Zegart acknowledges the difficulties of learning lessons from tragedies like 9/11, the NASA space shuttle accidents and the 2009 Fort Hood shooting.

"People and organizations often remember what they should forget and forget what they should remember," she said, adding that policymakers tend to attribute failure to people and policies. While seemingly hidden at times, the organizational roots of disaster are much more important than many think, she added.

Hero Image
dod flkr ambulance fort hood us army photo jeramie sivley
Medics treat injured service members at Fort Hood, Texas – site of the worst mass murder at a military installation in U.S. history.
U.S. Army / Jeramie Sivley
All News button
1
Paragraphs

In an unusually well-documented contribution on Russian secret intelligence, David Holloway posits reasons for Stalin’s unpreparedness in 1940-1941. This, it is fair to say, has long been an obsessive object of interest and study in Russia, because it made all the difference to the course of the war that followed from June 1941. Rather than rushing into moral judgments about the régime, Holloway instead takes a cool look at what information came in to Stalin and allows for the fact that not all the incoming intelligence data were consistent. And in respect of revelations about U.S. construction of the atomic bomb, Holloway shows that Stalin once again consciously distanced himself from the findings of the intelligence services in reaching a final judgment. Whereas in the former case, it nearly led to disaster; in respect of the latter, Stalin was undoubtedly correct.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
David Holloway
Authors
News Type
News
Date
Paragraphs

U.S. Sen. Dianne Feinstein (D-Calif.) told a Stanford audience Thursday that mass surveillance programs are designed to find possible terrorists, not snoop on American citizens.

She pointed to the rise of groups like ISIS – now in 12 countries, she said – and the gruesome spectacles of their brand of terrorism as proof that the world is more dangerous than ever.

"I don't think during my lifetime I've ever seen the degree of evil that is out there in the world today," said Feinstein, noting mass murders and beheadings of innocent civilians, including children. "These [surveillance] programs aim to protect this country, pure and simple. They're not aimed to go after Americans."

Feinstein was the final speaker in the yearlong series titled "The Security Conundrum." She spoke in a colloquy format with Stanford's Philip Taubman, consulting professor at Stanford's Center for International Security and Cooperation (CISAC) and former Washington bureau chief of the New York Times. 

Sen. Dianne Feinstein was the final speaker in the yearlong series titled 'The Security Conundrum.' 

Image

The discussion comes during a national debate on how to strike the right balance between security and liberty when technology now makes it possible for the government to collect phone and email data on citizens. With the USA Freedom Act expiring on June 1, Congress is considering legislation to reform the National Security Agency's mass surveillance program.

"We recognize that some reform is in order," said Feinstein, who plans to fly back to Washington for a rare Sunday Senate session on the expiring law.

"The big reform is that the data would be held by the phone companies and not the NSA," she said. If red flags resulted in queries, then warrants would have to be approved.

She took issue with descriptions of those programs as "mass surveillance." In 2013, warrants were sought in just 12 cases out of 288 queries about possible suspects. She said it is a selective process to find a suspect who raises enough concerns to trigger a query.

Feinstein's talk, titled "Congressional Oversight and the Intelligence Community," was held at CEMEX Auditorium.

Feinstein served as chair of the Senate Select Committee on Intelligence from 2009 to 2014 and is now the ranking minority member. She played a leading role in the Senate investigation of the Central Intelligence Agency detention and interrogation program following the terrorist attacks of Sept. 11, 2001.

'Miscarriages of justice'

Taubman asked Feinstein if she was worried that the surveillance programs could track law-abiding citizens, like more primitive efforts in the 1960s and '70s that targeted political and civil rights groups. Feinstein acknowledged that abuses happened in the past, but that congressional oversight of the programs – as is the case today – is essential to a fair process.

In particular, Feinstein decried the government's interrogation process of terrorism suspects at Guantanamo Bay that resulted in claims of torture. Her committee reviewed considerable intelligence data on that issue. "We found there were terrible miscarriages of justice," she said.

She described intelligence agencies as akin to "presidents" in the power they wield. "How do you make these agencies follow the law?" she asked. The only way is to "get in deep enough and close enough" to make it impossible for them to tell an "untruth" in a congressional hearing, she said.

Taubman suggested that it's extremely hard for a few dozen congressional staffers and members to oversee large agencies that employ thousands of people. "You're outgunned," he said.

Feinstein replied that "we have to look beyond the hearing." She said bipartisanship and a focus on producing effective legislation that addresses real problems is critical. "That's the nature of what we do."

She added that no other country in the world has an intelligence committee with as strong an oversight function as does the United States. China and Russia, for example, have growing intelligence agencies but no one watching them.

Feinstein agreed with Taubman that too much secrecy is detrimental to a democratic society. She said she wished she would have held more open, public meetings while in charge of the intelligence committee.

Feinstein expects that renewing the legislation will depend on perhaps three votes in the Senate. "It's possible. If not, the law ends at midnight and that creates a chink in our armor. There's no question in my mind," she said.

Feinstein said there is a "backup" bill that is similar to the USA Freedom Act, but she would prefer to reform the original legislation.

Taubman asked her if the surveillance efforts were actually preventing terrorist acts.

Feinstein said that people are arrested every week under the program, and that relevant information also goes to other countries to help them.

But more than ever, she noted, it's the private sector – not the government – that is extremely enterprising in collecting vast amounts of data from people, such as how they use their cellphones or surf the web.

CIA, China an issue

A California Democrat and Stanford graduate, Feinstein has served in the U.S. Senate since 1993.

When asked why she continues to work as a public servant, she said that 9/11 was a pivotal point in her life. That tragic event and flawed intelligence regarding the justification for the war in Iraq convinced her that a senior position on the intelligence committee would give her a way to help protect her country and fellow citizens.

Taubman expressed amazement that the CIA was actually spying on Feinstein's committee during its review of the hostage intelligence data.

"It was a real dust-up, there's no question about. I think it was a real violation of the separation of powers," she said.

On other issues, such as the rise of China, Feinstein said that country is now practicing "soft power" and flexing its muscles in the South China Sea. Plus, China is "eating our lunch" in regard to cybersecurity.

"I am very worried," she said. "I do not see China as a necessary enemy, but it seems to be going the opposite direction now."

In addition to CISAC, sponsors of "The Security Conundrum" series included the Freeman Spogli Institute for International Studies, the Hoover InstitutionStanford Continuing StudiesStanford in Government and Stanford Law School.

The series "was designed to be an open inquiry in the ongoing debate on how to balance security and liberty," said Amy Zegart, co-director of CISAC and a senior fellow at the Hoover Institution.

This year the series has also included Gen. Michael Hayden, the former director of the National Security Agency and the CIA; journalist Barton Gellman; and former U.S. Sen. Mark Udall.

Hero Image
camera logo 0
All News button
1
Authors
News Type
News
Date
Paragraphs

U.S. Sen. Dianne Feinstein will speak at Stanford next Thursday, May 28, about striking a balance between security and liberty at a time when Congress is considering legislation to reform the National Security Agency's mass surveillance programs.

Feinstein, D-Calif., is the final speaker in the yearlong Security Conundrum lecture series. She will engage in conversation with Stanford's Philip Taubman, a consulting professor at Stanford'sCenter for International Security and Cooperation and former Washington bureau chief of the New York Times.

Feinstein is expected to discuss Congress' role in overseeing America's intelligence agencies, such as the National Security Agency and the Central Intelligence Agency, and laws that govern their operations. The idea behind the Security Conundrum series is to invite national experts to Stanford to explore issues raised by the federal government's mass surveillance programs, especially in the area of national security, privacy and civil liberties.

The talk, titled "The Security Conundrum: An Evening with Senator Dianne Feinstein," is free and open to the public. It starts at 6:30 p.m., and will be held at the Cemex Auditorium, 641 Knight Way on campus. No TV cameras or film equipment are permitted. Advance registration is required – register here for tickets.

Feinstein has been at the center of the debate about the NSA since Edward Snowden's disclosures exposed an array of mass surveillance programs in 2013. She served as chair of the Senate Select Committee on Intelligence from 2009-2014 and is now the ranking minority member.

Feinstein also played a leading role in the Senate investigation of the CIA detention and interrogation program following the terrorist attacks of Sept. 11, 2001. She pressed to make the Senate report public, and some parts of it were eventually released. A Stanford graduate, Feinstein has served in the U.S. Senate since 1993.

The Security Conundrum is co-sponsored by Stanford's Freeman Spogli Institute for International Studies, the Center for International Security and Cooperation, the Hoover Institution, Stanford Continuing Studies, Stanford in Government and Stanford Law School.

Amy Zegart, CISAC co-director and a senior fellow at the Hoover Institution, has said CISAC and the Hoover Institution would conduct a similar series on international cybersecurity challenges in the coming academic year.

The Security Conundrum series for this past year included Gen. Michael Hayden, the former director of the National Security Agency and the CIA; journalist Barton Gellman; and former U.S. Sen. Mark Udall.

Hero Image
15243 feinstein news
Sen. Dianne Feinstein, D-Calif., will appear at Stanford on May 28 as the final speaker in the university's Security Conundrum series.
Becky Hammel
All News button
1
-

The video recording of this event can be watched on YouTube: https://www.youtube.com/watch?v=j57OuqbtD9Q&feature=youtu.be

In an age of terrorism, where should a democratic society draw the line on government surveillance? Edward Snowden’s explosive disclosures about the National Security Agency’s intelligence-collection operations have ignited an intense debate about the appropriate balance between security and liberty in America. In a special series this year, nationally prominent experts will explore the critical issues raised by the NSA’s activities, including their impact on our security, privacy, and civil liberties. This timely series will address one of the most challenging questions the nation faces today as it tries to strike the right balance between safety and liberty. The Security Conundrum will look behind and beyond the headlines, examining the history and implementation of the NSA operations, the legal questions generated by them, the media’s role in revealing them, and the responsibility of Congress to oversee them. It will also address the NSA’s uneasy and evolving relationship with Silicon Valley. Each session in the series is designed to explore these issues from a different vantage point. The guest speakers, in conversation with Stanford scholars, will probe the problems, explain the political, legal, and technological contours of the NSA actions, and outline ways to preserve the nation’s security without sacrificing our freedoms. 

 

An Evening with U.S. Senator Dianne Feinstein

Senator Dianne Feinstein has been at the vortex of the debate about Edward Snowden’s disclosures since he exposed an array of National Security Agency surveillance programs in 2013. As chair of the Senate Select Committee on Intelligence from 2009-2014, and now the ranking minority member, Senator Feinstein has tried to help the nation strike the appropriate balance between security and liberty as she and her Senate colleagues examined NSA practices in light of the Snowden materials. She also played a leading role in the Senate investigation of the Central Intelligence Agency detention and interrogation program following the terrorist attacks of Sept. 11, 2001. Senator Feinstein pressed to make the Senate report public. Some parts of the study were released in December 2014. A California Democrat and Stanford graduate, she has served in the Senate since 1993.

In her May 28 appearance at Stanford, Senator Feinstein will discuss the Congressional role in overseeing America’s intelligence agencies, including the NSA and CIA, and establishing the laws that govern their operations. The format for her appearance will be a colloquy with Philip Taubman, a consulting professor at Stanford’s Center for International Security and Cooperation and former Washington bureau chief of The New York Times. 

To register for a free ticket, please follow this link.

The Security Conundrum is co-sponsored by Stanford’s Freeman Spogli Institute for International Studies, the Center for International Security and Cooperation,the Hoover Institution, Stanford Continuing Studies, Stanford in Government, and the Stanford Law School.

CEMEX Auditorium

Knight Management Center

641 Knight Way, Stanford University

Dianne Feinstein U.S. Senator from California Speaker United States Senate
0
Affiliate
Taubman_Phil.jpg

Philip Taubman is affiliated with the Center for International Security and Cooperation at Stanford University. Before joining CISAC in 2008, Mr. Taubman worked at the New York Times as a reporter and editor for nearly 30 years, specializing in national security issues, including United States diplomacy, and intelligence and defense policy and operations. He served as Moscow bureau chief and Washington bureau chief, among other posts. He is author of Secret Empire: Eisenhower, the CIA, and the Hidden Story of America's Space Espionage (2003), The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb (2012),  In the Nation's Service: The Life and Times of George P. Shultz (2023), as well as co-author (with his brother, William Taubman) of McNamara at War: A New History (2025).

Date Label
Philip Taubman Journalist Moderator CISAC
Lectures
Authors
News Type
News
Date
Paragraphs

Former U.S. Sen. Mark Udall remembers how members of Congress gathered on the steps of the Capitol Building on the day of the 9/11 terrorist attacks. They clasped one another’s hands and spontaneously broke out singing, “God Bless America.”

It was a moving moment of patriotic bipartisanship. “It was our generation’s Pearl Harbor,” he recalled, and politics were momentarily subsumed by love of nation.

Then it was time to investigate and bring those responsible to justice.

“For many of us who were policymakers, it was time to take a crash course in understanding the tools of terrorism, trying to penetrate who al-Qaida was, who was this figure, Osama bin Laden – and then how do we respond?”

But the government went into overdrive, the Colorado Democrat believed, and put civil liberties at risk. He recalled other decisions in American history – such as the internment of Japanese-Americans during World War II – that were made in panic and secrecy.  

“It became clear to me that bin Laden’s motive was to create greater suspicion in the world, to incent us to build higher and higher walls,” he told a sold-out crowd at CEMEX Auditorium on Thursday night. His talk was part of Stanford “Security Conundrum” lecture series co-sponsored by CISAC, the Hoover Institution, the Law School, Stanford in Government and Continuing Studies.

“And in an interesting way, it led me to look at civil liberties and civil rights, which are the biggest, baddest weapons that we have,” he said in conversation with Philip Taubman, a CISAC consulting professor and a former reporter at The New York Times.

Taubman is one of the organizers of the special series has brought together nationally prominent experts this academic year to explore the critical issues raised by the National Security Agency's activities, including their impact on security, privacy and civil liberties.

On April 10, the speaker will be Judge Reggie Barnett Walton, former presiding judge of the Foreign Intelligence Surveillance Court, known as the FISA court. California Sen. Dianne Feinstein, vice chair of the Senate Intelligence Committee, will close the series before the end of the academic year.

Udall told the audience that in the powerful wake of fear that swept the nation following the 9/11 attacks, the House was presented with the Patriot Act “to strengthen and broaden our capacity to surveil those who might do us harm.”

Image
udall2

 

Udall was a congressman from 1999 to 2009 and then senator from 2009 until losing his seat in the mid-term elections last year. He had been a one-term congressman when the Bush administration put the Patriot Act to a vote on Oct. 24, 2001.

He was one of only 66 House members to vote against the act. It would then also pass through the Senate the following day.

Udall called his no-vote an unpopular one and a lonely period of his political life. But he believed the Act had been hastily drafted without due process and that some of the law’s provisions could lead to violations of privacy and freedoms.

“I was very conscious of what Ben Franklin famously said. He said that a society that trades essential liberties for short-term security deserves neither,” Udall said. “And I believed that we were strong enough to stand behind the civil liberties included in the First Amendment, the Fourth Amendment and the Fifth Amendment – including the explicit right to privacy – and that we would outlast these adversaries that were in front of us by hewing to those principles, not abandoning those principles.”

Udall also voted against the Obama administration’s four-year extension of three key provision of the act in 2011, which included roving wiretaps, searches of business records and conducting surveillance of those suspected of terrorist-related activities.

He would then gain notoriety for his vocal opposition to NSA surveillance programs in the wake of the Edward Snowden disclosures of June 2013. He became one of the staunchest critics of the U.S. spy agency for conducting massive, warrantless data grabs on millions of Americans without their knowledge.

Udall said the NSA gathers more than 700 million data sets from phone calls each day.

“I was told, don’t worry Mark, this is metadata. We just collect it; we don’t do anything with it,” Udall said. “But I realized that it wasn’t just metadata, that it was how that metadata was being used and the fact that it was a secret program and under a secret interpretation of the law.”

Udall said the metadata can be manipulated for form a pattern of an individual’s behavior, of his religious and political beliefs, his medical issues, his likes and dislikes.

“We haven’t done anything with this data and that’s all well and good,” he said. “But history shows us that the government will overreach, particularly when it operates in secret. The Fourth Amendment was put in place for a reason.”

He also worries the metadata program has undercut the trust in the intelligence community.

“I want to be clear: We need to gather intelligence,” he said. “There are forces at play in the world that would do us great harm. But again, we ought to gather that intelligence in ways that fit with what the public understands.”

Udall called on the audience to push for transparency reforms to the FISA court – which oversees requests by the NSA and FBI to issue surveillance warrants against suspected foreign intelligence agents. From 1999 to 2012, the court has granted nearly 34,000 warrants; only 12 have been denied.

Udall believes that privacy, which is implicit in the Bill of Rights, is essential to all other American freedoms that are protected by law.

“This has long-term and important ramifications about how we look at ourselves as Americans,” he said. “We all need to be in the mix; we all need to be having these discussions to be ever-vigilant and protect these fundamental freedoms.”

 

Hero Image
udall 1
Former U.S. Sen. Mark Udall addresses "Security Conundrum" talk on NSA surveillance programs at CEMEX Auditorium on April 2, 2015.
Rod Searcey
All News button
1
Authors
News Type
News
Date
Paragraphs
 

Former U.S. Sen. Mark Udall gained notoriety for his vocal opposition to National Security Agency surveillance programs in the wake of the Edward Snowden disclosures of June 2013.

Before losing his seat in the mid-term elections last year, the senior senator from Colorado had become one of the staunchest critics of the U.S. spy agency for conducting massive, warrantless data grabs on millions of Americans without their knowledge.

Even before the Snowden leaks, Udall had warned on the Senate floor in 2011 that the Patriot Act was being interpreted in a way to allow domestic surveillance activities that many members of Congress and the American public do not understand.

"Americans would be alarmed if they knew how this law is being carried out," he told fellow senators before he introduced amendments to the Patriot Act that would have secured tougher privacy mechanisms. The act was renewed without the amendments.

Udall – who served on the Senate's Intelligence and Armed Services committees – will be in conversation with Center for International Security and Cooperation Co-Director Amy Zegart Thursday, April 2, at 7:30 p.m. in CEMEX Auditorium as part of Stanford's Security Conundrum lecture series. The event is open to the public but an RSVP is required by 5 p.m. April 1.

The special series has brought together nationally prominent experts this academic year to explore the critical issues raised by the NSA's activities, including their impact on security, privacy and civil liberties. The series ends April 10 with a public conversation with Judge Reggie Barnett Walton, former presiding judge of the Foreign Intelligence Surveillance Court, known as the FISA court.

The Foreign Intelligence Surveillance Act of 1978 empowered the FISA court to oversee government requests for surveillance of foreign intelligence agencies. During its existence, the court has granted more than 30,000 warrants; it has denied only 11.

Walton, in conversation with Stanford Law School Professor Jenny Martinez, will explain the role that the secretive institution attempts to play in maintaining the balance between civil liberties and national security.

"We're delighted to end the Security Conundrum series with a view from Congress and the courts," said Zegart, who is also a senior fellow at the Hoover Institution. "Holding serious campus-wide conversations about issues of national importance is an essential part of the Stanford experience."

Zegart said CISAC and Hoover would conduct a similar series on international cybersecurity challenges in the coming academic year.

Udall, the third speaker in the series, also advocated for the declassification of the Senate Intelligence Committee's study on the CIA's enhanced interrogation program. The post-9/11 program allowed the government to ship suspected terrorists to secret overseas prisons and subject them to waterboarding and other torture techniques.

Gen. Michael Hayden, the former director of the NSA and CIA who has defended the government surveillance programs, kicked off the Security Conundrum series in October. In that talk, he said the metadata collection "is something we would never have done on Sept. 9 or Sept. 10. But it seemed reasonable after Sept. 11. No one is doing this out of prurient interests. No – it as a logical response to the needs of the moment."

The second speaker in the series, journalist Barton Gellman, gave a detailed account of his relationship with former NSA contractor Snowden and how he worked with him to reveal the details of the NSA's global and domestic surveillance programs.

One of the first Snowden revelations, Gellman said, was the top-secret PRISM surveillance program, in which the NSA tapped into the servers of nine large U.S. Internet companies, including Google, Microsoft, Yahoo and Facebook. Snowden said he believed the extent of mass data collection on American citizens was far greater than what the public knew.

The PRISM program allows the U.S. intelligence community to gain access from the tech companies to a wide range of digital information, including audio, video chats, photographs, emails and stored data, that enables analysts to track foreign targets. The program does not require individual warrants, but instead operates under the broad authorization of the FISA court.

"I asked him very bluntly, 'Why are you doing this?'" Gellman said of Snowden.

"He gave me very persuasive and consistent answers about his motives. Whatever you think of what he did or whether or not I should have published these stories, I would claim to you that all the evidence supports his claim that he had come across a dangerous accumulation of state power that the people needed to know about."

 
Hero Image
walton Federal Intelligence Surveillance Court
All News button
1
Subscribe to Intelligence