Subtitles section Play video
JONATHAN ZITTRAIN: Well, good morning.
My name is Jonathan Zittrain.
I teach here at the law school.
And we have a special treat today.
In some ways, it is a hearkening back
to the past of the '70s and '80s when there was a creature
called Socratic dialogue.
A guy named Fred Friendly got things started on PBS.
You may have seen such things.
It's people with plaid blazers--
I guess this is a subtle plaid --would pose hypotheticals
to one another and to a distinguished panel of guests,
which we have managed to replicate here,
and to see where the hypothetical plays out.
And because it's hypothetical, we
have the freedom to speak our minds,
how we would actually process it were we in the role
that we are in.
We have a number of folks who we're about to introduce them
in their current roles.
We can see how much wisdom and thought
they are going to bring to today's hypothetical.
First a warning that should not be needed on a panel involving
surveillance.
But we are all being surveilled.
This is being webcast live to an audience of indeterminate size
and may be used against you at any later time.
And I also just want to thank a number of the people that
have been involved in pulling together today's hypothetical.
That includes Samantha Bates, Jordy Winestock Adi Kamdar,
Lydia Licklider and others from our rare search group,
John Bowers, Annabel Kupke.
Who else am I missing?
Anybody else to thank for pulling together
our hypothetical today?
Really?
I'm sure I'll hear about it later,
but thank you all for having done it.
And without further ado, let's get
started but first let's introduce people
in their real world guises.
Alex MacGillivray, class of 2000, let's start with you.
You have a, not only checkered, but colored and kaleidoscopic
history with--
a coder before law school a coder during law school.
Then off to--
ALEXANDER MACGILLIVRAY: I really should just let you struggle.
This would be the one time that you--
JONATHAN ZITTRAIN: Well, you ended up at Twitter.
But I feel like there was something in between.
Was it MTV?
ALEXANDER MACGILLIVRAY: I did Wilson Sonsini and then Google.
JONATHAN ZITTRAIN: Wilson Sonsini, then
Google as a lawyer, working on the Google Books project.
ALEXANDER MACGILLIVRAY: Yep.
JONATHAN ZITTRAIN: Which was a great attempt at a success.
Then [INAUDIBLE],, then general council of Twitter,
which everybody loves.
And then the White House, which everybody loves.
And now in Spain convalescing.
ALEXANDER MACGILLIVRAY: Unemployment,
which everybody loves.
JONATHAN ZITTRAIN: So thank you for coming out
of your senescence to join us today on the panel.
Cindy Cohn, currently executive director of the Electronic
Frontier Foundation.
By way of disclosure I should say I'm on the board of that.
Cindy, what else should we know about your background?
CINDY COHN: Oh, I don't know.
I guess you might want to know that in the 1990s,
I helped free encryption from government regulatory control,
making an argument that code is speech protected by the First
Amendment and the government's regulations on code
didn't meet the First Amendment test.
JONATHAN ZITTRAIN: The days of the clipper chip.
CINDY COHN: That would be crypto wars part un.
Now we're in deux.
JONATHAN ZITTRAIN: Which we are now farther along the line.
CINDY COHN: Yes.
JONATHAN ZITTRAIN: Well, thank you for your service.
Alex Abdo, former torts student extraordinaire,
who then went on to the American Civil Liberties Union,
now at the brand new Knight Institute
for the First Amendment.
Any highlights we should know of from your work?
ALEX ABDO: If you think the president shouldn't block
critics on Twitter, then you should follow our work
at the Knight Institute.
JONATHAN ZITTRAIN: That's right.
There's a current suit challenging
the action of @realDonaldTrump blocing people.
ALEX ABDO: That's right.
JONATHAN ZITTRAIN: Got it.
For which the remedy they actually want
is to be able to read his tweets.
Or is it more the direct messaging they're looking for?
ALEX ABDO: There's a bit more to it than that.
JONATHAN ZITTRAIN: Fair enough.
There is a constitutional principle at stake.
I want the right not to read the tweets that I'm allowed to see.
Got it.
Bruce Schneier, cryptologist, cryptographer--
I never knew the difference-- security
technologist, Dungeons and Dragons player extraordinaire,
chef.
What else should we know?
BRUCE SCHNEIER: I like to think I
work in the intersection of security technology and policy,
writing about privacy and security and data.
I don't know.
I teach here now and fellow at Berkman Klein Center.
JONATHAN ZITTRAIN: Wonderful.
You are indeed at the intersection.
Thank you.
David Sanger from The New York Times.
What should we know of your background?
DAVID SANGER: Let's see, went to college here.
Foreign correspondent for many years.
Came back to Washington.
I'm in year 23 of a three-year assignment to Washington.
So when you get stuck in the swamp, you're really stuck.
And I've covered the White House, covered technology.
I cover a lot of national security issues.
I have had more leak investigations directed at me
than I probably would care to recall.
JONATHAN ZITTRAIN: All of them earned.
DAVID SANGER: All of them earned, I hope.
I hope.
And I teach national security here at the Kennedy School.
JONATHAN ZITTRAIN: Perfect.
Thank you.
Daphna Renin, assistant professor
here at the law school, former Department of Justice official,
yes?
DAPHNA RENIN: Yes.
JONATHAN ZITTRAIN: In the Office of Legal Counsel was it?
DAPHNA RENIN: Yes.
From 2009 to 2012, I was there, first
in the Deputy Attorney General's office
and then in the Office of Legal Counsel.
JONATHAN ZITTRAIN: And what is the Office of Legal Counsel?
Why does the Justice Department need a lawyer?
DAPHNA RENIN: Well, the Office of Legal Counsel
is the lawyer to more than the Justice Department.
It's the office located inside DOJ
that advises the White House, the intelligence community,
the executive branch agencies, and DOJ
on complex constitutional and statutory questions.
JONATHAN ZITTRAIN: Got it.
Does the OLC have a lawyer?
That's it.
The buck stops with the OLC.
DAPHNA RENIN: That's right.
JONATHAN ZITTRAIN: Got it.
Matt Olsen, class of 88, former general counsel
of the National Security Agency, former director of the US
Counterterrorism Center.
Anything else we should know about your background?
MATTHEW OLSEN: Probably a proud card
carrying member of the deep state after many, many years
doing that.
JONATHAN ZITTRAIN: Isn't it like being a hipster?
If you say that's what you are, [INAUDIBLE]..
MATTHEW OLSEN: That's it.
You own it.
You embrace that role.
JONATHAN ZITTRAIN: I see.
MATTHEW OLSEN: And I think I might
be one of the few government people,
as the introductions go around.
So I'm expecting to--
JONATHAN ZITTRAIN: You have quite a burden to carry.
MATTHEW OLSEN: --to have a lot on my shoulders.
JONATHAN ZITTRAIN: Yeah.
Great.
Thank you.
Macandrew-- Andrew McLaughlin, class of '94.
Former secretary of the board of the Internet Corporation
for Assigned Names and Numbers, ICAN.
ANDREW MCLAUGHLIN: That is true.
That's not really what my job was.
But if you want to pull out the weirdest title in my quiver--
JONATHAN ZITTRAIN: Generally dyspeptic and combative.
It's important to point out, Jonathan,
that you and I have shared a residence for something
like eight years of our adult lives.
JONATHAN ZITTRAIN: But not currently.
At least to my knowledge.
MATTHEW OLSEN: It's true, but so my combativeness with you
is earned.
JONATHAN ZITTRAIN: Yeah.
Very good.
MATTHEW OLSEN: Need I bring up--
JONATHAN ZITTRAIN: We were former law school roommates
and DC working roommates.
MATTHEW OLSEN: Also true.
JONATHAN ZITTRAIN: Yes, and I appreciate your lending me
your car all of times.
MATTHEW OLSEN: I'm not going to bring up the issue
of the breakfast bars again.
JONATHAN ZITTRAIN: Thank you again.
I will remind you this is being webcast.
And ended up working at Google, as basically
Google Secretary of State.
Is that the right description?
MATTHEW OLSEN: Policy guy.
JONATHAN ZITTRAIN: A policy guy.
Nothing to see here, folks, just a small cute little fox
in the chicken coop.
And then on to the White House, yes?
MATTHEW OLSEN: That's right.
JONATHAN ZITTRAIN: Deputy Chief Technology Officer
of the United States?
MATTHEW OLSEN: That's right.
My role was to screw up a bunch of stuff
that Alex then showed up to fix later.
JONATHAN ZITTRAIN: Got it.
Well, we hope you can replicate that again on the panel today.
And also more recently, you've been
at Betaworks which is an incubator/investor in a number
of companies, which also has made you,
I guess, CEO of such companies as Instapaper.
MATTHEW OLSEN: That's true.
Yeah.
JONATHAN ZITTRAIN: Thank you.
MATTHEW OLSEN: Yeah, that's right.
JONATHAN ZITTRAIN: Very good.
And now you are director of the new Center
for Innovation at Yale.
MATTHEW OLSEN: At Yale, that's right.
And off to the side, we've built kind
of like an investment firm for startups
that help Democrats win elections.
That's the thing I've been doing since November.
JONATHAN ZITTRAIN: Got it.
How is it going so far?
MATTHEW OLSEN: Obviously an overwhelming triumph.
JONATHAN ZITTRAIN: If they lose, do you still win?
MATTHEW OLSEN: No.
JONATHAN ZITTRAIN: Well, at least
the incentives are aligned.
MATTHEW OLSEN: None of us win.
JONATHAN ZITTRAIN: Very good.
All right.
So that is our opening panel.
And it's not only helpful to know their backgrounds,
but also to realize that for all of the organizations and roles
we've just described, our panel will emphatically not
be representing any of them as we get into our hypothetical.
And speaking of getting into a hypothetical, here it is.
David Sanger, you're sitting at your desk
at The New York Times.
Your plain old landline telephone rings.
You hear the shielded voice that's
been distorted by some dime-store, museum-of-spy kind
of thing.
This person says, I've got some neat documents for you
that you might be interested in.
It shows surveillance power abuse by a private company.
Are you interested in hearing more?
DAVID SANGER: Interested in hearing more, but the chances
that my landline would be either answered
or would work under current circumstances is pretty low.
But we'll take it.
JONATHAN ZITTRAIN: I will allow you to retcon the hypothetical
to be you receive an email from a Pluto mail
address from somebody who purports
to work for a small firm that few
have heard of called Faceplant.
And Faceplant is kind of one of the social network things.
It's like Peach, even better.
Remember Peach?
DAVID SANGER: I do, actually.
JONATHAN ZITTRAIN: Peach had its day in the sun,
but this is Faceplant.
And it allows people to exchange messages, to post stuff.
It's got a little Dropbox style functionality.
And they're ready to send you some documents.
Are you going to go ahead and take them?
DAVID SANGER: We'll take them encrypted.
JONATHAN ZITTRAIN: You'll take them encrypted.
And you have it, is it now easy peasy
to get encrypted documents to The New York Times?
DAVID SANGER: Easy peasy.
JONATHAN ZITTRAIN: Or in this case,
to The Ames County Gazette.
DAVID SANGER: I don't know how well Ames County's worked
on encryption, but you know, thanks to Cindy,
we were good on encryption now.
Yeah.
JONATHAN ZITTRAIN: Got it.
All right.
So this person sends along to you
a document that's going to be a little hard
to read on our screen.
But it appears to be from the Ames County Police Department,
the Crimes Against Children Division.
And it is addressed to a Simon Greenleaf,
who is director of law enforcement
relations at Faceplant.
And it appears to be requesting an urgent search
to be performed across the platform because
of a credible threat of violence against a person
in the real world, in fact, against a kid.
And they're asking that it go all the way across all
of Faceplant servers.
And what they're looking for is attached to this letter.
And, by the way, we see on the letter
that Simon Greenleaf, the recipient, has said,
yes, let's make it happen.
So he scrawled at the bottom an approval
for this kind of search.
And here's the exhibit.
It's a happy kid at a playground,
and there's a circle around him.
And it says, I know who you care about, and I will hurt them.
And apparently the parent of this child
received this, sent it to the Ames County Police.
The Ames County Police have, in turn, asked
Faceplant to search all of their records of all of their users.
And if this photo, exactly including
the circle and the menacing message
in that format, bit by bit--
if that is not found, nothing comes back.
If it is found, they may have a few users for whom they
can then do further process.
And it looks from this letter as if Faceplant
went ahead and did this search.
So I'm wondering first, on a scale of meh to 10,
how much is this a new story for you?
DAVID SANGER: It's probably a little closer to meh than 10.
But one of the first questions would be,
is this search driven by the terms of service at Faceplant?
Or is this something that would actually require a warrant?
JONATHAN ZITTRAIN: It appears to have
been done from that letter with no warrant at all.
It was just a request.
DAVID SANGER: So I'm assuming from that,
though we would have to go figure this out
with Faceplant, that they did this based
on their terms of service.
JONATHAN ZITTRAIN: Well, that's a good question.
Are you going to call Faceplant?
DAVID SANGER: I might after I learned a little bit more
about it.
But you wouldn't want to make Faceplant your first call
on something like that.
JONATHAN ZITTRAIN: Who would you call?
Would you read the terms of service first?
DAVID SANGER: You probably would,
or you'd go to somebody-- we probably have a reporter
someplace who covers Faceplant.
We may have five.
JONATHAN ZITTRAIN: Oh, it's a small startup.
Nobody's heard of it.
DAVID SANGER: Oh, OK.
JONATHAN ZITTRAIN: It's like Peach.
DAVID SANGER: Right.
But the other thing that we would go
do is try to go talk to the source
here and understand how the source got
the document a little bit, what the source's motives were
before we leaped off into the wild world of Faceplant.
JONATHAN ZITTRAIN: You've written back to the source.
The source wrote back to you and says, I'm so sorry.
I have to shampoo my cat.
I'll be back in a week and goes silent.
But you do have the documents.
And you've looked at the Face plant terms of service,
which, as typical, I think--
I don't know.
Maybe I should actually ask.
Who here has had fun drafting terms of service?
Alex, you're a terms of service person.
ALEXANDER MACGILLIVRAY: I think the Faceplant terms of service
say, all your base belong to us.
JONATHAN ZITTRAIN: Clever.
ALEXANDER MACGILLIVRAY: More or less that.
JONATHAN ZITTRAIN: And by that you
mean, we can do what we want when we want?
ALEXANDER MACGILLIVRAY: Yes.
JONATHAN ZITTRAIN: In which case,
why do we ever need a warrant?
Why do we ever need a warrant?
ALEXANDER MACGILLIVRAY: Well, so I
think the way a lot of these companies
think about the terms of service versus their internal policies
with respect to talking to law enforcement,
the terms of service are much more about protecting
from class actions from users.
Which is why they become extremely defensive,
non-user friendly documents for the most part.
There are exceptions.
But the way they think about it internally
in terms of responding is much different.
So they might have a terms of service that
allows them a broad latitude.
But internal policies-- and those policies
may even be public policies-- that
would say that they wouldn't respond to something like this
without a warrant.
JONATHAN ZITTRAIN: So let's say the terms of service,
translating your all your base comment,
basically say, in matters of protecting the public safety,
public property, and our own networks,
we reserve the right to perform searches
in support of those goals.
That's the kind of thing you're thinking of that's
class action immunity?
ALEXANDER MACGILLIVRAY: Yeah, a lot of them
will have even specific reference to child protection.
So that they're trying to wrap it in a particularly
resonant moral.
JONATHAN ZITTRAIN: And I feel like you've now made yourself
general counsel of Faceplant.
ALEXANDER MACGILLIVRAY: I really hope not.
I thought that as Andrew's job.
JONATHAN ZITTRAIN: No, no.
You've stepped up.
And this wasn't your letter though.
This was before your time.
But now you're in the hot seat, knowing
that this letter, which I guess maybe you
hear about if David has called you yet,
but he seems to be holding back.
DAVID SANGER: I won't hold back for too long
if we come to the conclusion fairly quickly this could well
be within the terms of service.
And you want to figure out if it's a news story
or it's not a news story, I might well
call Faceplant at that moment.
JONATHAN ZITTRAIN: Great.
All right.
So we have an old-fashioned telephone call going on.
Alex, do you take this call?
ALEXANDER MACGILLIVRAY: Yeah.
I probably do.
It's a good question as to whether--
so first of all, there's a question
about whether you would comment on a particular case.
This is about a particular person--
JONATHAN ZITTRAIN: But you're going to take the call.
ALEXANDER MACGILLIVRAY: --particular investigation.
Well, I think you always take a call from David Sanger.
JONATHAN ZITTRAIN: All right.
Let's hear the call.
David, Alex, you're now connected.
Go.
DAVID SANGER: Alex, how you been?
ALEXANDER MACGILLIVRAY: Great to hear from you.
DAVID SANGER: It's always good to have
a joyful greeting to the call.
So we have a letter here from--
appears to be a request from a police department asking
you to search for the photograph of a child
who, if you believe the information we were given,
his family was threatened over a Faceplant network.
Before we get to the specifics of it,
what are you general rules when you
receive a report of a threat that
is conveyed over your network?
ALEXANDER MACGILLIVRAY: So I just came on board here,
so I'm still coming up to speed on what our rules are.
So I think the way I would answer this to further
the hypothetical would be something
like, our general rules are that we
require a warrant when we're going
to give over user information.
We have some exceptions with that
for particular threats of violence
that seem to be urgent and actionable, where
we might cooperate with law enforcement
on those types of things.
But our general policy is require a warrant
and give notice to the user.
DAVID SANGER: OK.
So if you go into your email, I've just
shot you a picture of a letter.
Maybe you can put the letter back up.
And it seems to have some handwriting underneath it
that says yes, let's make this happen, SG.
Do you know who SG might be?
ALEXANDER MACGILLIVRAY: He must have been before my time.
I think we fired a director of law enforcement relations.
DAVID SANGER: Is he now teaching at a law school?
ALEXANDER MACGILLIVRAY: At the law school,
or he could be a partner at Betaworks.
JONATHAN ZITTRAIN: OK.
So recognizing that you're probably
hesitant to talk about specific and individual cases,
I'm going to ask you to talk about
a specific and individual case.
Because this one would seem to suggest--
and it might be perfectly reasonable--
that you help this police department because
of a photograph that appeared to threaten kidnapping
or harm of a small child.
Anything you can tell us about this one?
ALEXANDER MACGILLIVRAY: Yeah, I'm
not going to talk about the specific cases.
It's really between-- it's up to law enforcement
dealing with the current investigation.
It's not something that I would comment on.
Leave it at that.
DAVID SANGER: OK.
You might want to check back with your public affairs people
and so forth.
Because we're in one of those odd situations--
actually, not so odd, happens all the time--
in which a company doesn't want to comment
on the specific case.
But you can see we've got the material
from the specific case.
And usually my advice along those lines
is, you have two choices.
You can comment on it when we're getting
ready to write it the first time and give a good explanation
what you're doing.
Or you can wait for us to publish it,
and you can come in on tomorrow morning
when it goes viral on some network.
So I would consider about when you
want to do the timing of the comment that's inevitable.
JONATHAN ZITTRAIN: Boy, David's quite a good counselor.
ALEXANDER MACGILLIVRAY: He's very concerned about when
I'm going to get my whipping.
JONATHAN ZITTRAIN: Are you going to take his advice?
ALEXANDER MACGILLIVRAY: No.
I think the way I would respond, David,
is that I'm not going to comment on the specific case.
I will give you a little bit more detail about how
we handle these types of cases.
And, in particular, some of the thinking behind the philosophy
that Faceplant used to have before I came
on board, about being a little bit more cooperative with law
enforcement when there is a threat to a specific individual
that law enforcement is trying to prevent,
and where there is information that we could provide
that might help make it so that there wasn't a loss of life
or other violent physical harm.
So that was the thinking behind our policy.
DAVID SANGER: But now that you've
come in, you decided it's actually better
to let the physical harm happen more quickly
while somebody goes off and gets a warrant?
ALEXANDER MACGILLIVRAY: We're in the process
of reassessing our policy and also
trying it to have a little bit of a better
understanding of what exactly is being asked
by law enforcement and what type of proof that they would have
and the types of searches that would
be reasonable in those situations and the ones that
would not be reasonable in those situations.
JONATHAN ZITTRAIN: Such placative words.
Are they working?
DAVID SANGER: I'm impressed, yeah.
So let me just make sure I get this straight
because we'd want to make sure if we publish anything--
we haven't decided yet whether it's a worthwhile news story,
but the only way you figure that out
is conversations like this one.
So in the old world at Faceplant, before you fired SG,
the thought was that as soon as you got a photograph like this
with a threatening note like that,
you would immediately search your databases
and see if you could be cooperative.
Why would you be tempted to move away from that if in fact
a life is at stake here?
If I told you I had a photograph of say, a terror
organization issuing a threat and we thought
a terror attack was imminent, would you wait for a warrant
as well?
ALEXANDER MACGILLIVRAY: Again, I think this--
not talking about this particular example,
but these types of questions are among the hardest
that we deal with at Faceplant.
What a great company name we've got.
Hope we've trademarked it far and wide.
They are some of the most important ones
we deal with at Faceplant and some of the hardest
because, on one hand, if you could know somehow
that the police organization was not just going on a fishing
expedition, actually didn't have the time to go get a warrant,
actually had credible evidence that would allow us to just get
the perpetrator of this action, then
that might be something that you would want to turn over.
But so many times you don't know that.
And so much of that determination
is based on the particular facts of a particular case
and the relationship with the law enforcement agency
that is doing the asking.
DAVID SANGER: So this picture could be a fake.
It could have been created by parents in a divorce case.
It could be something that is really not threatening at all.
And so, you'd want the warrant so at least you had top cover
before you did your search.
ALEXANDER MACGILLIVRAY: Well, we'd
want the warrant because courts are the right place
to make determinations like these,
to figure out whether it's the right thing
to do to give up information.
JONATHAN ZITTRAIN: You want the warrant.
But it sounds like the way you've
described the terms of service, you've written it
so you don't need the warrant.
ALEXANDER MACGILLIVRAY: That is definitely right.
We've written the terms of service
so that if we were sued--
and again, this wouldn't be something that would
be in the David conversation.
This is the all-seeing narrator conversation.
JONATHAN ZITTRAIN: Yeah, so right.
You put David on hold.
ALEXANDER MACGILLIVRAY: Yes.
DAVID SANGER: I'm used to that.
ALEXANDER MACGILLIVRAY: But we've
written the terms of service as a protection against class
actions with respect to information that we've
turned over when we were wrong.
JONATHAN ZITTRAIN: Now it turns out
our leaker wasn't just shampooing their cat,
they were impatient.
The New York Times hasn't yet published anything
because it's doing diligence.
So it's also sending this leak off to the Electric Frontier
Association.
Cindy--
CINDY COHN: Alex?
JONATHAN ZITTRAIN: Or Alex.
You can decide among you which wants to take it.
But I think, Cindy, maybe you are the right person to ask.
How unusual is this?
Are you with at a meh on this as David was at first?
CINDY COHN: Well, we tend to not take information like this
because our role is a little different.
We tend to try to help people get to other people who
might want to make use of it.
And then we talk about the policy implications
and the legal implications.
I would be concerned about the request for a systemwide search
for a piece of content, especially based
on really conclusory assertions about what's
actually going on here.
I think that this is exactly the kind of situation
where you want a judge to actually evaluate whether there
is a sufficient basis to really do
this kind of systemwide search.
JONATHAN ZITTRAIN: But this is the kind of thing
for which you think, if there's time at least,
a warrant could issue?
That a warrant could issue that says to Faceplant,
I hereby order you to perform this search
and return all information about accounts
that possess this image?
CINDY COHN: I don't think so.
It depends on what the other stuff is that--
the police letter says, well, we have
reason to believe the only person who would ever
have this is this person.
And we know lots about it.
So depending on those other facts, I've seen such orders.
I think they're inappropriate.
But you could also imagine a smaller order
that would, say, identify a user who
is somebody who's already been identified
as a potential suspect.
And then the searche is much more narrow.
JONATHAN ZITTRAIN: Yeah, it turns out
the image came from Pluto mail, really hard to track down.
They're using Tor and all these other things
I've heard rumor of.
So all we've got is the image, but they
think that it might be.
They're hoping they might find something in Faceplant.
And if they don't, they can't, I just
can't tell if what you're saying is they need a warrant,
and, second, they can't have a warrant.
CINDY COHN: I think they need to try for a warrant
in this situation.
And whether they get one or not will
depend on facts that are not in the circle
that we have yet right now.
And the question to me is, what else do the cops know?
And if the cops know enough more to get a warrant,
then they should get a warrant.
I think the mere issuance of this
is probably not sufficient.
JONATHAN ZITTRAIN: But if there's been, like,
threatening calls and other things that
are hard to trace, enough to raise the gravity of it,
you'd be ready to do the systemwide search.
CINDY COHN: Well, I wouldn't be the person who did it, but--
JONATHAN ZITTRAIN: Yes, but you'd
be ready to bless the systemwide search.
It would not be a--
I forget my acronym now--
E-F-A blast to all members, a call to arms over such a thing.
CINDY COHN: Again, I think that you
could imagine a scenario in which you
could do a broader search, a somewhat broad search.
I think a systemwide search would
be a line I wouldn't want to say was ever OK in this instance.
I think you can always narrow it more.
And if you can, you need to.
And that's what I would hope the judge would make them do.
JONATHAN ZITTRAIN: I wonder if we
should turn to law enforcement.
Matt, fresh off your work for the federal government,
you've found a cushy landing spot at the Ames County Police
Department.
Tell us about this warrant.
MATTHEW OLSEN: So it is interesting.
So if I were advising the Ames County Police Department--
I was a prosecutor for 10 years as well.
So I did, in a sense, advise, although pre
sort of these opportunities.
So I kind of agree with Cindy.
If I was talking to the police department,
I'd say, chief, look what else?
We need to know more, if we can, about this.
Who has a potential motive to hurt this child?
Talk to the parents.
Talk to the others in the photo, friends.
I mean, develop as much as we can.
Let's see if we can go back to Faceplant with a request
that's based on-- we would check to see if individuals in that
circle of suspicion have accounts, metadata--
JONATHAN ZITTRAIN: You want to start with and people
and search them rather than start with no one and search
everything.
MATTHEW OLSEN: That's right.
So the more targeted we can make it, the better.
JONATHAN ZITTRAIN: Yes.
MATTHEW OLSEN: So well go ahead.
So you're going to tell me I don't get
anything more specific, right?
JONATHAN ZITTRAIN: No, no.
I actually I feel a certain resistance
to this hypothetical.
It is, I think--
I forget, Bruce, the four horse people
of the apocalypse, one of them is child protection, is it not?
BRUCE SCHNEIER: Pornography.
JONATHAN ZITTRAIN: Yeah, so it has
a little bit of a tired feel to it perhaps
to the libertarians in the room.
So let me just rip from the headlines
for a moment something that just came out this week.
This is from the real world.
Hackers steal photos from plastic surgeon to the stars.
And they claim the trove includes
the royal family of Britain.
It's a group called the Dark Overlord
and has highly personal before and after photos
from plastic surgery.
And the plastic surgery firm agrees
that the photos have been completely compromised
and somebody stole them.
This is just from the news story.
"We're going to pitch it all up for everyone to nab.
The entire patient list with corresponding photos.
The world has never seen a medical dump
of a plastic surgeon to some degree."
I don't think we've ever seen one to any degree,
but maybe I'm not reading the right sites.
"The Dark Overlord told The Daily Beast last week."
Can I just say that is perhaps a sign of the apocalypse,
that the Dark Overlord is talking to The Daily Beast
and we're like, oh, yes, yes, of course.
"The images do not appear to be publicly available yet,
however, and it's unclear whether the group will follow
through on their threat."
Here is a narrow window of time.
This is a very real situation.
This is not a case of the four horse people.
This is not child protection.
What is at stake is just, I guess,
dignity, respect, privacy.
But these photos, if you've got them in your Faceplant account,
you're not supposed to have them.
There's no way there's supposed to be there.
They are highly sensitive, the most highly sensitive,
and therefore often the most protected
by various laws, medical records that the Dark Overlord
has seized.
Cindy, is this a case in which--
are there facts not in the circle?
Are you prepared to do this kind of-- to bless
the kind of search we're talking about where we're just
going to cast a net because the time is ticking
before they release this stuff?
Anybody that's got these photos has no business having.
CINDY COHN: No, I still don't think--
I still think you have to do the work
to try to figure out who you're looking for and why and where.
And I think doing a mass, general search as it were, for
even these would be too far.
I still think first of all, you can get a warrant
or there are emergency exceptions where you go
back later and get a warrant.
I just don't think that the legal process
is a barrier here.
And it provides an important check.
I mean, I appreciate The Daily Beast,
but a news story should not alone
be a basis of a mass search of everybody's content.
JONATHAN ZITTRAIN: Fair enough.
Let's see, Daphna, would you mind
being our magistrate for the purpose
of considering the warrant that everybody wants?
And once they all get a warrant, everybody
breathes a sigh of relief.
The warrant is here.
The warrant is here.
We are all blessed.
What do you need to know from Matt to consider
whether to grant this warrant?
DAPHNA REMIN: Matt, tell me what you have.
MATTHEW OLSEN: Going back to the child scenario--
JONATHAN ZITTRAIN: No, no.
We're talking this one now and make it the best you can,
the strongest possible application.
Bring in new facts if you need them.
MATTHEW OLSEN: OK so what we have
is a news story that we've seen indicating clear evidence
that a rogue hacker group has stolen
the most sensitive information-- medical records
of individuals-- and has threatened to put those
into the public domain.
We know that Faceplant is one of the key companies where
we might likely find these documents.
They are billions of users around the world.
They themselves don't prohibit this
by their own terms of service.
In fact, they have their own processes
for looking across content on their site
to target us with ads.
So they do this routinely.
So what we're simply asking for here
is to have Faceplant do a minimal check of these existing
photos to see if we can find any that match in order
to advance our investigation.
DAPHNA REMIN: Well, first of all,
do you have any reason to think that these photos exist
on Faceplant?
And second of all, can you give me
something more particularized that I can get behind
in terms of the search that you'd like
to run as an initial matter?
MATTHEW OLSEN: So what we have are from some of the victims.
These are obviously confidential,
and I can show them to you in camera, your honor.
But they are a number of the photos
that we believe were stolen.
These are from the actual patients,
and we have reason to believe that these
are the actual photos.
So what we're simply asking is that Faceplant
do a search across their platform for these three photos
as exemplars.
DAPHNA REMIN: And why Faceplant?
MATTHEW OLSEN: Faceplant the dominant use--
as I mentioned, there are 2 billion users
of Faceplant around the world.
They are--
BRUCE SCHNEIER: It's a small platform,
but there are those who love it.
MATTHEW OLSEN: And we also are considering this
for one or two other providers.
But at this point this is where we think we'd
like to start this process.
DAPHNA REMIN: And can you narrow this search request in any way?
MATTHEW OLSEN: Well, we would be happy to work
with the general counsel at Faceplant
to come up with a technologically available means
to do this that imposes really no burden on them
really consistent with how they currently
conduct their own business for their own advertising purposes.
So we're happy to work with Faceplant
to come up with a mutually agreeable means to do this.
DAPHNA REMIN: And what you're telling me
is consistent with the terms of service.
You could do the search.
You don't actually need the warrant,
but you're coming to me for an extra layer of protection.
MATTHEW OLSEN: Yeah, I think out of an abundance
of caution, that's the appropriate course at least
at this stage.
It's obvious that's Faceplant could
do this without a warrant.
This is not necessarily protected
under the Fourth Amendment given the terms of service
that all the users of Faceplant have already agreed to.
So they have no reasonable expectation
of privacy at this stage, as far as we're
aware, given what our understanding is
of the terms of service.
DAPHNA REMIN: And would there be privacy considerations
for third party users?
MATTHEW OLSEN: Sure, we are sensitive to,
in the government, the privacy implications of this.
This is not without privacy concerns.
So again, we'd work closely with Faceplant
to mitigate any third party considerations.
DAPHNA REMIN: And so basically what
you're telling me is that there's
documents that you believe were stolen
that could exist anywhere.
And you want to be able to search this company
because it's one of the companies that
might have them because they do a lot of business.
MATTHEW OLSEN: Yes, because of the expansive and ubiquitous
nature of the platform, we think it's
quite likely that this is--
and we can get an expert here to explain how broadly Faceplant
is present around the world.
JONATHAN ZITTRAIN: So the Bruce signal just went up.
MATTHEW OLSEN: Yes, we want Bruce to help.
JONATHAN ZITTRAIN: Bruce Schneier,
do you want to help on the technical part?
In fact, Matt has asked you to be a technical friend
to the prosecutor here, as he wants
to make sure he's doing this warrant
application to Daphna right.
BRUCE SCHNEIER: I think it's clear
that Faceplant does these kinds of searches all the time.
We will assume they're searching for blue-shirted children
for LL Bean, and before and after plastic surgery
photos for some other luxury goods advertiser.
So technically, this is not a big ask.
This is not the same as asking Apple to reverse engineer
their iPhone.
This is something they do for advertisers.
JONATHAN ZITTRAIN: You think they're looking--
you said they're looking for blue-shirted children, which
indicates a susceptibility to LL Bean advertising.
That's the idea?
LL Bean might be-- for anybody with lots
of pictures of blue-shirted kids, sell them the boots.
BRUCE SCHNEIER: Or something like that.
JONATHAN ZITTRAIN: Yeah, OK.
BRUCE SCHNEIER: But searching their content broadly, looking
for either specific things or general things,
is Faceplant's business model.
That is how they make money.
So what we're asking is nothing technically difficult.
Their terms of service permits that.
You're in a sense just saying, you know, do us a favor.
Do something you're already allowed to do.
We could discuss whether that is morally correct
or whether the law should change, but, as written,
there's no reason in the world why Faceplant can't just say
yes because they're being nice.
I don't actually even think it's much of a news story,
except that maybe to illustrate that Congress
needs to fix this.
So I think we're good asking.
I think getting the warrant certainly a nice check.
But I don't think you need it.
JONATHAN ZITTRAIN: And one of the reasons to get the warrant
is you don't need the warrant.
BRUCE SCHNEIER: I think, to what Matt
said, abundance of caution.
That if we can get it, it sort of makes everybody happier.
JONATHAN ZITTRAIN: And how about Daphna's
concern about any third party privacy?
Can you put her at ease on that?
BRUCE SCHNEIER: No, I can't.
But you're already not at ease because you're
a Faceplant user.
So the additional abuse is considerable.
I mean these Faceplant users already
have everything they do eavesdropped on and searched
in order to sell them stuff.
MATTHEW OLSEN: And we'd be happy to turn over
any of the returns from this search
to Judge Daphna for her independent review
before we get it.
So we'd be happy to put her in that position.
It sounds like we're about to move a car off this lot.
Yes, Daphna?
DAPHNA REMIN: Yeah.
And I think following what a number of magistrates judges
are doing even though it's not clearly
within the framework that they usually operate,
there's a lot of minimization procedures
and things like that that magistrates will impose
in a context like this, creating law
try to make the rules fit better in this new circumstance.
JONATHAN ZITTRAIN: But now Andrew
is looking a little dyspeptic.
So I want to give him a moment to express his thoughts.
But tell me what role you'd like to play here, Andrew.
ANDREW MCLAUGHLIN: I thought that's your job.
You're supposed to tell me what my role is.
JONATHAN ZITTRAIN: Well, if you can
tell me a little bit about how you're about to emote.
ANDREW MCLAUGHLIN: So, I don't know,
I'm sharing an office with Alex.
So here's--
JONATHAN ZITTRAIN: For eight years.
ANDREW MCLAUGHLIN: So here's the thing
that that's puzzling me a little bit,
though, about the conversation so far is that Faceplant
has at least three different clusters of services
that it offers.
And it seems to me that the expectation of privacy
around the different services is different for Fourth Amendment
purposes, and certainly different for user
expectations.
And my guess is that there's going
to be policies in terms of use that have been written
that are sensitive to that.
So one is the public post--
public defined as all the people that are members of Face plant.
And so for people to post something publicly,
there's absolutely no expectation
that it would not be associated back to you.
JONATHAN ZITTRAIN: But unfortunately, as we just
take it step by step, for this kind of search,
that's unlikely to yield anything.
We're looking for documents that haven't yet gone public.
ANDREW MCLAUGHLIN: Exactly right.
So then let me go to the other side.
So on the other side is one-to-one communication.
So Faceplant Messenger allows one person
to communicate with one person.
And by the way, there's maybe even a fourth service here,
which is personal data storage.
To go all the way out, I may have you--
because you said there was a dropbox-like service.
So I may have a storage folder where
I can place documents that are exclusively accessible by me.
And it may well be that Faceplant
has said that they treat those as private
and have strong protections, absolute warrant requirements,
a minimal zone of flexibility to operate outside the bounds
of legal compulsion.
JONATHAN ZITTRAIN: Let's just straighten
this out real quick between the two roommates here now.
Because, Alex, previously you were saying
you're going to try to draft the impenetrable terms of service
to be as anti class action suit as possible
and therefore to retain maximum flexibility.
But I hear Andrew saying he'd want to see a company,
and it's not implausible to expect it--
ALEX ABDO: Well, by the way, if I get to pick my role,
I'm CEO and founder of face plant.
I mean, like I am about to be are
the wealthiest people in the world as soon as we can IPO.
So we just have to get through this little crisis
here and move on to the public market.
JONATHAN ZITTRAIN: But for that, you're
saying you would disagree with Alex
and want to have stated protections.
ANDREW MCLAUGHLIN: Well, yes.
So in other words--
so, again, if I'm thinking about this from the business
perspective, my goal is to build a service that
gets the maximum number of users that
are using it the maximum amount of time
to drive the maximum amount of advertising
and related revenues.
And so means I need to--
JONATHAN ZITTRAIN: For whicih public safety
does not play into that at all.
ANDREW MCLAUGHLIN: No, no, it does.
JONATHAN ZITTRAIN: Oh, OK.
ANDREW MCLAUGHLIN: No, of course.
No, actually, it really does.
In fact, but for the different flavors of product
I have to have different considerations.
So if I want people to use a dropbox-like upload service,
I have to signal to the world that I'm
going to protect it as a matter of technical competence
and also as a matter of policy protection
that I would absolutely do everything in my power
to protect those files.
And basically not to say that I will never cooperate with law
enforcement, just that I will put law enforcement
through the paces of complying with whatever warrant system
might apply.
Now by the way, Faceplant is a global company,
and we should talk for a second about what that means.
But let me first just say that, on the other hand,
there's the fully public stuff.
There the zone of public dialogue and discourse
that happens on the platform, I very much want to be civil.
I want it to be friendly.
I want to fight against trolling,
hate speech, racism, all the other bad things
that can happen.
And so I will aggressively cooperate with law enforcement.
I will affirmatively police it.
I will look for images that I can associate with hate speech.
I will voluntarily turn them over to law enforcement.
I'll write terms of service that allow me to do that.
Just to point out, though, what the really hard zone here is,
I think the really hard zone for my company
is that we also have this set of services which
are group communications where I can define the cohort that I
want to communicate with.
So that could be like an open system,
like a sub Reddit of 10,000 people that
are all exchanging information.
It might be just a small group of 10 people that
are going to plan a crime, that are going
to trade child pornographic images, child sex abuse
imagery, or other nefarious sort of activities.
So what's hard for me and the assignment
that I've given to Alex that's tricky here
is in that gray zone, we are the only people
that can see what's going on in there if we choose to.
And so a general search, I think,
is kind of useless over here, also useless over here
because we can get into-- that sort
of like dropbox-type service requires
a lot of particularized detail because it's
going to have to penetrate my policies requiring a warrant.
But in the middle, in these kind of like group communication
zones, that's actually where a generalized search
could turn up the most valuable information, a general search
across the system looking for like a fingerprinted image.
JONATHAN ZITTRAIN: Because one of those
group might be the Dark Overlord's chat room.
ANDREW MCLAUGHLIN: Correct.
Exactly right.
And that's where you find the pressure.
Now as a business matter, the question is,
if I'm just thinking about this from the user perspective,
how much protection do I need to make that be an appealing
product for the long term?
Like, do I need to be more aggressive
and treat it more like a semi public space
because the risk of harassment, hate speech, and all
those other things is high?
Or is that more like just a slightly enlarged version
of one-to-one communications that I
want to have a lot of protection for so people
will feel comfortable chatting with each other
across the platform?
JONATHAN ZITTRAIN: Well, it sounded
like, before your intervention, we
were on the cusp of granting the warrant.
We hadn't yet specified which of the three zones
we were searching.
So I think it was safe to say we were thinking all of them.
You were going to say something more?
ANDREW MCLAUGHLIN: Just the weird thing
that the magistrate didn't consider
was whether there's any log evidence or anything
else that indicates that the images have been stolen.
Like, even the very first chain of a crime existing,
I would expect the magistrate to be
curious about whether there's anything
behind The Daily Beast, or just a bragging, anonymous account.
JONATHAN ZITTRAIN: Yeah, in this case, actually, if you read
the story, it turns out the surgery acknowledges
that they had a breach.
ANDREW MCLAUGHLIN: Again, the surgery
may be competent to read its server logs or not.
They may have just been for--
I would want to see some hard evidence.
DAPHNA REMIN: I'm not relying on The Daily Beast story.
I'm relying on the materials I was shown.
JONATHAN ZITTRAIN: That Matt was kindly sharing.
DAPHNA REMIN: But I do think that there is--
the idea that there's material stolen.
And so if you think it might be in a location that
has a billion users, billion data,
that that's a particularized showing for a warrant
is obviously not the way that the traditional framework
operates and why the warrant process is not really
the right process to get at this.
JONATHAN ZITTRAIN: Oh wait.
So you're maybe not ready to grant this warrant.
DAPHNA REMIN: So I have real concerns here.
ALEX ABDO: That's also why I would fight a warrant if it
was issued under these circumstances
on behalf of the company, because it can't
be that something goes missing in the world and, as a result,
we've got to search our servers.
CINDY COHN: And I would amicus in support of the company.
ALEX ABDO: And second.
JONATHAN ZITTRAIN: David, do we have a news story yet?
DAVID SANGER: Well, we've got a more interesting news
story about the policy than about the issues.
The material the Dark Overlord has
about the actual photographs of the plastic surgery
are probably a news story for someone.
They're probably not a news story for me.
OK?
I can think of some supermarket tabloids that might like them.
JONATHAN ZITTRAIN: Oh, yeah, no, I
was asking more about the conflict here.
DAVID SANGER: The conflict here is really interesting
because here I find the fascinating policy
story to be that first of all, people
have surrendered basically all of their privacy rights
here across all of this from the moment they
signed up with the set of terms of service
that they never read.
And then you have the companies going off
trying to get Judge Daphna over here to give them cover
for something they clearly could go do all by themselves
if they just wanted to and could do without telling any of us.
And for some reason or another, it's
a more compelling reason to go do searches
so they can get that LL Bean ad in the right place
than it is to go find someone's stolen plastic surgery pictures
or find a child who might be under threat.
JONATHAN ZITTRAIN: Wow.
That maybe puts us back--
DAVID SANGER: That's a story.
JONATHAN ZITTRAIN: --to Cindy or Alex.
Cindy's ready to write the amicus brief.
Alex, are you going to join with an amicus brief of your own?
ALEX ABDO: Yeah, and can I frame it?
So I think there are two sets of questions.
You know the first set of questions
is the one that Andrew was starting to help answer
and that Bruce had talked about, which is,
is what the government or the Ames County Police Department
trying to get a warrant for a search
within the meaning of the Fourth Amendment, which
turns on some of the factors that we've
been discussing whether people expect privacy
in each of these three zones?
I think that's the first question.
I'm not as maybe cynical as Bruce in terms of the fact
that some people accept some scanning of their email content
or their one-to-one messaging on the service
that they've sacrificed their privacy for Fourth Amendment
purposes.
I think that would undo privacy across most
of the internet right now.
But that's the debate one.
What bucket do each of these three services
fall in, a search or not a search?
And if they're not a search, then you don't need a warrant.
And we're fine.
If they are a search, then you have three options
because they're unquestionably in this context would
be a general search, which is generally not allowed
by the Fourth Amendment in the same way
that if my sensitive information over here
went missing in Cambridge, the police probably
couldn't get a warrant that would
allow them to search every house in Cambridge for it.
The same would apply to these one-to-one communications
or any other protected space within Faceplant's products.
So you have three options.
One, you apply that doctrine to the digital age
and say no general searches in the digital age.
Two, you discard that doctrine and say,
we do have general searches in the digital age.
But if we do that, you have to accept that that's
going apply whether what's being stolen
is sensitive medical photos or something totally trivial.
Or maybe it's just evidence of jaywalking
that happens to be on Faceplant's service
but the police have probable cause
to believe that jaywalking occurred.
JONATHAN ZITTRAIN: This is a classic ACLU trademark
slippery slope.
ALEX ABDO: But then option three.
Because I thought about this hypothetical
since the first time you posed it to me.
Option three is you could say as a general matter
no general searches of this sort.
But the Fourth Amendment has always
had an exigent circumstances exception.
And maybe we'll allow the government
to take advantage of that exception
for the purpose of a general search in very narrowly
defined circumstances,
I would have concerns even about that
because once you create the ticking time bomb authority,
everything starts to look like a ticking time bomb.
I am quite sure that next hypothetical is not
going to be these images, but a terrorist attack.
JONATHAN ZITTRAIN: We'll be taking a break shortly
while I rework my PowerPoint.
ALEX ABDO: But that's the framework
that I would use to analyze it.
And I think so far we've really just focused on one and two.
Is it a general search, and we shouldn't have it or we should.
If we're going to do it, I prefer it be in bucket three.
Although I'm not sure as between bucket one and three,
don't do it or exigent circumstances.
JONATHAN ZITTRAIN: But Alex, I hear
you then saying that you're ready to negotiate,
that you're nervous.
You're a little bit anxious about it.
But that you're not prepared to say no general searches ever.
ALEX ABDO: I don't know.
Because I suspect you could come up with a ticking time bomb
scenario, the same sort that are prevalent in many other human
rights debates.
And my instinct would be to resist
making policy on the basis of ticking time bomb scenarios.
JONATHAN ZITTRAIN: But does this qualify?
ALEX ABDO: No, I don't think so.
JONATHAN ZITTRAIN: Not at all.
ALEX ABDO: No.
JONATHAN ZITTRAIN: Then why not?
Because it's not literally threatening physical harm?
What interests are you vindicating and for whom
by not allowing a search for these images in zones two
and three that Andrew described, which
would be to say the dropbox zone and the closed group chat zone?
Whose interests are being vindicated?
ALEX ABDO: The interests of the millions
of people who rely on Faceplant to secure
their private information.
JONATHAN ZITTRAIN: Who do or don't have these photos?
ALEX ABDO: Who don't.
JONATHAN ZITTRAIN: Who don't have the photos.
ALEX ABDO: Yes.
JONATHAN ZITTRAIN: Because their interests in your view
are infringed when a touch is made
on their folder and nothing is found
and the robot moves along.
They have been harmed.
ALEX ABDO: In the same way that they
would if a police officer went through 10,000 houses
in Cambridge.
JONATHAN ZITTRAIN: In the same way?
ALEX ABDO: Yeah.
JONATHAN ZITTRAIN: You'd say, touching
that folder to see if a hash matches
is the same as a police officer coming to our doors and saying,
don't mind me, I'm just going to go
through every drawer of your house looking for photos.
And if I don't find anything, you're cool.
ALEX ABDO: Well, we can make a robot
to make it more analogous, but a robot doing the same thing
in the physical world.
JONATHAN ZITTRAIN: Uh, huh.
Bruce.
BRUCE SCHNEIER: So again putting my advising
of the prosecution hat on.
CINDY COHN: I want him on my side again.
BRUCE SCHNEIER: This is precisely what the NSA says,
that, in fact, if we have a computer doing this,
and they touch every photo and return no information--
if a match is not made--
that this is not a search.
And that is their doctrine.
Now we could argue about it.
But as long as it's their doctrine,
I think you go with it.
And you say that this is not a search,
that because no human being looks at, looks
through anybody's drawers, looks through anybody's material,
that it could only return matches,
that it's not a general search and try that on the judge.
JONATHAN ZITTRAIN: I'd love to hear Cindy get one more at bat.
Then Matt gets one last say, then
Daphna will render her decision on the warrant.
CINDY COHN: Well, I mean, if that were the rule,
then I guess at the time of the framers,
it's OK if the cops come through your house.
And it only counts as a search if they find something.
And right now, we store all of our sensitive-- a huge amount
of sensitive information in these digital worlds.
And it can be used against us.
And I think that that's an extremely dangerous rule.
Perhaps one of the people who has these photographs
is actually somebody who's doing a reveal
about this plastic surgeon and how bad they do.
We don't know from these facts.
JONATHAN ZITTRAIN: In which case,
I presume if it were found and then law enforcement
got in touch with them, they would tell their story
and that would be that.
CINDY COHN: I don't think that's actually
how it would work, honestly.
JONATHAN ZITTRAIN: They would not pass go.
They would go directly to jail.
CINDY COHN: Well, I think it would be
a tough place for them to be.
I just think that at this particular point in time,
the assumption that all of the patients
want this information off and that nobody could ever use it
for anything good, it could only be used to violate privacy,
as one of the things that we don't know.
And it's part of why we don't like general searches,
is because from the beginning, we don't necessarily
know that just because this information is
sitting in somebody's file that that
means that they're the bad guy.
And so I guess I would say in addition to what Alex says,
it's just all the rest of us can never
put anything in our digital lives
that wouldn't be subject to a search, the content of which
and the contours of which we are never going to know.
And in the national security context,
that becomes much more acute.
That's not only because of the time that the Eye of Sauron
passes over us.
It comes from the times that it actually identifies us as well.
JONATHAN ZITTRAIN: All right.
So back to our representative from Barad-dur,
Matt Olsen, Eye of Sauron.
I presume at some point you will be willing to allow the fact
that the search happened to be released,
that you know this was a leak of that request
and it being granted.
But I guess investigatively you might keep it quiet for a bit.
But after it's run, you'd let the public
know that it at least happened?
MATTHEW OLSEN: Sure that's the nature of search warrants.
They eventually become public.
And we might--
JONATHAN ZITTRAIN: At least if there's a prosecution.
[INAUDIBLE]
MATTHEW OLSEN: Well, even before but, yes.
They would be held under seal for some period of time.
But they would be eventually be disclosed.
In fact, they would obviously be disclosed to the company
and the company could disclose it.
The company is not under any obligation
not to disclose the fact that there was a search
in a general criminal search as opposed
to a national security search.
But I'm trying to stay in the game.
I mean, I get the issues here.
I mean I get that my conversations with colleagues
in my office with Bruce, this is not
the best test case for this.
That you know celebrities who've gotten
plastic surgery compared to national security
or a terrorism event.
And this is not a case where looking at people's files
across this broad platform has no privacy implications.
I think it certainly does.
It's just, we're in a different ball game
because of the nature of the technology,
both the nature of the collection,
but also what we can do to search quickly
and what the company itself does.
So I'm back before the judge saying,
trying to stay in the game, which
is to say, Judge, we're perfectly willing to work
closely with Faceplant's team to craft an order for you
to consider, that would be narrow,
would start at the outer edges in the first basket,
moving into the second basket where
people have already communicated with each other at some level.
So they're not holding this personally to themselves.
So we'll craft it to avoid going into any of the places
where there's a strong expectation of privacy
or an expectation of privacy among the communicants.
And then we are also willing then to have any responsive
document to any of the photos that show up go just to you
as the judge to review, to minimize any impact
on any third parties.
That seems like a reasonable approach here
that can accommodate the competing interests.
DAPHNA REMIN: So I look forward to that order
and to see how it's been narrowed and particularized
because one thing to emphasize is
that if these are Fourth Amendment protected contexts,
giving the warrant on the front end
makes it harder to think about reasonableness on the back end.
So what I want to see is how do we narrow this warrant
so that I'm not in the context of we think there's documents
somewhere in the city of New York
and therefore we're going to look at every house.
Give me something to hang onto that makes
this feel a bit different.
JONATHAN ZITTRAIN: Last question before we move on.
Andrew had raise the international dimension
of things.
Matt, are you wanting to restrict this only to US
jurisdiction or should it be a worldwide search?
MATTHEW OLSEN: Yes.
I'm just the police department lawyer.
So I don't even really--
I barely understand the implications
of beyond my little police department.
Right now we're talking you know world wide.
JONATHAN ZITTRAIN: What do you want in your heart?
Tell me what you want in your heart.
MATTHEW OLSEN: I want to win this case, right?
That's my [INAUDIBLE]
JONATHAN ZITTRAIN: So you want to search the world.
MATTHEW OLSEN: Yeah, I do.
Definitely, Faceplant's-- if I'm going down this path,
Faceplant's an American company based in the United States.
They have--
JONATHAN ZITTRAIN: The idea that only if it's
an American criminal is it found, but the Canadians walk
free, seems crazy.
Right?
MATTHEW OLSEN: That does not make sense to me.
And I think it's appropriate to search
all the available servers where this information may be stored.
JONATHAN ZITTRAIN: Daphna, you're OK with that?
DAPHNA REMIN: Well, are you asking me if I will
give a global search warrant?
Right.
JONATHAN ZITTRAIN: Well, I guess it's a local search warrant
to Faceplant to search everything it has,
which may turn out to be global.
DAPHNA REMIN: Well, so now we're getting into domain
that there's going to be a court decision on soon.
But probably the Stored Communications Act
needs to be considered and how it applies extraterritorially.
And I imagine I'm going to get a fair bit of briefing
on this issue from my amici.
JONATHAN ZITTRAIN: You're just a country magistrate.
Got it.
ALEXANDER MACGILLIVRAY: But also Matt
had said that he was happy to have
notice go out to all the users.
So we can tell all our users all over the world
that if they have a problem with this,
they can come to Daphna's courtroom.
MATTHEW OLSEN: I do think that's your call.
I do think that's your prerogative
to inform your users in a criminal search
warrant at some point.
JONATHAN ZITTRAIN: With a note to talk to Daphna
does seem like a distributed denial of justice attack.
ALEXANDER MACGILLIVRAY: I'm still curious.
I still don't know where we get to the, hey,
something bad happened.
There's an Ames.
I don't understand why we're in Ames.
Like why the Ames people care.
I think if this got reported to Ames, they would say, great.
That goes in the garbage.
Thank you for sending it to us.
JONATHAN ZITTRAIN: Well, remember, we
have both the plastic surgery and we had
the original harm to a child.
We just didn't seem to be getting
much traction with harm to a child
as we did with the plastic surgery.
ALEXANDER MACGILLIVRAY: I've dealt
with people who had real problems with stuff online.
And they go to their local police department
with the equivalent of a picture of a kid
and don't know who the kid is, don't know where it is,
don't have any clue.
The police department says, we can't help you.
We're not going to do anything.
MATTHEW OLSEN: Well, that's not very helpful.
I mean, with the kid situation, that
does seem to me that that is--
you would start with your local jurisdiction there.
I think that's an appropriate place for the police department
to say, what can we do here?
JONATHAN ZITTRAIN: That partly breaks are hypothetical, right?
If it's just a picture that got sent,
we don't know who the kid is.
BRUCE SCHNEIER: No, no, the picture
was sent to the parents in the hypothetical.
The picture was sent to the parents.
JONATHAN ZITTRAIN: The parents of the kid.
ALEXANDER MACGILLIVRAY: Parents go to their local--
BRUCE SCHNEIER: In Ames, Iowa or wherever we are.
ALEXANDER MACGILLIVRAY: And we might
do some police work about who might
have a gripe or a reason--
JONATHAN ZITTRAIN: But you would like
to see people who might have a gripe try
to get the threshold of a warrant and then,
as Lenny says in Law and Order, turn it, go into their houses
and look for everything, rather than
this much more modest just sift the topsoil a little bit
of everybody.
ALEXANDER MACGILLIVRAY: I don't know--
and this is partly to Alex's point and others
about the things that the search but not found users--
that that interest is not just in the searching.
It's in this rule that anytime anything happens,
we're going to toss everything that is in these containers
and look through it.
And I don't know how you-- like, that
was a rule that was abhorrent to the founders for a reason.
JONATHAN ZITTRAIN: Well, we have leak number two.
And I don't even know if David ended up writing a story.
He probably did.
MATTHEW OLSEN: You know, probably not about the content,
but about the policy debate inside Faceplant, that
might be pretty interesting.
Yeah, we could well have gotten a story on that.
But these would just be sort of examples
used to illustrate the problem inside Faceplant
as they try to struggle with this issue.
JONATHAN ZITTRAIN: Got it.
All right.
Well, next week you're a telex machine rattles
with an incoming telex from our leaker.
And it regards this.
This is an app used principally in China,
very few overseas users outside of China
and very few United States users.
It's a video chat app.
And this leaker discloses to you what
appears to be slide number 62 of 714
of a top secret, ultra mega top secret PowerPoint
deck from the Special Security Agency--
motto, "no bit left unflipped."
And it appears to be for internal use.
It's their Update on Counterterrorist Surveillance
Current Efforts--
SecretChat.
That's the app that we were just looking at.
And it appears to depict that the US Special Security
Agency has managed with a smiley face
to compromise the SecretChat servers.
And they are able to do facial recognition
so that if they are looking for that terrorist suspect,
dare I say--
I want to be true to Alex's expectations--
they can track down where that person might
be on the basis of if that person happens
to be using SecretChat.
And that's the way the app works.
So, David, if you are able to, at least to some satisfaction,
authenticate that this is an actual slide
from the actual Special Security Agency,
where are you between meh and 10?
DAVID SANGER: Now we're getting up in the six, seven, eights
here.
And a couple of questions so that I understand this.
I assume that though this was a Chinese user,
the Special Security Agency is a US agency?
JONATHAN ZITTRAIN: Correct.
It is.
DAVID SANGER: Right.
Because we're expecting that the Chinese services
all do this as a matter of routine.
JONATHAN ZITTRAIN: Yes.
No, it's a US agency.
DAVID SANGER: Right.
And so what we're learning here is
that the US agency has gotten in between the servers of US
companies or US-based companies?
JONATHAN ZITTRAIN: No, SecretChat appears
to be an app run out of China.
DAVID SANGER: Run out of China.
So they've gotten into a foreign service, for which the US
agency, the Special Security Agency,
since their job in the world is to go break
into foreign systems, they're probably acting legally.
That doesn't necessarily mean that it's not a news story,
but there isn't necessarily a legal issue here
of whether the Special Security Agency can legally
break into a foreign network.
JONATHAN ZITTRAIN: In which case,
what makes it newsworthy to you?
DAVID SANGER: Well, it may be newsworthy for a couple
of reasons.
First of all, we spend an enormous amount of time
in the United States being outraged
when foreign services come in and break into our networks.
When the Chinese came into the Office of Personnel Management
and cleared out with 21 and 1/2 million
security clearance files, including
a lot of people on this panel.
JONATHAN ZITTRAIN: Good times, we say.
DAVID SANGER: By the way, Alex, you
missed line 43 on the bottom of the form.
You might want to go back.
But when they did that, we show great outrage.
So there could be an interesting story in the fact that--
JONATHAN ZITTRAIN: There's a both sides-ism story.
DAVID SANGER: There's a both sides-ism story.
Secondly--
JONATHAN ZITTRAIN: Is it your concern at all
that it might blow a good functional operation by--
DAVID SANGER: It could be.
I'm getting to that in just a moment.
So the second is, it could tell us
a little bit about what the Special Security Agency's
capabilities are inside China.
So that might be good as an interesting story.
But before I ran the story, I would almost certainly
go to the Special Security Agency and say,
we have a document here.
Looks almost as genuine as the documents
that came out of, say, Edward Snowden's material.
In fact, we had documents out of Edward Snowden's material
about US operations inside China to get inside Huawei's servers,
right?
And we ran that story.
And so we're thinking about writing something
along the lines here.
And it's really time to sit down and have
that discussion about what the risks of that story
would be and whether or not we would be interrupting
an ongoing operation.
JONATHAN ZITTRAIN: So the Special Security Agency
has just received your call and heard that.
And they have invoked a little known clause
to pull Matt out of his cozy retirement
at the Ames County Police Department
back to a general counsel position
of the Special Security Agency.
Matt, what's your conversation with David?
Are you going to take his call?
MATTHEW OLSEN: Yeah, I would take the call.
I mean, I would obviously--
I would first realize it's David.
JONATHAN ZITTRAIN: Let's hear the call.
MATTHEW OLSEN: So here's the call.
So, hey David, good to talk to you again, not really.
DAVID SANGER: And we just want it
for the record that Matt and I have never
had such conversations before.
MATTHEW OLSEN: That's right.
So what's going on?
DAVID SANGER: So Matt, remember Snowden?
How could you forget him?
MATTHEW OLSEN: I start shaking.
DAVID SANGER: So remember when Snowden happened
you said this was the worst possible leak of all
these documents that could go on.
But since Snowden's happened, we've had more leaks.
We've had leaks that took place with a group
called Shadow Brokers, which started
publishing various stuff.
And now we've had another set of leaks, not entirely
clear where it's coming from.
But we've got some documents that
seem to indicate that you're inside Chinese servers.
So I've got a couple of concerns here first.
One is we believe this document to be authentic.
If it's not, that's important for us and for you
to know beforehand.
And secondly, we'd want to know before we made our decision
whether to publish whether publishing would harm
an ongoing intelligence operation so that we can
make an appropriate decision.
MATTHEW OLSEN: And so going through my mind
is one, that David, that's a sincere point.
That's not just a something he has to say,
that we care about intelligence equities and national security,
that that's a genuine comment and that there
is an opportunity here for me to talk--
I obviously would round up folks in the agency
and have a broader conversation.
DAVID SANGER: But Matt would know that we
have withheld stories before.
We've delayed them.
In some cases, we've delayed them for several years.
MATTHEW OLSEN: And I also know David wants to get this right.
So one question is, is this real?
And so, David, this sounds like something
that we need to be concerned about from what you've told me.
I think it would be helpful if we could meet,
if I could see what you have.
I think I need to understand what it is that you have,
if you would share that with me and my team.
And I think we would take it from there one step at a time.
Obviously, I'm not going to just go to DEFCON and say,
oh, this can never get out because--
JONATHAN ZITTRAIN: Are you prepared to confirm it?
Are you allowed under the law to confirm it?
MATTHEW OLSEN: I think that I would not confirm it to David.
I would want to see it and be able to make an argument then
about what the implications are of releasing it.
JONATHAN ZITTRAIN: But you'd never be able to say,
I can confirm this.
MATTHEW OLSEN: I don't know about that.
I don't know if we would come close.
I mean David, you may have more experience
with in what cases there's been a confirmation.
But I think just by virtue of how we responded,
there would be an implicit perhaps, confirmation.
DAVID SANGER: If it's serious enough,
I know that Matt has the authority
to go up through the director of national intelligence
and national security adviser, even the president
to get at least an authorization to have a conversation with me
without putting Matt at liability that he's
revealing national security information just
by having a conversation.
MATTHEW OLSEN: Right.
JONATHAN ZITTRAIN: Now let me turn back
for a moment to Cindy and Alex.
If you're catching wind of this-- maybe from David,
who's gathering more background on the story, maybe not--
is this a civil liberties concern for you guys?
CINDY COHN: Yes.
Sure.
I mean, there are innocent people in China
who would like to be able to have a private conversation.
This is mass surveillance of lots and lots
of innocent people in China.
And then subjecting-- well, there's facial recognition.
So there's content that's being taken and done.
And then it looks like just metadata
they're using to match the terrorist database.
But still this is massive, looks like they're
attempting to surveil all of the users of this service
on the off chance that some of them
might be people who they're interested in.
JONATHAN ZITTRAIN: And is this a basis for a lawsuit?
CINDY COHN: I don't see standing so far for a lawsuit
in the United States.
But at the Electronic Freedom Foundation
or whatever you called us, we don't just
care about Americans.
We care about building a digital world where people
feel safe to be able to talk to each other without a kind
of invisible third person or fourth or fifth listening
in on the conversation on the off chance
that they might be doing something wrong.
So my international team would definitely
be very interested in this even if my domestic lawyers would
not, I think, at this point have the basis
for an American lawsuit.
JONATHAN ZITTRAIN: Imagine that it
further leaks, slide number 97.
There's a picture of somebody using
the app who appears to be in front of the Statue of Liberty.
And they do somewhat drolly observe,
"We have experienced some challenges involving
incidental collection of data corresponding to US persons.
Our team is hard at work improving our filtering
and minimization protocols."
Anything lawsuit worthy now?
CINDY COHN: Well, I'd like know who
that guy is because I'd have a conversation with him about--
JONATHAN ZITTRAIN: He's everywhere,
I gotta say, that guy.
CINDY COHN: --needing counsel.
Yeah, certainly.
You're in the US now.
So presumably there are US persons
who are being subjected to the facial recognition
unless that guy's a--
he might not be an American.
And none of those people might be Americans.
But I think that we would certainly
think that there are at least, there
are US persons that are going to be [INAUDIBLE]..
JONATHAN ZITTRAIN: And they might not even be US persons,
but they are on US soil, which might accord them
certain protections.
I don't know.
Alex, is your litigation bug awakening?
ALEX ABDO: There's a possibility--
especially if that individual is the one sending
the communication and it ended up in this slide--
that that person would have standing to sue,
to challenge what's going on.
Although that I think avoids the bigger and the harder question,
which is the one that Cindy raised,
which is that privacy is not just a domestic civil right.
It is an international human right.
The rules of privacy internationally
are unsettled at the moment, and there is a hard fight
for what they should be.
And that's where I still see this mostly in.
But to the extent--
JONATHAN ZITTRAIN: Alex, is what you're asking for,
that basically the Special Security Agency
just like take a nap?
Should it just cease its efforts overseas [INAUDIBLE]??
ALEX ABDO: Definitely not, no.
But the one dividing line that international law might
settle on is between targeted surveillance and mass
surveillance.
And I don't know whether we know enough about the program yet
to say that this is mass surveillance.
From the last slide, it looked as though that they
were decrypting everything.
And if so, that's mass surveillance.
If they're doing that you know decryption
with the intent and the actuality of targeting
specific people, then I think it's a different question.
But if the Special Security Agency
is sweeping in all the communications that it can,
irrespective at the outset of whether there
are communications between targets and not,
between bad actors and not, then that raises
the threat of mass surveillance and
whether international human rights are
consistent with that kind of surveillance.
JONATHAN ZITTRAIN: Bruce, does this distinction sing to you?
BRUCE SCHNEIER: It definitely is an important distinction.
And this is certainly a mass surveillance system,
that the entire database is being searched,
there's pattern matching and anything
that is a match goes back.
And it's either real or a false positive.
JONATHAN ZITTRAIN: And are you with Alex
in saying, if you're the Special Security Agency,
we need the equivalent kind of the particularization
of a warrant before you should be cracking stuff overseas
because doing a mass search of everybody
to try to grab something relevant
is somehow a form of rights infringement
that we shouldn't accept?
BRUCE SCHNEIER: I think it is.
It's clear that this is allowed.
This is allowed by current law.
I don't think there's any challenge to the NSA,
that they're exceeding their authority in any way.
And so this is much more a question of what should
the authority be?
And do we want to live in a world,
as Cindy said, where even people outside the US
have this presumption of privacy in their conversations?
Or do you live in a world where NSA
can grab whatever they can because it
happens to be outside the US?
CINDY COHN: I would say that-- just a small addition
to something that Bruce said.
I mean, I think in an international human rights
context, we look at whether a tool is
necessary and proportionate.
Those are the kind of magic words.
And I think there is a very serious
international legal analysis that
says this kind of mass surveillance
would never meet the proportionate wing,
even if you've got the necessary wing.
So I don't think it's clear that this is legal.
It's certainly clear that the US government has issued
an executive order granting this authority to its things,
but those are not the same thing, I think.
JONATHAN ZITTRAIN: Andrew?
ANDREW MCLAUGHLIN: So if I'm still the CEO of Faceplant,
what's interesting to me about this and troubling
and feeds into the kind of conundrums
that we're trying to unravel, is that we're operating globally.
We'd like to be able to compete in China.
We would like very much there to be
a rule of broad international recognition of minimization
because, for the reasons that we were sort of alluding
to earlier, for me to operate internationally
and to both merit and maintain the trust of users,
I need to not only protect Azerbaijani users from being
wantonly searched by the US, but also by Russia and also
by South Africa.
I'm hiring sales organizations and putting engineers
all over the planet.
In order to deliver services I have
to put data centers in many different jurisdictions
in order to serve up content subjecting me
to many jurisdictions.
So I would like that very much.
What's interesting about this case though is, I wonder,
does it change your thinking, Alex and Cindy,
to know that the Chinese government is conducting
real time mass surveillance through SecretChat 24/7,
every single communication getting stored?
Does that make it any more or less troubling for the NSA
to do the same thing?
ALEX ABDO: No, I don't think so.
I don't think the answer can be, they're
doing it so we can do it, too.
That's a kind of least common denominator
approach to human rights.
And that's not one that I would endorse.
CINDY COHN: Yeah, absolutely.
To me, the fact that they're doing it
is a reason why we should actually
pick a different course and one that actually
protects people's rights.
I don't--
JONATHAN ZITTRAIN: Even if the expectation of privacy
of the users themselves may be gosh,
everybody is watching everybody.
CINDY COHN: Well, I think the expectation of privacy analysis
is reaching a bit of its ending point--
JONATHAN ZITTRAIN: Expiration date.
CINDY COHN: --in lots of places in the digital world.
And this assumption, by the way, that by agreeing
to the terms of service, which you never ever read,
you've handed over your constitutional rights
is also one that we kind of slid by earlier,
but that I would want a pause on.
I don't think that you can contract away things
certainly not in the way that we think of contracts
in the digital age.
So no, I think that I would not say that that's the right path.
ANDREW MCLAUGHLIN: So to just put
this in a nutshell, what's troubling for me,
then, is to try to figure out whether I architect my services
and policies around a subjective expectation of privacy
or a normative rule about what privacy should be.
And I'd rather do the latter, but there
are lots of countries that force me to do the former.
CINDY COHN: Yeah, that's why we have
to join together to try to raise the bar for everybody.
I mean, that's our work.
That's why I run a little nonprofit.
If it were already done, then I could go
do something else, which would be kind of fun.
But I want you to join--
JONATHAN ZITTRAIN: Ames County Police Department
will have you.
CINDY COHN: You, as the CEO, I want
you to join with me because we want to build a world that we
want to live in.
JONATHAN ZITTRAIN: So not to interrupt the kumbaya
moment here, but Alex, wearing your deputy CTO hat,
if it landed in your lap from a brand
new president who, let us hypothesize,
has thought about any of this not at all, and was like,
give me a memo.
I only deal in bullet points and pictures.
Give me a three bullet point, one picture memo that tells me
what the new policy should be.
And I am very open to completely undoing
whatever the prior policy was even
though I'm not sure what it is.
ALEXANDER MACGILLIVRAY: I mean, I
think it's hard to divorce my personal feelings from the role
that you've put me in.
And I think we are trying to move to a world
where there is a sense of privacy,
even though we have a number of different things working
against it.
And so I take Andrew's point to be a really good one, which is,
we should be trying to raise this bar across the world.
And as far as the US company's interests within the general,
in this general conversation, if most people don't think
that they can put stuff through a US company
or in this case, a Chinese company,
without giving it up to every single law enforcement
agency around the globe, we're going to be in a position
where two things are going to happen.
Either we're going to move away from that model
and move back towards a first person storage, first person
trust model.
JONATHAN ZITTRAIN: Freedom box, we literally
have something in our house.
ALEXANDER MACGILLIVRAY: Or we're going to move to a model
where that opportunity that the Secret Service agency currently
has to go after that particular box
where there is opportunity to look
at the information in unencrypted form
goes away, because the only way that I can answer CEO Andrew
as engineer at his company--
how do I how do I protect a particular user's
communication-- is to make it so that the company itself,
Faceplant, doesn't have that, doesn't have that access.
So I think we quickly move, and this is the point
that I think Bruce raised earlier
but this move away from a first person and a government
needing to come at me or to compromise me in order
to get my information to all of the stuff being done
through intermediaries and going to SecretChat
to get everything.
The only other thing I would raise
is I also want to be talking about how the Special Security
Agency compromised the box.
And is that a compromise that I'm
going to be reading about in The New York Times in three weeks
that actually, that compromise was also picked up
by a bunch of other intelligence agencies
and all of the companies all over the world, including
the White House, are having trouble with a breach because
of the compromise.
CINDY COHN: That's how Dark Lord got the pictures.
DAVID SANGER: He just got at what the central news
story is here, which is, where did this, how did this happen?
Was it based on some kind of a flaw that the United States
government may have found and stockpiled
and its stockpile of cyber weapons?
Did it happen from somebody outside who might have
stolen part of that stockpile?
That's all pretty interesting news stories.
And that's part of what I would take up
in my conversation with Matt.
JONATHAN ZITTRAIN: And Bruce, I know you want to say something.
I was just going to ask you quickly,
from the tail end of Alex's observations,
if somebody, an enlightened CEO like Andrew at Faceplant,
is kind of feeling like he's wanting the system
to be less open to general searches--
so that when he's given the warrant if he's given it,
he can just do a shruggy and say, I can't make that happen,
in part, because he doesn't want every country around the world
to demand that of him, is it possible these days
to architect global services so they are inured
from these kinds of global searches but still able
to turn a profit from the kind of ubiquitous advertising
that LL Bean wants?
BRUCE SCHNEIER: So, I'm going to pull this apart
because we have two very different use cases here.
That we have the Justice Department coming
in and saying, do this search.
And, yes, Faceplant can architect their systems
so they can't do that search.
This is very different.
This is the SSA breaking the encryption.
And I'm now going to invoke the trope of technologists
always look for legal solutions and lawyers look
for technological solutions, that, in fact, the NSA is
happy with Faceplant or whoever this Chinese company is,
saying, we are going to have the tech solve this.
Because the SSA is in the business of breaking security
tech.
And they're very good at it.
So tech solutions that will have flaws and vulnerabilities--
JONATHAN ZITTRAIN: Just a quick check in.
Matt, is the SSA OK--
I assume the SSA is OK with doing what I've just described.
This slide is not like, oh, my god,
I can't believe we did that.
MATTHEW OLSEN: Yeah.
I mean, generally foreign intelligence collection
around the world targeted in this way,
I mean, I would argue potentially not.
I wouldn't necessarily use the term mass surveillance.
This is a company that there's a foreign intelligence reason
to believe that there is information
that's being collected through this company that is valuable.
JONATHAN ZITTRAIN: But Bruce is saying if the law doesn't work,
you've always got the tech.
BRUCE SCHNEIER: I mean, we have this NSA claiming every phone
call out of Bermuda.
I mean, we have examples of this from the Snowden archives.
JONATHAN ZITTRAIN: I just wanted to ask Matt,
would you see the SSA exploiting the same vulnerability
if it knew about it to get at Faceplant's servers
if Faceplant is an American company on US soil?
MATTHEW OLSEN: Different calculus
with an American company.
BRUCE SCHNEIER: Even if the servers
are not in the United States?
I'm thinking about what they do with Google.
MATTHEW OLSEN: Generally different calculus.
JONATHAN ZITTRAIN: Got it.
BRUCE SCHNEIER: So it's very, very different.
I mean, yes.
We can architect Faceplant systems that Faceplant
can say, no, we can't do that.
We have a lot more trouble architecting Faceplant systems
so that the SSA can't surreptitiously and maliciously
go into Faceplant servers and do it without their knowledge
or consent.
JONATHAN ZITTRAIN: And that's just a fact
that it's just really hard to build good security.
BRUCE SCHNEIER: It is really hard to build good security.
And it is easier, if you have the SSA's budget, which
we have seen from Snowden's documents,
to defeat that security.
And this is why I think legal and policy solutions are
very important here.
Because I can't rely solely on the tech.
JONATHAN ZITTRAIN: And David, just
as you're about to maybe go to press with this story,
one of your tech folks does discover
some metadata that suggests that your leaker is,
in fact, from Vladivostok.
And I'm just wondering, does that at all
change the equities of your publishing?
DAVID SANGER: Well, it could well.
It's possible that the leaker made up this document.
That's one of the things you would be concerned about.
JONATHAN ZITTRAIN: Yeah, but Matt gave away
the game there it seems.
DAVID SANGER: Right.
But it's also possible that while the leaker was Russian
and maybe the leaker was a troll farm for all I know,
that the document's still genuine.
And so at that point, part of the story
becomes the motivation of the leak.
It's very possible that the leaker here
is trying to sow some discord in the world.
It could be the leaker is trying to make
life miserable between China and the United States.
And I'd want to know that.
JONATHAN ZITTRAIN: And is that motivation something worth
factoring into your decision whether to go ahead
with the story?
DAVID SANGER: It certainly is something
that I would want to note in the story
if we go ahead with the story.
JONATHAN ZITTRAIN: We realize this will sow great dissension.
That appears to be the motivation of the leak.
Sorry, please enjoy this story.
DAVID SANGER: Yeah, I mean as long
as you're up front with the reader about what
the motivations of your leaker is, then absolutely,
the fundamental news story could be central to this.
And you know, a point that I would make, and probably would
have in my conversation with Matt,
is that we already had in the example of OPM
when the Chinese came in and stole all those documents, what
was the reaction of the director of National Intelligence?
He said, this was pretty good.
Nice work.
If I could do the same thing, I would have done it.
And now the document may have indicated he did.
MATTHEW OLSEN: There would be again,
assuming this is authentic, this is a real program,
there would be a serious conversation.
And I do think The New York Times would take it seriously,
that this is a valuable program that has produced results.
And if it's in The New York Times,
the program will be shot.
JONATHAN ZITTRAIN: Yes.
Well, our time is drawing to a close.
Our effort in this series of hypotheticals
was to go deep on one of the many leaves of the tree,
national security, privacy, and rule of law,
and get some flavor for how the different actors, who
in some way are quite used to working with one another,
even though they may be in very different positions
with respect to one another, how they think this stuff through.
And maybe moving to the observation
that it used to be that debates over individualized searches,
that was a lot of what we argued about in national security
and Fourth Amendment doctrine.
You had some target already in mind.
And then did you have what you needed to do the warrant?
And you can hear in our discussion,
some efforts to bring back the good old days of those kinds
of particularized warrants, in part
because they're constitutional.
And yet we see a future that is quite tempting for some parties
of this kind of bulk metadata or even content surveillance
that we're going to have to contend with,
for which we're seeing some of the second order effects of,
do we architect systems so that they are inured to this?
Even though, we started off with potentially--
they tug at the heart--
some case studies when, if it's good enough for LL Bean,
how could it not be good enough for,
if we could characterize it and it's
hypothetical so we can as long as it's plausible,
a poor kid who may be under threat
or a celebrity or some such?
So among this group, it's an amazing brain trust.
I see people like Chris Babbitts, Ed Felten,
others in the room, who themselves
have had great experience in these areas.
And I just hope we'll have some time when
we adjourn to talk about all this stuff as a group
informally before lunch.
In the meantime, I just want to thank our panelists so much
for being game to have today's conversation,
and for thinking about these issues.
Thank you all very much.
Thank you.