Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  March 4, 2016 10:00am-10:31am EST

10:00 am
with the money that he has, and he is not going to be in people's pockets because he does have his own money and does not have to take this, that and the other. i feel that he will bring america back from the inside instead of going across seas, across the china, across the he has to fan from the inside out. when you talk to your friends and coworkers about politics, or you vocal about your support for donald trump? i am very vocal about my issues with donald trump when i speak to my friends. when i talk about donald trump, i feel like they are almost because ig my life feel the way i feel, and yes, i am a black man. host: that is roosevelt in indianapolis.
10:01 am
thanks to everyone who called in to participate. "washington journal" will be here tomorrow at 7:00, as well as sunday, etc. weekend, but tv takes over 448 hours beginning at 8:00 saturday morning. 48 hours of nonfiction books and authors on a span to. we have a live call in this sunday as well with a new yorker writer, jane mayer. book is "darkt money" about the koch brothers. ,e will be taking your calls and then american history tv takes over c-span3 for 48 hours every weekend. you'll be in literacy all sorts of historical events. .o to thanks for being with us, enjoy the rest of your day. [captions copyright national
10:02 am
cable satellite corp. 2015] [captions copyright national cable satellite corp. 2016] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit] into the weekend, live coverage of cpac. that gets underway in about a half hour. gathering today, presidential candidates john k sick ted cruz, also ben carson, who says he will talk about his political future. tonight, former presidential candidate carly fiorina gives the keynote address at 9:00 eastern. more on saturday as well. donald trump speaks at 10:00 eastern after washington journal journal."ngton
10:03 am
at 11:35o rubio speaks a.m. >> so many of my former books were horizontal studies, many countries across a whole region. here, i look at one country in depth, and i use it to explore great teams, i think great teams. war, theaust, the cold challenge of vladimir putin. remember, moldova and romania has a longer border with russia then ukraine has, and to study their borders is a study in history. robert kaplan talks about the history of the balkan states and romania's struggle to gain
10:04 am
democracy since the fall of communism. >> romania was extremely corrupt, because it indefinitely had weak institutions. everything was based on bribes and doubledealing. what this showed was in this is nothing new. what is happening is the romanian population has grown up and become far more sophisticated and is demanding clean government. it is its number one demand. >> sunday night at 8:00 eastern on q&a. the u.s. economy added 240,000 jobs last month and the unemployment rate remained 4.9%. the bureau of labor statistics release those numbers this morning. bloomberg news reports the economy is currently in the best two years of job growth since the last two years of the 1990's. as we mentioned, live coverage , tedac with john kasich
10:05 am
cruz, and ben carson, and others begins at 10:30 a.m. eastern when party chair reince priebus is scheduled to speak. until then, a conversation from this morning's "washington journal." eli dourado from george mason university, director of their technology policy program. should apple unlock that phone from san bernardino? guest: i think it would be a terrible precedent to set to unlock, not just unlock the phone but developed a tool that would undercut their existing security measures. badmain reason it would be is it would set a global precedent, and it is not just the u.s. government that would be making these requests, it would be governments around the world.
10:06 am
governments of china and russia and other authoritarian countries who may not use it with the best of intentions. host: james comey testified this week. i want to get your reaction. jobs, toe two investigate cases like san bernardino and to use tools that are lawful and appropriate. our second job is to tell american people that the tools you are using are becoming less and less effective. it is not our job to tell the american people how to resolve that problem. we are not some alien force imposed on america from mars. we only use the tools given to us under the law and so our job is to tell people there is a problem. everybody should care about it. costs and how do we think about that? guest: i think that director
10:07 am
ey is right that the fbi has the obligation to use the tools that are available and under the law. i think there are reasonable arguments that this particular tool they are asking for is not available. apple's brief in the case is quite strong, and we will have to see. i think ultimately this is a question for congress to decide. i think that congress, based on what was said in the hearing, i think congress has shown an interest in accelerating their involvement in the encryption issue, and i think that is what we will end up saying. nationalt about the security aspect, that this was a terrorist and there could be some information to stop another terror attack? guest: i think it is unlikely
10:08 am
that there is information on the phone that the fbi does not already have. phonesrorists used other to plan the attack and destroy does. this was their work phone. it does not appear that he used it for this purpose. he had personal phones that he used for that purpose that were destroyed. the other reason is the fbi has sought from apple and apple has cooperated and given the fbi the icloud back up. apple has turned that information over to the fbi. reseti made a mistake and the password on the icloud account so we do not have the very latest information from the account. the other reason is the fbi has
10:09 am
sought from verizon, the carrier associated with the phone, the phone call and text messaging data from the phone, even for the period that is not covered by the icloud back up's. the fbi has quite a bit of information on what is on this phone already. i think this is not being brought to further this particular investigation but i think it is being brought as a test case, because the facts are so conducive to the issue that you talked about, the public opinion, does this is a very rare terrorist case, national security case. it is the kind of case that is most favorable to the fbi. at the same time, over the same period the fbi made a similar argument in a case in new york and a judge ruled they did not have the authority to ask apple to create a back door into the
10:10 am
iphone. that case was a drug case and i think that is much more typical. law enforcement does not spend most of their time countering terrorism, however important that might be. theirpend a lot of investigative resources on much more petty crimes, including drug use and drug distribution. it is more about, i think, law , thecement wants this tool broad range of investigations it does. host: you all are familiar with the issue we are talking about, the fbi-apple debate. we have divided our lines a little bit differently. if you support apple, if you support the fbi, and all others. if you are supporting apple's position, (202) 748-8000 is the number for you to call.
10:11 am
if you are supporting the fbi and the government, (202) 748-8001. we have our third line as well, (202) 748-8002. the wall street journal saying it is technically possible to unlock a lock iphone without apple's help that would be expensive. what is the downside of opening this one phone? not creating a master key, just opening this one phone. guest: the downside would be the precedent it sets. of apple isg asked for them to develop a new version of the ios operating system. it will take them a few weeks. that operating system will then be loaded on the iphone in question and the fbi will be able to crack the phone in half an hour or so after this is done.
10:12 am
let's suppose that the operating system has been destroyed. case, then in future cases there is nothing stopping the u.s. government you need to take the weeks it takes for us to use in this case. it could happen again. it is not just a slippery slope, this is legal precedents. it is not about -- it is not , i don't think it is a stretch, or a progression. it is impossible to keep the president -- president just this once. paul from tennessee.
10:13 am
what is your view on this issue is m? days beforeited 30 i could get a chance to talk. . would like to ask you i have a question for mr. dourado. simple.pretty this is madness. i would love to see donald trump in the office today because they would bus that phone open. families that live in grief because of a terrorist attack. let's look at fort hood, chattanooga, all the things around the country going on right now. muslims want to kill our people. has told the fbi to not get in this man's phone.
10:14 am
line is a very fine andeen what this man does treason. the president of the united states is muslim and he is going to make sure these people are protected. host: we are not going to address the erroneous comments that the president is a muslim. that,ke this first point hey, these are terrorist attacks. guest: there have been terrorist attacks in the u.s. the latest statistics i have seen it since september 11, there have been nine jihadist in the u.s. and 45 people have died. that is very tragic. blessedly rare that
10:15 am
we have terrorist attacks. the real question that we need how much will cracking this iphone do to stop those attacks? this is the first case where anything of that sort has been suggested. i don't think it is true that this will help solve anything. the information on this phone has already been obtained by the fbi. think this will help the investigation at all. there needs to be weighed against the cost of ruining the security of the iphone more generally. forrmation security billions of people around the world, everybody who has an
10:16 am
iphone or any phone, because apple is not the only company that encrypts their phones. cedentms of the pre that it says, it is going to roll in encryption. -- it is going to ruin encryption. have is the potential to access to the private information on the device of this information leaks. we are weighing it against a that it willbility help the investigation against a potential identity theft, potentially prostitution of authoritarian regimes, spying on journalists, increasing the incentive to mug people to steal their phones as you now have
10:17 am
access to information on their device as well. i don't think it is as obvious as the color suggest. host: next call for eli dourado 's george mason university clearance from casper, wyoming. what is your deal -- view on this issue? government should not require apple to do this. when they are doing it, they aren't saying it is just for this stone, but i have heard nine other cases that have nothing to do with terrorism, but murder cases. backdoors it creates a for this, they will want it for everything else. guest: i don't even think the cases,ases were murder they were drug cases. the new york county district
10:18 am
attorney testified this week saying his office had 205 iphones where they wanted to use a similar tool. the fbi story that it is just this one phone has not lasted very long. this toear they do want become routine. host: the political lines on this issue are all over the board. guest: absolutely. host: jill in maryland. -- joe in maryland. have copiesfbi does of verizon's records. they do not know with the content is. there could be a text message from one person to the terrorists saying, you know, i will leave the gun here. it the fbi will not know until they get into the actual device. the fact they have the records is not useful because they need to look into the phone to see what the messages were. that is the first thing.
10:19 am
encryption, apple had the capability was doing it themselves. that was proprietary-only software. to encryption as a business procedure because they did not want the burden of hundreds of thousands of law enforcement being sent to their offices to download phones. it is a business decision by apple. icloud goes, the icloud is only obtained if the person selects it to be backed up. to phone cannot be backed up the icloud upon your discretion. you have to agree to that. you seem to know a lot about this. why is that? i amr: put it this way,
10:20 am
very familiar with apple and their devices and i am intimately aware of law enforcement's concerns. only suspects we cannot access, it is victims. family victims whose members do not have access coats and are unable to give it to law enforcement. we do not know the intimate details of their family member'' death. this is a major issue. thank you for your perspective. eli dourado? guest: it is true that the verizon data is metadata and not necessarily the data. very often enough to follow up on new leads. they would know for instance who the shooter was texting with and so on.
10:21 am
the leads are preserved to the verizon data. again, it is true that icloud backups are optional. apple walks you through a process when you set up the phone and the default option is to academic to icloud. in this case, that is what the shooter had done. then, so, as far as this phone it is noted, particularly a concern. i think the fbi does have all the information that it's going to get. even if apple were to crack the phone. host: how did you get involved in this conversation in this business? i have always loved technology and my background is in economics. have age mason, we center that this academic isearch on policy issues and
10:22 am
-- hadlled to have been the opportunity to join the four years ago and i now leave their technology policy team. phoneopening this compromises all of this security. this is a tweet. we talk about issues involving technology ended on public policy. this weekend, we are talking and senator ed markey former senator jack field. they wrote the 1996 telecom act. it is still an effect. we talked about a variety of issues, but we asked editor markie -- senator markey about the fbi issue. there is how he responded. >> in my opinion, the apple officials should work with the government officials to open
10:23 am
that iphone. at the same time, to keep that code complete secret so that it does not jeopardize the security of every other iphone in the united states, or the world. here.e to find a balance bill gates has not taken that position. i understand tim cook is on the other side. it is a debate that we have to have because otherwise many of these devices can be used for the fairies purposes. there is a mckinsey in quality to all the technology. and worst the technology simultaneously. it can be great and dbase. eli dourado. guest: it is true that technology has lots of dual use.
10:24 am
encryption is a dual use technology that can be used for good or for evil. general canone in be used for good or evil. the issue with encryption is that it is not just about privacy, it is about security for all kinds of information that americans might have. people keep their medical information on their iphones. they keep making records. -- banking records. we are in a world where we need that kind of security. is a barely this complicated issue. i think that congress will ultimately have to decide it. i think there is moment come behind the idea of an encryption commission in congress. there have been proposals for such a commission. host: an encryption commission? guest: yes, that would solve the
10:25 am
issue through a study that congress would commission. instead of in the courts, right? there is an adage that bad cases make bad laws. the precedentant to be sent in this case versus a careful, deliberate study of the issue that might come up with a different -- host: how quickly would congress get to this issue? proposedere is a bill to create the commission. i think it would have reasonable a time period for study, two years. host: a couple of years before we get to a legislative -- guest: i think that is right. tweet saying why
10:26 am
did the fbi changed the password? instructed the san bernardino police department to change the password. weren'tthey just thinking. i think they made a mistake. they did not consult apple about the question. apple said they would have advised not to change the password because then you could take the phone to the wi-fi network and then it would automatically do a new update. kerry int call is akron, ohio. you are on the line with eli dourado. we are talking about the apple/fbi issue. caller: good morning. i have been following this debate for the last several weeks. i see a lot of issues that are being missed the need to be addressed.
10:27 am
plan toa comprehensive deal with the situation. that't say anything at all addresses that. started with the terror attack in san bernardino. the first situation that came out of it was a big rush for gun control because -- on?: which side you fall caller: i follow on the apple's side because it goes to what i was talking about. of what thean issue phone is going on. every time something like that happens, there is going to be a rush to have us give us our privacy. you so much.
10:28 am
loretta lynch, the attorney general, was quoted as saying in a speech in san francisco, she -- apple isas -- is subject to a social contract on this issue. true, butt may be there are a number of national security officials who have sided with apple. the former director of the msa thinks the u.s. is better off with strong encryption. o'connell,ssor, mike thing.e same the same with the department of homeland security. this is precisely what the issue is, is what is in society's best interest? there are a number of national security officials who think
10:29 am
, notwithstanding the difficulties that law enforcement faces, it is still in the national interest of strong encryption. it means u.s. medications can be more secure. it means foreign governments will have less access to american data. -- theot just about national security is a comprehensive issue in terms of putting the need for cyber security for preventing identity theft, foreign espionage, etc. host: here is an article from ." terday's "new york times as carter says he is not in favor of a data back door. barbara in new york. what you think of this issue? even believe't this should be an issue. i believe apple should release all the information on the phone
10:30 am
to the fbi. host: why? caller: because it is a terror attack that happened and they should have access. host: barbara, what if this was a murder case? what if this were a drug deal? should apple release that information to those types of issues as well? caller: absolutely because we are in so much trouble here in the united states that i believe they should have access at all times to anything -- murder cases, anything. i don't think apple should be doing what they are doing right now. they should release all the information regarding that phone. host: think you, ma'am. eli dourado, if this were e-mail they were trying to get or phone old wirelineom an phone, are those different issues? guest: