Also in this playlist...
This transcript is automatically generated
Can you in coverage of one of our top stories -- leak here at the reporter who broke the story says -- -- were -- in revealed even more details.
About secret federal surveillance programs.
And -- able come to light in the future over the next few weeks in the meantime there are some new questions about whether snowed in overstated his claims.
How about the government's ability to -- Plan to act checked this little bit at a little context.
Morgan right in the cyber terrorism analysts also former advisor to the state department's anti terrorism assistance program -- -- once worked as an instructor.
For the -- -- -- so Morgan a lot of us when we look for context on.
You know how the government spying on us allegedly.
We we looked set to Hollywood for example or fiction right so let's let's get a little bit of -- on what snowed in sad.
This -- says that.
That our government can reach anyone at any time is that true based on what's technically available our capabilities is that the truth.
Well look the problem with dealing with classified information -- is that it is so hard to separate fact from fiction.
People can create legends they can say things and the intelligence community will not come out say that's wrong because the minute they specifically denies -- -- They've given our enemies insight into our capabilities we say we can't do photographs from a satellite at this resolution.
We just given some stuff away so you'll always get this I can neither confirm nor deny.
But my personal belief is that -- 29 years old at the level the sky was that he's a he's a more about creating his legend.
That he is actually about having the amount of data or the facts that he says he has -- What makes you think that.
Look on the hot I thought behavior analysis interviewed interrogation out -- the NSA.
I mean -- they've quite rightly are very -- aid agency.
The systems were locked down I know later on when you look there's open source information on how they lock down their systems the way they do their code.
You want to simply not walk into the NSA insert -- thumb drive and copy down you know national secrets it just doesn't happen see you on how audit trails.
-- -- -- I'm not prepared to say -- but let me tell you -- the fact that this information -- that that he was talking to the guardian reporter.
Before he went to work doing this the fact that he's got access to this a 29 year old -- his level it just that shocks me that he would have this kind of.
Access so let me ask you sending a little bit more technical one of the things that we're talking a lot about in these kind of broad terms is the data that's out there that all of a -- -- and it didn't the government seems to be saying or at what what we are gleaning from the government is yes we can collect data -- that no we're not getting to the contents.
And Morgan can you explain that as is it possible adjusting gathered Saturday and close right and I'm not really reading -- or at it that is that not possible.
Did this seem to know like -- it seems so strange.
Yeah I know it's possible back in the day as a detective.
We used to be able to do we called pen registers are -- number records we could see who they were calling we could get that with just an administrative subpoena did not require a search warrant.
But if we get a title three to get a electronic intercepts -- that you could hear what they were saying.
That required a higher level of review much more authorization and the rules around it were much more -- now the NSA the CIA they've got absolutely you know.
It's top secret tools they've got tools that we can't even begin to describe so can they get to the -- yes the question is is the policy are they following the policy.
Because the only difference -- a policy in a rule you know released do you follow the yellow line only keeps that car on the other side of the highway because the trust that the good people have trust you know are they doing their job.
And it's in these -- they would have had the answers that right now that that question is being raised in general by lawmakers and by the public just a quick final question for you Morgan.
We've shown this video we're gonna show it again this is this storage facility as being -- -- built in -- -- -- stored -- us again we don't know ton about this but we know what it's a storage facility.
-- -- a look at that how vulnerable does.
It is that do you think -- To sinister forces not not the government but you are any niece having this one -- -- several big buildings in one area of the country.
That storing all of this data.
Well you know there's there's things called physical and logical security so from a physical standpoint.
It becomes a massive operation to get the gates guns guards necessary to secure -- the access controls in and out and then there's logical security how -- we protect the information.
Is it attempting target yes but it's -- -- -- reason I mean it's going to be very hard for an adversary somebody with the capability to destroy it to get there.
But not -- on concern once you start centralizing information put it all in one place.
It makes it easier for analysis and it makes it easier for traffic analysis but it makes it easier for one person if they get the right -- to be able to unlock a lot of stuff.
We have a whole lot more questions for -- you're going to be in studio forest disorder later on this week because.
-- we can secure our information if we can maker emails more secure in her text messages and everything else.
We wanna teacher viewers how they can do that this leaking case or concerns so we'll see right Thursday Morgan in -- -- -- -- we're gonna be ready.
With all of our device since I'm ready to make them all encrypted are marking great to see you thank you semi serious if Thursday --
Filter by section