>> YOUR RIGHT TO PRIVACY.
A DISCUSSION IN TUCSON.
>> WE HAVE A GOVERNMENT THAT
SEEMS TO BE ALMOST COMPLETELY
UNRESTRAINED BY LAW OR THE
CONSTITUTION.
>> STAYING AHEAD OF THE GAME
WHEN IT COMES TO CYBER CRIME.
>> INTHE STALLING CERTAIN PIECES
OF SOFTWARE ON YOUR PHONE BUT
THEY ARE REALLY MONITORING AND
COLLECTING DATA.
A LOT OF PEOPLE DON'T REALIZE
THAT.
>> COVERING THE STATE CAPITOL A
CHALLENGE FOR JOURNALISTS, THIS
>>> HELLO AND THANKS FOR JOINING
US.
A UNIQUE FORUM AT THE UNIVERSITY
OF ARIZONA, THE COLLEGE OF
SOCIAL AND BEHAVIORAL SCIENCES
HOSTED A CONVERSATION ON
PRIVACY, THE FEATURED GUEST, AN
AMERICAN CHARGED WITH ESPIONAGE
LIVING IN RUSSIA.
A RARE PANEL DISCUSSION AT
CENTENNIAL HALL ON THE U OF A
CAM PUGS.
ON STAGE FROM RUSSIA, EDWARD
SNOWED BE.
THE FORMER CONTRACTOR FOR THE
NATIONAL SECURITY AGENCY WHO
LEAKED TOP SECRET INFORMATION
AND WAS CHARGED WITH ESPIONAGE.
DPLEN GREENWALD THE JOURNALIST
WHO PUBLISHED THE INFORMATION
AND SNOWDEN REFLECTED ON HIS
TIME AS A CONTRACTOR.
>> AWARENESS OF WHAT THE
GOVERNMENT -- I SAW THE PUBLIC
OF GOVERNMENT OFFICIALS WERE
DIFFERENT FROM THE REALITY OF
WHAT WAS HAPPENING.
IN FACT, WE WERE OPERATING IN A
WAY THAT MANY ARGUED WAS
UNCONSTITUTIONAL.
THE COURTS HAVE SINCE CONFIRMED
THAT DECLARING THESE PROGRAMS
LIKELY UNCONSTITUTIONAL AND EVEN
CALLING THEM OR WELLIAN.
>> HE HAS BEEN CALLED EVERYTHING
FROM A HERO TO A TRAITOR.
>> WE HAVE A GOVERNMENT THAT
SEEMS TO BE ALMOST COMPLETELY
UNRESTRAINED BY LAW, OR THE
CONSTITUTION.
WE HAD FORMER GOVERNMENT
OFFICIALS SAY THINGS LIKE WE DO
IT ILLEGAL, THE UNCONSTITUTIONAL
TAKES LONGER.
>> A CONVERSATION ON PRIVACY AND
INFORMATION.
>> I WAS WORKING IN THE LAB
WHERE THE EARLY STAGES OF THE
INTERNET WERE DEVELOPED,
PENTAGON FUNDED LABORATORY AT
M.I.T., AFTER THE LONG PERIOD OF
RISKY CREATIVE WORK AT TAXPAYER
EXPENSE, THE INTERNET WAS HANDED
OVER TO PRIVATE ENTERPRISE FOR
MARKETING AND PROFIT MAKING.
>> THE PROFESSOR AT THE
MASSACHUSETTS INSTITUTE OF
TECHNOLOGY ARGUES SURVEILLANCE
IS NOT EFFECTIVE AT STOPPING
TERRORISM.
>> INTERNET WAS INTENDED BY THE
EARLY DESIGNERS TO BE A FREE,
OPEN MEANS OF COMMUNICATION
WHICH WOULD BE ORIGINALLY IT WAS
INTENDED ACTUALLY FOR SCIENTISTS
TO INTERCHANGE REALLY, BUT THEN
MORE BROADLY FOR THE GENERAL
PUBLIC.
>> GREENWALD, A FORMER LAWYER
STANDS BY PUBLISHING THE
DOCUMENTS.
>> EVERYTHING WE'VE DONE IN THIS
MATTER AND EVERYTHING ELSE I TRY
AND DO IN MY JOURNALISM IS ABOUT
TRYING TO MAKE THINGS MORE
DIFFICULT FOR THOSE WHO WE WOULD
THE GREATEST POWER.
>> IT'S UNKNOWN IF SNOWDEN WILL
STEP FOOT ON U.S. SOIL AGAIN HE
HAS NO REGRETS.
>> HOW DO WE REACH THE POINT
WHERE THE INDIVIDUAL -- BECAUSE
OF COURSE WE DON'T WANT THE
INDIVIDUAL CITIZEN TO BE THE
LAST SAFEGUARD.
>> MORE NOW FROM GLENN
GREENWALD, A FORMER LAWYER
WORKING FOR THE GUARDIAN AT THE
TIME HE PUBLISHED THOUSANDS OF
TOP SECRET DOCUMENTS FROM THE
NSA.
>> OVERWHELMINGLY I FEEL
EXTREMELY POSITIVE ABOUT IT.
THERE HAVE BEEN COSTS AND RISKS
AND PRESSURES AND VARIOUS FORMS
OF ATTACK AND THE LIKE I WOULD
PUT IN THE NEGATIVE COLUMN BUT
IF YOU GO INTO JOURNALISM AS I
DID 10 YEARS AGO YOU DO SO IN
ORDER TO HAVE A STORY LIKE THIS,
ONE THAT TRIGGERS A GLOBAL
DEBATE AND DOZENS OF COUNTRIES
ON MULTIPLE CONTINENTS ABOUT A
VARIETY OF ISSUES INCLUDING THE
VALUE OF PRIVACY IN THE DIGITAL
AGE AND THE DANGERS OF
GOVERNMENT SECRECY AND THE ROLE
OF JOURNALISM IN DEMOCRACY, IT
HAS LED TO REFORMS OF MULTIPLE
KIND, SHIFTED THE LANDSCAPE IN
TERMS OF THE GOVERNMENT'S
ABILITY TO SPY ON PEOPLE OVER
THE INTERNET, AND SO I FEEL
EXTREMELY POSITIVE ABOUT THE
CHOICES THAT I MADE AND THE
JOURNALISM I HAVE DONE AND THE
EFFECT IT HAD.
>> DO YOU HAVE REGRETS HOW THIS
TURNED OUT?
>> NO.
IN FACT, IF YOU -- IT'S FUNNY
WHEN MY REPORTING PARTNER, WHO
FILMED A LOT OF WHAT TOOK PLACE
IN HONG KONG FOR THE FILM
CITIZEN 4, I WATCHED THE RAW
FOOTAGE BEFORE SHE WAS DONE
EDITING THE FILM IT REMINDED ME
WE HAD A LOT OF CONVERSATIONS,
SNOWDEN AND I, IN HONG KONG
ABOUT WHAT WE HOPED TO GENERATE
THE KIND OF DEBATE WE HOPED TO
TRIGGER WITH THE REPORTING.
AND HIS BIG CONCERN AT THE TIME
WAS THAT WE WOULD REVEAL THIS,
HE WOULD UNRAVEL HIS LIFE AND
THE WORLD WOULD SHRUG AND IT
WOULD BE A ONE OR TWO-DAY STORY
AND I DON'T CARE AND MOVE ON.
AND THE FACT THAT THERE HAS BEEN
THIS YOU KNOW, TIDAL WAVE OF
INTEREST AROUND THE WORLD AND
ALL KINDS OF FALLOUT THAT TO
THIS DAY CONTINUES TO UNFOLD,
HAS BEEN REALLY GRATIFYING.
OF COURSE THERE ARE INDIVIDUAL
DECISIONS I MIGHT DO DIFFERENTLY
IF I HAD THEM TO DO OVER AGAIN
AS TO WHICH DOCUMENTS RELEASED
OR WHICH ORDER OR HOW THEY WERE
TALKED ABOUT.
SMALL DECISIONS I COULD
RE-EVALUATE BUT OVERALL I'M
REALLY -- I FEEL ABOUT TWA WE
DID THE JOURNALISM.
>> WHAT DID YOU WANT THE PUBLIC
TO GAIN, TO KNOW ABOUT THE NSA?
>> MORE THAN ANYTHING, I
REMEMBER THE FIRST TIME I READ
THROUGH THE HUGE ARCHIVE THAT
SNOWDEN PROVIDED US, WHAT STRUCK
ME WAS NOT THE SUBVERSION OF
DEMOCRACY THOUGH THAT WAS QUITE
SEVERE AND VERY SIGNIFICANT.
INSTEAD IT WAS THE SUBVERSION OF
DEMOCRACY THAT THEY REVEALED BY
WHICH I MEAN THAT THESE
INCREDIBLY CONSEQUENTIAL
DECISIONS ABOUT WHAT THE
INTERNET WOULD BE AND THE EXTENT
TO WHICH THE U.S. GOVERNMENT
WOULD SPY ON IT AND THE WAY IN
WHICH IT WOULD COMPROMISE
PEOPLE'S PRIVACY, WAS DONE
COMPLETELY IN THE DARK WITH NO
PUBLIC DEBATE AND NO ROLE OF ANY
KIND ON THE PART OF THE
CITIZENRY TO PARTICIPATE IN THAT
DECISION MAKING PROCESS WHICH TO
ME SEEMED TO BE THE ANTITHESIS.
I FELT IT WAS MY ROLE NOT TO
DICTATE TO PEOPLE HOW THEY
SHOULD THINK ABOUT THESE DEBATES
OR TO TRY AND FORCE OUTCOMES
THAT WERE IN LINE WITH MY
PREFERENCES, BUT INSTEAD TO
SHINE A LIGHT ON WHAT THE
GOVERNMENT HAD DONE IN THE DARK
SO THAT PEOPLE COULD BE INFORMED
ABOUT WHAT THE GOVERNMENT WAS
DOING, THEY COULD BECOME AWARE
OF WHAT THE GOVERNMENT WAS
TRYING TO HIDE, SO THAT A
REASONED INFORMED DEBATE COULD
TAKE PLACE.
>> GIVEN OUR STATE OF TECHNOLOGY
AND THE INTERNET, ARE WE SAFE,
TO DO WE HAVE A RIGHT TO PRIVACY
ANY MORE?
>> YOU HAVE A RIGHT TO PRIVACY
FOR CERTAIN.
THE CONSTITUTION GUARANTEES
THAT.
COURTS THAT HAVE EVALUATE WHAT
HAD THE NSA IS DOING IN LIGHT OF
THESE REVELATIONS HAVE CONCLUDED
REPEATEDLY THAT IT VIOLATES THE
LAW AND THE CONSTITUTION BASED
ON PRIVACY RIGHTS OF THE FOURTH
AMENDMENT AND OTHER COMPONENTS
OF THE BILL OF RIGHTS GUARANTEE.
THE QUESTION BECOMES DO YOU
REALLY HAVE THE ABILITY TO
MAINTAIN PRIVACY ON THE
INTERNET?
PRIOR TO THIS SNOWDEN REPORTING
THE ANSWER WAS DEFINITELY NOT.
THE NSA AND ITS PARTNERS IN THE
UK, CANADA AND NEW ZEALAND AND
AUSTRALIA DEVISED A SYSTEM THAT
WAS THE ESSENTIALLY UBIQUITOUS.
BECAUSE THEY DID IT IN SECRET
THERE WERE NO DEFENSES SO EVERY
E-MAIL YOU SENT, EVERY CHAT,
EVERY SEARCH YOU DID ON THE
INTERNET WAS SUSCEPTIBLE TO
BEING COLLECTED AND STORED AND
IF THE NSA WANTED, MONITORED AND
ANALYZED.
MORE THAN ANYTHING THAT'S WHAT
HAS CHANGED IN THE WAKE OF THE
REPORTING IS THAT NOW BECAUSE
PEOPLE UNDERSTAND THE EXTENT TO
WHICH PRIVACY HAS BEEN
COMPROMISE THEY HAD CAN AND DO
USE THEIR OWN ENCRYPTION THAT
BUILDS A MATHEMATICAL
IMPENETRABLE WALL AROUND THEIR
COMMUNICATIONS ON THE INTERNET.
MORE SIGNIFICANT, COMPANIES LIKE
APPLE AND GOOGLE AND FACEBOOK
ARE FEELING A HUGE AMOUNT OF
PRESSURE TO DEMONSTRATE
COMMITMENT TO PROTECTING THE
PRIVACY OF THEIR USERS AS
OPPOSED TO COOPERATING WITH THE
NSA AND YOU SEE THAT IN THE
FIGHT BETWEEN THE FBI AND APPLE
OVER APPLE'S EMBEDDING OF
ENCRYPTION PRODUCTS IN iPHONES
AND THAT REALLY IS A BYPRODUCT
OF THIS INCREASED DEMAND ON THE
PART OF MILLIONS OF PEOPLE THAT
PRIVACY BE PROTECTED AND THAT'S
THE BATTLE NOW IS CAN
TECHNOLOGIES BE DEVELOPED FAST
ENOUGH THAT ALLOWS YOU PRIVACY
ON THE INTERNET, WHILE THE
GOVERNMENT NOT JUST THE U.S.
GOVERNMENT BUT AROUND THE WORLD
ARE SPENDING BILLIONS TRYING TO
FIGURE OUT HOW TO CRACK THROUGH
THAT.
>> THERE ARE PEOPLE WHO CALLED
YOU AND SNOWDEN A TRAITOR,
BETRAYING YOUR GOVERNMENT, EVERY
NAME IN THE BOOK.
DID YOU THINK ABOUT THAT BEFORE
YOU DID THIS?
>> SURE.
MY CHILDHOOD HERO WAS DANIEL
ALSBERG I HAVE NOW HAD THE
OPPORTUNITY TO GET TO KNOW
REALLY WELL AND BECOME FRIENDS
WITH AND COLLEAGUES WITH ON AN
ORGANIZATION WE FOUNDED TO
DEFEND THE FREE PRESS.
I KNOW FROM READING HISTORY
BOOKS THAT WHEN DANIEL ELLSBERG
LEAKED THE PENTAGON PAPERS TENS
OF THOUSANDS OF TOP SECRET
DOCUMENTS SHOWING THAT THE U.S.
GOVERNMENT WAS LYING TO THE
AMERICAN POPULATION ABOUT THE
VIETNAM WAR, THAT HE WAS CALLED
A TRAIT E GUILTY OF TREASON,
BEING AN AGENT OF THE SOVIET
UNION.
HE WAS INDICTED AND CHARGED AND
TRIED BUT ULTIMATELY ACQUITTED
AND 30, 40 YEARS LATER VIRTUALLY
EVERYBODY VIEWS HIM AS A HERO.
SOMEBODY WHO ENGAGED IN NOBLE
BEHAVIOR TO INFORM PEOPLE ON THE
DEMOCRACY.
>> AT THE UNIVERSITY OF ARIZONA
IN THE ELLER COLLEGE OF
MANAGEMENT THERE IS AN
ARTIFICIAL INTELLIGENCE LAB, I'M
JOINED BY THE DIRECTOR DR.
HSINCHUN CHEN AND SAGAR SAMTANI.
FIRST LET'S TALK ABOUT THIS
ARTIFICIAL INTELLIGENCE LAB, DR.
CHEN.
HOW DID YOU COME UP WITH THIS?
>> MY ADVISER, HE CAME FROM THE
CARNEGIE LAB, DR. HERBERT SIMON.
CARNEGIE LAB, DR. HERBERT SIMON.
EVERYTHING WITH THE LAB CAME IN
1989, THE LAB HAS BEEN BRANDED
ARTIFICIAL INTELLIGENCE LAB.
I THINK THE ONLY ONE IN THE
COLLEGE.
>> THESE DAYS AI, IN THE SIMPLE
FORM YOU ARE TRYING TO TEACH
COMPUTER TO DO THINGS THAT HUMAN
ARE GOOD AT LIKE PLAYING CHESS
AND SONGS, IT REQUIRE HUMAN
INTELLIGENCE AND TEACHING YOUR
COMPUTER TO EMULATE THAT.
WE CALL DATA MINING, REQUIRE A
LOT OF DEVELOPMENT AND THAT YOU
NEED IN GREATER.
>> PART OF THAT IS THE AZ SECURE
PROGRAM.
YOU ARE A PH.D. STUDENT.
WHAT IS IT THAT INTERESTED YOU?
>> THE EMPHASIS ON CYBER
SECURITY AND GROWING EMPHASIS IN
SOCIETY HOW PEOPLE NEED TO BE
MORE AWARE OF THEIR CYBER
SECURITY CONCERNS.
AND ALSO THE APPROACHES THAT DR.
CHEN IS TAKING IN THE ARTIFICIAL
INTELLIGENCE LAB AS FAR AS USING
ARTIFICIAL INTELLIGENCE
APPROACHES IN CYBER SECURITY
CONTEXT, SOMETHING THAT IS TRULY
UNIQUE, NOT ONLY THAT BUT ALSO
LOOKING AT SPECIFIC TYPES OF
DATA THAT OTHER SECURITY
RESEARCHERS AREN'T LOOKING AT
ALL THAT MUCH.
>> SO YOU'RE TRYING TO OUTSMART
THE HACKERS?
>> YEAH.
I THINK WE HAVE THE POTENTIAL DO
SOMETHING GOOD UNDERSTANDING THE
INTENT, MOTIVATION.
IN THE PAST IN SECURITY SPACE
OVER THE PAST ALMOST 10 YEARS
HAS BEEN VERY REACTIVE.
PROTECTING YOURSELF.
YOU TRY TO BLOCK THE BULLET THAT
IS SHOOTING AT YOU.
IN OUR RESEARCH WE TRY TO
UNDERSTAND THE SHOOTERS BEHIND
THE BULLET, AND THE HACKERS ARE
THE PEOPLE WHO CREATE A BULLET,
A WEAPON SHOOT AT YOU.
SO THIS PROGRAM, SCHOLARSHIP AND
ANOTHER RELATED PROGRAM CALLED
HACKER WEB WE TRY TO UNDERSTAND
THE WEB OF HACKERS.
WHERE THEY RESIDE, WHAT DO THEY
CREATE, WHAT KIND OF MALWEAR DO
THEY CREATE.
WHAT DATA DO THEY STEAL FROM YOU
AND SO IT'S A VERY EXCITING
PROGRAM.
>> SAGAR, WHAT CAN THEY TAKE
FROM US?
>> THEY CAN TAKE A LOT OF
PERSONAL RELATED INFORMATION, SO
A LOT OF OUR RESEARCH WHAT WE
FIND IS THAT A LOT OF THE SOCIAL
SECURITY NUMBERS, PERSONAL
IDENTIFICATION NUMBERS ARE FOUND
IN THESE HACKER FORUMS OR
COMMUNITIES WHERE THEY TRADE AND
SELL THAT INFORMATION WITH EACH
OTHER.
THAT TYPICALLY HAPPENS AFTER
THEY BREACHED OR ATTACKED US.
>> IS MOST OF THAT HAPPENING
THROUGH OUR CELL PHONES OR
COMPUTERS OR WHERE?
>> I THINK DEFINITELY THESE DAYS
THE DEVICES CREATE DIFFERENT
AVENUE FOR THEM TO STEAL YOUR
DATA.
BUT EVEN WHEN YOU GO TO ATM
MACHINE, WHEN YOU GO TO TARGET,
SWIPE YOUR CREDIT CARD, THERE IS
MALWARE VIRUSES THAT EMBEDDED
AND COLLECTING NOT 10, 20,
RECORDS, THEY ARE COLLECTING
HUNDREDS OF THOUSANDS OF RECORDS
PER DAY FROM MERCHANTS, FROM
YOUR CELL PHONE AND ONLINE
SHOPS.
WHEN THERE IS A DATA BREACH THIS
IS TYPICALLY NOT IN ORDER OF
THOUSANDS.
IT'S TENS OF MILLIONS OF
RECORDS.
AND THIS HAS BEEN THE DAILY
EVENT OVER THE PAST 12 YEARS.
IT'S NOT GOING TO STOP ANY DAY
SOON.
>> THE PROGRAM IS REALLY TRYING
TO UNDERSTAND WHERE THEY ARE
GETTING THIS INFORMATION, HOW
THEY ARE GETTING IT AND WHAT
THEY INTEND TO DO WITH IT, IS
THAT CORRECT?
>> TRYING TO UNDERSTAND THE
ENTIRE ECOSYSTEM OF THE EXACT
PEOPLE BEHIND IT, WHAT THEIR
MOTIVATIONS ARE AND WHAT THEIR
TOOLS ARE, WHAT THEY ARE USING,
ET CETERA.
>> SO, THE PROGRAM TEACHES
STUDENTS LIKE SAGART PROGRAM IS
FUNDED BY A GRANT.
>> THE PROGRAM HAS BEEN FUNDED
BY TWO OR THREE NATIONAL SCIENCE
FOUNDATION GRANT.
AND THEY ARE ONE IN SCHOLARSHIP
THAT HE WOULD GRADUATE AND
BECOME A GOVERNMENT EMPLOYEE,
BUT DURING THE TRAINING THERE
WILL BE LEARNING, AT THE SAME
TIME LEARNING A LOT OF CUTTING
EDGE TOOLS THAT ALLOW THEM TO BE
ONE TO 10 STEP AHEAD OF THE
HACKERS.
WE COLLECT DATA, WE DO LIN
QUISTIES ANALYSIS.
RUSSIAN SHARING INFORMATION
ABOUT STOLEN CREDIT CARDS, ABOUT
MALWEAR AND OUR PROGRAM LOOKING
AT THE CHINESE MOBILE PAYMENT,
AGAIN A LOT OF -- NOT JUST
DEALING ENGLISH, DEALING WITH
MANY LANGUAGES, RUSSIAN, CHINESE
AND ARABIC AND SO ON.
AND YOU NEED TO UNDERSTAND THE
KIND OF MO DES OPENER RANDA OF
THE GROUP.
WORKING AS A GROUP IN DIFFERENT
SPECIALTY AREAS, FOR THE
RUSSIANS TO THE MOBILE OR CYBER
WAR FAIR FOR THE CHINESE FOR
TURKISH GROUPS.
IT'S DIVIDED, VERY INTERNATIONAL
BUT ALSO VERY TIGHT GROUP.
>> WHAT DRIVES THESE HACKERS?
WHAT IS THEIR MOTIVATION?
>> DEPENDS ON THE TYPE OF GROUP
YOU'RE LOOKING AT.
SO, DR. CHEN MENTIONED A FEW OF
THE GROUPS, THE HACKTIVISTS
MOTIVATED BY ACTIVIST CAMPAIGNS,
THINGS OF THAT NATURE.
SOME FOR FINANCIAL GAIN, SOME OF
THEM DO IT FOR CYBER WAR FAIR.
SO IT DEPENDS ON THE DEMOGRAPHIC
THAT YOU'RE LOOKING AT AND WHAT
THEIR MOTIVATIONS ARE.
>> AND DR. CHEN MENTIONED THAT
YOU WILL EVENTUALLY WORK FOR THE
GOVERNMENT OR A SECURITY AGENCY?
THAT'S THE GOAL TO GET THESE
STUDENTS JOBS?
>> THE PROGRAM WE HAVE GRADUATED
FOUR STUDENTS, WE HAVE 13
RESIDENT IN THE PROGRAM NOW.
WE HAVE FUNDING FOR ABOUT $4.5
MILLION TO TRAIN 40 STUDENTS.
THEY WILL BE SERVING FOR MOST OF
THEM FOR THE AGENCIES IN FEDERAL
GOVERNMENT PROTECTING THE
INFRASTRUCTURE.
AFTER THEY FINISH SERVING FOR
THE GOVERNMENT FOR THE
EQUIVALENT NUMBER OF YEARS IN
THE SCHOLARSHIP FUNDING, THEN
THEY CAN GO THE INDUSTRY, THEY
CAN GO TO GOOGLE, FACEBOOK, AND
COMPANIES AS WELL.
>> IS THAT THE GOAL FOR YOU?
THIS IS WHAT YOU HOPE TO DO?
>> RIGHT.
I MEAN, ONE OF THE MOTIVATING
FACTORS FOR ME TO GET IN THE
PROGRAM WAS THE OPPORTUNITY TO
SERVE THE COUNTRY IN A CYBER
SECURITY POSITION.
AND YOU KNOW, ACADEMIA IS ONE
WAY TO GO ABOUT DOING THIS.
SO IT'S NOT JUST LIMITED TO THE
GOVERNMENT SECTOR BUT ALSO
BECOMING A PROFESSOR IN CYBER
SECURITY AND THINGS LIKE THAT.
MY TRAINING AS FAR AS THE PH.D.
PROGRAM IS TRAINING MORE TOWARD
ACADEMIA AND BECOMING A
PROFESSOR BUT I CAN USE THE
SKILLS I USED FROM THE PROGRAM
TO MAKE A NOVEL CONTRIBUTION IN
ACADEMIA.
>> HOW MANY STUDENTS ARE
ENROLLED?
YOU PROBABLY HAVE STUDENTS
COMING FROM ALL OVER THE COUNTRY
WHO WANT TO PARTICIPATE.
>> FOR THE PROGRAM HAS TO BE
U.S. CITIZEN.
OR RESIDENTS, GREEN CARD HOLDER
SO.
WE HAVE A LOT OF INTEREST FROM
LOCAL ARIZONA STUDENTS BUT ALSO
FROM ALL OVER THE COUNTRY.
BUT OVER THE PAST TWO YEARS WE
HAVE BEEN VERY CAREFUL IN
SELECTING OUR STUDENTS.
THE GOVERNMENT HAS A VERY
STRINGENT ACCEPTANCE AND SUCCESS
RATE.
THE SUCCESS RATE IS 94%.
WHICH MEANS 100 STUDENT YOU ONLY
LOSE FIVE.
SO THE SUCCESS RATE IS VERY
HIGH.
SELECTIVE.
THE PROGRAM ALSO -- THIS IS
CYBER CULT.
IT HAS BEEN CALLED THE WEST
POINT FOR CYBER SECURITY
TRAINING.
IT'S PRESTIGIOUS, WE GIVE THE
STUDENT $80,000 PER YEAR, EVEN
HIGHER THAN A TYPICAL STIPEND IN
A PH.D. PROGRAM.
ALMOST $80,000 FOR TWO YEARS.
$160,000.
THEN GOVERNMENT GIVE YOU
TRAINING, SECURITY CLEARANCE,
PREVAILING RATE IN THE
GOVERNMENT SETTING TYPICALLY IN
WASHINGTON, D.C. AREA AND ALSO
IN OTHER CITIES AS WELL.
WITH TWO YEARS OF TRAINING WITH
A DEGREE, TWO YEARS, WILL GET A
SECURITY, A TOP SECRET
CLEARANCE.
FOUR YEARS, THEN SKY'S THE
LIMIT.
YOU CAN CONTINUE IN THE AGENCY.
I THINK 50% CONTINUE TO STAY IN
THE GOVERNMENT.
THE OTHER 50% MAY DECIDE TO MOVE
INTO OTHER E-COMMERCE OR
CONSULTING FIRM.
>> IT'S FUNDED BECAUSE THIS IS
IMPORTANT WORK.
>> IT IS.
>> WHAT WOULD MOTIVATE YOU?
YOU SAID EARLIER TO SERVE THE
COUNTRY.
I MEAN BECAUSE WE'RE VULNERABLE.
>> RIGHT.
SOCIETAL IMPACT.
THE AREA OF WORK THAT WE'RE IN
RIGHT NOW HAS A LOT OF POTENTIAL
FOR SOCIETAL IMPACT.
SOME OF THE RESEARCH AVENUES
THAT WE ARE LOOKING AT CAN
POTENTIALLY CYBER CRIME MOVING
FORWARD SO THAT'S A BIG
MOTIVATION TO PURSUE THIS LINE
OF RESEARCH.
>> YOU THINK MOST PEOPLE
UNDERSTAND HOW VULNERABLE WE
ARE?
>> KIND OF.
YEAH.
IT DEPENDS.
THERE ARE CERTAIN TECHNICAL
MEASURES THAT ARE PUT IN PLACE
THAT PEOPLE ARE NOT AWARE OF
WHATSOEVER.
SO INSTALLING CERTAIN PIECES OF
SOFTWARE ON YOUR PHONE THAT ARE
BENIGN BUT ARE COLLECTING DATA,
A LOT OF PEOPLE DON'T REALIZE
THAT.
BUT AT THE SAME TIME THERE ARE A
LOT OF PEOPLE WHO ARE YOU KNOW,
VERY PRO ACTIVE ABOUT ANTI-VIRUS
AND PASS WORD PROTECTION AND
THINGS LIKE THAT BUT NOT AWARE
OF THE TECHNICAL
IMPLEMENTATIONS.
>> WHAT ARE SIMPLE THINGS WE CAN
DO AS PRIVATE CITIZENS TO REALLY
MONITOR AND SECURE OUR OWN
SAFETY?
>> I THINK THESE DAYS THE MOBILE
DEVICES POST THE MOST THREATS.
THE MOBILE DEVICES OF CELL
PHONES TO iPAD AND WHAT NOT
ESPECIALLY WHEN YOU ARE
ACCESSING SEEMINGLY BENIGN
WEBSITES, FREE SERVICES AND SO
ON.
YOU HAVE TO CAREFULLY THESE DAYS
MORE SO THAN THREE OR FOUR YEARS
AGO, CAREFULLY LOOK AT THE
PRIVACY SETTING, THE OPT IN OR
OPT OUT THAT MAKE SURE YOU ARE
UNDER THE MOST SECURE MECHANISM.
IN THE PAST WE DON'T THINK ABOUT
THAT.
A LOT OF DATA COLLECTED BY
APPLICATION, IT COULD BE A
FACEBOOK APP, AND TYPICALLY
BETTER PROTECTED.
WHEN YOU ARE CONNECTED TO OTHER
FREE WEBSITES, DICTIONARIES AND
FREE SERVICES, THEY ENTER
COOKIES ON YOUR BROWSER, ON YOUR
PHONES, THAT THEY CAN COLLECT
YOUR IP ADDRESS, THE TIME, THERE
ARE KEY WORDS YOU ARE USING.
EVEN COLLECTED BY INDIVIDUAL
VENDORS IT'S NOT A PROBLEM.
BUT THESE DAYS THEY ARE SHARING
INFORMATION.
THEY BECOME DATA VENDORS.
HOW DO THEY MAKE MONEY FOR FREE
SERVICE.
THEY MUST MAKE MONEY SELLING
YOUR DATA, YOUR ACTIVITY TO
OTHER VENDORS.
WHEN THEY ARE SHARING ACROSS ALL
INDUSTRIES THAT BECOMES VERY
SCARY SCENARIO THAT A LOT OF
PEOPLE OUTSIDE KNOW ABOUT YOU,
AND THEN THEY CAN USE THE DATA
TO TRY AND YOUR VOTING RECORD,
THAT POSES VERY STRONG SECURITY
CONCERN AND PRIVACY CONCERN.
>> SO TECHNOLOGY IS REALLY SORT
OF FOSTERING THESE HACKERS.
>> EXACTLY.
THE PAST TWO OR THREE YEARS YOU
SEE THE PERFECT STORM FORMING.
MORE INFORMATION, MORE MOBILE
DEVICES.
PERFECT STORM ALSO MEANING THAT
HACKER COMMUNITY BECOME MORE
POWERFUL, MORE INTENT GETTING
INFORMATION AND THEY CAN AGAIN
FOR THEIR PERSONAL OR FINANCIAL
BENEFIT.
THIS IS THE TIME YOU HAVE TO PAY
ATTENTION TO PRIVACY AND CYBER
SECURITY.
>>> THE BUZZ NOW WITH MY
COLLEAGUE HERE AT ARIZONA PUBLIC
MEDIA CHRISTOPHER CONOVER.
BUSY WEEK.
DREAMERS, DRIVERS LICENSES AND
NOW THEY ARE ABLE TO USE THEM
HERE.
>> THE U.S. NINTH CIRCUIT COURT
OF APPEALS, FEDERAL COURT RULED
THAT ARIZONA CANNOT DENY DRIVERS
LICENSE TO THE FOLKS WE CALL
DREAMERS AND 2012, THEN GOVERNOR
BREWER ISSUED EXECUTIVE ORDER
THAT SAID NO, THEY CANNOT HAVE
ARIZONA DRIVER LICENSES.
THIS IS WORKING THROUGH THE
COURT SYSTEM.
THE NINTH CIRCUIT THIS WEEK SAID
YES, THEY CAN.
THEY ARE IN THE COUNTRY WITH A
LEGAL STATUS, THEREFORE THEY CAN
HAVE DRIVER'S LICENSES.
WE HAVEN'T HEARD AN OFFICIAL
RESPONSE YET BUT MOST PEOPLE
EXPECT THAT THIS WILL BE
APPEALED TO THE U.S. SUPREME
COURT.
>> DREAMERS CAN DRIVE LEGALLY NO
PROBLEM?
>> AT THIS POINT YES.
WE'LL HAVE TO SEE IF THERE IS AN
APPEAL TO THE SUPREME COURT.
THE ISSUANCE OF THE LICENSES
COULD BE PUT ON HOLD AS AN
INJUNCTION IF THIS WORKS
THROUGH.
BUT UNLESS THAT HAPPENS,
DREAMERS WILL BE ABLE TO GET
LICENSES PER THE NINTH CIRCUIT
COURT OF APPEALS.
>> OTHER NEWS NOW.
THE PRESIDENTIAL PREFERENCE
PRIMARY THAT WILL NOT END.
WHAT IS THE STATUS THERE?
>> WE NOW HAVE OFFICIAL RESULTS,
THAT'S THE NEW PART THIS WEEK,
OR THE NEWEST PART THIS WEEK.
AS YOU SAID IT'S JUST NOT
ENDING.
THE VOTE HAS BEEN CERTIFIED.
THE QUESTIONS NOW REMAIN ABOUT
THOSE LONG LINES IN MARICOPA
COUNTY.
THE U.S. JUSTICE DEPARTMENT
ANNOUNCED THAT THEY ARE
INVESTIGATING.
WHAT THEY ARE ASKING FOR IS AN
EXPLANATION.
IT'S REALLY THE EXPLANATION
EVERYBODY IS ASKING FOR.
HOW WAS IT DECIDED THERE WOULD
ONLY BE 60 POLLING PLACES?
WHERE WERE THEY PLACED?
WHY WERE SOME WHOLE DISTRICTS
FOR EXAMPLE LEFT OUT?
WERE THERE CERTAIN MINORITY
GROUPS HURT MORE THAN OTHERS BUY
THIS?
THE JUSTICE DEPARTMENT IS
LOOKING INTO ALL THIS.
NO TIME TABLE ON WHEN THEY'LL
HAVE A WRAP-UP OF THEIR
INVESTIGATION.
STATE OFFICIALS, COUNTY
OFFICIALS, MARICOPA COUNTY, ARE
COOPERATING AND THEY HAVE ALSO
SAID THIS WON'T HAPPEN FOR THE
MAY SPECIAL ELECTION, IT WON'T
FOR THE AUGUST PRIMARY AND WON'T
HAPPEN IN NOVEMBER.
>> I SAW IT MIRT BE RELATED TO
FUNDING IN REMOVING POLLING
PLACES BECAUSE WE HAVE TO MAKE
BUDGET CUTS?
>> THAT'S WHAT THE MARICOPA
COUNTY RECORDER WAS TRYING TO
SAY WHEN SHE APPEARED BEFORE THE
LEGISLATURE AND IN FRONT OF THE
MARICOPA COUNTY BOARD OF
SUPERVISORS.
THE LEGISLATURE DIDN'T BUY IT.
SAID LOOK, YOU ALWAYS HAD THE
SAME AMOUNT OF MONEY.
WE WERE HOPING TO GIVE YOU MORE
MONEY, BUT WE HAVEN'T REALLY
DECREASED THE AMOUNT OF MONEY
THAT YOU'VE BEEN GIVEN.
SO THE LEGISLATURE WASN'T BUYING
THAT.
ENTIRELY.
>> OKAY.
LET'S MOVE ON.
NEWS THAT CAME OUT LATE IN THE
WEEK HERE, REPORTERS NO LONGER
ALLOWED ON THE HOUSE FLOOR OF
THE ARIZONA CAPITOL UNLESS THEY
CONSENT TO A BACKGROUND CHECK.
>> EXACTLY.
THE HOUSE SPEAKER DAVID GALLEN
PUT IN NEW SECURITY RULES THAT
SAID ALL NON-STAFF MEMBERS IN
ORDER TO HAVE ACCESS TO SECURE
AREAS WHICH THE THE FLOOR IS
WHICH MEMBERS OFFICES ARE ALSO,
MUST GO THROUGH A BACKGROUND
CHECK.
THAT CHECK MEANS THAT YOU HAVE
TO GIVE YOUR NAME, YOUR DRIVER'S
LICENSE, YOUR BIRTH DATE, AND
ANY ALIASES THAT YOU HAVE AND
SOME REPORTERS WORK UNDER
DIFFERENT NAMES.
IT'S COMMON IN OUR BUSINESS.
AND THE REPORTERS SAID WAIT A
MINUTE.
WE HAVE NEVER HAD THIS.
THIS IS THREE QUARTERS OF THE
WAY THROUGH THE SESSION WE'RE
APPROACHING THE 100th DAY.
THIS ISN'T NEEDED.
GALLEN SAID IT'S ALL ABOUT
SECURITY.
NOW, PART OF THIS BACKGROUND
CHECK IS ANY REPORTER WHO IS
FOUND TO HAVE A FELONY
CONVICTION IN THE LAST 10 YEARS
WOULD BE BARRED FROM THE FLOOR
OF THE HOUSE.
OR A MISDEMEANOR CONVICTION IN
THE LAST FIVE YEARS WOULD ALSO
BE BARRED FROM THE FLOOR OF THE
HOUSE.
THERE IS A REPORTER WHO HAS
WRITTEN SOME VERY CRITICAL
STORIES OF SPEAKER GALLEN, SOME
THAT HAVE LAUNCHED AN ATTORNEY
GENERAL'S INVESTIGATION ABOUT
HIS USE OF STATE VEHICLES, WHO
HAS AN ADMITTED MISDEMEANOR
CONVICTION.
AND SO HE WOULD NOT BE ALLOWED
ON THE FLOOR OF THE HOUSE UNDER
THIS.
REPORTERS SAY THIS IS TARGETING,
THIS HAS NOTHING TO DO WITH
SECURITY.
>> TIMING IS PRETTY UNIQUE.
YOU HAVE COVERED THE CAPITOL FOR
YEARS IN ARIZONA AND OTHER
STATES, HAVE YOU SEEN ANYTHING
LIKE THIS?
>> IN FLORIDA WHEN I COVERED THE
CAPITOL FOLLOWING SEPTEMBER 11
WE HAD TO DO BACKGROUND CHECKS,
JEB BUSH WAS GOVERNOR, WHAT
THOSE CHECKS ALLOWED US TO DO
WAS BYPASS SECURITY.
ANY REPORTER, THOUGH, WITH A
CREDENTIAL, A NON-CAPITOL
CREDENTIAL COULD STILL GET INTO
THE REPORTERS GALLERIES OR ON
THE FLOOR AT SPECIFIC TIMES.
THEY JUST COULDN'T BYPASS
SECURITY TO DO IT.
>> THIS COULD MAKE OUR JOBS A
TAD MORE CHALLENGING.
>> A BIT MORE.
>> CHRISTOPHER, THANK YOU.
AND THANK YOU SO MUCH FOR
JOINING US.
THAT'S OUR PROGRAM.
FOR ALL OF US AT ARIZONA PUBLIC