>> YOUR RIGHT TO PRIVACY.

 

A DISCUSSION IN TUCSON.

 

>> WE HAVE A GOVERNMENT THAT

 

SEEMS TO BE ALMOST COMPLETELY

 

UNRESTRAINED BY LAW OR THE

 

CONSTITUTION.

 

>> STAYING AHEAD OF THE GAME

 

WHEN IT COMES TO CYBER CRIME.

 

>> INTHE STALLING CERTAIN PIECES

 

OF SOFTWARE ON YOUR PHONE BUT

 

THEY ARE REALLY MONITORING AND

 

COLLECTING DATA.

 

A LOT OF PEOPLE DON'T REALIZE

 

THAT.

 

>> COVERING THE STATE CAPITOL A

 

CHALLENGE FOR JOURNALISTS, THIS

 

>>> HELLO AND THANKS FOR JOINING

 

US.

 

A UNIQUE FORUM AT THE UNIVERSITY

 

OF ARIZONA, THE COLLEGE OF

 

SOCIAL AND BEHAVIORAL SCIENCES

 

HOSTED A CONVERSATION ON

 

PRIVACY, THE FEATURED GUEST, AN

 

AMERICAN CHARGED WITH ESPIONAGE

 

LIVING IN RUSSIA.

 

A RARE PANEL DISCUSSION AT

 

CENTENNIAL HALL ON THE U OF A

 

CAM PUGS.

 

ON STAGE FROM RUSSIA, EDWARD

 

SNOWED BE.

 

THE FORMER CONTRACTOR FOR THE

 

NATIONAL SECURITY AGENCY WHO

 

LEAKED TOP SECRET INFORMATION

 

AND WAS CHARGED WITH ESPIONAGE.

 

DPLEN GREENWALD THE JOURNALIST

 

WHO PUBLISHED THE INFORMATION

 

AND SNOWDEN REFLECTED ON HIS

 

TIME AS A CONTRACTOR.

 

>> AWARENESS OF WHAT THE

 

GOVERNMENT -- I SAW THE PUBLIC

 

OF GOVERNMENT OFFICIALS WERE

 

DIFFERENT FROM THE REALITY OF

 

WHAT WAS HAPPENING.

 

IN FACT, WE WERE OPERATING IN A

 

WAY THAT MANY ARGUED WAS

 

UNCONSTITUTIONAL.

 

THE COURTS HAVE SINCE CONFIRMED

 

THAT DECLARING THESE PROGRAMS

 

LIKELY UNCONSTITUTIONAL AND EVEN

 

CALLING THEM OR WELLIAN.

 

>> HE HAS BEEN CALLED EVERYTHING

 

FROM A HERO TO A TRAITOR.

 

>> WE HAVE A GOVERNMENT THAT

 

SEEMS TO BE ALMOST COMPLETELY

 

UNRESTRAINED BY LAW, OR THE

 

CONSTITUTION.

 

WE HAD FORMER GOVERNMENT

 

OFFICIALS SAY THINGS LIKE WE DO

 

IT ILLEGAL, THE UNCONSTITUTIONAL

 

TAKES LONGER.

 

>> A CONVERSATION ON PRIVACY AND

 

INFORMATION.

 

>> I WAS WORKING IN THE LAB

 

WHERE THE EARLY STAGES OF THE

 

INTERNET WERE DEVELOPED,

 

PENTAGON FUNDED LABORATORY AT

 

M.I.T., AFTER THE LONG PERIOD OF

 

RISKY CREATIVE WORK AT TAXPAYER

 

EXPENSE, THE INTERNET WAS HANDED

 

OVER TO PRIVATE ENTERPRISE FOR

 

MARKETING AND PROFIT MAKING.

 

>> THE PROFESSOR AT THE

 

MASSACHUSETTS INSTITUTE OF

 

TECHNOLOGY ARGUES SURVEILLANCE

 

IS NOT EFFECTIVE AT STOPPING

 

TERRORISM.

 

>> INTERNET WAS INTENDED BY THE

 

EARLY DESIGNERS TO BE A FREE,

 

OPEN MEANS OF COMMUNICATION

 

WHICH WOULD BE ORIGINALLY IT WAS

 

INTENDED ACTUALLY FOR SCIENTISTS

 

TO INTERCHANGE REALLY, BUT THEN

 

MORE BROADLY FOR THE GENERAL

 

PUBLIC.

 

>> GREENWALD, A FORMER LAWYER

 

STANDS BY PUBLISHING THE

 

DOCUMENTS.

 

>> EVERYTHING WE'VE DONE IN THIS

 

MATTER AND EVERYTHING ELSE I TRY

 

AND DO IN MY JOURNALISM IS ABOUT

 

TRYING TO MAKE THINGS MORE

 

DIFFICULT FOR THOSE WHO WE WOULD

 

THE GREATEST POWER.

 

>> IT'S UNKNOWN IF SNOWDEN WILL

 

STEP FOOT ON U.S. SOIL AGAIN HE

 

HAS NO REGRETS.

 

>> HOW DO WE REACH THE POINT

 

WHERE THE INDIVIDUAL -- BECAUSE

 

OF COURSE WE DON'T WANT THE

 

INDIVIDUAL CITIZEN TO BE THE

 

LAST SAFEGUARD.

 

>> MORE NOW FROM GLENN

 

GREENWALD, A FORMER LAWYER

 

WORKING FOR THE GUARDIAN AT THE

 

TIME HE PUBLISHED THOUSANDS OF

 

TOP SECRET DOCUMENTS FROM THE

 

NSA.

 

>> OVERWHELMINGLY I FEEL

 

EXTREMELY POSITIVE ABOUT IT.

 

THERE HAVE BEEN COSTS AND RISKS

 

AND PRESSURES AND VARIOUS FORMS

 

OF ATTACK AND THE LIKE I WOULD

 

PUT IN THE NEGATIVE COLUMN BUT

 

IF YOU GO INTO JOURNALISM AS I

 

DID 10 YEARS AGO YOU DO SO IN

 

ORDER TO HAVE A STORY LIKE THIS,

 

ONE THAT TRIGGERS A GLOBAL

 

DEBATE AND DOZENS OF COUNTRIES

 

ON MULTIPLE CONTINENTS ABOUT A

 

VARIETY OF ISSUES INCLUDING THE

 

VALUE OF PRIVACY IN THE DIGITAL

 

AGE AND THE DANGERS OF

 

GOVERNMENT SECRECY AND THE ROLE

 

OF JOURNALISM IN DEMOCRACY, IT

 

HAS LED TO REFORMS OF MULTIPLE

 

KIND, SHIFTED THE LANDSCAPE IN

 

TERMS OF THE GOVERNMENT'S

 

ABILITY TO SPY ON PEOPLE OVER

 

THE INTERNET, AND SO I FEEL

 

EXTREMELY POSITIVE ABOUT THE

 

CHOICES THAT I MADE AND THE

 

JOURNALISM I HAVE DONE AND THE

 

EFFECT IT HAD.

 

>> DO YOU HAVE REGRETS HOW THIS

 

TURNED OUT?

 

>> NO.

 

IN FACT, IF YOU -- IT'S FUNNY

 

WHEN MY REPORTING PARTNER, WHO

 

FILMED A LOT OF WHAT TOOK PLACE

 

IN HONG KONG FOR THE FILM

 

CITIZEN 4, I WATCHED THE RAW

 

FOOTAGE BEFORE SHE WAS DONE

 

EDITING THE FILM IT REMINDED ME

 

WE HAD A LOT OF CONVERSATIONS,

 

SNOWDEN AND I, IN HONG KONG

 

ABOUT WHAT WE HOPED TO GENERATE

 

THE KIND OF DEBATE WE HOPED TO

 

TRIGGER WITH THE REPORTING.

 

AND HIS BIG CONCERN AT THE TIME

 

WAS THAT WE WOULD REVEAL THIS,

 

HE WOULD UNRAVEL HIS LIFE AND

 

THE WORLD WOULD SHRUG AND IT

 

WOULD BE A ONE OR TWO-DAY STORY

 

AND I DON'T CARE AND MOVE ON.

 

AND THE FACT THAT THERE HAS BEEN

 

THIS YOU KNOW, TIDAL WAVE OF

 

INTEREST AROUND THE WORLD AND

 

ALL KINDS OF FALLOUT THAT TO

 

THIS DAY CONTINUES TO UNFOLD,

 

HAS BEEN REALLY GRATIFYING.

 

OF COURSE THERE ARE INDIVIDUAL

 

DECISIONS I MIGHT DO DIFFERENTLY

 

IF I HAD THEM TO DO OVER AGAIN

 

AS TO WHICH DOCUMENTS RELEASED

 

OR WHICH ORDER OR HOW THEY WERE

 

TALKED ABOUT.

 

SMALL DECISIONS I COULD

 

RE-EVALUATE BUT OVERALL I'M

 

REALLY -- I FEEL ABOUT TWA WE

 

DID THE JOURNALISM.

 

>> WHAT DID YOU WANT THE PUBLIC

 

TO GAIN, TO KNOW ABOUT THE NSA?

 

>> MORE THAN ANYTHING, I

 

REMEMBER THE FIRST TIME I READ

 

THROUGH THE HUGE ARCHIVE THAT

 

SNOWDEN PROVIDED US, WHAT STRUCK

 

ME WAS NOT THE SUBVERSION OF

 

DEMOCRACY THOUGH THAT WAS QUITE

 

SEVERE AND VERY SIGNIFICANT.

 

INSTEAD IT WAS THE SUBVERSION OF

 

DEMOCRACY THAT THEY REVEALED BY

 

WHICH I MEAN THAT THESE

 

INCREDIBLY CONSEQUENTIAL

 

DECISIONS ABOUT WHAT THE

 

INTERNET WOULD BE AND THE EXTENT

 

TO WHICH THE U.S. GOVERNMENT

 

WOULD SPY ON IT AND THE WAY IN

 

WHICH IT WOULD COMPROMISE

 

PEOPLE'S PRIVACY, WAS DONE

 

COMPLETELY IN THE DARK WITH NO

 

PUBLIC DEBATE AND NO ROLE OF ANY

 

KIND ON THE PART OF THE

 

CITIZENRY TO PARTICIPATE IN THAT

 

DECISION MAKING PROCESS WHICH TO

 

ME SEEMED TO BE THE ANTITHESIS.

 

I FELT IT WAS MY ROLE NOT TO

 

DICTATE TO PEOPLE HOW THEY

 

SHOULD THINK ABOUT THESE DEBATES

 

OR TO TRY AND FORCE OUTCOMES

 

THAT WERE IN LINE WITH MY

 

PREFERENCES, BUT INSTEAD TO

 

SHINE A LIGHT ON WHAT THE

 

GOVERNMENT HAD DONE IN THE DARK

 

SO THAT PEOPLE COULD BE INFORMED

 

ABOUT WHAT THE GOVERNMENT WAS

 

DOING, THEY COULD BECOME AWARE

 

OF WHAT THE GOVERNMENT WAS

 

TRYING TO HIDE, SO THAT A

 

REASONED INFORMED DEBATE COULD

 

TAKE PLACE.

 

>> GIVEN OUR STATE OF TECHNOLOGY

 

AND THE INTERNET, ARE WE SAFE,

 

TO DO WE HAVE A RIGHT TO PRIVACY

 

ANY MORE?

 

>> YOU HAVE A RIGHT TO PRIVACY

 

FOR CERTAIN.

 

THE CONSTITUTION GUARANTEES

 

THAT.

 

COURTS THAT HAVE EVALUATE WHAT

 

HAD THE NSA IS DOING IN LIGHT OF

 

THESE REVELATIONS HAVE CONCLUDED

 

REPEATEDLY THAT IT VIOLATES THE

 

LAW AND THE CONSTITUTION BASED

 

ON PRIVACY RIGHTS OF THE FOURTH

 

AMENDMENT AND OTHER COMPONENTS

 

OF THE BILL OF RIGHTS GUARANTEE.

 

THE QUESTION BECOMES DO YOU

 

REALLY HAVE THE ABILITY TO

 

MAINTAIN PRIVACY ON THE

 

INTERNET?

 

PRIOR TO THIS SNOWDEN REPORTING

 

THE ANSWER WAS DEFINITELY NOT.

 

THE NSA AND ITS PARTNERS IN THE

 

UK, CANADA AND NEW ZEALAND AND

 

AUSTRALIA DEVISED A SYSTEM THAT

 

WAS THE ESSENTIALLY UBIQUITOUS.

 

BECAUSE THEY DID IT IN SECRET

 

THERE WERE NO DEFENSES SO EVERY

 

E-MAIL YOU SENT, EVERY CHAT,

 

EVERY SEARCH YOU DID ON THE

 

INTERNET WAS SUSCEPTIBLE TO

 

BEING COLLECTED AND STORED AND

 

IF THE NSA WANTED, MONITORED AND

 

ANALYZED.

 

MORE THAN ANYTHING THAT'S WHAT

 

HAS CHANGED IN THE WAKE OF THE

 

REPORTING IS THAT NOW BECAUSE

 

PEOPLE UNDERSTAND THE EXTENT TO

 

WHICH PRIVACY HAS BEEN

 

COMPROMISE THEY HAD CAN AND DO

 

USE THEIR OWN ENCRYPTION THAT

 

BUILDS A MATHEMATICAL

 

IMPENETRABLE WALL AROUND THEIR

 

COMMUNICATIONS ON THE INTERNET.

 

MORE SIGNIFICANT, COMPANIES LIKE

 

APPLE AND GOOGLE AND FACEBOOK

 

ARE FEELING A HUGE AMOUNT OF

 

PRESSURE TO DEMONSTRATE

 

COMMITMENT TO PROTECTING THE

 

PRIVACY OF THEIR USERS AS

 

OPPOSED TO COOPERATING WITH THE

 

NSA AND YOU SEE THAT IN THE

 

FIGHT BETWEEN THE FBI AND APPLE

 

OVER APPLE'S EMBEDDING OF

 

ENCRYPTION PRODUCTS IN iPHONES

 

AND THAT REALLY IS A BYPRODUCT

 

OF THIS INCREASED DEMAND ON THE

 

PART OF MILLIONS OF PEOPLE THAT

 

PRIVACY BE PROTECTED AND THAT'S

 

THE BATTLE NOW IS CAN

 

TECHNOLOGIES BE DEVELOPED FAST

 

ENOUGH THAT ALLOWS YOU PRIVACY

 

ON THE INTERNET, WHILE THE

 

GOVERNMENT NOT JUST THE U.S.

 

GOVERNMENT BUT AROUND THE WORLD

 

ARE SPENDING BILLIONS TRYING TO

 

FIGURE OUT HOW TO CRACK THROUGH

 

THAT.

 

>> THERE ARE PEOPLE WHO CALLED

 

YOU AND SNOWDEN A TRAITOR,

 

BETRAYING YOUR GOVERNMENT, EVERY

 

NAME IN THE BOOK.

 

DID YOU THINK ABOUT THAT BEFORE

 

YOU DID THIS?

 

>> SURE.

 

MY CHILDHOOD HERO WAS DANIEL

 

ALSBERG I HAVE NOW HAD THE

 

OPPORTUNITY TO GET TO KNOW

 

REALLY WELL AND BECOME FRIENDS

 

WITH AND COLLEAGUES WITH ON AN

 

ORGANIZATION WE FOUNDED TO

 

DEFEND THE FREE PRESS.

 

I KNOW FROM READING HISTORY

 

BOOKS THAT WHEN DANIEL ELLSBERG

 

LEAKED THE PENTAGON PAPERS TENS

 

OF THOUSANDS OF TOP SECRET

 

DOCUMENTS SHOWING THAT THE U.S.

 

GOVERNMENT WAS LYING TO THE

 

AMERICAN POPULATION ABOUT THE

 

VIETNAM WAR, THAT HE WAS CALLED

 

A TRAIT E GUILTY OF TREASON,

 

BEING AN AGENT OF THE SOVIET

 

UNION.

 

HE WAS INDICTED AND CHARGED AND

 

TRIED BUT ULTIMATELY ACQUITTED

 

AND 30, 40 YEARS LATER VIRTUALLY

 

EVERYBODY VIEWS HIM AS A HERO.

 

SOMEBODY WHO ENGAGED IN NOBLE

 

BEHAVIOR TO INFORM PEOPLE ON THE

 

DEMOCRACY.

 

>> AT THE UNIVERSITY OF ARIZONA

 

IN THE ELLER COLLEGE OF

 

MANAGEMENT THERE IS AN

 

ARTIFICIAL INTELLIGENCE LAB, I'M

 

JOINED BY THE DIRECTOR DR.

 

HSINCHUN CHEN AND SAGAR SAMTANI.

 

FIRST LET'S TALK ABOUT THIS

 

ARTIFICIAL INTELLIGENCE LAB, DR.

 

CHEN.

 

HOW DID YOU COME UP WITH THIS?

 

>> MY ADVISER, HE CAME FROM THE

 

CARNEGIE LAB, DR. HERBERT SIMON.

 

CARNEGIE LAB, DR. HERBERT SIMON.

 

EVERYTHING WITH THE LAB CAME IN

 

1989, THE LAB HAS BEEN BRANDED

 

ARTIFICIAL INTELLIGENCE LAB.

 

I THINK THE ONLY ONE IN THE

 

COLLEGE.

 

>> THESE DAYS AI, IN THE SIMPLE

 

FORM YOU ARE TRYING TO TEACH

 

COMPUTER TO DO THINGS THAT HUMAN

 

ARE GOOD AT LIKE PLAYING CHESS

 

AND SONGS, IT REQUIRE HUMAN

 

INTELLIGENCE AND TEACHING YOUR

 

COMPUTER TO EMULATE THAT.

 

WE CALL DATA MINING, REQUIRE A

 

LOT OF DEVELOPMENT AND THAT YOU

 

NEED IN GREATER.

 

>> PART OF THAT IS THE AZ SECURE

 

PROGRAM.

 

YOU ARE A PH.D. STUDENT.

 

WHAT IS IT THAT INTERESTED YOU?

 

>> THE EMPHASIS ON CYBER

 

SECURITY AND GROWING EMPHASIS IN

 

SOCIETY HOW PEOPLE NEED TO BE

 

MORE AWARE OF THEIR CYBER

 

SECURITY CONCERNS.

 

AND ALSO THE APPROACHES THAT DR.

 

CHEN IS TAKING IN THE ARTIFICIAL

 

INTELLIGENCE LAB AS FAR AS USING

 

ARTIFICIAL INTELLIGENCE

 

APPROACHES IN CYBER SECURITY

 

CONTEXT, SOMETHING THAT IS TRULY

 

UNIQUE, NOT ONLY THAT BUT ALSO

 

LOOKING AT SPECIFIC TYPES OF

 

DATA THAT OTHER SECURITY

 

RESEARCHERS AREN'T LOOKING AT

 

ALL THAT MUCH.

 

>> SO YOU'RE TRYING TO OUTSMART

 

THE HACKERS?

 

>> YEAH.

 

I THINK WE HAVE THE POTENTIAL DO

 

SOMETHING GOOD UNDERSTANDING THE

 

INTENT, MOTIVATION.

 

IN THE PAST IN SECURITY SPACE

 

OVER THE PAST ALMOST 10 YEARS

 

HAS BEEN VERY REACTIVE.

 

PROTECTING YOURSELF.

 

YOU TRY TO BLOCK THE BULLET THAT

 

IS SHOOTING AT YOU.

 

IN OUR RESEARCH WE TRY TO

 

UNDERSTAND THE SHOOTERS BEHIND

 

THE BULLET, AND THE HACKERS ARE

 

THE PEOPLE WHO CREATE A BULLET,

 

A WEAPON SHOOT AT YOU.

 

SO THIS PROGRAM, SCHOLARSHIP AND

 

ANOTHER RELATED PROGRAM CALLED

 

HACKER WEB WE TRY TO UNDERSTAND

 

THE WEB OF HACKERS.

 

WHERE THEY RESIDE, WHAT DO THEY

 

CREATE, WHAT KIND OF MALWEAR DO

 

THEY CREATE.

 

WHAT DATA DO THEY STEAL FROM YOU

 

AND SO IT'S A VERY EXCITING

 

PROGRAM.

 

>> SAGAR, WHAT CAN THEY TAKE

 

FROM US?

 

>> THEY CAN TAKE A LOT OF

 

PERSONAL RELATED INFORMATION, SO

 

A LOT OF OUR RESEARCH WHAT WE

 

FIND IS THAT A LOT OF THE SOCIAL

 

SECURITY NUMBERS, PERSONAL

 

IDENTIFICATION NUMBERS ARE FOUND

 

IN THESE HACKER FORUMS OR

 

COMMUNITIES WHERE THEY TRADE AND

 

SELL THAT INFORMATION WITH EACH

 

OTHER.

 

THAT TYPICALLY HAPPENS AFTER

 

THEY BREACHED OR ATTACKED US.

 

>> IS MOST OF THAT HAPPENING

 

THROUGH OUR CELL PHONES OR

 

COMPUTERS OR WHERE?

 

>> I THINK DEFINITELY THESE DAYS

 

THE DEVICES CREATE DIFFERENT

 

AVENUE FOR THEM TO STEAL YOUR

 

DATA.

 

BUT EVEN WHEN YOU GO TO ATM

 

MACHINE, WHEN YOU GO TO TARGET,

 

SWIPE YOUR CREDIT CARD, THERE IS

 

MALWARE VIRUSES THAT EMBEDDED

 

AND COLLECTING NOT 10, 20,

 

RECORDS, THEY ARE COLLECTING

 

HUNDREDS OF THOUSANDS OF RECORDS

 

PER DAY FROM MERCHANTS, FROM

 

YOUR CELL PHONE AND ONLINE

 

SHOPS.

 

WHEN THERE IS A DATA BREACH THIS

 

IS TYPICALLY NOT IN ORDER OF

 

THOUSANDS.

 

IT'S TENS OF MILLIONS OF

 

RECORDS.

 

AND THIS HAS BEEN THE DAILY

 

EVENT OVER THE PAST 12 YEARS.

 

IT'S NOT GOING TO STOP ANY DAY

 

SOON.

 

>> THE PROGRAM IS REALLY TRYING

 

TO UNDERSTAND WHERE THEY ARE

 

GETTING THIS INFORMATION, HOW

 

THEY ARE GETTING IT AND WHAT

 

THEY INTEND TO DO WITH IT, IS

 

THAT CORRECT?

 

>> TRYING TO UNDERSTAND THE

 

ENTIRE ECOSYSTEM OF THE EXACT

 

PEOPLE BEHIND IT, WHAT THEIR

 

MOTIVATIONS ARE AND WHAT THEIR

 

TOOLS ARE, WHAT THEY ARE USING,

 

ET CETERA.

 

>> SO, THE PROGRAM TEACHES

 

STUDENTS LIKE SAGART PROGRAM IS

 

FUNDED BY A GRANT.

 

>> THE PROGRAM HAS BEEN FUNDED

 

BY TWO OR THREE NATIONAL SCIENCE

 

FOUNDATION GRANT.

 

AND THEY ARE ONE IN SCHOLARSHIP

 

THAT HE WOULD GRADUATE AND

 

BECOME A GOVERNMENT EMPLOYEE,

 

BUT DURING THE TRAINING THERE

 

WILL BE LEARNING, AT THE SAME

 

TIME LEARNING A LOT OF CUTTING

 

EDGE TOOLS THAT ALLOW THEM TO BE

 

ONE TO 10 STEP AHEAD OF THE

 

HACKERS.

 

WE COLLECT DATA, WE DO LIN

 

QUISTIES ANALYSIS.

 

RUSSIAN SHARING INFORMATION

 

ABOUT STOLEN CREDIT CARDS, ABOUT

 

MALWEAR AND OUR PROGRAM LOOKING

 

AT THE CHINESE MOBILE PAYMENT,

 

AGAIN A LOT OF -- NOT JUST

 

DEALING ENGLISH, DEALING WITH

 

MANY LANGUAGES, RUSSIAN, CHINESE

 

AND ARABIC AND SO ON.

 

AND YOU NEED TO UNDERSTAND THE

 

KIND OF MO DES OPENER RANDA OF

 

THE GROUP.

 

WORKING AS A GROUP IN DIFFERENT

 

SPECIALTY AREAS, FOR THE

 

RUSSIANS TO THE MOBILE OR CYBER

 

WAR FAIR FOR THE CHINESE FOR

 

TURKISH GROUPS.

 

IT'S DIVIDED, VERY INTERNATIONAL

 

BUT ALSO VERY TIGHT GROUP.

 

>> WHAT DRIVES THESE HACKERS?

 

WHAT IS THEIR MOTIVATION?

 

>> DEPENDS ON THE TYPE OF GROUP

 

YOU'RE LOOKING AT.

 

SO, DR. CHEN MENTIONED A FEW OF

 

THE GROUPS, THE HACKTIVISTS

 

MOTIVATED BY ACTIVIST CAMPAIGNS,

 

THINGS OF THAT NATURE.

 

SOME FOR FINANCIAL GAIN, SOME OF

 

THEM DO IT FOR CYBER WAR FAIR.

 

SO IT DEPENDS ON THE DEMOGRAPHIC

 

THAT YOU'RE LOOKING AT AND WHAT

 

THEIR MOTIVATIONS ARE.

 

>> AND DR. CHEN MENTIONED THAT

 

YOU WILL EVENTUALLY WORK FOR THE

 

GOVERNMENT OR A SECURITY AGENCY?

 

THAT'S THE GOAL TO GET THESE

 

STUDENTS JOBS?

 

>> THE PROGRAM WE HAVE GRADUATED

 

FOUR STUDENTS, WE HAVE 13

 

RESIDENT IN THE PROGRAM NOW.

 

WE HAVE FUNDING FOR ABOUT $4.5

 

MILLION TO TRAIN 40 STUDENTS.

 

THEY WILL BE SERVING FOR MOST OF

 

THEM FOR THE AGENCIES IN FEDERAL

 

GOVERNMENT PROTECTING THE

 

INFRASTRUCTURE.

 

AFTER THEY FINISH SERVING FOR

 

THE GOVERNMENT FOR THE

 

EQUIVALENT NUMBER OF YEARS IN

 

THE SCHOLARSHIP FUNDING, THEN

 

THEY CAN GO THE INDUSTRY, THEY

 

CAN GO TO GOOGLE, FACEBOOK, AND

 

COMPANIES AS WELL.

 

>> IS THAT THE GOAL FOR YOU?

 

THIS IS WHAT YOU HOPE TO DO?

 

>> RIGHT.

 

I MEAN, ONE OF THE MOTIVATING

 

FACTORS FOR ME TO GET IN THE

 

PROGRAM WAS THE OPPORTUNITY TO

 

SERVE THE COUNTRY IN A CYBER

 

SECURITY POSITION.

 

AND YOU KNOW, ACADEMIA IS ONE

 

WAY TO GO ABOUT DOING THIS.

 

SO IT'S NOT JUST LIMITED TO THE

 

GOVERNMENT SECTOR BUT ALSO

 

BECOMING A PROFESSOR IN CYBER

 

SECURITY AND THINGS LIKE THAT.

 

MY TRAINING AS FAR AS THE PH.D.

 

PROGRAM IS TRAINING MORE TOWARD

 

ACADEMIA AND BECOMING A

 

PROFESSOR BUT I CAN USE THE

 

SKILLS I USED FROM THE PROGRAM

 

TO MAKE A NOVEL CONTRIBUTION IN

 

ACADEMIA.

 

>> HOW MANY STUDENTS ARE

 

ENROLLED?

 

YOU PROBABLY HAVE STUDENTS

 

COMING FROM ALL OVER THE COUNTRY

 

WHO WANT TO PARTICIPATE.

 

>> FOR THE PROGRAM HAS TO BE

 

U.S. CITIZEN.

 

OR RESIDENTS, GREEN CARD HOLDER

 

SO.

 

WE HAVE A LOT OF INTEREST FROM

 

LOCAL ARIZONA STUDENTS BUT ALSO

 

FROM ALL OVER THE COUNTRY.

 

BUT OVER THE PAST TWO YEARS WE

 

HAVE BEEN VERY CAREFUL IN

 

SELECTING OUR STUDENTS.

 

THE GOVERNMENT HAS A VERY

 

STRINGENT ACCEPTANCE AND SUCCESS

 

RATE.

 

THE SUCCESS RATE IS 94%.

 

WHICH MEANS 100 STUDENT YOU ONLY

 

LOSE FIVE.

 

SO THE SUCCESS RATE IS VERY

 

HIGH.

 

SELECTIVE.

 

THE PROGRAM ALSO -- THIS IS

 

CYBER CULT.

 

IT HAS BEEN CALLED THE WEST

 

POINT FOR CYBER SECURITY

 

TRAINING.

 

IT'S PRESTIGIOUS, WE GIVE THE

 

STUDENT $80,000 PER YEAR, EVEN

 

HIGHER THAN A TYPICAL STIPEND IN

 

A PH.D. PROGRAM.

 

ALMOST $80,000 FOR TWO YEARS.

 

$160,000.

 

THEN GOVERNMENT GIVE YOU

 

TRAINING, SECURITY CLEARANCE,

 

PREVAILING RATE IN THE

 

GOVERNMENT SETTING TYPICALLY IN

 

WASHINGTON, D.C. AREA AND ALSO

 

IN OTHER CITIES AS WELL.

 

WITH TWO YEARS OF TRAINING WITH

 

A DEGREE, TWO YEARS, WILL GET A

 

SECURITY, A TOP SECRET

 

CLEARANCE.

 

FOUR YEARS, THEN SKY'S THE

 

LIMIT.

 

YOU CAN CONTINUE IN THE AGENCY.

 

I THINK 50% CONTINUE TO STAY IN

 

THE GOVERNMENT.

 

THE OTHER 50% MAY DECIDE TO MOVE

 

INTO OTHER E-COMMERCE OR

 

CONSULTING FIRM.

 

>> IT'S FUNDED BECAUSE THIS IS

 

IMPORTANT WORK.

 

>> IT IS.

 

>> WHAT WOULD MOTIVATE YOU?

 

YOU SAID EARLIER TO SERVE THE

 

COUNTRY.

 

I MEAN BECAUSE WE'RE VULNERABLE.

 

>> RIGHT.

 

SOCIETAL IMPACT.

 

THE AREA OF WORK THAT WE'RE IN

 

RIGHT NOW HAS A LOT OF POTENTIAL

 

FOR SOCIETAL IMPACT.

 

SOME OF THE RESEARCH AVENUES

 

THAT WE ARE LOOKING AT CAN

 

POTENTIALLY CYBER CRIME MOVING

 

FORWARD SO THAT'S A BIG

 

MOTIVATION TO PURSUE THIS LINE

 

OF RESEARCH.

 

>> YOU THINK MOST PEOPLE

 

UNDERSTAND HOW VULNERABLE WE

 

ARE?

 

>> KIND OF.

 

YEAH.

 

IT DEPENDS.

 

THERE ARE CERTAIN TECHNICAL

 

MEASURES THAT ARE PUT IN PLACE

 

THAT PEOPLE ARE NOT AWARE OF

 

WHATSOEVER.

 

SO INSTALLING CERTAIN PIECES OF

 

SOFTWARE ON YOUR PHONE THAT ARE

 

BENIGN BUT ARE COLLECTING DATA,

 

A LOT OF PEOPLE DON'T REALIZE

 

THAT.

 

BUT AT THE SAME TIME THERE ARE A

 

LOT OF PEOPLE WHO ARE YOU KNOW,

 

VERY PRO ACTIVE ABOUT ANTI-VIRUS

 

AND PASS WORD PROTECTION AND

 

THINGS LIKE THAT BUT NOT AWARE

 

OF THE TECHNICAL

 

IMPLEMENTATIONS.

 

>> WHAT ARE SIMPLE THINGS WE CAN

 

DO AS PRIVATE CITIZENS TO REALLY

 

MONITOR AND SECURE OUR OWN

 

SAFETY?

 

>> I THINK THESE DAYS THE MOBILE

 

DEVICES POST THE MOST THREATS.

 

THE MOBILE DEVICES OF CELL

 

PHONES TO iPAD AND WHAT NOT

 

ESPECIALLY WHEN YOU ARE

 

ACCESSING SEEMINGLY BENIGN

 

WEBSITES, FREE SERVICES AND SO

 

ON.

 

YOU HAVE TO CAREFULLY THESE DAYS

 

MORE SO THAN THREE OR FOUR YEARS

 

AGO, CAREFULLY LOOK AT THE

 

PRIVACY SETTING, THE OPT IN OR

 

OPT OUT THAT MAKE SURE YOU ARE

 

UNDER THE MOST SECURE MECHANISM.

 

IN THE PAST WE DON'T THINK ABOUT

 

THAT.

 

A LOT OF DATA COLLECTED BY

 

APPLICATION, IT COULD BE A

 

FACEBOOK APP, AND TYPICALLY

 

BETTER PROTECTED.

 

WHEN YOU ARE CONNECTED TO OTHER

 

FREE WEBSITES, DICTIONARIES AND

 

FREE SERVICES, THEY ENTER

 

COOKIES ON YOUR BROWSER, ON YOUR

 

PHONES, THAT THEY CAN COLLECT

 

YOUR IP ADDRESS, THE TIME, THERE

 

ARE KEY WORDS YOU ARE USING.

 

EVEN COLLECTED BY INDIVIDUAL

 

VENDORS IT'S NOT A PROBLEM.

 

BUT THESE DAYS THEY ARE SHARING

 

INFORMATION.

 

THEY BECOME DATA VENDORS.

 

HOW DO THEY MAKE MONEY FOR FREE

 

SERVICE.

 

THEY MUST MAKE MONEY SELLING

 

YOUR DATA, YOUR ACTIVITY TO

 

OTHER VENDORS.

 

WHEN THEY ARE SHARING ACROSS ALL

 

INDUSTRIES THAT BECOMES VERY

 

SCARY SCENARIO THAT A LOT OF

 

PEOPLE OUTSIDE KNOW ABOUT YOU,

 

AND THEN THEY CAN USE THE DATA

 

TO TRY AND YOUR VOTING RECORD,

 

THAT POSES VERY STRONG SECURITY

 

CONCERN AND PRIVACY CONCERN.

 

>> SO TECHNOLOGY IS REALLY SORT

 

OF FOSTERING THESE HACKERS.

 

>> EXACTLY.

 

THE PAST TWO OR THREE YEARS YOU

 

SEE THE PERFECT STORM FORMING.

 

MORE INFORMATION, MORE MOBILE

 

DEVICES.

 

PERFECT STORM ALSO MEANING THAT

 

HACKER COMMUNITY BECOME MORE

 

POWERFUL, MORE INTENT GETTING

 

INFORMATION AND THEY CAN AGAIN

 

FOR THEIR PERSONAL OR FINANCIAL

 

BENEFIT.

 

THIS IS THE TIME YOU HAVE TO PAY

 

ATTENTION TO PRIVACY AND CYBER

 

SECURITY.

 

>>> THE BUZZ NOW WITH MY

 

COLLEAGUE HERE AT ARIZONA PUBLIC

 

MEDIA CHRISTOPHER CONOVER.

 

BUSY WEEK.

 

DREAMERS, DRIVERS LICENSES AND

 

NOW THEY ARE ABLE TO USE THEM

 

HERE.

 

>> THE U.S. NINTH CIRCUIT COURT

 

OF APPEALS, FEDERAL COURT RULED

 

THAT ARIZONA CANNOT DENY DRIVERS

 

LICENSE TO THE FOLKS WE CALL

 

DREAMERS AND 2012, THEN GOVERNOR

 

BREWER ISSUED EXECUTIVE ORDER

 

THAT SAID NO, THEY CANNOT HAVE

 

ARIZONA DRIVER LICENSES.

 

THIS IS WORKING THROUGH THE

 

COURT SYSTEM.

 

THE NINTH CIRCUIT THIS WEEK SAID

 

YES, THEY CAN.

 

THEY ARE IN THE COUNTRY WITH A

 

LEGAL STATUS, THEREFORE THEY CAN

 

HAVE DRIVER'S LICENSES.

 

WE HAVEN'T HEARD AN OFFICIAL

 

RESPONSE YET BUT MOST PEOPLE

 

EXPECT THAT THIS WILL BE

 

APPEALED TO THE U.S. SUPREME

 

COURT.

 

>> DREAMERS CAN DRIVE LEGALLY NO

 

PROBLEM?

 

>> AT THIS POINT YES.

 

WE'LL HAVE TO SEE IF THERE IS AN

 

APPEAL TO THE SUPREME COURT.

 

THE ISSUANCE OF THE LICENSES

 

COULD BE PUT ON HOLD AS AN

 

INJUNCTION IF THIS WORKS

 

THROUGH.

 

BUT UNLESS THAT HAPPENS,

 

DREAMERS WILL BE ABLE TO GET

 

LICENSES PER THE NINTH CIRCUIT

 

COURT OF APPEALS.

 

>> OTHER NEWS NOW.

 

THE PRESIDENTIAL PREFERENCE

 

PRIMARY THAT WILL NOT END.

 

WHAT IS THE STATUS THERE?

 

>> WE NOW HAVE OFFICIAL RESULTS,

 

THAT'S THE NEW PART THIS WEEK,

 

OR THE NEWEST PART THIS WEEK.

 

AS YOU SAID IT'S JUST NOT

 

ENDING.

 

THE VOTE HAS BEEN CERTIFIED.

 

THE QUESTIONS NOW REMAIN ABOUT

 

THOSE LONG LINES IN MARICOPA

 

COUNTY.

 

THE U.S. JUSTICE DEPARTMENT

 

ANNOUNCED THAT THEY ARE

 

INVESTIGATING.

 

WHAT THEY ARE ASKING FOR IS AN

 

EXPLANATION.

 

IT'S REALLY THE EXPLANATION

 

EVERYBODY IS ASKING FOR.

 

HOW WAS IT DECIDED THERE WOULD

 

ONLY BE 60 POLLING PLACES?

 

WHERE WERE THEY PLACED?

 

WHY WERE SOME WHOLE DISTRICTS

 

FOR EXAMPLE LEFT OUT?

 

WERE THERE CERTAIN MINORITY

 

GROUPS HURT MORE THAN OTHERS BUY

 

THIS?

 

THE JUSTICE DEPARTMENT IS

 

LOOKING INTO ALL THIS.

 

NO TIME TABLE ON WHEN THEY'LL

 

HAVE A WRAP-UP OF THEIR

 

INVESTIGATION.

 

STATE OFFICIALS, COUNTY

 

OFFICIALS, MARICOPA COUNTY, ARE

 

COOPERATING AND THEY HAVE ALSO

 

SAID THIS WON'T HAPPEN FOR THE

 

MAY SPECIAL ELECTION, IT WON'T

 

FOR THE AUGUST PRIMARY AND WON'T

 

HAPPEN IN NOVEMBER.

 

>> I SAW IT MIRT BE RELATED TO

 

FUNDING IN REMOVING POLLING

 

PLACES BECAUSE WE HAVE TO MAKE

 

BUDGET CUTS?

 

>> THAT'S WHAT THE MARICOPA

 

COUNTY RECORDER WAS TRYING TO

 

SAY WHEN SHE APPEARED BEFORE THE

 

LEGISLATURE AND IN FRONT OF THE

 

MARICOPA COUNTY BOARD OF

 

SUPERVISORS.

 

THE LEGISLATURE DIDN'T BUY IT.

 

SAID LOOK, YOU ALWAYS HAD THE

 

SAME AMOUNT OF MONEY.

 

WE WERE HOPING TO GIVE YOU MORE

 

MONEY, BUT WE HAVEN'T REALLY

 

DECREASED THE AMOUNT OF MONEY

 

THAT YOU'VE BEEN GIVEN.

 

SO THE LEGISLATURE WASN'T BUYING

 

THAT.

 

ENTIRELY.

 

>> OKAY.

 

LET'S MOVE ON.

 

NEWS THAT CAME OUT LATE IN THE

 

WEEK HERE, REPORTERS NO LONGER

 

ALLOWED ON THE HOUSE FLOOR OF

 

THE ARIZONA CAPITOL UNLESS THEY

 

CONSENT TO A BACKGROUND CHECK.

 

>> EXACTLY.

 

THE HOUSE SPEAKER DAVID GALLEN

 

PUT IN NEW SECURITY RULES THAT

 

SAID ALL NON-STAFF MEMBERS IN

 

ORDER TO HAVE ACCESS TO SECURE

 

AREAS WHICH THE THE FLOOR IS

 

WHICH MEMBERS OFFICES ARE ALSO,

 

MUST GO THROUGH A BACKGROUND

 

CHECK.

 

THAT CHECK MEANS THAT YOU HAVE

 

TO GIVE YOUR NAME, YOUR DRIVER'S

 

LICENSE, YOUR BIRTH DATE, AND

 

ANY ALIASES THAT YOU HAVE AND

 

SOME REPORTERS WORK UNDER

 

DIFFERENT NAMES.

 

IT'S COMMON IN OUR BUSINESS.

 

AND THE REPORTERS SAID WAIT A

 

MINUTE.

 

WE HAVE NEVER HAD THIS.

 

THIS IS THREE QUARTERS OF THE

 

WAY THROUGH THE SESSION WE'RE

 

APPROACHING THE 100th DAY.

 

THIS ISN'T NEEDED.

 

GALLEN SAID IT'S ALL ABOUT

 

SECURITY.

 

NOW, PART OF THIS BACKGROUND

 

CHECK IS ANY REPORTER WHO IS

 

FOUND TO HAVE A FELONY

 

CONVICTION IN THE LAST 10 YEARS

 

WOULD BE BARRED FROM THE FLOOR

 

OF THE HOUSE.

 

OR A MISDEMEANOR CONVICTION IN

 

THE LAST FIVE YEARS WOULD ALSO

 

BE BARRED FROM THE FLOOR OF THE

 

HOUSE.

 

THERE IS A REPORTER WHO HAS

 

WRITTEN SOME VERY CRITICAL

 

STORIES OF SPEAKER GALLEN, SOME

 

THAT HAVE LAUNCHED AN ATTORNEY

 

GENERAL'S INVESTIGATION ABOUT

 

HIS USE OF STATE VEHICLES, WHO

 

HAS AN ADMITTED MISDEMEANOR

 

CONVICTION.

 

AND SO HE WOULD NOT BE ALLOWED

 

ON THE FLOOR OF THE HOUSE UNDER

 

THIS.

 

REPORTERS SAY THIS IS TARGETING,

 

THIS HAS NOTHING TO DO WITH

 

SECURITY.

 

>> TIMING IS PRETTY UNIQUE.

 

YOU HAVE COVERED THE CAPITOL FOR

 

YEARS IN ARIZONA AND OTHER

 

STATES, HAVE YOU SEEN ANYTHING

 

LIKE THIS?

 

>> IN FLORIDA WHEN I COVERED THE

 

CAPITOL FOLLOWING SEPTEMBER 11

 

WE HAD TO DO BACKGROUND CHECKS,

 

JEB BUSH WAS GOVERNOR, WHAT

 

THOSE CHECKS ALLOWED US TO DO

 

WAS BYPASS SECURITY.

 

ANY REPORTER, THOUGH, WITH A

 

CREDENTIAL, A NON-CAPITOL

 

CREDENTIAL COULD STILL GET INTO

 

THE REPORTERS GALLERIES OR ON

 

THE FLOOR AT SPECIFIC TIMES.

 

THEY JUST COULDN'T BYPASS

 

SECURITY TO DO IT.

 

>> THIS COULD MAKE OUR JOBS A

 

TAD MORE CHALLENGING.

 

>> A BIT MORE.

 

>> CHRISTOPHER, THANK YOU.

 

AND THANK YOU SO MUCH FOR

 

JOINING US.

 

THAT'S OUR PROGRAM.

 

FOR ALL OF US AT ARIZONA PUBLIC