tv George Washington University Hosts Discussion with General David Petraeus CSPAN December 16, 2016 6:00pm-7:01pm EST
amazing people who have been part of this administration, okay? thank you, everybody. [inaudible] >> i don't know. i enjoyed it. >> in about one hour president-elect donald trump hold another victory rally in florida after winning that states 27 electoral votes by over 120,000 votes. see his rally with supporters in orlando live 7 p.m. eastern on c-span. she spends "washington journal" live every day with news and policy issues that impact you. coming up saturday morning texas republican elected will join us and discuss why he publicly stated that he will not be voting for donald trump when the electoral college meets on monday. then joe garcia presents other western and a state commission for higher education will discuss results from a recent
are at the end of my term one night i will miss these exchanges. we have spent much time together in this room to be a part of the united nations family and i thank you for the strong commitment to work together you have found it important job to do about our work when we make progress and when we fall short. i have been saying the you are collecting the people and that time the
and we need that spirit today. this has been a decade but i have also seen collective action of change of millions of lives that remains that path. long stand it to recognize that preeminent 24 -- 21st century effect. latest to express my appreciation and in washington d.c. and the national security adviser
i am confident pressure that those democratic institutions will overcome these difficulties soon. >> hq very much mr. secretary general. you mentioned aleppo i wonder if you could elaborate a little to tell us your expectations of the evacuations today is whether the u.n. has spent involved that was the follow-up. but my real question was we talked about unfinished business you mentioned syria
and today's south sudan. so what should be at the top of the agenda of your successor is -- a successor mr. gutierrez? >> but in syria this has been heartbreaking for me and all the people who love peace and stability. and the greatest suffering too much, and too long. and more specifically, aleppo that
and so heavily on any single subject and that by saying shed resolution one negative sanctioned revolution. so those implications of the northeast asia and there has been somme differences how to address all of the situations. china, and japan, up korea the united states, russia, all of the countries surrounding northeast asia have not bend
international norms of society. that is what i sincerely hope that as the secretary general. >> thank-you. mr. secretary general whenever you decide to do a wish to the best. given the prominence of cyberattacks against political institutions and private enterprise what steps to recognize the united nations take to galvanize support to regulate cyberwarfare with the geneva convention and to help that capacity with that security -- from cyberattack >> we enjoy a warm
technology particularly the communication with but at the same time we are very much concerned using this technology for cyberattacks. this must be prevented in a concerted effort i sincerely hope come that these agencies look very seriously when to have that misuse one of the cybertechnology but for that to specific agents
and then we have to discuss with the general assembly. >> mr. secretary general going back to aleppo you call that as the synonym for call and again you have said that the risk of genocide with the un troops, i am wondering what is that concept of responsibility to protect? is a life support blacks. >> -- life-support? >> with that document on the responsibility has us secretary-general even as i was campaigning to that member states that i tried
simply the country is not able or is not willing so they have some responsibility. >> specifically is there anything you would recommend it to the international committee regarding syria quick. >> i have to appointing as the best diplomat is not an issue. of solidarity and compassion. and sticking to a very narrow interest with
hundreds of thousands of people now want to reject in the name of the humanity. how come this issue has spent so long taking? and first of all, the of the syrian people should be united and have then divided completely. they have been supporting one besides. and the security council has been divided with those institutions with uh terrorists that take the of farm.
and the grievances of the people. >> i have of pleasure of covering you over the past five years. has the secretary general over the past decade, in hindsight we are the top moments of pride and regret? there are some of the ups and downs but what about you personally? we mickeys set the type being what has been a good moment for me.
votes with his electoral votes. live on c-span. earlier today obama held his final press conference and the republicans have a favorable compression of vladimir putin. >> some of the people historic plea has been very critical of me for engaging with russia to have conversations with russia also endorsed of president elect even as he said we should stop sanctioning russia and be tough on them and work together. that was very complimentary to mr. putin personally. that was not news will.
the president elect during the campaign said those that made a career out of being anti-russian didn't say anything. then after the election suddenly they say why didn't you tell us the russians we were trying to help our candidates? come on. there was a survey that some of you saw where, this is just one ball from incredible source that 37 percent of republican voters approve of vladimir putin. one-third of republican voters. they approve of vladimir
putin, former head of kgb. ronald reagan would roll over in his grave. how did that happen? in part because for too long everything bad is said helps or hurts president obama. and unless that changes, we will continue to be vulnerable to foreign influence. for what we stand for. >> that is part of what the president had to say earlier today. you can see the entire even
tonight after the victory you brought a from donald trump. next ever meant surveillance and privacy concerns. debating the limitations of cyberhacking from some fbi and other law-enforcement agencies. one hour 15 minutes. [inaudible conversations] >> welcome back to the of morning session we heard of lot on our first panel by hacking of the russian government that increasingly finds it necessary to be in cyberspace to engage in exploitation or hacking of
those searches one that raises a question one is searching through hacking different band a wiretap? is the recent change of a criminal procedure expanding government authority with those techniques with inappropriate web mechanism marcia congress develop its own free mark? what should the up posture me of vulnerability noir? if the nsa hacking tools were not disclosed leaving those vulnerable. and to redress these questions regulate hacking
by the government to be introduced and no doubt if you follow surveillance all of those that have relied on the excellent work and now want the representative from "the washington post". >> thanks for sponsoring this panel i will introduce the panel when to buy media right is the director of the institute at new america. to his right surveillance and cybersecurity expert for the human-rights group abuse and cryptographer and associate professor at the university of pennsylvania, and acting
deputy assistant in charge of cybercrime investigations. so he gave a good and concise description of the issues of we will die in and take notes because we will be leaving time at the end for questions. but mentioning earlier a new rule change took effect rule 41 that allows a judge to approve a warrant for law-enforcement to allow the government to access searches were basically for two purposes for those computer locations that our unknown so let's start with
you why do they need this rule change quick. >> the rule change was brought about by the events of technology first promulgated for almost 100 years old and basically be a dia was to set the rules of the government obtained a warrant. this is what governs when there is probable cause with all the bells and missiles going with the constitution but the problem was the rule makers saw at the time that the investigators would know what court to go to end the rule was if there is property in a particular district go to the court to in that district but there are difficulties as technology has advanced
berger of first is near-perfect anonymity to prevent law-enforcement to identify what location of the computer is. so if it is on a network with that mechanism if they are interested in exchanging images once to communicate he can do so fairly effectively to know where his home is to get a warrant. so one primary value all above rule change does in those circumstances of the of location of the computer bayou can go to any accord
with the crime under consideration. that was an issue in fact, the only change that has been made to allow investigators to know which court they go to for these circumstances. >> he said it is very narrow and very restricted with the location of the computer and. some libertarians have raised some concerns of those jurisdictional limits. >> the rule was one of the few practical limitations we had in place to relieve stop government hacking but congress has never considered to allow that in the reason is important that
hacking has all sorts of increased risk of wiretapping, a communications searches, and more than what the warrant is used for some of you look back it was tapped because wiretapping was considered invasive. hacking is even more increases so that means we have no additional protections. >> how can it be more invasive? >> any number of ways. there are more technical pieces but it is very hard to determine when they if the government says this in is malware it is hard to figure of how that will interact with the computer even if you have an understanding. i believe a colleague talks
about the update to the ipad apple tested it to a new with a rollicking 41 and it would work on any number of devices when pushed through so it could have the unpredictable impact. >> the important thing to keep in mind is a large part of government tacking -- hacking at its core has some kind of lot of software. that they are searching but because some days that could be relatively simple of a
vague approval of congress that they have never done before and that they know very little about. but on the of particular risk in comparison to a wiretap and me having access to everything and the camera and microphone and what could be accessible from it. recognizing the government has the problem i would have spent more on understanding politicized that question of the tactic we have never talked about but the rule that says of the obscure their location you can do
the search to obtain their location and nothing else to go to the appropriate court in bank it warrant to use a computer that is not what this did. >> use say they're not sufficient restrictions. address that richard. >> important thing to understand is there are many rules when the government wants to use a warrant to. that is part of the execution the fourth amendment has many different layers of probable cause and particularity. then to go to be independent judge to decide if this is justified then on top of
that the fourth amendment requirement to cannot be overreaching and further the safeguards if there is any over collection they are very good to fair it back out through criminal prosecution and the victims can sue the government of there is the violation. there is a lot of rules that are involved and in our view those are the projections protecting constitutional rights berger we're open for discussion but the important question to ask what is it about the current system safeguards that is sufficient to redress this type of collection? >> how do you notify the
victims greg. >> the question is it possible the of government activity could do something inadvertent or inappropriate for what was intended to do? the search is of real world also have risks that nothing will be perfectly risk freed but the majority of the cases that targeted searches against the potential harm if the computer stops working, it is hardly a problem.
but alluding to the fact that the second piece is in that context of there it is minicomputers that have been suspected and criminals are controlling the machines and bad things are happening. we have not done this but if there is an opportunity to mitigate and deliberate those computers of the criminals are controlling them they could have an effort to end results and in the past we have done best we have worked with computer security experts to try to make scheerer that there will be no harm and to do our best to do that in so