Read Obama's Entire Speech Defending NSA Spying
Pres. Obama defended the NSA's request for Verizon customer data earlier this afternoon. As Scott Shackford noted earlier, the president used straw men and false choices to do so. Now you can read Obama's remarks in full, thanks to the Federal News Service.
See anything noteworthy or in need of further harping on? Feel free to tell us in the comments.
I'm going to take one question. And then remember, people are going to have opportunity to — I'll also answer questions when I'm with the Chinese president today. So I don't want the whole day to just be a bleeding press conference. But I'm going to take Jackie Calmes's question.
Q: Mr. President, could you please react to the reports of secret government surveillance of phones and Internet? And can you also assure Americans that the government — your government doesn't have some massive secret database of all their personal online information and activity?
PRESIDENT OBAMA: Yeah. You know, when I came into this office, I made two commitments that are more than any commitment I make: number one, to keep the American people safe; and number two, to uphold the Constitution. And that includes what I consider to be a constitutional right to privacy and an observance of civil liberties.
Now, the programs that have been discussed over the last couple days in the press are secret in the sense that they're classified, but they're not secret in the sense that when it comes to telephone calls, every member of Congress has been briefed on this program.
With respect to all these programs, the relevant intelligence committees are fully briefed on these programs. These are programs that have been authorized by broad, bipartisan majorities repeatedly since 2006. And so I think at the outset, it's important to understand that your duly elected representatives have been consistently informed on exactly what we're doing.
Now, let — let me take the two issues separately. When it comes to telephone calls, nobody is listening to your telephone calls. That's not what this program's about. As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people's names, and they're not looking at content. But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism. If these folks — if the intelligence community then actually wants to listen to a phone call, they've got to go back to a federal judge, just like they would in a criminal investigation. So I want to be very clear. Some of the hype that we've been hearing over the last day or so — nobody's listening to the content of people's phone calls.
This program, by the way, is fully overseen not just by Congress but by the FISA Court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them and that they're — it's being out consistent with the Constitution and rule of law.
And so not only does that court authorize the initial gathering of data, but I want to repeat, if anybody in government wanted to go further than just that top-line data and wanted to, for example, listen to Jackie Calmes's phone call, they'd have to go back to a federal judge and — and — and indicate why, in fact, they were doing further — further probing.
Now, with respect to the Internet and emails, this does not apply to U.S. citizens, and it does not apply to people living in the United States. And again, in this instance, not only is Congress fully apprised of it, but what is also true is that the FISA Court has to authorize it.
So in summary, what you've got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved (on them ?). Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout. And we're also setting up — we've also set up an audit process when I came into office to make sure that we're, after the fact, making absolutely certain that all the safeguards are being properly observed.
Now, having said all that, you'll remember when I made that speech a couple of weeks ago about the need for us to shift out of a perpetual war mindset. I specifically said that one of the things that we're going to have to discuss and debate is how were we striking this balance between the need to keep the American people safe and our concerns about privacy, because there are some trade-offs involved.
And I welcome this debate. And I think it's healthy for our democracy. I think it's a sign of maturity, because probably five years ago, six years ago, we might not have been having this debate. And I think it's interesting that there are some folks on the left, but also some folks on the right who are now worried about it who weren't very worried about it when it was a Republican president. I think that's good that we're having this discussion.
But I think it's important for everybody to understand, and I think the American people understand, that there are some trade-offs involved. You know, I came in with a health skepticism about these programs. My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards. But my assessment and my team's assessment was that they help us prevent terrorist attacks. And the modest encroachments on privacy that are involved in getting phone numbers or duration without a name attached and not looking at content — that on, you know, net, it was worth us doing.
That's — some other folks may have a different assessment of that. But I think it's important to recognize that you can't have a hundred percent security and also then have a hundred percent privacy and zero inconvenience. You know, we're going to have to make some choices as a society.
And — (audio break) — I can say is, is that in evaluating these programs, they make a difference — (audio break) — to anticipate and prevent possible terrorist activity. And the fact that they're under very strict supervision by all three branches of government and that they do not involve listening to people's phone calls, do not involve reading the emails of U.S. citizens or U.S. residents, absent further action by a federal court, that is entirely consistent with what we would do, for example, in a criminal investigation.
I think, on balance, we — you know, we have established a process and a procedure that the American people should feel comfortable about. But again, this — these programs are subject to congressional oversight and congressional reauthorization and congressional debate. And if there are members of Congress who feel differently, then they should speak up.
And we're happy to have that debate. OK.
Q: Sir –
PRESIDENT OBAMA: All right. Then we'll have — we'll have a chance to talk further during the course of the next couple days.
Thank you, guys. Thank –
Q: Do you welcome the leak, sir? Do you welcome the leak if you welcome the debate?
PRESIDENT OBAMA: I don't — I don't welcome leaks, because there's a reason why these programs are classified. You know, I think — I think that there is a suggestion that somehow any classified program is a quote-unquote "secret" program, which means it's somehow suspicious. But the fact of the matter is, in our modern history there are a whole range of programs that have been classified because, when it comes to, for example, fighting terror, our goal is to stop folks from doing us harm, and if every step that we're taking to try to prevent a terrorist act is on the front page of the newspapers or on television, then presumably the people who are trying to do us harm are going to be able to get around our preventive measures. That's why these things are classified.
But that's also why we've set up congressional oversight. These are the folks you all vote for as your representative in Congress, and they're being fully briefed on these programs.
And if in fact there was — there were abuses taking place, presumably, those members of Congress could raise those issues very aggressively. They're empowered to do so.
We also have federal judges that we put in place who are not subject to political pressure.
They've got lifetime tenure as federal judges, and they're empowered to look over our shoulder at the executive branch to make sure that these programs aren't being abused.
So — so we have a system in which some information is classified, and we have a system of checks and balances to make sure that it's not abused. And if, in fact, this information ends up just being dumped out willy-nilly without regard to risks to the program, risks to the people involved, in some cases on other leaks, risks to personnel in very dangerous situations, then it's very hard for us to be as effective in — in protecting the American people.
That's not to suggest that, you know, you just say, trust me, we're doing the right thing, we know who the bad guys are. And the reason that's not how it works is because we've got congressional oversight and judicial oversight. And if people can't trust not only the executive branch but also don't trust Congress and don't trust federal judges to make sure that we're abiding by the Constitution, due process and rule of law, then we're going to have some problems here.
But my observation is, is that the people who are involved in America's national security, they take this work very seriously. They cherish our Constitution. The last thing they'd be doing is taking programs like this to listen to somebody's phone calls.
And by the way, with respect to my concerns about privacy issues, I will leave this office at some point, sometime in the last — next 3 1/2 years, and after that, I will be a private citizen. And I suspect that, you know, on — on a list of people who might be targeted, you know, so that somebody could read their emails or — or listen to their phone calls, I'd probably be pretty high on that list. So it's not as if I don't have a personal interest in making sure my privacy is protected.
But I know that the people who are involved in these programs — they operate like professionals. And these things are very narrowly circumscribed. They're very focused. And in the abstract, you can complain about Big Brother and how this is a potential, you know — you know, program run amok. But when you actually look at the details, then I think we've struck the right balance.
All right? Thank you very much, guys. That's it — I — (cross talk) — thank you. (Cross talk.)
Show Comments (66)