write paper

THE MUNK DEBATE ON STATE SURVEILLANCE – MAY 2, 2014

Rudyard Griffiths : Ladies and gentlemen, welcome. Welcome to this extraordinary debate on

state surveillance. My name is Rudyard Griffiths, and it’s my privilege to act as the organizer of

this semi -annual series and to once again serve as your moderator.

I want to start t onight’s proceedings by welcoming the North American -wide television and

radio audience, tuning into this debate, everywhere from the Canadian Broadcasting Corporation

to CPAC, Canada’s public affairs channel to C -Span across the c ontinental U.S. A warm he llo

also to the thousands of people watching this debate live right on the internet on the

intercept.com and MunkDebates.com and it’s terrific to have you as virtual participants in

tonight’s proceedings. And finally, hello to you, the over 2500 people who ’ve once again, filled

Roy Thomson Hall to capacity for a Munk Debate. We just thank you for your enthusiasm for

what this series is all about: bringing together big thinkers to debate the big issues transforming

the world and Canada.

The presence on this stage in a matter of moments of four really outstanding thinkers on the topic

of state surveillance would not be possible without our hosts tonight, so please join me in an

appreciation of the Aurea Foundation and its co -founders Peter and Melanie Munk.

Well, the moment we’ve all been waiting for, let’s get our debaters out on stage and our debate

underway. Speaking first, for the motion, Be it Resolved: State Surveillance is a Legitimate

Defence of our Freedoms, is acclaimed trial lawyer, Harvard scholar and storied civil libertarian,

ladies and gentlemen, Professor Alan Dershowitz. Joining Professor Dershowitz on the pro -side

of tonight’s debate is none other than the former head of the NSA, the National Security Agency,

the former head of the Central I ntelligence Agency, he’s a retired four star U.S. General, ladies

and gentleman, Michael Hayden.

Now, one great team of debaters deserves another and we have not let you down tonight. Ladies

and gentlemen, please welcome serial technology entrepreneur, th e co -founder of the global

social news phenomenon Reddit, and best -selling author Alexis Ohanian, Alexis. Alexis’ partner

tonight is a person who has been at the very centre of this global debate since Edward Snowden

stunned the world last June with his un precedented leak, his exposure of America’s cyber -

espionage programs and in the ensuing year our presenter has become, in the words of the

Financial Times of London, the most famous journalist of his generation. Ladies and gentlemen,

First Look Media’s Gle nn Greenwald.

Ok, before I call on our debaters for their opening statements, I need the help of everyone in this

hall and those of you watching at home with three simple tasks: first, you don’t often say this in a

gracious concert hall like this, but power up your smar tphones. We have an open WiFi network

broadcasting throughout the hall, you can tweet to our hashtag #MunkDebate. Also we’ve got a

rolling opinion survey of our audience tonight and that’s both for you in the hall and those of you

watching online, pop open your browser and enter the URL www.munkdebates.com/vote . And ‘

third, this is important, those of you in the hall, when you see our dastardly countdown clock

appear on the screens at the end of the allotted ti me for opening statements, rebuttals and closing

statements, please join me in a round of applause for our speaker. This is going to keep them on

their toes and of course, our debate on time.

One last thing, before we get to opening statements, let’s find out how all of you, the 2500 of you

voted at the outset of this evening’s debate on the resolution, Be it Resolved: State Surveillance

is a Legitimate Defence of our Freedoms, let’s have those results now. Hmm. Thirty -two %

agree, 47% disagree, 21% undeci ded. So, a debate in play. Now, a very important question since

what these debates are all about is which one of these teams can sway public opinion, who can

change the minds of the 2500 people in this hall over the next hour and a half . So who was open

to changing their vote, let’s have those numbers. Wow, 87% of this audience are open to

changing their vote, a very open -minded crowd. Only 13% of you are committed resolutely to

the pro or the con side.

A great set of results to kick off our opening statem ents, which I’m going to do now. As per

convention the pro -side will speak first, six minutes for each opening remark, General Hayden,

the floor is yours.

Michael Hayden: Well, good evening , thanks for the introduction and thanks for the warm

welcome. Aft er I read your morning newspaper and saw that Alan and I were identified as two of

the most pernicious human beings on the planet, I just wasn’ t really sure.

State surveillance is a legitimate defence of our freedoms. Well, we all know the answer to that.

It depends. And it depends on facts. It depends on the totality of circumstances in which we find

ourselves. What kind of surveillance? For what kind of purposes? In what kind of state of

danger? And that’s why facts matter. In having this debate, in tryi ng to decide whether this

surveillance is a legitimate defence of our freedom, we really need to exactly what this

surveillance is. And I freely admit, that’s hard. This stuff has been pushed out into the public

domain and you’ve had a chance to look at it and sometimes it has been pushed out there in a

way that, well let me be kind, it’s not clear. Sometimes it’s been pushed out there in a way that is

just wrong.

Let me give you an example. And by the way, no one has to have ill intent to make it wrong.

This is actually really complicated stuff. There was one piece of information that was pushed out

into the public domain over a program called Boundless Informant. If I were actually thinking of

names that would eventually become public that is probably no t one I would pick, ok? But what

it was, was a heat map of the world, and it showed the meta data events that NSA, in one way or

another, acquire in different parts of the world. And it revealed tens of millions of meta data

events that NSA was getting, acco rding to the map, from France and Spain and Norway. So

immediately the story was, hey, these guys are ripping off the phone bills of a whole bunch of

Europeans. ‘

The reality of the story was the French, Spanish and the Norwegians services were providing

NS A data that their services had collected, not in their own countries, but in internationally

recognized theatres of armed conflict. It was a team effort but it got rolled out as very much an

aggressive, individual effort on the part of NSA. So it’s hard, i t’s complicated. And sometimes

this stuff just gets rushed to the darkest corner of the room. All ties go to the most ominous

description of what’s happening. Sometimes it doesn’t even have to be a tie; it just goes to the

most ominous description.

Do you remember something called the Prison Program? That’s NSA having access through

Google and Microsoft and Yahoo to materials on their servers in the United States, materials

affiliated with a legitimate intelligence target. That got shoved out the door as, the NSA is free -

ranging on the servers of Google and Microsoft and Yahoo. It was portrayed as an uncontrolled

NSA expiration of this data. That’s just not wrong, that’s incredibly wrong. Now that story got

pushed out, the Washington Post was one of the pap ers that pushed it out. Yes, they corrected it,

on their website over a period of several days, without notifying people the article had been

changed.

But let’s skip all that, let’s just all assume that we can get to hard truth, that we can actually boil

this down to what CSEC ’s doing here and what NSA’s doing across the lake and what GCHQ is

doing in Great Britain and what ASD is doing in Australia. Even then you’ve got a problem

because even then you’re walking into a movie theatre late in the third reel and you’re looking at

a scene, a snapshot of the third reel and you’re saying, Aha! The butler did it! Actually, you need

to go back and look at the whole movie. You need to see what went on before, because if you

know what went on before you might have a different interpretation of what it is you think the

butler is guilty of.

There are three or four things that happen, that NSA and all these organizations have tried to

solve. The war with volume – how do you conduct signals and intelligence to keep you safe in a

tsunami of global communications? The answer to that is collection and meta data. Another issue

that is out there prominently is, you know, NSA is mucking about in those global

telecommunication grids and they have your emails. No one complained when NSA was doing

Soviet Strategic Forces Microwave Signals. Well the equivalent of those Soviet Microwave

Signals are Proliferator Te rrorist Narco -Trafficker Money -Launderer emails co -existing with

yours and mine out there in gmail. And if you want NSA to continue to do what it was doing, or

CSEC to continue to do what it had been doing to keep you safe, it has got to be in the stream

where your data is.

There are a couple of other things too. After 9 -11, the enemy was inside my country. That is 215

program metadata – who might be affiliated with terrorists inside the United States? And finally,

when the enemy wasn’t in my country h is communications were. It’s an accident of history, but

it’s a fact that most emails reside on servers in the United States. They should not deserve

constitutional protection if the email is from a bad man in Pakistan communicating to a bad man ‘

in Yemen. And the Prison Program is what allowed us to get those emails, to keep everyone safe.

There’s a lot more to talk about, but you’re going to start clapping in about nine seconds, so I’m

going to go back to the podium. Thank you.

RG: The command presence of a four -star General. It’s bred in the bone. Alexis Ohanian, you

are up next.

AO: Hello Canada, thanks for being here while there is a basketball game going on. I really

applaud you. Now, we Americans and Canadians have a long history of shared values. Nei ther

one of us wants to take responsibility for Bieber, but that notwithstanding, one of those values is

a right to privacy. It’s something encoded in our governments and in our societies. It’s something

fundamental to who we are. We balance this with security but the technological leaps that we

have made in the last couple of decades has enabled a surveillance state that goes at odds with

these very fundamental rights. And the internet has made my career possible, as an entrepreneu r,

as an investor, but it’s also enabled a surveillance state that is simply unacceptable.

You see, state surveillance is a threat to us for three reasons: it is a threat economically, it is a

threat technologically, to the very backbone of the internet and finally, and somewhat

paradoxically, it actually undermines security. It actually makes us more vulnerable. Let’s talk

about that. Both of our countries are hug e draws for talent and money from all over the world,

because our tech sectors are leading the way. It made my career possible, it made so many others

possible.

Forrester, however, in light of our surveillance state, has estimated that the U.S. tech secto r alone

stands to lose over $180 billion because now our global user base is thinking twice before

signing up for our services. They’re taking it to other servers where they know they still have

that integrity. You see, I just got done visiting over 70 uni versities across the United States and

Canada, even the University of Toronto and Waterloo and I got to meet with founders who have

every right to believe they can create the next Google, however now their users are going to

think twice about running that search query because they don’t know which intelligence agency

is using it. This is real cost.

There is national security in economic security and that has been undermined by this mass

surveillance. The NSA’s insatiable appetite for data has polluted the n etwork. And we’re all

online now, right, as citizens, as companies, as governments, we all share in this online network.

But the very infrastructure, the technology behind it, has been threatened, and it is no longer

healthy because of our brazenness.

Now , what do I mean by that? Well, from a technological standpoint, the worldwide web only

works if it has ‘worldwide’ in it, right? And now we hear countries like Germany and Brazil

talking about Balkanizing the internet. I’ll tell you, Steve and I could nev er have started Reddit

with the hope of it becoming a truly global platform if we thought that we didn’t have access to

anyone with an internet connection, right? The internet works because the more people that get ‘

on it, the better it gets. And this is th e environment that we have created, you see, we’re not just

talking about law. We’re talking about the very technology. We are keeping things insecure for

the purposes of hopefully using it for surveillance somewhere down the road.

Let me put it another w ay. In layman’s terms, it is as though law enforcement found out that

there was a flaw in every lock, in every door in the city of Toronto and they didn’t tell anyone.

They kept it safe so that one day they could maybe use it to take advantage of some unsu specting

bad person. Now, the obvious problem with this is that there is nothing stopping some other bad

actor from taking advantage of that very flaw in the system, except that we’re not just talking

about the city of Toronto, we’re talking about the worl d. And this is a reality right now and this

is simply unacceptable. A rising tide, when it comes to security, a rising tide really does lift all

boats or secure all locks, in this case. And this is something we are undermining with our actions.

And it is d one in the name of counter -terrorism but it is actually making us less secure. And that

is a technological fact.

Now, speaking of security, it is not that there is this trade -off that I’m talking about between

privacy and security. I’m not talking about that trade -off. I’m talking about the trade -off between

security that works versus security that does not work and security that does. Instead of

encouraging our government to leave these flaws open so that we can one day exploit them, we

should be fixing them. Because if we were to invest even a fraction of those dollars in making

the network more secure, we would also be making our governments, our free societies more

secure.

And that brings me up to an interesting point. You see, I was lucky enough as a teenager to get

my first modem. Changed my life. Dorky kid in suburban Maryland. I was able to get online and

it changed my life. It has made me the entrepreneur that I am today. It’s allowed me to invest in

over a hundred companies that are hoping to do the same that Steve and I did with Reddit. But

it’s enabled so much good and it’s also enabled so much bad and that is where the surveillance

state has gotten out of control and that is the problem. Because you see, in the last century,

technology and the laws gave us a certain amount of direct surveillance that was possible. You

see, the laws allowed for a strict, very specific type of direct surveillance and the technology was

rather limited. There was only so much we could do.

Now thanks to the internet , and thanks to some poor decisions on the part of our governments,

the laws are now much weaker and the technology is much stronger. Thanks to the internet it is

now cheaper and easier than before to conduct mass surveillance on innocent citizens. And so,

while the internet must be defended, while the values we hold so dear that make these stories

possible in Canada and the United States must be protected, it must not be done at the cost of our

security and that is what the surveillance state is doing.

Th e internet is a fundamentally democratic, global platform, and it must stay that way. It

embodies all the values we as citizens in a democracy love, and we have not been good stewards ‘

of it. But now is the chance to change all that, and I hope you’ll work with me and Glenn to vote

against this motion. Thank you.

RG: I’ve got to say, Alexis, those shoes are killer. Professor Dershowitz, you’re up next.

AD: Thank you very much. I know some of you are wondering if I’m on the right side of this

debate. I’ve devoted my life to protecting privacy and civil liberties and yet I’m for this

proposition. I am because I sincerely believe that surveillance, properly conducted and properly

limited, can really and truly protect our liberties. Look, no state has ever survived without

surveillance and no state deserves to survive if it has too much surveillance, particularly against

its own citizens. A balance has to be struck, but that balance cannot eliminate the power of

government to obtain information necessary to the defence of our freedoms.

A proper balance requires a proper process for deciding when surveillance is justified, when the

need for preventative intell igence is greater than in any particular case than the need for privacy.

And in striking that balance, it’s importance to distinguish among different types and degrees of

surveillance. There’s a considerable difference, for example, between street cameras that are

observing the external movements of people in public places and hidden microphones that can

listen to what you are saying in your bedroom. There’s a difference as well, between accessing

the content of phone calls and emails and cataloguing the ex ternalities of such messages – to

whom they were sent, when they were sent.

There’s also a considerable difference between surveilling our own citizens and surveilling

foreigners, including foreign leaders who are probably trying to listen in on our leade rs’

conversations. To fail to face our policies on these differences is to fail in the very act of

governance, which requires nuance and calibration. Matters of degree matter and differences of

degree can differentiate pragmatic democracies who are genuine ly seeking to protect their

citizens against real harms from self -serving tyrannies that seek only to protect their leaders from

accountability.

We will hear tonight that terrorism and the need to protect our citizens is only a pretext, that

there are oth er motives, sinister motives for why we collect this information. So I will throw a

challenge out to our distinguished opponents: what are those motives? Why would the Obama

administration have continued this policy of surveillance after being brie fed? Was it because

President Obama has some sinister motive that he won’t tell anybody about for gathering

information and is only using information as a pretext, an excuse, the way the Nazis in Germany

used the Reichstag fire as a way of suppressing civil libert ies? I don’t believe that.

I hope you won’t either.

Motives matter though they too are difficult to discern and are frequently mixed. Many who

supported the surveillance conducted by the FBI against the Ku Klux Klan, and other racist

groups, during the civil rights movement, opposed the very same surveillan ce techniques when ‘

they were used many years later against the Black Panthers. And many who now applaud the

decision to record the illegally recorded private statements made by Donald Sterling to his

mistress would express outrage if equally pernicious sta tements that were made in private by

people they admire and respect were subject to public disclosure. Privacy for me but not for thee

is as common as it is cynically self -serving.

Now we ought to be concerned about surveillance. There is virtually nothin g that is immune

from the pervasive eyes, ears and even noses of the new generation of Big Brothers. This is

absolutely true. But the most dangerous approach to our liberties is the all or nothing one,

proposed by radical proponents or opponents of all gov ernment surveillance. Those who oppose

all surveillance are as dangerous to our liberties as those who uncritically support all

surveillance.

We need to know what harms our enemies, external and internal, are planning, in order to

prevent them from carryi ng them out. But we also need to impose constraints, and that is why

process comes into play. We need a demanding process but we need to make sure that the burden

is realistically designed to strike a proper balance between two equally legitimate and compe ting

values: the need for preventive intelligence to stop attacks against us and the need to protect our

privacy from those who place too high a value on security and too low a value on privacy.

I believe it is possible to strike that balance in a manner that protects our freedoms, and that is

where our efforts should be directed: surveillance, properly limited and appropriately conducted

can promote liberty, protect life and help us defend our freedoms. Our enemies, especially those

who target civilians, have one major advantage over us: they are not constrained by morality or

legality.

We have an advantage over them, in addition to operating under the rule of law – we have

developed, through hard work and extensive research, technological tools that allo w us to

monitor and prevent their unlawful and illegal actions. Such technological tools helped us break

the German and the Japanese code during the Second World War. They helped us defeat

Fascism; they helped us in the Cold War. And they are helping us no w in the hot war against

terrorists who would bomb this theatre if they had the capacity to do so.

You’re going to hear again that there are only excuses that are being offered, that terrorism is

really not a serious problem or that American policy is as terroristic as the policy of al Qaeda. I

don’t think you’re going to accept that, are you, ladies and gentlemen? We must not surrender

our technological advantage. Instead, we must constrain it within the rule of law by constructing

appropriate processes g overning its use.

I urge you to vote against rejecting all state surveillance, properly regulated, as a legitimate

defence of our freedoms. I urge you to vote yes. Thank you very much. ‘

RG: You can tell, a trial lawyer, through and through, right down to the final second there.

Congratulations Alan, that was terrific. Glenn, you’re going to get the last word in the opening

statements. This next six minutes is yours.

GG: Good evening. So I want to begin by doing something that I am very unlikely to do for the

next hour and a half, which is vehemently agree with something that General Hayden said. And

what it is that he said at the beginning is absolutely right, which is that in order to assess the

resolution that we are debating tonight, which is, is state surveillance a legitimate defence of our

freedoms, the first – and I think most important – question to ask is, what is state surveillance.

And the reason I say that is because if state surveillance were about targeting in a discriminating

and focused way people who are plotting terrorist attacks against our country or other countries,

or are otherwise planning harm, there would be no debate.

There would be no controversy. We could all end right now and go home. Professor Dershowitz

referenced the sinister radicals who are opposed to all surveillance and who never want the

government ever to spy on anybody. I’ve been writing about this topic fo r eight years and I have

never met a single person who believes that. That is a straw man fantasy that does not exist.

Unfortunately, the actual system of state surveillance that the United States and its surveillance

partners have constructed almost enti rely in the dark has almost nothing to do with that. It is not

what Professor Dershowitz spend the last six minutes defending, a limited system of focus,

surveillance designed to protect us from people who want to blow up the auditorium. If it were

that, t here would be nothing to debate.

What state surveillance actually is, is best understood by the NSA’s own documents and own

words, which as I think you know I happen to have a lot of. That phrase that they use over and

over again, to describe what the sys tem of surveillance is that they’ve constructed is, collect it

all. There’s this remarkable and very poignant point which is that the United States government

and its officials and defenders like General Hayden have become extremely adept, because of the

secrecy behind which they operate, as presenting this very mild, moderate, pleasant picture about

what it is that they do when they talk in public about those programs. They’re very good at doing

that.

Unfortunately, those descriptions are wildly disparate from what they actually do and what they

actually say in private, when they think that nobody’s watching them. Over and over in the

documents of the NSA are not these mild paeans to the need for targeted surveillance, but the

opposite. It is aggressive bo asting about the system of indiscriminate, suspicionless surveillance

that they have constructed in the dark . Entire populations, hundreds of millions of people, who

are guilty of nothing, have their communications routinely monitored, surveilled and store d.

There’s one particular document that I find incredibly striking, that was presented by the NSA in

November of 2011 at a conference they called the Signal Development Conference where they

boast to their four partners about what it is that they have done and this document is entitled New ‘

Collection Posture, Our New Collection Posture. And it says, in a chart, collect it all, snip it all,

know it all, process it all, exploit it all.

A federal court in the United States, a George Bush appointee, right -wing, pro -national security

federal judge, in December of last year, ruled that what the NSA is doing is a profound violation

of the rights of millions of Americans and he described this program as quote, the almost

Orwellian technology that is unlik e anything that could have been conceived in 1979. William

Denny, a mathematician with the NSA for thirty years who resigned in protest over what the

NSA has become , told the Democracy Now program in 2012 quote, they’ve assembled on the

order of 20 trillio n transactions between U.S. citizens with other U.S. citizens.

The Washington Post, in 2011, before Edward Snowden even emerged, reported that the NSA

every single day, every day, collects 1.7 billion emails and telephone calls simply between and

among American citizens, let alone what they collect on foreign national s. That is the

surveillance state that we are here to debate. It is unlike anything even science fiction writers in

the 1950s could conceive of and it is the opposite of the limited and focused program that our

opponents are attempting to convince you exis ts.

Now I just want to make one point before my time is up about something that is often asked

which is what is the reason for this? Because as citizens I think we all understand the inherent

inappropriateness of having the government monitor and collect data about all of its citizens and

with whom we communicate and who is emailing us and what it is we are saying. And so the

answer that they say over and over again, that they are going to tell you tonight over and over

again, is one word: terrorism. They use that word because it packs a very powerful emotional

punch. And Professor Dershowitz said, if you understand it, if you want to claim that it is a

pretext, then that is some sort of conspiracy theory.

The U.S. government has used terrorism as a pretex t for everything that it has done in the past 12

years from erecting a torture regime, to invading and destroying Iraq, to imprisoning people

without charges in Guantanamo, to collecting the communications of all citizens throughout the

globe including its own. One need not be a conspiracy buff to think that as a pretext but just

having basic knowledge of history, but U.S. courts and government institutions over the last year

have all said these programs have nothing to do with terrorism.

RG: Ladies and ge ntlemen, four very formidable debaters, what talent on the stage tonight.

We’re going to allow them to extend their arguments a little bit further now with timed two

minute rebuttals, where they are going to weigh in on what they’ve heard from their oppone nts.

We’re going to ask the pro -team to go first as a pair. General Hayden, you spoke at the top of the

debate so let’s hear your rebuttal now.

MH: Ok. Two minutes is not enough time to unpack all the inaccuracies of the last 24. Alexis, I

actually agree with a lot of your stuff. The Balkanization of the internet would be a human

tragedy, and we can talk about that in the after -prom party, how we might want to make sure that ‘

doesn’t happen. Glenn, I don’t agree with anything you said. A couple of quick poi nts because

time is short, Alexis, you just need to put the surveillance state out there as a given. We need to

define that. I agree that the American technology industry has suffered because of the stories that

some people have written , but American indus try is doing nothing more than what industries

around the world are doing for their own intelligence services, and American industry is being

unfairly singled out and punished because of that.

A whole bunch of other things: mentions of massive surveillanc e. We do bulk collection, that is

different from massive surveillance. We can talk about it later. Glenn says, we collect everything

there is. NSA actually, on any given day, collects – listen up carefully, it’s a big number –

collects .00004% of global in ternet traffic. I have no idea what 1.7 billion intra -American email

collection means. That is simply not happening. What we have here are people trying to keep

you safe and I’ve got an image coming out that the people who work and lead NSA are like that

character in The Simpsons, you know, Mr. Burns, after finally they get to go “Excellent,

excellent!”

We’ve got a lot more to unpack, but you get the drift. Thanks.

RG: Extra points at the Munk Debates for any Simpson references. Alan Dershowitz, your

rebuttal.

AD: I think we’ve heard two straw men from the other side. The first straw man is raising the

issue of torture and rendition. That proves my point. I am a lib eral Democrat who voted against

President Bush, who voted for President Obama, I hate torture, I hate rendition, I’m against all of

that. But does anyone doubt that all of that was motivated genuinely, but erroneously, by a desire

to stop terrorism? Do you think that President Bush ordered these horrible things to be done just

because he likes torture or likes rendition? He may have been wrong but that was his motive, that

was his goal, that was his purpose, to stop terrorism. And so let’s debate the merits of whether

surveillance is good or bad, not the motives.

Second, the argument is that, well, if only we could just surveil terrorists. If we could only just

focus on terrorists, just point out terrorists. If only we could live in a world like that. That is a

real straw man. Of course, we wouldn’t be having this debate because we wouldn’t be debating

you. If you can figure out a way of identifying terrorists and only terrorists without the need to

sometimes be intruding on the conversation of somebody who might be talking to a terrorist, or

who might know somebody who is a terrorist, I would be thrilled. But it is in the nature of life

that of course one has to over -predict. We all know that when it comes to guilt or innocence and

punishment, better ten gui lty go free t han one innocent man be wrongly confined, but that is not

the rule for preventive intelligence.

When it comes to preventive intelligence, it is far better that a few people have some intrusion

than that one innocent person, whose death could have been prevented by surveillance, is harmed

or killed. We have to over -predict. We have to over -use. The question is, how much? How to ‘

control it? How to constrain it? I think we can have enough surveillance that is consistent with

liberty.

RG: Thank y ou. Glenn, let’s have you up and then Alexis can close out the other side. Alexis is

chomping at the bit here to get at Alan and Michael.

GG: So just on the question of motive, I actually don’t care at all about motive, primarily

because I don’t think I o r anyone else can divine it. I don’t know why George Bush and General

Hayden and the other officials in the United States invaded Iraq and destroyed it and why they

tortured people and why they put people in prison without charges. I only know that it was

incredibly wrong to do and that is the same of surveillance. And I bring it up because it is the

same mindset, the idea that if you say the word terrorism over and over and over enough you can

put people in prison and justify whatever it is you want to do.

As far as whether or not this surveillance is actually about terrorism, let me share with you what

people inside the U.S. government have said on that question so that you don’t have to take

either our word for it or theirs. The federal court I reference d earlier, that ruled that the NSA was

violating the rights of Americans, said about the claim that it was for terrorism quote, the

government does not cite a single case in which analysis of the NSA’s voluminous metadata

collection actually stopped a terr orist attack. A presidential review panel, appointed by President

Obama of his closest aides, on December 18, issued a report saying, our view of the information

used contributing to terrorism investigations by the use of metadata was not essential to

prev enting attacks and could readily have been attained in a timely manner using conventional

court orders, which is my answer to Professor Dershowitz about how else we can target people

and find out what we need to know.

Three Democratic senators in President Obama’s own party who are on the intelligence

committee and have access to all classified information wrote an oped on November 25 th in the

New York Times and they wrote quote, the usefulness of the collection process has been greatly

exaggerated . We have yet to see any proof that it provides real, unique value in protecting

national security.

They hope that they will blind you with emotion and I hope that you will focus on the evidence

and the facts.

AO: Now it’s my turn, right? Bring in the ne rds. Well I’m happy General Hayden, that we’re in

accord at least to the technological costs to all of this. I spoke earlier about the economic costs,

but I want to reiterate the fact that I am the nerd here, right? And you all here didn’t hear a

rebuttal about the real technological problems, the fact that the mass surveillance we are doing

actually makes us less safe, less secure, and this is from a technological standpoint. And this is

something that we, as Canadians, as Americans, have every reason to b e worried about. We

should be working to make the internet stronger, to make it more secure, because it benefits all

of us. ‘

And on the issue of, oh well, I suppose everyone else is doing it too, well, I don’t know about

you but I don’t want to settle for, our nations have never settled for, gosh, it’s good enough for

everyone else. Our nations have been founded on principles that cherish things like a right to

privacy and a right to freedom and encourage the kind of amazing things that come out of it as a

result of those policies and so what we’re offering you here is this: the surveillance state has run

amok. Technology that has enabled us to send selfies 24/7 – not that valuable – has also enabled

us to be spied upon 24/7. And there is a way for due proces s. It was good enough for centuries

before we had this technological innovation and there is still a method to rein in this madness but

it starts by making the network more secure and not less, and not doing the things that make

every day Canadians and Ame ricans wonder, who’s listening…who’s watching?

That’s not the America I was raised in, that’s not the Canada I presume you all were raised in

and I hope, I hope, with all of us together we can get this right. Thank you.

RG: Well, the battle lines in this debate could not be clearer. Now we’re going to move on to our

cross -examination period where we’re going to get these two teams of debaters to engage with

each other directly. I want to start with a question that I think comes out of the real points of

clash here in the opening part of this debate and it’s around what are the risks that we are

defending ourselves against by virtue of having these programs and you know, General Hayden,

let me ask you, you were there on September 11 th. If these programs were in place back then –

what we have now – could you have stopped that attack? Could you have prevented it from

happening? I think that is the big litmus test that is on a lot of people’s minds.

MH: First of all, let me point out – and I appreciate the question on terrorism – that this isn’t just

about terrorism. This is about legitimate foreign intelligence activity on the part of free people to

keep themselves safe and free. Terrorism is a big deal but we do this for lots of good, legitimate

reasons. Now, to answer your question, if this program – and here we are talking about the

metadata program which is about terrorism, because the only reason you can use the metadata is

to stop terror attacks, no other purpose – if we’d have had this program in place we would have

known that two of the muscle guys on the Pentagon flight, planning to hit the Pentagon, the

American Airlines flight, we would have detected that they were in San Diego. That was Nawaf

al-Hazmi and Khalid al -Mihdhar. Now they had gone to a meeting in Kuala Lumpur and we had

last lock on them there and we lost them there. Shame on us, I wish we had kept it. But then they

came to the United States, unbeknownst to us. NSA actually intercepte d their phone calls from

San Diego, where they were staying, back to a known al Qaeda safe house, in Yemen. We

listened in. Now, the trigger, the selector, as it’s called, why we were listening to that particular

phone call, was because we were covering th e safe house in Yemen, and then as the call was

made and as it went through the global grid, NSA selection devices saw the number of the house

in Yemen and we listened to the call a little more than half a dozen times. Three or four times

there was enough stuff interesting on the call that we actually completed an intelligence report

about it because that safe house in Yemen was notorious. Nothing in the content of the call,

nothing in the physics of the intercept, told us that the other end of the call was in San Diego. ‘

The way it was intercepted, the San Diego number doesn’t show up in the technology and they

didn’t say anything in the call like, “lo ve the weather, the F leet’s in and we’re going to the zoo

tomorrow”, which would have suggested they were in San Diego. If we would have had the

metadata program, the 215 program, as a matter of routine we would have thrown that selector at

that mass of American phone bills and phone selections and simply would have said, hey, did

anybody in here talk to this nu mber in Yemen? And kajing, the San Diego number would have

popped up. Now there’s a lot NSA can do with that. NSA would have handed that number to the

FBI. The FBI would have kicked in the door in San Diego and would have found Nawaf al -

Hazmi and Khalid al -Mihdhar, two people legally in the United States. They probably would

have leaned on them enough though and found some reason to push them out of the country and

off they would have went. And so two of the muscle guys on the Pentagon flight wouldn’t have

been there. To answer your question, I suspect al Qaeda then may have called the raid, the attack

off, thinking, we don’t know what these guys gave up to the FBI, we don’t know what else the

Americans knew, they found these two guys, what if they are layin g in wait, call Mohamed Atta,

call the other guys, we’re off. I suspect that would have happened, I can’t guarantee it. But wait,

there’s more .

RG: Well , I’d like to bring the other side in…

MH: One more point, it’s very brief.

RG: Alright.

MH: If that w ould have happened, we still would not have gotten credit for stopping a terrorist

attack because we would not have known what we had done.

RG: Thank you. So Glenn, sounds kind of convincing.

GG: Well, I have a lot to say about that although I will try a nd make my remarks actually brief. I

understand why General Hayden wants to claim that he didn’t have the capabilities to stop 9 -11

because he was the head of the NSA at the time that the 9 -11 attacks took place and wants to say

that I didn’t have the abil ity to stop it, but that claim, is incredibly inflammatory to Americans

and to people throughout the world and the West, that we could have stopped 9 -11 or disrupted

this plot had we had the NSA programs that are now being debated, has offended the leading

experts on al Qaeda in the United States who almost always defend the United States in the war

on terror. One of them, about this claim, wrote on CNN on December 30, 2013, “is it really the

case that the U.S. intelligence community didn’t have the dots in the lead -up to 9 -11? Hardly.

The failure to respond to these warnings was a policy failure by the Bush administration, not an

intelligence failure by the U.S. intelligence community.” The other expert, Lawrence Wright,

who wrote the definitive book on al Qaeda in 2003 and won the Pulitzer Prize, similarly wrote in

the New Yorker in 2014, after reviewing all of the evidence in their possession already, was that

the reason that 9 -11 happened was that they had collected so much information that they had no

idea what they were collecting and therefore didn’t share with each other the information that ‘

could have stopped the plot. And I think that’s a vital point, which is that the more indiscriminate

surveillance that you do when you’re collecting billions of ca lls a day, that’s from the

Washington Post pre -Snowden, it’s throughout all of the Snowden documents that the NSA

collects billions of calls every day. Their main problem right now is that they collect so much

that they can’t even physically store it all, even though you can store gargantuan information on

a small little drive and when you collect that much it’s impossible to know and to detect when

somebody is plotting to attack the Boston Marathon or to blow up a plane because they are

collecting everythi ng about all of us rather than the people that they should be keeping their eyes

on.

RG: So Alexis, come in on that, you’re the self -professed tech expert, which you are, I mean, are

we buried in data? General Hayden is saying that is precisely the challenge. There is too much

data, we have to respond to it, we have to systematize it, we h ave to drill down into it. Are you

just saying the technology is overwhelmed by the data itself?

AO: Yes. I mean, this is a very, very, very hard problem to solve. I mean, the gift and the curse

of all the data, aside from all the civil liberty violations , is that yeah, there may be some signal in

there but there’s a lot of noise. And it’s a very hard software problem to solve. And that’s still

only part of it, right, because through the efforts of this mass surveillance we’ve also undermined

the technolog y that makes the internet work, that keeps us safe, everyone of us safe. So it

becomes more than just rather offensive use of surveillance on innocent civilians. It becomes

much more because it threatens the technology of how the internet works and works w ell.

RG: Professor Dershowitz, come on in on this one.

AD: Well intelligence is always a work in progress. Intelligence in the context of newly -

developing technology is always a work in progress. I think we’re asking for too much right

now. And that is w hy motive is so important. And that is why it is so important to understand

that Mr. Greenwald has conceded his major argument. He had said that this is all a pretext. Now

he says, I don’t care about motive. But pretext is all about motive. If you are prep ared to concede

that the motives are good and that it is a work in progress, we have to work to make it better.

Now not Greenwald, because he says it’s a pretext and if it’s a pretext then there is no use in

trying to make it any better. I argue that it is well -intentioned and well -motivated though there

are problems. Too much information, too much gathering, perhaps not always gathering the right

information, that’s why we need to reform the FISA court, that’s why we need to have a range of

other changes t hat allow us to take this work in progress and make it fit in a nice way into our

war against terrorism without diminishing civil liberties. I think we can do it. We’ve done it with

other technologies in the past. Let’s not throw out the baby with the bath water, let’s not restrict

ourselves from using our tremendous technological advantage that we have worked so hard to

achieve. Let’s work to strike the appropriate balance. ‘

RG: So Glenn, to understand your argument, can you see a policy where bulk data exi sts that

strikes the right balance?

GG: No. There is no, bulk data means indiscriminate mass collection. Keeping track of who it is

that you’re talking to, who’s calling you, who is emailing you and the government, the legitimate

government, has no busines s monitoring entire populations who are guilty of absolutely nothing.

There is this attempt to suggest that well, there are different kinds of surveillance, that you can

listen to phone calls or read emails or you can just collect metadata. They’re doing b ulk but when

they say just metadata, there are all kinds of studies including from a professor at Princeton,

Edward Felton, who have demonstrated that collection of your metadata can actually be more

invasive than reading your emails or listening to your p hone calls. Imagine if you call an

abortion clinic or an HIV specialist or a drug addiction hotline or if you call someone who isn’t

your spouse late at night repeatedly, or you call a suicide hotline. Why should General Hayden

and all of the national secu rity officials and your government and mine know that I’m calling

those people so that they can use that however they wish. I do think that is illegitimate. What is

legitimate is to have targeted, focused surveillance on people who courts have become convi nced

are actually guilty of some wrong -doing. It worked to keep us safe when the Soviet Union had

massive intercontinental ballistic missiles pointed at every one of our major cities, it can

certainly work to keep us safe from a few thousand people hiding in some caves.

RG: Now General Hayden, in interviews and elsewhere you have said that there is a fundamental

difference between collection and surveillance, that these are two different activities.

MH: Yes, there is a difference between massive surveilla nce and bulk collection. Then let me

piggyback on a thought that Glenn put out there. He just suggested to you that the way we

conducted surveillance against a slow -moving, oligarchic, technologically inferior but incredibly

dangerous nation -state is the w ay we should protect you against a nimble, agile, fanatical,

individually -motivated, low -threshold in terms of ability to detect threat. And my point at the

beginning was, you know, doing that Soviet ICBM signal thing kept you safe then, but the new

threat s cannot be attacked the way we attacked the old threats. Now, back to the metadata where

I’m going to find out who is calling their abortion clinic and you know, I mean, I started out with

saying facts matter, so I assume on the metadata issue, we’re talk ing about the 215 program, not

the phone records, alright? Because frankly, that is the only bulk metadata N SA has on American

citizens, but…

GG: And Canadians too.

MH: Well, we’ll talk about foreign nationals…

GG: We should talk about everybody, especially in this room.

AO: No actually, not just Americans matter. ‘

MH: Accusations fit on a bumper sticker. The truth takes longer.

RG: Good. You keep going.

MH: NSA gets from American telephone providers the billi ng records of American citizens.

What happens to the billing records is actually really important. I didn’t make this phrase up but

I’m going to use it. They’re put in a lockbox, alright? They’re put in a lockbox at NSA. Twenty -

two people at NSA are allowe d to access that lockbox. The only thing NSA is allowed to do with

that truly is a jillion records sitting there, is that what they have is called a seed (?) number, a

seed number about which they have reasonable suspicion that that seed number is affiliat ed with

al Qaeda. He rolls up to a safe house in Yemen, he’s got pocket litter that says here’s his al

Qaeda membership card, he’s got a phone you’ve never seen before…Gee, I wonder how this

phone might be associated with any threats in the United States. So now, I’m being a little

cartoonish about this, NSA gets to walk up to the transom and yell through the transom and say,

hey, anybody here talk to this number I just found in Yemen? And then, this number, say, in

Buffalo says, well, yeah, I call him abou t every Thursday. NSA then gets to say, ok, Buffalo

number – by the way, number, not name -- who did you call? At which point, my description of

the 215 metadata program is over. That is all NSA is allowed to do with the data. There is no

data mining, ther e are no powerful algorithms chugging through it, trying to imagine

relationships. It’s, ‘did that number call someone in the United States?’ The last year for which

NSA had full records is 2012. I’ll get the 2013 numbers shortly but in 2012, NSA walked up to

that transom and yelled, hey, anybody talk to this number, 288 times. Now that still may offend

you, but that is not what was described over there.

RG: Alexis, let’s have you come back on that. What he has described is a fairly minimalist

system and o thers have described something that is pretty maximalist and pretty scary . Who’s

right?

AO: Well, you could listen to the technologist about this. As a technologist I’m telling you, yes,

that metadata poses a very serious threat to us because it is simply being gobbled up, sucked up,

without any concern for due process, without any concern for the Fourth Amendment of the

United States, without any concerns for our right to privacy and in aggregate, yes, it is far more

surveillance than is necessary, than i s required to do that job and I can’t help but wonder, well,

who watches the watchers? At this point, we are going on what, trust? We know plenty that we

have learned now and the response is don’t worry, it’s ok. And I don’t think that’s good enough.

It’s not good enough because in democracies we rely on transparencies, we rely on what is going

on and for too long, we have had no knowledge of exactly what was going on and when we

found out, well, it was not the kind of thing we wanted to be done in our name and it was, like I

said, from the very start actually making us less secure. And at the end of the day I think we all

agree we want security above all, but the actions we’ve been taking through mass surveillance in

fact make us less so. ‘

RG: So Alan, the middle ground between these two points as it exists, the government right now

may be, as you think, benign, but what about some government in the future? What happens to

this capacity, not today but tomorrow, ten years from now, twenty yea rs from now?

AD: James Madison said if men or women were angels we wouldn’t need the Bill of Rights. And

we need the Bill of Rights because we don’t trust government and that is why we need to impose

constraints, we need to have warrant requirements. We ne ed to limit the ability to use these

warrants, to use these surveillance methods. But I think we have one, big fundamental difference

here. I think the other side assumes you can only surveil people who are guilty. Let me give you

an example that I’m sure occurs right here in Toronto. It certainly occurs in London, it occurs in

New York. Among the new primitive technologies , we now have silent cameras on street

corners, that has had a major impact on reducing street crime. Now those cameras capture

images o f innocent people, all of us, walking along the street and doing our own thing. It doesn’t

capture what we say but it watches us. It’s Big Brother. It’s Big Brother writ small perhaps, and

it doesn’t focus only on guilty because criminals don’t walk around with big Cs on their heads.

We have to have these cameras in order to send a message to criminals that if you commit a

crime, there will be a video and you will be captured. That has a big impact. So you don’t have

to be guilty in order to surrender a lit tle bit of your autonomy and privacy in the interest of

preventing major crimes. So we ought to understand that we live on a continuum, a continuum of

dangers, a continuum of rights violations. Not all rights violations are the same. Having yourself

monito red, walking through Times Square is, as I said in my opening, very different from having

the government intrude and listen to what you say in your bedroom. And that’s the kind of

debate we should have. Not have debates about innocence or guilt. Due proces s is very nimble

and very flexible. It is the process that is due you based on the degree of intrusion compared to

the degree of benefit the government gets out of it. That is the way we ought to have this debate.

We ought not to end all surveillance and a ll intrusions and although Mr. Greenwald keeps

denying this, when you really listen closely to what he is saying, he really sounds like he is

against all surveillance unless you can find a guy with the al Qaeda card, wearing an al Qaeda

baseball cap and al Qaeda uniform and if you can’t identify him with 100% certainty, don’t you

ever dare to try to find him by intruding even slightly on the privacy interests of innocent people.

That is not the way government works, nor should it work that way.

GG: You kno w, I completely understand, I really do, why Professor Dershowitz wants to

attribute to me these positions that are completely laughable and ridiculous, because it is so much

easier to debate people when you can pretend that they hold moronic positions tha t they don’t

actually believe. It’s super easy and if I believed what he just said, I would urge you to vote

against me. But I don’t believe any of that. There is a process that is in place from the time the

United States was telling the world that the Sov iet Union was this evil empire that was the

greatest threat known to man, that all presidents, Democrat and Republican alike, understood

was the way to keep America safe by following, which was going to a court before you

surveilled somebody and listened t o their phone calls and not present definitive proof positive ‘

evidence that they are guilty of something but enough reasonable cause so that there were

safeguards over who it was that was being monitored and surveilled and to have enough of an

ability to t hen listen and see whether or not there was cause enough to believe they should

continue to be surveilled,,,

AD: Would you require for that camera on the street that I talked about?

GG: No, and I want to explain why. The example of, let’s just put a camera on a street corner

and watch what people do on the street I think proves our point: because invading what you do

on the internet is radically and fundamentally different. The internet is not simply a place that

you pass by on the street and I think one of the reasons why, around the world, younger people

have been so supportive of Edward Snowden and view him as a hero and have been so

supportive of these disclosures is because they understand what the internet now actually is for

the world, which is not si mply a place that we pass by to do other things, it’s the place where we

explore who we are as human beings, it’s where we make our friends, it’s where we read, it’s

where we think. It is everything about who we are and to allow the internet, not a street corner

but the place of this virtual reality where we exist and grow and explore, to have all privacy

removed through this collect it all mentality, which remember is not my phrase, it’s theirs, is a

kind of invasion unlike anything that has taken place. L et me just leave you with one quote from

James Vampert (?) who is an NSA historian, who has worked on these issues for a long time

who said that, if you allow the NSA the ability to invade people’s online activity you are

allowing them to invade people’s m inds, their thoughts and their very person. And I think we all

understand the value of privacy, even though those of you who voted yes on this resolution at the

very beginning, I can guarantee, you all put passwords on your email and social media accounts,

and locks on your bedroom and bathroom doors, you wouldn’t want me or General Hayden or

anyone else trolling through it, because as human beings we all understand that privacy is a

unique guarantee of human freedom, it’s where creativity and dissent and e xploration reside and

when that is gone so too is a crucial part of human freedom.

RG: So that is a perfect segue to now call for a video that was created especially for tonight’s

Munk Debate. It touches on what the internet means, how surveillance impacts on it, its brief but

it focuses on the point of accountability which I want to come ba ck to and get the panel to weigh

in on. Ladies and gentlemen, please listen now to Edward Snowden, especially for the Munk

Debates.

ES: So this is a part of what today’s state surveillance looks like but it’s important to remember

that it doesn’t stop wit h phone calls. It covers your emails; it covers your text messages; your

web history; every Google search you’ve ever made and every plane ticket you’ve ever bought;

the books you buy at Amazon.com. The transactions are sent in plain text where it’s unencr ypted

and anyone, whether it’s the NSA or some other foreign intelligence service, can collect this and

store it for an increasing period of time. It includes who your friends are and how you

communicate with them. It shows where you go and what you want t o be. It also shows people in ‘

charge of state surveillance who you love and it shows them where these people live. Now

defenders of this kind of unconstitutional dragnet surveillance might say that there is no room for

abuse because we have policies in pla ce to address these concerns. But can policies that change

with every president, with every new congress, with every new director of the NSA, really

address the threat of building inside our own country this kind of architecture of oppression?

What about o ther countries that don’t abide by our policies? Is leaving our communications

insecure so that the NSA can monitor them and those of our adversaries really worth the cost?

And we have to remember the policies aren’t perfect. Despite policy, I, as an NSA a nalyst,

sitting at my desk, had the technical authority to wiretap anyone, from a federal judge to the

President of the United States, without getting out of my chair, as long as I had a private email

address. And that’s not a boast.

RG: So that’s a snipp et of a special seven minute statement that Mr. Snowden recorded for the

Munk Debates tonight and it’s live right now on our website, www.munkdebates.com/snowden

for those watching online who want to have a look. So, Alan, let me come to you on a number of

points there that we’ve covered, but a key one that I think is on the minds of this audience which

is accountability. I mean, to what degree do we have a system in place now that is powerful

enough to har ness this technology in the ways that you want to see it when Edward’s claiming

that he can get on his computer, not even as an NSA employee but as a contractor, and log in to

the president’s email?

AD: First of all, I think General Hayden should answer t hat question and I’d love you to come

back to me, but whether or not that is true or false that is a factual statement.

RG: Ok, well, let’s start with facts. General Hayden?

MH: Facts, ok. If Edward Snowden were able to do that, that would not only be a v iolation of the

laws of the United States, it would also violate the laws of physics. He had access to NSA’s

administrative network. He did not have access, thank God, to NSA’s operational network.

That’s not the first time he’s said that. There’s no one i n NSA who believes there is any

possibility that that could be true. Factually true. He may claim it’s artistically true in the sense

that somebody at NSA who actually had authority and was on the right network might do that,

but that’s my segue to Alan, b ecause this is very, very carefully overseen. You can’t, actually,

the rest of the Snowden statement is actually quite interesting. For the first time, I think this

might be Snowden 2.0., because he actually makes a distinction between what is possible and

what is actually being done, something that a lot of folks don’t do.

AD: Well let me follow up on that. The United States Supreme Court on Tuesday of this week

heard one of the most important arguments that it will hear this year. And the issue that was

before the Supreme Court was that if I were to get arrested today for jay -walking or for driving

my car without a seatbelt, under current rules, the person, the policeman searching me, can seize

my iPhone and can access all the data in my iPhone, including my medical records, my tax ‘

records. This isn’t the NSA. This is what happens when modern technology confronts the fourth

amendment. The Supreme Court heard argument: nine justices, eight of them expressed their

views and then there was Justice Thomas. But eight of them expressed their views and they were

deeply divided, and I really urge you to read the transcript because it’s really shows how our

Supreme Court works. You can tell that they were deeply confused, deeply troubled and trying to

figure out a way of applying the intentions of the framers, who wrote in 1793 and couldn’t

imagine this modern technology and the words of the fourth a mendment which talk about

‘reasonable’ to the modern technology and the Supreme Court doesn’t only write for today it

writes for next year, and next decade and the decades after that. Again, this is work in progress.

We must get accountability. We are tryi ng to get accountability. Technology is always ahead of

the law. I try to teach my students in 50 years at Harvard not how to practice law today but how

to practice law when you’re my age, 50 years from now. It’s always a quest. The struggle for

justice ne ver stays still, but that doesn’t mean you make cellphones or iPhones illegal, it means

you try to work to constrain things and to create accountability. And the answer to your question

is, we don’t have enough accountability now but we’re getting there an d you can help us get

there. By the way, this is not only an American problem. The five eyes (‘I’s?) work together: the

United States, Canada, New Zealand, Australia and England. They share intelligence and

information. You’re not foreigners when it comes to your own government. Your government is

trying to protect you as well, and your Supreme Court is trying to struggle with these issues.

Don’t make it a debate, as Mr. Greenwald still is making it, between good and evil. There are

good people struggling t o do the right thing, let’s keep the struggle going but let’s not throw out

surveillance which requires sometimes surveilling innocent people. For example, the videos. It

might catch a woman…

RG: You know Alan, equal time here…

AD: …going to an abortion cl inic. It will catch Donald Sterling going to his mistress’…

RG: Let me bring Glenn in.

GG: So I am going to begin by saying that U.S. national security officials are very adept and

very skillful at presenting a public image that is wildly different than t he reality. And, of course,

the whole NSA scandal began when James Clapper, the director of National Intelligence, went

before our Senate and was asked whether or not the NSA is mass collecting data about millions

of Americans and he looks the senators in the eye and said, no sir. And then, the very next story

that we reported, from the Snowden archive, two months later, proved that the NSA was doing

exactly that, which the top national security official of the United States government falsely

denied to the Senate and to the public and so we hear things like, Mr. Snowden, who whatever

else you think of him has never been proven to prevaricate, is not telling the truth when he says

that sitting at his desk he could have wire -tapped anyone. I guarantee you tha t is exactly what

NSA analysts have the capability to do that and the evidence for that, don’t rely on my word or

his. It’s the Xkeyscore program which we reported on in the Guardian in September of 2013, ‘

ample documents that show an analysts’ training man ual walking them through and saying, when

you want to eavesdrop on a particular email here is the screen where you do it, and you enter the

email and the justification, nobody checks what it is that you’re doing, you simply then start

getting those emails exactly as Mr. Snowden said. And the question of whether there’s really any

safeguards, he said, oh it’s in a lockbox, don’t worry, we’re collecting all your data but it’s very

well protected. Aside from the fact that history proves that you cannot trust g overnments to

collect information and not abuse it, think about this fact, the NSA is an agency where Edward

Snowden sat for many months and downloaded all of their most sensitive documents and they

had no idea that he was doing it. To this day, they have no idea what he took. They say that all

the time, even though they spent tens of millions of dollars trying to figure it out. Does that

sound like a very well -managed system to you that you can trust all of your data not to be

abused? And the last point I want to make, and you know Professor Dershowitz for some reason

keeps returning to the issue of motive which I said from the beginning I don’t think matters.

AD: What does pretext mean, then?

GG: If somebody invaded Iraq because they were an evil person or was incredibly misguided

and amoral, but here’s what I do know. Here’s what I do know. In an interview before the event

that he gave, Professor Dershowitz said, the NSA talks about this FISA Court as oversight and

yet the FISA Court is pretty much of a joke, it just gives out warrants like, as he said, like

lollipops. And I agree with him on that. And the reason is this, whatever the motives are, the

climate in the United States after 9 -11 got out of control. 9 -11 was a very traumatic event. I was

in Manhattan on that day. I remember the emotions it triggered to this day. And the balance that

we always had or tried to maintain got completely out of whack so that everything that was

justified in the name of terrorism, from destroying a country of 26 million people to putting

people in prison without charges to torturing them, to spying on everybody’s emails and

telephone calls, anything that got justified in the name of terrorism, got done. That is what is

wrong, that is what is dangerous, and that is what I hope you’ll reject tonight by voting against

the motion.

AD: So are you then prepared , Mr. Greenwald, to withdraw your accusation of pretext, because

you say motive doesn’t matter, and you ca n’t have pretext without a bad motive.

GG: My basis for saying that terrorism is pretext, and I doubt you want me to read it again,

although I’d like to, is the federal court judge, President Obama’s own panel…

AD: They never said that.

GG: …I quoted, I q uoted…

AD: They never said that. Show me the word ‘pretext’.

GG: I quoted them when they said that the program… ‘

AD: Show me the word ‘pretext’.

GG: You can keep screaming that and it doesn’t change the point that everybody who…

AD: What’s the point?

GG: … who has looked at the issue has said that these programs have played virtually no role in

stopping terrorism and…

AD: That’s completely…

GG: …it’s not the role of…

AD: It’s completely different point.

GG: …and it doesn’t work…

AD: That’s a completely diffe rent point. You’re saying what they have said is that they were

well -intentioned, it wasn’t a pretext, but there’s no evidence that it worked. If you can’t

understand the difference between those two statements then you really are what you have

described y ourself as not being, previously.

GG: The threat has been greatly exaggerated, greatly exaggerated. That is what three Democratic

senators with access to the classified information, which you don’t have...

AD: The results were exaggerated, not the motive.

RG: Hot debate , that’s for sure. And before we go to closing statements I want to provide Alexis

Ohanian an opportunity to reflect on Snowden’s statement, on what came out of that statement

that you think is a key point for yourself .

AO: Well this has gotten spicy. I, like I said, I’m the nerd here. I still want to point out that, my

first opening remarks about the fact that what we are doing with mass surveillance actually

undermines the strength and secur ity of our nations, as well as oversteps the bounds and the

rights of privacy that we all have. Like, this is still a fundamental truth about what is being done

from a technological level and then ultimately, on top of that, remember, Canadians, Americans,

right? Our governments work for us. They are ultimately responsible and beholden to us. We

employ them, we sometimes hire them, sometimes we fire them, but they work for us. And the

way this entire thing has been handled over the last 20, to give you a pe rception of how much

this technology has advanced, right, technology does not grow linearly, it grows exponentially.

What I mean by that is if you think about how much technology has boomed in the last 20 years,

versus the 20 years before it, it is inordin ate. We can do things in the last 20 years that we could

not have even imagined in the 20 years previously. And a lot of those things are great. But some

of them are not. And one of the things that has run amok because of this technological boom,

because o f how much of a role the internet plays in our lives is this surveillance state. And the ‘

principles we used to keep our nations, our free nations, safe, in the 20 th century don’t work in

the 21 st. They are causing abuses that we can do something about and I hope that’s why you will

vote with us against this motion.

RG: Moving the debate along, it’s now time for closing statements. We’re going to give each of

our debaters three minutes, they are going to speak in the reverse order of the opening so Glenn,

that means that you are up first.

GG: So, I feel like I anticipated moderately well one of the problems that this debate was going

to entail, which is the ability of each side to make claims about what the thing is that you’re

supposed to vote on which is the surveillance state. Is it this nice, well -motivated, work in

progress where we just try to eavesdrop on the terrorists, but oh so accidentally and just very

occasionally bump into your gmail account by accident? Or, is it what the NSA actually

describe d it as being when they didn’t know that you were listening, when they were talking only

amongst themselves, when they were planning on what their institutional aspiration actually

would be? Collect it all, snip it all, process it all, know it all, exploit it all. Those are not my

words, those are the words of the NSA working in a top secret environment because that is what

you actually should be voting on because that is what they are actually doing. And not Professor

Dershowitz’s aspirations for what one day he hopes it someday might be. The way we get to that

point is by rejecting what it now is as excessive and menacing and dangerous.

The second point that I feel is vital to make is one that Alexis just touched on which is this now

mockery over the idea that what kept us safe from the Soviet Union is simply woefully

inadequate, namely, not getting proof that someone is wearing an al Qaeda hat but going to a

court and having evidence be presented that someone is a legitimate surveilla nce target before

allowing the NSA to invade their system. If you go back and look at what was said by Ronald

Reagan and world leaders in the ‘70s and ‘80s it was the Soviet Union is the greatest threat ever

to mankind and now suddenly it becomes, oh those were nice, reasonable people who we could

manage, it’s really these terrorists in a cave who we have to fundamentally dismantle our system

of liberties in order to protect ourselves from. And General Hayden keeps asking for facts and I

think I’ve presente d facts, a lot in this debate, but let me just leave you with a few more.

In 2009 the global news service, McClatchy, characterized the threat of terrorism this way, quote

undoubtedly more American citizens died overseas from traffic accidents or intestin al illnesses

than from terrorism. Harper’s, in March 2011, offered this statistic: the number of American

civilians who died worldwide in terrorist attacks last year, 8. The minimum number who died

after being struck by lightning, 29. Terrorism is a real t hreat, it is not anything to make light of,

but there are also all sorts of threats that we guard against and keep ourselves safe from not by

dismantling our fundamental liberties like the right to privacy or the limitations on the

government ability to kn ow what we are saying, but by balancing them and by affirming the

values that we are trying to protect in the first place. Thank you. ‘

RG: Professor Dershowitz, your closing statement.

AD: I think we need less surveillance than what we have now, but more than what we would get

from the other side, that would require a warrant to specify with particularity the suspicion level

against anybody on whom we would surveil at all. We need a reasonable, middle -ground on

which we can use some surveillance based on l ess than probable cause in order to target people

who are trying to do harm against us.

Now, terrorism is real and it’s different than viruses; it’s different than being struck by lightning.

It’s an essential attack on the very core of our country and our people. I actually believe, and the

reason I’m on this side of the debate, is that one of the greatest threats that civil liberties face in

this country would be another terrorist attack like 9 -11. Even if fewer people are killed in a

traffic accident, if we had another attack like 9 -11, the devastating impact it would have on our

civil liberties would be incalculable. If you don’t believe me, just think back to Canada in 1970.

Some of you may be old enough to remember this, when two terrorist kidnappings resulted in the

invocation of the War Measures Act, which deprived Canadians all across the country of some of

their basic civil liberties. I know, because I along with Irwin Cotler, served as consultants to the

Liberal Prime Minister Pierre Trudeau, and t o the Liberal Attorney -General John Turner in those

days, to try and figure out a way of reducing the impact on civil liberties without diminishing the

prevention of terrorism, which was a real threat in those days.

It’s the interest of every person who c ares about liberty to take reasonable steps to prevent

another mass casualty attack. A surveillance system directed against terrorism and those

facilitating terrorism, which will have false positives, which will result in the intrusion on some

privacy of s ome people who are innocent, is essential both to the defence of our citizens and to

the protection of our liberties. I urge you to vote for this proposition and to allow our

governments, all of our governments, the five eyes , to work together to allow us to have the

intelligence necessary to prevent a recurrence of 9 -11. Will it prevent it? Nobody knows for sure.

Will it increase the likelihood of preventing it? I think we can be fairly assured that that is the

case. We need to improve our system of survei llance; we need not scrap it because reasonable

state surveillance is a legitimate defence of our freedoms.

Do not vote to tie our hands, to deprive us of essential tools in the real war against real terrorism.

Vote yes on this proposition if you want to see a proper balance struck between the legitimate

need for surveillance and the equally legitimate need for privacy.

RG: Alexis, your three minutes.

AO: Well, Mr. Dershowitz, it sounds like we might be winning you over, at lea st with the idea of

some less surveillance. Now look, technology has enabled so much. It’s made my career

possible, it’s made so many others and with that technology, as I’ve said before, we’ve enabled a

surveillance state that is out of control. Alright? And I started this from the very beginning and I

said, look, fundamentally this is a problem because one, it affects our economic strength and ‘

economic strength is a core part of our national security. It affects the underpinnings of the very

technology th at makes the internet work, the things we’re doing, along, have huge impact on data

protection and it gives comfort to the leaders of countries that want to use the internet to spy on

their own citizens, to surveil them. This is important because upon hear ing all of those things it

still doesn’t cover the fundamental point here which is that what we are doing in the name of

security actually makes us less secure, makes us more vulnerable. Remember the example I gave

of the key, alright? That is the layperso n version of what we are doing. We are finding flaws in

the system and we are holding onto that key for ourselves, leaving every one of our homes

vulnerable.

And yes, I am from a generation that cannot imagine a world without the internet but I have a

fee ling most of you feel like the internet has become pretty indispensable. And yes, it is the place

where we go not only to start companies but to have discussions, sometimes combative ones, to

make new friends, to have relationships, to find that there are other people all over the world, all

over the worldwide web that have ideas we can benefit from and then remix and share and all of

those things are possible because we have a flat internet. Sorry, Tom Friedman, the world is not

flat but the worldwide web is and our nation s have done so much to lead the way in innovations

because every one of us as citizens had the belief that our private most thoughts were safe and

were secure.

And so what I’m saying is this: state surveillance is not acceptable in this i nternet age because

for all that we have had, all of this innovation, it can all be undone. We’re doing far more of it on

far more innocent people than we have ever done before and like I said in the past,

technologically, it was impossible and the laws ke pt us doing direct surveillance. Today, the laws

have been weakened and the technology makes it cheap and easy to gobble up all of that data

about every single one of us. And this is an unprecedented situation where surveillance

disproportionately affects innocent people and there is a technological answer but it is not what

is being done. And so I will leave you with this: I know there are good people at the NSA trying

to keep us safe; I know they have our best interests at heart. I know the surveillance s tate is full

of people who were maybe preoccupied with whether or not they could, that they didn’t stop to

think about whether they should. Thank you.

RG: Final closing statement goes to you, General Hayden.

MH: Thank you. Well, I started out as pernicio us, picked up untruthful and untrustworthy along

the way, but apparently as a former U.S. intelligence official I’m a good storyteller, so here goes.

Talk about scare tactics. We need to run the tape sometime and count how many times Alan and

I said terror ism and how many times Glenn and Alexis said surveillance state. What do they

really mean by surveillance state? One point seven billion U.S. emails a day collected? No. That

is just not true. The surveillance state is out of control, they’re monitoring, just now Alex, every

single one of us. We’re gathering up the information on far more innocent people. I need to

know the what. It’s hard for me to counter that. What is it you think we’re doing? I love the ‘

Snowden quote. It covers your text messages, your web history, your searches, every search

you’ve ever made! Guess what? That’s Google. That’s not NSA.

Boston bombing: Tsarnaev kids visited jihadist websites and after the attack, the American

security establishment gets slapped around by its political l eadership . People are saying, how

come you didn’t know they went to jihadist websites? Because we are not allowed to monitor

internet activity of Americans or of lawful permanent residents and it’s a matter of policy that we

are not allowed to monitor your internet activity either, along with the Canadians and the

Australians and the New Zealanders . What Glenn and Alex are describing simply isn’t going on.

With regards to the Soviet Union and its being threatening, I didn’t say they were reasonable or

safe, I just said their communications were on a dedicated isolated network where ours never co -

existed. And that created a different dilemma.

With regard to oversight, Glenn mentions Judge Leon, who said that the program was ‘probably’

unconstitutional. That makes Glenn’s side one for 37 in court decisions on the constitutionality

of this matter, and oh, by the way, Judge Leon stayed his own decision. And with regard to the

three Democrats who articulated opposition to this program for both questions of civil liberties

and of effectiveness, those three were on a 15 -person committee in the Senate and those three

were out -voted consistently 12 to three.

NSA’s mantra, collect it all, doesn’t mean collect it all. They’d drown in it all if they did that.

They’d dro wn. They can’t use it all. What it means is that they want the ability to cover any

communications by any method at any time, communications of those who would do you harm.

Trust me, if what Glenn says is true were true, and if what Alexis fears is true we re true, I’d vote

for them too. Thank you.

RG: Well ladies and gentlemen, a superb debate on a complicated, important topic and we

couldn’t have done it without these four gentlemen, so a big round of applause. Bravo. And a big

thank you to our hosts toni ght who, year after year, have supported this debate, tirelessly, the

Aurea Foundation, Peter and Melanie Munk, thank you for this debate series.

Now, for a crucial part of tonight’s proceedings, which one of these two teams has been able to

sway opinion in this hall? Let’s review where the vote stood at the beginning of tonight, before

we listened to the last hour and 40 minutes of debate and conversation. So can I have the

numbers for the initial audience vote: 32% agreed with the motion, 47% disagreed a nd 21%

undecided; we then asked the percentage of you that would change your vote depending on what

you heard and we have a debate very much in play with 87% saying they’re open to changing

their vote.

Now for those of you who are watching online this deb ate is not over, we have a post -debate

analysis starting up right now on MunkDebates.com – you can share your opinions on what has

happened over the last 40 minutes with a top Reuters technology journalist, Ontario’s Privacy

Commissioner and Ron Diebert, C anada’s great cyber -expert at the Munk School of Global ‘

Affairs. For those of you in Roy Thomson Hall, you lucky 2500, you’re going to get another

paper ballot, and we’re going to force you this time, no hiding out on the sidelines, you’re going

to have to choose yes or no on the resolution. We will announce the second ballot results in the

south lobby shortly before 9 p.m., you can also purchase books by some of our debaters from this

and past debates and for those of you who want to watch the full Snowden tape, which he

provided exclusively for tonight’s debate, it’s up on our website

www.munkdebates.com/snowden .

Ladies and gentlemen, thank you for a marvellous debate, let’s see how it turned out.