November 2, 2013
the use of metadata2013-08-10T16:10:31-04:00https://images.c-span.org/Files/efd/20130810161830001_hd.jpghow the intelligence agencies use the data collected, and how warrants for content are requested.
how the intelligence agencies use the data collected, and how warrants for content are requested.
- New York TimesNew York Times
- Aspen Institute | Homeland Security ProgramAspen Institute | Homeland Security Program
- CNN | Security ClearanceCNN | Security Clearance
More Videos From
Aspen Institute Security Forum 2013More Videos
User Created Clips from This Video
National Security Agency Data Collection
Two former directors of National Intelligence talked about National Security Agency (NSA) intelligence and data collection. Both were involved with the…
Global Security Threats
National Intelligence Council Counselor Matthew Burrows and former CIA and Homeland Security officials talked about future world security threats and how to…
The Search For Bin Laden
Terrorism expert Peter Bergen, author of the book, Manhunt: The Ten-Year Search for Bin Laden From 9/11 to Abbottabad, and Greg Barker, who produced and directed…
The current and former directors of the National Counterterrorism Center talked about current terrorism threats, intelligence oversight, data collection…