THE DECLINING HALF- LIFE of SECRETS and the Future of Signals and Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

THE DECLINING HALF- LIFE of SECRETS and the Future of Signals and Intelligence PETER SWIRE THE DECLINING HALF- LIFE OF SECRETS And the Future of Signals and Intelligence JULY 2015 About the Author About New America Peter Swire is currently the Huang Professor of Law New America is committed to renewing American and Ethics in the Scheller College of Business at politics, prosperity, and purpose in the Digital Age. the Georgia Institute of Technology. He also serves We generate big ideas, bridge the gap between as a Senior Counsel to the law firm of Alston & Bird, technology and policy, and curate broad public LLP. Swire has been a leading privacy and Internet conversation. We combine the best of a policy scholar since the rise of the Internet in the 1990s. research institute, technology laboratory, public In 2013, Peter served as one of the five members forum, media platform, and a venture capital fund of President Obama’s Review Group on Intelligence for ideas. We are a distinctive community of thinkers, and Communications Technology. He was also the writers, researchers, technologists, and community Special Assistant to the President for Economic activists who believe deeply in the possibility of Policy from 2009 to 2010. Previously, under President American renewal. Clinton, Swire was the Chief Counselor for Privacy in the Office of Management and Budget. He has Find out more at newamerica.org/our-story. lectured extensively on privacy and security issues and is the author of six books, numerous scholarly papers, and op-eds in various national news outlets. About the Cybersecurity Initiative Swire graduated from Princeton University and earned a J.D. from Yale Law School where he was an The Internet has connected us. Yet the policies and editor of the Yale Law Journal. debates that surround the security of our networks are too often disconnected, disjointed, and stuck Acknowledgements in an unsuccessful status quo. This is what New America’s Cybersecurity Initiative is designed to Many thanks to Ross Anderson, Ashkan Soltani address. Working across our International Security and Lee Tien for assistance with this draft, and to Program and the Open Technology Institute, we the fellow members and staff of the President’s believe that it takes a wider network to face the Review Group on Intelligence and Communication multitude of diverse security issues. We engage Technology, where many of these ideas were across organizations, issue areas, professional developed. This paper represents the author’s views, fields, and business sectors. And through events, and not the views of other members of the Review writing and research, our aim is to help improve Group. cybersecurity in ways that work—for the countries, for companies and for individuals. Find out more at newamerica.org/cybersecurity- initiative. Contents Introduction 2 The Declining Half-Life of Secrets 3 The Continuing Effects of Moore’s Law Reduce Secrecy 4 The Sociological Challenge to NSA Secrecy 5 The Changing Sources and Methods for Signals Intelligence 6 The Front-Page Test 8 Conclusion 9 Notes 11 INTRODUCTION Executive Summary information technology, including the continuing effects of Moore’s Law, the sociology of the The nature of secrets is changing. Secrets that would information technology community, and changed once have survived the 25 or 50 year test of time are sources and methods for signals intelligence. This more and more prone to leaks. The declining half- article is about those risks of discovery and how the life of secrets has implications for the intelligence intelligence community must respond. community and other secretive agencies, as they must now wrestle with new challenges posed by My views on this subject were formed during my the transformative power of information technology experience as one of five members of President innovation as well as the changing methods and Obama’s Review Group on Intelligence and targets of intelligence collection. Communications Technology in 2013. There is a crucial difference between learning about a wiretap The Changing Nature Of Secrets on the German Chancellor from three decades ago and learning that a wiretap has targeted the Current The nature of secrets is changing. The “half-life German Chancellor, Angela Merkel, while she is still of secrets” is declining sharply for many signals in office and able to object effectively. In government intelligence and other intelligence activities as circles, this alertness to negative consequences secrets that may have been kept successfully for 25 is sometimes called “the front-page test,” which years or more are exposed well before.1 describes how our actions will look if they appear on the front page of the newspaper. The front-page For evidence, one need look no further than the test becomes far more important to decision makers 2015 breach at the Office of Personnel Management when secrets become known sooner. Even if the (OPM), of personnel records for 22 million U.S. secret operation is initially successful, the expected government employees and family members. For costs of disclosure become higher as the average spy agencies, theft of the security clearance records time to disclosure decreases. is uniquely painful—whoever gains access to the breached files will have an unparalleled ability to The greater relevance of the front-page test has profile individuals in the intelligence community direct and important implications for governance and subject them to identity theft. of secret intelligence operations. For good security reasons, intelligence agencies have historically OPM is just one instance in a long string of high- been insular, relying on heavily vetted employees, profile breaches, where hackers gain access to with proven loyalty and discretion, and working in personal information, trade secrets, or classified Secure Classified Facilities surrounded by physical government material. The focus of the discussion and electronic barriers. This insularity, however, here, though, is on complementary trends in makes it harder for intelligence agencies to predict 2 CYBERSECURITY INITIATIVE how diverse outside actors will view revelation series of measures, consistent with the Review of a secret program. As this article contends, Group’s recommendations, in that direction.2 the declining half-life of secrets is an important These changes, however, were difficult to accept factual reason to bring greater transparency and within the intelligence community; understanding more perspectives into the governance of sensitive the declining half-life of secrets will help the signals intelligence activities. As of June 2015, community better assess what is possible and the Obama administration had already taken a optimal for the less-secret future. THE DECLINING HALF-LIFE OF SECRETS The term “half-life” in physics indicates the time documents stay classified for 50 years or longer. needed for a quantity to fall to half of its value as These time frames are significant, showing a basic compared to its initial quantity. The term is most mind set of keeping secrets for a time measured in notably used for radioactive decay of atoms—how decades. long it takes for half of the plutonium atoms, for instance, to decay into different elements or isotopes. For those trying to keep a secret, a For those trying to keep a leak is analogous to radioactive decay—there is a potentially toxic effect when the secret leaves its secret, a leak is analogous to previous location. radioactive decay—there is a For our purposes, an important feature of the term potentially toxic effect when “half-life” is that it the release is (at least largely) the secret leaves its previous random. No one can predict in advance precisely which atom will decay, but the statistical average is location. nonetheless quite meaningful. Similarly for secrets, there may be no good way to estimate which secrets will get leaked at what time. An average leak within Nonetheless, three factors drive the decline in the a few months, however, is more radioactive for the half-life of secrets: the continuing effects of Moore’s secret-holding agency than an average leak that Law—or the idea that computing power doubles takes much longer. every two years, the sociology of information technologists, and the different sources and During the Cold War, the United States developed methods for signals intelligence today compared the basic classification system that exists today. with the Cold War. This article asks the reader to Under Executive Order 13526, an executive agency contemplate the implications if important secrets must declassify its documents after 25 years often get revealed in months or a few years. unless an exception applies, with stricter rules if CYBERSECURITY INITIATIVE THE CONTINUING EFFECTS OF MOORE’S LAW REDUCE SECRECY The continuing improvement in computing is innumerable files can be posted to the Web without familiar to us all, but its implications for secrecy are the assistance of the mainstream media. Reporters less well understood. One implication is for the size who received files from Snowden have, in some of leaks. When Daniel Ellsberg leaked the Pentagon instances, decided not to print material due to Papers in 1971, the magnitude seemed enormous, concerns about harm to national security. But the over 7,000 pages in 47 printed volumes. Snowden, ability of the government to rely on gatekeepers, to by contrast, took between 50,000 and 200,000 prevent publication, has declined sharply. documents, according to former NSA Director Keith Alexander.3 Today a 64 gigabyte thumb drive costs Other well-known trends of modern computing less than $30, and holds over 4 million pages of put secrets at further risk. The Internet of Things is text.4 One full thumb drive is a gusher, not a leak. based on a pervasive network of sensors. Big Data That is why one government expert quipped to the refers to the analytic ability to find patterns where Review Group that “my goal is to have leaks get out none could previously be seen.
Recommended publications
  • The Train in Spain Fell Mainly Off the Rail (With Apologies to "My Fair Lady")
    The Train in Spain Fell Mainly off the Rail (with apologies to "My Fair Lady") March 13, 2004 By Robbie Friedmann The horrendous terror atrocity that murdered about 200 and injured some 1600 on Madrid trains has already become Spain's 9-11, acquiring its own symbol of 3-11, and is seen by some as a "reminder" that the war on terrorism has not ended ("Spain's 3/11: A horrifying reminder that the war on terror is not over," Editorial, Wall Street Journal, 12 March 2004). As if reminders are needed. Initial reports from Spain blamed the multiple blasts on the Basque separatist group ETA and reports suggest that the Spanish foreign minister instructed all Spanish ambassadors to push this notion no matter what other evidence comes up (while keeping all investigation avenues "open"). This is partly because in Spain an act by ETA will be perceived as a unifying factor, while terrorism by Islamist groups may tilt the sentiment against the Spanish involvement in the war on terror. Given the elections slated for next week, the stakes are indeed very high. Even the U.N. Security Council rushed to condemn ETA even as it had no proof ETA was involved (see U.N. Resolution 1530). Nevertheless, initial non-Spanish reports suspected al-Qaeda involvement and shortly thereafter ETA denied any responsibility and al-Qaeda indeed quickly declared it ("Al-Qaeda Took Responsibility for Thursday's Madrid Bombings: 190 people killed, 1,400 injured in Madrid train bombings. Stolen car with detonators and tapes in Arabic found near Madrid," Ma'ariv Online, 11 March 2004), and respected Israeli analysts tended to accept it at face value.
    [Show full text]
  • Swire. “The Declining Half-Life of Secrets”
    CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Unclassified Summary Special Study of NSA Controls to Comply With
    NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE INSPECTOR GENERAL REPORT Unclassified Summary Special Study of NSA Controls to Comply with Signals Intelligence Retention Requirements 12 December 2019 OFFICE OF THE INSPECTOR GENERAL Pursuant to the Inspector General Act of 1978, as amended, and in accordance with NSA/CSS Policy 1-60, the NSA/CSS Office of the Inspector General (OIG) conducts independent oversight that promotes Agency respect for Constitutional rights, adherence to laws, rules, and regulations, and the wise use of public resources. Through investigations and reviews, we detect and deter waste, fraud, abuse, and misconduct and promote the economy, the efficiency, and the effectiveness of Agency operations. AUDIT The Audit Division comprises three sections: Cybersecurity and Technology, Financial Audits, and Mission and Mission Support. The Division’s audits and evaluations examine the economy, efficiency, and effectiveness of NSA programs and operations; assess Agency compliance with laws, policies, and regulations; review the operation of internal information technology and controls; and determine whether the Agency’s financial statements and other fiscal reporting are fairly and accurately presented. Audits are conducted in accordance with auditing standards established by the Comptroller General of the United States. INSPECTIONS The Inspections Division performs organizational inspections and functional evaluations to assess adherence to regulations and policies and to promote the effective, efficient, and economical management of an organization, site, or function. OIG inspection reports recommend improvements and identify best practices across a broad range of topics, to include mission operations, security, facilities, and information technology systems. The Inspections Division also partners with Inspectors General of the Service Cryptologic Elements and other Intelligence Community (IC) entities to jointly inspect consolidated cryptologic facilities.
    [Show full text]
  • N Ieman Reports
    NIEMAN REPORTS Nieman Reports One Francis Avenue Cambridge, Massachusetts 02138 Nieman Reports THE NIEMAN FOUNDATION FOR JOURNALISM AT HARVARD UNIVERSITY VOL. 62 NO. 1 SPRING 2008 VOL. 62 NO. 1 SPRING 2008 21 ST CENTURY MUCKRAKERS THE NIEMAN FOUNDATION HARVARDAT UNIVERSITY 21st Century Muckrakers Who Are They? How Do They Do Their Work? Words & Reflections: Secrets, Sources and Silencing Watchdogs Journalism 2.0 End Note went to the Carnegie Endowment in New York but of the Oakland Tribune, and Maynard was throw- found times to return to Cambridge—like many, ing out questions fast and furiously about my civil I had “withdrawal symptoms” after my Harvard rights coverage. I realized my interview was lasting ‘to promote and elevate the year—and would meet with Tenney. She came to longer than most, and I wondered, “Is he trying to my wedding in Toronto in 1984, and we tried to knock me out of competition?” Then I happened to keep in touch regularly. Several of our class, Peggy glance over at Tenney and got the only smile from standards of journalism’ Simpson, Peggy Engel, Kat Harting, and Nancy the group—and a warm, welcoming one it was. I Day visited Tenney in her assisted living facility felt calmer. Finally, when the interview ended, I in Cambridge some years ago, during a Nieman am happy to say, Maynard leaped out of his chair reunion. She cared little about her own problems and hugged me. Agnes Wahl Nieman and was always interested in others. Curator Jim Tenney was a unique woman, and I thoroughly Thomson was the public and intellectual face of enjoyed her friendship.
    [Show full text]
  • Runthinkshootlive.Com Finishing Half-Life Is Just the Beginning!
    RunThinkShootLive.com Finishing Half-Life is just the beginning! UNTOLD STORIES Fan Fiction Event Contents Introduction 2 Pick Up That Can! 3 Were You The Only Ones On That train? 5 All in One and One in All 6 Tunnel 8 Steve Jobs 10 Currently Untitled 12 Repressed Memories 15 Prospero 17 The Oasis Incident 20 Fragments 23 Time, Dr. Breen? 25 ​ Untold Stories Fan Fiction Event from RunThinkShootLive.com 1 Introduction After the success of the previous Fan Fiction event, another seemed inevitable and here it is. The challenge was to take a supporting character from HL2 and write a story about them. The word limit was 1500. There were two prizes: one for my favourite and one for the readers favourite. If they were the same, then the second reader favourite would get the prize. The prizes were random Steam games. At the time of publishing this PDF, no prizes had been allocated. You can see the results, once they are published, here: https://www.runthinkshootlive.com/posts/untold-stories-fan-fiction-event/ I have not read them yet, so I may release a version 2 of this PDF with updated formatting. There is also one that is currently untitled. The author has not replied to my request at the time of publication. The stories are listed in submission order. Thanks to the authors for taking the time to submit their stories. I hope you enjoy them. Phillip - June 2018 Untold Stories Fan Fiction Event from RunThinkShootLive.com 2 Pick Up That Can! “I was at Black Mesa you know” Officer 45/9 stopped and turned around.
    [Show full text]
  • Noam Chomsky: Turning the Tide
    NOAM CHOMSKY TURNING THE TIDE US Intervention in Central America and the Struggle for Peace ESSENTIAL CLASSICS IN POLITICS: NOAM CHOMSKY EB 0007 ISBN 0 7453 1345 0 London 1999 The Electric Book Company Ltd Pluto Press Ltd 20 Cambridge Drive 345 Archway Rd London SE12 8AJ, UK London N6 5AA, UK www.elecbook.com www.plutobooks.com © Noam Chomsky 1999 Limited printing and text selection allowed for individual use only. All other reproduction, whether by printing or electronically or by any other means, is expressly forbidden without the prior permission of the publishers. This file may only be used as part of the CD on which it was first issued. TURNING THE TIDE US Intervention in Central America and the Struggle for Peace Noam Chomsky 4 Copyright 1985 by Noam Chomsky Manufactured in the USA Production at South End Press, Boston Library of Congress Cataloguing in Publication Data Chomsky, Noam Turning the tide. Bibliography: p. Includes index. 1. Central America—Politics and government—1979- . 2. Violence—Central America—History—20th century. 3. Civil rights—Central America—History—20th century. 4. Central America—Foreign relations—United States. 5. United States— Foreign relations—Central America. I. Title F1 436. 8. U6 1985 327. 728073 ISBN: 0-7453-0184-3 Digital processing by The Electric Book Company 20 Cambridge Drive, London SE12 8AJ, UK www.elecbook.com Classics in Politics: Turning the Tide Noam Chomsky 5 Contents Click on number to go to page Introduction................................................................................. 8 1. Free World Vignettes .............................................................. 11 1. The Miseries of Traditional Life.............................................. 15 2. Challenge and Response: Nicaragua......................................
    [Show full text]
  • School District Breaks Ground on $35.6M Renovation
    Vol. 52 No. 06 The www.bcomber.org 25100 Fairmount Boulevardeachcomber Beachwood, Ohio June 2011 School District BreaksB Ground on $35.6M Renovation By Arielle Cohen Copy Editor put into place and assembled before any switch is made. The groundbreaking ceremony for Junior Masha Soprunova observed the high school renovation was held “It’s going to be interesting since there on Thursday, May 26th. A crowd of will be reconstruction. We will all be students, staff and parents attended. like freshmen trying to find our way.” The BHS band played, and commu- Ilana Blumin commented, “I’m nity leaders gave gave speeches with excited but worried about the noise.” key words such as “pride,” “excel- Hardis said that although students lence” and “community.” and teachers will have to deal with Students and staff mingled dur- a “constant low line of engines,” the ing the speeches, eating snacks and noise will hopefully not be overly dis- ice cream from Ben and Jerry’s. The turbing, and construction will cease event ended with the formal ground- during OGT week and AP testing. breaking. Attendees were invited to According to Hardis, new rooms come take a photo with the shovel af- will be spacious and more conducive ter the ceremonial picture was taken. to collaborative work. For the most BHS students and staff are very ex- Superintendent Dr. Richard Markwardt, School Board President Beth Rosenbaum, School Board part, floors will be tiled. cited about the prospect of a renovated Member David Ostro, Mayor Merle Gordon, Principal Robert Hardis, Board Member Dr. Brian Will teachers miss their old rooms? building.
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal #262
    #262 23 May 2003 USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Air University Air War College Maxwell AFB, Alabama Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established here at the Air War College in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at www.au.af.mil/au/awc/awcgate/awc-cps.htm for in-depth information and specific points of contact. Please direct any questions or comments on CPC Outreach Journal Jo Ann Eddy, CPC Outreach Editor, at (334) 953-7538 or DSN 493-7538. To subscribe, change e-mail address, or unsubscribe to this journal or to request inclusion on the mailing list for CPC publications, please contact Mrs. Eddy. The following articles, papers or documents do not necessarily reflect official endorsement of the United States Air Force, Department of Defense, or other US government agencies. Reproduction for private use or commercial gain is subject to original copyright restrictions.
    [Show full text]
  • Report on the Democratic Oversight of Signals Intelligence Agencies
    Strasbourg, 15 December 2015 CDL-AD(2015)011 Study No. 719/2013 Or. Engl. EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) REPORT ON THE DEMOCRATIC OVERSIGHT OF SIGNALS INTELLIGENCE AGENCIES Adopted by the Venice Commission at its 102nd Plenary Session (Venice, 20-21 March 2015) on the basis of comments by Mr Iain Cameron (Member, Sweden) This document will not be distributed at the meeting. Please bring this copy. www.venice.coe.int CDL-AD(2015)011 - 2 - TABLE OF CONTENTS Executive summary .................................................................................................................... 3 I. Introduction .................................................................................................................. 7 II. The scope of the present study – definitions ................................................................ 7 III. Is there a need for (improved) democratic control? ...................................................... 8 A. What is strategic surveillance? .................................................................................. 8 B. Weaker controls over strategic surveillance? ........................................................... 10 C. Mass surveillance? .................................................................................................. 12 IV. Jurisdiction ................................................................................................................. 15 V. Accountability – constitutional and organisational contexts .......................................
    [Show full text]
  • Questioning the National Security Agency's Metadata Program
    I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY Secret without Reason and Costly without Accomplishment: Questioning the National Security Agency’s Metadata Program JOHN MUELLER & MARK G. STEWART* I. INTRODUCTION When Edward Snowden’s revelations emerged in June 2013 about the extent to which the National Security Agency was secretly gathering communications data as part of the country’s massive 9/11- induced effort to catch terrorists, the administration of Barack Obama set in motion a program to pursue him to the ends of the earth in order to have him prosecuted to the full extent of the law for illegally exposing state secrets. However, the President also said that the discussions about the programs these revelations triggered have actually been a good thing: “I welcome this debate. And I think it’s healthy for our democracy. I think it’s a sign of maturity because probably five years ago, six years ago, we might not have been having this debate.”1 There may be something a bit patronizing in the implication that the programs have been secret because we were not yet mature enough to debate them when they were put into place. Setting that aside, however, a debate is surely to be welcomed—indeed, much overdue. It should be conducted not only about the National Security Agency’s (NSA) amazingly extensive data-gathering programs to * John Mueller is a professor of political science at Ohio State University and a Senior Fellow at the Cato Insitute. Mark G. Stewart is a professor of engineering at the University of Newcastle, Australia.
    [Show full text]
  • 1 Angela Greiling Keane
    NATIONAL PRESS CLUB LUNCHEON WITH GARY PRUITT SUBJECT: UNCONSTITUTIONAL SEIZURE OF PHONE RECORDS AND THE WAY FORWARD MODERATOR: ANGELA GREILING KEANE, PRESIDENT OF THE NATIONAL PRESS CLUB LOCATION: NATIONAL PRESS CLUB BALLROOM, WASHINGTON, D.C. TIME: 12:30 P.M. EDT DATE: WEDNESDAY, JUNE 19, 2013 (C) COPYRIGHT 2008, NATIONAL PRESS CLUB, 529 14TH STREET, WASHINGTON, DC - 20045, USA. ALL RIGHTS RESERVED. ANY REPRODUCTION, REDISTRIBUTION OR RETRANSMISSION IS EXPRESSLY PROHIBITED. UNAUTHORIZED REPRODUCTION, REDISTRIBUTION OR RETRANSMISSION CONSTITUTES A MISAPPROPRIATION UNDER APPLICABLE UNFAIR COMPETITION LAW, AND THE NATIONAL PRESS CLUB RESERVES THE RIGHT TO PURSUE ALL REMEDIES AVAILABLE TO IT IN RESPECT TO SUCH MISAPPROPRIATION. FOR INFORMATION ON BECOMING A MEMBER OF THE NATIONAL PRESS CLUB, PLEASE CALL 202-662-7505. ANGELA GREILING KEANE: (Sounds gavel.) Good afternoon, and welcome to the National Press Club. My name is Angela Greiling Keane. I am a reporter for Bloomberg News and the 106th President of the National Press Club. We are the world’s leading professional organization for journalists committed to our profession’s future through events such as this while fostering a free press worldwide, and right here at home. For more information about the National Press Club, please visit our website at www.press.org. To donate to programs offered to the public through our National Press Club Journalism Institute, please visit press.org/institute. On behalf of our members worldwide, I'd like to welcome our speaker today and those of you in our audience. Our head table includes guests of our speaker as well as working journalists who are Club members.
    [Show full text]