It is a concern as well, from some particular point--having had some involvement in security over the course of my life--that if you have a contact where there has been 20 years' worth of work to build that source, and millions and millions of dollars invested in that, and then we have information that may or could or should be delivered for the purpose of the preservation of the privacy of an individual, where do we draw that line? That's sort of where I wonder where you come in on this.
On May 11th, 2009. See this statement in context.