Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Ebook403 pages6 hours

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

A groundbreaking look at the NSA surveillance scandal, from the reporter who broke the story, Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward Snowden

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.

Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.

Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.

LanguageEnglish
Release dateMay 13, 2014
ISBN9781627790741
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Author

Glenn Greenwald

Glenn Greenwald is the author of several bestsellers, including How Would a Patriot Act? and With Liberty and Justice for Some. Acclaimed as one of the 25 most influential political commentators by The Atlantic, one of America’s top 10 opinion writers by Newsweek, and one of the Top 100 Global Thinkers for 2013 by Foreign Policy, Greenwald is a former constitutional law and civil rights litigator. He was a columnist for The Guardian until October 2013 and is now a founding editor of a new media outlet, The Intercept.. He is a frequent guest on CNN, MSNBC, and various other television and radio outlets. He has won numerous awards for his NSA reporting, including the 2013 Polk Award for national security reporting, the top 2013 investigative journalism award from the Online News Association, the Esso Award for Excellence in Reporting (the Brazilian equivalent of the Pulitzer Prize), and the 2013 Pioneer Award from Electronic Frontier Foundation. He also received the first annual I. F. Stone Award for Independent Journalism in 2009 and a 2010 Online Journalism Award for his investigative work on the arrest and detention of Chelsea Manning. In 2013, Greenwald led the Guardian reporting that was awarded the Pulitzer Prize for public service.

Read more from Glenn Greenwald

Related to No Place to Hide

Related ebooks

Law For You

View More

Related articles

Reviews for No Place to Hide

Rating: 4.0620001 out of 5 stars
4/5

250 ratings18 reviews

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 4 out of 5 stars
    4/5
    El libro tiene tres partes principales. La 1era cubre como Snowden se contactó con Greenwald y la información que le entregó junto con la vorágine de acontecimientos de los primeros días luego de las revelaciones. La segunda se refiere a los detalles técnicos de cómo lo hizo la NSA para hacer que la Gestapo, KGB y Stasi parezcan ahora amateurs en comparación. La tercera se refiere al rol del periodismo y el su constante lucha? equilibrio? con el gobierno para limitar los excesos. La 1a y 3a parte se pueden leer omitiendo la 2da y me parecieron las más interesantes. La primera se lee como un reportaje, mientras que la 3ra es una interesante reflexión del rol de la prensa como el cuarto poder.
  • Rating: 2 out of 5 stars
    2/5
    That Snowden exposed all that he did is incredibly important. However, I don't entirely trust Greenwald. If he presented dispassionately and simply factually I would be blown away. Through his career I'm reticent to subscribe to his conclusions because he will ignore swathes of information and passionately come to a conclusion. He also gets into tawdry pointless exchanges with trolls.
  • Rating: 5 out of 5 stars
    5/5
    So I watched Citizen Four a while back, and think it helped in reading this. Though not nec. it certainly helped me remember parts of the documentary, as well as vicualize parts of the story as they unfolded.

    That said, wow, good book. Scary, and pretty depressing, but good, and everyone should read it.

    It's startling to see just how far our government (including the President i voted for and mostly love) has gone to erasing our privacy. How far in the pocket our journalists are, and how much we've willingly or otherwise given up in the name of (false) security.

    Greenwald does an excellent job pointing out the lies (outright and by omission) our government and media have spread to convince us that we're somehow safer having either given up or (more often than not) had taken away our rights.

    it's eye opening to see how bad it's gotten, and how completely untrustworthy our media is with regard to our government.
  • Rating: 5 out of 5 stars
    5/5
    Captivating, thrilling, and terrifying. Greenwald knows how to tell a story, and I'm definitely going to read more about government surveillance, technology, and the threat to our (online) privacy in this next year.
  • Rating: 4 out of 5 stars
    4/5
    As I write this, the conclusion of the Edward Snowden story remains unresolved. The fallout after the leaks were a mix of outrage and apathy, and Snowden himself is still exiled overseas.
  • Rating: 5 out of 5 stars
    5/5
    I'm giving this book five stars, even though the book isn't perfect. The first part drags a bit, and if you're looking for a fast-paced tale of espionage, this isn't it either. But it took some serious courage for both Snowden to reveal what he did and for Greenwald to stand up to the US government (amid calls for his arrest and prosecution for even daring to print articles using the leaked NSA documents), and I am just giving two thumbs up (and would give more if I had more thumbs) for them refusing to back down.I think most (if not all) readers coming to this book know about Edward Snowden, at least a little bit, so I'm not going to talk about him in this review. And Greenwald doesn't go into great detail about Snowden, either; sure, he mentions Snowden's background and how he got to be where he was, but this is no biography of Snowden. Instead, Greenwald's main focus for the last half of the book (which is by far the more interesting half) is the NSA and the American surveillance state - and that is how Snowden wanted it.Look, everyone has an opinion about Snowden. He's a hero. He's a traitor. He's a patriot. He's a turncoat. He's selfless. He's a narcissistic egomaniac. He's a paragon of virtue. He belongs in prison. He's trying to set the country right by exposing the NSA. He's trying to bring the country down by exposing state secrets. But you know what? None of that fucking matters. Because instead of demonizing Snowden, or even putting him on a pedestal, we should be focused on what the documents he released actually say, rather than focusing on the medium.I have my own opinions of Snowden. I do see him as a patriot. But my opinion of him does not matter.What matters is that the NSA, under both Republican and Democratic presidencies, has been spying on American citizens and doesn't give one fucking shit about civil liberties. And someone can argue, which many have, "oh, if you don't have anything to hide, you shouldn't be afraid." Can anyone HONESTLY say that they have nothing to hide? Really? Never looked at some porn you'd not want your parents, significant other, or kids to find out about? Never cheated on a boyfriend/girlfriend/spouse? Never torrented files (music, ebooks, movies, whatever)? Never totally trashed your boss in an email? Never broke a law, no matter how petty? Never smoked some weed in an illegal state? I am not saying the NSA will target anyone in particular. But if you cross their radar paths and they view you, for whatever reason, as a threat, they can and WILL use anything against you that they can dig up - and as the documents Edward Snowden released shows, they can dig up a whole bunch of shit.Greenwald prints a lot of things in this book that the NSA definitely did not want people to see. There are PowerPoint slides, memos, briefings, etc that are all in this book (see chapter three, mostly). And they paint a picture that is absolutely chilling.And not only does Greenwald expose the NSA - he exposes corporate "journalism," which toadies up to those in charge. I've said for a long while that mass media can't be trusted, and the treatment of Snowden, Greenwald, the Guardian, and the NSA in "journalistic" circles just proves that. Hell, I grew up in a town where the newspaper only printed news that the "powers that be" in the town decided was newsworthy - and if they didn't want a story getting printed in the local paper, it sure didn't, even if the Columbus Dispatch and other local papers were running it on the front page. To think that this isn't happening on a national level is willful ignorance at this point.Greenwald is far more optimistic about Snowden's leak than I am. I'm a pessimist at heart. And I see so many people trying to flay Snowden's character instead of focusing on what ACTUALLY FUCKING MATTERS. But there was definitely some good that came from the NSA leaks, if only to show the blatant disregard that the US government (and it doesn't matter WHICH party) has for those it is supposedly serving (the people) and their rights. Highly recommended.
  • Rating: 4 out of 5 stars
    4/5
    My opinion for this novel is multi-faceted. I understand the gravity of the issue at hand, which is that America is becoming dominated by an omnipotent "Big Brother". I think that this is a topic that every American should at least be familiarized with and take a position on. As technology progresses and becomes more and more invasive, now is the time to create legislature that regulates such invasions. This legislature should be produced with heavy influence by the people themselves because his is a matter of the government directly engaging with the populace, and our representatives seem to lack the trust to make such decisions ( as Snowden reports). On the other hand, I found the author's personal conjecture at the end to be unnecessary, as I find the hard story and facts to be the meat of any production. His perceptions seemed to be shrouded by the heat of such a riveting, "modern-day espionage" story.
  • Rating: 5 out of 5 stars
    5/5
    An important read just as much for the insight into media complicity with the surveillance state, than the revelations made by Snowden. Greenwald accurately and methodically shows how time honored dishonest tactics have allowed governments, and their media lapdogs to erode our freedoms. Criticism by some that Greenwald inders himself too much into the story are far off base. He was the one that had his character assassinated, his husband detained, his home broken into, was threatened with arrest, even murder. It is his story, and he is abig part of the story.
  • Rating: 3 out of 5 stars
    3/5
    The Snowden part was good, reading through all the government documents was tedious.
  • Rating: 5 out of 5 stars
    5/5
    Well, I didn't mean to tear through this book quite this fast, but it was so well-written that I really couldn't help myself. An interesting mix of biography, journalistic article, and comment. I'd recommend this to basically anyone politically interested (who is not a (neo)conservative), and to people whishing to be politically interested, and to people I would like to be politically interested. So, yes, read this book.
  • Rating: 4 out of 5 stars
    4/5
    Fascinating. Hard to believe. What is truth and can we ever know it? What happens when the Fourth Estate fails in its duty to the public good. For that matter, what happens when elected politicians similarly fail. Scary.
  • Rating: 5 out of 5 stars
    5/5
    It's easy to feel a bit of information overload when you first learn about an information leak revealing that the NSA has spied on regular American citizens and that major Internet companies like Microsoft and Facebook have helped them do it.

    Glenn Greenwald is the reporter who read through countless documents provided by the whistleblower Edward Snowden and wrote the first news articles bringing that information to the public's attention.

    Now, with his excellent book No Place to Hide, Greenwald offers an insightful and comprehensive discussion of the controversial documents. Greenwald clearly lays out the most significant revelations and why they matter to everyday people.

    The first part reads like a spy novel, grabbing the reader from the first page with an exciting account of how Snowden first contacted Greenwald, their secret meeting in Hong Kong, and the ensuing behind-the-scenes drama to get the information into the newspapers. While some have criticized the Snowden leak as threatening national security, the book highlights the care and scrutiny with which Greenwald and his collaborator Laura Poitras handled the classified documents, seeking to shine light without putting anyone's lives in danger.

    The next two sections contain less narrative, spending more time explaining the most significant revelations and why surveillance is harmful to society. While they don't read quite as fast as the thrilling opening, these parts are great for anyone who had trouble keeping up with the Snowden leaks and what they meant.

    Greenwald closes with a critical and thought-provoking discussion of the American media and what he perceives as journalists' growing sympathy to the government. In Greenwald's view, journalism has lost its investigative edge, giving too much power to the government to decide what information is published -- and perhaps more critically -- what information is not.

    As a journalist, I found this section fascinating. While it paints a dismal picture of corporate media, the book's existence provides optimism for the rise of independent journalists to maintain the mantle of the Fourth Estate.
  • Rating: 4 out of 5 stars
    4/5
    And what are they vacuuming up? A daily 1.7 billion e-mails, phone calls, crank calls, dropped calls, robo-calls, Nigerian-investment e-mails, YouTube videos of Justin Booby and other types of communications. The banalities of a nation. Ladies and gentlemen, attend.- - -VOICE (female): Hello.VOICE (male): It’s me.WOMAN: (female, purring) Well, hello.MAN: Darling, I want you to know I love you and want you to marry me.WOMAN: Oh, yes, yes. Oh, Peter, yes.MAN: Peter? I’m Harry! Isn’t this Melissa?WOMAN: No, it’s Penelope.MAN: Sorry, wrong number. (click)- - -NICELY: I got the horse right here, his name is Paul Revere, and the weather’s clear. Can do?BENNY: Can do. I'm pickin' Valentine, 'cause on the morning line, a guy has got him figured at five to nine.NICELY: Can do. (click)- - -CUSTOMER: I need five super-grande monster pizzas with everything.CLERK: Address?CUSTOMER: 1600 Pennsylvania, N.W., west gate.CLERK: Oh. DEFCON 3 special coming up. (click)- - -VOICE: (female robot) This is Rachel from Credit Card Services. This is your second and final notice --VOICEOVER: (male, irritated) Promises, promises. Fifth time this week alone. (click)- - -VOICE (female, nasal): Is this Mr. John O’Brennan?VOICE (male, irked): This is Mr. John O. Brennan. Who is this?VOICE (female): Mr. O’Brennan, this is Miss Tomlin at AT&T. We have a $27.6 million unpaid bill for all the data and phone surveillance you and General David P. Trellis had us do for your company. Now when may we expect payment?DCI BRENNAN: What are you doing on my private line?MISS TOMLIN: Now, now, don’t get huffy. We at the phone company know a lot of things about your private line, including (paper crinkling) er, the one to Mme. LaFuchsia’s Leakywicks Massage Parlor and Bar & Grill (snort).DCI BRENNAN: Do you know who I am?MISS TOMLIN: Now, now, Mr. O’Brennan, you’re talking to someone who can detach all of your agency’s (snort) private lines, one massage parlor at a time. Starting with this one. Pay up. (click)- - -VOICE (female, young): Pizzas You Can't Refuse. How can I help you?VOICE (male, definitely so): The, uh, Prime Minister is giving us 15 minutes to remove our drones from his airspace, and the chairman wants the, uh, prisoners returned, and I’ve got Lindsey Graham on Line 2.VOICE (female, irked): Your pizzas are already on their way, Mr. President.(both parties disconnected)
  • Rating: 5 out of 5 stars
    5/5
    It's hard to know where to begin in describing this book. I sort of knew about Edward Snowden from the time he made the news after revealing top secrets regarding the National Security Agency's secret surveillance of America citizens on all electronic media. Then I decided to read Glenn Greenwald's book to learn more specifically about what he did, and I am very glad I did so. I've gotten a great understanding of what happened. Just prior to finishing the book, I also saw the Academy Award winning documentary, "Citizenfour" by Laura Poitras. All I could say was, "Wow!" I know that Edward Snowden is a very controversial figure, but, after reading this book, I can say that he is my hero. I do know that Big Brother is reading this. The book itself is divided into three parts. The first part describes the original contact with Snowden, the meeting in his Hong Kong Hotel Room, and his escape to Moscow. The second part of the book shows copies of actual documents taken from NSA with areas blocked out so as not to cause any harm to individuals. The last part summarizes how Snowden's activities have affected others. The book is written so that it is easy to understand. Glenn Greenwald takes it slowly so that the reader can absorb this information. Acronyms are explained, and reasons are given for the actions that were taken. The book is totally fascinating. At the end, I could only be amazed that someone would risk so much to preserve the freedom of the American public. When you are always under surveillance, you are not free. I learned from this book that the American government is not as good as it seems or tries to make itself look. That the American government could flagrantly disregard constitutional law (i.e. the Fourth Amendment to the Constitution) as it claimed it was fighting terrorism is mind-blowing. In conclusion, Glenn Greenwald writes, "Snowden...has reminded everyone about the extraordinary ability of any human being to change the world. An ordinary person in all outward respects--raised by parents without particular wealth or power, lacking even a high school diploma, working as an obscure employee of a giant corporation--he has, through a single act of conscience, literally altered the course of history."
  • Rating: 3 out of 5 stars
    3/5
    There's no doubt that the topic of the book is truly important. The Snowden's (Author's) revelations about the extent our private lifes are affected by NSA surveillance shocked the world. Sure, right to privacy one of the most important fundamantal rights and is protected by all democratic Constitutions. The thought of Illegal breach of this right by authorities which are there to guard fundamental rights seems intolerable.That said, I have to say that I didn't like the way this important topic was laid out in the book.First of all, most of the time it seemed that the book was more aboout the author, not the Snowden or his revelations. It seemed that author was defending himself, praising himself at the same time condemning other journalists. As if he wanted to say - I am the best. It culminated in the fact, that Snowden was lost somewhere in the middle of the book as not so important part of the story.Secondly, the story was too one-sided. I am not defending the state surveillance system but it's just not fair to go around saying that the threats from outside are non-existant, that secret operations are not necessary at all, that the stories about the therorist acts are nothing but lies. And just in the last few pages conclude that no one disputes that the state surveillance might be necessary at some point.I was expecting more of a proportionality test conducted, more of analasys weighing the right to privacy and the right to safety. Analasys about one persons interests against the society's rights as a whole. Solutions presented as to how to go on. Nothing of that appeared in the book.I was disappointed at the end
  • Rating: 4 out of 5 stars
    4/5
    Particularly since the death of Christopher Hitchens, it is important that a new generation of critical journalists takes over, to keep the general readership informed of the way in which civil liberties are undermined and threatened. Glenn Greenwald may not seem the most sympathetic journalist to do so, but he does well.The book No place to hide. Edward Snowden, the NSA and the surveillance state can roughly be divided into three parts. In the first chapter, the author relates the story of Edward Snowden and the origins of the news story. It shows that the emergence of the story took Snowden a much longer time than has so far transpired in mainstream media reports. This chapter also demonstrates the devious ways in which the media work, particularly how deeply some American news media are now entrenched or embedded in or with the American authorities, to protect American national and government interests. Greenwald is barely honest enough to admit that he nearly missed the opportunity to get in touch with Snowden, and throughout the story his own interests as a journalist keep ringing through. A certain degree of ruthlessness and egoism shines through, together with the ambvalence of the Guardian whether or not to publish, and the somewhat toxic relation between the paper and the reporter. But perhaps such ruthlessness is what it takes to get heard, these days, and possibly Greenwalds personality is a product of our times.The first chapter tells the story of Edgar Snowden in a gripping, detective-like style, ennumerating many details omitted from the media. It is a high-pace, exciting story.The second chapter explains the workings of the NSA and its spying systems. The chapter is richly illustrated with screen shorts and graphics to demonstrate how the NSA spies on civilians, and anyone its agents decide to investigate with closer scrutiny. The chapter also effectively demonstrates the power of the system, to shockingly reveal that its capacity is effectively such that in can monitor all and everyone. It is a clear warning that no-one should feel safe in the ignorance that such a system could not achieve its objectives.The final chapters of No place to hide. Edward Snowden, the NSA and the surveillance state are written as essayistic reflections on the further ramifications of the idea that the government spies on its citizens and a priori assumes that anyone outside its borders (or within) is a potential threat.The book is particularly interesting for readers who missed the extensive reporting on the story as it unfolded in the media.
  • Rating: 5 out of 5 stars
    5/5
    Such an important book! It gets 5 stars because every thinking person on earth should read it and consider deeply its message.I read the "Edward Snowden Files" in March, the story of the NSA whistle-blower told from the perspective of the Guardian journalists. Now here is the point of view of Glenn Greenwald, the journalist who conveyed Snowden's story to the world. The two books are complementary and consistent in their stories, but Greenwald's message is much more clearly articulated. His Chapter 5 analysis of the role of the modern media in maintaining the powers that be, rather than as a force for change, is trenchant (in every connotation of that word).Of course, the surprise is that this is a surprise. Decades ago analysis such as that done by the Glasgow University School of Communications showed how late 20th century journalism had become a conservative force for maintaining the status quo. Greenwald's analysis only shows how more profoundly true that is today.The book is easy to read. Nicely balanced between the adventure of the chase for the story, and his analysis of what it all means. I would say he is hopeful and a bit scared by the implications. Me too.
  • Rating: 4 out of 5 stars
    4/5
    Privacy, cybersecurity, NSA and spying on everyone: for me, a must read, and a good read as well - except the parts where the author brags about himself, which are not many, fortunately. Good insight, lots of information and background information, documents, thoughts and also explaining why we should care.

Book preview

No Place to Hide - Glenn Greenwald

The author and publisher have provided this e-book to you for your personal use only. You may not make this e-book publicly available in any way. Copyright infringement is against the law. If you believe the copy of this e-book you are reading infringes on the author’s copyright, please notify the publisher at: us.macmillanusa.com/piracy.

This book is dedicated to all those who have sought to shine a light on the US government’s secret mass surveillance systems, particularly the courageous whistle-blowers who have risked their liberty to do so.

CONTENTS

Title Page

Copyright Notice

Dedication

Epigraph

Introduction

1. Contact

2. Ten Days in Hong Kong

3. Collect It All

4. The Harm of Surveillance

5. The Fourth Estate

Epilogue

Notes

Acknowledgments

Index

Also by Glenn Greenwald

About the Author

Copyright

The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.

—Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975

INTRODUCTION

In the fall of 2005, without much in the way of grandiose expectations, I decided to create a political blog. I had little idea at the time how much this decision would eventually change my life. My principal motive was that I was becoming increasingly alarmed by the radical and extremist theories of power the US government had adopted in the wake of 9/11, and I hoped that writing about such issues might allow me to make a broader impact than I could in my then-career as a constitutional and civil rights lawyer.

Just seven weeks after I began blogging, the New York Times dropped a bombshell: in 2001, it reported, the Bush administration had secretly ordered the National Security Agency (NSA) to eavesdrop on the electronic communications of Americans without obtaining the warrants required by relevant criminal law. At the time that it was revealed, this warrantless eavesdropping had been going on for four years and had targeted at least several thousand Americans.

The subject was a perfect convergence of my passions and my expertise. The government tried to justify the secret NSA program by invoking exactly the kind of extreme theory of executive power that had motivated me to begin writing: the notion that the threat of terrorism vested the president with virtually unlimited authority to do anything to keep the nation safe, including the authority to break the law. The ensuing debate entailed complex questions of constitutional law and statutory interpretation, which my legal background rendered me well suited to address.

I spent the next two years covering every aspect of the NSA warrantless wiretapping scandal, on my blog and in a bestselling 2006 book. My position was straightforward: by ordering illegal eavesdropping, the president had committed crimes and should be held accountable for them. In America’s increasingly jingoistic and oppressive political climate, this proved to be an intensely controversial stance.

It was this background that prompted Edward Snowden, several years later, to choose me as his first contact person for revealing NSA wrong-doing on an even more massive scale. He said he believed I could be counted on to understand the dangers of mass surveillance and extreme state secrecy, and not to back down in the face of pressure from the government and its many allies in the media and elsewhere.

The remarkable volume of top secret documents that Snowden passed on to me, along with the high drama surrounding Snowden himself, have generated unprecedented worldwide interest in the menace of mass electronic surveillance and the value of privacy in the digital age. But the underlying problems have been festering for years, largely in the dark.

There are, to be sure, many unique aspects to the current NSA controversy. Technology has now enabled a type of ubiquitous surveillance that had previously been the province of only the most imaginative science fiction writers. Moreover, the post-9/11 American veneration of security above all else has created a climate particularly conducive to abuses of power. And thanks to Snowden’s bravery and the relative ease of copying digital information, we have an unparalleled firsthand look at the details of how the surveillance system actually operates.

Still, in many respects the issues raised by the NSA story resonate with numerous episodes from the past, stretching back across the centuries. Indeed, opposition to government invasion of privacy was a major factor in the establishment of the United States itself, as American colonists protested laws that let British officials ransack at will any home they wished. It was legitimate, the colonists agreed, for the state to obtain specific, targeted warrants to search individuals when there was evidence to establish probable cause of their wrongdoing. But general warrants—the practice of making the entire citizenry subject to indiscriminate searches—were inherently illegitimate.

The Fourth Amendment enshrined this idea in American law. Its language is clear and succinct: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. It was intended, above all, to abolish forever in America the power of the government to subject its citizens to generalized, suspicionless surveillance.

The clash over surveillance in the eighteenth century focused on house searches, but as technology evolved, surveillance evolved with it. In the mid-nineteenth century, as the spread of railways began to allow for cheap and rapid mail delivery, the British government’s surreptitious opening of mail caused a major scandal in the UK. By the early decades of the twentieth century, the US Bureau of Investigation—the precursor of today’s FBI—was using wiretaps, along with mail monitoring and informants, to clamp down on those opposed to American government policies.

No matter the specific techniques involved, historically mass surveillance has had several constant attributes. Initially, it is always the country’s dissidents and marginalized who bear the brunt of the surveillance, leading those who support the government or are merely apathetic to mistakenly believe they are immune. And history shows that the mere existence of a mass surveillance apparatus, regardless of how it is used, is in itself sufficient to stifle dissent. A citizenry that is aware of always being watched quickly becomes a compliant and fearful one.

Frank Church’s mid-1970s investigation into the FBI’s spying shockingly found that the agency had labeled half a million US citizens as potential subversives, routinely spying on people based purely on their political beliefs. (The FBI’s list of targets ranged from Martin Luther King to John Lennon, from the women’s liberation movement to the anti-Communist John Birch Society.) But the plague of surveillance abuse is hardly unique to American history. On the contrary, mass surveillance is a universal temptation for any unscrupulous power. And in every instance, the motive is the same: suppressing dissent and mandating compliance.

Surveillance thus unites governments of otherwise remarkably divergent political creeds. At the turn of the twentieth century, the British and French empires both created specialized monitoring departments to deal with the threat of anticolonialist movements. After World War II, the East German Ministry of State Security, popularly known as the Stasi, became synonymous with government intrusion into personal lives. And more recently, as popular protests during the Arab Spring challenged dictators’ grasp on power, the regimes in Syria, Egypt, and Libya all sought to spy on the Internet use of domestic dissenters.

Investigations by Bloomberg News and the Wall Street Journal have shown that as these dictatorships were overwhelmed by protestors, they literally went shopping for surveillance tools from Western technology companies. Syria’s Assad regime flew in employees from the Italian surveillance company Area SpA, who were told that the Syrians urgently needed to track people. In Egypt, Mubarak’s secret police bought tools to penetrate Skype encryption and eavesdrop on activists’ calls. And in Libya, the Journal reported, journalists and rebels who entered a government monitoring center in 2011 found a wall of black refrigerator-size devices from the French surveillance company Amesys. The equipment inspected the Internet traffic of Libya’s main Internet service provider, opening emails, divining passwords, snooping on online chats and mapping connections among various suspects.

The ability to eavesdrop on people’s communications vests immense power in those who do it. And unless such power is held in check by rigorous oversight and accountability, it is almost certain to be abused. Expecting the US government to operate a massive surveillance machine in complete secrecy without falling prey to its temptations runs counter to every historical example and all available evidence about human nature.

Indeed, even before Snowden’s revelations, it was already becoming clear that treating the United States as somehow exceptional on the issue of surveillance is a highly naive stance. In 2006, at a congressional hearing titled The Internet in China: A Tool for Freedom or Suppression?, speakers lined up to condemn American technology companies for helping China suppress dissent on the Internet. Christopher Smith (R-NJ), the congressman presiding over the hearing, likened Yahoo!’s cooperation with Chinese secret police to handing Anne Frank over to the Nazis. It was a full-throated harangue, a typical performance when American officials speak about a regime not aligned with the United States.

But even the congressional attendees couldn’t help noting that the hearing happened to take place just two months after the New York Times revealed the vast warrantless domestic wiretapping carried out by the Bush administration. In light of those revelations, denouncing other countries for carrying out their own domestic surveillance rang rather hollow. Representative Brad Sherman (D-CA), speaking after Representative Smith, noted that the technology companies being told to resist the Chinese regime should also be careful regarding their own government. Otherwise, he warned prophetically, while those in China may see their privacy violated in the most heinous ways, we here in the United States may also find that perhaps some future president asserting these very broad interpretations of the Constitution is reading our e-mail, and I would prefer that not happen without a court order.

Over the past decades, the fear of terrorism—stoked by consistent exaggerations of the actual threat—has been exploited by US leaders to justify a wide array of extremist policies. It has led to wars of aggression, a worldwide torture regime, and the detention (and even assassination) of both foreign nationals and American citizens without any charges. But the ubiquitous, secretive system of suspicionless surveillance that it has spawned may very well turn out to be its most enduring legacy. This is so because, despite all the historical parallels, there is also a genuinely new dimension to the current NSA surveillance scandal: the role now played by the Internet in daily life.

Especially for the younger generation, the Internet is not some standalone, separate domain where a few of life’s functions are carried out. It is not merely our post office and our telephone. Rather, it is the epicenter of our world, the place where virtually everything is done. It is where friends are made, where books and films are chosen, where political activism is organized, where the most private data is created and stored. It is where we develop and express our very personality and sense of self.

To turn that network into a system of mass surveillance has implications unlike those of any previous state surveillance programs. All the prior spying systems were by necessity more limited and capable of being evaded. To permit surveillance to take root on the Internet would mean subjecting virtually all forms of human interaction, planning, and even thought itself to comprehensive state examination.

From the time that it first began to be widely used, the Internet has been seen by many as possessing an extraordinary potential: the ability to liberate hundreds of millions of people by democratizing political discourse and leveling the playing field between the powerful and the powerless. Internet freedom—the ability to use the network without institutional constraints, social or state control, and pervasive fear—is central to the fulfillment of that promise. Converting the Internet into a system of surveillance thus guts it of its core potential. Worse, it turns the Internet into a tool of repression, threatening to produce the most extreme and oppressive weapon of state intrusion human history has ever seen.

That’s what makes Snowden’s revelations so stunning and so vitally important. By daring to expose the NSA’s astonishing surveillance capabilities and its even more astounding ambitions, he has made it clear, with these disclosures, that we stand at a historic crossroads. Will the digital age usher in the individual liberation and political freedoms that the Internet is uniquely capable of unleashing? Or will it bring about a system of omnipresent monitoring and control, beyond the dreams of even the greatest tyrants of the past? Right now, either path is possible. Our actions will determine where we end up.

1

CONTACT

On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.

The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a model of civic virtue, Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.

The email began: The security of people’s communications is very important to me, and its stated purpose was to urge me to begin using PGP encryption so that Cincinnatus could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for pretty good privacy. It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.

The program essentially wraps every email in a protective shield, which is a code composed of hundreds, or even thousands, of random numbers and case-sensitive letters. The most advanced intelligence agencies around the world—a class that certainly includes the National Security Agency—possess password-cracking software capable of one billion guesses per second. But so lengthy and random are these PGP encryption codes that even the most sophisticated software requires many years to break them. People who most fear having their communications monitored, such as intelligence operatives, spies, human rights activists, and hackers, trust this form of encryption to protect their messages.

In this email, Cincinnatus said he had searched everywhere for my PGP public key, a unique code set that allows people to receive encrypted email, but could not find it. From this, he concluded that I was not using the program and told me, That puts anyone who communicates with you at risk. I’m not arguing that every communication you are involved in be encrypted, but you should at least provide communicants with that option.

Cincinnatus then referenced the sex scandal of General David Petraeus, whose career-ending extramarital affair with journalist Paula Broadwell was discovered when investigators found Google emails between the two. Had Petraeus encrypted his messages before handing them over to Gmail or storing them in his drafts folder, he wrote, investigators would not have been able to read them. Encryption matters, and it is not just for spies and philanderers. Installing encrypted email, he said, is a critically-necessary security measure for anyone who wishes to communicate with you.

To motivate me to follow his advice, he added, There are people out there you would like to hear from who will never be able to contact you without knowing their messages cannot be read in transit.

Then he offered to help me install the program: If you need any help at all with this, please let me know, or alternately request help on Twitter. You have many technically-proficient followers who are willing to offer immediate assistance. He signed off: Thank you. C.

Using encryption software was something I had long intended to do. I had been writing for years about WikiLeaks, whistle-blowers, the hacktivist collective known as Anonymous, and related topics, and had also communicated from time to time with people inside the US national security establishment. Most of them are very concerned about the security of their communications and preventing unwanted monitoring. But the program is complicated, especially for someone who had very little skill in programming and computers, like me. So it was one of those things I had never gotten around to doing.

C.’s email did not move me to action. Because I had become known for covering stories the rest of the media often ignores, I frequently hear from all sorts of people offering me a huge story, and it usually turns out to be nothing. And at any given moment I am usually working on more stories than I can handle. So I need something concrete to make me drop what I’m doing in order to pursue a new lead. Despite the vague allusion to people out there I would like to hear from, there was nothing in C.’s email that I found sufficiently enticing. I read it but did not reply.

Three days later, I heard from C. again, asking me to confirm receipt of the first email. This time I replied quickly. I got this and am going to work on it. I don’t have a PGP code, and don’t know how to do that, but I will try to find someone who can help me.

C. replied later that day with a clear, step-by-step guide to the PGP system: Encryption for Dummies, in essence. At the end of the instructions, which I found complex and confusing, mostly due to my own ignorance, he said these were just the barest basics. If you can’t find anyone to walk you through installation, generation, and use, he added, please let me know. I can facilitate contact with people who understand crypto almost anywhere in the world.

This email ended with more a pointed sign-off: Cryptographically yours, Cincinnatus.

Despite my intentions, I never created the time to work on encryption. Seven weeks went by, and my failure to do this weighed a bit on my mind. What if this person really did have an important story, one I would miss just because I failed to install a computer program? Apart from anything else, I knew encryption might be valuable in the future, even if Cincinnatus turned out to have nothing of interest.

On January 28, 2013, I emailed C. to say that I would get someone to help me with encryption and hopefully would have it done within the next day or so.

C. replied the next day: That’s great news! If you need any further help or have questions in the future, you will always be welcome to reach out. Please accept my sincerest thanks for your support of communications privacy! Cincinnatus.

But yet again, I did nothing, consumed as I was at the time with other stories, and still unconvinced that C. had anything worthwhile to say. There was no conscious decision to do nothing. It was simply that on my always too-long list of things to take care of, installing encryption technology at the behest of this unknown person never became pressing enough for me to stop other things and focus on it.

C. and I thus found ourselves in a Catch-22. He was unwilling to tell me anything specific about what he had, or even who he was and where he worked, unless I installed encryption. But without the enticement of specifics, it was not a priority to respond to his request and take the time to install the program.

In the face of my inaction, C. stepped up his efforts. He produced a ten-minute video entitled PGP for Journalists. Using software that generates a computer voice, the video instructed me in an easy, step-by-step fashion how to install encryption software, complete with charts and visuals.

Still I did nothing. It was at that point that C., as he later told me, become frustrated. Here am I, he thought, ready to risk my liberty, perhaps even my life, to hand this guy thousands of Top Secret documents from the nation’s most secretive agency—a leak that will produce dozens if not hundreds of huge journalistic scoops. And he can’t even be bothered to install an encryption program.

That’s how close I came to blowing off one of the largest and most consequential national security leaks in US history.

*   *   *

The next I heard of any of this was ten weeks later. On April 18, I flew from my home in Rio de Janeiro to New York, where I was scheduled to give some talks on the dangers of government secrecy and civil liberties abuses done in the name of the War on Terror.

On landing at JFK Airport, I saw that I had an email message from Laura Poitras, the documentary filmmaker, which read: Any chance you’ll be in the US this coming week? I’d love to touch base about something, though best to do in person.

I take seriously any message from Laura Poitras. One of the most focused, fearless, and independent individuals I’ve ever known, she has made film after film in the riskiest of circumstances, with no crew or the support of a news organization, just a modest budget, one camera, and her determination. At the height of the worst violence of the Iraq War, she ventured into the Sunni Triangle to make My Country, My Country, an unflinching look at life under US occupation that was nominated for an Academy award.

For her next film, The Oath, Poitras traveled to Yemen, where she spent months following two Yemeni men—Osama bin Laden’s bodyguard as well as his driver. Since then, Poitras has been working on a documentary about NSA surveillance. The three films, conceived as a trilogy about US conduct during the War on Terror, made her a constant target of harassment by government authorities every time she entered or left the country.

Through Laura, I learned a valuable lesson. By the time we first met, in 2010, she had been detained in airports by the Department of Homeland Security more than three dozen times as she entered the United States—interrogated, threatened, her materials seized, including her laptop, cameras, and notebooks. Yet she repeatedly decided not to go public with the relentless harassment, fearing that the repercussions would make her work impossible. That changed after an unusually abusive interrogation at Newark Liberty International Airport. Laura had had enough. It’s getting worse, not better, from my being silent. She was ready for me to write about it.

The article I published in the online political magazine Salon detailing the constant interrogations to which Poitras had been subjected received substantial attention, drawing statements of support and denunciations of the harassment. The next time Poitras flew out of the United States after the article ran, there was no interrogation and she did not have her materials seized. Over the next couple of months, there was no harassment. For the first time in years, Laura was able to travel freely.

The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.

*   *   *

At JFK, reading Laura’s email, I replied immediately: Actually, just got to the US this morning.… Where are you? We arranged a meeting for the next day, in the lobby at my hotel in Yonkers, a Marriott, and found seats in the restaurant, At Laura’s insistence, we moved tables twice before beginning our conversation to be sure that nobody could hear us. Laura then got down to business. She had an extremely important and sensitive matter to discuss, she said, and security was critical.

Since I had my cell phone with me, Laura asked that I either remove the battery or leave it in my hotel room. It sounds paranoid, she said, but the government has the capability to activate cell phones and laptops remotely as eavesdropping devices. Powering off the phone or laptop does not defeat the capability: only removing the battery does. I’d

Enjoying the preview?
Page 1 of 1