Citizenfour (2014)

Curious minds want to know... documentary movie collection.

Moderator: Maskath3

Watch Docus Amazon   Docus Merchandise

Documentary movie collection.
Post Reply

Citizenfour (2014)

Post by bunniefuu »

"Laura, at this stage, "I can offer nothing more than my word.

"I am a senior government employee

"in the intelligence community.

"I hope you'll understand that contacting you is

"extremely high-risk, and you are willing to agree

"to the following precautions before I share more.

"This will not be a waste of your time.

"The following sounds complex, but should only take minutes

"to complete for someone technical.

"I would like to confirm out of email that the keys we exchanged

"were not intercepted and replaced by your surveillance.

"Please confirm that no one has ever had a copy

"of your private key and that it uses a strong pass-phrase.

"Assume your adversary is capable

"of one trillion guesses per second.

"If the device you store the private key

"and enter your pass-phrase on has been hacked, "it is trivial to decrypt our communications.

"Understand that the above steps are not b*llet-proof

"and are intended only to give us breathing room.

"In the end, if you publish the source material, "I will likely be immediately implicated.

"This must not deter you from releasing

"the information I will provide.

"Thank you, and be careful.

CitizenFour."

The bottom line is, surveillance means that there are facts that we no longer abide to.

If you take away the surveillance, there are no facts that the government can manufacture.

Ah, that's right, and this is all about creating an independent record.

To me, this goes to the question of independently verifying what the government is doing.

That's why I keep going back to that question.

More with David Sirota after CBS News, traffic, and weather on KKZN Denver/Boulder, AM 7...

Hey, can you hear me?

I am here, David. How are you?

Well, I would just point... Start by pointing to what Barack Obama himself said about those questions when he was running for the office that he now occupies.

In December of 2007, he said, quote, "The President does not have the power under the Constitution

"to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation."

So, by Obama's own words, the President does not have the power that he is now exercising under the Constitution.

And as far as why it matters, in... On August 1, 2007, when he laid out his reasons why he was running for office and why he thought it was so important to change the way we were doing things, he said, quote, "No more ignoring the law when it's inconvenient.

"That is not who we are.

"We will again set an example for the world that the law is not subject to the whims of stubborn rulers."

So, to allow presidents to simply start wars on their own, without any...

"You asked why I picked you.

"I didn't. You did.

"The surveillance you've experienced means you've been

"'selected' - a term which will mean more to you

"as you learn about how the modern SIGINT system works.

"For now, know that every border you cross, "every purchase you make, "every call you dial, "every cell phone tower you pass, friend you keep, "article you write, site you visit, "subject line you type, "and packet you route is

"in the hands of a system whose reach is unlimited, "but whose safeguards are not.

"Your victimization by the NSA system

"means that you are well aware of the threat

"that unrestricted secret police pose for democracies.

This is a story few but you can tell."

Thank you for inviting me here, uh, to give me the opportunity to, uh, express my, uh, story, but let me give you some of my background.

Um, I spent about 4 years in the military, then I went into NSA, directly, so...

So I ended up with about 37 years of service combined.

Most of it was a lot of fun, I tell you.

It was really a lot of fun, breaking these puzzles, you know, solving problems and things like that, so... And that's really what I did.

I fundamentally started working out with data, looking at data and data systems and how you do that.

I was developing this concept of, um, analysis that you could lay it out in such a way that it could be coded and ex*cuted electronically, meaning you could automate analysis, okay?

And it has to do with metadata and using metadata relationships.

So that was the whole... That was my whole theme there at NSA.

That was... Eventually, that's what I ended up to.

I was the only one there doing that, by the way.

So, uh, any rate, 9/11 happened and, uh... it must have been, uh, right after... A few days, no more than a week after, uh, 9/11...

That they, uh, decided to begin actively, uh, spying on everyone in this country.

And they wanted the back part of our program to run all the spying, all right?

So... Ahem... That's exactly what they did.

And then they started taking the Telecom data and then expanded after that, so...

I mean, the one I knew was AT&T, and that one provided 320 million records every day.

That program was re-authorized every 45 days by the... What I called the "yes committee," which was Hayden and Tenet and... The DOJ.

The program was called Stellar Wind.

So first I went to the House Intelligence Committee, then the staff member that I personally knew there, and, uh, she then went to the chairman of that committee.

Nancy Pelosi was the minority rep.

They were all briefed into the program at the time, by the way, and all the other programs that were going on, including all these CIA programs.

I wasn't alone in this; There were 4 others out of NSA, and we were all trying to work internally in the government for... Over these years trying to get them to come around to being constitutionally acceptable and take it into the courts and have the courts' oversight of it, too.

So we... We naively kept thinking that that could, uh, that could happen, and, uh, it never did.

But any rate, after that, and all the stuff we were doing, they decided to, uh, raid us, to keep us quiet, thr*aten us, you know.

So we were raided, um, simultaneously, 4 of us.

In my case, they came in with g*ns drawn.

I don't know why they did that, but they did, so...

"Laura, I will answer

"what I remember of your questions as best I can.

"Forgive the lack of structure; I am not a writer, "and I have to draft this in a great hurry.

"What you know as Stellar Wind has grown.

"SSO, the expanded Special Source Operations

"that took over Stellar Wind's share of the pie, "has spread all over the world to practically include

"comprehensive coverage of the United States.

"Disturbingly, the amount of U.S. communication ingested

"by NSA is still increasing.

"Publicly, we complain that things are going dark, "but in fact, our accesses are improving.

"The truth is that the NSA has never in its history collected more than it does now."

"I know the location of most domestic interception points

"and that the largest telecommunication companies

"in the U.S. are betraying the trust of their customers, "which I can prove.

"We are building the greatest w*apon for oppression

"in the history of man, yet its directors

"exempt themselves from accountability.

"NSA director Keith Alexander lied to Congress, "which I can prove.

"Billions of U.S. communications are being intercepted.

"In gathering evidence of wrongdoing, "I focused on the wronging of the American people, "but believe me when I say that the surveillance we live under

"is the highest privilege compared to how we treat the rest of the world.

"This I can also prove.

"On cyber operations, the government's public position

"is that we still lack a policy framework.

"This, too, is a lie.

"There is a detailed policy framework, "a kind of martial law for cyber operations

"created by the White House.

"It's called Presidential Policy Directive 20

"and was finalized at the end of last year.

"This I can also prove.

"I appreciate your concern for my safety, "but I already know how this will end for me, "and I accept the risk.

"If I have luck and you are careful, "you will have everything you need.

"I ask only that you ensure this information makes it home to the American public."

Does the NSA routinely intercept American citizens' emails?

No.

Does the NSA intercept.

Americans' cell phone conversations?

No.

Google searches? No.

Text messages? No.

Amazon.com orders? No.

Bank records? No.

What judicial consent is required for NSA to intercept communications and information involving American citizens?

Within the United States, that would be the FBI lead.

If it was a foreign actor in the United States, the FBI would still have the lead and could work that with the... With NSA or other intelligence agencies as authorized.

But to conduct that kind of... Of collection in the United States, it would have to go through a court order, and the court would have to authorize it.

We're not authorized to do it, nor do we do it.

All rise.

The United States Court of Appeals for the Ninth Circuit is now in session.

Please be seated.

Good morning, and welcome to the Ninth Circuit.

The first case for argument is.

Jewel versus National Security Agency.

You may proceed.

May it please the court, Kevin Bankston for Carolyn Jewel and her fellow plaintiff appellants in Jewel v. NSA.

Your Honours, plaintiffs have specifically alleged that their own communications and communications records have been acquired by the government.

But the District Court found that we had failed to allege facts that differentiated the injury that our plaintiffs suffered from the injuries suffered by every other AT&T user whose communications and records have been acquired by the government, basically concluding that so long as everyone is being surveilled, no one has standing to sue.

Uh, however, to deny standing to persons who are injured simply because many others are also injured would mean that the most injurious and widespread government actions could be questioned by nobody.

Do you have anything concrete that, in fact, a specific communication of your client was intercepted?

We have evidence that all the communications passing between AT&T's network and, uh, other networks in their Northern California facility have been intercepted.

And so that would necessarily include the Internet communications of our Northern California, uh, plaintiffs, so...

Okay, thank you.

Thank you, Your Honours.

May it please the court, I am Thomas Byron from the Department of Justice, here on behalf of the government defendants.

We think this litigation need not be resolved in federal court in light of the oversight of the political branches, both legislative and executive, which provides a better opportunity for oversight and resolution of the concerns raised concerning nationwide policies of alleged surveillance, uh, in... In these... In these complaints...

Even if it's revealed that one or more of the plaintiffs had email or telephone conversations intercepted that had nothing to do with national security?

Your Honour, I don't know that anyone necessarily would have standing to raise the particular claims at issue in these two cases.

We think instead that the kinds of claims at issue here against these defendants are those that are better suited to resolution before the... The representative branches of our government.

So what role would the, uh, judiciary have, uh, if your, uh, approach is adopted?

Judge Pregerson, I think that the...

I mean, we just... Just get out of the way? Is that it?

Well, Judge Pregerson, I think that there is a narrow category, a subset of cases, in which it may be appropriate to step aside for that narrow category of cases.

But the judiciary plays a role.

- To be sure, Judge Pregerson... In our system.

Yes, Your Honour. And we don't mean to diminish that.

You know, you're asking us to abdicate that role.

No, Your Honour, um, but it is a question of this court's discretion whether to reach that issue.

Um, we do think that there is simply no way for the litigation to proceed without risk of divulging those very questions of privileged information that would cause, as the Director of National Intelligence has explained, exceptionally grave damage to national security if disclosed.

So thanks for having me.

If anybody has any questions, like I said, just... Basically just raise your hand and I'll try to call on you as soon as I possibly can.

So who here actually feels like they are under surveillance pretty regularly?

Everyone at Occupy is, no?

Everyone inside of Occupy.

How many people here have been arrested and had their...

At their court date, they had their phone taken into the back room?

How many people here had their retina scanned?

Wow.

Um, so you guys are actually, in a sense, the canaries in the coal mine, right?

Because the incentives are all lined up against you.

Any of you see on the subway, "Link your MetroCard to your debit card"?

Yeah. Right? On, like, auto refill?

This is a concept which is key to everything we'll talk about today, and it's called linkability... Take one piece of data and link it to another piece of data.

So, for example, if you have your MetroCard and you have your debit card, you have those things and you can draw a line between them, right?

So that's, like, not a scary thing, except your bank card is tied to everything else that you do during the day, so now they know where you're going, when you make purchases.

So when they decide to target you, they can actually re-create your exact steps with a MetroCard and with a credit card alone;

Like, literally where you go and what you buy, and potentially, by linking that data with other people on similar travel plans, they can figure out who you talk to and who you met with.

When you then take cell phone data, which logs your location, and you link up purchasing data, MetroCard data, and your debit card, you start to get what you could call "metadata" in aggregate over a person's life.

And metadata, in aggregate, is content.

It tells a story about you which is made up of facts, but is not necessarily true.

So, for example, just because you were on the corner and all those data points point to it, it doesn't mean you committed the crime.

So it's important to note that if someone has a perception of you having done a thing, it will now follow you for the rest of your life.

So just keep in mind that what happens to you guys, for example, with fingerprints and retinal scans and photographs, that is what is going to happen to people in the future when they resist policy changes and when they try to protest in a totally constitutionally protected way.

This is for you, Director Clapper, again on the surveillance front, and I hope we can do this in just a yes or no answer because I know Senator Feinstein wants to move on.

So, does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

No, sir.

It does not?

Not wittingly.

There are cases where they could inadvertently, perhaps, uh, collect, but not... Not wittingly.

"The encrypted archive

"should be available to you within 7 days.

The key will follow when everything else is done."

"The material I provide and investigative effort required

"will be too much for any one person.

"I recommend, at a very minimum, you involve Glenn Greenwald.

I believe you know him."

"The plain text of the payload will include my true name details for the record, "though it will be your decision as to whether or how to declare my involvement.

"My personal desire is that you paint the target directly on my back.

"No one, not even my most trusted confidant, is aware of my intentions, "and it would not be fair for them to fall under suspicion for my actions.

"You may be the only one who can prevent that, and that is by immediately nailing me to the cross, rather than trying to protect me as a source."

"On timing, regarding meeting up in Hong Kong, "the first rendezvous attempt will be at 10 a.m. local time on Monday.

"We will meet in the hallway outside of the restaurant in the Mira Hotel.

"I will be working on a Rubik's Cube so you can identify me.

"Approach me, and ask if I know the hours of the restaurant.

"I'll respond by stating that I'm not sure and suggest you try the lounge instead.

"I'll offer to show you where it is, and at that point

"we're good.

You simply need to follow naturally."

As far as positioning, I mean, if you want us to sit in any particular way or whatever...

You know, I'm gonna... I'm gonna go over there.

Okay. I can get better light.

This one will...

So this... Um, there's, you know, so many different, enormous stories just that are kind of stand-alone stories.

Mm-hmm. Um, that even, like, you know, certain things about an individual document that can just be their own story.

Um, and I just want to start churning those stories out.

I... I basically woke up this morning and already started writing stories.

Um, so I'm hoping to, you know, start publishing within, like, a day or two days...

Okay. As long as you're good with that.

Yeah. Um, and, so, as far as, like, the stuff we have to talk about, I mean, I'm kind of, like, dichotomizing it, um, between, you know, stuff that I'd like to talk to you about in terms of, like, the documents and the content, and Laura has a bunch of questions about that as well, sort of working through the documents, getting your take on a lot of this stuff that, you know, will help me understand it better, but then, also, the sort of "you" story, right?

Like, the who you are... Yeah.

Why... What you've done, why you've done what you've done.

Yeah. And I'd love to do that first...

Okay. Um, in part because you're the only one who could do that... Yeah.

So, I'd like to just get it done so that it's done, um, and also because, you know, it might be that you want to do that early... Yeah.

Because... Who knows what could happen, yeah.

It might be necessary, we might choose to have that done early.

What are your... Tell me your thoughts on just where you are with that.

So, the primary one on that... I think I've expressed it a couple times online...

Is... I feel the modern media has a big focus on personalities.

Totally. And I'm a little concerned the more we... Focus on that, the more they're gonna use that as a distraction, um, and I... I don't necessarily want that to happen, which is why I've consistently said, you know, "I'm not the story here."

Um... Ha ha ha! Nervous, huh?

That was a very, very cheap pen...

Ha ha ha! Just, with the slightest force, broke.

Go ahead. Um...

But, uh, yeah.

Anything I can do to help you guys, uh, get this out, I will do.

I don't have, uh, any experience with media, uh, with how this works, um, so I'm kind of, uh, learning as I go.

Right, so I just want to get a sense of... Why did you decide to do what you've done?

So, for me, it... It all comes down to state power against the people's ability to meaningfully oppose that power.

And I'm sitting there, uh, every day getting paid to design methods to amplify that state power.

And I'm realizing that if, you know, the policy switches that are the only things that restrain these states, uh, were changed, there... You couldn't meaningfully oppose these.

I mean, you would have to be the most incredibly sophisticated technical actor in existence.

I mean, I'm not sure there's anybody, no matter how gifted you are, uh, who could oppose all of the offices and all of the bright people... Even all the mediocre people out there...

With all of their tools and all their capabilities.

And as I saw the promise of the Obama administration be betrayed and walked away from and, in fact, actually advance... Uh-huh, uh-huh.

The things that had been promised to be sort of curtailed and reined in and dialled back, and actually get worse, particularly drone strikes...

Which I also learned at NSA, we could...

We could watch drone videos from our desktops...

Um... Uh, as... As I saw that, that really hardened me to action.

In real time? In real time, yeah.

You... It'll stream a lower quality of the video to your desktop.

Typically you'd be watching surveillance drones as opposed to actually, like, you know, m*rder drones, where they're going out there and b*mb somebody.

But you'll have a drone that's just following somebody's house for hours and hours, and you won't know who it is because, you know, you don't have the context for that.

But it's just a page, where it's lists and lists of drone feeds in all of these different countries, under all these different code names, and you can just click on which one you want to see.

Right, but...

So if your self-interest is to live in a world in which there's maximum privacy, doing something that could put you into prison, in which your privacy is completely destroyed, is sort of the antithesis of that.

How did you reach the point where that was a worthwhile calculation for you?

I remember what the Internet was like before it was being watched, and there's never been anything in the history of man that's like it.

I mean, you could, again, have children from one part of the world having an equal discussion where, you know, they were sort of granted, um, the same respect for their ideas and conversation, with experts in a field from another part of the world on any topic, anywhere, anytime, all of the time.

Um, and it was... It was free and unrestrained, and we've seen, uh, the... The chilling of that, the cooling of that, and the changing of that model toward something in which people self-police their own views, and they literally make jokes about ending up on "the list" if they donate to a political cause or if they say something in a discussion.

Uh, and it's become an expectation that we're being watched.

Um, many people I've talked to have mentioned that they're careful about what they type into search engines because they know that it's being recorded, and that limits the boundaries of their intellectual exploration.

Uh... and... I'm...

I am more willing to... risk... imprisonment or any other negative outcome, personally, than I am willing to risk the curtailment of my intellectual freedom and that of those around me whom I care for, uh, equally as I... I do for myself.

And again, that... That's not to say that I am self-sacrificing because it gives me... I feel good in my human experience to know that I can contribute to the good of others.

Uh, could you elaborate on that?

So, uh, I don't know how much of the... programs and the actual technical capacities everybody's talked to you about, but there's an infrastructure in place in the United States and worldwide that NSA has built, in cooperation with other governments as well... that intercepts basically every digital communication, every radio communication, every analogue communication that it has sensors in place to detect.

And, uh, with these capabilities, basically, the... The vast majority of human and, uh, computer-to-computer communications, device-based communications, which sort of inform the relationships between humans, um, are automatically ingested without targeting.

And that allows individuals to retroactively search your communications based on self-certifications.

So, for example, if I wanted to see the content of your email or, you know, your wife's phone calls or anything like that, um, all I have to do is use what's called a "selector," um, any kind of... thing in the communications chain that might uniquely or almost uniquely identify you as an individual.

And I'm talking about things like email addresses, IP addresses, phone numbers, credit cards, um, even passwords that are unique to you, that aren't used by anyone else.

Um, I can input those into the system, and it will not only go back through the database and go, "Have I seen this anywhere in the past?" it will, um, basically put an additional level of scrutiny on it, moving into the future, that says, "If this is detected now or at any time in the future", I want this to go to me immediately and alert me in real time" that you're communicating with someone, things like that.

So I don't know who you are or anything about you.

Okay. Um...

I work for, uh, Booz Allen Hamilton, a defence contractor.

Uh, I'm sort of on loan to NSA.

I don't talk to a Booz Allen boss, I don't get tasking from Booz Allen;

It's all from NSA.

Uh, so I don't know your name. Oh, ha!

Sorry. I, uh... My name is Edward Snowden.

I go by Ed.

Um, Edward Joseph Snowden is the full name.

Uh, S-N...

O-W-D-E-N.

And, uh, where are you from?

Uh, I'm originally... I was born in North Carolina, uh, small town, Elizabeth City.

There's a Coast Guard station there; I'm from a military family.

Yeah. But I spent most of my time growing up around, uh, Fort Meade in Maryland.

Uh, and your family, uh, what's the consequences for them?

This, uh, this is actually what has made this hardest.

Uh, my family doesn't know, uh, what's happening.

They're... They're unaware. Um...

I don't think I'll... be able to keep the family ties that I've had for my life, um, because of the risk of associating them, uh, with this.

And I'll leave, you know, what to publish on this and what not to publish to you guys.

I trust you to be responsible on this.

Um... But basically, the closer I stay to my family, the more likely they are to be leaned on...

So you don't want me to report this?

I mean, we know that, yeah.

We definitely want to do whatever we can not to include them or bring them into the mix.

Sure, I... That's fine. I won't...

Let me now... I'm sorry to interrupt you.

Can we just stop for a second, do the documents, and then go back to that? That make sense?

Uh, what do I need?

Do I need an email address that we're using, or...

Well, so you can... You can send them...

Once you've encrypted it, you can send it from whatever you think is appropriate.

The main thing is you've got to encapsulate all of this...

Uh-huh. In a way that it can't be decrypted and read... Right.

When it's in transit across the network... Right.

Or on either of the end points that it's received at.

Okay, I mean, just so you know, these documents are basically all gonna be uploaded in, like... Yeah, and that's fine.

You know, 48 hours, 72 hours, whatever.

This is simply... You know, you want to get in the process of doing this for everything because it seems hard, but it's not hard. This is super easy. Okay.

So just walk me through it, and... Okay.

Show me... Show me the actual folder structure where these files are first.

How many documents did you say there were?

7. All right.

Well, while you're working... Okay, go ahead, yeah.

Did you want to... Okay.

How many documents are we talking about?

Because when the Guardian did WikiLeaks, technical people set up a system so that they were available for anybody to see.

Mm-hmm. And I just wondered if it's possible to do the same thing.

That... That would be the ideal end game, um, but... because...

Because some of these documents are legitimately classified, in ways that could cause harm to people and methods...

Um, I'm comfortable in my technical ability, uh, to protect them.

I mean, you could literally sh**t me or t*rture me, and I could not disclose the password if I wanted to.

Um... You know, I... I have the sophistication to do that.

There are some journalists that I think could do that, but there are a number of them that couldn't.

But the question becomes, can an organization actually control that information in that manner without risking basically an uncontrolled disclosure?

But I... I do agree with that.

Honestly, I don't want to be the person making the decisions on what should be public and what shouldn't, which is why... Rather than publishing these on my own, um, or putting them out openly...

I'm running them through journalists... Yes.

So that my bias, you know, and my things...

Because clearly I have some strongly held views...

Are removed from that equation, and the public interest is being represented in the most responsible manner.

Yeah.

Actually, given... Given your...

Sort of, you know, geographic, uh... familiarity with the U.K. and whatnot, I... I'd like to point out that GCHQ, um, has, uh, probably the most invasive...

I've heard that, yeah. Ha!

Network intercept program anywhere in the world.

Yeah, yeah. Uh, it's called Tempora, T-E-M-P-O-R-A, and it's the world's first "full take," they call it...

And that means content in addition to metadata... On everything.

Um, so this... This is what I'd like to do just in terms of scheduling, if it's good with everybody else.

Um, are you... Do you feel like you're done...

I am done, yeah. With what you... Okay.

So I... I'm anxious to go back, get those articles done, and then there's a bunch of documents that aren't about those first 2 or 3 stories that I'd like to spend time with you... Sure, yeah.

You know, kind of going over, um, and...

Ha ha! I'm not going anywhere!

You're available? You want to check your book first?

Yeah... Ha ha! Let me, uh, let me check my schedule.

Is that good for you, Laura? Do you want to...

It's great. Okay.

Hello?

Yes.

Uh, my meal was great. Thank you very much.

Uh, no, I still have some left, and I think I'm gonna be eating it later, so, uh, you can just leave me alone for now.

Okay, great. Thank you so much. Have a good one. Bye.

Let's, uh, fix that real quick.

So, uh, another fun thing I was telling Laura about:

This... All of these new VOIP phones, they have little computers in them, and you can hot-mic these over the network... Uh-huh.

All the time, even when the receiver's down, so, as long as it's plugged in, it can be listening in on you.

And I hadn't... Hadn't even considered that earlier, but yeah.

Okay. There are so many ways we can...

This could be... Everything that's in here is pretty much gonna be on public record at some point.

We should operate on that... Yeah, yeah.

Basis, because... I think we are.

So, do you have your airgapped machine with you?

I do, I do. You can pop that out.

Do you have an understanding or commitment on when you guys are going to press with the first stories?

Uh, it's about 7:00 or 8:00 in the morning in London.

Uh-huh. Okay.

Oh, let's see here.

Oh, hey, look, there's the other one.

Let's not leave the same SD cards in our laptops forever, in the future.

Heh!

Did you know this was still kicking around in your, uh, in your laptop?

Yeah, I mean, that was the... Em, okay.

Okay, just... Just making sure. Okay. Yeah.

Heh! This is that right there.

You will have a new one that looks exactly identical that's a different archive, so you might want to take a Sharpie to it or something.

Could you, uh, pass me my magic, uh, mantle of power?

Sorry. Mm-hmm.

I'm gonna go pick up...

Is that about the possibility of...

Visual, yeah. Visual collection.

I don't think, at this point, there's anything in this regard that will shock us.

We've become pretty...

In fact, Ewen said before, he's like, he's like, "I'm never leaving my room." He's like, "I'm never leaving anything in my room again, not a single machine." I was like, "You've

"been infected by the paranoia bug.

It happens to all of us!" Ha ha ha!

And the way he said it, he was like, "I would never leave" a single device in the room again alone."

Heh! My bag is getting heavier and heavier.

Your evil influence.

That's your evil influence, Ed.

All right, I'm going to need you to enter your root password

'cause I don't know what it is.

If you want to use this, you're more than welcome to.

Okay. It looks like your root password's about 4 characters long anyway.

It's usually a lot longer, but that's just, like, a one-time-only thing, right?

So it is, uh... It had been a lot longer, but ever since I knew that it was just, like, a one-time-only session one, I've been making it shorter.

Is that not good? It's actually not.

I was expressing this with Laura, either.

The issue is, because of the fact that it's got a hardware MAC address and things like that, if people are able to identify your machine, and they're able to... Consider the fact you're about to break the most upsetting story...

Right, that's true, that's true. Yeah, so they might kind of prioritize you...

It's 10 letters. I type very quickly.

It actually is 10 letters. Okay.

So 10 letters would be good if they had to brute-force the entire key space. Right.

Um, that would still probably only take a couple of days for NSA.

Um...

That's a fire alarm.

Okay.

Well, hopefully... It just sounds like a 3-second test, or is...

Do you want to call the desk and ask?

No. I think it's fine.

Yeah, I don't think it's an issue, but it's interesting that it just...

Has that happened before? Ahem.

Maybe they got mad that they couldn't listen in to us via the phone anymore.

Has the fire alarm gone off before?

No, that's the first time that's happened.

Yeah, see, just in case, they've got, like, an alert that goes to... Uh, that's... That's unusual.

We probably...

We might have to evacuate. Shouldn't ignore that.

I don't know.

You think... Long as it's not continuous.

It's not continuous.

No, I'm just saying, if it... If it continues.

And then we go, and we meet the guys down in the lobby?

Yeah... Ha ha! Right? Yeah.

Yeah, let's, uh, let's just... Let's leave it for now.

Let me, uh, finish this up.

All right.

Not that they're gonna answer, 'cause they probably got, like, 7,000 calls. Yeah.

Hi, uh, we hear a loud buzzing on the 10th floor.

Can you tell us what that is?

Oh, okay.

Okay, great. Thank you. Bye.

Fire alarm testing maintenance.

That's good. Yeah, yeah.

That's what we wanted to hear.

Nice of them to, uh... Nice of them to let us know about that in advance.

Um... I just wanted to give you kind of a quick tour.

Uh, when Laura was looking at this, she was kind of salivating and couldn't stop, like, actually reading the documents...

We'll try and restrain ourselves... Yeah.

Without promising that we'll succeed.

Yeah, I just wanted to kind of explain, a... A brief overview of what these are and how they're organized.

Um, the beginning are just some documents of interest.

Uh, the primary purpose of the second archive is to bring the focus over to SSO, as opposed to, uh, PRISM, and this is in general, uh, it's... SSO are the Special Source Operations.

Those are the worldwide passive collection on networks.

They're both domestic to the U.S.

And international.

There's a lot of different ways they do it...

But, uh, corporate partnerships are one of the primary things, uh, they do domestically.

They also do this with multinationals that might be headquartered in the U.S. who they can kind of coerce and just pay into giving them access, and they also do it bilaterally with the assistance of certain governments.

And that's basically on the premise that they go, "All right, we'll help you set this system up if you give us all the data from it."

Um, so yeah.

There's... There's...

There's a lot more in here than any one person or probably one team could do. Right.

Um, XKeyscore Deep-Dive, uh, XKeyscore in general... And there's a huge folder of documentation on XKeyscore and how it works...

Is the front-end system that analysts use for querying that sort of ocean of raw SIGINT that I was telling you about.

All of that stuff where you can sort of do the retroactive searches and live searches and get flagging and whatnot, XKeyscore is the front end for that.

I'm just gonna show you one slide here 'cause, uh, Laura thought it was valuable, and I was talking about kind of how these, uh, capabilities ramp up in sophistication over time.

This is kinda nice.

As of fiscal year 2011, they could monitor

1 billion telephone or Internet sessions, simultaneously, per one of these devices.

And they could collect at the rate of about

125 gigabytes a second, which is a terabit.

That's just each one of these devices.

That's for each one of these, yeah.

How many TUMULT machines would that be, then?

Uh, per this, back then, there were 20 sites.

There's 10 at DOD installations, but these are all outdated; We've expanded pretty rapidly.

Uh, but still, 20 sites, that's at least 20 billion.

This all needs to get out, you know what I mean?

It's like... Just in terms of understanding the capabilities.

Like, it's so opaque. It's not science fiction.

This stuff is happening right now. No, that's what I mean.

It's like the... The magnitude of it, and... And, like, this is a pretty inaccessible technical document.

Ha ha! Yeah. But even this, like, is really chilling, do you know what I mean? Yeah.

And, yeah, I mean, we should have... We should be having debates about whether we want governments...

I mean, this is massive and extraordinary.

It's... It's amazing. Yeah.

Even though you know it, you know, even though you know that, to see it, like, the physical blueprints of it... Mm-hmm.

And sort of the technical expressions of it, brutally hits home in, like, a super-visceral way that is so needed.

This is CNN Breaking News.

An expl*sive new report is reigniting the concerns that your privacy is being violated to protect America's security.

It reveals a court order giving the National Security Agency blanket access to millions of Verizon customers' records on a daily basis.

Earlier, I had the chance to conduct the first TV interview with the reporter who broke this story wide open, Glenn Greenwald of the Guardian.

Congratulations on the scoop.

Explain for our viewers why this is important.

It's important because people have understood that the law that this was done under... Which is the Patriot Act, enacted in the wake of 9/11...

Was a law that allowed the government very broad powers to get records about people with a lower level of suspicion than probable cause, the traditional standard.

So it's always been assumed that under the Patriot Act, if the government had even any suspicion that you were involved in a crime or terrorism, they could get a lot of information about you.

What this court order does that makes it so striking is that it's not directed at any individuals who they believe or have suspicion of committing crimes or are part of a t*rror1st organization.

It's collecting the phone records of every single customer of Verizon business and finding out every single call that they've made, internationally and locally, so it's indiscriminate and it's sweeping.

It's a government program designed to collect information about all Americans, not just people where they believe there's reason to think they've done anything wrong.

Ah, it's... It's a tough situation, you know, hearing that the person that you love, that you've spent the decade with, may not be coming back.

What did they ask her?

Um, when was the last time she saw me, where am I, um, what am I doing, you know, what does she know about my illness, things like that. Hmm.

So, yeah, they're, um, they're pretty solidly aware, 'cause, uh... Heh!

I'm clearly not at home, ill.

Hello? Hello?

Hello. Let me disconnect from the Internet.

So...

There's some news?

Yes, there was indeed some news.

I have config, today, I think, maybe just a few hours ago?

What... What kind of people visited?

Uh... An HR lady, I'm assuming from NSA, as opposed to, uh, as opposed to Booz Allen, because she was accompanied by a police officer, which means NSA police. Mmm.

And they were planning to break into my house, which regular police don't do.

Um... Does she live there?

Yeah, she lives there, so I told her to cooperate fully...

I can't find my phone. Just one second.

You know, worry about herself.

You know what I'm gonna do?

I'll just take out the stuff I want to use.

Okay.

Okay, well, look, I mean, this is not a surprising development. Nah, yeah, I know.

I planned for it, but it's just... You know, when it's impacting them and they're talking to you, it's a little bit different.

Absolutely.

But it's possible that they just noticed that you're missing.

I guess it's not really a possibility.

It is, but, yeah, they're... I mean...

Um, let me just get rid of this.

Sorry, I obviously was focused on other things than appearance this morning, so... Ha! Sorry.

How was... How did she react?

Was she relatively calm about it? She's relatively calm...

Does she know anything about what you're doing and why?

She has no idea, um, and that's... I mean, I... I feel badly about that, but that's the only way I could think of where, like, she can't be in trouble.

Did you just basically do a "I have to go somewhere for reasons that I can't tell you about" kind of thing...

I just disappeared when she was on vacation.

Um, and I... I left a note saying, "Hey", I'm going to be gone for a while for work," which isn't unusual for me in my business... Right.

You know, so...

Okay, so let me ask you a couple things just quickly.

Are they gonna be able to go into your stuff and figure out what you took?

Um... in... In some kind of, some sort of, like, peripheral senses, but not necessarily...

Not with great specificity... Yes.

Uh, because I cast such a wide net, if they do that, the only thing they're gonna do is they're gonna have a heart attack 'cause they're gonna go, "He had access to everything"... Yeah.

And they're not gonna know what specifically has been done.

Now, I think they're gonna start to actually feel a little better, although they're not gonna be, uh, wild about this in any case, when they see that the stories are kind of cleaving to a trend.

You know, it's not like, "Here's the list of everybody who works everywhere."

Right. I also think, you know, they're gonna be paranoid in the extreme and assuming all kinds of worst-case scenarios, which is gonna, you know, I think, make them react in ways that probably aren't, like, gonna be particularly rational on their part.

But, at the same time, there's...

I do think they're limited for the moment.

I... I agree, and I mean, I had kind of time to set a stage where... We all enjoy at least a minimum level of protection, you know, no matter who we are, who's involved in this.

You know, you're either a journalist... Right.

Or you're either out of jurisdiction, so we have some time to play this before they can really get nasty.

I think it's over, you know, the weeks, when they have times to get lawyers, really sort of go, "This is a special situation.

How can we interpret this to our advantage?"

Like, we... We see them do this all the time, you know, whether it's drones or wiretapping or whatever.

They'll go, "Well, according to this law from the 1840s", "you know, we have X, Y, or Z authority." Mm-hmm.

But that... That takes time, and that takes a great deal of effort.

Yeah, and also, you know, I mean, I think the more public we are out there, too, like, as journalists, and the more protection that's gonna give it as well.

Have you started to give thought to when you're ready to come forward?

I'm... I'm ready whenever, um, honestly, I think there's sort of an agreement that it's not going to bias the reporting process.

That's my primary concern at this point.

I don't want to get myself into the issue before it's gonna happen anyway, and where it takes away from the stories that are getting out.

We're talking about tens of millions of Americans, who weren't suspected of doing anything, who were surveilled in this way.

Hold your thoughts for a moment.

I want to continue this conversation because these are really important, sensitive issues, and the public out there has a right to know what's going on.

- Stand by... This is CNN Breaking News.

Well, another expl*sive article has just appeared, this time in the Washington Post.

It's breaking news, and it reveals another broad and secret U.S. government surveillance program.

The Washington Post and the Guardian in London reporting that the NSA and the FBI are tapping directly into the central servers of 9 leading Internet companies, including Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, and Apple.

The Post says they're extracting audio, video, photographs, emails, documents, and connection logs that enable analysts to track a person's movements and contacts over time.

Let's discuss this latest revelation.

They're coming out fast.

Uh, Bill Binney, the former official of the NSA who quit back in 2001.

You were angry over what was going on.

You're known as a whistle-blower right now.

Bill, what do you think about this Washington Post story?

Well, I assume it's just a continuation of what they've been doing all along.

So you're not surprised. No.

Do you have any idea who's leaking this information?

I don't know who leaked this.

I have no doubt that the administration will launch an investigation, not into who approved these programs, but into who leaked the information.

I am not shocked that the companies are denying it.

- I don't assume... Do you believe them?

There may be some technical basis on which they can say that "we are not actively collaborating" or "they don't have what we consider in our own definition to be direct access to our servers," but what I do know is I have talked to more than one person who has sat at a desk at a web portal and typed out commands and reached into those servers from a distance.

So whatever they want to call that, that's what's happening.

Well, what I would call it is the single-biggest infringement on American civil liberties probably of all time, isn't it?

- And this story... You have the New York Times now today saying that the administration has lost all credibility.

Yeah, the New York Times slammed President Obama for this and, frankly I was used to that.

The New York Times used to slam George Bush for protecting the country and for the steps he took.

I don't want us to drop our guard.

I don't want us to be struck again.

As we saw in Boston, Anderson, people are willing to sacrifice their civil liberties.

People sheltered inside because...

How can you believe in freedom, do you think...

I mean, try and play devil's advocate for me...

When you have secret courts, secret operations like PRISM, secret investigations which go into every spit and cough of every American's lives, without any member of the American public knowing about it?

- That's not freedom, is it? In 2008, they eliminated the warrant requirement for all conversations except ones that take place by and among Americans exclusively on American soil.

So they don't need warrants now for people who are foreigners outside of the U.S., but they also don't need warrants for Americans who are in the United States, communicating with people reasonably believed to be outside of the U.S.

So again, the fact that there are no checks, no oversight about who's looking over the NSA's shoulder, means that they can take whatever they want.

And the fact that it's all behind a wall of secrecy and they thr*aten people who want to expose it, means that whatever they're doing, even violating the law, is something that we're unlikely to know until we start having real investigations and real transparency into what it is that the government is doing.

Glenn Greenwald, congratulations again on exposing what is a true scandal.

I appreciate you joining me.

Hey, I just, uh, heard from Lindsay and, uh, she's still alive, which is good, and... And free.

My rent checks apparently are no longer getting through to my landlord, uh, so they said if we don't pay them in 5 days, we'll be evicted, which is strange because I've got a system set up that automatically pays them.

Uh... So there's that, and apparently there's construction trucks all over the street of my house, so that's, uh...

I wonder what they're looking for.

Heh!

It is, uh... It is an unusual feeling that's kind of hard to... Hard to, like, describe or... Or convey in words, but not knowing what's going to happen the next day, the next hour, the next week, it's scary, but at the same time it's liberating, you know?

The, uh... The planning comes a lot easier because you don't have that many variables to take into play.

You can only... Act and then act again.

Now all these phone calls are being recorded digitally, not for content, but for origin and destination.

Now word the government is going right into the servers of these large Internet companies.

How does the government, politically speaking, make the argument that this is essential to national security and not a dramatic overreach in terms of personal privacy?

It's difficult, Matt, because, as Peter was pointing out, overnight we had an extraordinary late-night, close-to-midnight announcement and a declassification from the Director of National Intelligence.

They are scrambling.

The administration's already supported strongly by leaders in both parties from the intelligence committees.

GCHQ has an internal Wikipedia, at the top-secret, you know, super-classified level...

Yeah. Where anybody working intelligence can work on anything they want.

Yeah. That's what this is. I'm giving it to you.

What's appropriate, what's not.

Um, it's going to be documents of, you know, different types:

Pictures and PowerPoints and Word documents, stuff like that.

Um... Sorry. Can I take that seat?

Yeah.

I'm sorry. I'll get you to repeat.

So, in these documents, they all show...

Yeah, there'll be a couple more documents on that.

That's only one part, though; Like, it talks about Tempora and a little more thing, that's the Wiki article itself.

It was also talking about a self-developed tool called UDAQ, U-D-A-Q.

It's their search tool for all the stuff they collect, was what it looked like.

Yeah. It's going to be projects, it's going to be troubleshooting pages for a particular tool...

Thanks. And what's the next step?

When do you think you'll go public, uh...

Ah... I think it's pretty soon.

I mean, with the reaction, this escalated more quickly.

I think, pretty much as soon as they start trying to make this about me, which should be any day now... Yeah.

Um, I'll... I'll come out just to go, "Hey, you know, this is, uh, this is not a question of somebody skulking around in the shadows."

Yeah. "These are public issues."

"These are not my issues, you know.

"These are everybody's issues, and I'm not afraid of you.

"You know, you're not going to bully me into silence

"like you've done to everybody else.

"And if nobody else is gonna do it, I will, "and hopefully when I'm gone, whatever you do to me, there will be somebody else who'll do the same thing."

It'll be the sort of Internet principle of the hydra;

You know, "you can stomp one person, but there's gonna be 7 more of us."

Yeah.

Uh, are you getting more nervous?


Um... Heh! I mean...

No.

I... I think, uh, I think the way I look at stress, particularly because I sort of knew this was coming, you know, because I sort of volunteered to walk into it, um...

I... I'm already sort of... familiar with the idea.

I'm not worried about it. When somebody, like, busts in the door, suddenly I'll get nervous and it'll affect me.

But until they do... I... I... Um, you know.

I'm eating a little less; That's the only...

Only difference, I think.

Let's talk about the issue with when we're gonna say who you are.

Yeah. This is... You know, you have to talk me through this... Mm-hmm.

Because I have a big worry about this...

Okay, tell me. Which is that if we come out and...

I know that you believe that your... detection is inevitable... Uh-huh.

And that it's inevitable imminently.

There's, you know, in the New York Times today, Charlie Savage, the fascinating Sherlock Holmes of political reporting, deduced that the fact that there has been these leaks in succession probably means that there's some one person who's decided to leak a bunch of stuff...

Somebody else quoted you as saying it was one of your readers.

And somebody else who put another thing... Yeah... So, you know, we're...

I mean, it's fine. I want people to... I want it to be, you know, like... Yeah, yeah, yeah.

You know, like, this is a person.

I want to start introducing the concept that this is a person who has a particular set of political objectives about informing the world about what's taking place, like, you know, so...

Mm-hmm. I'm keeping it all anonymous, totally, but I want to start introducing you in that kind of incremental way, but here's the thing.

What I am concerned about is that if we come out and say, "Here's who this is, here's what he did," the whole thing that we talked about, that we're gonna basically be doing the government's work for them, and we're gonna basically be handing them, you know, a confession, um, and helping them identify who found it.

I mean, maybe you're right, maybe they'll... Maybe they'll find out quickly, and maybe they'll know, but is there any possibility that they won't?

Are we... Are we kind of giving them stuff that we don't... Or... Or... Or...

The possibility that they know, but they don't want to reveal it because they don't know...

Or that they don't know, and we're going to be telling them.

Like, is it a possibility that they're going to need, like, 2, 3 months of uncertainty, and we're going to be solving that problem for them?

Or... Let me just say the "or" part...

Maybe it doesn't matter to you, like, maybe you want it.

Maybe... Maybe... I mean, you're not coming out because you think inevitably they're going to catch you, and you want to do it first.

You're coming out because you want to f*cking come out and you want to be heard. Oh, there is that. I mean, that's the thing.

I... I don't want to hide on this and skulk around.

I don't think I should have to.

Um, obviously there are circumstances that are saying that.

I think it is powerful to come out and be like, "Look, I'm not afraid, you know, and I don't think other people should, either.

"You know, I was sitting in the office right next to you last week.

"You know, we all have a stake in this, this is our country, "and the balance of power between the citizenry and the government is

"becoming that of the ruling and the ruled, as opposed to actually, you know, the elected and the electorate."

Okay, so that's what I need to hear, that this is not about...

But I... I do want to say I don't think there's a case that I'm not going to be discovered in the fullness of time.

It's a question of time frame. You're right.

It could take them a long time... I don't think it will...

But I... I didn't try to hide the footprint because, again, I intended to come forward the whole time. Okay.

I'm going to post this morning just a general defence of whistle-blowers...

That's fine, yeah. And you in particular without saying anything about you.

I'm gonna go post that right when I get back, and I'm also doing, like, a big "f*ck you" to all the people who keep, like, talking about investigations.

Like, that... I want that to be, like... Yeah.

The fearlessness and the "f*ck you" to, like, the bullying tactics has got to be completely pervading everything we do.

And I think that's brilliant.

I mean, your principles on this I love, I can't support them enough, um, because it is.

It's inverting the model that the government has laid out, where people who are trying to, you know, say the truth skulk around and they hide in the dark and they quote anonymously and whatnot.

I say yes, f*ck that. Okay.

Let's just... So here's the plan then, I mean, and this is the thing. It's like...

Once you... Like, I think we all just felt the fact that this is the right way to do it. Mm-hmm.

It's the... You feel the power of your choice, you know what I mean?

It's like... And I want that power to be felt in the world.

Okay. And it is the bi... I mean, it's the ultimate standing up to them, right?

Like, "I'm not gonna f*cking hide

"even for, like, one second." Yeah.

"I am gonna get right in your face.

Yeah. "You don't have to investigate."

Ha ha! "There's nothing to investigate. Here I am."

Yeah. You know, and... And I think that is just incredibly powerful.

And then the question just becomes.

"How do we do this in the right, you know, the perfect way," and that's my burden.

And that's what I'm gonna... I... So today is gonna be the story in the morning, assuming that it doesn't change in the Guardian, then it's gonna be the story in the morning, just to keep the momentum going, just to keep, like, the disclosures coming, a big one at night.

Now it's becoming like, "Okay, this is

"a major leak." Mm-hmm.

And after today, when we post the true stuff, things that we're gonna post, it's gonna be, "What the f*ck is this leak and who did it?" I guarantee you.

I just want to make sure... Move over slightly.

Do you want me to move a little more over, or... Okay.

I just want to... All right.

Hmm.

All right, we're rolling.

So let's just begin with some basic background information, like, just state your name, what position you held in the intelligence community, and... And how long you worked within that community.

Okay, um, just so I'm aware of where we're going, how in-depth are we going... Just in general, like, "I am currently an infrastructure analyst," you know, Booz Allen Hamilton, not going through my whole back story? Yep.

Okay. Just like, yeah, summary, kind of.

Okay. Uh, my name's Ed Snowden.

I am, uh, 29 years old.

I work for Booz Allen Hamilton as an infrastructure analyst for NSA, uh, in Hawaii.

And what are some of the positions that you held previously within the intelligence community?

Uh, I have been a systems engineer, a systems administrator, uh...

Senior advisor, uh, for the, uh, Central Intelligence Agency, solutions consultant, and a, uh, telecommunications information systems officer.

And what kind of clearances have... Have you held, what kind of classification?

Uh, Top Secret, uh... Hmm.

So people in my levels of access for systems administration or as a...

Infrastructure analyst typically have, uh, higher accesses than an NSA employee would normally have.

Uh, normal NSA employees have a combination of clearances called TS, SI, TK, and Gamma.

Um, that's, uh, Top Secret, uh, Signals Intelligence, Talent Keyhole, and Gamma.

And they all, uh, relate to certain things that are sort of core to the NSA mission.

As a systems administrator, you get a special clearance called PRIVAC, for Privileged Access, which allows you to be exposed to information of any classification, regardless of what your position actually needs.

Now, just before we go, a reminder of our top story, and that's that the former CIA technical worker Edward Snowden says he's responsible for leaking information that the U.S. authorities had been monitoring phone and Internet data.

The U.S. Justice Department confirmed it's in the first stages of a criminal investigation.

Leave it longer or cut it shorter? What do you think?

As far as the video that people saw? Am I less identifiable now?

Lose it. Lose it?

'Cause I can't go all the way down.

It's still gonna be stubble.

I don't have the blade for closer.

Will you be talking to any other media about this story today?

I am.

Um, will you be coming to our office?

Basically we'd be interested to ask, of course, about where is Snowden now, what his plans are.

Well, I'm obviously not going to talk about that, so unless you have any other questions, this is gonna be a pretty pointless interview. What are your plans, please?

Are you staying in Hong Kong for the time being?

For a little while.

And do you have any hopes to write more about this story, or are you stopping new writing about this story?

No, I'm gonna continue to write about it.

Have you had any pressure from the U.S. authorities about continuing to report on this? No.

And have you heard anything about what could be the attitude of Hong Kong authorities towards this case, whether they've contacted you or asked you anything about the whereabouts of Snowden and whether that is another...

I haven't heard from the authorities of any government.

And where do you think this story is going, for you and, of course, for Snowden, and, of course, for the U.S. media and the U.S. administration in general?

Well, for me, I can tell I'm gonna continue to report on...

Do my reporting on what the government has been doing, and what I think my readers should know about.

Um, as for him, I don't think anyone knows.

They could have people come after me, or any of their third-party partners.

You know, they work closely with a number of other nations.

Or, you know, they could pay off the triads or, you know, any of their agents or assets.

Uh, we have a CIA station just up the road, at the consulate here in Hong Kong.

Hello, I'm Daniela Ritorto.

Facing a criminal investigation, the whistle-blower who revealed details on how the U.S. is monitoring phone calls and Internet data goes public.

Security forces in Afghanistan say a number of Taliban insurgents have targeted Kabul's airport.

Now it's time for our newspaper review and looking at what's making headlines around the world.

Let's start with the Guardian, our top story, which is revealing the identity of the former CIA employee who the paper says leaked information exposing the scale...

- Shit. Of American surveillance of the Internet.

Edward Snowden.

What a great story.

Kira, Ewen, what do you think?

Well, I think it's a fantastic story, first off.

It could be straight out of a John le Carre novel.

I mean, when you read what he did, yes, he got the material.

He then decided to go to the place he identified as being very difficult...

- g*dd*mn it. For America to get at him, which is Hong Kong because, of course, technically inside China, the one country-two systems policy there, meaning he would get potentially some protection from it all.

All very well-planned; It could have been just out of a spy novel.

But what about the details?

Well, that could make it worse, but...

I don't know.

Only shows the lower half of my face.

Every weekend, here on BBC World News.

For in-depth, on-the-point analysis with a global perspective, join me...

only on BBC World News.

Snowden says he'd become increasingly dismayed by what he saw as the growing power of the NSA, hence his decision to pass on documents which are said to reveal not only that the organization monitored millions of phone calls, but that it had direct access to some of the...

- How do you feel? Biggest Internet companies in the world.

Um... What happens happens.

We've, uh, we've talked about this; I knew what the risks were and if I get arrested, I get arrested.

Uh... We were able to get the information, uh, that needed to get out, out.

And you and Glenn are able to keep reporting, uh, regardless of what happens to me.

Now what 29-year-old Edward Snowden said...

of phone records and monitored Internet data.

The Guardian newspaper revealed his identity...

- Yes? At his own request.

From Washington, David Willis has this.

Uh, I'm sorry. Who's asking?

Uh, I'm afraid you have the wrong room. Thank you.

Wall Street Journal.

Yes?

Uh, I'm sorry. Say again?

Uh, no. No, thank you. No calls.

Uh, I think they have the wrong number.

Yeah, no calls. Thank you. Uh, wait.

I'm sorry. If it's, uh, if it's two men from the front desk, uh, they can call, but no outside calls.

Wait, actually, just let them through.

Wait, wait. Ma'am?

f*ck.

Yes?

Uh, wait. Is it, uh, is it a lawyer?

Yeah, no, no, no, I mean the people who are asking.

Ask them if they are lawyers.

Uh, no. Tell her that, uh, she has the wrong number and there's no Mr. Snowden here.

Yeah.

Hi, I'm the, uh, client. Heh heh!

Uh, pretty good. I... I'm doing well.

Okay.

Okay.

Yeah.

Okay, that... That's great.

Uh, is it okay if I bring equipment?

'Cause I'm just kind of going, uh, so I can leave in any direction at any time and not come back if necessary.

Okay.

Okay, that sounds good.

Thank you, uh, thank you so much for helping me.

Ahem.

Okay.

Yeah, so, and so is there a precedent for this, where Hong Kong would extradite someone for political speech?

Mm-hmm.

The President certainly does not welcome the way that this debate has earned greater attention in the last week.

The leak of classified information about sensitive programs that are important in our fight against t*rrorists who would do harm to Americans, uh, is a problem, but the debate itself is legitimate and should be engaged.

All right, so which ones do we want here, then?

This is operational stuff, so we mustn't say any of this.

So redact that.

Go to the top.

What about the Alexander quote?

Yeah, that's in TARMAC.

"Why can't we collect all the signals all the time?

Sounds like a good summer homework project for Menwith."

Keith Alexander, the head of the NSA, on a visit to U.K.

This one. Yeah.

It's a Secret document, isn't it? Secret document.

We've got a stick here which should just have 3 single... slides on them.

If it's got more than 3 single slides, we have to be extremely careful.

Yeah? Yeah, that's it.

This is really dangerous stuff for us at Guardian.

If you make mistakes at the very end, where we kept it all under lock and key and...

And no one knows... You know, I'm not saying that... they will come in and smack the front door down if we... If we elaborate on that.

And he said the Prime Minister's extremely concerned about this.

And they kept saying, "And this is from the very top."

As you can see on this map, the flight that reportedly has Snowden aboard has almost reached its destination here in Moscow, scheduled to land in the Russian capital within minutes.

As you may have heard, there is a CIA, uh, agent who has revealed a lot of information, and he is now trapped in the, um, the airport in Moscow.

We managed to get him out of Hong Kong, but when he landed in the Moscow airport, the American government had cancelled, uh, his passport.

So formally, he hasn't entered into Russian territory.

He's in the transit area of the airport, and one of our people is accompanying him.

We are trying to arrange a private jet, uh, to, um, take him from, uh, Moscow to, uh, Ecuador or perhaps maybe Venezuela or maybe Iceland, um, countries where he would be safe.

May I collect all phones, please?

Okay.

Ahem.

I have everything here, so...

Put them in the refrigerator. Heh heh!

So...

So, as you know, in June, Snowden was charged with 3 legal violations, felonies, principally under a World w*r I-era criminal law called the Espionage Act.

Uh, the Espionage Act is an extremely broad criminal prohibition against the sharing or dissemination of what's called national defence information.

It was only used to, uh, prosecute people who had been accused of acting with a foreign power.

Uh, spies, not whistle-blowers.

And it's a very unusual legal representation, I think, not just for all of you, but for me as well.

Um, the Espionage Act does not distinguish between leaks to the press in the public interest, um, and selling secrets to foreign enemies for personal profit.

So, under the Espionage Act, it's not a defence if the information that was disclosed should not have been withheld in the first place, that it was improperly classified.

It's not a defence if the dissemination was in the public interest, that it led to reforms.

Um, even if a court determines that the programs that were revealed were illegal or unconstitutional, that's still not a defence under the Espionage Act.

The government doesn't have to defend the classification, it doesn't have to demonstrate harm from the release.

Um, all of this is irrelevant, so when we say that the trial wouldn't be fair, we're not talking about what human rights lawyers think of as fair trial practices.

We're saying the law... The statute itself...

Um, eliminates any kind of defence that Snowden might be able to make, and essentially would equate him with a spy.

And of course, those 3 counts could be increased to a 100 or 200 or 300.

They could charge him separately for each document that has been published by a journalist.

And I think that... That we all recognize, even though we sit here as lawyers in a lawyers' meeting, that... That it's probably 95% politics and 5% law how this will be resolved.

Mr. Snowden has been charged with very serious crimes, and he should be returned to the United States, where he will be granted full due process and every right available to him as a United States citizen, uh, facing our justice system under the Constitution.

No, I don't think Mr. Snowden was a patriot.

I called for a thorough review of our surveillance operations before Mr. Snowden made these leaks.

My preference, and I think... the American people's preference, would have been for a lawful, orderly examination of these laws;

A, uh, thoughtful, fact-based debate uh, that would then lead us to a better place.

Oh, my God.

David.

Hello, my baby, how you doing?

I'm okay. You okay?

Mm-hmm. Let's go.

I just want to go home.

Okay, okay, okay.

You just have to walk in.

How are you? Good, good. I'm totally fine.

I didn't sleep at all. I couldn't sleep. I know.

Recent reports have revealed that the NSA have access to encryption keys, and they paid tech companies to introduce back doors in encryption protocols.

So we're going to talk about ways in which we can defend ourselves against governments spying on us.

So Mr. Jacob Appelbaum is an encryption and security software developer and journalist.

Ladar Levinson is the founder of the encrypted email service Lavabit, used by Edward Snowden. You have the floor.

Thank you.

Lavabit is an email service that hopefully one day will be able to, um, stand on its own without any references to Snowden.

My service was designed to remove me from the possibility of being forced to violate a person's privacy.

Quite simply, Lavabit was designed to remove the service provider from the equation.

By not having logs on my server and not having access to a person's emails on disk, I wasn't eliminating the possibility of surveillance, I was simply removing myself from that equation, in that surveillance would have to be conducted on the target...

Either the sender or the receiver of the messages.

But I was approached by the FBI quite recently and told that because I couldn't turn over the information from that one particular user, I would be forced to give up those SSL keys and let the FBI collect every communication on my network without any kind of transparency.

And, of course...

I wasn't... comfortable with that, to say the least.

Um, more disturbing was the fact that I couldn't even tell anybody that it was going on.

So I decided if I didn't win the fight to unseal my case, if I didn't win the battle to be able to tell people what was going on, then my only ethical choice left was to shut down.

Think about that.

I believe in the rule of law, I believe in the need to conduct investigations, but those investigations are supposed to be difficult for a reason.

It's supposed to be difficult to invade somebody's privacy because of how intrusive it is, because of how disruptive it is.

If we can't... If we don't have our right to privacy, how do we have a free and open discussion?

What good is the right to free speech... if it's not protected, in the sense that you can't have a private discussion with somebody else about something you disagree with.

Think about the chilling effect that that has.

Think about the chilling effect it does have on countries that don't have a right to privacy.

I've noticed a really interesting discussion point, which is that what people used to call liberty and freedom, we now call privacy.

And we say, in the same breath, that privacy is dead.

This is something that really concerns me about my generation, especially when we talk about how we're not surprised by anything.

I think that we should consider that when we lose privacy, we lose agency, we lose liberty itself because we no longer feel free to express what we think.

There's this myth of the passive surveillance machine.

But actually, what is surveillance except control?

This notion that the NSA are passive? This is nonsense.

What we see is that they actively attack European citizens, American citizens, and, in fact, anyone that they can if they perceive an advantage.

Okay.

Right?

Um, I'll have to give that in testimony.

What are you going to tell?

Uh, everything I can, truthfully.

What... What will you talk about?

Uh, whatever the questions they ask me.

Yeah, I think it's over there. Okay, all right.

Thank you.

Hey. How are you? Good.

How are you? Good to see you again. Nice to meet you, yes.

What do you think they're doing to reporters, those of us that are working directly with, uh, the Snowden documents?

How do you think they would approach dealing with people like us?

Uh, you're... You're on the cast-iron cover list, which means any... Any electronic, uh, device you use that they can attach to you, they'll record and capture all that data.

And what do they do with that data?

They're just trying to figure out what we're doing?

Uh, well, they're trying... That's part of it, but the other part... Primarily, the part for them, I think, is to find the sources of information you're getting.

So if I have a confidential source who's giving me information as a whistle-blower, and he works within the U.S. government, and he's concerned about what he perceives as violations of the Constitution, um, and he gets in touch with me, they...

Yep. Go ahead, yeah.

Yeah, from there on, they would nail him and start watching everything he did, and if he started passing data, I'm sure they'd take him off the street.

I mean, the way you'd have to do it is like Deep Throat did, right, in the Nixon years...

Meet in the basement of a parking garage, physically.

"Let's disassociate our metadata one last time

"so we don't have a clear record of your true name in our final communication chain.

"This is obviously not to say you can't claim your involvement, "but as every trick in the book is likely to be used in looking into this, "I believe it's better that that particular disclosure come on your own terms.

"Thank you again for all you've done.

"So sorry again for the multiple delays, "but we've been in uncharted territory, with no model to benefit from.

"If all ends well, perhaps the demonstration that our methods worked

"will embolden more to come forward.

Citizen."

So the update that I want to give you is about the new, um...

The new source that... That we...

Okay. Um, that, Um, this is what... This is the per...

You know, this is the person who's doing the most...

Mm-hmm, right, right. The work on it.

Um... and now... And now, like, basically what's happened is...

And... That's actually...

That's really dangerous, um... On the source's side.

Do they know how to take care of themselves?

Well, you know, I mean he... I mean, it's, um...

It's... It's all being done...

Through this. Okay.

And they're all talking...

This way. Okay.

And... I was gonna say, one of the big questions there is, can they handle it, you know, do they have the...

No, they're very careful, um, even there, through that.

Okay, okay. Yeah.

And...

That's where that is.

Wow, that's really something.

Did you know that?

It's not the actual planes. Right, right, right.

You mean the control.

It's the process...

Ah. Who's sending the... Yeah.

There's a... There's a chart, you know?

There's, like, a whole layout and it... For every one...

That is really bold, it's really risky, but, you know, that's the thing. There's more.

If they understand what they're doing...

I mean, there's this chart. It goes like this.

It shows the decision-making chart.

It's a chart that goes... It's... It's shaped like this.

So up here, it says... Mm-hmm.

That's the decision-making chart for each... one.

It's so political!

This is... This part's amazing.

That's...

That's f*cking ridiculous.

It's... This is... It's so shocking.

That's... No, I know.

That's the population of an entire country.

I know.

That's what we're working on.

That person is incredibly bold, but, um...

But also very well aware.

Right. I... You know, I just hope... I mean...

No, I mean, the boldness of it is shocking, but, I mean, it was obviously motivated by what you did.

I mean, it... This is going to...

This is going to... That could raise the profile of this whole political situation with whistle-blowing to a whole new level because...

Exactly. It's gonna...

Yeah. I mean, I actually think that's a great thing.

And I think people are gonna see what's being hidden again, again, by a totally different part of the government.
Post Reply