The Edward Snowden Affair (43 page)

Read The Edward Snowden Affair Online

Authors: Michael Gurnow

Tags: #History, #Legal, #Nonfiction, #Political, #Retail

The “Information Lockdown” response to privacy invasion was countered by Snowden’s nightmare. After reviewing the NSA’s capabilities, others willfully surrendered to Clapper and his coalition, claiming it was impossible to function in modern society without technology and any preventative measures were not only time-consuming, but ultimately futile. But a third group emerged, the antipode to those who dove deeper into the complexities of the IT world. It admired Information Lockdown’s integrity and agreed with the latter half of the Clapper’s Children philosophy. However, it criticized Clapper’s Children for giving up so easily and said those who were willing to wave the white flag before so much as stepping foot on the electronic battlefield, had sold their privacy for a handful of customized coupons. The third group’s ideology was simple. The NSA can’t surveil what isn’t there. They turned in their phones, cancelled their social networking accounts and only use email for business purposes. The Levinsons chose to leave nothing but an envelope’s metadata for the authorities to scan and record. The neo-Luddites argue there is little use in owning a cell phone if it has to be kept in the refrigerator and, unlike email, it is much harder to hide the fact a letter’s contents have been read. And perhaps this will be a prevailing model: the technological haves and have-nots. This is one of the inadvertent gains from the surveillance debacle. U.S. intelligence has offered society the opportunity to step away from the cold, automated, quasi-human interaction of electronic communication and return to a conversational dynamic which is more rewarding and genuine. If this becomes the diametrically opposed standard, though American intelligence used the technology found in Aldous Huxley’s
Brave New World
to achieve its Orwellian objective, privacy’s salvation might ironically lie in Huxley’s character of John Savage.

The underlying philosophical issue is whether liberty and security are mutually exclusive ideas. Some critics of Snowden state the surveillance debate is overreaction and only those who have something to hide need worry. Snowden’s supporters are quick to inquire whether these critics use account passwords other than “1234” and, if not, why they are concerned if a random person reads their email. Bill O’Reilly made a fine point by highlighting a history of surveilled information that had been used to undermine political or economic opposition. Other privacy advocates, such as the anonymous collective behind the encrypted email provider Riseup.net, argue surveillance is used as a weapon to induce conformity:

What surveillance really is, at its root, is a highly effective form of social control. The knowledge of always being watched changes our behavior and stifles dissent. The inability to associate secretly means there is no longer any possibility for free association. The inability to whisper means there is no longer any speech that is truly free of coercion, real or implied. Most profoundly, pervasive surveillance threatens to eliminate the most vital element of both democracy and social movements: the mental space for people to form dissenting and unpopular views.
76

Many journalists utilize anonymous web browsers to evade detection when exposing human rights violations.
77
The same programming is used by drug traffickers.
78
So the question ultimately becomes whether an individual is willing to surrender the sale of knives because there is the potential the cutlery could be used as a murder weapon.
79
But the analogy is a metaphorical Dutch door. It could symbolize the argument for surveillance or free speech; its value lies in representing the current political atmosphere. There is no gray area in which to reach a compromise, because those entrusted to protect the people have abused their power. The American populace is being forced to choose between liberty and safety. Freedom of speech and expression carries the inherent risk of personal danger at the expense of absolute security. Perfect safety eliminates freedom and privacy.

Appendix:
Chronology of disclosures supplied by Snowden

The Guardian
– G |
The Washington Post
– WP |
South China Morning Post
– SCMP |
Der Spiegel
– DS |
O Globo
– OG |
Rede Globo
– RG |
Epoca
– E |
Fantastico
– F |
Norddeutscher Rundfunk
/
North German Broadcasting
– NGB |
Süddeutsche Zeitung
– SZ |
The Wall Street Journal
– WSJ |
The Age
– A |
ProPublica
– PP | * – accompanying documentation

D
ATE
P
UBLICATION
A
RTICLE
T
ITLE
While in Hong Kong
Wednesday, June 5
G
“NSA collecting phone records of millions of Verizon customers daily”*
Thursday, June 6
G
“NSA Prism program taps in to user data of Apple, Google and others”*
Thursday, June 6
WP
“U.S. Intelligence Mining Data From Nine U.S. Internet Companies In Broad Secret Program”*
Friday, June 7
G
“Obama orders US to draw up overseas target list for cyber-attacks”*
Friday, June 7
WP
“U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program” (rewrite of previous article)*
Friday, June 7
G
“UK gathering secret intelligence via covert NSA operation”
Saturday, June 8
G
“Boundless Informant: the NSA’s secret tool to track global surveillance data”*
Sunday, June 9
G
Poitras Interview, Pt. I (12 minutes)
Friday, June 13
SCMP
“Edward Snowden: US government has been hacking Hong Kong and China for years”
Saturday, June 14
SCMP
“Edward Snowden: Classified US data shows Hong Kong hacking targets”
Sunday, June 16
G
“GCHQ intercepted foreign politicians’ communications at G20 summits”*
Monday, June 17
G
Online chat
Thursday, June 20
G
“The top secret rules that allow NSA to use US data without a warrant”*
Friday, June 21
G
“GCHQ taps fibre-optic cables for secret access to world’s communications”*
Saturday, June 22
SCMP
“Snowden reveals more US cyberspying details”
Saturday, June 22
SCMP
“US spies on Chinese mobile phone companies, steals SMS data: Edward Snowden”
Saturday, June 22
SCMP
“NSA targeted China’s Tsinghua University in extensive hacking attacks, says Snowden”
While in Pre-Asylum Russia
Thursday, June 27
G
“How the NSA is still harvesting your online data”
Thursday, June 27
G
“NSA collected US email records in bulk for more than two years under Obama”*
Saturday, June 29
DS
“NSA Spied on European Union Offices”
Sunday, June 30
G
“New NSA leaks show how US is bugging its European allies”*
Sunday, June 30
DS
“NSA Snoops on 500 Million German Data Connections”
Monday, July 1
DS
“How the NSA Targets Germany and Europe”*
Saturday, July 6
OG
“U.S. spied on millions of e-mails and calls of Brazilians”*
Saturday, July 6
OG
“U.S. expands the surveillance apparatus continuously”*
Sunday, July 7
RG
8-minute television report with previously unpublished classified documentation concerning the NSA’s surveillance of Brazil*
Monday, July 8
DS
Appelbaum interview
Monday, July 8
OG
“NSA and CIA have maintained staff in Brasilia to collect satellite data”
Tuesday, July 9
OG
“U.S. spies spread through Latin America”*
Thursday, July 11
G
“Microsoft handed the NSA access to encrypted messages”
Friday, July 12

G9 meeting
Saturday, July 20
DS
“‘Prolific Partner’: German Intelligence Used NSA Spy Program”
Saturday, July 27
E
“Spies of the digital age”*
Wednesday, July 31
G
“XKeyscore: NSA tool collects ‘ nearly everything a user does on the internet’”*
While in Post-Asylum Russia
Thursday, August 1
G
“NSA pays £100m in secret funding for GCHQ”
Thursday, August 1
G
“GCHQ: inside the top secret world of Britain’s biggest spy agency”
Thursday, August 1
NGB
“Intelligence services use company” broadcast
Friday, August 2
SZ
“Snowden revealed names of spying telecom companies”
Friday, August 2
E
“Letter from the American Ambassador in Brazil thanks the NSA for its Support”*
Monday, August 5
DS
“Mass Data: Transfers from Germany Aid US Surveillance”*
Friday, August 9
G
“NSA loophole allows warrantless search for US citizens’ emails and phone calls”*
Monday, August 12
DS
“Ally and Target: US Intelligence Watches Germany Closely”
Thursday, August 15
WP
“NSA broke privacy rules thousands of times per year, audit finds”*
Tuesday, August 20
WSJ
“New Details Show Broader NSA Surveillance Reach”
Thursday, August 22
G
“NSA paid millions to cover Prism compliance costs for tech companies”*
Monday, August 26
DS
“Codename ‘Apalachee’: How America Spies on Europe and the UN”*
Wednesday, August 28
SZ/NGB
“British Officials Have Far-Reaching Access to Internet and Telephone Communications”
Thursday, August 29
A
“Australian spies in global deal to tap undersea cables”*
Thursday, August 29
WP
“NSA paying U.S. companies for access to communications networks”*
Thursday, August 29
WP
“U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”
Thursday, August 29
WP
“To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs”
Friday, August 30
WP
“U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show”
Saturday, August 31
DS
“NSA Spied on Al Jazeera Communications”
Sunday, September 1
WP
“U.S. intelligence agencies spend millions to hunt for insider threats, document shows”
Sunday, September 1
DS
“NSA Targeted French Foreign Ministry”
Sunday, September 1
F
11-minute television report with previously unpublished classified documentation concerning the NSA’s spying on Brazil and Mexico’s presidents*
Monday, September 2
WP
“Top-secret U.S. intelligence files show new levels of distrust of Pakistan”
Tuesday, September 3
WP
“U.S. documents detail al-Qaeda’s efforts to fight back against drones”
Thursday, September 5
G
“Revealed: how US and UK spy agencies defeat internet privacy and security”*
Thursday, September 5
NYT/PP
“N.S.A. Able to Foil Basic Safeguards of Privacy on Web/ Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security”*
Sunday, September 8
F
13-minute television report with previously unpublished classified documentation concerning the NSA’s surveillance of Petrobras*
Monday, September 9
DS
“iSpy: How the NSA Accesses Smartphone Data”

Sources

C
HAPTER
1

1
     Greenwald, Glenn. “Edward Snowden: NSA whistleblower answers reader questions.”
The Guardian
. June 17, 2013.
http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
.

Other books

The Ask by Sam Lipsyte
The Ax by Westlake, Donald E.
Embraced By Passion by Diana DeRicci
Tempted by Her Boss by Karen Erickson
The Road Home by Michael Thomas Ford
Twice Tempted by Jeaniene Frost