Book Read Free

Dark Mirror

Page 49

by Barton Gellman


  sexual metaphors in, 203–4

  CRITIC messages, 53

  cryptographic keys, 105, 114, 188, 216, 219, 231, 240, 350–51

  cryptographic signature, importance to ES of, 105–6, 128–30, 137, 386–87

  cryptography, xvii

  as counterforce to surveillance, 350–52

  ES’s proficiency in, 52

  NSA’s hacking of, 280–81

  privacy and, 8, 350–52

  private keys in, 4, 105, 258, 404

  spread of consumer technology for, 312

  Customs and Border Patrol, U.S., 198, 276

  electronic devices classed as “containers” by, 5–6, 364–65

  Poitras regularly detained by, 5

  cyber attacks, Chinese, 34–35, 57–58, 83

  cyber security tradecraft, 350–52

  air gap in, 72

  BG’s acquisition of, xvi–xvii, 6

  in communication among ES, Poitras, and BG, 2–4

  cypherpunks in development of, 7–8

  cypherpunks, privacy as obsession of, 7–8

  “Cypherpunk’s Manifesto, A” (Hughes), 7

  Daily Kos, 271

  Danes, Claire, 303, 306–7, 308

  data collection, by NSA:

  access to internet and telecom data of, 111–12, 142, 199, 310

  balance of power between government and governed skewed by, 167–68

  in bulk, see mass surveillance

  cellphone location tracking, 318–20, 324–25

  “collect it all” ethos of, 337–38, 348

  continued concealment of, 166–67

  of electronic address books, 315–18

  MAINWAY as repository of, 171

  optimization of, 191–92

  overcollection in, 343–44

  trust issue in, 164

  U.S. persons’ records minimized in, 339–45, 363

  volume problems of, 172–73

  see also surveillance

  “Dave M. Churchyard” (ES’s CIA code name), 54

  De, Rajesh, 152, 341

  on harm vs. public’s right to know, 183, 334–35

  on journalists’ First Amendment rights, 248

  on misuse of surveillance, 348, 350

  on NSA’s use of E.O. 12333, 302

  Deets, Lindsey, 43

  Def Con, 177, 180, 192, 194

  Defense Intelligence Agency, 75

  Defense Language Aptitude Battery, 47

  de Kerchove, Gilles, 181–82

  Dell Advanced Solutions Group, ES as employee of, 34–35, 57–60, 61–62, 75

  Democratic National Committee, 322

  denial and deception (D&D), 201–2, 224–25, 272, 399

  “Denial and Deception—Ashcroft.doc,” 222

  deterministic selectors, 124

  Devroy, Ann, 91

  digital commons, xi, xii

  digital security, see privacy, digital

  digital technology, mass surveillance made possible by, 178

  digital trails, xvi, 3, 6

  “dirty word searches,” 69–70

  Dolan, James, 234

  Donilon, Tom, 207

  Downie, Leonard, Jr., 16, 90, 92, 380

  doxing (document dumping), 322–23

  Drake, Tom, 231

  Drummond, David, 300

  Duffy, Mike, 94, 96

  ECI (exceptionally controlled information), cover names of, 69–70

  Edelson, Maurice, 94–95

  EGOTISTICALGIRAFFE (EGGI), 80

  18 U.S.C. § 798, “Disclosure of classified information,” 101–2

  election, U.S., of 2016, 322

  Electronic Frontier Foundation, 7, 65, 365

  Ellard, George, 247, 276, 323

  Ellsberg, Daniel:

  ES compared with, 295–96

  espionage charge against, 288

  ES’s online conversation with, 289–95

  Guardian piece on ES by, 290

  lifelong preoccupation with whistleblowers of, 294–95

  on NSA’s blackmail capability, 290

  Pentagon Papers revealed by, 288, 380

  prosecution of, 308

  on rarity of whistleblowers, 295

  Emo Cat, 191–92, 195

  encryption, see cryptography

  End-to-End encryption, 352

  Energy Department, U.S., 39

  EPICSHELTER (proposed backup and recovery system), 59–60, 61

  espionage:

  breakdown of distinction between foreign and domestic, xii, 338–39

  news leaks vs., 275–76

  see also surveillance

  Espionage Act (1917), 96, 99, 101, 261, 275, 308, 381

  ES on, 292

  Executive Order 12333, 84, 282, 287, 302, 338, 410

  impact on U.S. persons of, 315–16, 317, 318, 335–36

  see also surveillance, foreign

  Executive Order 13526, 265

  Expeditionary Access Operations, see S3283

  Facebook, 112

  illegal spying by, 198

  Face the Nation, BG’s appearance on, 229–30

  FASCIA II, 172

  Federal Bureau of Investigation (FBI), 14, 75, 86

  culture of, 205

  encryption technology as hindrance to, 312

  illegal surveillance by, 180–81

  Verizon metadata collected by, 142

  Federal Trade Commission, 198

  Felten, Ed, 232–33

  on secrets revealed by metadata, 162–63

  Firefox, Tor Browser Bundle of, 80

  First Amendment, of U.S. Constitution, 14, 96, 99, 114, 185, 248, 261

  FIRSTFRUITS, 225, 277

  Brand on, 274

  DOJ crime reports produced by, 274–75

  internet rumors about, 271–72

  tracing journalistic leaks as goal of, 272–73

  FISA Amendments Act (2008), 69, 86, 94, 111, 126, 148, 338

  Section 702 of, 123

  FISA Court, see Foreign Intelligence Surveillance Court

  Five Eyes intelligence allies, 28, 69, 177, 311

  Fleischer, Ari, 273, 406

  Flynn, Michael T., 377

  Forbes, 75

  Foreign Denial and Deception Committee, 274, 278

  Foreign Intelligence Surveillance Act (1978), 282, 338

  and legal standard of relevance, 143–44

  restrictions on NSA of, 122

  Foreign Intelligence Surveillance Court, 111–12, 122, 123, 126, 263–64, 283

  in annual review of PRISM program, 125

  business records access authorized by, 143, 171

  five-year limit on retention imposed by, 173, 179

  mass surveillance authorized by, 111–12

  NSA call data collection authorized by, 157, 165

  NSA overseas collection as avoiding restrictions of, 317

  relevance standard and, 143–44

  STELLARWIND concealed from, 170

  foreign surveillance, see surveillance, foreign

  4chan, 192

  Fourth Amendment, of the U.S. Constitution, 65, 86, 125, 347

  border searches and, 6

  France Telecom, 197

  Freedom of Information Act, BG and, 276–78

  Freedom of the Press Foundation, 234

  Friedersdorf, Conor, 344

  Gansa, Alex, 303–5, 308

  GCHQ, 79, 175

  in penetration of Google cloud, 299, 301

  Gellman, Barton (BG):

  Alexander’s proposed raid on, 245–46, 249

  Aspen Institute plenary session moderated by, 1
55–66, 181–82

  in attempts to authenticate leaked documents, 3, 17–18

  attempt to learn ES’s identity rejected by, 17

  black budget story of, 227–28

  and catch-22 in consultation about classified materials, 270–71

  Century Foundation fellowship of, 93

  compromised Google accounts of, 232

  cyber security tradecraft acquired by, xvi–xvii, 2–4, 6

  digital trail of, xvi

  ES and, see Snowden. Edward

  fake encryption keys for, 231

  first NSA story published by, 198

  Freedom of Information Act requests of, 276–78

  Google engineers’ meetings with, 279–81, 283, 297–98

  government attempts to discredit reporting by, 14–15

  on Greenwald’s contributions to NSA story, 141

  Greenwald’s false accusations against, 138, 140–41, 387–90

  hacking of computer and devices belonging to, 229–35

  Hayden’s relationship with, 141–42

  high school lawsuit of, 14

  Hong Kong trip abandoned by, 135–36

  intelligence community’s ostracism of, 186

  as investigative reporter, xii–xiii

  journalistic fallibility of, 9–10

  Mueller on panel with, 249–50

  NSA story offered to Post by, 89–91, 98

  Pandora files received by, 99

  Poitras and, see Poitras, Laura

  as possible counterintelligence target, 248–49

  Post career of, 91–93

  PRISM files received by, 99

  PRISM slides shown to Baron by, 109–13

  in search for safe repository of Pandora backups, 99–100, 102

  secrecy issues as long-standing concern of, 262

  security lapses of, 239

  security measures for NSA story outlined by, 105–7

  Soltani hired by Post to work with, 189–91, 198–99

  as subject of files in Pandora archive, 221–22, 272, 274

  surveillance as increasing preoccupation of, 93, 234–35, 238–42, 255

  viewed as ES’s “accomplice,” 323

  gellman.us/pgp, encryption tools at, 8

  Gellman v. DHS et al., 276–78

  Gellman v. Wacker, 14

  Geneva, ES’s CIA posting to, 54

  gigabytes, 22

  Gladwell, Malcolm, 366

  Gompert, David C., 311–12

  Goodlatte, Bob, 163

  Google, 76, 111, 336

  foreign facilities of, 282, 286

  hacking of BG’s accounts on, 232

  illegal spying by, 198

  PRISM and, 283, 285, 300

  Google cloud, 317, 352

  boundary between public internet and, 281–82

  GCHQ in penetration of, 299, 301

  NSA’s penetration of, 279–88, 297–302, 408

  Google Front End, 284–85

  governing norms, 248–49, 347–48

  government:

  secrecy and, see secrecy, government

  in standoff with ES, 352–53

  trust and, 180–84

  GPG (GnuPG), 8, 365, 366

  Graham, Don, 103

  Graham, Katharine, 92, 379

  Graham, Lindsey, 158

  Graham, Mary, 263

  Granick, Jennifer, 339, 342, 343

  Graph-in-Memory, 174, 177, 179, 180, 181

  Greenberg, Karen, 4

  Greenwald, Glenn, 213, 241, 255, 325

  Alexander’s proposed raid on, 245–46, 247–48, 249

  BG on contributions to NSA story by, 141

  BG’s view of, 12

  in claims about ES’s unreleased files, 257–58

  in decision not to publish some material from Pandora, 269

  ES’s decision to leak documents to, 16

  ES’s first approaches ignored by, 12, 366–67

  ES’s first contact with, 66

  ES’s interviews with, 138, 346

  ES’s relationship with, xiii

  and ES’s wiretapping claims, 327

  exaggerated claims of, 139

  false accusations against BG by, 138, 140–41, 387–90

  first Snowden leaks story of, 142, 144

  Poitras on, 138

  as possessing NSA documents not seen by BG, 330

  Post denigrated by, 139, 390

  Guardian, 387

  Ellsberg’s piece on ES in, 290

  ES’s leaks published in, 77, 142, 144

  Guare, John, 159

  Gulf War (1990–1991), 15, 223

  Gunn, Ben, 175

  hacking:

  of BG’s computers and devices, 229–35

  by China, 34–35, 83

  NSA and, see National Security Agency (NSA), hacker culture of

  Hanssen, Robert, 247, 404

  Hardy, David M., 278

  Harrison, Sarah, 293, 307

  Hawaii Technical Directorate, Office of Information Sharing at, 35

  Hayden, Caitlin, 270

  Hayden, Michael V., 165, 234

  BG’s relationship with, 141–42

  government secrecy defended by, 325

  on journalists’ disclosure of classified information, 222

  on power of active SIGINT, 309

  on secrets revealed by metadata, 163

  STELLARWIND overseen by, 26, 70–71, 169–70

  Heartbeat, 36, 72–79

  conceived as one-stop portal to worldwide data systems, 74–76

  ES’s creation and supervision of, 72–73

  PKI digital identity certificate of, 77

  PKI of ES’s supervisor used by, 77–79

  Holder, Eric, 96–97, 234, 249

  Homeland (TV series), ES’s virtual chat with cast and crew of, 303–9, 320

  Hong Kong:

  ES in flight to, 27, 84, 88

  Poitras and Greenwald’s interview with ES in, 138, 251

  Hoover, J. Edgar, 181

  Huffington Post, 138

  Hughes, Eric, 7

  human rights abuses, government coverups of, 262–63

  HUMINT (human intelligence), 67

  Hunt, Ira “Gus,” 62, 336

  Hussein, Saddam, 223

  identity certificates, 67, 71, 77, 78–79

  “incidentally obtained information”:

  definition of, 287

  as misleading term, 340

  see also mass surveillance

  individual taskings, 124

  information, as power, xvi

  Information Assurance Directorate, 84, 117

  information gathering, see data collection, by NSA

  Inglis, John C. “Chris,” 148, 159, 160–61, 270, 314

  intelligence community:

  BG ostracized by, 186

  BG’s renewed reception in, 213

  bin Laden phone story as article of faith in, 273–74, 406

  “collect it all” ethos of, 311–12, 335–36, 337–38, 348

  ES’s motives and actions as seen by, 334–35

  government classified spending for (black budget), 227–28

  as hostile to public debate, 185

  incompatible data systems of, 74

  iPhone security and, 215–20

  public distrust of government as baffling to, 182–84

  responses to whistleblowers by, 20

  as totally opposed to exposure of secret programs, 260

  whistleblowers in, 368

  intelligence gathering:

  right to privacy vs. need for, 313–14

 
see also surveillance

  Intellipedia, 76

  Intercept, 248

  internet:

  boundary between Google cloud and, 281–82

  cost to privacy of, 6–7

  internet companies:

  address books transmitted by, 316

  NSA given access to data by, 111–12, 121–22, 124, 142, 199, 310

  PRISM and, 146–48

  see also telecommunications companies

  intrusion sets, 83

  investigative journalism, BG’s career in, xii–xiii

  iPhones:

  “jailbreaking” and, 215

  NSA and CIA preoccupation with, 215–20

  STRAWHORSE and, 216–20

  Iran, Islamic Revolution in, 195

  Iran hostage crisis, 264–65

  Iraq, WMDs in, 223, 238, 263, 368, 405

  Islamic Revolution (1979), 195

  Jaffer, Jameel, 321

  Jamboree (annual NSA cyberweapons conference), 187–88, 215, 216, 220

  hacker culture of, 189

  JavaScript, 80–81

  Johns Hopkins University, Computer Career Institute at, 41–42

  Joint Counterintelligence Training Academy (JCITA), 57

  Joint Worldwide Intelligence Communications System (JWICS), 75

  journalists:

  Alexander’s proposed raids on, 245–46, 249

  and balance between harmful revelations and public’s right to know, 183, 222, 260–61, 267–68, 334–36

  characterized as “accomplices,” 246–47

  Clapper’s rejection of consultation with, 268

  falsely blamed for NSA’s loss of bin Laden phone surveillance, 273–74, 406

  First Amendment rights of, 248, 261

  as FIRSTFRUITS targets, 272–73

  governing norms and, 248–49

  lie detecting by, 9–10, 366

  NSA files on, 222–25

  prosecution of, 96–97, 101, 114

  Jow Ga kung fu, 44

  Justice Department, U.S., 14

  FIRSTFRUITS reports to, 274–75

  perversion of legal standard of relevance by, 143–44

  Kaiser, Bob, 98

  Kay, David, 14–15

  Kennedy, Jay, 103, 104, 135

  King, Martin Luther, Jr., 180

  Kinsley, Michael, 302

  Kissinger, Henry, 288

  Klein, Mark, 310–11

  “Know Privacy” (Soltani’s graduate thesis), 196

  Koch, Werner, 8

  Kornblut, Anne, 141, 240–41

  Kucherena, Anatoly, 251

  Kunia Regional Security Operations Center, 31

  cryptoparty at, 65–66

  ES’s exfiltration of data at, 68–69, 377

  ES’s exploration of network of, 66–70, 377

  ES’s Heartbeat program at, see Heartbeat

  ES’s reckless behavior at, 64–66

  ES’s responsibilities at, 35–36, 75

 

‹ Prev