Dark Mirror
Page 49
sexual metaphors in, 203–4
CRITIC messages, 53
cryptographic keys, 105, 114, 188, 216, 219, 231, 240, 350–51
cryptographic signature, importance to ES of, 105–6, 128–30, 137, 386–87
cryptography, xvii
as counterforce to surveillance, 350–52
ES’s proficiency in, 52
NSA’s hacking of, 280–81
privacy and, 8, 350–52
private keys in, 4, 105, 258, 404
spread of consumer technology for, 312
Customs and Border Patrol, U.S., 198, 276
electronic devices classed as “containers” by, 5–6, 364–65
Poitras regularly detained by, 5
cyber attacks, Chinese, 34–35, 57–58, 83
cyber security tradecraft, 350–52
air gap in, 72
BG’s acquisition of, xvi–xvii, 6
in communication among ES, Poitras, and BG, 2–4
cypherpunks in development of, 7–8
cypherpunks, privacy as obsession of, 7–8
“Cypherpunk’s Manifesto, A” (Hughes), 7
Daily Kos, 271
Danes, Claire, 303, 306–7, 308
data collection, by NSA:
access to internet and telecom data of, 111–12, 142, 199, 310
balance of power between government and governed skewed by, 167–68
in bulk, see mass surveillance
cellphone location tracking, 318–20, 324–25
“collect it all” ethos of, 337–38, 348
continued concealment of, 166–67
of electronic address books, 315–18
MAINWAY as repository of, 171
optimization of, 191–92
overcollection in, 343–44
trust issue in, 164
U.S. persons’ records minimized in, 339–45, 363
volume problems of, 172–73
see also surveillance
“Dave M. Churchyard” (ES’s CIA code name), 54
De, Rajesh, 152, 341
on harm vs. public’s right to know, 183, 334–35
on journalists’ First Amendment rights, 248
on misuse of surveillance, 348, 350
on NSA’s use of E.O. 12333, 302
Deets, Lindsey, 43
Def Con, 177, 180, 192, 194
Defense Intelligence Agency, 75
Defense Language Aptitude Battery, 47
de Kerchove, Gilles, 181–82
Dell Advanced Solutions Group, ES as employee of, 34–35, 57–60, 61–62, 75
Democratic National Committee, 322
denial and deception (D&D), 201–2, 224–25, 272, 399
“Denial and Deception—Ashcroft.doc,” 222
deterministic selectors, 124
Devroy, Ann, 91
digital commons, xi, xii
digital security, see privacy, digital
digital technology, mass surveillance made possible by, 178
digital trails, xvi, 3, 6
“dirty word searches,” 69–70
Dolan, James, 234
Donilon, Tom, 207
Downie, Leonard, Jr., 16, 90, 92, 380
doxing (document dumping), 322–23
Drake, Tom, 231
Drummond, David, 300
Duffy, Mike, 94, 96
ECI (exceptionally controlled information), cover names of, 69–70
Edelson, Maurice, 94–95
EGOTISTICALGIRAFFE (EGGI), 80
18 U.S.C. § 798, “Disclosure of classified information,” 101–2
election, U.S., of 2016, 322
Electronic Frontier Foundation, 7, 65, 365
Ellard, George, 247, 276, 323
Ellsberg, Daniel:
ES compared with, 295–96
espionage charge against, 288
ES’s online conversation with, 289–95
Guardian piece on ES by, 290
lifelong preoccupation with whistleblowers of, 294–95
on NSA’s blackmail capability, 290
Pentagon Papers revealed by, 288, 380
prosecution of, 308
on rarity of whistleblowers, 295
Emo Cat, 191–92, 195
encryption, see cryptography
End-to-End encryption, 352
Energy Department, U.S., 39
EPICSHELTER (proposed backup and recovery system), 59–60, 61
espionage:
breakdown of distinction between foreign and domestic, xii, 338–39
news leaks vs., 275–76
see also surveillance
Espionage Act (1917), 96, 99, 101, 261, 275, 308, 381
ES on, 292
Executive Order 12333, 84, 282, 287, 302, 338, 410
impact on U.S. persons of, 315–16, 317, 318, 335–36
see also surveillance, foreign
Executive Order 13526, 265
Expeditionary Access Operations, see S3283
Facebook, 112
illegal spying by, 198
Face the Nation, BG’s appearance on, 229–30
FASCIA II, 172
Federal Bureau of Investigation (FBI), 14, 75, 86
culture of, 205
encryption technology as hindrance to, 312
illegal surveillance by, 180–81
Verizon metadata collected by, 142
Federal Trade Commission, 198
Felten, Ed, 232–33
on secrets revealed by metadata, 162–63
Firefox, Tor Browser Bundle of, 80
First Amendment, of U.S. Constitution, 14, 96, 99, 114, 185, 248, 261
FIRSTFRUITS, 225, 277
Brand on, 274
DOJ crime reports produced by, 274–75
internet rumors about, 271–72
tracing journalistic leaks as goal of, 272–73
FISA Amendments Act (2008), 69, 86, 94, 111, 126, 148, 338
Section 702 of, 123
FISA Court, see Foreign Intelligence Surveillance Court
Five Eyes intelligence allies, 28, 69, 177, 311
Fleischer, Ari, 273, 406
Flynn, Michael T., 377
Forbes, 75
Foreign Denial and Deception Committee, 274, 278
Foreign Intelligence Surveillance Act (1978), 282, 338
and legal standard of relevance, 143–44
restrictions on NSA of, 122
Foreign Intelligence Surveillance Court, 111–12, 122, 123, 126, 263–64, 283
in annual review of PRISM program, 125
business records access authorized by, 143, 171
five-year limit on retention imposed by, 173, 179
mass surveillance authorized by, 111–12
NSA call data collection authorized by, 157, 165
NSA overseas collection as avoiding restrictions of, 317
relevance standard and, 143–44
STELLARWIND concealed from, 170
foreign surveillance, see surveillance, foreign
4chan, 192
Fourth Amendment, of the U.S. Constitution, 65, 86, 125, 347
border searches and, 6
France Telecom, 197
Freedom of Information Act, BG and, 276–78
Freedom of the Press Foundation, 234
Friedersdorf, Conor, 344
Gansa, Alex, 303–5, 308
GCHQ, 79, 175
in penetration of Google cloud, 299, 301
Gellman, Barton (BG):
Alexander’s proposed raid on, 245–46, 249
Aspen Institute plenary session moderated by, 1
55–66, 181–82
in attempts to authenticate leaked documents, 3, 17–18
attempt to learn ES’s identity rejected by, 17
black budget story of, 227–28
and catch-22 in consultation about classified materials, 270–71
Century Foundation fellowship of, 93
compromised Google accounts of, 232
cyber security tradecraft acquired by, xvi–xvii, 2–4, 6
digital trail of, xvi
ES and, see Snowden. Edward
fake encryption keys for, 231
first NSA story published by, 198
Freedom of Information Act requests of, 276–78
Google engineers’ meetings with, 279–81, 283, 297–98
government attempts to discredit reporting by, 14–15
on Greenwald’s contributions to NSA story, 141
Greenwald’s false accusations against, 138, 140–41, 387–90
hacking of computer and devices belonging to, 229–35
Hayden’s relationship with, 141–42
high school lawsuit of, 14
Hong Kong trip abandoned by, 135–36
intelligence community’s ostracism of, 186
as investigative reporter, xii–xiii
journalistic fallibility of, 9–10
Mueller on panel with, 249–50
NSA story offered to Post by, 89–91, 98
Pandora files received by, 99
Poitras and, see Poitras, Laura
as possible counterintelligence target, 248–49
Post career of, 91–93
PRISM files received by, 99
PRISM slides shown to Baron by, 109–13
in search for safe repository of Pandora backups, 99–100, 102
secrecy issues as long-standing concern of, 262
security lapses of, 239
security measures for NSA story outlined by, 105–7
Soltani hired by Post to work with, 189–91, 198–99
as subject of files in Pandora archive, 221–22, 272, 274
surveillance as increasing preoccupation of, 93, 234–35, 238–42, 255
viewed as ES’s “accomplice,” 323
gellman.us/pgp, encryption tools at, 8
Gellman v. DHS et al., 276–78
Gellman v. Wacker, 14
Geneva, ES’s CIA posting to, 54
gigabytes, 22
Gladwell, Malcolm, 366
Gompert, David C., 311–12
Goodlatte, Bob, 163
Google, 76, 111, 336
foreign facilities of, 282, 286
hacking of BG’s accounts on, 232
illegal spying by, 198
PRISM and, 283, 285, 300
Google cloud, 317, 352
boundary between public internet and, 281–82
GCHQ in penetration of, 299, 301
NSA’s penetration of, 279–88, 297–302, 408
Google Front End, 284–85
governing norms, 248–49, 347–48
government:
secrecy and, see secrecy, government
in standoff with ES, 352–53
trust and, 180–84
GPG (GnuPG), 8, 365, 366
Graham, Don, 103
Graham, Katharine, 92, 379
Graham, Lindsey, 158
Graham, Mary, 263
Granick, Jennifer, 339, 342, 343
Graph-in-Memory, 174, 177, 179, 180, 181
Greenberg, Karen, 4
Greenwald, Glenn, 213, 241, 255, 325
Alexander’s proposed raid on, 245–46, 247–48, 249
BG on contributions to NSA story by, 141
BG’s view of, 12
in claims about ES’s unreleased files, 257–58
in decision not to publish some material from Pandora, 269
ES’s decision to leak documents to, 16
ES’s first approaches ignored by, 12, 366–67
ES’s first contact with, 66
ES’s interviews with, 138, 346
ES’s relationship with, xiii
and ES’s wiretapping claims, 327
exaggerated claims of, 139
false accusations against BG by, 138, 140–41, 387–90
first Snowden leaks story of, 142, 144
Poitras on, 138
as possessing NSA documents not seen by BG, 330
Post denigrated by, 139, 390
Guardian, 387
Ellsberg’s piece on ES in, 290
ES’s leaks published in, 77, 142, 144
Guare, John, 159
Gulf War (1990–1991), 15, 223
Gunn, Ben, 175
hacking:
of BG’s computers and devices, 229–35
by China, 34–35, 83
NSA and, see National Security Agency (NSA), hacker culture of
Hanssen, Robert, 247, 404
Hardy, David M., 278
Harrison, Sarah, 293, 307
Hawaii Technical Directorate, Office of Information Sharing at, 35
Hayden, Caitlin, 270
Hayden, Michael V., 165, 234
BG’s relationship with, 141–42
government secrecy defended by, 325
on journalists’ disclosure of classified information, 222
on power of active SIGINT, 309
on secrets revealed by metadata, 163
STELLARWIND overseen by, 26, 70–71, 169–70
Heartbeat, 36, 72–79
conceived as one-stop portal to worldwide data systems, 74–76
ES’s creation and supervision of, 72–73
PKI digital identity certificate of, 77
PKI of ES’s supervisor used by, 77–79
Holder, Eric, 96–97, 234, 249
Homeland (TV series), ES’s virtual chat with cast and crew of, 303–9, 320
Hong Kong:
ES in flight to, 27, 84, 88
Poitras and Greenwald’s interview with ES in, 138, 251
Hoover, J. Edgar, 181
Huffington Post, 138
Hughes, Eric, 7
human rights abuses, government coverups of, 262–63
HUMINT (human intelligence), 67
Hunt, Ira “Gus,” 62, 336
Hussein, Saddam, 223
identity certificates, 67, 71, 77, 78–79
“incidentally obtained information”:
definition of, 287
as misleading term, 340
see also mass surveillance
individual taskings, 124
information, as power, xvi
Information Assurance Directorate, 84, 117
information gathering, see data collection, by NSA
Inglis, John C. “Chris,” 148, 159, 160–61, 270, 314
intelligence community:
BG ostracized by, 186
BG’s renewed reception in, 213
bin Laden phone story as article of faith in, 273–74, 406
“collect it all” ethos of, 311–12, 335–36, 337–38, 348
ES’s motives and actions as seen by, 334–35
government classified spending for (black budget), 227–28
as hostile to public debate, 185
incompatible data systems of, 74
iPhone security and, 215–20
public distrust of government as baffling to, 182–84
responses to whistleblowers by, 20
as totally opposed to exposure of secret programs, 260
whistleblowers in, 368
intelligence gathering:
right to privacy vs. need for, 313–14
see also surveillance
Intellipedia, 76
Intercept, 248
internet:
boundary between Google cloud and, 281–82
cost to privacy of, 6–7
internet companies:
address books transmitted by, 316
NSA given access to data by, 111–12, 121–22, 124, 142, 199, 310
PRISM and, 146–48
see also telecommunications companies
intrusion sets, 83
investigative journalism, BG’s career in, xii–xiii
iPhones:
“jailbreaking” and, 215
NSA and CIA preoccupation with, 215–20
STRAWHORSE and, 216–20
Iran, Islamic Revolution in, 195
Iran hostage crisis, 264–65
Iraq, WMDs in, 223, 238, 263, 368, 405
Islamic Revolution (1979), 195
Jaffer, Jameel, 321
Jamboree (annual NSA cyberweapons conference), 187–88, 215, 216, 220
hacker culture of, 189
JavaScript, 80–81
Johns Hopkins University, Computer Career Institute at, 41–42
Joint Counterintelligence Training Academy (JCITA), 57
Joint Worldwide Intelligence Communications System (JWICS), 75
journalists:
Alexander’s proposed raids on, 245–46, 249
and balance between harmful revelations and public’s right to know, 183, 222, 260–61, 267–68, 334–36
characterized as “accomplices,” 246–47
Clapper’s rejection of consultation with, 268
falsely blamed for NSA’s loss of bin Laden phone surveillance, 273–74, 406
First Amendment rights of, 248, 261
as FIRSTFRUITS targets, 272–73
governing norms and, 248–49
lie detecting by, 9–10, 366
NSA files on, 222–25
prosecution of, 96–97, 101, 114
Jow Ga kung fu, 44
Justice Department, U.S., 14
FIRSTFRUITS reports to, 274–75
perversion of legal standard of relevance by, 143–44
Kaiser, Bob, 98
Kay, David, 14–15
Kennedy, Jay, 103, 104, 135
King, Martin Luther, Jr., 180
Kinsley, Michael, 302
Kissinger, Henry, 288
Klein, Mark, 310–11
“Know Privacy” (Soltani’s graduate thesis), 196
Koch, Werner, 8
Kornblut, Anne, 141, 240–41
Kucherena, Anatoly, 251
Kunia Regional Security Operations Center, 31
cryptoparty at, 65–66
ES’s exfiltration of data at, 68–69, 377
ES’s exploration of network of, 66–70, 377
ES’s Heartbeat program at, see Heartbeat
ES’s reckless behavior at, 64–66
ES’s responsibilities at, 35–36, 75