ES’s security clearance at, 36
Information Technology Directorate at, 76
Windows Server Engineering Division of, 36
Lake, Anthony, 91
Ledgett, Richard, 75, 246
on amnesty for ES, 352–53
on harm vs. public’s right to know, 335
on Heartbeat, 74, 77
on incidental data collection, 338–41, 344, 346
on lying to the press, 333
on possible breaching of Pandora archive security, 241–42
on possible presidential misuse of surveillance, 347–49, 350
Lee, Micah, 361
Leen, Jeff, 89–91, 98, 103, 105, 108
Leonnig, Carol, 190, 240–41
Levin, Mike, 262
libertarianism, 55, 64–65
Linzer, Dafna, 27, 93, 98, 238
Litt, Robert:
at Aspen Institute with BG, 144–45
on cellphone location data collection, 319–20
on ES’s access to classified documents, 87
on minimization, 341–42, 343
on NSA’s use of E.O. 12333, 302
and Post’s black budget story, 228
and Post’s PRISM story, 145–47, 362
on secrecy of bulk phone data collection, 163
Los Alamos National Laboratory, 39
Los Angeles, Calif., Little Persia neighborhood of, 196
Lowenthal, Tom, 231
MacBook Air, 232
MacBook Pro, 233
MacBride, Neil, 242
McConnell, Mike, 82
McLaughlin, Jim, 103, 108
McPeak, Merrill A., 15
McRaven, William, 151–55, 260, 391
Madsen, Wayne, 272
MAINWAY, 168–69
contact chaining used by, 172–73
as illegal domestic surveillance, 169
mapping social networks as purpose of, 170–77
precomputation used by, 173–76
as repository for NSA call data collection, 171
as surveillance time machine, 179–80
as tool for analyzing metadata, 170–71
malware, 85, 203, 216–17, 218–19, 235
Marquis-Boire, Morgan, 235
Maryland, University of, Center for Advanced Study of Language, ES as security guard at, 48–49
Massarini, Danielle, 62
and ES’s JCITA lectures, 57–59
and ES’s revelation of identity, 148–49
mass surveillance, xii, 2, 143, 285–88, 307, 314–20, 351–52
distinguished from PRISM, 124–25
“incidental” collection of U.S. persons’ data in, 287, 337–46
as made possible by digital technology, 178
minimization of U.S. persons’ data in, 339–45, 363
Matheson, Carrie (char.), 305
Meet the Press (TV show), 346
memes, on social media, 192, 210
Merida, Kevin, 91, 103
metadata, 316
government collection of, 142–43
MAINWAY as tool for analysis of, 170–71
NSA call data as, 162
personal secrets revealed by, 162–63
Microsoft, 299, 314
Miller, Greg, 190, 227–28
Miller, John, 352
Millî İstihbarat Teşkilatı (Turkish intelligence), 232
Mills, Lindsay, 61, 290, 291
marriage of ES and, 353
minimization, in collection of data on U.S. persons, 349–45, 363
Mitchell, Andrea, 165
MobileScope, 196–97
Morell, Michael, 51–52
Moscow, 33, 226–27
BG’s interviews with ES in, xiv, 50, 88, 250–58, 265–66, 330–32
BG’s security measures in, 258
ES’s life in, 320, 351, 353
ES’s security measures in, 254–55
Moss, Jeff, 177
Moynihan Commission, 263
Mr. Bill (char.), 213
Mueller, Robert, 82, 227
on panel with BG, 249–50
Russian interference investigation of, 322
Mukasey, Michael, permissive data collection rules approved by, 176
MUSCULAR project, 299–300, 311, 315
Muslims, slurs against, 211–12
My Country, My Country (film), 5
Nación, La, 257
Nakashima, Ellen, 190
National Geospatial-Intelligence Agency, 75
National Reconnaissance Office, 75
national security:
changing targets of, 345
harm vs. public accountability in, 183, 258–71, 304, 305, 334–36
see also secrecy, government
National Security Agency (NSA):
access control system of, 67
active directory profiles at, 71–72
annual cyberweapons conference of, see Jamboree
Application Vulnerabilities Branch of, 79
as banned from domestic surveillance, 70, 125
cover names used by, see cover names
cultural and ethnic slurs in teaching materials of, 211–12
data collection by, see data collection, by NSA
defend and attack as twin missions of, 117, 384
ES’s leaks of top secret files of, see Pandora archive
ES’s proposed EPICSHELTER system for, 59–60, 61
ES’s release of files of, xii
evolution of, 309–10
foreign surveillance by, see surveillance, foreign
Google cloud penetrated by, 279–88, 297–302, 408
Information Assurance Directorate of, 84, 117
information dominance as goal of, 188
iPhone security preoccupation of, 215–20
Kunia center of, see Kunia Regional Security Operations Center
Large Access Exploitation working group of, 317
latent power of, as inherent threat, 345–46
mass surveillance by, xv, 2, 285–88, 307
misfiling of restricted material at, 68–72
mix of civilian and military employees at, 193
outward-facing cyber security of, 72
Pacific Technical Center (Yokota) of, 57–58
PKI certificates and, 67
Q Group of, 1, 361–62
Remote Operations Center (ROC) of, 82, 194, 200, 220
Rochefort command center of, 32, 83, 369
secrecy culture of, xv
self-policing by, 161
Shadow Brokers leak and, 268
Special Source Operations of, 316
Tailored Access Operations (TAO) of, 81–83, 200, 204, 214
telecoms’ relations with, 311
Tor anonymity protection broken by, 79–81
Unified Targeting Tool of, 86
XKEYSCORE tool of, 86, 87, 330, 331
Yahoo penetration by, 299–300
see also specific programs
National Security Agency (NSA), hacker culture of, 189, 192–94, 200–213, 219
Clapper on, 214
cover names as clues to, 203–4, 206–7, 208–10
memes circulated in, 192, 210–11
STRAWHORSE and, 216–20
National Security Agency (NSA), Signals Intelligence (SIGINT) Directorate, 84, 117–18, 176, 184–85, 188, 212
leaks and, 272–73
S2 (analysis and production division), 118
S3 (acquisition division), 118, 199
national security letters, 14, 248
National Threat Operations Center (NTOC), 34, 8
3–88, 193–94
domestic surveillance by, 85–86
ES’s training at, 85–86
Naval Research Laboratory, U.S., 7
Negroponte, John, 161, 181, 184
in Aspen Security Forum panel with BG, 155–66
NSA call data collection defended by, 157–58
Netanyahu, Benjamin, 342, 380, 410
New York Times, 56, 92, 123, 175, 288
BG’s decision not to offer NSA story to, 97–98
Pentagon Papers published by, 380
warrantless wiretap story delayed by, 97, 381
Nippon Telegraph and Telephone Corporation, 197
Nixon, Richard, 180, 308
No Place to Hide (Greenwald), 138
NSANet, 10, 75, 77
NSA Round Table, 208
NTOC, see National Threat Operations Center
Oath, The (film), 5
Obama, Barack, 55–56, 249, 368
Obama administration, FISA amendments defended by, 126
Oberdorfer, Don, 91
Office of the Director of National Intelligence, 87, 227
Office of the National Counterintelligence Executive, 277
Ohm, Paul, 167
OkCupid, 236, 237
Osborne, Jared, 215
Otakon, 43
overcollection, 343–44
Pahlavi, Mohammed Reza Shah, 195
Pandora, myth of, 27
Pandora archive, xii, 2, 99, 202–3
BG as subject of files in, 221–22, 272, 274
BG’s backup drive of, 99–100, 102, 114–15, 245–46, 382
denial and deception folder in, 224–25
harm to NSA operations caused by publication of, 265–67
journalists’ decision not to publish some material from, 260, 269
massive size of, 22–25, 377
possible foreign penetration of, 241–42
README files in, 27–28, 256, 326–27
scattered clues to NSA’s Google cloud hack in, 283
security measures surrounding access to, 198, 237, 238–40
see also specific files and programs
Panetta, Leon, 249
Patinkin, Mandy, 308–9
Paul, Ron, 64
Pelosi, Nancy, 331
Pentagon Papers, 92, 288, 379–80
PKI (public key infrastructure), 67, 78
Playing to the Edge (Hayden), 309
Poitras, Laura, 79, 104, 113, 120, 130, 213, 241, 255, 327
Alexander’s proposed raid on, 245–46, 247, 248, 249
and BG’s decision to take NSA story to Post, 98
BG’s first meeting with, 4–7
BG’s relationship with, 108
cryptographic signature issue and, 131–32
customs interrogations of, 5, 364
cyber security measures of, 2–4, 361, 362, 363
in decision not to publish some Pandora material, 269
ES documentary by, see Citizen Four
ES’s leaks to, 1–2, 361
ES’s public announcement filmed by, 133–34, 148
ES’s relationship with, xiii
and ES’s wiretapping claims, 329
filmmaking career of, 5
in first discussions with BG about NSA leaks, 8–11
on Greenwald, 138
in Hong Kong meeting with ES, 138, 347
Hong Kong trip postponed by, 135–36
in joint investigation with BG, 11
as possessing NSA documents not seen by BG, 330
Poulsen, Kevin, 234
power, information as, xvi
precomputation, MAINWAY’s use of, 173–76
President’s Daily Brief, 121
Pretty Good Privacy (PGP) software, 365, 404
PRISM, 2, 22, 84, 87, 99, 104, 117, 331, 362
access to internet companies’ data by, 121–22, 124
capabilities and scope of, 121–22, 123–24, 340–41
data on U.S. persons acquired and retained by, 126, 340–41
and direct access to internet companies’ servers, 147–48
ES’s desire for quick publication of, 105
Google and, 283, 285, 300
government objection to revealing internet companies’ cooperation with, 146–47
internet companies and, 111–12
low threshold of evidence for targeting by, 125–26
mass surveillance distinguished from, 124–25
Provider List of, 119
targets of, 112
valuable intelligence uncovered by, 145
Yahoo and, 300
PRISM slide show files, 119–20
cryptographic signature on, 128–29
privacy, digital:
cellphones and, 318–20, 325
cryptography and, 8, 350–52
cypherpunks’ obsession with, 7–8
digital trails, xvi, 3, 6
internet’s cost to, 6–7
and NSA’s ability to unmask names in data collection, 342–43
overcollection and, 343–44
right to vs. need for intelligence gathering, 313–14
Soltani as specialist in, 196–97
of U.S. persons, impact of NSA foreign surveillance on, 287–88, 338–44
Privacy Act, BG and, 276
Privacy and Civil Liberties Oversight Board, 180
private keys, 4, 105, 258, 404
probable cause, border searches and, 6
“Project Frankie,” 61
Protect America Act (2007), 111, 123, 338
QUANTUM, 199
Rabin, Yitzhak, 10
radiation, deliberate exposures of U.S. troops to, 262
RAGTIME, 122
Rasmussen, Nicholas, 312
Reagan, Ronald, 282
reasonable articulable suspicion, 126
Reddit, 192, 193
relevance, Patriot Act as perversion of legal standard of, 143–44
remote-access trojan (RAT), 235
Remote Operations Center (ROC), 82, 194, 200, 220
Reporters Committee for Freedom of the Press, 276
Rhodes, Ben, 141
Rick (PRISM program manager), 117–18, 125
on scope of PRISM program, 121, 123–24
slide show created by, 119–20
Risen, James, prosecution of, 242–43, 403
Rodriguez, Jose, 186
Rogers, Clyde, 216, 217
Romero, Anthony, 152
Russia, ES’s denial of relationship with, xiv–xv, 292–94
Ryuhana Press, 43
S3283, 202–4
Sandia National Laboratories, 215, 216, 217
Sandvik, Runa:
ES’s emails with, 65
Kunia cryptoparty cohosted by, 65–66
Saturday Night Live (TV show), 213
Savage, Charlie, 140
Sayre, Valerie, 302
Schindler, John, 282
Schmidt, Eric, xvi, 111
Schneier, Bruce, 323
Schwalb, Larry, 241
secrecy, government:
and BG’s decision not to publish some Pandora material, 260
BG’s longstanding concern with, 262
BG’s Martian parable about, 258–59
classification levels of, 25, 67, 95, 265
conflict of core values in, 267
espionage vs. leaks of, 275–76
harm vs. public accountability in exposure of, 183, 258–71, 304, 305, 334–36
Hayden’s defense of, 325
human rights abuses and, 262–63
as inherent in s
urveillance state, xii, xv, 28
intelligence community’s opposition to exposure of, 260
journalists and revelation of, 267–68
see also classified materials
Secrecy (documentary), 273–74
SecureDrop, 234–35
self-government, secrecy and, 267
sensitive compartmented information (SCI), 25
see also TS/SCI (Top Secret/sensitive compartmented information) clearance
September 11, 2001, terrorist attacks, xvi, 70, 75, 122, 168–69, 222, 338
expansion of surveillance state after, xi
servers, ES’s early interest in, 37–38
Sessions, Jeff, 205, 249
sexually transmitted diseases, unethical experiments with, 262
sexual metaphors, in cover names, 203–4
Shadow Brokers leak, 268
Sheremetyevo Airport, ES’s detention at, 226–27, 293
Sigdev (signals development), 214–15
SIGINT (signals intelligence), xii, 84, 266
active vs. passive, 309
constant flux in, 266
viewed as top priority by NSA, 184–85
SIM cards, xvii
Simon, Barry, 133
“Six Degrees of Kevin Bacon” (parlor game), 159–60
Six Degrees of Separation (Guare), 159
Skype, 112, 121
smartphones:
as subject to customs searches, 5–6, 364–65
as tracking devices, 4
Smith, Brad, 301, 314–15
Snowden, Edward (ES):
accused of breaking “sacred oath,” 182
anonymous proxies as early interest of, 45
army injury and discharge of, 47–48
as Army Special Forces recruit, 46–47
Ars Technica posts of, 37–38, 42–43, 50, 51, 54, 56
in Asia, 84
asylum plans of, 129–30
background of, 32–33
BeamPro used by, 320–21
BG convinced of general reliability of, 11, 332–33
BG first contacted by, xvii
BG interrogated on journalistic principles by, 13–14
BG’s and Poitras’s commitment doubted by, 11–12, 137
BG’s conversations with, 225–27, 229, 259
and BG’s decision to take NSA story to Post, 98
BG’s independence doubted by, 15–16
BG’s interviews with, 73–74, 88
and BG’s need to authenticate leaked documents, 18–19
BG’s participation accepted by, 16
BG’s photographing of, 252–54
BG’s relationship with, xiii–xiv, 108
BG’s secure video and digital contacts with, xiv–xv
blackmail as motive for NSA surveillance discounted by, 290
as Booz Allen contractor at NTOC, 83–88
Dark Mirror Page 50