Book Read Free

Dark Mirror

Page 50

by Barton Gellman


  ES’s security clearance at, 36

  Information Technology Directorate at, 76

  Windows Server Engineering Division of, 36

  Lake, Anthony, 91

  Ledgett, Richard, 75, 246

  on amnesty for ES, 352–53

  on harm vs. public’s right to know, 335

  on Heartbeat, 74, 77

  on incidental data collection, 338–41, 344, 346

  on lying to the press, 333

  on possible breaching of Pandora archive security, 241–42

  on possible presidential misuse of surveillance, 347–49, 350

  Lee, Micah, 361

  Leen, Jeff, 89–91, 98, 103, 105, 108

  Leonnig, Carol, 190, 240–41

  Levin, Mike, 262

  libertarianism, 55, 64–65

  Linzer, Dafna, 27, 93, 98, 238

  Litt, Robert:

  at Aspen Institute with BG, 144–45

  on cellphone location data collection, 319–20

  on ES’s access to classified documents, 87

  on minimization, 341–42, 343

  on NSA’s use of E.O. 12333, 302

  and Post’s black budget story, 228

  and Post’s PRISM story, 145–47, 362

  on secrecy of bulk phone data collection, 163

  Los Alamos National Laboratory, 39

  Los Angeles, Calif., Little Persia neighborhood of, 196

  Lowenthal, Tom, 231

  MacBook Air, 232

  MacBook Pro, 233

  MacBride, Neil, 242

  McConnell, Mike, 82

  McLaughlin, Jim, 103, 108

  McPeak, Merrill A., 15

  McRaven, William, 151–55, 260, 391

  Madsen, Wayne, 272

  MAINWAY, 168–69

  contact chaining used by, 172–73

  as illegal domestic surveillance, 169

  mapping social networks as purpose of, 170–77

  precomputation used by, 173–76

  as repository for NSA call data collection, 171

  as surveillance time machine, 179–80

  as tool for analyzing metadata, 170–71

  malware, 85, 203, 216–17, 218–19, 235

  Marquis-Boire, Morgan, 235

  Maryland, University of, Center for Advanced Study of Language, ES as security guard at, 48–49

  Massarini, Danielle, 62

  and ES’s JCITA lectures, 57–59

  and ES’s revelation of identity, 148–49

  mass surveillance, xii, 2, 143, 285–88, 307, 314–20, 351–52

  distinguished from PRISM, 124–25

  “incidental” collection of U.S. persons’ data in, 287, 337–46

  as made possible by digital technology, 178

  minimization of U.S. persons’ data in, 339–45, 363

  Matheson, Carrie (char.), 305

  Meet the Press (TV show), 346

  memes, on social media, 192, 210

  Merida, Kevin, 91, 103

  metadata, 316

  government collection of, 142–43

  MAINWAY as tool for analysis of, 170–71

  NSA call data as, 162

  personal secrets revealed by, 162–63

  Microsoft, 299, 314

  Miller, Greg, 190, 227–28

  Miller, John, 352

  Millî İstihbarat Teşkilatı (Turkish intelligence), 232

  Mills, Lindsay, 61, 290, 291

  marriage of ES and, 353

  minimization, in collection of data on U.S. persons, 349–45, 363

  Mitchell, Andrea, 165

  MobileScope, 196–97

  Morell, Michael, 51–52

  Moscow, 33, 226–27

  BG’s interviews with ES in, xiv, 50, 88, 250–58, 265–66, 330–32

  BG’s security measures in, 258

  ES’s life in, 320, 351, 353

  ES’s security measures in, 254–55

  Moss, Jeff, 177

  Moynihan Commission, 263

  Mr. Bill (char.), 213

  Mueller, Robert, 82, 227

  on panel with BG, 249–50

  Russian interference investigation of, 322

  Mukasey, Michael, permissive data collection rules approved by, 176

  MUSCULAR project, 299–300, 311, 315

  Muslims, slurs against, 211–12

  My Country, My Country (film), 5

  Nación, La, 257

  Nakashima, Ellen, 190

  National Geospatial-Intelligence Agency, 75

  National Reconnaissance Office, 75

  national security:

  changing targets of, 345

  harm vs. public accountability in, 183, 258–71, 304, 305, 334–36

  see also secrecy, government

  National Security Agency (NSA):

  access control system of, 67

  active directory profiles at, 71–72

  annual cyberweapons conference of, see Jamboree

  Application Vulnerabilities Branch of, 79

  as banned from domestic surveillance, 70, 125

  cover names used by, see cover names

  cultural and ethnic slurs in teaching materials of, 211–12

  data collection by, see data collection, by NSA

  defend and attack as twin missions of, 117, 384

  ES’s leaks of top secret files of, see Pandora archive

  ES’s proposed EPICSHELTER system for, 59–60, 61

  ES’s release of files of, xii

  evolution of, 309–10

  foreign surveillance by, see surveillance, foreign

  Google cloud penetrated by, 279–88, 297–302, 408

  Information Assurance Directorate of, 84, 117

  information dominance as goal of, 188

  iPhone security preoccupation of, 215–20

  Kunia center of, see Kunia Regional Security Operations Center

  Large Access Exploitation working group of, 317

  latent power of, as inherent threat, 345–46

  mass surveillance by, xv, 2, 285–88, 307

  misfiling of restricted material at, 68–72

  mix of civilian and military employees at, 193

  outward-facing cyber security of, 72

  Pacific Technical Center (Yokota) of, 57–58

  PKI certificates and, 67

  Q Group of, 1, 361–62

  Remote Operations Center (ROC) of, 82, 194, 200, 220

  Rochefort command center of, 32, 83, 369

  secrecy culture of, xv

  self-policing by, 161

  Shadow Brokers leak and, 268

  Special Source Operations of, 316

  Tailored Access Operations (TAO) of, 81–83, 200, 204, 214

  telecoms’ relations with, 311

  Tor anonymity protection broken by, 79–81

  Unified Targeting Tool of, 86

  XKEYSCORE tool of, 86, 87, 330, 331

  Yahoo penetration by, 299–300

  see also specific programs

  National Security Agency (NSA), hacker culture of, 189, 192–94, 200–213, 219

  Clapper on, 214

  cover names as clues to, 203–4, 206–7, 208–10

  memes circulated in, 192, 210–11

  STRAWHORSE and, 216–20

  National Security Agency (NSA), Signals Intelligence (SIGINT) Directorate, 84, 117–18, 176, 184–85, 188, 212

  leaks and, 272–73

  S2 (analysis and production division), 118

  S3 (acquisition division), 118, 199

  national security letters, 14, 248

  National Threat Operations Center (NTOC), 34, 8
3–88, 193–94

  domestic surveillance by, 85–86

  ES’s training at, 85–86

  Naval Research Laboratory, U.S., 7

  Negroponte, John, 161, 181, 184

  in Aspen Security Forum panel with BG, 155–66

  NSA call data collection defended by, 157–58

  Netanyahu, Benjamin, 342, 380, 410

  New York Times, 56, 92, 123, 175, 288

  BG’s decision not to offer NSA story to, 97–98

  Pentagon Papers published by, 380

  warrantless wiretap story delayed by, 97, 381

  Nippon Telegraph and Telephone Corporation, 197

  Nixon, Richard, 180, 308

  No Place to Hide (Greenwald), 138

  NSANet, 10, 75, 77

  NSA Round Table, 208

  NTOC, see National Threat Operations Center

  Oath, The (film), 5

  Obama, Barack, 55–56, 249, 368

  Obama administration, FISA amendments defended by, 126

  Oberdorfer, Don, 91

  Office of the Director of National Intelligence, 87, 227

  Office of the National Counterintelligence Executive, 277

  Ohm, Paul, 167

  OkCupid, 236, 237

  Osborne, Jared, 215

  Otakon, 43

  overcollection, 343–44

  Pahlavi, Mohammed Reza Shah, 195

  Pandora, myth of, 27

  Pandora archive, xii, 2, 99, 202–3

  BG as subject of files in, 221–22, 272, 274

  BG’s backup drive of, 99–100, 102, 114–15, 245–46, 382

  denial and deception folder in, 224–25

  harm to NSA operations caused by publication of, 265–67

  journalists’ decision not to publish some material from, 260, 269

  massive size of, 22–25, 377

  possible foreign penetration of, 241–42

  README files in, 27–28, 256, 326–27

  scattered clues to NSA’s Google cloud hack in, 283

  security measures surrounding access to, 198, 237, 238–40

  see also specific files and programs

  Panetta, Leon, 249

  Patinkin, Mandy, 308–9

  Paul, Ron, 64

  Pelosi, Nancy, 331

  Pentagon Papers, 92, 288, 379–80

  PKI (public key infrastructure), 67, 78

  Playing to the Edge (Hayden), 309

  Poitras, Laura, 79, 104, 113, 120, 130, 213, 241, 255, 327

  Alexander’s proposed raid on, 245–46, 247, 248, 249

  and BG’s decision to take NSA story to Post, 98

  BG’s first meeting with, 4–7

  BG’s relationship with, 108

  cryptographic signature issue and, 131–32

  customs interrogations of, 5, 364

  cyber security measures of, 2–4, 361, 362, 363

  in decision not to publish some Pandora material, 269

  ES documentary by, see Citizen Four

  ES’s leaks to, 1–2, 361

  ES’s public announcement filmed by, 133–34, 148

  ES’s relationship with, xiii

  and ES’s wiretapping claims, 329

  filmmaking career of, 5

  in first discussions with BG about NSA leaks, 8–11

  on Greenwald, 138

  in Hong Kong meeting with ES, 138, 347

  Hong Kong trip postponed by, 135–36

  in joint investigation with BG, 11

  as possessing NSA documents not seen by BG, 330

  Poulsen, Kevin, 234

  power, information as, xvi

  precomputation, MAINWAY’s use of, 173–76

  President’s Daily Brief, 121

  Pretty Good Privacy (PGP) software, 365, 404

  PRISM, 2, 22, 84, 87, 99, 104, 117, 331, 362

  access to internet companies’ data by, 121–22, 124

  capabilities and scope of, 121–22, 123–24, 340–41

  data on U.S. persons acquired and retained by, 126, 340–41

  and direct access to internet companies’ servers, 147–48

  ES’s desire for quick publication of, 105

  Google and, 283, 285, 300

  government objection to revealing internet companies’ cooperation with, 146–47

  internet companies and, 111–12

  low threshold of evidence for targeting by, 125–26

  mass surveillance distinguished from, 124–25

  Provider List of, 119

  targets of, 112

  valuable intelligence uncovered by, 145

  Yahoo and, 300

  PRISM slide show files, 119–20

  cryptographic signature on, 128–29

  privacy, digital:

  cellphones and, 318–20, 325

  cryptography and, 8, 350–52

  cypherpunks’ obsession with, 7–8

  digital trails, xvi, 3, 6

  internet’s cost to, 6–7

  and NSA’s ability to unmask names in data collection, 342–43

  overcollection and, 343–44

  right to vs. need for intelligence gathering, 313–14

  Soltani as specialist in, 196–97

  of U.S. persons, impact of NSA foreign surveillance on, 287–88, 338–44

  Privacy Act, BG and, 276

  Privacy and Civil Liberties Oversight Board, 180

  private keys, 4, 105, 258, 404

  probable cause, border searches and, 6

  “Project Frankie,” 61

  Protect America Act (2007), 111, 123, 338

  QUANTUM, 199

  Rabin, Yitzhak, 10

  radiation, deliberate exposures of U.S. troops to, 262

  RAGTIME, 122

  Rasmussen, Nicholas, 312

  Reagan, Ronald, 282

  reasonable articulable suspicion, 126

  Reddit, 192, 193

  relevance, Patriot Act as perversion of legal standard of, 143–44

  remote-access trojan (RAT), 235

  Remote Operations Center (ROC), 82, 194, 200, 220

  Reporters Committee for Freedom of the Press, 276

  Rhodes, Ben, 141

  Rick (PRISM program manager), 117–18, 125

  on scope of PRISM program, 121, 123–24

  slide show created by, 119–20

  Risen, James, prosecution of, 242–43, 403

  Rodriguez, Jose, 186

  Rogers, Clyde, 216, 217

  Romero, Anthony, 152

  Russia, ES’s denial of relationship with, xiv–xv, 292–94

  Ryuhana Press, 43

  S3283, 202–4

  Sandia National Laboratories, 215, 216, 217

  Sandvik, Runa:

  ES’s emails with, 65

  Kunia cryptoparty cohosted by, 65–66

  Saturday Night Live (TV show), 213

  Savage, Charlie, 140

  Sayre, Valerie, 302

  Schindler, John, 282

  Schmidt, Eric, xvi, 111

  Schneier, Bruce, 323

  Schwalb, Larry, 241

  secrecy, government:

  and BG’s decision not to publish some Pandora material, 260

  BG’s longstanding concern with, 262

  BG’s Martian parable about, 258–59

  classification levels of, 25, 67, 95, 265

  conflict of core values in, 267

  espionage vs. leaks of, 275–76

  harm vs. public accountability in exposure of, 183, 258–71, 304, 305, 334–36

  Hayden’s defense of, 325

  human rights abuses and, 262–63

  as inherent in s
urveillance state, xii, xv, 28

  intelligence community’s opposition to exposure of, 260

  journalists and revelation of, 267–68

  see also classified materials

  Secrecy (documentary), 273–74

  SecureDrop, 234–35

  self-government, secrecy and, 267

  sensitive compartmented information (SCI), 25

  see also TS/SCI (Top Secret/sensitive compartmented information) clearance

  September 11, 2001, terrorist attacks, xvi, 70, 75, 122, 168–69, 222, 338

  expansion of surveillance state after, xi

  servers, ES’s early interest in, 37–38

  Sessions, Jeff, 205, 249

  sexually transmitted diseases, unethical experiments with, 262

  sexual metaphors, in cover names, 203–4

  Shadow Brokers leak, 268

  Sheremetyevo Airport, ES’s detention at, 226–27, 293

  Sigdev (signals development), 214–15

  SIGINT (signals intelligence), xii, 84, 266

  active vs. passive, 309

  constant flux in, 266

  viewed as top priority by NSA, 184–85

  SIM cards, xvii

  Simon, Barry, 133

  “Six Degrees of Kevin Bacon” (parlor game), 159–60

  Six Degrees of Separation (Guare), 159

  Skype, 112, 121

  smartphones:

  as subject to customs searches, 5–6, 364–65

  as tracking devices, 4

  Smith, Brad, 301, 314–15

  Snowden, Edward (ES):

  accused of breaking “sacred oath,” 182

  anonymous proxies as early interest of, 45

  army injury and discharge of, 47–48

  as Army Special Forces recruit, 46–47

  Ars Technica posts of, 37–38, 42–43, 50, 51, 54, 56

  in Asia, 84

  asylum plans of, 129–30

  background of, 32–33

  BeamPro used by, 320–21

  BG convinced of general reliability of, 11, 332–33

  BG first contacted by, xvii

  BG interrogated on journalistic principles by, 13–14

  BG’s and Poitras’s commitment doubted by, 11–12, 137

  BG’s conversations with, 225–27, 229, 259

  and BG’s decision to take NSA story to Post, 98

  BG’s independence doubted by, 15–16

  BG’s interviews with, 73–74, 88

  and BG’s need to authenticate leaked documents, 18–19

  BG’s participation accepted by, 16

  BG’s photographing of, 252–54

  BG’s relationship with, xiii–xiv, 108

  BG’s secure video and digital contacts with, xiv–xv

  blackmail as motive for NSA surveillance discounted by, 290

  as Booz Allen contractor at NTOC, 83–88

 

‹ Prev