Dark Mirror

Home > Other > Dark Mirror > Page 51
Dark Mirror Page 51

by Barton Gellman

Booz Allen test-system proposal of, 62–63

  on changing targets of national security, 345

  character and personality of, xiii

  childhood and adolescence of, 38–45

  Churchyard code name of, 54

  as CIA employee, 51–57

  CIA methods as troubling to, 55–56

  CIA tradecraft training of, 52–54

  as contractor at CIA headquarters, 49–50

  in conversation with NSA intern about Tor vulnerabilities, 80–81

  costs vs. benefits of leaks by, xv, 21

  as cyber security conference instructor, 57–59

  cyber security tradecraft of, 2–4

  “dead man’s switch” and, 64, 256–58, 328, 332

  as Dell liaison with CIA, 61–62

  Ecuador as intended destination of, 307

  Ellsberg compared with, 295–96

  Ellsberg’s online conversation with, 289–95

  encrypted NSA files sent to BG without keys by, 328, 332

  EPICSHELTER system designed by, 59–60, 61

  epilepsy diagnosed in, 34, 64, 370

  on Espionage Act, 292

  exaggerated claims of, 63–64

  in flight to Hong Kong, 27, 88, 307

  in flight to Moscow, xi

  on foreigners’ right to privacy, 291–92

  gaming of tests as talent of, 42

  GED diploma of, 40–41

  government disparagement of, 40, 51–52, 86–87, 134

  government’s standoff with, 352–53

  Greenwald and, see Greenwald, Glenn

  hacker mindset of, 40

  as having accomplished his goals, 255–56, 308

  Heartbeat program of, see Heartbeat

  identity disclosed by, 28–29

  importance of cryptographic signature to, 105–6, 128–30, 137, 386–87

  importance of leaks by, xii

  instrumental approach to truth by, 324–26, 332–33

  IQ score of, 38–39

  on journalists’ overdedication to provable facts, 324–26

  Kunia assignment of, see Kunia Regional Security Operations Center

  leaks to Poitras and BG by, see Pandora archive

  libertarian politics of, 55, 64–65

  marriage of Mills and, 353

  memoir of, 50–51

  Microsoft systems engineer certification of, 42

  in Moscow, see Moscow

  motives of, 28, 290–91, 304, 335–36

  on NSA penetration of Google cloud, 285

  on NSA’s latent power as inherent threat, 345–46

  on NSA’s sexual metaphors, 204

  personal attacks anticipated by, 19

  Poitras and, see Poitras, Laura

  on political use of hacked documents, 322

  possible harm from publication of Pandora files dismissed by, 265–66

  PRISM slide show files uncovered by, 120

  public announcement of identity of, 148–49

  quick publication of NSA documents sought by, 105, 127–28, 306, 327

  on revealing secrets, 259

  revoked passport of, 227, 307

  role-playing and fantasy interests of, 43–44

  Russian relationship denied by, xiv–xv, 292–94

  security credentials of, 67–68

  security guard job of, 48–49

  as self-taught polymath, 40, 41

  Sheremetyevo Airport detention of, 226–27, 293

  size of data leaks by, 73

  TAO job offer rejected by, 82–83, 204

  Tekken obsession of, 44–45

  Tor used by, 79–81

  treason charges against, 334

  TS/SCI clearance of, 48

  Verax as cover name of, xvii, 226

  in virtual chat with Homeland cast and crew, 303–9, 320

  virtual TED Talk given by, 321

  Washington Post distrusted by, 11

  wiretapping of Congress and Supreme Court claimed by, 326–32

  Snowden, Elizabeth, 38

  Snowden, Jessica, 39

  Snowden, Lonnie G., Jr., 38, 57, 251

  Snowden archive, see Pandora archive

  social graphs, 159, 163

  social justice, 345

  social media, memes on, 192, 210

  social networks, mapping of, MAINWAY as tool for, 170–77

  Soghoian, Christopher, 319

  Soltani, Ashkan:

  background of, 195–96

  as BG’s guide to hacking culture, 191

  digital privacy as specialty of, 196–98

  in E.O. 12333 investigations, 315, 318, 324

  Google cloud story and, 279–81, 297–300

  hacker background of, 189–90

  on hacker culture, 208

  Pandora archive and, 189–91, 198–99, 238–39, 340

  Pandora security and, 238–39

  suspected attempt at honey trapping of, 236–37

  South China Morning Post, 84

  Special Forces, U.S., 212

  Special Operations Command, U.S., 151

  Special Source Operations, 191

  spiders (tools in networked computing), 76

  Spiegel, Der, 182

  Spotlight (film), 104

  SSL (secure sockets layers), 280, 297

  STARBURST, 70

  Star Trek (TV series), 210

  State Department, U.S., ES’s passport revoked by, 227, 307

  STELLARWIND (domestic surveillance program), 26, 122, 170

  as illegal domestic surveillance, 169, 175

  NSA inspector general’s report on, 70–71

  STRAWHORSE, 216–20

  Suitable Tech Inc., 320

  Supreme Court, U.S., ES’s claims of having wiretapped, 326–32

  surveillance:

  authority (legal basis) for, 86–88

  BG’s increasing preoccupation with, 234–35, 238–42, 255

  Church on inherent threat of, 346

  cryptography as counterforce to, 350–52

  difficulty in scaling back technology of, 349–50

  NSA’s ability to unmask names in, 342–43

  possible misuse of, 347–49, 350

  post-9/11 expansion of, xi

  secrecy as inherent in, xii, xv, 28

  surveillance, domestic:

  breakdown of divide between foreign and, xii, 338–39

  mass, 143

  NSA as banned from, 125

  warrantless, 9, 26, 70, 97, 122–23, 142, 156, 157, 169, 263

  surveillance, foreign:

  breakdown of distinction between domestic and, xii, 338–39

  data on U.S. persons collected by, 287–88, 335–36, 337–46

  “Surveillance Self-Defense” (Electronic Frontier Foundation), 365

  Swartz, Aaron, 234

  Taguba, Antonio, 262

  Tailored Access Operations (TAO), 81–83, 200, 204, 214

  cover support for, 201–2

  Tate, Julie, 107, 190, 269, 271, 340

  TECHEXPO Top Secret, 49

  TED Talk, ES’s virtual, 321

  Tekken, 44–45

  Tekserve, 233–34

  telecommunications companies:

  NSA given access to data by, 111–12, 142, 199, 310

  NSA’s relations with, 311

  see also internet companies

  Terminator films, 322

  “terrorist,” definition of, 113

  TheTrueHOOHA (ES’s Ars Technica handle), 37

  Thompson, Ken, 217

  Time, 8

  NSA story declined by, 93–97

 
; Time Inc., 94–95

  Tisinger, Jeanne, 62

  Top Secret classification, 25, 67

  legal standard for, 265

  Top Secret clearance, 67

  Tor Project, 65

  ES’s use of, 79–81

  NSA’s breaking of anonymity protection of, 79–81

  traffic shaping, 200

  Travis, Debra, 233

  “treason,” constitutional definition of, 334

  Trump, Donald, 162, 181, 205, 246, 247, 249

  Clapper attacked by, 349

  espionage charges brought against Assange by, 261

  governing norms ignored by, 347–48

  trust:

  government and, 180–84

  NSA data collection and, 164

  TS/SCI (Top Secret/sensitive compartmented information) clearance, 25, 36

  TS/SCI networks, 77

  Tu, Alan, 193–94, 265

  in NSA hacker culture, 194

  on NSA’s sexual metaphors, 204

  TURMOIL, 299

  Turner, Shawn, 142, 144, 246, 270

  Underground Railroad, 345

  Unified Targeting Tool, 124–25

  United Kingdom, Official Secrets Act of, 275

  United States v. Edward J. Snowden, 242

  UN Special Commission (UNSCOM), 224

  used as cover for NSA spying, 223

  Upstream, 84, 148

  USA Patriot Act (2001), 143, 166

  Vanity Fair, 56

  Verax, see Snowden, Edward

  Verizon, FBI’s collection of metadata from, 142

  Vietnam War, 288

  Vines, Vanee, 270, 271

  BG’s meeting with, 323–24

  volume problem, contact chaining and, 172–73

  VOYEUR, 206

  Wall Street Journal, 196, 205

  warrantless surveillance, 9, 26, 70, 97, 122–23, 142, 156, 157, 169, 263

  Washington Post, 16, 253, 288, 324

  BG’s career at, 91–93

  BG’s decision to offer NSA story to, 89, 98

  BG’s departure from, xiii, 4

  BG’s NSA story meetings at, 103–16

  Clapper’s meeting with, 228–29

  cryptographic signature issue and, 131, 132–33

  in decision not to publish some Pandora material, 269

  ES as suspicious of, 11

  Greenwald’s denigration of, 139, 390

  NSA stories published by, 77, 146–49, 198

  Pentagon Papers published by, 92, 379–80

  PRISM slides shown to, 109–13

  publication of legitimate intelligence data rejected by, 145–46

  Pulitzer Prize for NSA coverage won by, 277

  security measures for NSA story at, 105–9, 239–40

  Soltani hired by, 189–91, 198–99

  Washington Times, 273

  Watergate scandal, 92

  weapons of mass destruction (WMDs), 223, 238, 263, 368, 405

  Weaver, Nicholas, 240

  Weiss, Baruch, 95–96

  Weymouth, Katharine, 380

  WHIPGENIE, 70, 122, 385

  whistleblowers, whistleblowing:

  Ellsberg’s lifelong preoccupation with, 294–95

  espionage vs., 275–76

  in intelligence community, 368

  need for action as core value of, 296

  and public’s right to know, 334–35

  rarity of, 295–96

  WikiLeaks, 25, 256

  Williams, Pete, 186

  Williams & Connolly, 100, 102, 185

  Wizner, Ben, 321–22

  Wyden, Ron, NSA hearings of, 164–65

  XKEYSCORE (NSA targeting interface), 86, 87, 332

  Yahoo, 299–300, 337

  Zarqawi, Abu Musab, killing of, 212

  Zero Day cyber attacks, 58

  Zimmerman, Phil, 365

  ABCDEFGHIJKLMNOPQRSTUVWXYZ

  ABOUT THE AUTHOR

  Barton Gellman is a critically honored author, journalist and blogger based at the Century Foundation in New York. A longtime writer for The Washington Post, Gellman has led multiple teams to a Pulitzer Prize and was a member of the team that won the 2002 Pulitzer for National Reporting for coverage of the 9/11 attacks and their aftermath. Author of the bestselling Angler: The Cheney Vice Presidency, he is also a Lecturer and Author in Residence at Princeton's Woodrow Wilson School.

  What’s next on

  your reading list?

  Discover your next

  great read!

  Get personalized book picks and up-to-date news about this author.

  Sign up now.

  *Barton Gellman and Sam Adler-Bell, “The Disparate Impact of Surveillance,” Century Foundation, December 21, 2017, at http://perma.cc/WV8A-ZMV3.

 

 

 


‹ Prev