|
Citizenfour (2014)
1
"Laura, at this stage, I can offer nothing more than my word. I am a senior government employee in the intelligence community. I hope you understand that contacting you is extremely high risk and you are willing to agree to the following precautions before I share more. This will not be a waste of your time. The following sounds complex but should only take minutes to complete for someone technical. I would like to confirm out of email that the keys we exchanged were not intercepted and replaced by your surveillance. Please confirm that no one has ever had a copy of your private key and that it uses a strong passphrase. Assume your adversary is capable of one trillion guesses per second. If the device you store the private key and enter your passphrase on has been hacked, it is trivial to decrypt our communications. Understand that the above steps are not bulletproof and are intended only to give us breathing room. In the end, if you publish the source material, I will likely be immediately implicated. This must not deter you from releasing the information I will provide. Thank you, and be careful. Citizenfour." Bottom line is... surveillance means that there are facts that we no longer abide to. If you take away the surveillance, there are no facts that the government can manufacture. Ah, that's right, and this is all about creating an independent record. To me, this goes to the question of independently verifying what the government is doing. That's why I keep going back to that question. More with David Sirota after CBS news, traffic, and weather on KKZN Denver/Boulder, AM 7... Hey, can you hear me? I am here, David, how are you? Well I would just point... start by pointing to what Barack Obama himself said about those questions when he was running for the office that he now occupies. In December of 2007, he said, quote, "The president does not have the power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation." So by Obama's own words, the president does not have the power that he is now exercising under the Constitution. And as far as why it matters, in... on August 1, 2007, when he laid out his reasons why he was running for office and why he thought it was so important to change the way we were doing things, he said, quote, "No more ignoring the law when it's inconvenient. That is not who we are. We will again set an example for the world that the law is not subject to the whims of stubborn rulers..." You asked why I picked you. I didn't. You did. The surveillance you've experienced means you've been "selected," a term which will mean more to you as you learn about how the modern SIGINT system works. For now, know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route is in the hands of a system whose reach is unlimited, but whose safeguards are not. Your victimization by the NSA system means that you are well aware of the threat that unrestricted secret police pose for democracies. This is a story few but you can tell. Thank you for inviting me here to give me the opportunity to express my story. Let me give you some of my background. I spent about four years in the military, and then I went into NSA. Directly, so... So I ended up with about 37 years of service combined. Most of it was a lot of fun, I tell you, it was really a lot of fun, breaking these puzzles you know, solving problems and things like that. And that's really what I did, I fundamentally started working with data, looking at data and data systems and how you do that. I was developing this concept of analysis that you could lay it out in such a way that it could be coded and executed electronically. Meaning you could automate analysis. And it has to do with metadata and using metadata relationships. So that was the whole, that was my whole theme there at NSA. That was eventually, that's what I ended up to. I was the only one there doing that, by the way. So any rate, 9/11 happened, and it must have been right after, a few days, no more than a week after 9/11 that they decided to begin actively spying on everyone in this country. And they wanted the back part of our program to run all of the spying. All right? So, that's exactly what they did. And then they started taking the telecom data and expanded after that. I mean the one I knew was AT&T, and that one provided 320 million records every day. That program was reauthorized every 45 days by what I call the "yes committee," which was Hayden and Tenet and the DOJ. The program was called Stellar Wind. So first I went to the House Intelligence Committee and the staff member that I personally knew there, and she then went to the chairman of the committee, Nancy Pelosi was the minority rep. They were all briefed into the program at the time, by the way, and all the other programs that were going on, including all these CIA programs. I wasn't alone in this. There were four others out of NSA, and we were all trying to work internally in the government over these years trying to get them to come around to being constitutionally acceptable and take it into the courts and have the courts' oversight of it too. So we, we naively kept thinking that could, uh, that could happen. And it never did. But any rate, after that, and all the stuff we were doing they decided to raid us, to keep us quiet, threaten us, you know. So we were raided simultaneously, four of us. In my case, they came in with guns drawn. I don't know why they did that, but they did, so... Laura, I will answer what I remember of your questions as best I can. Forgive the lack of structure. I am not a writer, and I have to draft this in a great hurry. What you know as Stellar Wind has grown. SSO, the expanded Special Source Operations that took over Stellar Wind's share of the pie, has spread all over the world to practically include comprehensive coverage of the United States. Disturbingly, the amount of US communication ingested by NSA is still increasing. Publicly, we complain that things are going dark, but in fact, our accesses are improving. The truth is that the NSA has never in its history collected more than it does now. I know the location of most domestic interception points and that the largest telecommunication companies in the US are betraying the trust of their customers, which I can prove. We are building the greatest weapon for oppression in the history of man, yet its directors exempt themselves from accountability. NSA director Keith Alexander lied to Congress, which I can prove. Billions of US communications are being intercepted. In gathering evidence of wrongdoing, I focused on the wronging of the American people, but believe me when I say that the surveillance we live under is the highest privilege compared to how we treat the rest of the world. This I can also prove. On cyber operations, the government's public position is that we still lack a policy framework. This too is a lie. There is a detailed policy framework, a kind of Marshall Law for cyber operations created by the White House. It's called Presidential Policy Directive 20 and was finalized at the end of last year. This I can also prove. I appreciate your concern for my safety, but I already know how this will end for me, and I accept the risk. If I have luck and you are careful, you will have everything you need. I ask only that you ensure this information makes it home to the American public. Does the NSA routinely intercept American citizens' emails? No. Does the NSA intercept Americans' cell phone conversations? No. - Google searches? - No. - Text messages? - No. - Amazon.com orders? - No. - Bank records? - No. What judicial consent is required for NSA to intercept communications... and information involving American citizens? Within the United States, that would be the FBI lead. If it was a foreign actor in the United States, the FBI would still have the lead and could work that with... with NSA or other intelligence agencies as authorized. But to conduct that kind of... of collection in the United States, it would have to go through a court order, and the court would have to authorize it. We are not authorized to do it, nor do we do it. All rise. The United States Court of Appeals for the Ninth Circuit is now in session. Please be seated. Good morning, and welcome to the Ninth Circuit. The first case for argument is Jewel versus National Security Agency. You may proceed. May it please the court, Kevin Bankston, for Carolyn Jewel and her fellow plaintiff appellants in Jewel v. NSA. Your Honors, plaintiffs have specifically alleged that their own communications and communications records have been acquired by the government. But the District Court found that we had failed to allege facts that differentiated the injury that our plaintiffs suffered from the injuries suffered by every otherAT&T user whose communications and records have been acquired by the government, basically concluding that so long as everyone is being surveilled, no one has standing to sue. However, to deny standing to persons who are injured simply because many others are also injured would mean that the most injurious and widespread government actions could be questioned by nobody. Do you have anything concrete that in fact a specific communication of your client was intercepted? We have evidence that all the communications passing between AT&T's network and other networks in their Northern California facility have been intercepted. And so that would necessarily include the Internet communications of our Northern California plaintiffs. Okay, thank you. Thank you, Your Honors. May it please the court, I am Thomas Byron from the Department of Justice here on behalf of the government defendants. We think this litigation need not be resolved in federal court in light of the oversight of the political branches, both legislative and executive, which provides a better opportunity for oversight and resolution of the concerns raised concerning nationwide policies of alleged surveillance, uh, in these complaints. Even if it's revealed that one or more of the plaintiffs had email or telephone conversations intercepted that had nothing to do with national security? Your Honor, I don't know that anyone necessarily would have standing to raise the particular claims at issue in these two cases. We think instead that the kinds of claims at issue here against these defendants are those that are better suited to resolution before the... the representative branches of our government. So what role would the judiciary have if your approach is adopted? Judge Pregerson, I think that... I mean, we just get out of the way, is that it? Well, Judge Pregerson, I think that there is a narrow category, a subset of cases, in which it may be appropriate to step aside for that narrow category of cases. But the judiciary plays a role... To be sure, Judge Pregerson... - ...in our system. - Yes, Your Honor. And we don't mean to diminish that. You know, you're asking us to abdicate that role. No, Your Honor, um, but it is a question of this court's discretion whether to reach that issue. We do think that there is simply no way for the litigation to proceed without risk of divulging those very questions of privileged information that would cause, as the Director of National Intelligence has explained, exceptionally grave damage to national security if disclosed. Um, thanks for having me. If anybody has any questions, like I said, basically just raise your hand and I'll try to call on you as soon as I possibly can. So who here actually feels like they are under surveillance pretty regularly? Everyone inside of Occupy. How many people have been arrested and had their, at their court date, they had their phone taken into the back room? How many people in here had their retina scanned? Wow. Um, so you guys are actually in a sense the canaries in the coal mine. Right, because the incentives are all lined up against you. Anybody see on the subway, "Link your MetroCard to your debit card," right? Like, auto-refill? This is a concept which is key to everything we'll talk about today. And it's called linkability: Take one piece of data and link it to another piece of data. So, for example, if you have your MetroCard and you have your debit card, you have those things and you can draw a line between them, right? So that's, like, not a scary thing, except your bank card is tied to everything else that you do during the day. So now they know where you're going, when you make purchases. So when they decide to target you, they can actually recreate your exact steps. With a MetroCard and with a credit card, alone, like literally where you go and what you buy, and potentially by linking that data with other people on similar travel plans, they can figure out who you talk to and who you met with. When you then take cell phone data, which logs your location, and you link up purchasing data, MetroCard data, and your debit card, you start to get what you could call "metadata" in aggregate over a person's life. And metadata, in aggregate, is content. It tells a story about you which is made up of facts, but is not necessarily true. So for example, just because you were on the corner and all those data points point to it, it doesn't mean you committed the crime. So it's important to note that if someone has a perception of you having done a thing, it will now follow you for the rest of your life. So just keep in mind that what happens to you guys, for example, with fingerprints and retinal scans and photographs, that is what is going to happen to people in the future when they resist policy changes and when they try to protest in a totally constitutionally protected way. This is for you, Director Clapper, again on the surveillance front, and I hope we can do this in just a yes or no answer because I know Senator Feinstein wants to move on. So, does the NSA collect any type of data at all on millions or hundreds of millions of Americans? No, sir. It does not? Not wittingly. There are cases where they could inadvertently, perhaps, collect, but not wittingly. The encrypted archive should be available to you within seven days. The key will follow when everything else is done. The material I provide, and investigative effort required will be too much for any one person. I recommend at a very minimum, you involve Glenn Greenwald. I believe you know him. The plain text of the payload will include my true name details for the record... though it will be your decision as to whether or how to declare my involvement. My personal desire is that you paint the target directly on my back. No one, not even my most trusted confidante, is aware of my intentions, and it would not be fair for them to fall under suspicion for my actions. You may be the only one who can prevent that, and that is by immediately nailing me to the cross rather than trying to protect me as a source. On timing, regarding meeting up in Hong Kong. The first rendezvous attempt will be at 10:00 a.m. local time on Monday. We will meet in the hallway outside of a restaurant in the Mira Hotel. I will be working on a Rubik's Cube so you can identify me. Approach me, and ask if I know the hours of the restaurant. I'll respond by stating that I'm not sure, and suggest you try the lounge instead. I'll offer to show you where it is, and at that point we're good. You simply need to follow naturally. As far as positioning, I mean, if you want us to sit in any particular way or whatever. You know, I'm gonna go there, to try to get better light. So, um, there's, you know, so many different enormous stories just, that are kind of stand alone stories, that even, like, you know, certain things about an individual document that can just be their own story. And I just want to start churning those stories out. I basically woke up this morning and already started writing stories. So I'm hoping to, you know, start publishing like within a day or two days. - Okay. - As long as you're good with that. - Yeah. - Um, and... So, as far as like the stuff we have to talk about, I'm kind of dichotomizing it, between stuff that I'd like to talk to you about in terms of like the documents and the content, and Laura has a bunch of questions about that as well, sort of working through the documents, getting your take on a lot of this stuff that, you know, will help me understand it better. But then also the sort of "you" story, like the who you are, what you've done, why you've done what you've done. - Yeah. - And I'd love to do that first. Okay. Um, in part because you're the only one who can do that. So I'd just like to get that done so that it's done, um, and also because, you know, it might be that you want to do that early. - Because... - Who knows what could happen... It might be necessary, we might choose to have that done early. Tell me your thoughts on where you are with that... The primary one on that, I think I've expressed that a couple times online, is I feel the modern media has a big focus on personalities. Totally. And I'm a little concerned the more we focus on that, the more they're gonna use that as a distraction. And I don't necessarily want that to happen, which is why I've consistently said, you know, "I'm not the story here." Nervous, huh? No, it's a very, very cheap pen, that just with the slightest force broke, go ahead. But uh, yeah, anything I can do to help you guys get this out I will do. I don't have, uh, any experience with media, with how this works, so I'm kind of learning as I go. Right, so I just want to get a sense of why did you decide to do what you've done. So, for me, it all comes down to state power against the peoples' ability to meaningfully oppose that power. And I'm sitting there, uh, every day getting paid to design methods to amplify that state power. And I'm realizing that if, you know, the policy switches that are the only things that restrain these states, were changed, there... you couldn't meaningfully oppose these. I mean you would have to be the most incredibly sophisticated, technical actor in existence. I mean, I'm not sure there's anybody, no matter how gifted you are, who could oppose all of the offices and all the bright people, even all the mediocre people out there with all of their tools and all their capabilities. And as I saw the promise of the Obama administration be betrayed and walked away from and in fact, actually advance... Uh-huh, uh-huh. ...the things that had been promised to be sort of curtailed and reigned in and dialed back, and actually get worse, particularly drone strikes, which I also learned at NSA, we could watch drone videos from our desktops. As I saw that, that really hardened me to action. - In real time? - In real time. Yeah, you... it'll stream a lower quality of the video to your desktop. Typically you'd be watching surveillance drones as opposed to actually like you know murder drones where they're going out there and bomb somebody. But you'll have a drone that's just following somebody's house for hours and hours. And you won't know who it is, because you don't have the context for that. But it's just a page, where it's lists and lists of drone feeds in all these different countries, under all these different code names, and you can just click on which one you want to see. Right, but, so if your self-interest is to live in a world in which there's maximum privacy, doing something that could put you into prison, in which your privacy is completely destroyed, is sort of the antithesis of that. How did you reach the point where that was a worthwhile calculation for you? I remember what the Internet was like before it was being watched, and there's never been anything in the history of man that's like it. I mean, you could again have children from one part of the world having an equal discussion where, you know, they were sort of granted, um, the same respect for their ideas and conversation, with experts in a field from another part of the world, on any topic, anywhere, anytime, all the time. And it was free and unrestrained. And we've seen, uh, the chilling of that and the cooling of that and the changing of that model, toward something in which people self-police their own views, and they literally make jokes about ending up on "the list" if they donate to a political cause or if they say something in a discussion. Uh, and it's become an expectation that we're being watched. Um, many people I've talked to have mentioned that they're careful about what they type into search engines because they know that it's being recorded. And that limits the boundaries of their intellectual exploration. Uh... and I'm... I am more willing to risk imprisonment, or any other negative outcome, personally, than I am willing to risk the curtailment of my intellectual freedom and that of those around me whom I care for, uh, equally, as I do for myself. And again, that's not to say that I'm self-sacrificing, because it gives me... I feel good in my human experience to know that I can contribute to the good of others. Could you elaborate on that? So, I don't know how much of the programs and the actual technical capacities everybody's talked to you about, but there's an infrastructure in place in the United States and worldwide... that NSA has built, in cooperation with other governments as well... that intercepts basically every digital communication, every radio communication, every analog communication that it has sensors in place to detect. And with these capabilities, basically, the vast majority of human and computer-to-computer communications, device-based communications, which sort of inform the relationships between humans, are automatically ingested without targeting. And that allows individuals to retroactively search your communications based on self-certifications. So, for example, if I wanted to see the content of your email, or, you know, your wife's phone calls, or anything like that, all I have to do is use what's called a "selector," any kind of thing in the communications chain that might uniquely or almost uniquely identify you as an individual. And I'm talking about things like email addresses, IP addresses, phone numbers, credit cards, um, even passwords that are unique to you that aren't used by anyone else. I can input those into the system, and it will not only go back through the database and go, "Have I seen this anywhere in the past?" It will, basically put an additional level of scrutiny on it, moving into the future, that says, "If this is detected now or at anytime in the future I want this to go to me immediately, and alert me in real time" that you're communicating with someone. Things like that. So I don't know who you are or anything about you. Okay. Um... I work for Booz Allen Hamilton, a defense contractor, I'm sort of on loan to NSA. I don't talk to a Booz Allen boss, I don't get tasking from Booz Allen, it's all from NSA. - Sorry, I don't know your name. - Oh, sorry! I, uh... my name is Edward Snowden. I go by Ed. Um... Edward Joseph Snowden is the full name. - S-N... - O-W-D-E-N And where are you from? I'm originally, I was born in North Carolina, uh, small town, Elizabeth City. There's a Coast Guard station there. I'm from a military family. But I spent most of my time growing up around Fort Meade in Maryland. And your family, what's the consequences for them? This is actually what has made this hardest. My family doesn't know what's happening. They're unaware. I don't think I'll be able to keep the family ties that I've had for my life, um, because of the risk of associating them with this. And I'll leave, you know, what to publish on this and what not to publish to you guys. I trust you to be responsible on this. Um, but basically, the closer I stay to my family, the more likely they are to be leaned on, you know. So you don't want me to report this? I mean, we definitely want to do whatever we can not to include them or bring them into the mix. Yeah, yeah, sure, that's fine, I won't... I'm sorry, let me interrupt you. Can we just stop for a second and do the documents and then go back to that? - Does that makes sense? - Sure. What do I need? Do I need an email address that we're using, or...? Well, so you can, you can send them... once you've encrypted it, you can send it from whatever you think is appropriate. The main thing is you've got to encapsulate all of this in a way that it can't be decrypted and read when it's in transit across the network... Right. ...or on either of the end points that it's received at. Just so you know, these documents are basically all gonna be uploaded in like 48 hours, 72 hours, whatever... This is simply... you want to get in the process of doing this for everything, because it seems hard, but it's not hard, his is super easy. So just walk me through it, and... Okay. Show me... show me the actual folder structure where these files are first. How many documents did you say there were? Seven. Well, while you're working did you want to...? Okay, go ahead. How many documents are we talking about? Because when The Guardian did WikiLeaks, technical people set up a system so they were available for anybody to see. And I just wondered if it's possible to do the same thing? That would be the ideal end game, um, but because some of these documents are legitimately classified in ways that could cause harm to people and methods... I'm comfortable in my technical ability to protect them, I mean you could literally shoot me or torture me, and I could not disclose the password if I wanted to. Um, you know, I have the sophistication to do that. There are some journalists that I think could do that, but there are a number of them that couldn't. But the question becomes, can an organization actually control that information in that manner without risking basically an uncontrolled disclosure? But I do agree with that. Honestly, I don't want to be the person making the decisions on what should be public and what shouldn't. Which is why, rather than publishing these on my own, or putting them out openly, I'm running them through journalists. So that my bias, you know, and my things... Because clearly I have some strongly held views, are removed from that equation, and the public interest is being represented in the most responsible manner. Yeah. Actually, given your sort of, you know, geographic familiarity with the UK and whatnot, I'd like to point out that GCHQ has, uh, probably the most invasive... I've heard about that. ...network intercept program anywhere in the world. Yeah, yeah. It's called Tempora, T-E-M-P-O-R-A, and it's the world's first "full take," they call it, and that means content in addition to metadata, on everything. Um, so this is what I'd like to do in terms of scheduling, if it's good with everybody else. Um, are you... do you feel like you're done with what you...? I am done. I'm anxious to go back, get those articles done. And then there's a bunch of documents that aren't about those first two or three stories that I'd like to spend time with you... - Sure, yeah... - ...you know, kind of going over it. - Um, and... - I'm not going anywhere! You're available? You want to check your book first? Yeah! Let me... uh... let me check my schedule. Is that good for you, Laura? - It's great. - Okay. Hello? Yes. My meal was great, thank you very much. No, I still have some left, and I think I'm gonna be eating it later. So, uh, you can just leave me alone for now. Okay, great. Thank you so much. Have a good one. Bye. Let's fix that real quick. So uh, another fun thing, I was telling Laura about this: all these new VOIP phones, they have little computers in them, and you can hot mic these over the network... all the time, even when the receiver's down. So as long as it's plugged in, it can be listening in on you. And I hadn't even considered that earlier, but yeah. Okay. There are so many ways this could be... Everything in here is gonna be on the public record at some point. We, we should operate on that, that basis, because... Yeah, we are. Do you have your air-gapped machine with you? I do, I do. You can pop that out. Do you have an understanding or commitment on when you guys are going to press with the first stories? I suppose seven or eight in the morning in London. Uh-huh, okay. Now let's see here. Oh, hey, look, there's the other one. Pro tip, let's not leave the same SD cards in our laptops forever, in the future. Did you know this was still kicking around in your laptop? Yeah, um, that was the... - Okay, just making sure. - Okay, yeah. - This is that. - Right there. You will have a new one that looks exactly identical that's a different archive, so you might want to take a Sharpie to it, or something. Could you pass me my magic mantle of power? Mm-hmm. I'm gonna go pick up... Is that about the possibility of... Visual... yeah, visual collection. I don't think at this point there's anything that will shock us. We've become pretty... In fact, Ewen said before, he's like, he's like "I'm never leaving my room... I'm never leaving anything in my room again, not a single machine." I was like, "You've been infected by the paranoia bug. - Happens to all of us!" - Yeah. The way he said it, he was like, "I would never leave a single device in the room again alone." My bag is getting heavier and heavier. That's your evil influence, Ed. All right, I'm going need you to enter your root password because I don't know what it is. If you want to use this, you're more than welcome to. Looks like your root password's about four characters long anyway, so... It's usually a lot longer, but that's just a one-time-only thing, right? So it is... uh... It had been a lot longer, but ever since I knew that it was just like a one time only session one, I've been making it shorter. Is that not good? It's actually not. I was expressing this with Laura. The issue is, because of the fact that it's got a hardware mac address and things like that, if people are able to identify your machine, and they're able to... This is the fact you're about to break the most upsetting story... Right, that's true, that's true. Yeah, so they might kind of prioritize you... It's ten letters. I type very quickly. It actually is ten letters. Okay, so ten letters would be good if they had to brute force the entire keyspace. Right. That would still probably only take a couple days for NSA. That's a fire alarm. Okay. Hopefully it just sounds like a three second test. Or is... do you want to call the desk and ask? I think it's fine. Yeah, I don't think it's an issue, but it's interesting that it just... Did that happen before? Maybe they got mad when they couldn't listen in to us via the phone anymore. Has the fire alarm gone off before? No, that's the first time that's happened. Let me see, just in case, they've got an alert that goes to... That's unusual. - You probably... - We might have to evacuate. ...shouldn't ignore that. I don't know. - It's not continuous. - It's not continuous. No, I'm just saying, if it continues. And then we go and we meet the guys down in the lobby... - Yeah, right? - Yeah. Yeah, let's uh, let's leave it for now. Let me just finish this up. All right. Not that they're going to answer, because they probably got like 7,000 calls. Hi, uh, we hear a loud buzzing on the tenth floor, can you tell us what that is? Oh, okay. Okay great. Thank you. Bye. Fire alarm testing maintenance. That's good. That's what we wanted to hear. Nice of them to uh... nice of them to let us know about that in advance. Um... I just wanted to give you kind of a quick tour, uh, when Laura was looking at this, she was kind of salivating and couldn't stop actually reading the documents... Right, right. So we'll try and restrain ourselves without promising that we'll succeed. Yeah, I just wanted to kind of explain a brief overview of what these are and how they're organized. Um, the beginning are just some documents of interest. The primary purpose of the second archive is to bring the focus over to SSO, as opposed to uh, PRISM. And this is in general. SSO are the Special Source Operations, those are the worldwide passive collection on networks. They're both domestic to the US and international. There's a lot of different ways they do it, but corporate partnerships are one of the primary things, uh, they do domestically, they also do this with multinationals that might be headquartered in the US they can kind of coerce, or just pay into giving them access. And they also do it bilaterally, with the assistance of certain governments. And that's basically on the premise that they go, "All right, we'll help you set this system up if you give us all the data from it." Um, so yeah... There's, there's... There's a lot more in here than any one person or probably one team could do. Right. Um, XKeyscore DeepDive, XKeyscore in general, and there's a huge folder of documentation on XKeyscore and how it works, is the front-end system that analysts use for querying that sort of ocean of raw SIGINT that I was telling you about. All of that stuff where you can sort of do the retroactive searches and live searches and get flagging and whatnot, XKeyscore is the front end for that. I'm just gonna show you one slide here 'cause Laura thought it was valuable, and I was talking about kind of how these, uh, capabilities ramp up in sophistication over time. This is kinda nice. As of fiscal year 2011, they could monitor one billion telephone or Internet sessions simultaneously per one of these devices. And they could collect at the rate of about 125 gigabytes a second, which is a terabit. That's just each one of these devices. That's for each one of these, yeah. And how many Tumult machines would there be, then? Uh... per this, back then, there were 20 sites, there's 10 at DOD installations, but these are all outdated. We've expanded pretty rapidly. But still 20 sites, that's at least 20 billion. This all needs to get out, you know I mean? It's like... just in terms of understanding the capabilities. It's so opaque. It's not science fiction. This stuff is happening right now. No, that's what I mean, it's like, the, the magnitude of it, and... and, like, this is a pretty inaccessible technical document, but even this, like, is really chilling. - Do you know what I mean? - Yeah. Yeah, I mean we should have... we should be having debates about whether we want governments... I mean, this is massive and extraordinary. It's amazing. Even though you know it, even though you know that... to see it, like, the physical blueprints of it, and sort of the technical expressions of it, really hits home in like a super visceral way that is so needed. This is CNN Breaking News. An explosive new report is reigniting the concerns that your privacy is being violated to protect America's security. It reveals a court order giving the National Security Agency blanket access to millions of Verizon customers' records on a daily basis. Earlier I had the chance to conduct the first TV interview with the reporter who broke this story wide open: Glenn Greenwald of The Guardian. Congratulations on the scoop. Explain for our viewers why this is important. It's important because people have understood that the law that this was done under, which is the Patriot Act, enacted in the wake of 9/11, was a law that allowed the government very broad powers to get records about people with a lower level of suspicion than probable cause, the traditional standard. So it's always been assumed that under the Patriot Act, if the government had even any suspicion that you were involved in a crime or terrorism, they could get a lot of information about you. What this court order does that makes it so striking, is that it's not directed at any individuals who they believe or have suspicion of committing crimes or are part of a terrorist organization, it's collecting the phone records of every single customer of Verizon business and finding out every single call that they've made, internationally and locally, so it's indiscriminate and it's sweeping. It's a government program designed to collect information about all Americans, not just people where they believe there's reason to think they've done anything wrong. Ah, it's, it's a tough situation, you know, hearing that the person that you love, that you've spent the decade with, may not be coming back. What did they ask her? Um, when was the last time she saw me, where am I, um, what am I doing, you know, what does she know about my illness, things like that. Uh... so. Yeah, they're um... they're pretty solidly aware. 'Cause, uh... I'm clearly not at home ill. - Hello? - Hello? Hello, let me disconnect from the Internet. So, there's some news? Yes, there was indeed some news. I have config. Today, I think, maybe just a few hours ago? What... what kind of people visited? Uh... An H.R. lady, I'm assuming from NSA as opposed to, uh, as opposed to Booz Allen, because she was accompanied by a police officer, which means NSA police. And they were planning to break into my house, which regular police don't do. Does she live there? Yeah, she lives there. So I told her to cooperate fully... I can't find my phone, just one second... You know, don't worry about herself. You know what, I'll just take out the stuff I wanna use... Okay. Okay, well look, I mean, this is not a surprising development. Nah, I know, I planned for it, but it's just, you know, when it's impacting them and they're talking to you, it's a little bit different. Absolutely. But it's possible that they just noticed that you're missing. I guess it's not really a possibility. It is, but they're, I mean... Um... Let me just get rid of this. Sorry, I obviously was focused on other things than appearance this morning. How was... How did she react? Was she relatively calm about it? She's relatively calm... Does she know anything about what you're doing and why? She has no idea. And that's, I mean, I... I feel badly about that, but that's the only way I could think of where, like, she can't be in trouble. Did you just basically do a, "I have to go somewhere for reasons that I can't tell you about" kind of thing, or...? I just disappeared when she was on vacation. Um, and I left a note saying, "Hey, I'm going to be gone for a while for work," which isn't unusual for me in my business. - Right. - You know, so... Okay, so let me ask you a couple things just quickly. Are they gonna be able to go into your stuff and figure out what you took? Um, in some kind of... some sort of, like, peripheral senses, but not necessarily... - Not with great specificity. - Yes. Because I cast such a wide net. If they do that the only thing they're gonna do is have a heart attack because they're gonna go, "He had access to everything." Yeah. And they're not gonna know what specifically has been done. I think they're gonna start to actually feel a little better, although they're not gonna be wild about this in any case, when they see that the stories are kind of cleaving to a trend, you know, it's not like, "Here's the list of everybody who works everywhere." Right. I also think, you know, they're gonna be paranoid in the extreme, and assuming all kinds of worst case scenarios, which is gonna, you know, I think make them react in ways that probably aren't, like, gonna be particularly rational on their part. But, at the same time, there's... I do think they're limited for the moment. I agree, and I mean, I had kinda time to set a stage where we all enjoy at least a minimum level of protection, you know, no matter who we are, who's involved in this, you know, you're either a journalist, or you're either out of jurisdiction, so we have some time to play this before they can really get nasty. I think it's over, you know, the weeks when they have times, to get lawyers really sort of go, "This is a special situation. How can we interpret this to our advantage?" We... we see them do this all the time, you know, whether it's drones or wiretapping or whatever, they'll go, "Well according to this law from the 1840s, you know, with X, Y, or Z authority..." But that takes time. And that takes agreement... And also, you know, I mean, I think the more public we are out there too, like as journalists, the more protection that's gonna give as well. Have you started to give thought to when you're ready to come forward? I'm ready whenever, um... Honestly, I think there's sort of an agreement that it's not going to bias the reporting process. That's my primary concern at this point. I don't want to get myself into the issue before it's gonna happen anyway, and where it takes away from the stories that are getting out. We're talking about tens of millions of Americans, who weren't suspected of doing anything, who were surveilled in this way. Hold your thoughts for a moment. I want to continue this conversation because these are really important, sensitive issues, and the public out there has a right to know what's going on. This is CNN Breaking News. Another explosive article has just appeared, this time in The Washington Post. It's breaking news and it reveals another broad and secret US government surveillance program. The Washington Post and The Guardian in London reporting that the NSA and the FBI are tapping directly into the central servers of nine leading Internet companies, including Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, and Apple. The Post says they're extracting audio, video, photographs, emails, documents, and connection logs that enable analysts to track a person's movements and contacts over time. Let's discuss this latest revelation... they're coming out fast. Bill Binney, former official of the NSA who quit back in 2001, you were angry over what was going on, you are known as a whistleblower right now. Bill, what do you think about this Washington Post story? Well, I assume it's just a continuation of what they've been doing all along. So you're not surprised. Do you have any idea who is leaking this information? I don't know who leaked this. I have no doubt that the administration will launch an investigation, not into who approved these programs but into who leaked the information. I'm not shocked the companies are denying it, - I don't assume... - Do you believe them? There may be some technical basis on which they can say that we are not actively collaborating or they don't have what we consider in our own definition to be direct access to our servers but what I do know is that I've talked to more than one person who has sat at a desk at a web portal and typed out commands and reached into those servers from a distance. So whatever they want to call that, that's what's happening. Well, what I would call it is the single biggest infringement on American civil liberties probably of all time, isn't it? It's interesting, already you have The New York Times now today saying that the administration has lost all credibility. The New York Times slammed President Obama for this, and frankly I was used to that. The New York Times used to slam George Bush for protecting the country and for the steps he took. I don't want us to drop our guard, I don't want us to be struck again. As we saw in Boston, Anderson, people are willing to sacrifice their civil liberties. People sheltered inside... How can you believe in freedom, do you think... I mean, try and play Devil's Advocate for me, when you have secret courts, secret operations like PRISM, secret investigations which go into every spit and cough of every American's lives, without any member of the American public knowing about it. That's not freedom, is it? In 2008, they eliminated the warrant requirement for all conversations except ones that take place by and among Americans exclusively on American soil. So they don't need warrants now for people who are foreigners outside of the US, but they also don't need warrants for Americans who are in the United States communicating with people reasonably believed to be outside of the US. So again, the fact that there are no checks, no oversight about who is looking over the NSA's shoulder, means that they can take whatever they want. And the fact that it's all behind a wall of secrecy and they threaten people who want to expose it, means that whatever they're doing, even violating the law, is something that we're unlikely to know until we start having real investigations and real transparency into what it is that the government is doing. Glenn Greenwald, congratulations again on exposing what is a true scandal. I appreciate you joining me. I just heard from Lindsay, and uh, she's still alive, which is good, and free. My rent checks apparently are no longer getting through to my landlord, uh, so they said if we don't pay them in five days we'll be evicted, which is strange because I've got a system set up that automatically pays them. Uh, so there's that, and apparently there's construction trucks all over the street of my house, so that's uh... I wonder what they're looking for. It is... uh, it is an unusual feeling that's kind of hard to... hard to like describe or... or convey in words, but not knowing what's going to happen the next day, the next hour, the next week, it's scary, but at the same time it's liberating. You know, the, uh... the planning comes a lot easier because you don't have that many variables to take into play. You can only act and then act again. Now all these phone calls are being recorded digitally, not for content but for origin and destination, now word the government is going right into the servers of these large Internet companies. How does the government, politically speaking, make the argument that this is essential to national security and not a dramatic overreach in terms of personal privacy? It's difficult Matt, because, as Peter was pointing out, overnight we had an extraordinary, late-night... close to midnight... announcement and a declassification from the Director of National Intelligence. They are scrambling. The administration's already supported strongly by leaders in both parties from the intelligence committees. GCHQ has an internal Wikipedia, at the top secret, you know, super classified level, uh, where anybody working intelligence can work on anything they want. Yep. That's what this is, I'm giving it to you, you can make the decisions on that, what's appropriate, what's not. It's going to be documents of different types, pictures and PowerPoints, Word documents, stuff like that. - Um... - Sorry, can I take a seat? Yeah. Sorry, I get you to repeat, so in these documents they all show... Yeah, there'll be a couple more documents on that, that's only one part though. Like, it talks about Tempora and a little more thing, that's the Wiki article itself. It was also talking about a self-developed tool called UDAQ, U-D-A-Q. It's their search tool for all the stuff they collect, was what it looked like. It's going to be projects, it's going to be troubleshooting pages for a particular tool... Thanks. Um... what's the next step? When do you think you'll go public? Ah, I think it's pretty soon, I mean with the reaction, this escalated more quickly. I think pretty much as soon as they start trying to make this about me, which should be any day now. Yep. I'll come out just to go, "Hey, this is not a question of somebody skulking around in the shadows." These are public issues, these are not my issues, you know, these are everybody's issues. And I'm not afraid of you, you know. You're not going to bully me into silence like you've done to everybody else. And if nobody else is gonna do it, I will, and hopefully when I'm gone, whatever you do to me, there will be somebody else who'll do the same thing. It'll be the sort of Internet principle of the hydra. You know, you can stomp one person, but there's gonna be seven more of us. Yeah. Are you getting more nervous? I mean, no. I think, uh... I think the way I look at stress, particularly because I sort of knew this was coming, you know, because I sort of volunteered to walk into it, um... I'm already sort of familiar with the idea. I'm not worried about it. When somebody, like, busts in the door? Suddenly I'll get nervous, and it'll affect me, but until they do... I don't know, you know. I'm eating a little less, that's the only difference, I think. Let's talk about the issue with, when we're gonna say who you are. Yeah. This is, you know, you have to talk me through this. Because I have a big worry about this. Okay, tell me. Which is that, if we come out and... I know that you believe that your detection is inevitable and that it's inevitable imminently. There's, you know, in the New York Times today, Charlie Savage, the fascinating Sherlock Holmes of political reporting, deduced that the fact that there's been these leaks in succession probably means that there's some one person who decided to leak... Somebody else quoted you as saying it was one of your readers, and somebody else put another thing, So, you know, it's fine. I want people... I want it to be like, you know, like, this is a person... I want to start introducing the concept that this is a person who has a particular set of political objectives about informing the world about what's taking place. So I'm keeping it all anonymous, totally, but I want to start introducing you in that kind of incremental way. But... here's the thing. What I'm concerned is that if we come out and say, "Here's who this is, here's what he did," the whole thing that we talked about, that we're gonna basically be doing the government's work for them. And we're basically going to be handing them, you know, a confession, and helping them identify who found it. Maybe you're right, maybe they'll find out quickly, and maybe they'll know, but is there any possibility that they won't? Are we kind of giving them stuff that we don't... or, or... The possibility that they know but they don't want to reveal it because they don't know. Or that they don't know and we're going to be telling them, like... Is it a possibility that they're going to need two, three months of uncertainty, and we're going to be solving that problem for them? Or, let me just say, the or part, maybe it doesn't matter to you, maybe you wanted... You're not coming out because you think inevitably they're going to catch you, and you want to do it first, you're coming out because you want to fucking come out. - And you wanna be heard. - Well, there is that. I mean that's the thing, I don't want to hide on this and skulk around, I don't think I should have to. Um, obviously there are circumstances that are saying that, and I think it is powerful to come out and be like, look, I'm not afraid, you know, and I don't think other people should either. I was sitting in the office right next to you last week. You know, we all have a stake in this. This is our country. And the balance of power between the citizenry and the government is becoming that of the ruling and the ruled as opposed to actually, you know, the elected and the electorate. Okay, so that's what I needed to hear, that this is not about... But I do want to say: I don't think there's a case that I'm not going to be discovered in the fullness of time, it's a question of time frame. You're right, it could take them a long time. I don't think it will. But I didn't try to hide the footprint because again, I intended to come forward the whole time. I'm going to post this morning just a general defense of whistleblowers... That's fine, yeah. ...and you in particular without saying anything about you. I'm gonna go post that right when I get back. And I'm also doing like a big fuck-you to all the people who keep, like, talking about investigations. I want that to be... The fearlessness and the fuck-you to, like, the bullying tactics has gotta be completely pervading everything we do. And I think that's brilliant. Your principles on this I love, I can't support them enough. Because it's inverting the model that the government has laid out, where people who are trying to, you know, say the truth skulk around and they hide in the dark and they quote anonymously and whatnot... I say yes, fuck that, let's just... Okay, so here's the plan then. And this is the thing. I think we just all felt the fact that this is the right way to do it. You feel the power of your choice, you know what I mean? I want that power to be felt in the world. And it is... it's the ultimate standing up to them. Right, like, "I'm not gonna fucking hide, even for like one second, I'm gonna get right in your face. You don't have to investigate, there's nothing to investigate, here I am." - Yeah. - You know? And I just think that is just incredibly powerful. And then the question just becomes how do we do this in the right... you know, the perfect way, and that's my burden. And that's what I'm gonna... So today is gonna be the story in the morning, assuming that it doesn't change with The Guardian, it's gonna be the story in the morning, just to keep the momentum going, just to keep the disclosures coming, a big one at night. Now it's becoming, like, okay, this is a major leak, and after today, when we post the two things that we're gonna post, it's gonna be, "What the fuck is this leak, and who did it," I guarantee you. I just want to make sure... move over slightly. Do you want me to move a little more over, or, okay. I just wanna... all right. All right, we're rolling. So let's just begin with some basic background information, like, just state your name, what position you held in the intelligence community, and... and how long you worked within that community. Okay, um, just so I'm aware of where we're going, how in depth are we going, just in general, like 'I'm currently an infrastructure analyst you know, Booz Allen Hamilton, not going through my whole back story...' - Yeah. - Okay. Just like, yeah, summary kind of... Okay. Uh, My name's Ed Snowden, I'm, uh, 29 years old, I work for Booz Allen Hamilton as an infrastructure analyst for NSA, uh, in Hawaii. And what are some of the positions that you held previously within the intelligence community? Uh, I've been, uh, a systems engineer, systems administrator, uh, senior advisor, uh, for the, uh, Central Intelligence Agency, solutions consultant and a, uh, telecommunications informations systems officer. And what kind of clearances have... have you held, what kind of classification? Uh, Top Secret, uh... Hm... So people in my levels of access for systems administration or as a... a infrastructure analyst, typically have, uh, higher accesses than an NSA employee would normally have. Normal NSA employees have a combination of clearances called TS, SI, TK, and Gamma. Um, that's Top Secret, uh, Signals Intelligence, Talent Keyhole, and Gamma. And they all, uh, relate to certain things that are sort of core to the NSA mission. As a systems administrator, you get a special clearance called PRIVAC, for Privileged Access, which allows you to be exposed to information of any classification, regardless of what your position actually needs. Just before we go, a reminder of our top story, that's that the former CIA technical worker Edward Snowden says he's responsible for leaking information that US authorities had been monitoring phone and Internet data. The US Justice Department confirmed it's in the first stages of a criminal investigation. Leave it longer or cut it shorter, what do you think? As far as the video that people saw? - Am I less identifiable now? - Lose it? Cause I can't go all the way down. It's still gonna be stubble. I don't have the blade for closer. Will you be talking to any other media about this story today? I am. Will you be coming to our office at Associated Press? We'd be interested to ask about where is Snowden now, what his plans are. I'm not going to talk about that, so unless you have other questions, it's gonna be a fruitless interview. What are your plans, please? Are you staying in Hong Kong for the time being? For a little while. And do you have any hopes to write more about this story, or are you stopping new writing about this story? No, I'm gonna continue to write about it. Have you had any pressure from the US authorities - about continuing to report on this? - No. And have you heard anything about what could be the attitude of Hong Kong authorities towards this case, whether they've contacted you or asked you anything about the whereabouts of Snowden and whether that is another... I haven't heard from the authorities of any government. And where do you think the story is going, for you and of course for Snowden, and of course for the US media and the US administration in general? Well, for me I can tell, I'm gonna continue to report on... do my reporting on what the government has been doing and what I think my readers should know about. Um, as for him, I don't... I don't think anyone knows. They could have people come after me or any of their third-party partners. You know, they work closely with a number of other nations. Or, you know, they could pay off the triads. You know, any of their agents or assets, uh... we have a CIA station just up the road, at the consulate here in Hong Kong. Hello, I'm Daniela Ritorto. The top story this hour: facing a criminal investigation, the whistleblower who revealed details on how the US is monitoring phone calls and Internet data goes public. Security forces in Afghanistan say a number of Taliban insurgents have targeted Kabul's airport. Now it's time for our newspaper review and looking at what's making headlines around the world. Let's start with The Guardian, our top story, which is revealing the identity of the former CIA employee who the paper says leaked information exposing the scale of American surveillance of the Internet. Edward Snowden. What a great story. Kira, Ewen, what do you think? Well, I think it's a fantastic story... first off, it could be straight out of a John Le Carre novel. I mean, when you read what he did, yes, he got the material. He then decided to go to the place he identified as being very difficult for America to get at him... God damn it. ...which is Hong Kong, because, of course, technically inside China, the one country, two systems policy there, meaning he would get potentially some protection abroad. All very well-planned. It could have been just out of a spy novel. But what about the details? Well, that could make it worse, but... I don't know, only shows the lower half of my face. Snowden says he'd become increasingly dismayed by what he saw as the growing power of the NSA, hence his decision to pass on documents which are said to reveal not only that the organization monitored millions of phone calls, but that it had direct access to some of the biggest... How do you feel? Um... what happens, happens. We've, uh, we've talked about this. I knew what the risks were. If I get arrested, I get arrested. Um... We were able to get the information, uh, that needed to get out, out. And you and Glenn are able to keep reporting, regardless of what happens to me. Now what 29-year-old Edward Snowden said that US... The Guardian newspaper reveals his identity... Yes? ...from Washington, David Willis has this. Uh, I'm sorry, who's asking? Uh, I'm afraid you have the wrong room. Thank you. Wall Street Journal. Yes? Uh, I'm sorry, say again? Uh, no. No thank you. No calls. I think they have the wrong number. Yeah, no calls. Thank you. Uh, wait, I'm sorry. If it's uh, if it's two men from the front desk, they can call, but no outside calls... Wait, actually, just let them through. Wait, wait, ma'am? Fuck! Yes? Uh, wait, is it... is it a lawyer? Yeah, no, no, no, I mean the people who are asking, ask them if they are lawyers. Uh, no. Tell her that, uh, she has the wrong number and there's no Mr. Snowden here. Hi, Robert, can you talk right now? I safely got into the room. I'm now safely with the client, okay? So, can we talk together about the plan? Did this application start already or what? Technically? Yeah, but... So technically it hasn't started yet. Would you mind to talk in speakerphone? Sorry. Hey, Robert. Yeah, hi. Hi, I'm the client. Hi, Edward, how are you holding up? Uh, pretty good. I'm doing well. Okay, I just met with the head of the UNHCR here in Hong Kong, and they are aware that you are raising the protection you are entitled to under the UNHCR and and they would like you to come in with us to the UN. Okay. If you come now, it's lunchtime, but they're gonna let us in. No one else can get in. Okay. At the UNHCR there are separate exits from the building so we have a good opportunity, if any of the media finds out you're there... Yeah. ...you'll be able to exit a different way from the building. Okay, that's great. Is it okay if I bring equipment? 'Cause I'm just kind of going so I can leave in any direction at any time and not come back, if necessary. Just walk out of there. You don't have to go back. Okay. Take whatever you want with you, and just go with Mr. Man. I will pick you... he knows where I'm gonna pick you guys up, and then I'll bring you to the UNHCR. Okay, that sounds good. Thank you, uh, thank you so much for helping me. He's quite worried about the next step, about accommodation, where he is going to stay, whether there is something private and he would not be discovered by the police. Don't worry about that now. Let's just get him to the UN. Okay, I see. Okay, I will give you a call before we start, okay? - Okay, thank you. - Okay, thank you. - Bye-bye. - Bye. So... We don't have a car. Okay. What I'm thinking... we may ask the concierge to arrange a car, or we just go down and catch a taxi. But it's quite... The traffic here in Tsim Sha Tsui is quite difficult to get a taxi. Yeah... And so is there a precedent for this, where Hong Kong would extradite someone for political speech? No, I'm not aware of. But if we have a torture claim or asylum-seeking claim, then they ought, under the law, they ought to give you recognizance for you to stay in Hong Kong because they don't know where to dump you back yet. The president certainly does not welcome the way that this debate has earned greater attention in the last week, the leak of classified information about sensitive programs that are important in our fight against terrorists who would do harm to Americans, is a problem. But the debate itself is legitimate and should be engaged. "The US Spied on Millions of Brazilian Emails and Phone Calls" I'd like to show you the new document now. You'll see it much more clearly. This map shows the cables they use to collect the data for PRISM. Here it shows how much they are collecting. The thicker the line, the more they're collecting. You can see these lines, the cables, are quite thick in the south of Brazil and up north in the Sea of Brazil. So they're collecting a lot through the PRISM program, which I think is very important because PRISM is Facebook, Skype, YouTube, Yahoo, Hotmail. And it shows a lot is being stolen from Brazil. But we don't know how much the Brazilian government knows, or whether it's collaborating with Brazilian companies. But we're going to know, I believe. One day we will know everything. Or almost everything. Yes. All right, so which ones do we want here, then? This is operational stuff, so we mustn't say any of this... So redact that. Go... go to top. What about the Alexander quote? Yeah, that's in TARMAC. "Why can't we collect all the signals all the time? Sounds like a good summer homework project for Menwith." Keith Alexander, the head of the NSA, on a visit to UK. - This one. - Yeah. Secret document, isn't it? Secret document. We've got a stick here that should just have three single slides on them. If it's got more than three single slides, we have to be extremely careful. - Yeah? - Yeah, that's it. This is really dangerous stuff for us, The Guardian, isn't it? You make mistakes and at the very end where we kept it all under lock and key... And no one knows. I'm not saying that... They will come in and smack the front door down if we... if we elaborate on that. He said the Prime Minister's extremely concerned about this. And they kept saying, "This is from the very top." As you can see on this map, the flight that reportedly has Snowden aboard has almost reached its destination here in Moscow, scheduled to land in the Russian capital within minutes. As you may have heard, there is a CIA Agent who has revealed a lot of information, and he is now trapped in the, um, the airport in Moscow. We managed to get him out of Hong Kong, but when he landed in the Moscow airport, the American government had canceled his passport. So, formally, he hasn't entered into Russian territory. He is in the transit area of the airport, and one of our people is accompanying him. We are trying to arrange a private jet to, um take him from Moscow to Ecuador or perhaps maybe Venezuela or maybe Iceland, countries where he will be safe. The floor is yours, for the time that you deem necessary. Thank you and hello. First of all, Americans' justification for everything since the September 11 attacks is terrorism. Everything is in the name of national security, to protect our population. In reality, it's the opposite. A lot of the documents have nothing to do with terrorism or national security, but with competition between countries, and with companies' industrial, financial, or economic issues. Secondly, there's XKeyscore. When we first started publishing articles, the US government's defense was that it was not invading the content of communications, just taking the metadata. That means the names of the people talking, who is calling whom, call durations. But if I know all the people you are communicating with, and everyone they are communicating with, where you are when you are communicating, the call duration and the location, then I can learn a lot about your personality, your activity, and your life. This is a major invasion of privacy. In reality, that defense is totally false. The US government has the ability to get not only metadata, but the actual content of your emails or what you say on the phone, the words you type into Google searches, the websites you visit, the documents you send to colleagues. This system can track nearly everything that every individual is doing online. So if you're a journalist investigating the American government, if you work for a company with American competitors, or if you work in human rights involving the American government, or any other field, they can very easily intercept your communication. If you're an American living in the US, they have to seek permission from a court, but they always get it. But if you're not American, they don't need anything, no special permission at all. I think the consequences of eliminating privacy are difficult to predict, but we must understand that this will have an enormous impact. The population's ability to have demonstrations or to organize is greatly reduced when people don't have privacy. May I collect all phones, please? Okay. I have everything here, so... Put them in the refrigerator. So... So as you know, in June, Snowden was charged with three legal violations, felonies, principally under a World War I-era criminal law called the Espionage Act. The Espionage Act is an extremely broad criminal prohibition against the sharing or dissemination of what's called national defense information. It was only used to, uh, prosecute people who had been accused of acting with a foreign power. Spies, not whistleblowers. And it's a very unusual legal representation, I think, not just for all of you but for me as well. The Espionage Act does not distinguish between leaks to the press in the public interest and selling secrets to foreign enemies for personal profit. So under the Espionage Act, it's not a defense if the information that was disclosed should not have been withheld in the first place, that it was improperly classified, it's not a defense if the dissemination was in the public interest, that it led to reforms, um, even if a court determines that the programs that were revealed were illegal or unconstitutional, that's still not a defense under the Espionage Act, the government doesn't have to defend the classification, it doesn't have to demonstrate harm from the release, um, all of this is irrelevant. So when we say that the trial wouldn't be fair, we're not talking about what human rights lawyers think of as fair trial practices. We're saying the law, the statute itself... eliminates any kind of defense that Snowden might be able to make, and essentially would equate him with a spy. And of course those three counts could be increased to a hundred or two hundred or three hundred. They could charge him separately for each document that has been published by a journalist. And I think that... that we all recognize, even though we sit here as lawyers in a lawyer's meeting, that it's probably 95 percent politics and five percent law how this will be resolved. Mr. Snowden has been charged with very serious crimes, and he should be returned to the United States where he will be granted full due process and every right available to him as a United States citizen... facing our justice system under the Constitution. No, I don't think Mr. Snowden was a patriot. I called for a thorough review of our surveillance operations before Mr. Snowden made these leaks. My preference, and I think the American peoples' preference, would have been for a lawful, orderly examination of these laws. A thoughtful, fact-based debate, uh, that would then lead us to a better place. Oh, my God. David. Hello, my baby, how you doing? - I'm okay. - You okay? Let's go. I just want to go home. Okay, okay, you just have to walk. How are you? Good, I'm totally fine, I didn't sleep at all, - I couldn't sleep. - I know. "Brazil Demands Explanation from UK Government" Recent reports have revealed that the NSA have access to encryption keys and they paid tech companies to introduce back doors in encryption protocols. So we're going to talk about ways in which we can defend ourselves against governments spying on us. So Mr. Jacob Applebaum is an encryption and security software developer and journalist. Ladar Levinson is the founder of the encrypted email service Lavabit, used by Edward Snowden. You have the floor. Thank you. Lavabit is an email service that hopefully one day will be able to stand on its own without any references to Snowden. My service was designed to remove me from the possibility of being forced to violate a person's privacy. Quite simply, Lavabit was designed to remove the service provider from the equation. By not having logs on my server and not having access to a person's emails on disk, I wasn't eliminating the possibility of surveillance, I was simply removing myself from that equation. In that surveillance would have to be conducted on the target, either the sender or the receiver of the messages. But I was approached by the FBI quite recently and told that because I couldn't turn over the information from that one particular user, I would be forced to give up those SSL keys and let the FBI collect every communication on my network without any kind of transparency. And of course... I wasn't comfortable with that, to say the least. More disturbing was the fact that I couldn't even tell anybody that it was going on. So I decided if I didn't win the fight to unseal my case, if I didn't win the battle to be able to tell people what was going on, then my only ethical choice left was to shut down. Think about that. I believe in the rule of law, I believe in the need to conduct investigations. But those investigations are supposed to be difficult for a reason. It's supposed to be difficult to invade somebody's privacy. Because of how intrusive it is. Because of how disruptive it is. If we can't... if we don't have our right to privacy, how do we have a free and open discussion? What good is the right to free speech... if it's not protected... in the sense that you can't have a private discussion with somebody else about something you disagree with. Think about the chilling effect that that has. Think about the chilling effect it does have on countries that don't have a right to privacy. I've noticed a really interesting discussion point. Which is that what people used to call liberty and freedom, we now call privacy. And we say, in the same breath, that privacy is dead. This is something that really concerns me about my generation. Especially when we talk about how we're not surprised by anything. I think that we should consider that when we lose privacy, we lose agency, we lose liberty itself. Because we no longer feel free to express what we think. There's this myth of the passive surveillance machine. But actually what is surveillance, except control? This notion that the NSA are passive, this is nonsense. What we see is that they actively attack European citizens, American citizens, and in fact, anyone that they can if they perceive an advantage. And then there's the key paragraph that says it was the SCS that intercepted Chancellor Merkel's mobile phone. We have the number. What will you tell the German people? I'll have to give that in testimony. - What are you going to tell? - Everything I can, truthfully. What will you talk about? Whatever the questions they ask me. - Yeah, I think it's over there. - Okay, all right. Thank you. Hello, Mr. Binney. Hey, how are you? How are you? Good to see you again. Nice to meet you again, yes. It is my pleasure to be here. I feel that it's important to testify about what's really going on behind the scenes in the intelligence communities around the world. Not just in NSA. All those programs that Edward Snowden has exposed fundamentally are ways of acquiring information. Every dictatorship down through history has always done that. One of the first things they need to do is try to acquire knowledge of their population. And that's exactly what these programs do. I see this as the most major threat to our democracies all around the world. What do you think they're doing to reporters, those of us that are working directly with the Snowden documents? How do you think they would approach dealing with people like us? You're on the cast iron cover list. Which means any... any electronic device you use that they can attach to you they'll record and capture all that data. And what do they do with that data? Trying to figure out what we're doing? Uh, well, that's part of it, but the other part for them I think is to find the sources of information you're getting. So if I have a confidential source who's giving me information as a whistleblower, and he works within the US government, and he's concerned about what he perceives as violations of the Constitution, and he gets in touch with me, they... go ahead. From there on, they would nail him and start watching everything he did, and if he started passing data, I'm sure they'd take him off the street. I mean, the way you'd have to do it is like Deep Throat did, right? In the Nixon years. Meet in the basement of a parking garage, physically. "Let's disassociate our metadata one last time... so we don't have a record of your true name in our final communication chain. This is obviously not to say you can't claim your involvement, but as every trick in the book is likely to be used in looking into this, I believe it's better that that particular disclosure come on your own terms. Thank you again for all you've done. So sorry again for the multiple delays, but we've been in uncharted territory with no model to benefit from. If all ends well, perhaps the demonstration that our methods worked will embolden more to come forward. Citizen." So the update that I wanna give you is about the new, um... the new source that we... Okay. That... This is what... This is the person who's doing the most... Mm-hmm, right. ...the work on it, um... And now, basically what's happened is... And... That's actually... that's really dangerous. Um... on the source's side. Do they know how to take care of themselves? I mean he... it's all being done... through this. Okay. And they're all talking... this way. Okay. I was gonna say, one of the big questions there is, can they handle it? No, they're very careful. - Even... through that. Yeah. - Okay. And... That's where that is. Wow, that's really something. Did you know that? It's not the actual planes. Right, right, you mean the control. It's the process, who's sending the... yeah. There's a chart. There's like a whole layout for every one... That is really bold; it's really risky. You know, that's the thing, if they understand what they're doing... There's this chart, it goes like this. It shows the decision-making chart. It's shaped like this: - So up here it says... - Mm-hmm. That's the decision-making chart for each... one. - It's so political! - This is this part's amazing. - That's... - That's fucking ridiculous. This is... It's so shocking. That's... that's the population of entire countries. That's what we're working on. That person is incredibly bold. But, um... But also very well aware. You know, I just hope... I mean... No, I mean, the boldness of it is shocking, but it was obviously motivated by what you did, - I mean... - This is going to. This is going to That could raise the profile... of this whole political situation with whistleblowing to a whole new level. - Exactly. - It's gonna... Yeah, I actually think that's a great thing. And I think people are gonna see what's being hidden again, again, by a totally different part of the government. |
|