No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Rate it:
Open Preview
2%
Flag icon
Converting the Internet into a system of surveillance thus guts it of its core potential. Worse, it turns the Internet into a tool of repression, threatening to produce the most extreme and oppressive weapon of state intrusion human history has ever seen.
2%
Flag icon
we stand at a historic crossroads. Will the digital age usher in the individual liberation and political freedoms that the Internet is uniquely capable of unleashing? Or will it bring about a system of omnipresent monitoring and control, beyond the dreams of even the greatest tyrants of the past? Right now, either path is possible. Our actions will determine where we end up.
3%
Flag icon
The program essentially wraps every email in a protective shield, which is a code composed of hundreds, or even thousands, of random numbers and case-sensitive letters. The most advanced intelligence agencies around the world—a class that certainly includes the National Security Agency—possess password-cracking software capable of one billion guesses per second. But so lengthy and random are these PGP encryption codes that even the most sophisticated software requires many years to break them.
4%
Flag icon
The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.
16%
Flag icon
Snowden recounted how one of the undercover officers befriended the banker, got him drunk one night, and encouraged him to drive home. When the banker was stopped by the police and arrested for DUI, the CIA agent offered to help him personally in a variety of ways, provided that the banker cooperated with the agency. The recruitment effort ultimately failed. “They destroyed the target’s life for something that didn’t even work out, and simply walked away,”
16%
Flag icon
“But then it became clear that Obama was not just continuing, but in many cases expanding these abuses,” he said.
17%
Flag icon
Finally, Snowden gave me an answer that felt vibrant and real. “The true measurement of a person’s worth isn’t what they say they believe in, but what they do in defense of those beliefs,” he said. “If you’re not acting on your beliefs, then they probably aren’t real.”
17%
Flag icon
People are only that which their actions define them as being. “I don’t want to be a person who remains afraid to act in defense of my principles.”
35%
Flag icon
Overall, in just thirty days the unit had collected data on more than 97 billion emails and 124 billion phone calls from around the world. Another BOUNDLESS INFORMANT document detailed the international data collected in a single thirty-day period from Germany (500 million), Brazil (2.3 billion), and India (13.5 billion). And yet other files showed collection of metadata in cooperation with the governments of France (70 million), Spain (60 million), Italy (47 million), the Netherlands (1.8 million), Norway (33 million), and Denmark (23 million).
35%
Flag icon
The documents left no doubt that the NSA was equally involved in economic espionage, diplomatic spying, and suspicionless surveillance aimed at entire populations.
41%
Flag icon
The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
44%
Flag icon
The NSA is the definitive rogue agency: empowered to do whatever it wants with very little control, transparency, or accountability.
44%
Flag icon
Professor Felten notes, eavesdropping on calls can be quite difficult due to language differences, meandering conversations, the use of slang or deliberate codes, and other attributes that either by design or accident obfuscate the meaning. “The content of calls are far more difficult to analyze in an automated fashion due to their unstructured nature,” he argued. By contrast, metadata is mathematical: clean, precise, and thus easily analyzed. And as Felten put it, it is often “a proxy for content”:
47%
Flag icon
Warning the world about Chinese surveillance could have been one of the motives behind the US government’s claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA’s own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition: when someone buys a Chinese device instead of an American one, the NSA loses a crucial means of spying on a great many communication activities.
48%
Flag icon
Edward Snowden made an audacious claim: “I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email.”
48%
Flag icon
The methods for searching social media activity are every bit as simple as the email search. An analyst enters the desired user name on, say, Facebook, along with the date range of activity, and X-KEYSCORE then returns all of that user’s information, including messages, chats, and other private postings.
49%
Flag icon
The blunt title of his presentation: “The Role of National Interests, Money, and Egos.” These three factors together, he says, are the primary motives driving the United States to maintain global surveillance domination.
49%
Flag icon
The Internet has long been heralded as an unprecedented instrument of democratization and liberalization, even emancipation. But in the eyes of the US government, this global network and other types of communications technology threaten to undermine American power.
55%
Flag icon
The evidence shows that assurances that surveillance is only targeted at those who “have done something wrong” should provide little comfort, since a state will reflexively view any challenge to its power as wrongdoing.
61%
Flag icon
The more we choose to eavesdrop on the Internet and other communications technologies, the less we are secure from eavesdropping by others. Our choice isn’t between a digital world where the NSA can eavesdrop and one where the NSA is prevented from eavesdropping; it’s between a digital world that is vulnerable to all attackers, and one that is secure for all users.
61%
Flag icon
The idea that we should dismantle the core protections of our political system to erect a ubiquitous surveillance state for the sake of this risk is the height of irrationality.
62%
Flag icon
The problem, though, is that there are far too many power factions with a vested interest in the fear of terrorism: the government, seeking justification for its actions; the surveillance and weapons industries, drowning in public funding;
62%
Flag icon
But the Constitution was written to prevent such suspicionless invasions by the state. By drawing the line at such actions, we knowingly allow for the probability of greater criminality. Yet we draw that line anyway, exposing ourselves to a higher degree of danger, because pursuing absolute physical safety has never been our single overarching societal priority.
63%
Flag icon
Democracy requires accountability and consent of the governed, which is only possible if citizens know what is being done in their name.
70%
Flag icon
That is because those leaks are sanctioned by Washington and serve the interests of the US government, and are thus considered appropriate and acceptable. The only leaks that the Washington media condemns are those that contain information officials would prefer to hide.