Permanent Record
Rate it:
Open Preview
Kindle Notes & Highlights
1%
Flag icon
Deep in a tunnel under a pineapple field—a subterranean Pearl Harbor–era former airplane factory—I sat at a terminal from which I had practically unlimited access to the communications of nearly every man, woman, and child on earth who’d ever dialed a phone or touched a computer. Among those people were about 320 million of my fellow American citizens, who in the regular conduct of their everyday lives were being surveilled in gross contravention of not just the Constitution of the United States, but the basic values of any free society.
1%
Flag icon
Before you recoil, knowing well the toxic madness that infests that hive in our time, understand that for me, when I came to know it, the Internet was a very different thing. It was a friend, and a parent. It was a community without border or limit, one voice and millions, a common frontier that had been settled but not exploited by diverse tribes living amicably enough side by side, each member of which was free to choose their own name and history and customs.
2%
Flag icon
If most of what people wanted to do online was to be able to tell their family, friends, and strangers what they were up to, and to be told what their family, friends, and strangers were up to in return, then all companies had to do was figure out how to put themselves in the middle of those social exchanges and turn them into profit. This was the beginning of surveillance capitalism, and the end of the Internet as I knew it.
2%
Flag icon
The freedom of a country can only be measured by its respect for the rights of its citizens, and it’s my conviction that these rights are in fact limitations of state power that define exactly where and when a government may not infringe into that domain of personal or individual freedoms that during the American Revolution was called “liberty” and during the Internet Revolution is called “privacy.”
2%
Flag icon
The attempts by elected officials to delegitimize journalism have been aided and abetted by a full-on assault on the principle of truth. What is real is being purposefully conflated with what is fake, through technologies that are capable of scaling that conflation into unprecedented global confusion. I know this process intimately enough, because the creation of irreality has always been the Intelligence Community’s darkest art. The same agencies that, over the span of my career alone, had manipulated intelligence to create a pretext for war—and used illegal policies and a shadow judiciary to ...more
8%
Flag icon
This fact alone virtually guaranteed technological tyranny, which was perpetuated not by the technology itself but by the ignorance of everyone who used it daily and yet failed to understand it. To refuse to inform yourself about the basic operation and maintenance of the equipment you depended on was to passively accept that tyranny and agree to its terms: when your equipment works, you’ll work, but when your equipment breaks down you’ll break down, too. Your possessions would possess you.
9%
Flag icon
There was an utterly logical relationship between my input and the output. If my input was flawed, the output was flawed; if my input was flawless, the computer’s output was, too. I’d never before experienced anything so consistent and fair, so unequivocally unbiased.
15%
Flag icon
That, ultimately, is the critical flaw or design defect intentionally integrated into every system, in both politics and computing: the people who create the rules have no incentive to act against themselves.
15%
Flag icon
though it’s characteristic of adolescence to confuse resistance with escapism or even violence.
15%
Flag icon
To hack a system requires getting to know its rules better than the people who created it or are running it, and exploiting all the vulnerable distance between how those people had intended the system to work and how it actually works, or could be made to work. In capitalizing on these unintentional uses, hackers aren’t breaking the rules as much as debunking them.
15%
Flag icon
It’s this egalitarian nature of hacking—which doesn’t care who you are, just how you reason—that makes it such a reliable method of dealing with the type of authority figures so convinced of their system’s righteousness that it never occurred to them to test it.
18%
Flag icon
You should always let people underestimate you. Because when people misappraise your intelligence and abilities, they’re merely pointing out their own vulnerabilities—the gaping holes in their judgment that need to stay open if you want to cartwheel through later on a flaming horse, correcting the record
20%
Flag icon
It’s painful to write this, though not so much because the events of this period are painful to recall as because they’re in no way indicative of my parents’ fundamental decency—or of how, out of love for their children,
20%
Flag icon
This is why the best account that someone can ever give of themselves is not a statement but a pledge—a pledge to the principles they value, and to the vision of the person they hope to become.
21%
Flag icon
It’s amazing what you do for love, especially when it’s unrequited.
22%
Flag icon
Dunbar’s number, the famous estimate of how many relationships you can meaningfully maintain in life, is just 150.
24%
Flag icon
I wanted to be a liberator. I wanted to free the oppressed. I embraced the truth constructed for the good of the state, which in my passion I confused with the good of the country.
28%
Flag icon
jingoistic
29%
Flag icon
It was heinous to be so inextricably, technologically bound to a past that I fully regretted but barely remembered.
29%
Flag icon
This might be the most familiar problem of my generation, the first to grow up online. We were able to discover and explore our identities almost totally unsupervised, with hardly a thought spared for the fact that our rash remarks and profane banter were being preserved for perpetuity, and that one day we might be expected to account for them.
30%
Flag icon
impugned
32%
Flag icon
I had hoped to serve my country, but instead I went to work for it. This is not a trivial distinction.
33%
Flag icon
From the vantage of the corporate boardroom, contracting functions as governmentally assisted corruption. It’s America’s most legal and convenient method of transferring public money to the private purse.
35%
Flag icon
You don’t need to tell a bunch of computer whizzes that they possess superior knowledge and skills that uniquely qualify them to act independently and make decisions on behalf of their fellow citizens without any oversight or review. Nothing inspires arrogance like a lifetime spent controlling machines that are incapable of criticism.
36%
Flag icon
nadir
42%
Flag icon
The methods we learned about at times seemed close to voodoo—such as the ability to reproduce what’s being displayed on any computer monitor by using only the tiny electromagnetic emissions caused by the oscillating currents in its internal components, which can be captured using a special antenna, a method called Van Eck phreaking.
43%
Flag icon
he knew how it worked, and how ludicrous it was to trust management to fix something that management itself had broken. I was a bureaucratic innocent by comparison, disturbed by the loss and by the ease with which Spo and the others accepted it. I hated the feeling that the mere fiction of process was enough to dispel a genuine demand for results.
49%
Flag icon
agency’s ultimate dream, which is permanency—to store all of the files it has ever collected or produced for perpetuity, and so create a perfect memory. The permanent record.
50%
Flag icon
gravamen
57%
Flag icon
Meanwhile, the private sector was busy leveraging our reliance on technology into market consolidation.
58%
Flag icon
America’s fundamental laws exist to make the job of law enforcement not easier but harder. This isn’t a bug, it’s a core feature of democracy.
58%
Flag icon
I wondered whether this would be the final but grotesque fulfillment of the original American promise that all citizens would be equal before the law: an equality of oppression through total automated law enforcement.
58%
Flag icon
Extreme justice can turn out to be extreme injustice, not just in terms of the severity of punishment for
60%
Flag icon
But it turned out that fear was the true terrorism, perpetrated
61%
Flag icon
The word “privacy” itself is somewhat empty, because it is essentially indefinable, or over-definable. Each of us has our own idea of what it is. “Privacy” means something to everyone. There is no one to whom it means nothing.
61%
Flag icon
Ultimately, saying that you don’t care about privacy because you have nothing to hide is no different from saying you don’t care about freedom of speech because you have nothing to say.
62%
Flag icon
The most important decisions in life are never made that way. They’re made subconsciously and only express themselves consciously once fully formed—once you’re finally strong enough to admit to yourself that this is what your conscience has already chosen for you, this is the course that your beliefs have decreed.
65%
Flag icon
PRISM enabled the NSA to routinely collect data from Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, Skype, AOL, and Apple, including email, photos, video and audio chats, Web-browsing content, search engine queries, and all other data stored on their clouds, transforming the companies into witting coconspirators.
66%
Flag icon
Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons.
66%
Flag icon
If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you.
67%
Flag icon
If you don’t agree, then answer me this: Would you rather let your coworkers hang out at your home alone for an hour, or let them spend even just ten minutes alone with your unlocked phone?
68%
Flag icon
AMERICA WAS BORN from an act of treason. The Declaration of Independence was an outrageous violation of the laws of England and yet the fullest expression of what the Founders called the “Laws of Nature,” among
72%
Flag icon
Every STOP sign on my commute I took as advice to stop this voluntary madness. My head and heart were in conflict, with the only constant being the desperate hope that somebody else, somewhere else, would figure it out on their own.
72%
Flag icon
The first was the NSA’s announcement of the construction of a vast new data facility in Bluffdale, Utah.
75%
Flag icon
which was setting up dragnets like OPTICNERVE, a program that saved a snapshot every five minutes from the cameras of people video-chatting on platforms like
77%
Flag icon
A single-user document is a document marked with a user-specific code, so that if any publication’s editorial staff decided to run it by the government, the government would know its source. Sometimes the unique identifier was hidden in the date and time-stamp coding, sometimes it involved the pattern of microdots in a graphic or logo.
77%
Flag icon
A little bit of math can accomplish what all the guns and barbed wire can’t: a little bit of math can keep a secret.
78%
Flag icon
Also, I honestly missed teaching: it had been a year since I’d stood at the front of a class, and the moment I was back in that position I realized I’d been teaching the right things to the wrong people all along.
79%
Flag icon
In my communications with journalists, I used 4096- and 8192-bit keys. This meant that absent major innovations in computing technology or a fundamental redefining of the principles by which numbers are factored, not even all of the NSA’s cryptanalysts using all of the world’s computing power put together would be able to get into my drive. For this reason, encryption is the single best hope for fighting surveillance of any kind. If all of our data, including our communications, were enciphered in this fashion, from end to end (from the sender end to the recipient end), then no government—no ...more
80%
Flag icon
My key to the NSA’s secrets went beyond zero knowledge: it was a zero-knowledge key consisting of multiple zero-knowledge keys.
« Prev 1