Permanent Record
Rate it:
Open Preview
Read between May 7 - June 12, 2020
2%
Flag icon
The promise of convenience led people to exchange their personal sites—which demanded constant and laborious upkeep—for a Facebook page and a Gmail account. The appearance of ownership was easy to mistake for the reality of it. Few of us understood it at the time, but none of the things that we’d go on to share would belong to us anymore.
2%
Flag icon
creation of irreality has always been the Intelligence Community’s darkest art. The same agencies that, over the span of my career alone, had manipulated intelligence to create a pretext for war—and used illegal policies and a shadow judiciary to permit kidnapping as “extraordinary rendition,” torture as “enhanced interrogation,” and mass surveillance as “bulk collection”—didn’t hesitate for a moment to call me a Chinese double agent, a Russian triple agent, and worse: “a millennial.”
9%
Flag icon
That a perfectly written set of commands would perfectly execute the same operations time and again would come to seem to me—as it did to so many smart, tech-inclined children of the millennium—the one stable saving truth of our generation.
15%
Flag icon
I knew how the system worked: you corrected a teacher’s mistake, you got a warning; you confronted the teacher when they didn’t admit the mistake, you got detention; someone cheated off your exam, and though you didn’t expressly let them cheat, you got detention and the cheater got suspended.
15%
Flag icon
To hack a system requires getting to know its rules better than the people who created it or are running it, and exploiting all the vulnerable distance between how those people had intended the system to work and how it actually works, or could be made to work. In capitalizing on these unintentional uses, hackers aren’t breaking the rules as much as debunking them.
23%
Flag icon
The two decades since 9/11 have been a litany of American destruction by way of American self-destruction, with the promulgation of secret policies, secret laws, secret courts, and secret wars, whose traumatizing impact—whose very existence—the US government has repeatedly classified, denied, disclaimed, and distorted. After having spent roughly half that period as an employee of the American Intelligence Community and roughly the other half in exile, I know better than most how often the agencies get things wrong.
29%
Flag icon
To deny my younger self would have been to deny my present self’s validity.
32%
Flag icon
Over the course of my career, it became increasingly difficult for me to ask these questions about the technologies I was responsible for and not about my country. And it became increasingly frustrating to me that I was able to repair the former but not the latter. I ended my time in Intelligence convinced that my country’s operating system—its government—had decided that it functioned best when broken.
32%
Flag icon
Every agency has a head count, a legislative limit that dictates the number of people it can hire to do a certain type of work. But contractors, because they’re not directly employed by the federal government, aren’t included in that number. The agencies can hire as many of them as they can pay for, and they can pay for as many of them as they want—all they have to do is testify to a few select congressional subcommittees that the terrorists are coming for our children, or the Russians are in our emails, or the Chinese are in our power grid. Congress never says no to this type of begging, ...more
33%
Flag icon
IC directors ask Congress for money to rent contract workers from private companies, congresspeople approve that money, and then those IC directors and congresspeople are rewarded, after they retire from office, by being given high-paying positions and consultancies with the very companies they’ve just enriched.
34%
Flag icon
At the time I was so inexperienced, I didn’t understand why he was trying to overpay me. I knew, I guess, that this wasn’t ultimately COMSO’s money, but I only later understood that some of the contracts that COMSO and BAE and others handled were of the type that’s called “cost-plus.” This meant that the middlemen contractors billed the agencies for whatever an employee got paid, plus a fee of 3 to 5 percent of that every year. Bumping up salaries was in everyone’s interest—everyone’s, that is, except the taxpayer’s.
35%
Flag icon
You don’t need to tell a bunch of computer whizzes that they possess superior knowledge and skills that uniquely qualify them to act independently and make decisions on behalf of their fellow citizens without any oversight or review. Nothing inspires arrogance like a lifetime spent controlling machines that are incapable of criticism.
36%
Flag icon
This, to my thinking, actually represented the great nexus of the Intelligence Community and the tech industry: both are entrenched and unelected powers that pride themselves on maintaining absolute secrecy about their developments. Both believe that they have the solutions for everything, which they never hesitate to unilaterally impose. Above all, they both believe that these solutions are inherently apolitical, because they’re based on data, whose prerogatives are regarded as preferable to the chaotic whims of the common citizen.
38%
Flag icon
He used to say that “contracting was the third biggest scam in Washington,” after the income tax and Congress.
41%
Flag icon
The worst-kept secret in modern diplomacy is that the primary function of an embassy nowadays is to serve as a platform for espionage.
48%
Flag icon
The 2008 crisis, which laid so much of the foundation for the crises of populism that a decade later would sweep across Europe and America, helped me realize that something that is devastating for the public can be, and often is, beneficial to the elites. This was a lesson that the US government would confirm for me in other contexts, time and again, in the years ahead.
48%
Flag icon
The cables and satellites, the servers and towers—so much of the infrastructure of the Internet is under US control that over 90 percent of the world’s Internet traffic passes through technologies developed, owned, and/or operated by the American government and American businesses, most of which are physically located on American territory.
48%
Flag icon
Though some of these companies might manufacture their devices in, say, China, the companies themselves are American and are subject to American law. The problem is, they’re also subject to classified American policies that pervert law and permit the US government to surveil virtually every man, woman, and child who has ever touched a computer or picked up a phone.
51%
Flag icon
The PSP empowered the NSA to collect telephone and Internet communications between the United States and abroad. Notably, the PSP allowed the NSA to do this without having to obtain a special warrant from a Foreign Intelligence Surveillance Court, a secret federal court established in 1978 to oversee IC requests for surveillance warrants after the agencies were caught domestically spying on the anti–Vietnam War and civil rights movements.
51%
Flag icon
In addition to collecting inbound communications coming from foreign countries, the NSA now also had policy approval for the warrantless collection of outbound telephone and Internet communications originating within American borders.
52%
Flag icon
Whereas the unclassified version merely made reference to the NSA being ordered to intensify its intelligence-gathering practices following 9/11, the classified version laid out the nature, and scale, of that intensification. The NSA’s historic brief had been fundamentally altered from targeted collection of communications to “bulk collection,” which is the agency’s euphemism for mass surveillance. And whereas the unclassified version obfuscated this shift, advocating for expanded surveillance by scaring the public with the specter of terror, the classified version made this shift explicit, ...more
53%
Flag icon
At any time, the government could dig through the past communications of anyone it wanted to victimize in search of a crime (and everybody’s communications contain evidence of something). At any point, for all perpetuity, any new administration—any future rogue head of the NSA—could just show up to work and, as easily as flicking a switch, instantly track everybody with a phone or a computer, know who they were, where they were, what they were doing with whom, and what they had ever done in the past.
53%
Flag icon
This is why it’s best to regard metadata not as some benign abstraction, but as the very essence of content: it is precisely the first line of information that the party surveilling you requires.
53%
Flag icon
There’s another thing, too: content is usually defined as something that you knowingly produce. You know what you’re saying during a phone call, or what you’re writing in an email. But you have hardly any control over the metadata you produce, because it is generated automatically.
53%
Flag icon
One major irony here is that law, which always lags behind technological innovation by at least a generation, gives substantially more protections to a communication’s content than to its metadata—and yet intelligence agencies are far more interested in the metadata—the activity records that allow them both the “big picture” ability to analyze data at scale, and the “little picture” ability to make perfect maps, chronologies, and associative synopses of an individual person’s life, from which they presume to extrapolate predictions of behavior. In sum, metadata can tell your surveillant ...more
57%
Flag icon
When we choose to store our data online, we’re often ceding our claim to it. Companies can decide what type of data they will hold for us, and can willfully delete any data they object to. Unless we’ve kept a separate copy on our own machines or drives, this data will be lost to us forever. If any of our data is found to be particularly objectionable or otherwise in violation of the terms of service, the companies can unilaterally delete our accounts, deny us our own data, and yet retain a copy for their own records, which they can turn over to the authorities without our knowledge or consent. ...more
57%
Flag icon
The majority of American Internet users lived their entire digital lives on email, social media, and e-commerce platforms owned by an imperial triumvirate of companies (Google, Facebook, and Amazon), and the American IC was seeking to take advantage of that fact by obtaining access to their networks—both through direct orders that were kept secret from the public, and clandestine subversion efforts that were kept secret from the companies themselves.
58%
Flag icon
Potential monitoring abuses piled up in my mind to cumulatively produce a vision of an appalling future. A world in which all people were totally surveilled would logically become a world in which all laws were totally enforced, automatically, by computers. After all, it’s difficult to imagine an AI device that’s capable of noticing a person breaking the law not holding that person accountable. No policing algorithm would ever be programmed, even if it could be, toward leniency or forgiveness.
60%
Flag icon
Domestically, there was the Homeland Securitization of everything, which assigned a threat rating to every waking day (Red–Severe, Orange–High, Yellow–Elevated), and, from the Patriot Act on, the steady erosion of civil liberties, the very liberties we were allegedly fighting to protect.
60%
Flag icon
But it turned out that fear was the true terrorism, perpetrated by a political system that was increasingly willing to use practically any justification to authorize the use of force.
60%
Flag icon
American politicians weren’t as afraid of terror as they were of seeming weak, or of being disloyal to their party, or of being disloyal to their campaign donors, who had ample appetites for government contracts and petroleum products from the Middle East.
60%
Flag icon
A decade later, it had become clear, to me at least, that the repeated evocations of terror by the political class were not a response to any specific threat or concern but a cynical attempt to turn terror into a permanent danger that required permanent vigilance enforced by unquestionable authority.
61%
Flag icon
But saying that you don’t need or want privacy because you have nothing to hide is to assume that no one should have, or could have, to hide anything—including their immigration status, unemployment history, financial history, and health records. You’re assuming that no one, including yourself, might object to revealing to anyone information about their religious beliefs, political affiliations, and sexual activities, as casually as some choose to reveal their movie and music tastes and reading preferences.
61%
Flag icon
Ultimately, saying that you don’t care about privacy because you have nothing to hide is no different from saying you don’t care about freedom of speech because you have nothing to say. Or that you don’t care about freedom of the press because you don’t like to read.
62%
Flag icon
SharePoint is a Microsoft product, a dopey poky program,
65%
Flag icon
According to Section 215 of the Patriot Act, aka the “business records” provision, the government was authorized to obtain orders from the FISA Court that compelled third parties to produce “any tangible thing” that was “relevant” to foreign intelligence or terrorism investigations. But as the court order I found made clear, the NSA had secretly interpreted this authorization as a license to collect all of the “business records,” or metadata, of telephone communications coming through American telecoms, such as Verizon and AT&T, on “an ongoing daily basis.” This included, of course, records of ...more
65%
Flag icon
PRISM enabled the NSA to routinely collect data from Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, Skype, AOL, and Apple, including email, photos, video and audio chats, Web-browsing content, search engine queries, and all other data stored on their clouds, transforming the companies into witting coconspirators.
65%
Flag icon
Upstream collection, meanwhile, was arguably even more invasive. It enabled the routine capturing of data directly from private-sector Internet infrastructure—the switches and routers that shunt Internet traffic worldwide, via the satellites in orbit and the high-capacity fiber-optic cables that run under the ocean.
65%
Flag icon
This collection was managed by the NSA’s Special Sources Operations unit, which built secret wiretapping equipment and embedded it inside the corporate facilities of obligi...
This highlight has been truncated due to consecutive passage length restrictions.
65%
Flag icon
Together, PRISM (collection from the servers of service providers) and upstream collection (direct collection from Internet infrastructure) ensured that the world’s informatio...
This highlight has been truncated due to consecutive passage length restrictions.
66%
Flag icon
I was surprised to be reminded that fully 50 percent of the Bill of Rights, the document’s first ten amendments, were intended to make the job of law enforcement harder. The Fourth, Fifth, Sixth, Seventh, and Eighth Amendments were all deliberately, carefully designed to create inefficiencies and hamper the government’s ability to exercise its power and conduct surveillance.
67%
Flag icon
Translation: If officers of the law want to go rooting through your life, they first have to go before a judge and show probable cause under oath. This means they have to explain to a judge why they have reason to believe that you might have committed a specific crime or that specific evidence of a specific crime might be found on or in a specific part of your property. Then they have to swear that this reason has been given honestly and in good faith. Only if the judge approves a warrant will they be allowed to go searching—and even then, only for a limited time.
67%
Flag icon
The NSA’s surveillance programs, its domestic surveillance programs in particular, flouted the Fourth Amendment completely. The agency was essentially making a claim that the amendment’s protections didn’t apply to modern-day lives. The agency’s internal policies neither regarded your data as your legally protected personal property, nor regarded their collection of that data as a “search” or “seizure.”
68%
Flag icon
I realized that I was crazy to have imagined that the Supreme Court, or Congress, or President Obama, seeking to distance his administration from President George W. Bush’s, would ever hold the IC legally responsible—for anything. It was time to face the fact that the IC believed themselves above the law, and given how broken the process was, they were right. The IC had come to understand the rules of our system better than the people who had created it, and they used that knowledge to their advantage.
69%
Flag icon
Time and again, America’s political class has proven itself willing to tolerate, even generate leaks that serve its own ends. The IC often announces its “successes,” regardless of their classification and regardless of the consequences.
70%
Flag icon
These leaks, accomplished in the coordinated fashion of a media campaign, were shocking demonstrations of the state’s situational approach to secrecy: a seal that must be maintained for the government to act with impunity, but that can be broken whenever the government seeks to claim credit.
70%
Flag icon
A “whistleblower,” in my definition, is a person who through hard experience has concluded that their life inside an institution has become incompatible with the principles developed in—and the loyalty owed to—the greater society outside it, to which that institution should be accountable.
70%
Flag icon
This motive of restoration I take to be essential to whistleblowing: it marks the disclosure not as a radical act of dissent or resistance, but a conventional act of return—signaling the ship to return back to port, where it’ll be stripped, refitted, and patched of its leaks before being given the chance to start over.
70%
Flag icon
In the IC, as in virtually every other outsize decentralized institution that relies on computers, these lower ranks are rife with technologists like myself, whose legitimate access to vital infrastructure is grossly out of proportion to their formal authority to influence institutional decisions.
73%
Flag icon
Taking this course of action would mean giving myself over totally to one of the capital crimes of intelligence work: whereas other spies have committed espionage, sedition, and treason, I would be aiding and abetting an act of journalism. The perverse fact is that legally, those crimes are virtually synonymous. American law makes no distinction between providing classified information to the press in the public interest and providing it, even selling it, to the enemy.
« Prev 1