More on this book
Community
Kindle Notes & Highlights
In some cases, the NSA was back-channeling with the international agencies that set the cryptographic standards adopted by security companies and their clients. In at least one case, the NSA successfully convinced Canadian bureaucrats to advocate for a flawed formula for generating the random numbers in encryption schemes that NSA computers could easily crack. The agency was even paying major American security companies, like RSA, to make its flawed formula for generating random numbers the default encryption method for widely used security products.
Even bombs that would live in infamy didn’t quite work as intended. Little Boy—the very first nuclear weapon America dropped in war—killed eighty thousand people on Hiroshima. But the destruction could have been much worse—only 1.38 percent of its nuclear core fissioned. Three days later, when Americans dropped their second bomb—codename “Fat Man”—on Nagasaki, it accidentally detonated one mile off target, though it still managed to kill forty thousand. A 1954 test of a hydrogen bomb in the Bikini atoll produced a yield of fifteen megatons—triple the amount America’s nuclear scientists
...more
“Think about it,” he told me one day. “Nothing is American-made anymore. Do you really know what’s in your phone, or in your laptop?” I looked down at my iPhone with a renewed sense of intrigue, the kind of look you might give a beautiful stranger. “I do not.”
With the arrival of Facebook in 2004, it was often hard to see where the NSA’s efforts ended and Facebook’s platform began.
There was an arrogance to the NSA’s work, Neumann told me. By inserting backdoors into any piece of technology it could get its hands on, the NSA assumed—to the country’s detriment—that all the flaws it was uncovering in global computer systems would not be discovered by someone else.
“The most likely way for the world to be destroyed, most experts agree, is by accident. That’s where we came in; we’re computer professionals. We cause accidents.”
You can’t stop the gears of capitalism. But you can always be a pain in the ass. —JARETT KOBEK, I HATE THE INTERNET
only to find out they’d been had by their own government. In a window to how Valley’s engineers think, Downey made the obligatory Lord of the Rings reference: “It’s just a little like coming home from War with Sauron, destroying the One Ring, only to discover the NSA is on the front porch of the Shire chopping down the Party Tree and outsourcing all the hobbit farmers with half-orcs and whips.”
Cook was famously private himself. He had grown up gay in conservative Alabama, a fact he kept private until 2014, the year after the Snowden revelations dropped. In Alabama, his lingering childhood memory was watching Klansmen burn a cross on the lawn of a black family in his neighborhood while chanting racial slurs. He’d screamed at the men to stop, and when one of the men lifted his white hood, Cook recognized him as the deacon of a local church.
Up to that point, if a government needed Apple’s help unlocking an iPhone, they had to physically fly to Cupertino and bring the phone into a secure sensitive compartmented information facility (SCIF), where a trusted Apple engineer unlocked it. The trips could be comical. In one case, a foreign government sent an iPhone, along with a government minder, by chartered jet to Cupertino, only to get into the SCIF and learn from Apple’s engineer that the owner had never even bothered to set up a passcode.
“No one in this country is beyond the law,” Comey told reporters at FBI headquarters a week after Apple’s announcement. “The notion that someone would market a closet that could never be opened—even if it involves a case involving a child kidnapper and a court order—to me does not make sense.”
The breach at the Office of Personnel Management was still fresh in Cook’s memory. The breach had exposed the very data you would think the government had the most personal incentive to protect: Social Security numbers, fingerprints, medical records, financial histories, home addresses, and sensitive details for every American given a background check for the last fifteen years—which included Comey, and the most senior officials at the Department of Justice and the White House. If they could not even manage to keep their own data safe, how could they ever be expected to safeguard Apple’s
...more
The last time I checked, the country that bombed another country into oblivion wasn’t China or Iran.”
I wondered who was going home with their code. You may ask yourself, “Am I right, am I wrong?” You may say to yourself, “My God! What have I done?”

