<<

INDEX FROM NO PLACE TO HIDE

BUY THE BOOK:

E-BOOK

GLENNGREENWALD.NET INDEX

ABC, 235 AOL, 21, 108, 110 ABC News, 233 Apple, 21, 75, 108, 110 abortion, 133, 181 Apuzzo, Matt, 186 Abramson, Jill, 224–25, 240 Arab Spring, 4 Abu Ghraib scandal, 235 Area SpA, 4 Access and Target Development (NSA), Argentina, 126 148 Armed Forces Services Corporation accountability, 42, 202, 209, 244 (AFSC), 123 Ackerman, Spencer, 67 ARTIFICE, 107 Aerofl ot, 135 Assad, Bashar al-, 4 Afghanistan War, 188 Assange, Julian, 188, 219, 226–27 Agriculture, Department of, 136 , 5, 202 airlines, 163–66 Associated Press, 72, 85, 186 Alexander, Keith B., 92, 95–97, 138–39, of, 60, 213 203–4, 221 AT&T, 103, 168, 233 Algeria, 123 Atlantic, 205, 237 Al Qaeda, 199, 204, 206 Aurora shootings, 203 Amanpour, Christiane, 232 Australia, 23, 91, 122 Amash, Justin, 249 Austria, 123 American citizens. See domestic Axelrod, David, 235 surveillance American Civil Liberties Union (ACLU), backdoor surveillance, 118–10, 147 19, 71, 109, 114, 127, 133, 171, 185, 187 Balkin, Jack, 127 Amesys, 4 Bamford, James, 95, 153, 201 Anonymous, 8, 189–91 banking and fi nancial records, 118, 135, antiwar activists, 183–86, 196 138, 201, 205

020-58305_ch02_2P.indd 277 5/7/14 7:37 AM 278 INDEX

Baquet, Dean, 233 BUFFALOGREEN, 106 BBC, 234 Bulgaria, 145 BEBO, 161 Burns, John, 226, 231–32 Belgium, 123, 138 Bush, George W., 1–2, 5, 55–56, 58, 96, Bentham, Jeremy, 175–76, 209 127, 182, 185, 197–98, 217 Bergen, Peter, 204 Bernstein, Walter, 178 Campbell, Duncan, 238 Biden, Joe, 199 Campbell, Joseph, 45 Bing search, 156 Canada, 23, 91, 94, 119–20, 124, 135, 221 Binney, William, 99 Canadian Broadcasting Corporation Blackberry, 165 (CBC), 221 BLACKHEART, 147 Carle, Glenn, 206 blacklist, 178 Carney, Jay, 235 black nationalists, 184 CBS News, 222 BLACKPEARL, 135 cell phones, 12, 37–38, 122, 166, 201 BLARNEY, 102–3, 108, 136–37, 142–43, Center for Advanced Study of Language, 150, 160 University of Maryland, 41 “Blogger, with Focus on Surveillance” Central Intelligence Agency (CIA), 216 (New York Times article), 212 Al-Qaeda and, 204 Bloomberg News, 4 black sites and, 55 Bolivia, 49 domestic spying and, 179, 185 Booz Allen Hamilton, 48, 80, 84, 101, 168 Hayden as head of, 96, 217 Bosnia, 143 journalists and, 219, 229 Boston Marathon bombing, 203 media and, 234 , 30, 59, Miranda laptop and, 236–37 81–82, 92–93 NSA data sharing and, 116, 136 Brandeis, Louis, 172 NYPD surveillance of Muslims and, Brandenburg v. Ohio, 183 186 Brazil, 90, 92, 103, 106, 126, 138–39, 141, Obama advisory panel on surveillance 144–45, 202, 243–44, 250 and, 202 Brazilian Ministry of Mines and Energy, Snowden’s work for, 41–44, 47, 84 94, 119–21, 135 Swiss bankers and, 42 BRECKENRIDGE cable site, 107 CHAOS operation (CIA), 185 Britain (United Kingdom). See also Chavez, Hugo, 139 Government Communications Cheney, Dick, 217 Headquarters (GCHQ) Chilling Eff ects: NSA Surveillance domestic spying and, 122 Drives U.S. Writers to Self-Censor and, 91 (PEN report, 2013), 178 Guardian and, 238, 240 “Chilling Eff ects of Surveillance, Th e” internal unrest and, 177 (White and Zimbardo), 179–80 journalists and, 238, 245 China, 5, 92, 126, 135, 147–48, 151, 227 Miranda detention and, 186, 241–46 Snowden accused of spying for, 49–50, suspicionless surveillance and, 1–4 223–26 Broadwell, Paula, 8 Chinese Internet companies, 147–48, 151 Brooks, David, 223 Christmas-day bomber, 203 Brzezinski, Mika, 89 Church, Frank, 3, 201

020-58305_ch02_2P.indd 278 5/7/14 7:37 AM INDEX 279

Church Committee, 27, 184–85, 251 data storage, 151–53, 159–60 “Cincinnatus,” 7–10, 12, 81–82 dating services, 133 Cisco, 150 Defense, Department of, 135–36 civil liberties, 208 Defense Intelligence Agency, 32, 44, 136 civil rights movement, 183–84, 196 Dell Corporation, 43, 47–48, 101 Clapper, James, 30–31, 221 democracy, 202, 207–9, 252. See also Clemons, Steve, 237–38 freedom Clinton, Hillary, 139 Democracy Now! (TV show), 99 Close Access SIGADS, 145–46 Democratic National Committee, 223 CNBC, 170, 219 Democrats, 197–200, 249 CNET, 171 Denial of Service attacks, 192–93 CNN, 71–72, 126, 155, 204, 216, 217, 218, Denmark, 93, 123 231–32 Dershowitz, Alan, 217 Cohen, Richard, 222 Destination Short Message Entity (DSME), COINTELPRO, 183–84 132 Coleman, Gabriella, 190 detention, 5, 14, 241–46 Colombia, 106, 145 DEWSWEEPER, 147 Comey, James, 221 Dialed Number Recognition (DNR), 92 Commerce, Department of, 136 Digital Network Intelligence (DNI), Committee to Protect Journalists, 214 92–93, 105, 124 Communications Services Establishment diplomatic , 94, 139–47, 202 Canada (CSEC), 119–20 Discipline and Punish (Foucault), 176 Communists, 184, 196 disruption and deception techniques, Computer Network Exploitation (CNE), 190–94 117 “Disruption Operational Playbook” conservatives, 198 (GCHQ), 194 content dissent, 3–5, 50, 174, 177–200 metadata vs., 132–34 demonization of, 224–28 storage and search, 153–60 FBI and, 183–85 Conyers, John, 249 GCHQ and, 190–93 Cooper, Anderson, 216 NSA and, 185–90 Cornyn, John, 208 domestic surveillance, 1, 3, 5, 29–32, 74, Corona, Jorge, 140 90–93, 96, 99–100, 124, 126–29, 131, Corporate Partner Access (CPA) portfolio, 169, 171, 177–78, 189, 195–202. See 102–3 also contents; metadata; National Croatia, 123 Security Agency; surveillance; Cryptocat, 59 warrantless wiretapping scandal; and CRYPTO ENABLED, 147 specifi c agencies and programs C-SPAN, 249 Five Eyes and, 23–24 , 139, 224 prohibition on, 201 CUSTOMS, 147 spending on, 206–7 Czech Republic, 123 Downie, Leonard, Jr., 214 drones, 43, 229 database searches, 153–60 , 147 Data Intercept Technology Unit drug addiction centers, 133 (DITU, FBI), 115 drug-related cases, 200

020-58305_ch02_2P.indd 279 5/7/14 7:37 AM 280 INDEX

East German Ministry of State Security PRISM and, 77, 113–16 (Stasi), 4, 176–77 roving bugs and, 37 economic espionage, 94, 134–39, 147, Snowden and, 51–52 167–68, 202 STORMBREW and, 107 Ecuador, 49 X-KEYSCORE and, 160 “: Th e Whistleblower Feinstein, Dianne, 71, 130–31, 133, 171–72 Behind the NSA Surveillance Felten, Edward, 133–34 Revelations” (Guardian article) fi ber-optic cables, 92, 101, 103–4, 107, 119 84–85 fi nancial crisis of 2008, 177 EGOTISTICAL GIRAFFE, 94 Finland, 123 Egypt, 4, 141, 196 First Amendment, 183, 208 elections of 2004, 55–56 FISA. See Foreign Intelligence Electronic Communications Surveillance Surveillance Act Unit (ECSU, FBI), 114 Five Eyes alliance (FVEY), 23, 91, 95–97, Ellsberg, Daniel, 30, 84, 226 118–23, 161, 164, 166 emails, 92, 94, 99–100, 119, 122, 153–54, Foreign Intelligence Surveillance Act 157–58, 178, 201, 252 (FISA, 1978), 27, 201 journalists and, 213 Amendments Act (2008), 74–75, 116, metadata and, 133 126–28 encryption, 8–9, 94, 115, 118–19, 205, 225, Foreign Intelligence Surveillance Act 252 (FISA) court, 27–30, 127–30, 143, Energy, Department of, 136 228–30, 251 Energy and Research Branch (NSA), 138 Verizon and, 27–28, 30, 58–59, 61–72, energy companies, 134–35, 137–38 75, 78, 91, 93–94 environmentalists, 183, 186 Yahoo! and, 109 Espionage Act (1917), 50, 59, 222 foreign leaders, 138–42, 202 Ethiopia, 123 foreign nationals, 127 European tech companies, 252 “Foreign Partner Review” European Union, 92, 103, 138, 145, 251 Fiscal Year 2012, 124 Evolutionary Psychology, 178 Fiscal year 2013, 123 executive power, 1–2, 14, 128 foreign partners, 90, 101, 118–26 Foreign Policy, 95, 96, 109, 148, 206 Facebook, 18, 20–21, 74–75, 77, 84, 108–11, foreign press, 234 119, 126, 155–56, 158, 160–63, 165, foreign telecoms, 92, 103–7 170–71, 194, 252 Foucault, Michel, 176 Face the Nation (TV show), 199, 231 Fourth Amendment, 1–3, 207–8, 250 facsimiles (faxes), 122, 132, 168, 192 Fox News, 60, 213, 215–17 FAIRVIEW, 102, 104–5, 108, 150 France, 4, 90, 93, 103, 123, 138, 144–45, 148 false fl ag operations, 190, 194 Frank, Anne, 5 Federal Bureau of Investigation (FBI), freedom 3, 207 privacy and, 172–74 Al Qaeda and, 204 safety and, 207 COINTELPRO and, 183–85 Snowden on, 46–47 journalists and, 60, 221 surveillance and, 174–80, 196, 201–2 Muslims and, 186 freedom of assembly, 180 and, 28 freedom of association, 183

020-58305_ch02_2P.indd 280 5/7/14 7:37 AM INDEX 281

freedom of speech, 179–80, 183 NSA partnership with, 118–19 freedom of the press, 32, 65, 183, 213–22, PROJECT BULLRUN and, 94 230–31 TARMAC and, 97 UK and, 238–40 Th ieving Magpie and, 164–65 Grayson, Alan, 130, 220–21 Gabon, 143 Greece, 103, 123, 145, 177, 216 gays and lesbians, 133 Greek mythology, 45 Gazprom, 135 Gregory, David, 217–19, 229–30 GCHQ. See Government Griffi th, Morgan, 130 Communications Headquarters Guantanamo, 245 Gellman, Barton, 18, 54, 57–58, 77, 109, Guardian, 81, 91, 224 181–82, 220 choice of, for Snowden story, 21–22, GENIE, 147 58–59 Georgia, 145 fi rst NSA article of, 210 Germany, 4, 90, 92, 103, 123, 138, 176–77. fi rst Snowden stories published by, See also Nazi Germany 53–54, 59–78 Gibbs, Robert, 235 GCHQ reporting by, 118–19, 122 Gibson, Janine, 21–26, 59–61, 63–64, GCHQ threats to, and hard drive, 66–69, 73–78, 224–25, 238–39, 242, 238–41, 245 244 Hersh and, 235 Global Access Operations unit, 92 Hong Kong support for Snowden and, Global Telecoms Exploitation 86–89 (GTE, GCHQ), 119, 161–63 Hong Kong trip and, 22–27, 62–63 Gmail, 8, 77, 155–56 impact of Snowden stories and, 248–49 Goldman, Adam, 186 Miranda and, 237, 241–44 Goldsmith, Jack, 234 New York Times and 225, 240–41 Good Morning America (TV show), 71 Snowden identity revealed by, 84–85 Google, 18, 20, 21, 74–75, 94, 108–11, 135, Guthrie, Savannah, 89 153, 156, 170–71, 252 Google Earth, 155 hackers and hacktivists, 117–19, 189–90, Google Maps, 156 192–93, 228 Gore, Al, 72 Halberstam, David, 246–47 Government Communications Harnden, Toby, 219 Headquarters (GCHQ, British Harper, Stephen, 221 intelligence) Harris, Shane, 95 airlines and, 163–66 Harvard Law Review, 172 Alexander and, 96 Hayden, Michael, 96, 101, 127, 217, 233–34 Anonymous and, 190–91 Heinrich, Martin, 203 arrest of journalists and, 238 Hero with a Th ousand Faces, Th e “collect it all” and, 97, 100 (Campbell), 45 disruption and infi ltration and, 191–95 Hersh, Seymour, 235 economic espionage and, 135, 138 Hertzberg, Hendrik, 195–96, 201–2 Facebook and, 161–63 HIGHLANDS, 146 fi ber-optic cables and, 119 HIV, 133 Guardian hard drives and, 238–41 Holder, Eric, 215, 220 Miranda detention and, 241–46 Holt, Rush, 205

020-58305_ch02_2P.indd 281 5/7/14 7:37 AM 282 INDEX

Homeland Security, Department of (DHS), freedom and, 4–6, 18, 32, 46–47, 169 11, 136, 221 Muslims and, 187 Homing Pigeon, 166 as perceived threat, 168–69 honey-traps, 190–91 privacy and, 156, 252–53 Hong Kong, 16–19, 21, 24–31, 33–52, U.S. control over, 99, 107, 248, 252 48–50, 57, 72–73, 75, 78, 157, 217, 220, Internet companies, 20–21, 73–78, 101–2, 223–25, 236 108–12, 170–71 Hoover, J. Edgar, 183, 186, 196 Internet-free computer, 22 Hotmail, 115, 156 Internet routers, servers, and devices, 92, Huawei, 147–48 147–51 Hudson Institute, 210 Internet service providers, 4 Huffi ngton Post, 219 IP addresses, 122, 153, 156 human rights activists, 134, 188, 252 Iran, 126, 141, 143–44 Human Science Operation Cell Iraq War, 11, 40, 54, 95–96, 131, 185, 202, (HSOC, GCHQ), 193 226, 231–32 Hungary, 123 “Iraq War Logs, Th e” (New York Times article), 226 Iceland, 49, 123 Israel, 103, 123–25 ICREACH, 132 Israeli SIGINT National Unit (ISNU), 125 “Identifying Challenges: Geopolitical Italy, 93, 123, 138, 146 Trends for 2014–2019” (NSA), 141 images, collection of, 155, 162–63 Jaff , Jameel, 127, 187–88 incidental collection, 127 Japan, 43–44, 47, 103, 123–24, 137–38, India, 90, 92, 123, 141, 146 144, 146 Indonesia, 126 Jeff erson, Th omas, 24 infi ltration, 194 John Birch Society, 3 Inglis, John, 118 Joint Training Intelligence Defence Signals Directorate Academy (DIA), 44 (Australia), 122 Jordan, 123–24 internalization of control, 176, 178 journalism and journalists, 196, 210–47 (IRS), 185 as check on state power, 210, 232–33, International Mobile Equipment Identifi er 246–47 (IMEI), 132 criminalization of, 60, 186, 212–14, International Mobile Subscriber Identifi er 216–22, 229–30, 235–46, 251 (IMSI), 132 delays in Hong Kong stories and, international organizations, 138, 142 59–64 International Security, 206 demonization of whistle-blowers and, International Securities Issues (ISA, NSA), 222–29 138 establishment, 55–65, 68, 233–36 Internet, 43. See also specifi c companies Miranda detention and, 244–46 and services Obama and, 60, 213–15, 218–19 airlines and, 163–66 objectivity and, 230–32 activity history, and X-KEYSCORE, offi cial secrets and, 55–58, 68, 229–31 153–57 privacy and protection of sources and, danger of surveillance of, 201 134, 181, 188, 212–13, 252 deception and, 192–95 response of, to PRISM story, 77–79

020-58305_ch02_2P.indd 282 5/7/14 7:37 AM INDEX 283

response of, to Snowden reporting, Ludlow, Peter, 228 210–23, 232 Luxembourg, 123 response of, to Verizon story, 75 Snowden identity revelation and, MacAskill, Ewen, 24–27, 61–63, 78, 80, 83, 84–85 239 Justice, Department of (DOJ), 202, 234. Macedonia, 123 See also specifi c branches and units Mackowiak, Matt, 223 bin Laden raid and, 229 Maddow, Rachel, 246 FISA court and, 128 Madrid terror attacks, 203 journalists targeted by, 60, 213–15, 217, MAGNETIC, 146 220–21 “malicious foreign actor,” 189 leakers and, 210 “Manhunting Timeline” (NSA fi le), 188 NSA data sharing and, 136 Manning, Chelsea ( formerly Bradley), Snowden and, 50 29–30, 84, 188, 226–27, 234 Mapquest, 156 Kahn, Joseph, 224 Marcus, Ruth, 196 Kaufman, Leslie, 211 marijuana, 179–80 Keller, Bill, 55, 226–27, 234 MARINA, 160 Kenya, 126 Martin, Catherine, 217 Kerr, Orin, 198 Mastering the Internet (GCHQ), 119 King, Martin Luther, Jr., 3, 183 Mayer, Jane, 214 King, Peter, 216 McCarthy era, 178, 216 Klein, Mark, 233 McClatchy news agency, 206 Knox, Olivier, 213–14 medical records, 118, 181, 187–88, 201, 205 Ku Klux Klan, 183 (TV show), 201, 217–18, Kurtz, Howard, 54 229–30 Merkel, Angela, 141, 176–77 Laden, Osama bin, 11, 229 metadata, 72 laptops defi ned, 132–34 “air gapped,” 22 Feinstein on, 171–72 remote and, 12 FISA court order on, 93–94 Lauer, Matt, 223 intrusiveness of, 133–35, 199 Lennon, John, 3 legal checks and, 112–13 Leno, Jay, 182 storage of, 151–52 Leon, Richard, 250 terrorism and, 202–5 liberals, 197–98, 249 Mexico, 92, 103, 126, 135, 137–41, 144, 146 Libya, 4 Meyer, Josh, 214 Lichtblau, Eric, 55 Microsoft , 21, 40, 47, 108, 110, 113–16 LIFESAVER, 147 Millar, Stuart, 22–24, 63, 68 Limbaugh, Rush, 208 minimization requirements, 124–25 LinkedIn, 194 Miranda, David, 14, 19, 61, 64–65, 69, Lizza, Ryan, 130 236–37 London British detention of, 186, 241–46 riots of 2011, 177 Misawa, Japan, collection site, 97–98 terror attacks, 203 Mission Operations (MSCO), 97–98 Los Angeles Times, 214, 233 Mitchell, John, 182

020-58305_ch02_2P.indd 283 5/7/14 7:37 AM 284 INDEX

Mobile Dialed Number (MDN), 132 commercial airlines and, 163–64, 166 Mobile Subscriber Integrated Services Congress attempts to defund domestic Digital Network (MSISDN), 132 metadata collection, 249 Morning Joe (TV show), 85, 88–89 Congress lied to by offi cials of, 30–31, MSNBC, 71, 85, 195, 235, 246 81, 92 Mubarak, Hosni, 4, 196 content collected by, 132, 134, 186–88, Mueller, John, 205, 206 237 Mugabe, Robert, 219 corporate partnerships and, 101–18 Mumbai terror attacks, 203 data search and, 153–60 MUSCULAR, 94 data sharing and, 116, 153 Muslims, 186–87, 200, 216, 246 data storage and, 151–53 My Country, My Country (documentary debate over surveillance and, 2 fi lm), 11 Democrats vs. Republicans and, My Lai massacre, 235 197–200 Myspace.com, 155–56, 161 demonization of Snowden and, 222–24 diplomatic espionage and, 94, 139–47 Nation, 64–65 economic espionage and, 94, 134–39, National Association for the 147 Advancement of Colored People encryption overrides and, 205 (NAACP), 183–84, 196 FISA court and, 27–28, 126–29, 229–30 National Intelligence Council, 136 Five Eyes and, 95, 118–23 national security, 12, 55, 78–79, 94, foreign partners and, 95, 118–26, 135 200–203, 221–22, 232–34 foreign populations and, 74 dissent seen as threat to, 186 Guardian and, 60, 66–68 oversight and, 251–52 hacktivists and, 189–90 state power and, 250–51 harm caused by, 201–2, 205 (NSA). See also Hayden heads, 217 surveillance; warrantless wiretapping Homing Pigeon and, 166 scandal; Snowden, Edward J.; and illegal wiretapping scandal and, 31, 233 specifi c divisions; partners; programs; impact of revelations about, 248–50 and targets Internet as new dimension for, 5 acronyms and code names and, 91 legal requirements and, 74, 93, 112–13, American public as target of, 93, 189 99–101, 126–28, 201 Leon opinion on constitutionality of, American public opinion on, 197–201, 250–51 251 malware installed by, 117–18 Americans’ assumptions of immunity media and, 71–73, 89, 210–11, 216, from, 195–99 221–23, 231–34, 236–38 amount of data collected by, 30, 92, metadata and, 132–35, 171–72, 250–51 98–101, 132, 151–53, 159–60 methods used by, 92, 101 backdoor devices implanted by, New York Times and, 55–56 148–51 non-national security activities of, BOUNDLESS INFORMANT and, 81 134–35 and, 185 number of units within, 90 “collect it all” mission of, 47–48, Obama advisory panel and, 202–3 94–100, 169, 203 Orwell and, 174

020-58305_ch02_2P.indd 284 5/7/14 7:37 AM INDEX 285

oversight of, 128–31 “NSA Collecting Phone Records of perceived threats list of, 168–69 Millions of Verizon Customers Poitras and, 11, 18, 38 Daily” (Guardian article), 70–73 political opponents as targets of, 186–90 “NSA Prism Program Taps In to User power of, 73–74, 95–96, 167–69 Data of Apple, Google and Others” PRISM story and, 75, 76–78, 216 (Guardian story), 76–77 privacy concerns and, 47–48 NTOC Oversight and Compliance offi ce private contractors and, 101 (NOC), 189 self-censorship and, 178, 233 Snowden’s career in, 43–44, 47 OAKSTAR program, 102, 106, 108, 150 Snowden’s decision to reveal identity Oath, Th e (documentary fi lm), 11 and, 51–52, 79–80 Obama, Barack Snowden’s fi rst leaks on, 20–21 advisory panel on surveillance and, Stasi and, 176–77 202–3, 250 tech companies and, 252 Congress and, 30 terrorism as pretext for, 202–7 diplomatic espionage and, 142, 176 training manual for analysts and, 20 domestic espionage and, 126–27 WikiLeaks targeted by, 188–89 economic espionage and, 135, 139 Nazi Germany, 5 Guardian and, 60 NBC, 71, 85, 217, 235 media and, 229, 235 Negroponte, John, 233 metadata and, 134 Netherlands, 93, 123 off ensive cyber-operations and, 81, 91 New America Foundation, 203 online infi ltration and, 194 Newark Liberty International Airport, 11 Republicans and, 198 New Republic, 214 Snowden stories and, 43, 67–68, 89 Newtown shootings, 203 surveillance defended by, 182 New York, 200 terrorism and, 202 New York Daily News, 211, 212 Verizon court order and, 27, 70–71 New Yorker, 130, 195, 204, 214, 222, whistle-blowers and, 50, 213–15, 225–26, 231 221–22, 252–53 New York Police Department, 186 WikiLeaks and, 234 New York Times, 1, 5, 44, 55, 71, 112, 117, Wyden and Udall on, 28 138, 184, 201, 203, 210–14, 219, objectivity, 230–32 223–28, 231–35, 240–41, 246 Occupy movement, 177 New Zealand, 23, 91 OCEAN, 146 Nigeria, 143 O’Donnell, Lawrence, 195–96 9/11. See September 11, 2001 attacks Offi ce of General Counsel (OGC, NSA), 1971 (documentary fi lm), 184 189 1984 (Orwell), 174–75 “Offi cials’ Defenses of NSA Phone Nixon, Richard M., 182, 214–15, 226 Program May be Unraveling” NOFORN, 91 (Washington Post article), 202 North Atlantic Treaty Organization Olmstead v. U.S., 172 (NATO), 123, 136 OLYMPIA, 94 Romania summit of 2008, 41–42 Olympics (London, 2012), 206 Northrop Grumman, 101 Online Covert Action, 190, 193–95 Norway, 93, 123, 135 online social networks (OSNs), 158–63

020-58305_ch02_2P.indd 285 5/7/14 7:37 AM 286 INDEX

open source community, 32 (web site), 223 ORANGEBLOSSOM, 106 porn sites, 187 ORANGECRUSH, 106 Portugal, 123 Originating Short Message Entity (OSME), Power (Foucault), 176 132 PRINTAURA, 114, 116, 160 Orlando Sentinel, 221 PRISM, 18, 20–21, 27, 57, 59, 63–64, 94, Orwell, George, 174–75, 250 73–78, 108–16, 137 OTR (off -the-record) chat, 16–17, 19, 59 privacy, 29, 94, 126, 170, 201 Outlook, 108, 113–16 anti-privacy advocates and, 170–72 importance of, 2–3, 170–74, 179–83, Pakistan, 123–24 248, 252 Palestinian rights groups, 186 metadata and, 133–35 Paltalk, 21, 108, 110 physical safety vs., 207–9 Panetta, Leon, 229 reclaiming, 252–53 Panopticon, 175–77, 209 Snowden and, 18, 47–48 passphrases, 15 UN and, 250 password-cracking soft ware, 8, 28 U.S. Congress and, 131 Patriot Act (2001), 113, 119, 131, 200–201 private contractors, 168–69 section 215, 28, 250 PROJECT BULLRUN, 94 PBX, 147 PROTON, 132, 152 PEN America, 178 public opinion, 197–200, 251 Peña Nieto, Enrique, 139, 140 Pentagon Papers, 84, 226 QUAILCREEK cable site, 107 Petraeus, David, 8 Quakers, 185 Petrobras, 134–35, 202 Quantum Insertion malware, 117 Pew Research Center, 197–99 PGP for Journalists (video), 10 RADON, 147 PGP encryption, 7–10, 15, 19–20, 81–82 Reliable Sources (TV show), 218 Phillips, Gill, 86, 87 religion, 134 Pincus, Walter, 219 renditions, 202 , 160 Republicans, 197–99, 249 Pirate Bay (web site), 188–89 Reuters, 231, 244 Poitras, Laura, 236–37, 241–42 Rice, Susan, 67, 143 background of, 11–12 “Right to Privacy, Th e” fi rst Snowden emails and, 11–14 (Brandeis and Warren), 172–73 Guardian and, 22–23, 61–62, 65, 241–42 right-wing groups, 184, 186, 217 Hong Kong meetings with Snowden Risen, James, 55, 214, 233 and, 15–16, 22–27, 29, 33–39, 49, Roberts, Pat, 208 51–54, 56, 75, 78, 86–87 Rogers, Mike, 126, 130, 147–48, 157, 221, Snowden videos and, 38–39, 80–81, 223 83–84 “Role of National Interests, Money, and targeting of, 11, 29, 219–20 Egos, Th e” (NSA presentation), Washington Post and, 54, 57, 77, 64 167 Poland, 99, 123 Romania, 41–42, 123 police, 177, 179, 207 Rose, Charlie, 126 Polish intelligence service, 105–6 Rosen, James, 60, 213–15, 217

020-58305_ch02_2P.indd 286 5/7/14 7:37 AM INDEX 287

Ross, Carne, 234 media stories; and surveillance Rousseff , Dilma, 139 programs roving bugs, 37 ability to wiretap anyone asserted by, Rusbridger, Alan, 61–63, 67–69, 73, 86, 157 239–40 appearance and youth of, 36–37 Russia, 92, 126, 135, 223–25 authenticity of, 13–14, 31, 51 career and training of, 41–44, 47–48 SAIC corporation, 101 China and, 223–26 Salon, 11, 64, 65 “Cincinnatus” and, 7–10, 12, 81–82 satellite communications, 92, 97, 168 Conyers-Amash bill and, 249 Saudi Arabia, 123, 141 courage of, 51, 83–84, 253 Schieff er, Bob, 222, 231 debate triggered by, 2, 78, 169 Schmidt, Eric, 170–71 early life of, 39–41 Schmidt, Michael, 211–12 ethical concerns of, and decision to leak Schneier, Bruce, 205 documents, 42–48 Schoenfeld, Gabriel, 210–11 family and personal ties of, 39–40, 47, Schultz, David, 237 81 secrecy, 12, 29, 128, 169, 171, 207–9, 229 fi rst contacts with, 2, 7–10 self-censorship, 178, 186 fi rst documents revealed by, 20–21 September 11, 2001 attacks (9/11), 2, 40, fi rst meeting with, 44–48 71, 73–74, 78–79, 130, 200, 202, 204, goals and motives of, 18–19, 23–24, 250–51 31–32, 44–48, 51 sexual activity, 181, 185, 187 Guardian reporting and, 21–26, 62, 66, Shafer, Jack, 231 72–73, 75, 238–41 Shannon, Th omas, 138–39 helps Greenwald install encryption SHELLTRUMPET, 100 programs, 19–20 Sherman, Brad, 5 Hong Kong arrangements by, 16–18, Shorrock, Tim, 101 25–26 SIGINT (), 59–60, 95 Hong Kong laptops of, 224–25 Signals Development conference Hong Kong meetings with, 33–52, 157 (SigDev Five Eyes meeting), 118–19, identity revealed to journalists, 31–32 151, 190 identity revealed to public, 18–19, Signals Intelligence Directorate (SID), 116 51–53, 72–73, 80–85 SILVERZEPHYR, 106 importance of revelations by, 6, 29, 169, Simon, Roger, 223 248–53 Singapore, 123 intelligence and rationality of, 23, 31, 40 Sixty Minutes (TV show), 223 Iraq War and, 40 SkyDrive service, 113 leaves Hong Kong, 85–88, 217, 219 Skype, 4, 18, 20–22, 75, 77, 108, 110–11, media and, 234 113–14, 165, 236–37 media attacks on, 88–89, 222–24, 229, Slate, 131 231–32 Slovakia, 146 media attacks on journalists reporting Smith, Christopher, 5 on, 210–20 “sneak and peak” provision, 200 media search for, 85–86 Snowden, Edward J. See also specifi c Moscow airport and, 224 documents; government agencies; New York Times and, 240–41

020-58305_ch02_2P.indd 287 5/7/14 7:37 AM 288 INDEX

Snowden, Edward J. (cont’d) Sunni Triangle, 11 NSA pursuit of, 79–80, 237–38 Sunstein, Cass, 194 passport revoked, 223–24 Supervisory Control and Data Acquisition demonization of, 23–24, 31, 49, 222 (SCADA), 138 personal sacrifi ces of, 47, 50–52, 72–73, surveillance. See also specifi c agencies; 83 programs; and types Poitras and, 12–14, 78 abuse of power and, 4–5, 12, 24, 32, 42, Poitras video of, 38–39, 80–85, 157 182–83, 188, 196, 200–201, 230 public opinion and, 248, 251 assumption of immunity from, 3, README_FIRST fi le and, 31–32 195–201 reporting and vetting of stories and, freedom and, 174–80, 196, 201–2 52–53, 56 good vs. bad people and, 182–86 Russia and, 223–25 intelligence funding and, 101, 118, 124, Washington Post and, 18 168–69 socialists, 184 psychological impact of 178–82 social media. See online social networks reform of abuses and, 248–53 Soghoian, Chris, 109, 114 vastness of, 90 Somalia, 141 surveillance industry, 168–69, 206 Sorkin, Andrew Ross, 219 Sweden, 123, 135, 180, 226 South Africa, 126, 146 SWIFT system, 135 South Korea, 103, 123 Switzerland, 41, 123 SOUTHWINDS, 165 Syria, 4, 126, 232 Soviet dissidents, 227 Spain, 93, 123, 138, 177 Tailored Access Operations (TAO, NSA), Special Sources Operations (SSO, NSA) 117, 149 102–6 Taiwan, 123–24, 146 Corporate Partner Access (CPA) TARMAC, 97 portfolio, 102–3 Tea Party, 177, 249 FAIRVIEW and, 104–6 tech community, 252 OAKSTAR and, 106 technology, 2–3, 168–69 PRISM and, 111, 113–14, 116 technology companies, 4–5, 47, 75–76, 252 UN and, 142–43 telecommunications companies, 32, 48, Stasi, 4, 176–77 74, 92, 101–8 State Department, 136, 139 telephone calls, 28, 92–94, 100, 105, 119, STELLARWIND (STLW), 32 133–34, 152–54, 178, 202–3 Stengel, Richard, 235 airlines and, 163–66 Steward, Mark G., 206 disruption of, 192 sting operations, 194 journalists and, 213 STORMBREW, 102, 107–8, 150 Temporary Mobile Subscriber Identifi er Sudan, 141 (TMSI), 132 suicide hotlines, 133, 181 terrorism, 1–2, 5, 71, 79, 186–90, 197–98, Sullivan, Andrew, 211 200–207, 242–46, 249–50 Sullivan, Margaret, 212–13, 224, 233–34 Terrorism Act (UK, 2000), 242–46 Sulzberger, Arthur, 55 Th ailand, 123–24 Summit of the Americas, Fift h, 139 Th iessen, Marc, 216 Sunday Times of London, 219 Th ieving Magpie, 164–66

020-58305_ch02_2P.indd 288 5/7/14 7:37 AM INDEX 289

Tiananmen Square protests, 49 upstream surveillance, 108, 110, 116 Time, 182, 235 Utah data storage facility, 24, 153 Times Square bomb plot, 203 Today (TV show), 71, 85, 88–89, 223 VAGR ANT, 146 Todd, Chuck, 218 Venezuela, 103, 126, 135, 137, 139, 146 Tonight Show (TV show), 182 Verizon Toobin, Jeff rey, 222, 231, 246 FISA court and, 27–28, 30, 58, 61–72, Tor browser, 94 75, 93–94 torture, 5, 56, 202, 216 PRISM and, 78 Traffi cthief, 160 video games, 45–46 transparency, 215, 235, 244, 252 Vietnam, 146 Treasury Department, 136 Vietnam War, 246 Tunisia, 123 viruses, 190, 192 Turkey, 123, 141 Visitor Location Register (VLR), 132 Twitter, 77, 112, 155, 158, 194 Wall Street Journal, 4, 85, 99–100, 103 Udall, Mark, 28, 71, 203 Walt, Stephen, 206–7 Uganda, 143 Warid Telecom, 135 UNICEF, 138 War on Terror, 11, 43, 55, 208 United Arab Emirates (UAE), 123 warrantless wiretapping scandal (Bush United Kingdom, 23. See Britain era, 2004–5), 1–2, 5, 55, 74, 96, United Nations, 87, 103, 136, 138, 182, 197, 217 142–46 Warren, Samuel, 172 online privacy resolution, 250 Washington Post, 16, 18, 54–59, 61, 63–64, Security Council, 143–44 76–77, 95–96, 99, 109, 135, 171, U.S. Army, 13–14, 40 184–85, 196, 198, 202–3, 214, 216–17, U.S. Army intelligence, 185 219–20, 222 USA Today, 133, 214 Wasserman Schultz, Debbie, 223 U.S. Bureau of Investigation (later FBI), 3 Watergate scandal, 179 U.S. Congress, 5, 27, 30, 32, 74, 81, 92, 128, Weigel, Dave, 131 130–31, 136, 200, 220–21, 252 Wemple, Erik, 55 U.S. Constitution, 5, 24, 172, 207, 230, whistle-blowers, 8, 31, 42–43, 47–48, 250–51. See also specifi c amendments 50–51, 83–84, 134, 181, 211–15, and rights 222–29, 233, 252–53 U.S. House of Representatives White, Gregory, 179–80 Conyers-Amash bill and, 249 White House Offi ce of Information and Intelligence Committee, 126, 130, Regulatory Aff airs, 194 147–48, 221 “Why China Let Snowden Go” Subcommittee on Terrorism, 216 (New Yorker article), 225–27 U.S. Senate, 215 WikiLeaks, 8, 13–14, 29–30, 54, 79, 155, Church Committee, 27, 184–85, 251 188–89, 219, 226, 234 Intelligence Committee, 28, 71, 130–31, Williams, Brian, 223 171, 203, 208 Wilson, Woodrow, 50 Judiciary Committee, 127 WOLFPOINT, 107 U.S. Supreme Court, 172, 183 women’s liberation movement, 3 U.S. Trade Representative, 136 Woodward, Bob, 229

020-58305_ch02_2P.indd 289 5/7/14 7:37 AM 290 INDEX

WORDGOPHER, 98 “Yes, Publishing NSA Secrets Is a Crime” World War I, 50 (Th iessen), 216 Wright, Lawrence, 204 YouTube, 21, 75, 84, 108, 110 Wyden, Ron, 28, 30–31, 131, 203 Zero Dark Th irty (fi lm), 229 X-KEYSCORE, 142, 153–60, 165 Zhengfei, Ren 148 Zimbabwe, 219 Yahoo!, 5, 18, 20, 21, 74, 77, 94, 108–10, Zimbardo, Philip, 179–80 155–56 ZTE, 147–48 Yemen, 11, 141 Zuckerberg, Mark, 126, 170–71

020-58305_ch02_2P.indd 290 5/7/14 7:37 AM