<<

NOTES FROM NO PLACE TO HIDE

BUY THE BOOK:

E-BOOK

GLENNGREENWALD.NET NOTES

INTRODUCTION

3 the British government’s surreptitious opening of mail David Vincent, Th e Culture of Secrecy in Britain, 1832–1998 (Oxford: Oxford University Press, 1998), 1– 14. 3 the US Bureau of Investigation Peter Conolly-Smith, “ ‘Reading Between the Lines’: Th e Bureau of Investigation, the United States Post Offi ce, and Domestic During World War I,” Social Justice 36, no. 1 (2009): 7– 24. 4 the British and French empires Daniel Brückenhaus, “Every Stranger Must Be Suspected: Trust Relationships and the Surveillance of Anti- Colonialists in Early Twentieth-Century Western Europe,” Geschichte und Gesellschaft 36 (2010): 523– 66. 4 ’s Assad regime fl ew in employees Ben Elgin and Vernon Silver, “Syria Crackdown Gets Italy Firm’s Aid with U.S.-Europe Spy Gear,” Bloom- berg News, November 3, 2011. 4 Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, and Matt Bradley, “Mideast Uses Western Tools to Battle the Rebel- lion,” Wall Street Journal, June 1, 2011. 4 “a wall of black refrigerator-size devices” Margaret Coker and Paul

020-58305_ch02_3P.indd 261 6/6/14 11:50 AM 262 NOTES

Sonne, “Life Under the Gaze of Gadhafi ’s Spies,” Wall Street Journal, December 14, 2011; Paul Sonne and Margaret Coker, “Firms Aided Libyan Spies,” Wall Street Journal, August 30, 2011. 5 “Th e Internet in ” United States House of Representatives, “Th e Internet in China: A Tool for Freedom or Suppression?” 109th Cong., 2nd sess., February 15, 2006.

CHAPTER 1: CONTACT

11 interrogations to which Poitras had been subjected , “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012. 13 possibility of passing on fraudulent documents “U.S. Intelligence Planned to Destroy WikiLeaks,” WikiLeaks.org, March 15, 2010, http:// w w w . w i k i l e a k s . o r g / w i k i / U . S . _ I n t e l l i g e n c e _ p l a n n e d _ t o _ d e s t r o y _ WikiLeaks, _18 _Mar _2008 .

CHAPTER 2: TEN DAYS IN HONG KONG

37 Prosecution of alleged mobsters United States of America v. John Tomero et al., Defendants, S2 06 Crim. 0008, United States District Court (S.D. New York, November 27, 2006). 44 In July 2013 confi rmed Christopher Drew and Scott Shane, “Résumé Shows Snowden Honed Hacking Skills,” New York Times, July 4, 2013. 54 systematically amplifi ed pro-war voices Howard Kurtz, “Th e Post on WMDs: An Inside Story,” Washington Post, August 12, 2004. 55 caused the New York Times to conceal the existence and , “Bush Lets U.S. Spy on Callers Without Courts,” New York Times, December 16, 2005. 55 Risen was about to publish the revelations in his book Eric Lichtblau, “Th e Education of a 9/11 Reporter: Th e Inside Drama Behind ’ Warrantless Wiretapping Story,” Slate, March 26, 2008. 60 records of reporters and editors from the Mark Sher- man, “Government Obtains Wide AP Phone Rec ords in Probe,” Associated Press, May 13, 2013.

020-58305_ch02_3P.indd 262 6/6/14 11:50 AM NOTES 263

60 accusing Washington bureau chief Ann E. Mari- mow, “A Rare Peek into a Justice Department Leak Probe,” Washington Post, May 19, 2013. 71 a harsh denunciation of the administration “President Obama’s Drag- net,” New York Times, June 6, 2013. 71 Demo cratic senator Mark Udall issued a statement Dan Roberts and , “Anger Swells Aft NSA Phone Records Court Order Revelations,” Guardian, June 6, 2013. 71 “the program could hardly be any more alarming” “ACLU Calls for End to Program, Disclosure of Program’s Scope, Congressional Investigation,” J u n e 5 , 2 0 1 3 , h t t p s : / / w w w . a c l u . o r g / n a t i o n a l - s e c u r i t y - t e c h n o l o g y - a n d - l i b e r t y / m a s s i v e - n s a - p h o n e - d a t a - m i n i n g - o p e r a t i o n - r e v e a l e d . 72 “is secret blanket surveillance obscenely outrageous?” Al Gore, posting, June 5, 2013, 6:39 p.m., https:// twitter .com /algore /sta- tus/342455655057211393 .

CHAPTER 3: COLLECT IT ALL

95 “the most powerful intelligence chief” , “Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center,” Wired, June 12, 2013, http:// www .wired .com /2013 /06 /nsa -prism -verizon -surveillance /. 95 “I need to get all of the data” , “Th e Cowboy of the NSA,” , September 9, 2013. 95 Alexander grew dissatisfi ed Ellen Nakashima and Joby Warrick, “For NSA Chief, Terrorist Th reat Drives Passion to ‘Collect It All,’ Observers Say,” Washington Post, July 14, 2013. 99 reported in 2010 Dana Priest and William M. Arkin, “A Hidden World, Growing Beyond Control,” Washington Post, July 19, 2010. 99 a 2012 interview with Democracy Now! William Binney, interview with and Juan Gonzalez, Democracy Now!, April 20, 2012. 99 “the capacity to reach roughly 75% of all U.S. Internet traffi c” Siobhan Gorman and Jennifer Valentino-Devries, “New Details Show Broader NSA Surveillance Reach,” Wall Street Journal, August 20, 2013.

020-58305_ch02_3P.indd 263 6/6/14 11:50 AM 264 NOTES

101 “70 percent of our national intelligence bud get” Tim Shorrock, “Meet the Contractors Analyzing Your Private Data,” Salon, June 10, 2013. 103 BLARNEY relied on one relationship in par tic u lar Gorman and Valentino- Devries, “New Details Show Broader NSA Surveillance Reach.” 109 Bart Gellman, aft er receiving heavy criticism Robert O’Harrow Jr., Ellen Nakashima, and , “U.S., Company Offi cials: Internet Sur- veillance Does Not Indiscriminately Mine Data,” Washington Post, June 9, 2013. 109 Chris Soghoian, the ACLU’s tech expert Elias Groll, “Th e PRISM Spin War Has Begun,” Foreign Policy, June 7, 2013. 112 described a slew of secret negotiations Claire Cain Miller, “Tech Com- panies Concede to Surveillance Program,” New York Times, June 7, 2013. 114 the revelations would surprise many Skype customers Glenn Green- wald, Ewen MacAskill, , Spencer Ackerman, and Dominic Rushe, “Microsoft Handed the NSA Access to Encrypted Messages,” Guardian, July 11, 2013. 117 “nearly 100,000 computers around the world” David E. Sanger and Th om Shanker, “N.S.A. Devises Radio Pathway into Computers,” New York Times, January 14, 2014. 118 “Th e U.S. government has paid at least £100m” Nick Hopkins and Julian Borger, “NSA Pays £100m in Secret Funding for GCHQ,” Guardian, August 1, 2013. 119 Under the program name Ewen MacAskill, Julian Borger, Nick Hopkins, , and , “GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications,” Guardian, June 21, 2013. 122 Th e Guardian reported on one 2007 memo James Ball, “US and UK Struck Secret Deal to Allow NSA to ‘Unmask’ Britons’ Personal Data,” Guardian, November 20, 2013. 126 President Obama told Charlie Rose President interview with Charlie Rose, Charlie Rose, Public Broadcasting Service, June 16, 2013. 126 Mike Rogers similarly told CNN Mike Rogers interview with Candy Crowley, CNN State of the Union, June 16, 2013. 126 Even CEO Mark Zuckerberg Mark Zuckerberg interview at TechCrunch Disrupt conference in San Francisco, September 11, 2013.

020-58305_ch02_3P.indd 264 6/6/14 11:50 AM NOTES 265

127 Jameel Jaff er, the deputy legal director of the ACLU, explained Jameel Jaff er, e-mail message to Glenn Greenwald. 127 Yale Law School professor Jack Balkin concurred Jack Balkin, “Th e Inspector General’s Report and Th e Horse Th at Is Already Out of the Barn Door,” Balkinization (), July 11, 2009, http:// balkin .blogspot . c o m / 2 0 0 9 / 0 7 / i n s p e c t o r - g e n e r a l s - r e p o r t - a n d - h o r s e . h t m l . 129 the FISA court’s reaction over the last six years Matthew Keys, Twitter posting, November 19, 2013, 4:23 a.m., https://twitter.com/MatthewKeys Live/status/402774028898672640. 130 “treats senior intelligence offi cials like matinée idols” Ryan Lizza, “State of Deception,” New Yorker, December 16, 2013. 131 As Slate’s Davie Weigel reported in November Dave Weigel, “New NSA Reform Bill Authorizes All the NSA Activity Th at Was Making You Angry,” Slate, November 1, 2013. 133 In an affi davit fi led by the ACLU American Civil Liberties Union et al. v. James R. Clapper et al., 13-cv- 03994, United States District Court (S.D. New York, 2013), https:// www .aclu .org /fi les/pdfs /natsec /clapper /2013 .08 .26 %20ACLU %20PI %20Brief %20 - %20Declaration%20-%20Felten.pdf . 135 “does ***not*** engage in economic espionage” Barton Gellman and Ellen Nakashima, “U.S. Spy Agencies Mounted 231 Off ensive Cyber- Operations in 2011, Documents Show,” Washington Post, August 30, 2013. 138 surveillance targets oft en included fi nancial institutions James Glanz and Andrew W. Lehren, “N.S.A. Spied on Allies, Aid Groups and Busi- nesses,” New York Times, December 20, 2013. 147 claimed that Huawei and ZTE Mike Rogers and C. A. Dutch Ruppers- berger, Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE, U.S. House of Representatives, 112th Cong., October 8, 2012. 148 constant accusations became such a burden Shane Harris and Isaac Stone Fish, “Accused of Cyberspying, Huawei Is ‘Exiting the U.S. Market,’ ” Foreign Policy, December 2, 2013. 153 Bluff dale construction will expand the agency’s capacity James Bam- ford, “Th e NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012.

020-58305_ch02_3P.indd 265 6/6/14 11:51 AM 266 NOTES

CHAPTER 4: THE HARM OF SURVEILLANCE

170 When Google CEO Eric Schmidt was asked Eric Schmidt interview with Maria Bartiromo, CNBC, December 29, 2009. 170 With equal dismissiveness, Facebook founder and CEO Mark Zucker- berg interview with Michael Arrington at TechCrunch in San Francisco, January 9, 2010. 171 a 2011 report from the ACLU Mike German and Jay Stanley, Drastic Mea sures Required, American Civil Liberties Union, July 2011, 3. 171 So secretive is this shadowy world Priest and Arkin, “A Hidden World, Growing Beyond Control.” 171 a policy of not talking to reporters from CNET Carolyn Said, “Google Says CNET Went Too Far in Googling,” San Francisco Chronicle, August 9, 2005. 171 Zuckerberg purchased the four homes Chris Matyszczyk, “Zuckerberg Buys Four New Houses for, um, Privacy,” CNET, October 11, 2013. 172 the most famous formulation of what privacy means Olmstead v. United States, United States Supreme Court, 277 U.S. 438 (1928). 172 the seminal 1890 Harvard Law Review article Samuel D. Warren and Louis D. Brandeis, “Th e ,”Harvard Law Review 4, no. 5 (December 15, 1890): 193– 220. 175 “Th e telescreen received and transmitted simultaneously” George Orwell, Nineteen Eighty-Four (New York: Alfred A. Knopf, 1992), 4– 5. First published by Secker and Warburg, 1949. 175 “in which persons of any description are to be kept under inspection” Jeremy Bentham, Th e Panopticon Writings, ed. Miran Božovič (New York: Verso, 1995), 29. First published 1791. 176 Panopticonism is “a type of power” Michel Foucault, Power: Essential Works of Foucault, 1954– 1984, vol. 3, ed. James D. Faubion, trans. Robert Hurley (New York: New Press, 2000), 70. 176 angrily likened US surveillance to the Stasi Ian Traynor and Paul Lewis, “Merkel Compared NSA to Stasi in Heated Encounter with Obama,” Guardian, December 17, 2013. 178 Walter Bernstein, who was blacklisted and monitored Larry Siems, “A

020-58305_ch02_3P.indd 266 6/6/14 11:51 AM NOTES 267

Blacklisted Screenwriter on American Surveillance” (Siems interview with Walter Bernstein), PEN America, August 30, 2013. 178 a report released by PEN America in November 2013 “Chilling Eff ects: NSA Surveillance Drives U.S. Writers to Self-Censor,” PEN America, November 12, 2013, 3. 178 presented their subjects with morally questionable actions Pierrick Bourrat, Nicolas Baumard, and Ryan McKay, “Surveillance Cues Enhance Moral Condemnation,” Evolutionary Psychology 9, no. 2 (2011): 193–99. 179 A comprehensive experiment conducted in 1975 Gregory L. White and Philip G. Zimbardo, Th e Chilling Eff ects of Surveillance: Deindividuation and Reactance, Offi ce of Naval Research, May 1975. 180 rowdiness in Swedish soccer stadiums Mikael Priks, “Do Surveillance Cameras Aff ect Unruly Behavior? A Close Look at Grandstands” (work- ing paper no. 2289, Center for Economic Studies of the Leibniz Institute for Economic Research [CESifo], University of Munich, April 2008). 180 public health literature on hand washing Kristen Munger and Shelby J. Harris, “Eff ects of an Observer on Handwashing in a Public Rest- room,” Perceptual and Motor Skills 69 (1989): 733– 34; D. M. Pedersen, S. Keithly, and K. Brady, “Eff ects of an Observer on Conformity to Handwashing Norm,” Perceptual and Motor Skills 62, no. 1 (March 1986): 169–70. 180 researchers provided subjects with tracking devices C. Mancini, Y. Rogers, K. Th omas, et al., “In the Best Families: Tracking and Relationships,” Pro- ceedings of the 29th International Conference on Human Factors in Com- puting Systems (New York: ACM Press, 2011), 2419– 28. 181 one of the most radical simulations of surveillance Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, et al., “Long- Term Eff ects of Ubiquitous Surveillance in the Home,” Proceedings of the 2012 ACM Conference on Ubiquitous Computing (New York: ACM Press, 2012), 41– 50. 182 “Privacy is relational” Barton Gellman, “Digital Privacy: If You’ve Done Nothing Wrong, Do You Have ‘Nothing to Hide’?,” Time, August 3, 2010. 182 Nixon’s attorney general, John Mitchell, assured readers “Th e New Line on Wiretapping,” Time, July 25, 1969. 182 “calls from very bad people to very bad people” Eric Lichtblau and James

020-58305_ch02_3P.indd 267 6/6/14 11:51 AM 268 NOTES

Risen, “Defense Lawyers in Terror Cases Plan Challenges over Spy Eff orts,” New York Times, December 28, 2005. 182 Obama appeared on Th e Tonight Show President Barack Obama inter- view with Jay Leno, Th e To night Show, NBC, aired August 7, 2013. 183 Culminating in the unanimous 1969 decision Brandenburg v. Ohio, United States Supreme Court, 395 U.S. 444 (1969). 184 Th ose revelations led to the creation United States Senate, Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, April 26, 1976. 184 One key COINTELPRO memo explained Betty Medsger, Th e Burglary: Th e Discovery of J. Edgar Hoover’s Secret FBI (New York: Alfred A. Knopf, 2014), 160. 184 In a 2013 documentary 1971, dir. Johanna Hamilton, Maximum Pictures, 2013. 185 “Th e FBI has never shown much sensitivity to the poisonous eff ect” Quoted in Medsger, Th e Burglary, 184. 185 documents obtained by the ACLU revealed “Documents Shed New Light on Pentagon Surveillance of Peace Activists,” American Civil Liberties Union News Release, October 12, 2006. 186 American Muslims routinely describe the eff ect of spying Muslim American Civil Liberties Coali tion (MACLC), Creating Law Enforcement Accountability and Responsibility (CLEAR) Project, and Asian American Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD Spying and Its Impact on American Muslims, CLEAR Project, City Uni- versity of New York Law School, March 11, 2013. 187 “information about your po liti cal views, your medical history” Glenn Greenwald, , and Ryan Grim, “Top-Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit ‘Radical- izers,’ ” Huffi ngton Post, November 26, 2013. 190 “nothing remotely resembling terrorism” Mark Schone, Richard Esposito, Matthew Cole, and Glenn Greenwald, “War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show,” NBC, February 4, 2014. 194 wrote a controversial paper in 2008 Cass R. Sunstein and Adrian

020-58305_ch02_3P.indd 268 6/6/14 11:51 AM NOTES 269

Vermeule, “Conspiracy Th eories” ( Law School Public Law and Legal Th eory Research Paper Series, January 15, 2008). 195 “My feeling so far is . . . I’m not scared” Lawrence O’Donnell inter- view with Glenn Greenwald, Th e Last Word with Lawrence O’Donnell, MSNBC, June 10, 2013. 195 Hertzberg also asserted similarly dismissive views Hendrik Hertz- berg, “Snoop Scoops,” New Yorker, June 24, 2013. 196 “my almost certainly hasn’t been scrutinized” Ruth Marcus, “, the Insuff erable ,” Washington Post, December 31, 2013. 197 the majority of Americans disbelieved the defenses “Few See Adequate Limits on NSA Surveillance Programs,” Pew Research Center for the People and the Press news release, July 26, 2013. 198 Similar polling data from the Washington Post “Surveillance in Amer- ica: Washington Post Poll: Government and Corporate Surveillance Draw Wide Concern,” Washington Post, December 22, 2013. 198 this represented a fundamental change Orin Kerr, “Liberals and Con- servatives Switch Positions on NSA Surveillance,” Th e Volokh Conspiracy (blog), December 24, 2013. 199 vehemently denounced by one senator Interview with Senator , Th e Early Show, CBS, May 12, 2006. 200 used in 1,618 drug-related cases Benjamin Wallace-Wells, “Patriot Act: Th e Kitchen Sink Approach to National Security,” New York, August 27, 2011. 201 “Th at capability at any time could be turned around” Interview with Senator , Meet the Press, NBC, August 17, 1975. 201 the threat from state surveillance is far more dire James Bamford, “Th e Agency Th at Could Be Big Brother,” New York Times, December 25, 2005. 202 downplayed concerns about the NSA Hertzberg, “Snoop Scoops.” 202 metadata collection program “almost certainly” unconstitutional Greg Miller and Ellen Nakashima, “Offi cials’ Defenses of NSA Phone Program May Be Unraveling,” Washington Post, December 19, 2013.

020-58305_ch02_3P.indd 269 6/6/14 11:51 AM 270 NOTES

203 metadata program “was not essential to preventing attacks” Liberty and Security in a Changing World: Report and Recommendations of Th e President’s Review Group on Intelligence and Communications Technolo- gies, Review Group on Intelligence and Communications Technologies, December 12, 2013 (released on December 18, 2013). 203 report “cut deeply into the credibility of those claims” Miller and Nakashima, “Offi cials’ Defenses of NSA Phone Program May Be Unrav- eling.” 203 “Th e usefulness of the bulk collection program” Ron Wyden, Mark Udall, and Martin Heinrich, “End the N.S.A Dragnet Now,” New York Times, November 25, 2013. 203 A study by the centrist New America Foundation Peter Bergen, David Sterman, Emily Schneider, and Bailey Cahall, “Do NSA’s Bulk Surveil- lance Programs Stop Terrorists?,” New America Foundation, January 13, 2014. 203 in most cases where plots were disrupted Ellen Nakashima, “NSA Phone Record Collection Does Little to Prevent Terrorist Attacks, Group Says,” Washington Post, January 12, 2014. 204 “I would much rather be here today debating” General Keith Alexander, testimony to House Select Intelligence Committee, June 18, 2013. 204 the CIA had multiple reports Peter Bergen, “Would NSA Surveillance Have Stopped 9/11 Plot?,” CNN, December 30, 2013. 204 the CIA “withheld crucial intelligence” Lawrence Wright, “Th e Al Qaeda Switchboard,” New Yorker, January 13, 2014. 205 obscures actual plots being discussed by actual terrorists Rush Holt, “When Big Brother Meets Big Data,” Huffi ngton Post, June 27, 2013. 205 “Not only is ubiquitous surveillance ineff ective” Bruce Schneier, “How the NSA Th reatens National Security,” Atlantic, January 6, 2014. 205 the balance between threat and expenditures John Mueller quoted in , “Is Homeland Security Spending Paying Off ?” , August 28, 2011. 206 More American citizens have “undoubtedly” died Warren P. Strobel, “Terrorism in 2009,” McClatchy Nukes and Spooks (blog), August 5, 2010.

020-58305_ch02_3P.indd 270 6/6/14 11:51 AM NOTES 271

206 Aft er the trouble-free Olympics Stephen M. Walt, “What Terrorist Th reat?,” Foreign Policy, August 13, 2012. 208 “you have no civil liberties if you are dead” Senator Pat Roberts, remarks during Senate confi rmation hearing of General Michael Hayden as CIA director, May 18, 2006. 208 a cowardly paean to the benefi t of giving up rights Jonathan Allen, “Civil Liberties Don’t Matter Much ‘Aft er You’re Dead,’ Cornyn Says on Spy Case,” Hill, December 20, 2005. 208 Talk radio host Rush Limbaugh piled on Rush Limbaugh, Th e Rush Lim- baugh Show, December 19, 2005. 209 “the centrality of the inspector’s situation” Bentham, Th e Panopticon Writings, 43.

CHAPTER 5: THE FOURTH ESTATE

210 introduced the possibility of a criminal investigation Noam Cohen and Leslie Kaufman, “Blogger, with Focus on Surveillance, Is at Center of a Debate,” New York Times, June 6, 2013. 212 “Th ere’s nothing wrong with being a blogger” Margaret Sullivan, “Who’s a ?: A Question with Many Facets and One Sure Answer,” New York Times, June 29, 2013. 213 “taking its leak crackdown to a new level” , “Holder Tightens Rules on Getting Reporters’ Data,” New York Times, July 12, 2013. 213 Th e behavior cited by the DOJ Ann E. Marimow, “Justice Department’s Scrutiny of Fox News reporter James Rosen in Leak Case Draws Fire,” Washington Post, May 20, 2013. 214 “well inside the bounds of traditional news reporting” Olivier Knox, “Obama Administration Spied on Fox News Reporter James Rosen: Report,” Yahoo! News, May 20, 2013. 214 “obtained extensive records about his phone calls” Charlie Savage, “U.S. Gathered Personal Data on Times Reporter in Case Against Ex- C.I.A. Agent,” New York Times, February 25, 2011. 214 “President Obama fi nds himself battling charges” Martha T. Moore

020-58305_ch02_3P.indd 271 6/6/14 11:51 AM 272 NOTES

and Aamer Madhani, “Is Obama at War with ?,” USA Today, May 27, 2013. 214 “It’s a huge impediment to reporting” Molly Redden, “Is the ‘Chilling Eff ect’ Real?: National- Security Reporters on the Impact of Federal Scru- tiny,” New Republic, May 15, 2013. 214 its fi rst-ever report about the United States Leonard Downie Jr., “Th e Obama Administration and the Press: Leak Investigations and Surveil- lance in Post- 9/11 America,” Committee to Protect Journalists, October 10, 2013. 215 Obama claimed to be “troubled” Mark Landler, “Obama, in Nod to Press, Orders Reviews of Inquiries,” New York Times, May 23, 2013. 215 Holder vowed in a Senate hearing Tom McCarthy, “: Justice Department Will Not Prosecute Reporters Doing Th eir Job,” Guardian, June 6, 2013. 216 King confi rmed to CNN’s Anderson Cooper Representative Peter King interview with Anderson Cooper, Anderson Cooper 360 Degrees, CNN, June 11, 2013. 216 King later clarifi ed on Fox News Representative Peter King interview with Megyn Kelly, America Live, Fox News, June 12, 2013. 216 A former Bush speechwriter Marc A. Th iessen, “Yes, Publishing NSA Secrets Is a Crime,” Washington Post, June 17, 2013. 217 Alan Dershowitz went on CNN Alan Dershowitz interview with Piers Morgan, Piers Morgan Live, CNN, June 24, 2013. 217 chorus was joined by General Michael Hayden Michael Hayden, “Ex-CIA Chief: What Edward Snowden Did,” CNN, July 19, 2013. 217 Cheney was able to “control the message” Dana Milbank, “In Ex- Aide’s Testimony, a Spin Th rough VP’s PR,” Washington Post, January 26, 2007. 217 “To the extent that you have aided and abetted Snowden” Glenn Green- wald interview with David Gregory, Meet the Press, NBC, June 23, 2013. 218 “Should Glenn Greenwald be prosecuted?” Reliable Sources, CNN, June 30, 2013. 219 secretly masterminded by WikiLeaks founder , “Questions for Snowden,” Washington Post, July 8, 2013.

020-58305_ch02_3P.indd 272 6/6/14 11:51 AM NOTES 273

219 “I feel like, A, we’ve screwed this up” , Squawk Box, CNBC, June 24, 2013. 219 “can’t quite believe what David Gregory asked Glenn Greenwald” Huff - Post Media, Twitter posting, June 23, 2013, 7:59 a.m., https:// twitter .com / Huff PostMedia /status /348817574101909507 . 219 “I was jailed by Mugabe’s Zimbabwe” Toby Harnden, Twitter posting, June 23, 2013, 8:33 a.m., https:// twitter .com /tobyharnden /status /348826 074043539457 . 220 “I regard this as regrettable” Letter from Alan Grayson to Eric Holder, October 10, 2013. 221 in an obvious reference to my freelance reporting Keith Alexander, “I Spy, No Lie,” interview with Armed with Science: Th e Offi cial U.S. Defense Department Science Blog (blog), October 24, 2013. 221 the journalists were “selling stolen property” Josh Gerstein, “Intelli- gence Chairman Accuses Glenn Greenwald of Illegally Selling Stolen Mate- rial,” , February 4, 2014. 221 denounced me as a “porno-spy” Paul Calandra, statement to Canadian House of Commons, February 14, 2014. 222 a “narcissistic young man” Bob Schieff er, “Edward Snowden Is No Hero,” CBS News, June 16, 2013. 222 diagnosed him as a “grandiose narcissist” Jeff rey Toobin, “Edward Snowden Is No Hero,” New Yorker, June 10, 2013. 222 “not paranoiac; he is merely narcissistic” Richard Cohen, “Th e NSA Is Doing What Google Does,” Washington Post, June 10, 2013. 223 “could not successfully work his way through community college” David Brooks, “Th e Solitary Leaker,” New York Times, June 10, 2013. 223 “a loser” because he “dropped out of high school” Roger Simon, “Th e Slacker Who Came In from the Cold,” Politico, June 11, 2013. 223 “a coward” Aaron Blake, “DNC Chair Debbie Wasserman Schultz: Snowden Is a Coward,” Washington Post, June 11, 2013. 223 “A Chinese double agent” Matt Mackowiak, Twitter posting, June 9, 2013, 1:07 p.m., https:// twitter .com /MattMackowiak /status /343821572114624514 . 224 “Two Western intelligence experts” Jane Perlez and Keith Bradsher, “China

020-58305_ch02_3P.indd 273 6/6/14 11:51 AM 274 NOTES

Said to Have Made Call to Let Leaker Depart,” New York Times, June 23, 2013. 224 “I never gave any information to either government” Glenn Greenwald, “Snowden: I Never Gave Any Information to Chinese or Rus sian Govern- ments,” Guardian, July 10, 2013. 224 Margaret Sullivan criticized the Times Margaret Sullivan, “How Accept- able Was Anonymous Speculation About Snowden’s Laptops?,” New York Times, July 11, 2013. 226 “His usefulness was almost exhausted” Evan Osnos, “Why China Let Snowden Go,” New Yorker, June 24, 2013. 226 “checks into hotels under false names” John F. Burns, “WikiLeaks Founder on the Run, Trailed by Notoriety,” New York Times, October 23, 2010. 227 “disheveled, like a bag lady” , “Dealing with Assange and the WikiLeaks Secrets,” New York Times, January 26, 2011. 228 “leaking, whistle- blowing and hacktivism” Peter Ludlow, “Th e Banality of Systemic Evil,” New York Times, September 15, 2013. 230 “With regard to that specifi c FISA opinion” Glenn Greenwald interview with David Gregory, Meet the Press, NBC, June 23, 2013. 231 “sad devotion to the corporatist ideal” Jack Shafer, “From Tom Paine to Glenn Greenwald, We Need Partisan ,” , July 16, 2013. 233 “woefully inadequate” , “Behind the Eavesdropping Story, a Loud Silence,” New York Times, January 1, 2006. 233 killed a story in 2006 and Vic Walter, “Whistle- blower Had to Fight NSA, LA Times, to Tell Story,” ABC News, March 6, 2007. 233 the Times might want to take a look in the mirror Margaret Sullivan, “Sources With Secrets Find New Outlets for Sharing,” New York Times, June 16, 2013. 234 “Are you saying that you sort of go to the government” Bill Keller interview on BBC News, November 29, 2010. 234 “an underappreciated phenomenon” Jack Goldsmith, “Th e Patriotism of the American Media,” (blog), February 28, 2011.

020-58305_ch02_3P.indd 274 6/6/14 11:51 AM NOTES 275

235 “the timidity of journalists in America” Lisa O’Carroll, “ on Obama, NSA and the ‘Pathetic’ American Media,” Guardian, September 27, 2013. 244 A report from Reuters confi rmed Mark Hosenball, “Britain Forced Guardian to Destroy Copy of Snowden Material,” Reuters, August 19, 2013. 246 “Th ere was a heads- up” Josh Earnest, White House Press Briefi ng, August 19, 2013. 246 “Journalism is not terrorism” , Th e Rachel Maddow Show, MSNBC, August 20, 2013. 246 equating David’s conduct to that of a “drug mule” Jeff rey Toobin with Anderson Cooper, Anderson Cooper 360 Degrees, CNN, August 20, 2013. 246 Th e proudest moment of his career , speech at Colum- bia Journalism School, May 18, 2005.

EPILOGUE

250 Th e week began with the dramatic opinion Spencer Ackerman and Dan Roberts, “NSA Phone Surveillance Program Likely Unconstitutional, Federal Judge Rules,” Guardian, December 16, 2013. 250 its 308-page report Liberty and Security in a Changing World, Review Group on Intelligence and Communications Technologies. 250 “a strong message to the United States” Edith M. Lederer, “UN Votes to Protect Privacy in Digital Age,” Associated Press, December 18, 2013. 250 “Th e NSA problem ruined it for the Americans” Alonso Soto and Brian Winter, “Saab Wins Jet Deal Aft er NSA Spying Sours Boeing Bid,” Reuters, December 19, 2013. 250 declared the NSA program constitutional Adam Liptak and Michael S. Schmidt, “Judge Upholds N.S.A.’s Bulk Collection of Data on Calls,” New York Times, December 27, 2013.

020-58305_ch02_3P.indd 275 6/6/14 11:51 AM