NOTES FROM NO PLACE TO HIDE - Macmillan Publishers

Transcription

NO TES FROM NO PL ACE T O HIDEBUY THE BOOK:E-BOOKGLENNGREENWALD.NET

NOTESINTRODUCTION3the British government’s surreptitious opening of mail David Vincent,The Culture of Secrecy in Britain, 1832–1998 (Oxford: Oxford UniversityPress, 1998), 1–14.3the US Bureau of Investigation Peter Conolly-Smith, “ ‘Reading Betweenthe Lines’: The Bureau of Investigation, the United States Post Office, andDomestic Surveillance During World War I,” Social Justice 36, no. 1 (2009):7–24.4the British and French empires Daniel Brückenhaus, “Every StrangerMust Be Suspected: Trust Relationships and the Surveillance of AntiColonialists in Early Twentieth-Century Western Europe,” Geschichte undGesellschaft 36 (2010): 523– 66.4Syria’s Assad regime flew in employees Ben Elgin and Vernon Silver,“Syria Crackdown Gets Italy Firm’s Aid with U.S.-Europe Spy Gear,” Bloomberg News, November 3, 2011.4Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, andMatt Bradley, “Mideast Uses Western Tools to Battle the Skype Rebellion,” Wall Street Journal, June 1, 2011.4“a wall of black refrigerator-size devices” Margaret Coker and Paul020-58305 ch02 3P.indd 2616/6/14 11:50 AM

262NOTESSonne, “Life Under the Gaze of Gadhafi’s Spies,” Wall Street Journal,December 14, 2011; Paul Sonne and Margaret Coker, “Firms Aided LibyanSpies,” Wall Street Journal, August 30, 2011.5“The Internet in China” United States House of Representatives, “TheInternet in China: A Tool for Freedom or Suppression?” 109th Cong., 2ndsess., February 15, 2006.CHAPTER 1: CONTACT11interrogations to which Poitras had been subjected Glenn Greenwald,“U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012.13possibility of passing on fraudulent documents “U.S. IntelligencePlanned to Destroy WikiLeaks,” WikiLeaks.org, March 15, 2010, http://www .wikileaks .org /wiki /U .S . Intelligence planned to destroyWikiLeaks, 18 Mar 2008.CHAPTER 2: TEN DAYS IN HONG KONG37Prosecution of alleged New York mobsters United States of America v.John Tomero et al., Defendants, S2 06 Crim. 0008, United States DistrictCourt (S.D. New York, November 27, 2006).44In July 2013 the New York Times confirmed Christopher Drew and ScottShane, “Résumé Shows Snowden Honed Hacking Skills,” New York Times,July 4, 2013.54systematically amplified pro-war voices Howard Kurtz, “The Post onWMDs: An Inside Story,” Washington Post, August 12, 2004.55caused the New York Times to conceal the existence James Risen andEric Lichtblau, “Bush Lets U.S. Spy on Callers Without Courts,” New YorkTimes, December 16, 2005.55Risen was about to publish the revelations in his book Eric Lichtblau,“The Education of a 9/11 Reporter: The Inside Drama Behind the Times’Warrantless Wiretapping Story,” Slate, March 26, 2008.60records of reporters and editors from the Associated Press Mark Sherman, “Government Obtains Wide AP Phone Records in Probe,” AssociatedPress, May 13, 2013.020-58305 ch02 3P.indd 2626/6/14 11:50 AM

NOTES26360accusing Fox News Washington bureau chief James Rosen Ann E. Marimow, “A Rare Peek into a Justice Department Leak Probe,” WashingtonPost, May 19, 2013.71a harsh denunciation of the administration “President Obama’s Dragnet,” New York Times, June 6, 2013.71Democratic senator Mark Udall issued a statement Dan Roberts andSpencer Ackerman, “Anger Swells After NSA Phone Records Court OrderRevelations,” Guardian, June 6, 2013.71“the program could hardly be any more alarming” “ACLU Calls for Endto Program, Disclosure of Program’s Scope, Congressional Investigation,”June 5, 2013, n-revealed.72“is secret blanket surveillance obscenely outrageous?” Al Gore,Twitter posting, June 5, 2013, 6:39 p.m., 93.CHAPTER 3: COLLECT IT ALL95“the most powerful intelligence chief” James Bamford, “Connecting theDots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center,”Wired, June 12, 2013, veillance/.95“I need to get all of the data” Shane Harris, “The Cowboy of the NSA,”Foreign Policy, September 9, 2013.95Alexander grew dissatisfied Ellen Nakashima and Joby Warrick, “ForNSA Chief, Terrorist Threat Drives Passion to ‘Collect It All,’ ObserversSay,” Washington Post, July 14, 2013.99the Washington Post reported in 2010 Dana Priest and William M. Arkin,“A Hidden World, Growing Beyond Control,” Washington Post, July 19, 2010.99a 2012 interview with Democracy Now! William Binney, interview withAmy Goodman and Juan Gonzalez, Democracy Now!, April 20, 2012.99“the capacity to reach roughly 75% of all U.S. Internet traffic” SiobhanGorman and Jennifer Valentino-Devries, “New Details Show BroaderNSA Surveillance Reach,” Wall Street Journal, August 20, 2013.020-58305 ch02 3P.indd 2636/6/14 11:50 AM

264NOTES101 “70 percent of our national intelligence budget” Tim Shorrock, “Meetthe Contractors Analyzing Your Private Data,” Salon, June 10, 2013.103 BLARNEY relied on one relationship in par ticu lar Gorman andValentino-Devries, “New Details Show Broader NSA Surveillance Reach.”109 Bart Gellman, after receiving heavy criticism Robert O’Harrow Jr., EllenNakashima, and Barton Gellman, “U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data,” Washington Post, June9, 2013.109 Chris Soghoian, the ACLU’s tech expert Elias Groll, “The PRISM SpinWar Has Begun,” Foreign Policy, June 7, 2013.112 described a slew of secret negotiations Claire Cain Miller, “Tech Companies Concede to Surveillance Program,” New York Times, June 7, 2013.114 the revelations would surprise many Skype customers Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman, and DominicRushe, “Microsoft Handed the NSA Access to Encrypted Messages,”Guardian, July 11, 2013.117 “nearly 100,000 computers around the world” David E. Sanger andThom Shanker, “N.S.A. Devises Radio Pathway into Computers,” NewYork Times, January 14, 2014.118 “The U.S. government has paid at least 100m” Nick Hopkins and JulianBorger, “NSA Pays 100m in Secret Funding for GCHQ,” Guardian, August1, 2013.119 Under the program name Tempora Ewen MacAskill, Julian Borger, NickHopkins, Nick Davies, and James Ball, “GCHQ Taps Fibre-Optic Cablesfor Secret Access to World’s Communications,” Guardian, June 21, 2013.122 The Guardian reported on one 2007 memo James Ball, “US and UKStruck Secret Deal to Allow NSA to ‘Unmask’ Britons’ Personal Data,”Guardian, November 20, 2013.126 President Obama told Charlie Rose President Barack Obama interviewwith Charlie Rose, Charlie Rose, Public Broadcasting Service, June 16, 2013.126 Mike Rogers similarly told CNN Mike Rogers interview with CandyCrowley, CNN State of the Union, June 16, 2013.126 Even Facebook CEO Mark Zuckerberg Mark Zuckerberg interview atTechCrunch Disrupt conference in San Francisco, September 11, 2013.020-58305 ch02 3P.indd 2646/6/14 11:50 AM

NOTES265127 Jameel Jaffer, the deputy legal director of the ACLU, explained JameelJaffer, e-mail message to Glenn Greenwald.127 Yale Law School professor Jack Balkin concurred Jack Balkin, “TheInspector General’s Report and The Horse That Is Already Out of theBarn Door,” Balkinization (blog), July 11, 2009, als-report-and-horse.html.129 the FISA court’s reaction over the last six years Matthew Keys, Twitterposting, November 19, 2013, 4:23 a.m., 28898672640.130 “treats senior intelligence officials like matinée idols” Ryan Lizza, “Stateof Deception,” New Yorker, December 16, 2013.131 As Slate’s Davie Weigel reported in November Dave Weigel, “New NSAReform Bill Authorizes All the NSA Activity That Was Making YouAngry,” Slate, November 1, 2013.133 In an affidavit fi led by the ACLU American Civil Liberties Union et al.v. James R. Clapper et al., 13-cv- 03994, United States District Court (S.D.New York, 2013), 20Felten.pdf.135 “does ***not*** engage in economic espionage” Barton Gellman andEllen Nakashima, “U.S. Spy Agencies Mounted 231 Offensive CyberOperations in 2011, Documents Show,” Washington Post, August 30, 2013.138 surveillance targets often included financial institutions James Glanzand Andrew W. Lehren, “N.S.A. Spied on Allies, Aid Groups and Businesses,” New York Times, December 20, 2013.147 claimed that Huawei and ZTE Mike Rogers and C. A. Dutch Ruppersberger, Investigative Report on the U.S. National Security Issues Posed byChinese Telecommunications Companies Huawei and ZTE, U.S. House ofRepresentatives, 112th Cong., October 8, 2012.148 constant accusations became such a burden Shane Harris and IsaacStone Fish, “Accused of Cyberspying, Huawei Is ‘Exiting the U.S. Market,’ ”Foreign Policy, December 2, 2013.153 Bluffdale construction will expand the agency’s capacity James Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch WhatYou Say),” Wired, March 15, 2012.020-58305 ch02 3P.indd 2656/6/14 11:51 AM

266NOTESCHAPTER 4: THE HARM OF SURVEILLANCE170 When Google CEO Eric Schmidt was asked Eric Schmidt interview withMaria Bartiromo, CNBC, December 29, 2009.170 With equal dismissiveness, Facebook founder and CEO Mark Zuckerberg interview with Michael Arrington at TechCrunch in San Francisco,January 9, 2010.171 a 2011 report from the ACLU Mike German and Jay Stanley, DrasticMeasures Required, American Civil Liberties Union, July 2011, 3.171 So secretive is this shadowy world Priest and Arkin, “A Hidden World,Growing Beyond Control.”171 a policy of not talking to reporters from CNET Carolyn Said, “GoogleSays CNET Went Too Far in Googling,” San Francisco Chronicle, August 9,2005.171 Zuckerberg purchased the four homes Chris Matyszczyk, “ZuckerbergBuys Four New Houses for, um, Privacy,” CNET, October 11, 2013.172 the most famous formulation of what privacy means Olmstead v. UnitedStates, United States Supreme Court, 277 U.S. 438 (1928).172 the seminal 1890 Harvard Law Review article Samuel D. Warren andLouis D. Brandeis, “The Right to Privacy,” Harvard Law Review 4, no. 5(December 15, 1890): 193–220.175 “The telescreen received and transmitted simultaneously” GeorgeOrwell, Nineteen Eighty-Four (New York: Alfred A. Knopf, 1992), 4–5.First published by Secker and Warburg, 1949.175 “in which persons of any description are to be kept under inspection”Jeremy Bentham, The Panopticon Writings, ed. Miran Božovič (New York:Verso, 1995), 29. First published 1791.176 Panopticonism is “a type of power” Michel Foucault, Power: EssentialWorks of Foucault, 1954–1984, vol. 3, ed. James D. Faubion, trans. RobertHurley (New York: New Press, 2000), 70.176 angrily likened US surveillance to the Stasi Ian Traynor and Paul Lewis,“Merkel Compared NSA to Stasi in Heated Encounter with Obama,”Guardian, December 17, 2013.178 Walter Bernstein, who was blacklisted and monitored Larry Siems, “A020-58305 ch02 3P.indd 2666/6/14 11:51 AM

NOTES267Blacklisted Screenwriter on American Surveillance” (Siems interviewwith Walter Bernstein), PEN America, August 30, 2013.178 a report released by PEN America in November 2013 “Chilling Effects:NSA Surveillance Drives U.S. Writers to Self-Censor,” PEN America,November 12, 2013, 3.178 presented their subjects with morally questionable actions PierrickBourrat, Nicolas Baumard, and Ryan McKay, “Surveillance Cues EnhanceMoral Condemnation,” Evolutionary Psychology 9, no. 2 (2011): 193–99.179 A comprehensive experiment conducted in 1975 Gregory L. White andPhilip G. Zimbardo, The Chilling Effects of Surveillance: Deindividuationand Reactance, Office of Naval Research, May 1975.180 rowdiness in Swedish soccer stadiums Mikael Priks, “Do SurveillanceCameras Affect Unruly Behavior? A Close Look at Grandstands” (working paper no. 2289, Center for Economic Studies of the Leibniz Institutefor Economic Research [CESifo], University of Munich, April 2008).180 public health literature on hand washing Kristen Munger and ShelbyJ. Harris, “Effects of an Observer on Handwashing in a Public Restroom,” Perceptual and Motor Skills 69 (1989): 733–34; D. M. Pedersen,S. Keithly, and K. Brady, “Effects of an Observer on Conformity toHandwashing Norm,” Perceptual and Motor Skills 62, no. 1 (March1986): 169–70.180 researchers provided subjects with tracking devices C. Mancini, Y. Rogers,K. Thomas, et al., “In the Best Families: Tracking and Relationships,” Proceedings of the 29th International Conference on Human Factors in Computing Systems (New York: ACM Press, 2011), 2419–28.181 one of the most radical simulations of surveillance Antti Oulasvirta,Aurora Pihlajamaa, Jukka Perkiö, et al., “Long-Term Effects of UbiquitousSurveillance in the Home,” Proceedings of the 2012 ACM Conference onUbiquitous Computing (New York: ACM Press, 2012), 41–50.182 “Privacy is relational” Barton Gellman, “Digital Privacy: If You’ve DoneNothing Wrong, Do You Have ‘Nothing to Hide’?,” Time, August 3, 2010.182 Nixon’s attorney general, John Mitchell, assured readers “The New Lineon Wiretapping,” Time, July 25, 1969.182 “calls from very bad people to very bad people” Eric Lichtblau and James020-58305 ch02 3P.indd 2676/6/14 11:51 AM

268NOTESRisen, “Defense Lawyers in Terror Cases Plan Challenges over Spy Efforts,”New York Times, December 28, 2005.182 Obama appeared on The Tonight Show President Barack Obama interview with Jay Leno, The Tonight Show, NBC, aired August 7, 2013.183 Culminating in the unanimous 1969 decision Brandenburg v. Ohio,United States Supreme Court, 395 U.S. 444 (1969).184 Those revelations led to the creation United States Senate, Final Report ofthe Select Committee to Study Governmental Operations with Respect toIntelligence Activities, April 26, 1976.184 One key COINTELPRO memo explained Betty Medsger, The Burglary:The Discovery of J. Edgar Hoover’s Secret FBI (New York: Alfred A. Knopf,2014), 160.184 In a 2013 documentary 1971, dir. Johanna Hamilton, Maximum Pictures,2013.185 “The FBI has never shown much sensitivity to the poisonous effect”Quoted in Medsger, The Burglary, 184.185 documents obtained by the ACLU revealed “Documents Shed New Lighton Pentagon Surveillance of Peace Activists,” American Civil LibertiesUnion News Release, October 12, 2006.186 American Muslims routinely describe the effect of spying MuslimAmerican Civil Liberties Coalition (MACLC), Creating Law EnforcementAccountability and Responsibility (CLEAR) Project, and Asian AmericanLegal Defense and Education Fund (AALDEF), Mapping Muslims: NYPDSpying and Its Impact on American Muslims, CLEAR Project, City University of New York Law School, March 11, 2013.187 “information about your political views, your medical history” GlennGreenwald, Ryan Gallagher, and Ryan Grim, “Top-Secret DocumentReveals NSA Spied on Porn Habits as Part of Plan to Discredit ‘Radicalizers,’ ” Huffington Post, November 26, 2013.190 “nothing remotely resembling terrorism” Mark Schone, Richard Esposito,Matthew Cole, and Glenn Greenwald, “War on Anonymous: British SpiesAttacked Hackers, Snowden Docs Show,” NBC, February 4, 2014.194 wrote a controversial paper in 2008 Cass R. Sunstein and Adrian020-58305 ch02 3P.indd 2686/6/14 11:51 AM

NOTES269Vermeule, “Conspiracy Theories” (Harvard University Law School PublicLaw and Legal Theory Research Paper Series, January 15, 2008).195 “My feeling so far is . . . I’m not scared” Lawrence O’Donnell interview with Glenn Greenwald, The Last Word with Lawrence O’Donnell,MSNBC, June 10, 2013.195 Hertzberg also asserted similarly dismissive views Hendrik Hertzberg, “Snoop Scoops,” New Yorker, June 24, 2013.196 “my metadata almost certainly hasn’t been scrutinized” Ruth Marcus,“Edward Snowden, the Insufferable Whistleblower,” Washington Post,December 31, 2013.197 the majority of Americans disbelieved the defenses “Few See AdequateLimits on NSA Surveillance Programs,” Pew Research Center for the Peopleand the Press news release, July 26, 2013.198 Similar polling data from the Washington Post “Surveillance in America: Washington Post Poll: Government and Corporate Surveillance DrawWide Concern,” Washington Post, December 22, 2013.198 this represented a fundamental change Orin Kerr, “Liberals and Conservatives Switch Positions on NSA Surveillance,” The Volokh Conspiracy(blog), December 24, 2013.199 vehemently denounced by one senator Interview with Senator Joe Biden,The Early Show, CBS, May 12, 2006.200 used in 1,618 drug-related cases Benjamin Wallace-Wells, “Patriot Act:The Kitchen Sink Approach to National Security,” New York, August 27,2011.201 “That capability at any time could be turned around” Interview withSenator Frank Church, Meet the Press, NBC, August 17, 1975.201 the threat from state surveillance is far more dire James Bamford,“The Agency That Could Be Big Brother,” New York Times, December 25,2005.202 downplayed concerns about the NSA Hertzberg, “Snoop Scoops.”202 metadata collection program “almost certainly” unconstitutional GregMiller and Ellen Nakashima, “Officials’ Defenses of NSA Phone ProgramMay Be Unraveling,” Washington Post, December 19, 2013.020-58305 ch02 3P.indd 2696/6/14 11:51 AM

270NOTES203 metadata program “was not essential to preventing attacks” Libertyand Security in a Changing World: Report and Recommendations of ThePresident’s Review Group on Intelligence and Communications Technologies, Review Group on Intelligence and Communications Technologies,December 12, 2013 (released on December 18, 2013).203 report “cut deeply into the credibility of those claims” Miller andNakashima, “Officials’ Defenses of NSA Phone Program May Be Unraveling.”203 “The usefulness of the bulk collection program” Ron Wyden, MarkUdall, and Martin Heinrich, “End the N.S.A Dragnet Now,” New YorkTimes, November 25, 2013.203 A study by the centrist New America Foundation Peter Bergen, DavidSterman, Emily Schneider, and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?,” New America Foundation, January 13,2014.203 in most cases where plots were disrupted Ellen Nakashima, “NSA PhoneRecord Collection Does Little to Prevent Terrorist Attacks, Group Says,”Washington Post, January 12, 2014.204 “I would much rather be here today debating” General Keith Alexander,testimony to House Select Intelligence Committee, June 18, 2013.204 the CIA had multiple reports Peter Bergen, “Would NSA SurveillanceHave Stopped 9/11 Plot?,” CNN, December 30, 2013.204 the CIA “withheld crucial intelligence” Lawrence Wright, “The Al QaedaSwitchboard,” New Yorker, January 13, 2014.205 obscures actual plots being discussed by actual terrorists Rush Holt,“When Big Brother Meets Big Data,” Huffington Post, June 27, 2013.205 “Not only is ubiquitous surveillance ineffective” Bruce Schneier, “Howthe NSA Threatens National Security,” Atlantic, January 6, 2014.205 the balance between threat and expenditures John Mueller quoted inKim Murphy, “Is Homeland Security Spending Paying Off ?” Los AngelesTimes, August 28, 2011.206 More American citizens have “undoubtedly” died Warren P. Strobel,“Terrorism in 2009,” McClatchy Nukes and Spooks (blog), August 5,2010.020-58305 ch02 3P.indd 2706/6/14 11:51 AM

NOTES271206 After the trouble-free Olympics Stephen M. Walt, “What Terrorist Threat?,”Foreign Policy, August 13, 2012.208 “you have no civil liberties if you are dead” Senator Pat Roberts, remarksduring Senate confirmation hearing of General Michael Hayden as CIAdirector, May 18, 2006.208 a cowardly paean to the benefit of giving up rights Jonathan Allen,“Civil Liberties Don’t Matter Much ‘After You’re Dead,’ Cornyn Says onSpy Case,” Hill, December 20, 2005.208 Talk radio host Rush Limbaugh piled on Rush Limbaugh, The Rush Limbaugh Show, December 19, 2005.209 “the centrality of the inspector’s situation” Bentham, The PanopticonWritings, 43.CHAPTER 5: THE FOURTH ESTATE210 introduced the possibility of a criminal investigation Noam Cohen andLeslie Kaufman, “Blogger, with Focus on Surveillance, Is at Center of aDebate,” New York Times, June 6, 2013.212 “There’s nothing wrong with being a blogger” Margaret Sullivan, “Who’sa Journalist?: A Question with Many Facets and One Sure Answer,” NewYork Times, June 29, 2013.213 “taking its leak crackdown to a new level” Charlie Savage, “HolderTightens Rules on Getting Reporters’ Data,” New York Times, July 12,2013.213 The behavior cited by the DOJ Ann E. Marimow, “Justice Department’sScrutiny of Fox News reporter James Rosen in Leak Case Draws Fire,”Washington Post, May 20, 2013.214 “well inside the bounds of traditional news reporting” Olivier Knox,“Obama Administration Spied on Fox News Reporter James Rosen: Report,”Yahoo! News, May 20, 2013.214 “obtained extensive records about his phone calls” Charlie Savage, “U.S.Gathered Personal Data on Times Reporter in Case Against Ex-C.I.A.Agent,” New York Times, February 25, 2011.214 “President Obama finds himself battling charges” Martha T. Moore020-58305 ch02 3P.indd 2716/6/14 11:51 AM

272NOTESand Aamer Madhani, “Is Obama at War with Journalists?,” USA Today,May 27, 2013.214 “It’s a huge impediment to reporting” Molly Redden, “Is the ‘ChillingEffect’ Real?: National-Security Reporters on the Impact of Federal Scrutiny,” New Republic, May 15, 2013.214 its first-ever report about the United States Leonard Downie Jr., “TheObama Administration and the Press: Leak Investigations and Surveillance in Post-9/11 America,” Committee to Protect Journalists, October10, 2013.215 Obama claimed to be “troubled” Mark Landler, “Obama, in Nod toPress, Orders Reviews of Inquiries,” New York Times, May 23, 2013.215 Holder vowed in a Senate hearing Tom McCarthy, “Eric Holder: JusticeDepartment Will Not Prosecute Reporters Doing Their Job,” Guardian,June 6, 2013.216 King confirmed to CNN’s Anderson Cooper Representative Peter Kinginterview with Anderson Cooper, Anderson Cooper 360 Degrees, CNN,June 11, 2013.216 King later clarified on Fox News Representative Peter King interviewwith Megyn Kelly, America Live, Fox News, June 12, 2013.216 A former Bush speechwriter Marc A. Thiessen, “Yes, Publishing NSASecrets Is a Crime,” Washington Post, June 17, 2013.217 Alan Dershowitz went on CNN Alan Dershowitz interview with PiersMorgan, Piers Morgan Live, CNN, June 24, 2013.217 chorus was joined by General Michael Hayden Michael Hayden, “Ex-CIAChief: What Edward Snowden Did,” CNN, July 19, 2013.217 Cheney was able to “control the message” Dana Milbank, “In Ex-Aide’sTestimony, a Spin Through VP’s PR,” Washington Post, January 26, 2007.217 “To the extent that you have aided and abetted Snowden” Glenn Greenwald interview with David Gregory, Meet the Press, NBC, June 23, 2013.218 “Should Glenn Greenwald be prosecuted?” Reliable Sources, CNN,June 30, 2013.219 secretly masterminded by WikiLeaks founder Julian Assange WalterPincus, “Questions for Snowden,” Washington Post, July 8, 2013.020-58305 ch02 3P.indd 2726/6/14 11:51 AM

NOTES273219 “I feel like, A, we’ve screwed this up” Andrew Ross Sorkin, Squawk Box,CNBC, June 24, 2013.219 “can’t quite believe what David Gregory asked Glenn Greenwald” HuffPost Media, Twitter posting, June 23, 2013, 7:59 a.m., https://twitter.com/Huff PostMedia/status/348817574101909507.219 “I was jailed by Mugabe’s Zimbabwe” Toby Harnden, Twitter posting,June 23, 2013, 8:33 a.m., 3539457.220 “I regard this as regrettable” Letter from Alan Grayson to Eric Holder,October 10, 2013.221 in an obvious reference to my freelance reporting Keith Alexander, “ISpy, No Lie,” interview with Armed with Science: The Official U.S. DefenseDepartment Science Blog (blog), October 24, 2013.221 the journalists were “selling stolen property” Josh Gerstein, “Intelligence Chairman Accuses Glenn Greenwald of Illegally Selling Stolen Material,” Politico, February 4, 2014.221 denounced me as a “porno-spy” Paul Calandra, statement to CanadianHouse of Commons, February 14, 2014.222 a “narcissistic young man” Bob Schieffer, “Edward Snowden Is No Hero,”CBS News, June 16, 2013.222 diagnosed him as a “grandiose narcissist” Jeff rey Toobin, “EdwardSnowden Is No Hero,” New Yorker, June 10, 2013.222 “not paranoiac; he is merely narcissistic” Richard Cohen, “The NSA IsDoing What Google Does,” Washington Post, June 10, 2013.223 “could not successfully work his way through community college” DavidBrooks, “The Solitary Leaker,” New York Times, June 10, 2013.223 “a loser” because he “dropped out of high school” Roger Simon, “TheSlacker Who Came In from the Cold,” Politico, June 11, 2013.223 “a coward” Aaron Blake, “DNC Chair Debbie Wasserman Schultz: SnowdenIs a Coward,” Washington Post, June 11, 2013.223 “A Chinese double agent” Matt Mackowiak, Twitter posting, June 9, 2013,1:07 p.m., 114624514.224 “Two Western intelligence experts” Jane Perlez and Keith Bradsher, “China020-58305 ch02 3P.indd 2736/6/14 11:51 AM

274NOTESSaid to Have Made Call to Let Leaker Depart,” New York Times, June 23,2013.224 “I never gave any information to either government” Glenn Greenwald,“Snowden: I Never Gave Any Information to Chinese or Russian Governments,” Guardian, July 10, 2013.224 Margaret Sullivan criticized the Times Margaret Sullivan, “How Acceptable Was Anonymous Speculation About Snowden’s Laptops?,” New YorkTimes, July 11, 2013.226 “His usefulness was almost exhausted” Evan Osnos, “Why China LetSnowden Go,” New Yorker, June 24, 2013.226 “checks into hotels under false names” John F. Burns, “WikiLeaksFounder on the Run, Trailed by Notoriety,” New York Times, October 23,2010.227 “disheveled, like a bag lady” Bill Keller, “Dealing with Assange and theWikiLeaks Secrets,” New York Times, January 26, 2011.228 “leaking, whistle-blowing and hacktivism” Peter Ludlow, “The Banalityof Systemic Evil,” New York Times, September 15, 2013.230 “With regard to that specific FISA opinion” Glenn Greenwald interviewwith David Gregory, Meet the Press, NBC, June 23, 2013.231 “sad devotion to the corporatist ideal” Jack Shafer, “From Tom Paine toGlenn Greenwald, We Need Partisan Journalism,” Reuters, July 16, 2013.233 “woefully inadequate” Byron Calame, “Behind the EavesdroppingStory, a Loud Silence,” New York Times, January 1, 2006.233 Dean Baquet killed a story in 2006 Brian Ross and Vic Walter, “Whistleblower Had to Fight NSA, LA Times, to Tell Story,” ABC News, March 6,2007.233 the Times might want to take a look in the mirror Margaret Sullivan,“Sources With Secrets Find New Outlets for Sharing,” New York Times,June 16, 2013.234 “Are you saying that you sort of go to the government” Bill Kellerinterview on BBC News, November 29, 2010.234 “an underappreciated phenomenon” Jack Goldsmith, “The Patriotism ofthe American Media,” Lawfare (blog), February 28, 2011.020-58305 ch02 3P.indd 2746/6/14 11:51 AM

NOTES275235 “the timidity of journalists in America” Lisa O’Carroll, “Seymour Hershon Obama, NSA and the ‘Pathetic’ American Media,” Guardian, September27, 2013.244 A report from Reuters confirmed Mark Hosenball, “Britain ForcedGuardian to Destroy Copy of Snowden Material,” Reuters, August 19, 2013.246 “There was a heads-up” Josh Earnest, White House Press Briefing,August 19, 2013.246 “Journalism is not terrorism” Rachel Maddow, The Rachel Maddow Show,MSNBC, August 20, 2013.246 equating David’s conduct to that of a “drug mule” Jeffrey Toobin withAnderson Cooper, Anderson Cooper 360 Degrees, CNN, August 20, 2013.246 The proudest moment of his career David Halberstam, speech at Columbia Journalism School, May 18, 2005.EPILOGUE250 The week began with the dramatic opinion Spencer Ackerman and DanRoberts, “NSA Phone Surveillance Program Likely Unconstitutional,Federal Judge Rules,” Guardian, December 16, 2013.250 its 308-page report Liberty and Security in a Changing World, ReviewGroup on Intelligence and Communications Technologies.250 “a strong message to the United States” Edith M. Lederer, “UN Votes toProtect Privacy in Digital Age,” Associated Press, December 18, 2013.250 “The NSA problem ruined it for the Americans” Alonso Soto and BrianWinter, “Saab Wins Brazil Jet Deal After NSA Spying Sours Boeing Bid,”Reuters, December 19, 2013.250 declared the NSA program constitutional Adam Liptak and Michael S.Schmidt, “Judge Upholds N.S.A.’s Bulk Collection of Data on Calls,” NewYork Times, December 27, 2013.020-58305 ch02 3P.indd 2756/6/14 11:51 AM

4 Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, and Matt Bradley, “Mideast Uses Western Tools to Battle the Skype Rebel-lion,” Wall Street Journal, June 1, 2011. 4 “a wall of black refrigerator- size devices” Margaret Coker