notes from no place to hide

advertisement
NO TES FROM NO PL ACE T O HIDE
BUY THE BOOK:
E-BOOK
GLENNGREENWALD.NET
NOTES
INTRODUCTION
3
the British government’s surreptitious opening of mail David Vincent,
The Culture of Secrecy in Britain, 1832–1998 (Oxford: Oxford University
Press, 1998), 1–14.
3
the US Bureau of Investigation Peter Conolly-Smith, “ ‘Reading Between
the Lines’: The Bureau of Investigation, the United States Post Office, and
Domestic Surveillance During World War I,” Social Justice 36, no. 1 (2009):
7–24.
4
the British and French empires Daniel Brückenhaus, “Every Stranger
Must Be Suspected: Trust Relationships and the Surveillance of AntiColonialists in Early Twentieth-Century Western Europe,” Geschichte und
Gesellschaft 36 (2010): 523– 66.
4
Syria’s Assad regime flew in employees Ben Elgin and Vernon Silver,
“Syria Crackdown Gets Italy Firm’s Aid with U.S.-Europe Spy Gear,” Bloomberg News, November 3, 2011.
4
Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, and
Matt Bradley, “Mideast Uses Western Tools to Battle the Skype Rebellion,” Wall Street Journal, June 1, 2011.
4
“a wall of black refrigerator-size devices” Margaret Coker and Paul
020-58305_ch02_2P.indd 261
5/7/14 7:37 AM
262
NOTES
Sonne, “Life Under the Gaze of Gadhafi’s Spies,” Wall Street Journal,
December 14, 2011; Paul Sonne and Margaret Coker, “Firms Aided Libyan
Spies,” Wall Street Journal, August 30, 2011.
5
“The Internet in China” United States House of Representatives, “The
Internet in China: A Tool for Freedom or Suppression?” 109th Cong., 2nd
sess., February 15, 2006.
CHAPTER 1: CONTACT
11
interrogations to which Poitras had been subjected Glenn Greenwald,
“U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012.
13
possibility of passing on fraudulent documents “U.S. Intelligence
Planned to Destroy WikiLeaks,” WikiLeaks.org, March 15, 2010, http://
www .wikileaks .org /wiki /U .S . _Intelligence _planned _to _destroy
_WikiLeaks,_18 _Mar_2008.
CHAPTER 2: TEN DAYS IN HONG KONG
37
Prosecution of alleged New York mobsters United States of America v.
John Tomero et al., Defendants, S2 06 Crim. 0008, United States District
Court (S.D. New York, November 27, 2006).
44
In July 2013 the New York Times confirmed Christopher Drew and Scott
Shane, “Résumé Shows Snowden Honed Hacking Skills,” New York Times,
July 4, 2013.
54
systematically amplified pro-war voices Howard Kurtz, “The Post on
WMDs: An Inside Story,” Washington Post, August 12, 2004.
55
caused the New York Times to conceal the existence James Risen and
Eric Lichtblau, “Bush Lets U.S. Spy on Callers Without Courts,” New York
Times, December 16, 2005.
55
Risen was about to publish the revelations in his book Eric Lichtblau,
“The Education of a 9/11 Reporter: The Inside Drama Behind the Times’
Warrantless Wiretapping Story,” Slate, March 26, 2008.
60
records of reporters and editors from the Associated Press Mark Sherman, “Government Obtains Wide AP Phone Records in Probe,” Associated
Press, May 13, 2013.
020-58305_ch02_2P.indd 262
5/7/14 7:37 AM
NOTES
263
60
accusing Fox News Washington bureau chief James Rosen Ann E. Marimow, “A Rare Peek into a Justice Department Leak Probe,” Washington
Post, May 19, 2013.
71
a harsh denunciation of the administration “President Obama’s Dragnet,” New York Times, June 6, 2013.
71
Democratic senator Mark Udall issued a statement Dan Roberts and
Spencer Ackerman, “Anger Swells After NSA Phone Records Court Order
Revelations,” Guardian, June 6, 2013.
71
“the program could hardly be any more alarming” “ACLU Calls for End
to Program, Disclosure of Program’s Scope, Congressional Investigation,”
June 5, 2013, https://www.aclu.org/national-security-technology-and
-liberty/massive-nsa-phone-data-mining-operation-revealed.
72
“is secret blanket surveillance obscenely outrageous?” Al Gore,
Twitter posting, June 5, 2013, 6:39 p.m., https://twitter.com/algore/status/342455655057211393.
CHAPTER 3: COLLECT IT ALL
95
“the most powerful intelligence chief” James Bamford, “Connecting the
Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center,”
Wired, June 12, 2013, http://www.wired.com/2013/06/nsa-prism-verizon
-surveillance/.
95
“I need to get all of the data” Shane Harris, “The Cowboy of the NSA,”
Foreign Policy, September 9, 2013.
95
Alexander grew dissatisfied Ellen Nakashima and Joby Warrick, “For
NSA Chief, Terrorist Threat Drives Passion to ‘Collect It All,’ Observers
Say,” Washington Post, July 14, 2013.
99
the Washington Post reported in 2010 Dana Priest and William M.
Arkin, “A Hidden World, Growing Beyond Control,” Washington Post,
July 19, 2010.
99
a 2012 interview with Democracy Now! William Binney, interview
with Amy Goodman and Juan Gonzalez, Democracy Now!, April 20,
2012.
99
“the capacity to reach roughly 75% of all U.S. Internet traffic” Siobhan
020-58305_ch02_2P.indd 263
5/7/14 7:37 AM
264
NOTES
Gorman and Jennifer Valentino-Devries, “New Details Show Broader
NSA Surveillance Reach,” Wall Street Journal, August 20, 2013.
101 “70 percent of our national intelligence budget” Tim Shorrock, “Meet
the Contractors Analyzing Your Private Data,” Salon, June 10, 2013.
103 BLARNEY relied on one relationship in par ticu lar Gorman and
Valentino-Devries, “New Details Show Broader NSA Surveillance Reach.”
109 Bart Gellman, after receiving heavy criticism Robert O’Harrow Jr., Ellen
Nakashima, and Barton Gellman, “U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data,” Washington Post, June
9, 2013.
109 Chris Soghoian, the ACLU’s tech expert Elias Groll, “The PRISM Spin
War Has Begun,” Foreign Policy, June 7, 2013.
112 described a slew of secret negotiations Claire Cain Miller, “Tech Companies Concede to Surveillance Program,” New York Times, June 7, 2013.
114 the revelations would surprise many Skype customers Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman, and Dominic
Rushe, “Microsoft Handed the NSA Access to Encrypted Messages,”
Guardian, July 11, 2013.
117 “nearly 100,000 computers around the world” David E. Sanger and
Thom Shanker, “N.S.A. Devises Radio Pathway into Computers,” New
York Times, January 14, 2014.
118 “The U.S. government has paid at least £100m” Nick Hopkins and Julian
Borger, “NSA Pays £100m in Secret Funding for GCHQ,” Guardian, August
1, 2013.
119 Under the program name Tempora Ewen MacAskill, Julian Borger, Nick
Hopkins, Nick Davies, and James Ball, “GCHQ Taps Fibre-Optic Cables
for Secret Access to World’s Communications,” Guardian, June 21, 2013.
122 The Guardian reported on one 2007 memo James Ball, “US and UK
Struck Secret Deal to Allow NSA to ‘Unmask’ Britons’ Personal Data,”
Guardian, November 20, 2013.
126 President Obama told Charlie Rose President Barack Obama interview
with Charlie Rose, Charlie Rose, Public Broadcasting Service, June 16, 2013.
126 Mike Rogers similarly told CNN Mike Rogers interview with Candy
Crowley, CNN State of the Union, June 16, 2013.
020-58305_ch02_2P.indd 264
5/7/14 7:37 AM
NOTES
265
126 Even Facebook CEO Mark Zuckerberg Mark Zuckerberg interview at
TechCrunch Disrupt conference in San Francisco, September 11, 2013.
127 Jameel Jaffer, the deputy legal director of the ACLU, explained Jameel
Jaffer, e-mail message to Glenn Greenwald.
127 Yale Law School professor Jack Balkin concurred Jack Balkin, “The
Inspector General’s Report and The Horse That Is Already Out of the
Barn Door,” Balkinization (blog), July 11, 2009, http://balkin.blogspot
.com/2009/07/inspector-generals-report-and-horse.html.
130 “treats senior intelligence officials like matinée idols” Ryan Lizza, “State
of Deception,” New Yorker, December 16, 2013.
131 As Slate’s Davie Weigel reported in November Dave Weigel, “New NSA
Reform Bill Authorizes All the NSA Activity That Was Making You
Angry,” Slate, November 1, 2013.
133 In an affidavit fi led by the ACLU American Civil Liberties Union et al.
v. James R. Clapper et al., 13-cv- 03994, United States District Court
(S.D. New York, 2013), https://www.aclu.org /fi les/pdfs/natsec/clapper
/2013 .08 .26 %20ACLU %20PI%20Brief %20 -%20Declaration%20-%20
Felten.pdf.
135 “does ***not*** engage in economic espionage” Barton Gellman and
Ellen Nakashima, “U.S. Spy Agencies Mounted 231 Offensive CyberOperations in 2011, Documents Show,” Washington Post, August 30, 2013.
138 surveillance targets often included financial institutions James Glanz
and Andrew W. Lehren, “N.S.A. Spied on Allies, Aid Groups and Businesses,” New York Times, December 20, 2013.
147 claimed that Huawei and ZTE Mike Rogers and C. A. Dutch Ruppersberger, Investigative Report on the U.S. National Security Issues Posed by
Chinese Telecommunications Companies Huawei and ZTE, U.S. House of
Representatives, 112th Cong., October 8, 2012.
148 constant accusations became such a burden Shane Harris and Isaac
Stone Fish, “Accused of Cyberspying, Huawei Is ‘Exiting the U.S. Market,’ ”
Foreign Policy, December 2, 2013.
153 Bluffdale construction will expand the agency’s capacity James Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What
You Say),” Wired, March 15, 2012.
020-58305_ch02_2P.indd 265
5/7/14 7:37 AM
266
NOTES
CHAPTER 4: THE HARM OF SURVEILLANCE
170 When Google CEO Eric Schmidt was asked Eric Schmidt interview with
Maria Bartiromo, CNBC, December 29, 2009.
170 With equal dismissiveness, Facebook founder and CEO Mark Zuckerberg interview with Michael Arrington at TechCrunch in San Francisco,
January 9, 2010.
171 a 2011 report from the ACLU Mike German and Jay Stanley, Drastic
Measures Required, American Civil Liberties Union, July 2011, 3.
171 So secretive is this shadowy world Priest and Arkin, “A Hidden World,
Growing Beyond Control.”
171 a policy of not talking to reporters from CNET Carolyn Said, “Google
Says CNET Went Too Far in Googling,” San Francisco Chronicle, August 9,
2005.
171 Zuckerberg purchased the four homes Chris Matyszczyk, “Zuckerberg
Buys Four New Houses for, um, Privacy,” CNET, October 11, 2013.
172 the most famous formulation of what privacy means Olmstead v. United
States, United States Supreme Court, 277 U.S. 438 (1928).
172 the seminal 1890 Harvard Law Review article Samuel D. Warren and
Louis D. Brandeis, “The Right to Privacy,” Harvard Law Review 4, no. 5
(December 15, 1890): 193–220.
175 “The telescreen received and transmitted simultaneously” George
Orwell, Nineteen Eighty-Four (New York: Alfred A. Knopf, 1992), 4–5.
First published by Secker and Warburg, 1949.
175 “in which persons of any description are to be kept under inspection”
Jeremy Bentham, The Panopticon Writings, ed. Miran Božovič (New York:
Verso, 1995), 29. First published 1791.
176 Panopticonism is “a type of power” Michel Foucault, Power: Essential
Works of Foucault, 1954–1984, vol. 3, ed. James D. Faubion, trans. Robert
Hurley (New York: New Press, 2000), 70.
176 angrily likened US surveillance to the Stasi Ian Traynor and Paul Lewis,
“Merkel Compared NSA to Stasi in Heated Encounter with Obama,”
Guardian, December 17, 2013.
178 Walter Bernstein, who was blacklisted and monitored Larry Siems, “A
020-58305_ch02_2P.indd 266
5/7/14 7:37 AM
NOTES
267
Blacklisted Screenwriter on American Surveillance” (Siems interview
with Walter Bernstein), PEN America, August 30, 2013.
178 a report released by PEN America in November 2013 “Chilling Effects:
NSA Surveillance Drives U.S. Writers to Self-Censor,” PEN America,
November 12, 2013, 3.
178 presented their subjects with morally questionable actions Pierrick
Bourrat, Nicolas Baumard, and Ryan McKay, “Surveillance Cues Enhance
Moral Condemnation,” Evolutionary Psychology 9, no. 2 (2011): 193–99.
179 A comprehensive experiment conducted in 1975 Gregory L. White and
Philip G. Zimbardo, The Chilling Effects of Surveillance: Deindividuation
and Reactance, Office of Naval Research, May 1975.
180 rowdiness in Swedish soccer stadiums Mikael Priks, “Do Surveillance
Cameras Affect Unruly Behavior? A Close Look at Grandstands” (working paper no. 2289, Center for Economic Studies of the Leibniz Institute
for Economic Research [CESifo], University of Munich, April 2008).
180 public health literature on hand washing Kristen Munger and Shelby
J. Harris, “Effects of an Observer on Handwashing in a Public Restroom,” Perceptual and Motor Skills 69 (1989): 733–34; D. M. Pedersen,
S. Keithly, and K. Brady, “Effects of an Observer on Conformity to
Handwashing Norm,” Perceptual and Motor Skills 62, no. 1 (March
1986): 169–70.
180 researchers provided subjects with tracking devices C. Mancini, Y. Rogers,
K. Thomas, et al., “In the Best Families: Tracking and Relationships,” Proceedings of the 29th International Conference on Human Factors in Computing Systems (New York: ACM Press, 2011), 2419–28.
181 one of the most radical simulations of surveillance Antti Oulasvirta,
Aurora Pihlajamaa, Jukka Perkiö, et al., “Long-Term Effects of Ubiquitous
Surveillance in the Home,” Proceedings of the 2012 ACM Conference on
Ubiquitous Computing (New York: ACM Press, 2012), 41–50.
182 “Privacy is relational” Barton Gellman, “Digital Privacy: If You’ve Done
Nothing Wrong, Do You Have ‘Nothing to Hide’?,” Time, August 3, 2010.
182 Nixon’s attorney general, John Mitchell, assured readers “The New Line
on Wiretapping,” Time, July 25, 1969.
182 “calls from very bad people to very bad people” Eric Lichtblau and James
020-58305_ch02_2P.indd 267
5/7/14 7:37 AM
268
NOTES
Risen, “Defense Lawyers in Terror Cases Plan Challenges over Spy Efforts,”
New York Times, December 28, 2005.
182 Obama appeared on The Tonight Show President Barack Obama interview with Jay Leno, The Tonight Show, NBC, aired August 7, 2013.
183 Culminating in the unanimous 1969 decision Brandenburg v. Ohio,
United States Supreme Court, 395 U.S. 444 (1969).
184 Those revelations led to the creation United States Senate, Final Report of
the Select Committee to Study Governmental Operations with Respect to
Intelligence Activities, April 26, 1976.
184 One key COINTELPRO memo explained Betty Medsger, The Burglary:
The Discovery of J. Edgar Hoover’s Secret FBI (New York: Alfred A. Knopf,
2014), 160.
184 In a 2013 documentary 1971, dir. Johanna Hamilton, Maximum Pictures,
2013.
185 “The FBI has never shown much sensitivity to the poisonous effect”
Quoted in Medsger, The Burglary, 184.
185 documents obtained by the ACLU revealed “Documents Shed New Light
on Pentagon Surveillance of Peace Activists,” American Civil Liberties
Union News Release, October 12, 2006.
186 American Muslims routinely describe the effect of spying Muslim
American Civil Liberties Coalition (MACLC), Creating Law Enforcement
Accountability and Responsibility (CLEAR) Project, and Asian American
Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD
Spying and Its Impact on American Muslims, CLEAR Project, City University of New York Law School, March 11, 2013.
187 “information about your political views, your medical history” Glenn
Greenwald, Ryan Gallagher, and Ryan Grim, “Top-Secret Document
Reveals NSA Spied on Porn Habits as Part of Plan to Discredit ‘Radicalizers,’ ” Huffington Post, November 26, 2013.
190 “nothing remotely resembling terrorism” Mark Schone, Richard Esposito,
Matthew Cole, and Glenn Greenwald, “War on Anonymous: British Spies
Attacked Hackers, Snowden Docs Show,” NBC, February 4, 2014.
194 wrote a controversial paper in 2008 Cass R. Sunstein and Adrian
020-58305_ch02_2P.indd 268
5/7/14 7:37 AM
NOTES
269
Vermeule, “Conspiracy Theories” (Harvard University Law School Public
Law and Legal Theory Research Paper Series, January 15, 2008).
195 “My feeling so far is . . . I’m not scared” Lawrence O’Donnell interview with Glenn Greenwald, The Last Word with Lawrence O’Donnell,
MSNBC, June 10, 2013.
195 Hertzberg also asserted similarly dismissive views Hendrik Hertzberg, “Snoop Scoops,” New Yorker, June 24, 2013.
196 “my metadata almost certainly hasn’t been scrutinized” Ruth Marcus,
“Edward Snowden, the Insufferable Whistleblower,” Washington Post,
December 31, 2013.
197 the majority of Americans disbelieved the defenses “Few See Adequate
Limits on NSA Surveillance Programs,” Pew Research Center for the People
and the Press news release, July 26, 2013.
198 Similar polling data from the Washington Post “Surveillance in America: Washington Post Poll: Government and Corporate Surveillance Draw
Wide Concern,” Washington Post, December 22, 2013.
198 this represented a fundamental change Orin Kerr, “Liberals and Conservatives Switch Positions on NSA Surveillance,” The Volokh Conspiracy
(blog), December 24, 2013.
199 vehemently denounced by one senator Interview with Senator Joe Biden,
The Early Show, CBS, May 12, 2006.
200 used in 1,618 drug-related cases Benjamin Wallace-Wells, “Patriot Act:
The Kitchen Sink Approach to National Security,” New York, August 27,
2011.
201 “That capability at any time could be turned around” Interview with
Senator Frank Church, Meet the Press, NBC, August 17, 1975.
201 the threat from state surveillance is far more dire James Bamford,
“The Agency That Could Be Big Brother,” New York Times, December 25,
2005.
202 downplayed concerns about the NSA Hertzberg, “Snoop Scoops.”
202 metadata collection program “almost certainly” unconstitutional Greg
Miller and Ellen Nakashima, “Officials’ Defenses of NSA Phone Program
May Be Unraveling,” Washington Post, December 19, 2013.
020-58305_ch02_2P.indd 269
5/7/14 7:37 AM
270
NOTES
203 metadata program “was not essential to preventing attacks” Liberty
and Security in a Changing World: Report and Recommendations of The
President’s Review Group on Intelligence and Communications Technologies, Review Group on Intelligence and Communications Technologies,
December 12, 2013 (released on December 18, 2013).
203 report “cut deeply into the credibility of those claims” Miller and
Nakashima, “Officials’ Defenses of NSA Phone Program May Be Unraveling.”
203 “The usefulness of the bulk collection program” Ron Wyden, Mark
Udall, and Martin Heinrich, “End the N.S.A Dragnet Now,” New York
Times, November 25, 2013.
203 A study by the centrist New America Foundation Peter Bergen, David
Sterman, Emily Schneider, and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?,” New America Foundation, January 13,
2014.
203 in most cases where plots were disrupted Ellen Nakashima, “NSA Phone
Record Collection Does Little to Prevent Terrorist Attacks, Group Says,”
Washington Post, January 12, 2014.
204 “I would much rather be here today debating” General Keith Alexander,
testimony to House Select Intelligence Committee, June 18, 2013.
204 the CIA had multiple reports Peter Bergen, “Would NSA Surveillance
Have Stopped 9/11 Plot?,” CNN, December 30, 2013.
204 the CIA “withheld crucial intelligence” Lawrence Wright, “The Al Qaeda
Switchboard,” New Yorker, January 13, 2014.
205 obscures actual plots being discussed by actual terrorists Rush Holt,
“When Big Brother Meets Big Data,” Huffington Post, June 27, 2013.
205 “Not only is ubiquitous surveillance ineffective” Bruce Schneier, “How
the NSA Threatens National Security,” Atlantic, January 6, 2014.
205 the balance between threat and expenditures John Mueller quoted in
Kim Murphy, “Is Homeland Security Spending Paying Off ?” Los Angeles
Times, August 28, 2011.
206 More American citizens have “undoubtedly” died Warren P. Strobel,
“Terrorism in 2009,” McClatchy Nukes and Spooks (blog), August 5,
2010.
020-58305_ch02_2P.indd 270
5/7/14 7:37 AM
NOTES
271
206 After the trouble-free Olympics Stephen M. Walt, “What Terrorist Threat?,”
Foreign Policy, August 13, 2012.
208 “you have no civil liberties if you are dead” Senator Pat Roberts, remarks
during Senate confirmation hearing of General Michael Hayden as CIA
director, May 18, 2006.
208 a cowardly paean to the benefit of giving up rights Jonathan Allen,
“Civil Liberties Don’t Matter Much ‘After You’re Dead,’ Cornyn Says on
Spy Case,” Hill, December 20, 2005.
208 Talk radio host Rush Limbaugh piled on Rush Limbaugh, The Rush Limbaugh Show, December 19, 2005.
209 “the centrality of the inspector’s situation” Bentham, The Panopticon
Writings, 43.
CHAPTER 5: THE FOURTH ESTATE
210 introduced the possibility of a criminal investigation Noam Cohen and
Leslie Kaufman, “Blogger, with Focus on Surveillance, Is at Center of a
Debate,” New York Times, June 6, 2013.
212 “There’s nothing wrong with being a blogger” Margaret Sullivan, “Who’s
a Journalist?: A Question with Many Facets and One Sure Answer,” New
York Times, June 29, 2013.
213 “taking its leak crackdown to a new level” Charlie Savage, “Holder
Tightens Rules on Getting Reporters’ Data,” New York Times, July 12,
2013.
213 The behavior cited by the DOJ Ann E. Marimow, “Justice Department’s
Scrutiny of Fox News reporter James Rosen in Leak Case Draws Fire,”
Washington Post, May 20, 2013.
214 “well inside the bounds of traditional news reporting” Olivier Knox,
“Obama Administration Spied on Fox News Reporter James Rosen: Report,”
Yahoo! News, May 20, 2013.
214 “obtained extensive records about his phone calls” Charlie Savage, “U.S.
Gathered Personal Data on Times Reporter in Case Against Ex-C.I.A.
Agent,” New York Times, February 25, 2011.
214 “President Obama finds himself battling charges” Martha T. Moore
020-58305_ch02_2P.indd 271
5/7/14 7:37 AM
272
NOTES
and Aamer Madhani, “Is Obama at War with Journalists?,” USA Today,
May 27, 2013.
214 “It’s a huge impediment to reporting” Molly Redden, “Is the ‘Chilling
Effect’ Real?: National-Security Reporters on the Impact of Federal Scrutiny,” New Republic, May 15, 2013.
214 its first-ever report about the United States Leonard Downie Jr., “The
Obama Administration and the Press: Leak Investigations and Surveillance in Post-9/11 America,” Committee to Protect Journalists, October
10, 2013.
215 Obama claimed to be “troubled” Mark Landler, “Obama, in Nod to
Press, Orders Reviews of Inquiries,” New York Times, May 23, 2013.
215 Holder vowed in a Senate hearing Tom McCarthy, “Eric Holder: Justice
Department Will Not Prosecute Reporters Doing Their Job,” Guardian,
June 6, 2013.
216 King confirmed to CNN’s Anderson Cooper Representative Peter King
interview with Anderson Cooper, Anderson Cooper 360 Degrees, CNN,
June 11, 2013.
216 King later clarified on Fox News Representative Peter King interview
with Megyn Kelly, America Live, Fox News, June 12, 2013.
216 A former Bush speechwriter Marc A. Thiessen, “Yes, Publishing NSA
Secrets Is a Crime,” Washington Post, June 17, 2013.
217 Alan Dershowitz went on CNN Alan Dershowitz interview with Piers
Morgan, Piers Morgan Live, CNN, June 24, 2013.
217 chorus was joined by General Michael Hayden Michael Hayden, “Ex-CIA
Chief: What Edward Snowden Did,” CNN, July 19, 2013.
217 Cheney was able to “control the message” Dana Milbank, “In Ex-Aide’s
Testimony, a Spin Through VP’s PR,” Washington Post, January 26, 2007.
217 “To the extent that you have aided and abetted Snowden” Glenn Greenwald interview with David Gregory, Meet the Press, NBC, June 23, 2013.
218 “Should Glenn Greenwald be prosecuted?” Reliable Sources, CNN,
June 30, 2013.
219 secretly masterminded by WikiLeaks founder Julian Assange Walter
Pincus, “Questions for Snowden,” Washington Post, July 8, 2013.
020-58305_ch02_2P.indd 272
5/7/14 7:37 AM
NOTES
273
219 “I feel like, A, we’ve screwed this up” Andrew Ross Sorkin, Squawk Box,
CNBC, June 24, 2013.
219 “can’t quite believe what David Gregory asked Glenn Greenwald” HuffPost Media, Twitter posting, June 23, 2013, 7:59 a.m., https://twitter.com
/Huff PostMedia/status/348817574101909507.
219 “I was jailed by Mugabe’s Zimbabwe” Toby Harnden, Twitter posting,
June 23, 2013, 8:33 a.m., https://twitter.com/tobyharnden/status/348826
074043539457.
220 “I regard this as regrettable” Letter from Alan Grayson to Eric Holder,
October 10, 2013.
221 in an obvious reference to my freelance reporting Keith Alexander, “I
Spy, No Lie,” interview with Armed with Science: The Official U.S. Defense
Department Science Blog (blog), October 24, 2013.
221 the journalists were “selling stolen property” Josh Gerstein, “Intelligence Chairman Accuses Glenn Greenwald of Illegally Selling Stolen Material,” Politico, February 4, 2014.
221 denounced me as a “porno-spy” Paul Calandra, statement to Canadian
House of Commons, February 14, 2014.
222 a “narcissistic young man” Bob Schieffer, “Edward Snowden Is No Hero,”
CBS News, June 16, 2013.
222 diagnosed him as a “grandiose narcissist” Jeff rey Toobin, “Edward
Snowden Is No Hero,” New Yorker, June 10, 2013.
222 “not paranoiac; he is merely narcissistic” Richard Cohen, “The NSA Is
Doing What Google Does,” Washington Post, June 10, 2013.
223 “could not successfully work his way through community college” David
Brooks, “The Solitary Leaker,” New York Times, June 10, 2013.
223 “a loser” because he “dropped out of high school” Roger Simon, “The
Slacker Who Came In from the Cold,” Politico, June 11, 2013.
223 “a coward” Aaron Blake, “DNC Chair Debbie Wasserman Schultz: Snowden
Is a Coward,” Washington Post, June 11, 2013.
223 “A Chinese double agent” Matt Mackowiak, Twitter posting, June 9, 2013,
1:07 p.m., https://twitter.com/MattMackowiak/status/343821572114624514.
224 “Two Western intelligence experts” Jane Perlez and Keith Bradsher, “China
020-58305_ch02_2P.indd 273
5/7/14 7:37 AM
274
NOTES
Said to Have Made Call to Let Leaker Depart,” New York Times, June 23,
2013.
224 “I never gave any information to either government” Glenn Greenwald,
“Snowden: I Never Gave Any Information to Chinese or Russian Governments,” Guardian, July 10, 2013.
224 Margaret Sullivan criticized the Times Margaret Sullivan, “How Acceptable Was Anonymous Speculation About Snowden’s Laptops?,” New York
Times, July 11, 2013.
226 “His usefulness was almost exhausted” Evan Osnos, “Why China Let
Snowden Go,” New Yorker, June 24, 2013.
226 “checks into hotels under false names” John F. Burns, “WikiLeaks
Founder on the Run, Trailed by Notoriety,” New York Times, October 23,
2010.
227 “disheveled, like a bag lady” Bill Keller, “Dealing with Assange and the
WikiLeaks Secrets,” New York Times, January 26, 2011.
228 “leaking, whistle-blowing and hacktivism” Peter Ludlow, “The Banality
of Systemic Evil,” New York Times, September 15, 2013.
230 “With regard to that specific FISA opinion” Glenn Greenwald interview
with David Gregory, Meet the Press, NBC, June 23, 2013.
231 “sad devotion to the corporatist ideal” Jack Shafer, “From Tom Paine to
Glenn Greenwald, We Need Partisan Journalism,” Reuters, July 16, 2013.
233 “woefully inadequate” Byron Calame, “Behind the Eavesdropping
Story, a Loud Silence,” New York Times, January 1, 2006.
233 Dean Baquet killed a story in 2006 Brian Ross and Vic Walter, “Whistleblower Had to Fight NSA, LA Times, to Tell Story,” ABC News, March 6,
2007.
233 the Times might want to take a look in the mirror Margaret Sullivan,
“Sources With Secrets Find New Outlets for Sharing,” New York Times,
June 16, 2013.
234 “Are you saying that you sort of go to the government” Bill Keller
interview on BBC News, November 29, 2010.
234 “an underappreciated phenomenon” Jack Goldsmith, “The Patriotism of
the American Media,” Lawfare (blog), February 28, 2011.
020-58305_ch02_2P.indd 274
5/7/14 7:37 AM
NOTES
275
235 “the timidity of journalists in America” Lisa O’Carroll, “Seymour Hersh
on Obama, NSA and the ‘Pathetic’ American Media,” Guardian, September
27, 2013.
244 A report from Reuters confirmed Mark Hosenball, “Britain Forced
Guardian to Destroy Copy of Snowden Material,” Reuters, August 19, 2013.
246 “There was a heads-up” Josh Earnest, White House Press Briefing,
August 19, 2013.
246 “Journalism is not terrorism” Rachel Maddow, The Rachel Maddow Show,
MSNBC, August 20, 2013.
246 equating David’s conduct to that of a “drug mule” Jeffrey Toobin with
Anderson Cooper, Anderson Cooper 360 Degrees, CNN, August 20, 2013.
246 The proudest moment of his career David Halberstam, speech at Columbia Journalism School, May 18, 2005.
EPILOGUE
250 The week began with the dramatic opinion Spencer Ackerman and Dan
Roberts, “NSA Phone Surveillance Program Likely Unconstitutional,
Federal Judge Rules,” Guardian, December 16, 2013.
250 its 308-page report Liberty and Security in a Changing World, Review
Group on Intelligence and Communications Technologies.
250 “a strong message to the United States” Edith M. Lederer, “UN Votes to
Protect Privacy in Digital Age,” Associated Press, December 18, 2013.
250 “The NSA problem ruined it for the Americans” Alonso Soto and Brian
Winter, “Saab Wins Brazil Jet Deal After NSA Spying Sours Boeing Bid,”
Reuters, December 19, 2013.
250 declared the NSA program constitutional Adam Liptak and Michael S.
Schmidt, “Judge Upholds N.S.A.’s Bulk Collection of Data on Calls,” New
York Times, December 27, 2013.
020-58305_ch02_2P.indd 275
5/7/14 7:37 AM
Download