NOTES FROM NO PLACE TO HIDE

Similar documents
Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

Confrontation or Collaboration?

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

January 14, Dear Chairman Graham and Ranking Member Feinstein:

Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

Concerns about unauthorized disclosure of classified information have prompted heated

INTRODUCTION PART I: PROTECTIONS MANDATED BY ARTICLE 15

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The Cyber-Industrial Complex. A Political Science Thesis Presentation Connor O Malley

LAWLESS SURVEILLANCE, WARRANTLESS RATIONALES*

Analyst Trevor Loudon Says Anti-NSA Campaign Benefits America s Enemies

Presidents Bush, Obama and the Surveillance of Americans

THE RUTHERFORD INSTITUTE

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis

WIRETAPPING, SURVEILLANCE AND

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

A US Spy Tool Could Spell

Student Worksheet Manning Case Challenges Definition of Whistleblower

Silenced Discussion Guide

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION

(1) BIG BROTHER WATCH; (2) OPEN RIGHTS GROUP; (3) ENGLISH PEN; AND (4) DR CONSTANZE KURZ. - v - WITNESS STATEMENT OF CINDY COHN

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

STATEMENTS OF SUPPORT. R Street Op-Ed:

National Security Law Class Notes

DIPLOMSKI RAD. State of emergency: privacy, security and surveillance in modern-day U.S.A.

The National Security Agency s Warrantless Wiretaps

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS/WASHINGTON POST MAY OSAMA BIN LADEN SURVEY FINAL TOPLINE May 2, 2011 N=654

1 PEW RESEARCH CENTER

NSA s surveillance leak by Edward Snowden a utilitarian analysis. Jose Camero. 30 September 2015

THE WRIT TO REFUSE. The Writ to Refuse 429

CRS Report for Congress

State Secrets in The Sunlight

PRIVACY VS. SECURITY. Does a tradeoff really exist? Demelza Hays. 1st Place Essay Contest Winner Graduate Student Category

THE POLITICO-GWU BATTLEGROUND POLL

The Political Assassination of Michael Flynn

Case 1:17-cv Document 1 Filed 07/05/17 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

The Identity Project

Wanted by Ecuador, 2 Brothers Make Mark in U.S. Campaigns

United States District Court

THE LIMITS OF THE FREEDOM ACT S AMICUS CURIAE

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS JANUARY OMNIBUS FINAL TOPLINE January 14-17, 2010 N=1003

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

PEW RESEARCH CENTER July 11-14, 2013 OMNIBUS FINAL TOPLINE N=1002

If A Tree Falls Discussion Guide

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS BIENNIAL MEDIA CONSUMPTION SURVEY 2010 FINAL TOPLINE June 8-28, 2010 N=3006

Here is the current RSVP list to the Thursday Night (4/9) dinner at Podesta s. As a reminder, this is with the 25 reporters more closely

REPUBLICAN NATIONAL COMMITTEE RESEARCH BRIEFING BOOK AUGUST 7, 2015

Top Story House Permanent Select Committee On Intelligence Holds Hearings on Information Leaks; Silha Center Director Jane Kirtley Submits Statement

Law v. Safety: Balancing Domestic Surveillance's Legal Deficiencies Against The Necessity Of Counterterrorism

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755)

Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Gareth Llewellyn, CSIS and the Canadian stasi

A Legal Analysis of the NSA Warrantless Surveillance Program. Morton H. Halperin and Jerry Berman 1. January 31, 2006

Enemies: A History Of The FBI By Tim Weiner

August 23, BY U.S. MAIL AND Freedom of Information Act Request Request for Expedited Processing

AMERICAN POLITICS: ELECTIONS

PEW RESEARCH CENTER S PROJECT FOR EXCELLENCE IN JOURNALISM IN COLLABORATION WITH THE ECONOMIST GROUP 2011 Tablet News Phone Survey July 15-30, 2011

Draft Syllabus PolSci 4532: Seminar in Constitutional Politics Fall 2017 Professor Calvert

Spying on humanitarians: implications for organisations and beneficiaries

THE FEDERAL COURTS LAW REVIEW. Symposium Introduction: Privacy in the Federal Courts

The Scouting Report: Future of the News Industry

The Investigatory Powers Bill recommendations for the Labour Party. March 2016

Remarks As Prepared for Delivery for the Center for American. Progress Event on NSA Surveillance

The Personal. The Media Insight Project

P.O. Box 1028 New York, NY (212) April 13, 2012

PRIVACY, TECHNOLOGY AND NATIONAL SECURITY: An Overview of Intelligence Collection by Robert S. Litt, ODNI General Counsel

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS BIENNIAL MEDIA CONSUMPTION SURVEY 2008 FINAL TOPLINE

Protecting Human Rights and National Security in the New Era of Data Nationalism

THE MATRIX: Total Information Awareness Reloaded

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Appendix. Table A1. Characteristics of Study Participants. p- value Lab Online (lab vs. online)


RECOMMENDED CITATION: Pew Research Center, March 2014, Nearly Half of Public Says Right Amount of Malaysian Jet Coverage

Reauthorization of the FISA Amendments Act

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

Mecklenburg County, NC November 5, Mecklenburg County General Election 2002

tinitrd~tat s~fnatf WASHINGTON, DC 20510

BEFORE THE U.S. SENATE JUDICIARY COMMITTEE SUBCOMMITTEE ON THE CONSTITUTION

TITLE III WIRETAPS. WHO S LISTENING?

SURVEILLANCE: THE ISSUE OF PROTECTING OUR NATION AND OUR PRIVACY

With the current terrorist threat facing European Union Member States, including the UK

PEW RESEARCH CENTER August 15-18, 2013 OMNIBUS FINAL TOPLINE N=1,000

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

STATEMENT ON THE NATIONAL SECURITY AGENCY S DOMESTIC SURVEILLANCE PROGRAM

IJ NI ITI E- D] SiTf AÌTI E Si G OVER N M E-NiTf MEMORANDUM!

America s Survival Announces Bring Back Beck Campaign at 2012 Conservative Political Action Conference (CPAC)

phone hacking scandal a massive ethical disaster and compared it to the current scandals unraveling at FIFA and Volkswagen.

August 13-15, KentPresents. An ideas festival exploring What Comes Next

1 June Introduction

U.S. Government and Politics SUMMER ASSIGNMENT!

PEW RESEARCH CENTER June 27-30, 2013 OMNIBUS FINAL TOPLINE N=1,003

A Cult of Rules: The Origins of Legalism in the Surveillance State

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

ON THE NATIONAL SECURITY LEAKS DILEMMA

Transcription:

NOTES FROM NO PLACE TO HIDE BUY THE BOOK: E-BOOK GLENNGREENWALD.NET

NOTES INTRODUCTION 3 the British government s surreptitious opening of mail David Vincent, The Culture of Secrecy in Britain, 1832 1998 (Oxford: Oxford University Press, 1998), 1 14. 3 the US Bureau of Investigation Peter Conolly- Smith, Reading Between the Lines : The Bureau of Investigation, the United States Post Office, and Domestic Surveillance During World War I, Social Justice 36, no. 1 (2009): 7 24. 4 the British and French empires Daniel Brückenhaus, Every Stranger Must Be Suspected: Trust Relationships and the Surveillance of Anti- Colonialists in Early Twentieth- Century Western Eu rope, Geschichte und Gesellschaft 36 (2010): 523 66. 4 Syria s Assad regime flew in employees Ben Elgin and Vernon Silver, Syria Crackdown Gets Italy Firm s Aid with U.S.- Europe Spy Gear, Bloomberg News, November 3, 2011. 4 Mubarak s secret police bought tools Steve Stecklow, Paul Sonne, and Matt Bradley, Mideast Uses Western Tools to Battle the Skype Rebellion, Wall Street Journal, June 1, 2011. 4 a wall of black refrigerator- size devices Margaret Coker and Paul

262 NOTES Sonne, Life Under the Gaze of Gadhafi s Spies, Wall Street Journal, December 14, 2011; Paul Sonne and Margaret Coker, Firms Aided Libyan Spies, Wall Street Journal, August 30, 2011. 5 The Internet in China United States House of Representatives, The Internet in China: A Tool for Freedom or Suppression? 109th Cong., 2nd sess., February 15, 2006. CHAPTER 1: CONTACT 11 interrogations to which Poitras had been subjected Glenn Greenwald, U.S. Filmmaker Repeatedly Detained at Border, Salon, April 8, 2012. 13 possibility of passing on fraudulent documents U.S. Intelligence Planned to Destroy WikiLeaks, WikiLeaks.org, March 15, 2010, http:// w w w.w i k i l e a k s. o r g / w i k i / U. S. _ I n t e l l i g e n c e _ p l a n n e d _ t o _ d e s t r o y _WikiLeaks, _18 _Mar _2008. CHAPTER 2: TEN DAYS IN HONG KONG 37 Prosecution of alleged New York mobsters United States of America v. John Tomero et al., Defendants, S2 06 Crim. 0008, United States District Court (S.D. New York, November 27, 2006). 44 In July 2013 the New York Times confirmed Christopher Drew and Scott Shane, Résumé Shows Snowden Honed Hacking Skills, New York Times, July 4, 2013. 54 systematically amplified pro- war voices Howard Kurtz, The Post on WMDs: An Inside Story, Washington Post, August 12, 2004. 55 caused the New York Times to conceal the existence James Risen and Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, New York Times, December 16, 2005. 55 Risen was about to publish the revelations in his book Eric Lichtblau, The Education of a 9/11 Reporter: The Inside Drama Behind the Times Warrantless Wiretapping Story, Slate, March 26, 2008. 60 rec ords of reporters and editors from the Associated Press Mark Sherman, Government Obtains Wide AP Phone Rec ords in Probe, Associated Press, May 13, 2013.

NOTES 263 60 accusing Fox News Washington bureau chief James Rosen Ann E. Marimow, A Rare Peek into a Justice Department Leak Probe, Washington Post, May 19, 2013. 71 a harsh denunciation of the administration President Obama s Dragnet, New York Times, June 6, 2013. 71 Demo cratic senator Mark Udall issued a statement Dan Roberts and Spencer Ackerman, Anger Swells After NSA Phone Rec ords Court Order Revelations, Guardian, June 6, 2013. 71 the program could hardly be any more alarming ACLU Calls for End to Program, Disclosure of Program s Scope, Congressional Investigation, Ju ne 5, 2 013, ht t ps:// w w w. a c lu.or g /n at ion a l- s e c u r it y-t e c h nolog y-a nd -l ib er t y /m a s si ve -n s a -phone - d at a-m i n i n g- op er at ion-re ve a le d. 72 is secret blanket surveillance obscenely outrageous? Al Gore, Twitter posting, June 5, 2013, 6:39 p.m., https:// twitter.com /algore /status /342455655057211393. CHAPTER 3: COLLECT IT ALL 95 the most powerful intelligence chief James Bamford, Connecting the Dots on PRISM, Phone Surveillance, and the NSA s Massive Spy Center, Wired, June 12, 2013, http://www.wired.com /2013 /06 /nsa-prism-verizon -surveillance /. 95 I need to get all of the data Shane Harris, The Cowboy of the NSA, Foreign Policy, September 9, 2013. 95 Alexander grew dissatisfied Ellen Nakashima and Joby Warrick, For NSA Chief, Terrorist Threat Drives Passion to Collect It All, Observers Say, Washington Post, July 14, 2013. 99 the Washington Post reported in 2010 Dana Priest and William M. Arkin, A Hidden World, Growing Beyond Control, Washington Post, July 19, 2010. 99 a 2012 interview with Democracy Now! William Binney, interview with Amy Goodman and Juan Gonzalez, Democracy Now!, April 20, 2012. 99 the capacity to reach roughly 75% of all U.S. Internet traffic Siobhan Gorman and Jennifer Valentino- Devries, New Details Show Broader NSA Surveillance Reach, Wall Street Journal, August 20, 2013.

264 NOTES 101 70 percent of our national intelligence bud get Tim Shorrock, Meet the Contractors Analyzing Your Private Data, Salon, June 10, 2013. 103 BLARNEY relied on one relationship in par tic u lar Gorman and Valentino- Devries, New Details Show Broader NSA Surveillance Reach. 109 Bart Gellman, after receiving heavy criticism Robert O Harrow Jr., Ellen Nakashima, and Barton Gellman, U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data, Washington Post, June 9, 2013. 109 Chris Soghoian, the ACLU s tech expert Elias Groll, The PRISM Spin War Has Begun, Foreign Policy, June 7, 2013. 112 described a slew of secret negotiations Claire Cain Miller, Tech Companies Concede to Surveillance Program, New York Times, June 7, 2013. 114 the revelations would surprise many Skype customers Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman, and Dominic Rushe, Microsoft Handed the NSA Access to Encrypted Messages, Guardian, July 11, 2013. 117 nearly 100,000 computers around the world David E. Sanger and Thom Shanker, N.S.A. Devises Radio Pathway into Computers, New York Times, January 14, 2014. 118 The U.S. government has paid at least 100m Nick Hopkins and Julian Borger, NSA Pays 100m in Secret Funding for GCHQ, Guardian, August 1, 2013. 119 Under the program name Tempora Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies, and James Ball, GCHQ Taps Fibre- Optic Cables for Secret Access to World s Communications, Guardian, June 21, 2013. 122 The Guardian reported on one 2007 memo James Ball, US and UK Struck Secret Deal to Allow NSA to Unmask Britons Personal Data, Guardian, November 20, 2013. 126 President Obama told Charlie Rose President Barack Obama interview with Charlie Rose, Charlie Rose, Public Broadcasting Ser vice, June 16, 2013. 126 Mike Rogers similarly told CNN Mike Rogers interview with Candy Crowley, CNN State of the Union, June 16, 2013. 126 Even Facebook CEO Mark Zuckerberg Mark Zuckerberg interview at TechCrunch Disrupt conference in San Francisco, September 11, 2013.

NOTES 265 127 Jameel Jaffer, the deputy legal director of the ACLU, explained Jameel Jaffer, e-mail message to Glenn Greenwald. 127 Yale Law School professor Jack Balkin concurred Jack Balkin, The Inspector General s Report and The Horse That Is Already Out of the Barn Door, Balkinization (blog), July 11, 2009, http:// balkin.blogspot. c om /2 0 0 9 /07 /i n s p e c tor -gener a l s -re p or t -a nd-hor s e. ht m l. 129 the FISA court s reaction over the last six years Matthew Keys, Twitter posting, November 19, 2013, 4:23 a.m., https://twitter.com/matthewkeys Live /status/402774028898672640. 130 treats se nior intelligence officials like matinée idols Ryan Lizza, State of Deception, New Yorker, December 16, 2013. 131 As Slate s Davie Weigel reported in November Dave Weigel, New NSA Reform Bill Authorizes All the NSA Activity That Was Making You Angry, Slate, November 1, 2013. 133 In an affidavit filed by the ACLU American Civil Liberties Union et al. v. James R. Clapper et al., 13- cv- 03994, United States District Court (S.D. New York, 2013), https://www.aclu.org /files /pdfs /natsec /clapper /2013.08.26 %20ACLU %20PI %20Brief %20- %20Declaration%20-%20Felten.pdf. 135 does ***not*** engage in economic espionage Barton Gellman and Ellen Nakashima, U.S. Spy Agencies Mounted 231 Offensive Cyber- Operations in 2011, Documents Show, Washington Post, August 30, 2013. 138 surveillance targets often included financial institutions James Glanz and Andrew W. Lehren, N.S.A. Spied on Allies, Aid Groups and Businesses, New York Times, December 20, 2013. 147 claimed that Huawei and ZTE Mike Rogers and C. A. Dutch Ruppersberger, Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE, U.S. House of Representatives, 112th Cong., October 8, 2012. 148 constant accusations became such a burden Shane Harris and Isaac Stone Fish, Accused of Cyberspying, Huawei Is Exiting the U.S. Market, Foreign Policy, December 2, 2013. 153 Bluffdale construction will expand the agency s capacity James Bamford, The NSA Is Building the Country s Biggest Spy Center (Watch What You Say), Wired, March 15, 2012.

266 NOTES CHAPTER 4: THE HARM OF SURVEILLANCE 170 When Google CEO Eric Schmidt was asked Eric Schmidt interview with Maria Bartiromo, CNBC, December 29, 2009. 170 With equal dismissiveness, Facebook found er and CEO Mark Zuckerberg interview with Michael Arrington at TechCrunch in San Francisco, January 9, 2010. 171 a 2011 report from the ACLU Mike German and Jay Stanley, Drastic Measures Required, American Civil Liberties Union, July 2011, 3. 171 So secretive is this shadowy world Priest and Arkin, A Hidden World, Growing Beyond Control. 171 a policy of not talking to reporters from CNET Carolyn Said, Google Says CNET Went Too Far in Googling, San Francisco Chronicle, August 9, 2005. 171 Zuckerberg purchased the four homes Chris Matyszczyk, Zuckerberg Buys Four New Houses for, um, Privacy, CNET, October 11, 2013. 172 the most famous formulation of what privacy means Olmstead v. United States, United States Supreme Court, 277 U.S. 438 (1928). 172 the seminal 1890 Harvard Law Review article Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, Harvard Law Review 4, no. 5 (December 15, 1890): 193 220. 175 The telescreen received and transmitted simultaneously George Orwell, Nineteen Eighty- Four (New York: Alfred A. Knopf, 1992), 4 5. First published by Secker and Warburg, 1949. 175 in which persons of any description are to be kept under inspection Jeremy Bentham, The Panopticon Writings, ed. Miran Božovič (New York: Verso, 1995), 29. First published 1791. 176 Panopticonism is a type of power Michel Foucault, Power: Essential Works of Foucault, 1954 1984, vol. 3, ed. James D. Faubion, trans. Robert Hurley (New York: New Press, 2000), 70. 176 angrily likened US surveillance to the Stasi Ian Traynor and Paul Lewis, Merkel Compared NSA to Stasi in Heated Encounter with Obama, Guardian, December 17, 2013. 178 Walter Bernstein, who was blacklisted and monitored Larry Siems, A

NOTES 267 Blacklisted Screenwriter on American Surveillance (Siems interview with Walter Bernstein), PEN America, August 30, 2013. 178 a report released by PEN America in November 2013 Chilling Effects: NSA Surveillance Drives U.S. Writers to Self- Censor, PEN America, November 12, 2013, 3. 178 presented their subjects with morally questionable actions Pierrick Bourrat, Nicolas Baumard, and Ryan McKay, Surveillance Cues Enhance Moral Condemnation, Evolutionary Psychology 9, no. 2 (2011): 193 99. 179 A comprehensive experiment conducted in 1975 Gregory L. White and Philip G. Zimbardo, The Chilling Effects of Surveillance: Deindividuation and Reactance, Office of Naval Research, May 1975. 180 rowdiness in Swedish soccer stadiums Mikael Priks, Do Surveillance Cameras Affect Unruly Behavior? A Close Look at Grandstands (working paper no. 2289, Center for Economic Studies of the Leibniz Institute for Economic Research [CESifo], University of Munich, April 2008). 180 public health literature on hand washing Kristen Munger and Shelby J. Harris, Effects of an Observer on Handwashing in a Public Restroom, Perceptual and Motor Skills 69 (1989): 733 34; D. M. Pedersen, S. Keithly, and K. Brady, Effects of an Observer on Conformity to Handwashing Norm, Perceptual and Motor Skills 62, no. 1 (March 1986): 169 70. 180 researchers provided subjects with tracking devices C. Mancini, Y. Rogers, K. Thomas, et al., In the Best Families: Tracking and Relationships, Proceedings of the 29th International Conference on Human Factors in Computing Systems (New York: ACM Press, 2011), 2419 28. 181 one of the most radical simulations of surveillance Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, et al., Long- Term Effects of Ubiquitous Surveillance in the Home, Proceedings of the 2012 ACM Conference on Ubiquitous Computing (New York: ACM Press, 2012), 41 50. 182 Privacy is relational Barton Gellman, Digital Privacy: If You ve Done Nothing Wrong, Do You Have Nothing to Hide?, Time, August 3, 2010. 182 Nixon s attorney general, John Mitchell, assured readers The New Line on Wiretapping, Time, July 25, 1969. 182 calls from very bad people to very bad people Eric Lichtblau and James

268 NOTES Risen, Defense Lawyers in Terror Cases Plan Challenges over Spy Efforts, New York Times, December 28, 2005. 182 Obama appeared on The To night Show President Barack Obama interview with Jay Leno, The To night Show, NBC, aired August 7, 2013. 183 Culminating in the unanimous 1969 decision Brandenburg v. Ohio, United States Supreme Court, 395 U.S. 444 (1969). 184 Those revelations led to the creation United States Senate, Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, April 26, 1976. 184 One key COINTELPRO memo explained Betty Medsger, The Burglary: The Discovery of J. Edgar Hoover s Secret FBI (New York: Alfred A. Knopf, 2014), 160. 184 In a 2013 documentary 1971, dir. Johanna Hamilton, Maximum Pictures, 2013. 185 The FBI has never shown much sensitivity to the poisonous effect Quoted in Medsger, The Burglary, 184. 185 documents obtained by the ACLU revealed Documents Shed New Light on Pentagon Surveillance of Peace Activists, American Civil Liberties Union News Release, October 12, 2006. 186 American Muslims routinely describe the effect of spying Muslim American Civil Liberties Co ali tion (MACLC), Creating Law Enforcement Accountability and Responsibility (CLEAR) Project, and Asian American Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD Spying and Its Impact on American Muslims, CLEAR Project, City University of New York Law School, March 11, 2013. 187 information about your po liti cal views, your medical history Glenn Greenwald, Ryan Gallagher, and Ryan Grim, Top- Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit Radicalizers, Huffington Post, November 26, 2013. 190 nothing remotely resembling terrorism Mark Schone, Richard Esposito, Matthew Cole, and Glenn Greenwald, War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show, NBC, February 4, 2014. 194 wrote a controversial paper in 2008 Cass R. Sunstein and Adrian

NOTES 269 Vermeule, Conspiracy Theories (Harvard University Law School Public Law and Legal Theory Research Paper Series, January 15, 2008). 195 My feeling so far is... I m not scared Lawrence O Donnell interview with Glenn Greenwald, The Last Word with Lawrence O Donnell, MSNBC, June 10, 2013. 195 Hertzberg also asserted similarly dismissive views Hendrik Hertzberg, Snoop Scoops, New Yorker, June 24, 2013. 196 my metadata almost certainly hasn t been scrutinized Ruth Marcus, Edward Snowden, the Insufferable Whistleblower, Washington Post, December 31, 2013. 197 the majority of Americans disbelieved the defenses Few See Adequate Limits on NSA Surveillance Programs, Pew Research Center for the People and the Press news release, July 26, 2013. 198 Similar polling data from the Washington Post Surveillance in America: Washington Post Poll: Government and Corporate Surveillance Draw Wide Concern, Washington Post, December 22, 2013. 198 this represented a fundamental change Orin Kerr, Liberals and Conservatives Switch Positions on NSA Surveillance, The Volokh Conspiracy (blog), December 24, 2013. 199 vehemently denounced by one senator Interview with Senator Joe Biden, The Early Show, CBS, May 12, 2006. 200 used in 1,618 drug- related cases Benjamin Wallace- Wells, Patriot Act: The Kitchen Sink Approach to National Security, New York, August 27, 2011. 201 That capability at any time could be turned around Interview with Senator Frank Church, Meet the Press, NBC, August 17, 1975. 201 the threat from state surveillance is far more dire James Bamford, The Agency That Could Be Big Brother, New York Times, December 25, 2005. 202 downplayed concerns about the NSA Hertzberg, Snoop Scoops. 202 metadata collection program almost certainly unconstitutional Greg Miller and Ellen Nakashima, Officials Defenses of NSA Phone Program May Be Unraveling, Washington Post, December 19, 2013.

270 NOTES 203 metadata program was not essential to preventing attacks Liberty and Security in a Changing World: Report and Recommendations of The President s Review Group on Intelligence and Communications Technologies, Review Group on Intelligence and Communications Technologies, December 12, 2013 (released on December 18, 2013). 203 report cut deeply into the credibility of those claims Miller and Nakashima, Officials Defenses of NSA Phone Program May Be Unraveling. 203 The usefulness of the bulk collection program Ron Wyden, Mark Udall, and Martin Heinrich, End the N.S.A Dragnet Now, New York Times, November 25, 2013. 203 A study by the centrist New America Foundation Peter Bergen, David Sterman, Emily Schneider, and Bailey Cahall, Do NSA s Bulk Surveillance Programs Stop Terrorists?, New America Foundation, January 13, 2014. 203 in most cases where plots were disrupted Ellen Nakashima, NSA Phone Record Collection Does Little to Prevent Terrorist Attacks, Group Says, Washington Post, January 12, 2014. 204 I would much rather be here today debating General Keith Alexander, testimony to House Select Intelligence Committee, June 18, 2013. 204 the CIA had multiple reports Peter Bergen, Would NSA Surveillance Have Stopped 9/11 Plot?, CNN, December 30, 2013. 204 the CIA withheld crucial intelligence Lawrence Wright, The Al Qaeda Switchboard, New Yorker, January 13, 2014. 205 obscures actual plots being discussed by actual terrorists Rush Holt, When Big Brother Meets Big Data, Huffington Post, June 27, 2013. 205 Not only is ubiquitous surveillance in effec tive Bruce Schneier, How the NSA Threatens National Security, Atlantic, January 6, 2014. 205 the balance between threat and expenditures John Mueller quoted in Kim Murphy, Is Homeland Security Spending Paying Off? Los Angeles Times, August 28, 2011. 206 More American citizens have undoubtedly died Warren P. Strobel, Terrorism in 2009, McClatchy Nukes and Spooks (blog), August 5, 2010.

NOTES 271 206 After the trouble- free Olympics Stephen M. Walt, What Terrorist Threat?, Foreign Policy, August 13, 2012. 208 you have no civil liberties if you are dead Senator Pat Roberts, remarks during Senate confirmation hearing of General Michael Hayden as CIA director, May 18, 2006. 208 a cowardly paean to the benefit of giving up rights Jonathan Allen, Civil Liberties Don t Matter Much After You re Dead, Cornyn Says on Spy Case, Hill, December 20, 2005. 208 Talk radio host Rush Limbaugh piled on Rush Limbaugh, The Rush Limbaugh Show, December 19, 2005. 209 the centrality of the inspector s situation Bentham, The Panopticon Writings, 43. CHAPTER 5: THE FOURTH ESTATE 210 introduced the possibility of a criminal investigation Noam Cohen and Leslie Kaufman, Blogger, with Focus on Surveillance, Is at Center of a Debate, New York Times, June 6, 2013. 212 There s nothing wrong with being a blogger Margaret Sullivan, Who s a Journalist?: A Question with Many Facets and One Sure Answer, New York Times, June 29, 2013. 213 taking its leak crackdown to a new level Charlie Savage, Holder Tightens Rules on Getting Reporters Data, New York Times, July 12, 2013. 213 The behavior cited by the DOJ Ann E. Marimow, Justice Department s Scrutiny of Fox News reporter James Rosen in Leak Case Draws Fire, Washington Post, May 20, 2013. 214 well inside the bounds of traditional news reporting Olivier Knox, Obama Administration Spied on Fox News Reporter James Rosen: Report, Yahoo! News, May 20, 2013. 214 obtained extensive rec ords about his phone calls Charlie Savage, U.S. Gathered Personal Data on Times Reporter in Case Against Ex- C.I.A. Agent, New York Times, February 25, 2011. 214 President Obama finds himself battling charges Martha T. Moore

272 NOTES and Aamer Madhani, Is Obama at War with Journalists?, USA Today, May 27, 2013. 214 It s a huge impediment to reporting Molly Redden, Is the Chilling Effect Real?: National- Security Reporters on the Impact of Federal Scrutiny, New Republic, May 15, 2013. 214 its first- ever report about the United States Leonard Downie Jr., The Obama Administration and the Press: Leak Investigations and Surveillance in Post- 9/11 America, Committee to Protect Journalists, October 10, 2013. 215 Obama claimed to be troubled Mark Landler, Obama, in Nod to Press, Orders Reviews of Inquiries, New York Times, May 23, 2013. 215 Holder vowed in a Senate hearing Tom McCarthy, Eric Holder: Justice Department Will Not Prosecute Reporters Doing Their Job, Guardian, June 6, 2013. 216 King confirmed to CNN s Anderson Cooper Representative Peter King interview with Anderson Cooper, Anderson Cooper 360 Degrees, CNN, June 11, 2013. 216 King later clarified on Fox News Representative Peter King interview with Megyn Kelly, America Live, Fox News, June 12, 2013. 216 A former Bush speechwriter Marc A. Thiessen, Yes, Publishing NSA Secrets Is a Crime, Washington Post, June 17, 2013. 217 Alan Dershowitz went on CNN Alan Dershowitz interview with Piers Morgan, Piers Morgan Live, CNN, June 24, 2013. 217 chorus was joined by General Michael Hayden Michael Hayden, Ex- CIA Chief: What Edward Snowden Did, CNN, July 19, 2013. 217 Cheney was able to control the message Dana Milbank, In Ex- Aide s Testimony, a Spin Through VP s PR, Washington Post, January 26, 2007. 217 To the extent that you have aided and abetted Snowden Glenn Greenwald interview with David Gregory, Meet the Press, NBC, June 23, 2013. 218 Should Glenn Greenwald be prosecuted? Reliable Sources, CNN, June 30, 2013. 219 secretly masterminded by WikiLeaks found er Julian Assange Walter Pincus, Questions for Snowden, Washington Post, July 8, 2013.

NOTES 273 219 I feel like, A, we ve screwed this up Andrew Ross Sorkin, Squawk Box, CNBC, June 24, 2013. 219 can t quite believe what David Gregory asked Glenn Greenwald Huff- Post Media, Twitter posting, June 23, 2013, 7:59 a.m., https:// twitter.com / HuffPostMedia /status /348817574101909507. 219 I was jailed by Mugabe s Zimbabwe Toby Harnden, Twitter posting, June 23, 2013, 8:33 a.m., https:// twitter.com /tobyharnden /status /348826 074043539457. 220 I regard this as regrettable Letter from Alan Grayson to Eric Holder, October 10, 2013. 221 in an obvious reference to my freelance reporting Keith Alexander, I Spy, No Lie, interview with Armed with Science: The Official U.S. Defense Department Science Blog (blog), October 24, 2013. 221 the journalists were selling stolen property Josh Gerstein, Intelligence Chairman Accuses Glenn Greenwald of Illegally Selling Stolen Material, Politico, February 4, 2014. 221 denounced me as a porno- spy Paul Calandra, statement to Canadian House of Commons, February 14, 2014. 222 a narcissistic young man Bob Schieffer, Edward Snowden Is No Hero, CBS News, June 16, 2013. 222 diagnosed him as a grandiose narcissist Jeffrey Toobin, Edward Snowden Is No Hero, New Yorker, June 10, 2013. 222 not paranoiac; he is merely narcissistic Richard Cohen, The NSA Is Doing What Google Does, Washington Post, June 10, 2013. 223 could not successfully work his way through community college David Brooks, The Solitary Leaker, New York Times, June 10, 2013. 223 a loser because he dropped out of high school Roger Simon, The Slacker Who Came In from the Cold, Politico, June 11, 2013. 223 a coward Aaron Blake, DNC Chair Debbie Wasserman Schultz: Snowden Is a Coward, Washington Post, June 11, 2013. 223 A Chinese double agent Matt Mackowiak, Twitter posting, June 9, 2013, 1:07 p.m., https://twitter.com /MattMackowiak /status /343821572114624514. 224 Two Western intelligence experts Jane Perlez and Keith Bradsher, China

274 NOTES Said to Have Made Call to Let Leaker Depart, New York Times, June 23, 2013. 224 I never gave any information to either government Glenn Greenwald, Snowden: I Never Gave Any Information to Chinese or Rus sian Governments, Guardian, July 10, 2013. 224 Margaret Sullivan criticized the Times Margaret Sullivan, How Acceptable Was Anonymous Speculation About Snowden s Laptops?, New York Times, July 11, 2013. 226 His usefulness was almost exhausted Evan Osnos, Why China Let Snowden Go, New Yorker, June 24, 2013. 226 checks into hotels under false names John F. Burns, WikiLeaks Found er on the Run, Trailed by Notoriety, New York Times, October 23, 2010. 227 disheveled, like a bag lady Bill Keller, Dealing with Assange and the WikiLeaks Secrets, New York Times, January 26, 2011. 228 leaking, whistle- blowing and hacktivism Peter Ludlow, The Banality of Systemic Evil, New York Times, September 15, 2013. 230 With regard to that specific FISA opinion Glenn Greenwald interview with David Gregory, Meet the Press, NBC, June 23, 2013. 231 sad devotion to the corporatist ideal Jack Shafer, From Tom Paine to Glenn Greenwald, We Need Partisan Journalism, Reuters, July 16, 2013. 233 woefully inadequate Byron Calame, Behind the Eavesdropping Story, a Loud Silence, New York Times, January 1, 2006. 233 Dean Baquet killed a story in 2006 Brian Ross and Vic Walter, Whistleblower Had to Fight NSA, LA Times, to Tell Story, ABC News, March 6, 2007. 233 the Times might want to take a look in the mirror Margaret Sullivan, Sources With Secrets Find New Outlets for Sharing, New York Times, June 16, 2013. 234 Are you saying that you sort of go to the government Bill Keller interview on BBC News, November 29, 2010. 234 an underappreciated phenomenon Jack Goldsmith, The Patriotism of the American Media, Lawfare (blog), February 28, 2011.

NOTES 275 235 the timidity of journalists in America Lisa O Carroll, Seymour Hersh on Obama, NSA and the Pathetic American Media, Guardian, September 27, 2013. 244 A report from Reuters confirmed Mark Hosenball, Britain Forced Guardian to Destroy Copy of Snowden Material, Reuters, August 19, 2013. 246 There was a heads- up Josh Earnest, White House Press Briefing, August 19, 2013. 246 Journalism is not terrorism Rachel Maddow, The Rachel Maddow Show, MSNBC, August 20, 2013. 246 equating David s conduct to that of a drug mule Jeffrey Toobin with Anderson Cooper, Anderson Cooper 360 Degrees, CNN, August 20, 2013. 246 The proudest moment of his career David Halberstam, speech at Columbia Journalism School, May 18, 2005. EPILOGUE 250 The week began with the dramatic opinion Spencer Ackerman and Dan Roberts, NSA Phone Surveillance Program Likely Unconstitutional, Federal Judge Rules, Guardian, December 16, 2013. 250 its 308- page report Liberty and Security in a Changing World, Review Group on Intelligence and Communications Technologies. 250 a strong message to the United States Edith M. Lederer, UN Votes to Protect Privacy in Digital Age, Associated Press, December 18, 2013. 250 The NSA problem ruined it for the Americans Alonso Soto and Brian Winter, Saab Wins Brazil Jet Deal After NSA Spying Sours Boeing Bid, Reuters, December 19, 2013. 250 declared the NSA program constitutional Adam Liptak and Michael S. Schmidt, Judge Upholds N.S.A. s Bulk Collection of Data on Calls, New York Times, December 27, 2013.