OR
Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Kindle Edition
| Price | New from | Used from |
|
Audible Audiobook, Unabridged
"Please retry" |
$0.00
| $7.95 with discounted Audible membership | |
|
MP3 CD, Audiobook, CD, MP3 Audio
"Please retry" | $11.43 | — |
- Kindle
$0.00 Read with Kindle Unlimited to also enjoy access to over 4 million more titles $11.99 to buy -
Audiobook
$0.00 Free with your 3-Month Audible trial - Hardcover
$15.5293 Used from $1.19 38 New from $5.50 8 Collectible from $10.95 - Paperback
$18.0077 Used from $2.25 29 New from $11.06 - MP3 CD
$15.417 New from $11.43
Explore your book, then jump right back to where you left off with Page Flip.
View high quality images that let you zoom in to take a closer look.
Enjoy features only possible in digital – start reading right away, carry your library with you, adjust the font, create shareable notes and highlights, and more.
Discover additional details about the events, people, and places in your book, with Wikipedia integration.
A groundbreaking look at the NSA surveillance scandal, from the reporter who broke the story, Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward Snowden
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.
Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.
- LanguageEnglish
- PublisherMetropolitan Books
- Publication dateMay 13, 2014
- File size108092 KB
Customers who read this book also read
Editorial Reviews
Excerpt. © Reprinted by permission. All rights reserved.
On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.
The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a "model of civic virtue," Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.
The email began: "The security of people’s communications is very important to me," and its stated purpose was to urge me to begin using PGP encryption so that "Cincinnatus" could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for "pretty good privacy." It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.
The program essentially wraps every email in a protective shield, which is a code composed of hundreds, or even thousands, of random numbers and case-sensitive letters. The most advanced intelligence agencies around the world—a class that certainly includes the National Security Agency—possess password-cracking software capable of one billion guesses per second. But so lengthy and random are these PGP encryption codes that even the most sophisticated software requires many years to break them. People who most fear having their communications monitored, such as intelligence operatives, spies, human rights activists, and hackers, trust this form of encryption to protect their messages.
In this email, "Cincinnatus" said he had searched everywhere for my PGP "public key," a unique code set that allows people to receive encrypted email, but could not find it. From this, he concluded that I was not using the program and told me, "That puts anyone who communicates with you at risk. I’m not arguing that every communication you are involved in be encrypted, but you should at least provide communicants with that option."
"Cincinnatus" then referenced the sex scandal of General David Petraeus, whose career-ending extramarital affair with journalist Paula Broadwell was discovered when investigators found Google emails between the two. Had Petraeus encrypted his messages before handing them over to Gmail or storing them in his drafts folder, he wrote, investigators would not have been able to read them. "Encryption matters, and it is not just for spies and philanderers." Installing encrypted email, he said, "is a critically-necessary security measure for anyone who wishes to communicate with you."
To motivate me to follow his advice, he added, "There are people out there you would like to hear from who will never be able to contact you without knowing their messages cannot be read in transit."
Then he offered to help me install the program: "If you need any help at all with this, please let me know, or alternately request help on Twitter. You have many technically-proficient followers who are willing to offer immediate assistance." He signed off: "Thank you. C."
Using encryption software was something I had long intended to do. I had been writing for years about WikiLeaks, whistle-blowers, the hacktivist collective known as Anonymous, and related topics, and had also communicated from time to time with people inside the US national security establishment. Most of them are very concerned about the security of their communications and preventing unwanted monitoring. But the program is complicated, especially for someone who had very little skill in programming and computers, like me. So it was one of those things I had never gotten around to doing.
C.’s email did not move me to action. Because I had become known for covering stories the rest of the media often ignores, I frequently hear from all sorts of people offering me a "huge story," and it usually turns out to be nothing. And at any given moment I am usually working on more stories than I can handle. So I need something concrete to make me drop what I’m doing in order to pursue a new lead. Despite the vague allusion to "people out there" I "would like to hear from," there was nothing in C.’s email that I found sufficiently enticing. I read it but did not reply.
Three days later, I heard from C. again, asking me to confirm receipt of the first email. This time I replied quickly. "I got this and am going to work on it. I don’t have a PGP code, and don’t know how to do that, but I will try to find someone who can help me."
C. replied later that day with a clear, step-by-step guide to the PGP system: Encryption for Dummies, in essence. At the end of the instructions, which I found complex and confusing, mostly due to my own ignorance, he said these were just "the barest basics. If you can’t find anyone to walk you through installation, generation, and use," he added, "please let me know. I can facilitate contact with people who understand crypto almost anywhere in the world."
This email ended with more a pointed sign-off: "Cryptographically yours, Cincinnatus."
Despite my intentions, I never created the time to work on encryption. Seven weeks went by, and my failure to do this weighed a bit on my mind. What if this person really did have an important story, one I would miss just because I failed to install a computer program? Apart from anything else, I knew encryption might be valuable in the future, even if Cincinnatus turned out to have nothing of interest.
On January 28, 2013, I emailed C. to say that I would get someone to help me with encryption and hopefully would have it done within the next day or so.
C. replied the next day: "That’s great news! If you need any further help or have questions in the future, you will always be welcome to reach out. Please accept my sincerest thanks for your support of communications privacy! Cincinnatus."
But yet again, I did nothing, consumed as I was at the time with other stories, and still unconvinced that C. had anything worthwhile to say. There was no conscious decision to do nothing. It was simply that on my always too-long list of things to take care of, installing encryption technology at the behest of this unknown person never became pressing enough for me to stop other things and focus on it.
C. and I thus found ourselves in a Catch-22. He was unwilling to tell me anything specific about what he had, or even who he was and where he worked, unless I installed encryption. But without the enticement of specifics, it was not a priority to respond to his request and take the time to install the program.
In the face of my inaction, C. stepped up his efforts. He produced a ten-minute video entitled PGP for Journalists. Using software that generates a computer voice, the video instructed me in an easy, step-by-step fashion how to install encryption software, complete with charts and visuals.
Still I did nothing. It was at that point that C., as he later told me, become frustrated. "Here am I," he thought, "ready to risk my liberty, perhaps even my life, to hand this guy thousands of Top Secret documents from the nation’s most secretive agency—a leak that will produce dozens if not hundreds of huge journalistic scoops. And he can’t even be bothered to install an encryption program."
That’s how close I came to blowing off one of the largest and most consequential national security leaks in US history.
The next I heard of any of this was ten weeks later. On April 18, I flew from my home in Rio de Janeiro to New York, where I was scheduled to give some talks on the dangers of government secrecy and civil liberties abuses done in the name of the War on Terror.
On landing at JFK Airport, I saw that I had an email message from Laura Poitras, the documentary filmmaker, which read: "Any chance you’ll be in the US this coming week? I’d love to touch base about something, though best to do in person."
I take seriously any message from Laura Poitras. One of the most focused, fearless, and independent individuals I’ve ever known, she has made film after film in the riskiest of circumstances, with no crew or the support of a news organization, just a modest budget, one camera, and her determination. At the height of the worst violence of the Iraq War, she ventured into the Sunni Triangle to make My Country, My Country, an unflinching look at life under US occupation that was nominated for an Academy award.
For her next film, The Oath, Poitras traveled to Yemen, where she spent months following two Yemeni men—Osama bin Laden’s bodyguard as well as his driver. Since then, Poitras has been working on a documentary about NSA surveillance. The three films, conceived as a trilogy about US conduct during the War on Terror, made her a constant target of harassment by government authorities every time she entered or left the country.
Through Laura, I learned a valuable lesson. By the time we first met, in 2010, she had been detained in airports by the Department of Homeland Security more than three dozen times as she entered the United States—interrogated, threatened, her materials seized, including her laptop, cameras, and notebooks. Yet she repeatedly decided not to go public with the relentless harassment, fearing that the repercussions would make her work impossible. That changed after an unusually abusive interrogation at Newark Liberty International Airport. Laura had had enough. "It’s getting worse, not better, from my being silent." She was ready for me to write about it.
The article I published in the online political magazine Salon detailing the constant interrogations to which Poitras had been subjected received substantial attention, drawing statements of support and denunciations of the harassment. The next time Poitras flew out of the United States after the article ran, there was no interrogation and she did not have her materials seized. Over the next couple of months, there was no harassment. For the first time in years, Laura was able to travel freely.
The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.
At JFK, reading Laura’s email, I replied immediately: "Actually, just got to the US this morning. . . . Where are you?" We arranged a meeting for the next day, in the lobby at my hotel in Yonkers, a Marriott, and found seats in the restaurant, At Laura’s insistence, we moved tables twice before beginning our conversation to be sure that nobody could hear us. Laura then got down to business. She had an "extremely important and sensitive matter" to discuss, she said, and security was critical.
Since I had my cell phone with me, Laura asked that I either remove the battery or leave it in my hotel room. "It sounds paranoid," she said, but the government has the capability to activate cell phones and laptops remotely as eavesdropping devices. Powering off the phone or laptop does not defeat the capability: only removing the battery does. I’d heard this before from transparency activists and hackers but tended to write it off as excess caution, but this time I took it seriously because it came from Laura. After discovering that the battery on my cell phone could not be removed, I took it back to my room, then returned to the restaurant.
Now Laura began to talk. She had received a series of anonymous emails from someone who seemed both honest and serious. He claimed to have access to some extremely secret and incriminating documents about the US government spying on its own citizens and on the rest of the world. He was determined to leak these documents to her and had specifically requested that she work with me on releasing and reporting on them. I made no connection at the time to the long-since-forgotten emails I had received from Cincinnatus months earlier. They had been parked at the back of my mind, out of view.
Laura then pulled several pages out of her purse from two of the emails sent by the anonymous leaker, and I read them at the table from start to finish. They were riveting.
The second of the emails, sent weeks after the first, began: "Still here." With regard to the question at the forefront of my mind—when would he be ready to furnish documents?—he had written, "All I can say is ‘soon.’ "
After urging her to always remove batteries from cell phones before talking about sensitive matters—or, at least, to put the phones in the freezer, where their eavesdropping capability would be impeded—the leaker told Laura that she should work with me on these documents. He then got to the crux of what he viewed as his mission:
The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man.
"He’s real," I said when I finished reading. "I can’t explain exactly why, but I just feel intuitively that this is serious, that he’s exactly who he says he is."
"So do I," Laura replied. "I have very little doubt."
Reasonably and rationally, Laura and I knew that our faith in the leaker’s veracity might have been misplaced. We had no idea who was writing to her. He could have been anyone. He could have been inventing the entire tale. This also could have been some sort of plot by the government to entrap us into collaborating with a criminal leak. Or perhaps it had come from someone who sought to damage our credibility by passing on fraudulent documents to publish.
We discussed all these possibilities. We knew that a 2008 secret report by the US Army had declared WikiLeaks an enemy of the state and proposed ways to "damage and potentially destroy" the organization. The report (ironically leaked to WikiLeaks) discussed the possibility of passing on fraudulent documents. If WikiLeaks published them as authentic, it would suffer a serious blow to its credibility.
Laura and I were aware of all the pitfalls but we discounted them, relying instead on our intuition. Something intangible yet powerful about those emails convinced us that their author was genuine. He wrote out of a belief in the dangers of government secrecy and pervasive spying; I instinctively recognized his political passion. I felt a kinship with our correspondent, with his worldview, and with the sense of urgency that was clearly consuming him.
Over the past seven years, I had been driven by the same conviction, writing almost on a daily basis about the dangerous trends in US state secrecy, radical executive power theories, detention and surveillance abuses, militarism, and the assault on civil liberties. There is a particular tone and attitude that unites journalists, activists, and readers of mine, people who are equally alarmed by these trends. It would be difficult, I reasoned, for someone who did not truly believe and feel this alarm to replicate it so accurately, with such authenticity.
In one of the last passages of Laura’s emails, her correspondent wrote that he was completing the final steps necessary to provide us with the documents. He needed another four to six weeks, and we should wait to hear from him. He assured us that we would.
Three days later, Laura and I met again, this time in Manhattan, and with another email from the anonymous leaker, in which he explained why he was willing to risk his liberty, to subject himself to the high likelihood of a very lengthy prison term, in order to disclose these documents. Now I was even more convinced: our source was for real, but as I told my partner, David Miranda, on the flight home to Brazil, I was determined to put the whole thing out of my mind. "It may not happen. He could change his mind. He could get caught." David is a person of powerful intuition, and he was weirdly certain. "It’s real. He’s real. It’s going to happen," he declared. "And it’s going to be huge."
After returning to Rio, I heard nothing for three weeks. I spent almost no time thinking about the source because all I could do was wait. Then, on May 11, I received an email from a tech expert with whom Laura and I had worked in the past. His words were cryptic but his meaning clear: "Hey Glenn, I’m following up with learning to use PGP. Do you have an address I can mail you something to help you get started next week?"
I was sure that the something he wanted to send was what I needed to begin working on the leaker’s documents. That, in turn, meant Laura had heard from our anonymous emailer and received what we had been waiting for.
The tech person then sent a package via Federal Express, scheduled to arrive in two days. I did not know what to expect: a program, or the documents themselves? For the next forty-eight hours, it was impossible to focus on anything else. But on the day of scheduled delivery, 5:30 p.m. came and went and nothing arrived. I called FedEx and was told that the package was being held in customs for "unknown reasons." Two days went by. Then five. Then a full week. Every day FedEx said the same thing—that the package was being held in customs, for reasons unknown.
I briefly entertained the suspicion that some government authority—American, Brazilian, or otherwise—was responsible for this delay because they knew something, but I held on to the far likelier explanation that it was just one of those coincidental bureaucratic annoyances.
By this point, Laura was very reluctant to discuss any of this by phone or online, so I didn’t know what exactly was in the package.
Finally, roughly ten days after the package had been sent to me, FedEx delivered it. I tore open the envelope and found two USB thumb drives, along with a typewritten note containing detailed instructions for using various computer programs designed to provide maximum security, as well as numerous passphrases to encrypted email accounts and other programs I had never heard of.
I had no idea what all this meant. I had never heard of these specific programs before, although I knew about passphrases, basically long passwords containing randomly arranged case-sensitive letters and punctuation, designed to make them difficult to crack. With Poitras deeply reluctant to talk by phone or online, I was still frustrated: finally in possession of what I was waiting for, but with no clue where it would lead me.
I was about to find out, from the best possible guide.
The day after the package arrived, during the week of May 20, Laura told me we needed to speak urgently, but only through OTR (off-the-record) chat, an encrypted instrument for talking online securely. I had used OTR previously, and managed to install the chat program, signed up for an account, and added Laura’s user name to my "buddy list." She showed up instantly.
I asked about whether I now had access to the secret documents. They would only come to me from the source, she told me, not from her. Laura then added some startling new information, that we might have to travel to Hong Kong immediately, to meet our source. Now I was baffled. What was someone with access to top secret US government documents doing in Hong Kong? I had assumed that our anonymous source was in Maryland or northern Virginia. What did Hong Kong have to do with any of this? I was willing to travel anywhere, of course, but I wanted more information about why I was going. But Laura’s inability to speak freely forced us to postpone that discussion.
She asked whether I’d be willing to travel to Hong Kong within the next few days. I wanted to be certain that this would be worthwhile, meaning: Had she obtained verification that this source was real? She cryptically replied, "Of course, I wouldn’t ask you to go to Hong Kong if I hadn’t." I assumed this meant she had received some serious documents from the source.
But she also told me about a brewing problem. The source was upset by how things had gone thus far, particularly about a new turn: the possible involvement of the Washington Post. Laura said it was critical that I speak to him directly, to assure him and placate his growing concerns.
Within an hour, the source himself emailed me.
This email came from Verax@■■■■■■■. Verax means "truth teller" in Latin. The subject line read, "Need to talk."
"I’ve been working on a major project with a mutual friend of ours," the email began, letting me know that it was he, the anonymous source, clearly referring to his contacts with Laura.
"You recently had to decline short-term travel to meet with me. You need to be involved in this story," he wrote. "Is there any way we can talk on short notice? I understand you don’t have much in the way of secure infrastructure, but I’ll work around what you have." He suggested that we speak via OTR and provided his user name.
I was uncertain what he had meant about "declining short-term travel": I had expressed confusion about why he was in Hong Kong but certainly hadn’t refused to go. I chalked that up to miscommunication and replied immediately. "I want to do everything possible to be involved in this," I told him, suggesting that we talk right away on OTR. I added his user name to my OTR buddy list and waited.
Within fifteen minutes, my computer sounded a bell-like chime, signaling that he had signed on. Slightly nervous, I clicked on his name and typed "hello." He answered, and I found myself speaking directly to someone who I assumed had, at that point, revealed a number of secret documents about US surveillance programs and who wanted to reveal more.
Right off the bat, I told him I was absolutely committed to the story. "I’m willing to do what I have to do to report this," I said. The source—whose name, place of employment, age, and all other attributes were still unknown to me—asked if I would come to Hong Kong to meet him. I did not ask why he was in Hong Kong; I wanted to avoid appearing to be fishing for information.
Indeed, from the start I decided I would let him take the lead. If he wanted me to know why he was in Hong Kong, he would tell me. And if he wanted me to know what documents he had and planned to provide me, he would tell me that, too. This passive posture was difficult for me. As a former litigator and current journalist, I’m accustomed to aggressive questioning when I want answers, and I had hundreds of things I wanted to ask.
But I assumed his situation was delicate. Whatever else was true, I knew that this person had resolved to carry out what the US government would consider a very serious crime. It was clear from how concerned he was with secure communications that discretion was vital. And, I reasoned,—since I had so little information about whom I was talking to, about his thinking, his motives and fears—that caution and restraint on my part were imperative. I did not want to scare him off, so I forced myself to let the information come to me rather than trying to grab it.
"Of course I’ll come to Hong Kong," I said, still having no idea why he was there, of all places, or why he wanted me to go there.
We spoke online that day for two hours. His first concern was what was happening with some of the NSA documents that, with his consent, Poitras had talked about to a Washington Post reporter, Barton Gellman. The documents pertained to one specific story about a program called PRISM, which allowed the NSA to collect private communications from the world’s largest Internet companies, including Facebook, Google, Yahoo!, and Skype.
Rather than report the story quickly and aggressively, the Washington Post had assembled a large team of lawyers who were making all kinds of demands and issuing all sorts of dire warnings. To the source, this signaled that the Post, handed what he believed was an unprecedented journalistic opportunity, was being driven by fear rather than conviction and determination. He was also livid that the Post had involved so many people, afraid that these discussions might jeopardize his security.
"I don’t like how this is developing," he told me. "I had wanted someone else to do this one story abut PRISM so you could focus on the broader archive, especially the mass domestic spying, but now I really want you to be the one to report this. I’ve been reading you a long time," he said, "and I know you’ll be aggressive and fearless in how you do this."
"I’m ready and eager," I told him. "Let’s decide now what I need to do."
"The first order of business is for you to get to Hong Kong," he said. He returned to that again and again: come to Hong Kong immediately.
The other significant topic we discussed in that first online conversation was his goal. I knew from the emails Laura had shown me that he felt compelled to tell the world about the massive spying apparatus the US government was secretly building. But what did he hope to achieve?
"I want to spark a worldwide debate about privacy, Internet freedom, and the dangers of state surveillance," he said. "I’m not afraid of what will happen to me. I’ve accepted that my life will likely be over from my doing this. I’m at peace with that. I know it’s the right thing to do."
He then said something startling: "I want to identify myself as the person behind these disclosures. I believe I have an obligation to explain why I’m doing this and what I hope to achieve." He told me he had written a document that he wanted to post on the Internet when he outed himself as the source, a pro-privacy, anti-surveillance manifesto for people around the world to sign, showing that there was global support for protecting privacy.
Despite the near-certain costs of outing himself—a lengthy prison term if not worse—he was, the source said again and again, "at peace" with those consequences. "I only have one fear in doing all of this," he said, which is "that people will see these documents and shrug, that they’ll say, ‘we assumed this was happening and don’t care.’ The only thing I’m worried about is that I’ll do all this to my life for nothing."
"I seriously doubt that will happen," I assured him, but I wasn’t convinced I really believed that. I knew from my years of writing about NSA abuses that it can be hard to generate serious concern about secret state surveillance: invasion of privacy and abuse of power can be viewed as abstractions, ones that are difficult to get people to care about viscerally. What’s more, the issue of surveillance is invariably complex, making it even harder to engage the public in a widespread way.
But this felt different. The media pays attention when top secret documents are leaked. And the fact that the warning was coming from someone on the inside of the national security apparatus—rather than an American Civil Liberties Union lawyer or a civil liberties advocate—surely meant that it would have added weight.
That night, I talked to David about going to Hong Kong. I was still reluctant to drop all of my work to fly to the other side of the world to meet someone I knew nothing about, not even his name, particularly since I had no real evidence that he was who he said he was. It could be a complete waste of time—or entrapment or some other weird plot.
"You should tell him that you want to see a few documents first to know that he’s serious and that this is worth it for you," David suggested.
As usual, I took his advice. When I signed on to OTR the next morning, I said I was planning to leave for Hong Kong within days but first wanted to see some documents so that I understood the types of disclosures he was prepared to make.
To do that, he told me again to install various programs. I then spent a couple of days online as the source walked me through, step by step, how to install and use each program, including, finally, PGP encryption. Knowing that I was a beginner, he exhibited great patience, literally on the level of "Click the blue button, now press OK, now go to the next screen."
I kept apologizing for my lack of proficiency, for having to take hours of his time to teach me the most basic aspects of secure communication. "No worries," he said, "most of this makes little sense. And I have a lot of free time right now."
Once the programs were all in place, I received a file containing roughly twenty-five documents: "Just a very small taste: the tip of the tip of the iceberg," he tantalizingly explained.
I un-zipped the file, saw the list of documents, and randomly clicked on one of them. At the top of the page in red letters, a code appeared: "TOP SECRET//COMINT/NOFORN/."
This meant the document had been legally designated top secret, pertained to communications intelligence (COMINT), and was not for distribution to foreign nationals, including international organizations or coalition partners (NOFORN). There it was with incontrovertible clarity: a highly confidential communication from the NSA, one of the most secretive agencies in the world’s most powerful government. Nothing of this significance had ever been leaked from the NSA, not in all the six-decade history of the agency. I now had a couple dozen such items in my possession. And the person I had spent hours chatting with over the last two days had many, many more to give me.
That first document was a training manual for NSA officials to teach analysts about new surveillance capabilities. It discussed in broad terms the type of information the analysts could query (email addresses, IP [Internet protocol] locator data, telephone numbers) and the type of data they would receive in response (email content, telephone "metadata," chat logs). Basically, I was eavesdropping on NSA officials as they instructed their analysts on how to listen in on their targets.
My heart was racing. I had to stop reading and walk around my house a few times to take in what I had just seen and calm myself enough to focus on reading the files. I went back to my laptop and randomly clicked on the next document, a top secret PowerPoint presentation, entitled "PRISM/US-984XN Overview." Each page bore the logos of nine of the largest Internet companies, including Google, Facebook, Skype, and Yahoo!.
The first slides laid out a program under which the NSA had what it called "collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube, Apple." A graph displayed the dates on which each of these companies had joined the program.
Again I became so excited, I had to stop reading.
The source also said he was sending me a large file that I would be unable to access until the time was right. I decided to set aside that cryptic though significant statement for the moment, in line with my approach of letting him decide when I got information but also because I was so excited by what I had in front of me.
From the first glimpse I’d had of just these few documents, I knew two things: I needed to get to Hong Kong right away, and I would have to have substantial institutional support to do this reporting. This meant involving the Guardian, the newspaper and online news website that I had joined as a daily columnist only nine months earlier. Now I was about to bring them in to what I knew already would be a major explosive story.
Using Skype, I called Janine Gibson, the British editor in chief of the US edition of the Guardian. My agreement with the Guardian was that I had full editorial independence, which meant that nobody could edit or even review my articles before they ran. I wrote my pieces, and then published them directly to the Internet myself. The only exceptions to this arrangement were that I would alert them if my writing could have legal consequences for the newspaper or posed an unusual journalistic quandary. That had happened very few times in the previous nine months, only once or twice, which meant that I had had very little interaction with the Guardian editors.
Obviously, if any story warranted a heads-up, it was this one. Also, I knew I would need the paper’s resources and support.
"Janine, I have a huge story," I plunged in. "I have a source who has access to what seems to be a large amount of top secret documents from the NSA. He’s given me a few already, and they’re shocking. But he says he has many, many more. For some reason, he’s in Hong Kong, I have no idea why yet, and he wants me to go there to meet him and get the rest. What he’s given me, what I just looked at, show some pretty shocking—"
Gibson interrupted. "How are you calling me?"
"By Skype."
"I don’t think we should talk about this on the phone, and definitely not by Skype," she wisely said, and she proposed that I get on a plane to New York immediately so that we could discuss the story in person.
My plan, which I told Laura, was to fly to New York, show the documents to the Guardian, get them excited about the story, and then have them send me to Hong Kong to see the source. Laura agreed to meet me in New York, and then we intended to travel together to Hong Kong.
The next day, I flew from Rio to JFK on the overnight flight, and by 9:00 a.m. the following day, Friday, May 31, I had checked in to my Manhattan hotel and then met Laura. The first thing we did was go to a store to buy a laptop that would serve as my "air gapped machine," a computer that never connected to the Internet. It is much more difficult to subject an Internet-free computer to surveillance. To monitor an air gapped computer, an intelligence service such as the NSA would have to engage in far more difficult methods, such as obtaining physical access to the computer and placing a surveillance device on the hard drive. Keeping the computer close at all times helps prevent that type of invasion. I would use this new laptop to work with materials that I didn’t want monitored, like secret NSA documents, without fear of detection.
I shoved my new computer into my backpack and walked the five Manhattan blocks with Laura to the Guardian’s Soho office.
Gibson was waiting for us when we arrived. She and I went directly into her office, where we were joined by Stuart Millar, Gibson’s deputy. Laura sat outside. Gibson didn’t know Laura, and I wanted us to be able to talk freely. I had no idea how the Guardian editors would react to what I had. I hadn’t worked with them before, certainly not on anything remotely approaching this level of gravity and importance.
After I pulled up the source’s files on my laptop, Gibson and Millar sat together at a table and read the documents, periodically muttering "wow" and "holy shit" and similar exclamations. I sat on a sofa and watched them read, observing the shock registering on their faces when the reality of what I possessed began to sink in. Each time they finished with one document, I popped up to show them the next one. Their amazement only intensified.
In addition to the two dozen or so NSA documents the source had sent, he had included the manifesto he intended to post, calling for signatures as a show of solidarity with the pro-privacy, anti-surveillance cause. The manifesto was dramatic and severe, but that was to be expected, given the dramatic and severe choices he had made, choices that would upend his life forever. It made sense to me that someone who had witnessed the shadowy construction of a ubiquitous system of state surveillance, with no oversight or checks, would be gravely alarmed by what he had seen and the dangers it posed. Of course his tone was extreme; he had been so alarmed that he had made an extraordinary decision to do something brave and far-reaching. I understood the reason for his tone, although I worried about how Gibson and Millar would react to reading the manifesto. I didn’t want them to think we were dealing with someone unstable, particularly since, having spent many hours talking to him, I knew that he was exceptionally rational and deliberative.
My fear was quickly validated. "This is going to sound crazy to some people," Gibson pronounced.
"Some people and pro-NSA media types will say it’s a bit Ted Kaczynski–ish," I agreed. "But ultimately, the documents are what matters, not him or his motives for giving them to us. And besides, anyone who does something this extreme is going to have extreme thoughts. That’s inevitable."
Along with that manifesto, Snowden had written a missive to the journalists to whom he gave his archive of documents. It sought to explain his purpose and goals and predicted how he would likely be demonized:
My sole motive is to inform the public as to that which is done in their name and that which is done against them. The U.S. government, in conspiracy with client states, chiefest among them the Five Eyes—the United Kingdom, Canada, Australia, and New Zealand—have inflicted upon the world a system of secret, pervasive surveillance from which there is no refuge. They protect their domestic systems from the oversight of citizenry through classification and lies, and shield themselves from outrage in the event of leaks by overemphasizing limited protections they choose to grant the governed. . . .
The enclosed documents are real and original, and are offered to provide an understanding of how the global, passive surveillance system works so that protections against it may be developed. On the day of this writing, all new communications records that can be ingested and catalogued by this system are intended to be held for [] years, and new "Massive Data Repositories" (or euphemistically "Mission" Data Repositories) are being built and deployed worldwide, with the largest at the new data center in Utah. While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography.
I instantly recognized the last sentence as a play on a Thomas Jefferson quote from 1798 that I often cited in my writing: "In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution."
After reviewing all of the documents, including Snowden’s missive, Gibson and Millar were persuaded. "Basically," Gibson concluded within two hours of my arrival that morning, "you need to go to Hong Kong as soon as possible, like tomorrow, right?"
The Guardian was on board. My mission in New York had been accomplished. Now I knew that Gibson was committed to pursuing the story aggressively, at least for the moment. That afternoon, Laura and I worked with the Guardian’s travel person to get to Hong Kong as quickly as possible. The best option was a sixteen-hour non-stop flight on Cathay Pacific that left from JFK the next morning. But just as we began to celebrate our imminent meeting with the source, we ran into a complication.
At the end of the day, Gibson declared that she wanted to involve a longtime Guardian reporter, Ewen MacAskill, who had been at the paper for twenty years. "He’s a great journalist," she said. Given the magnitude of what I was embarking on, I knew that I’d need other Guardian reporters on the story and had no objection in theory. "I’d like Ewen to go with you to Hong Kong," she added.
I didn’t know MacAskill. More important, neither did the source, and as far as he knew, only Laura and I were coming to Hong Kong. And Laura, who plans everything meticulously, was also bound to be furious at this sudden change in our plans.
I was right. "No way. Absolutely not," she responded. "We can’t just add some new person at the last minute. And I don’t know him at all. Who has vetted him?"
I tried to explain what I thought was Gibson’s motive. I didn’t really know or trust theGuardian yet, not when it came to such a huge story, and I assumed they felt the same way about me. Given how much the Guardian had at stake, I reasoned that they likely wanted someone they knew very well—a longtime company man—to tell them what was going on with the source and to assure them that this story was something they should do. Besides, Gibson would need the full support and approval of the Guardian editors in London, who knew me even less well than she did. She probably wanted to bring in someone who could make London feel safe, and Ewen fit that bill perfectly.
"I don’t care," Laura said. "Traveling with some third person, some stranger, could attract surveillance or scare the source." As a compromise, Laura suggested that they send Ewen after a few days, once we had established contact with the source in Hong Kong and built trust. "You have all the leverage. Tell them they can’t send Ewen until we’re ready."
I went back to Gibson with what seemed like a smart compromise, but she was determined. "Ewen can travel with you to Hong Kong, but he won’t meet the source until you and Laura both say you’re ready."
Clearly, Ewen coming with us to Hong Kong was crucial to the Guardian. Gibson would need assurances about what was happening there and a way to assuage any worries her bosses in London might have. But Laura was just as adamant that we would travel alone. "If the source surveils us at the airport and sees this unexpected third person he doesn’t know, he’ll freak out and terminate contact. No way." Like a State Department diplomat shuttling between Middle East adversaries in the futile hope of brokering a deal, I went back to Gibson, who gave a vague reply designed to signal that Ewen would follow a couple of days later. Or maybe that’s what I wanted to hear.
Either way, I learned from the travel person late that night that Ewen’s ticket had been bought—for the next day, on the same flight. And they were sending him on that plane no matter what.
In the car on the way to the airport, Laura and I had our first and only argument. I gave her the news as soon as the car pulled out of the hotel and she exploded with anger. I was jeopardizing the entire arrangement, she insisted. It was unconscionable to bring some stranger in at this late stage. She didn’t trust someone who hadn’t been vetted for work on something so sensitive and she blamed me for letting the Guardian risk our plan.
I couldn’t tell Laura that her concerns were invalid, but I did try to convince her that the Guardian was insistent, there was no choice. And Ewen would only meet the source when we were ready.
Laura didn’t care. To placate her anger, I even offered not to go, a suggestion she instantly rejected. We sat in miserable, angry silence for ten minutes as the car was stuck in traffic on the way to JFK.
I knew Laura was right: it shouldn’t have happened this way, and I broke the silence by telling her so. I then proposed that we ignore Ewen and freeze him out, pretend that he’s not with us. "We’re on the same side," I appealed to Laura. "Let’s not fight. Given what’s at stake, this won’t be the last time that things happen beyond our control." I tried to persuade Laura that we should keep our focus on working together to overcome obstacles. In a short time, we returned to a state of calm.
As we arrived in the vicinity of JFK Airport, Laura pulled a thumb drive out of her backpack. "Guess what this is?" she asked with a look of intense seriousness.
"What?"
"The documents," she said. "All of them."
Ewen was already at our gate when we arrived. Laura and I were cordial but cold, ensuring that he felt excluded, that he had no role until we were ready to give him one. He was the only present target for our irritation, so we treated him like extra baggage with which we had been saddled. It was unfair, but I was too distracted by the prospect of the treasures on Laura’s thumb drive and the significance of what we were doing to give much more thought to Ewen.
Laura had given me a five-minute tutorial on the secure computer system in the car and said she intended to sleep on the plane. She handed over the thumb drive and suggested that I start looking at her set of documents. Once we arrived in Hong Kong, she said, the source would ensure I had full access to my own complete set.
After the plane took off, I pulled out my new air gapped computer, inserted Laura’s thumb drive, and followed her instructions for loading the files.
For the next sixteen hours, despite my exhaustion, I did nothing but read, feverishly taking notes on document after document. Many of the files were as powerful and shocking as that initial PRISM PowerPoint presentation I had seen back in Rio. A lot of them were worse.
One of the first I read was an order from the secret Foreign Intelligence Surveillance Act (FISA) court, which had been created by Congress in 1978, after the Church Committee discovered decades of abusive government eavesdropping. The idea behind its formation was that the government could continue to engage in electronic surveillance, but to prevent similar abuse, it had to obtain permission from the FISA court before doing so. I had never seen a FISA court order before. Almost nobody had. The court is one of the most secretive institutions in the government. All of its rulings are automatically designated top secret, and only a small handful of people are authorized to access its decisions.
The ruling I read on the plane to Hong Kong was amazing for several reasons. It ordered Verizon Business to turn over to the NSA "all call detail records" for "communications (i) between the United States and abroad; and (ii) wholly within the United States, including local telephone calls." That meant the NSA was secretly and indiscriminately collecting the telephone records of tens of millions of Americans, at least. Virtually nobody had any idea that the Obama administration was doing any such thing. Now, with this ruling, I not only knew about it but had the secret court order as proof.
Moreover, the court order specified that the bulk collection of American telephone records was authorized by Section 215 of the Patriot Act. Almost more than the ruling itself, this radical interpretation of the Patriot Act was especially shocking.
What made the Patriot Act so controversial when it was enacted in the wake of the 9/11 attack was that Section 215 lowered the standard the government needed to meet in order to obtain "business records," from "probable cause" to "relevance." This meant that the Federal Bureau of Investigation, in order to obtain highly sensitive and invasive documents—such as medical histories, banking transactions, or phone records—needed to demonstrate only that those documents were "relevant" to a pending investigation.
But nobody—not even the hawkish Republican House members who authored the Patriot Act back in 2001 or the most devoted civil liberties advocates who depicted the bill in the most menacing light—thought that the law empowered the US government to collect records on everyone, in bulk and indiscriminately. Yet that’s exactly what this secret FISA court order, open on my laptop as I flew to Hong Kong, had concluded when instructing Verizon to turn over to the NSA all phone records for all of its American customers.
For two years Democratic senators Ron Wyden of Oregon and Mark Udall of New Mexico had been going around the country warning that Americans would be "stunned to learn" of the "secret interpretations of law" the Obama administration was using to vest itself with vast, unknown spying powers. But because these spying activities and "secret interpretations" were classified, the two senators, who were members of the Senate Intelligence Committee, had stopped short of disclosing to the public what they found so menacing, despite the legal shield of immunity granted to members of Congress by the Constitution to make such disclosures had they chosen to.
I knew as soon as I saw the FISA court order that this was at least part of the abusive and radical surveillance programs Wyden and Udall had tried to warn the country about. I instantly recognized the order’s significance. I could barely wait to publish it, sure that its exposure would trigger an earthquake, and that calls for transparency and accountability were sure to follow. And this was just one of hundreds of top secret documents I read on my way to Hong Kong.
Yet again, I felt my perspective shift on the significance of the source’s actions. This had already happened three times before: when I first saw the emails Laura had received, then again when I began speaking to the source, and yet again when I’d read the two dozen documents he sent by email. Only now did I feel that I was truly beginning to process the true magnitude of the leak.
On several occasions on the flight, Laura came over to the row where I was sitting, which faced the bulkhead of the plane. As soon as I saw her, I would pop up out of my seat and we’d stand in the open space of the bulkhead, speechless, overwhelmed, stunned by what we had.
Laura had been working for years on the subject of NSA surveillance, herself repeatedly subjected to its abuses. I had been writing about the threat posed by unconstrained domestic surveillance going back to 2006, when I published my first book, warning of the lawlessness and radicalism of the NSA. With this work, both of us had struggled against the great wall of secrecy shielding government spying: How do you document the actions of an agency so completely shrouded in multiple layers of official secrecy? At this moment, we had breached that wall. We had in our possession, on the plane, thousands of documents that the government had desperately tried to hide. We had evidence that would indisputably prove all that the government had done to destroy the privacy of Americans and people around the world.
As I continued reading, two things struck me about the archive. The first was how extraordinarily well organized it was. The source had created countless folders and then sub-folders and sub-sub-folders. Every last document had been placed exactly where it belonged. I never found a single misplaced or misfiled document.
I had spent years defending what I view as the heroic acts of Chelsea (then Bradley) Manning, the army private and whistle-blower who became so horrified at the behavior of the US government—its war crimes and other systematic deceit—that she risked her liberty to disclose classified documents to the world through WikiLeaks. But Manning was criticized (unfairly and inaccurately, I believe) for supposedly leaking documents that she had not first reviewed—in contrast to Daniel Ellsberg, the critics speculated. This argument, baseless though it was (Ellsberg was one of Manning’s most devoted defenders, and it seemed clear that Manning had at least surveyed the documents), was frequently used to undermine the notion that Manning’s actions were heroic.
It was clear that nothing of the sort could be said about our NSA source. There was no question that he had carefully reviewed every document he had given us, that he had understood their meaning, then meticulously placed each one in an elegantly organized structure.
The other striking facet of the archive was the extent of government lying it revealed, evidence of which the source had prominently flagged. He had titled one of his first folders "BOUNDLESS INFORMANT (NSA lied to Congress)." This folder contained dozens of documents showing elaborate statistics maintained by the NSA on how many calls and emails the agency intercepts. It also contained proof that the NSA had been collecting telephone and email data about millions of Americans every day. BOUNDLESS INFORMANT was the name of the NSA program designed to quantify the agency’s daily surveillance activities with mathematical exactitude. One map in the file showed that for a thirty-day period ending in February 2013, one unit of the NSA collected more than three billion pieces of communication data from US communication systems alone.
The source had given us clear proof that NSA officials had lied to Congress, directly and repeatedly, about the agency’s activities. For years, various senators had asked the NSA for a rough estimate of how many Americans were having their calls and emails intercepted. The officials insisted they were unable to answer because they did not and could not maintain such data: the very data extensively reflected in the "BOUNDLESS INFORMANT" documents.
Even more significant, the files—along with the Verizon document—proved that the Obama administration’s senior national security official, Director of National Intelligence James Clapper, lied to Congress when, on March 12, 2013, he was asked by Senator Ron Wyden: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"
Clapper’s reply was as succinct as it was dishonest: "No, sir."
In sixteen hours of barely interrupted reading, I managed to get through only a small fraction of the archive. But as the plane landed in Hong Kong, I knew two things for certain. First, the source was highly sophisticated and politically astute, evident in his recognition of the significance of most of the documents. He was also highly rational. The way he chose, analyzed, and described the thousands of documents I now had in my possession proved that. Second, it would be very difficult to deny his status as a classic whistle-blower. If disclosing proof that top-level national security officials lied outright to Congress about domestic spying programs doesn’t make one indisputably a whistle-blower, then what does?
I knew that the harder it would be for the government and its allies to demonize the source, the more powerful the effect of the source’s disclosures would be. The two most favored lines of whistle-blower demonization—"he’s unstable" and "he’s naive"—were not going to work here.
Shortly before landing, I read one final file. Although it was entitled "README_FIRST," I saw it for the first time only at the very end of the flight. This document was another explanation from the source for why he had chosen to do what he did and what he expected to happen as a result, and it was similar in tone and content to the manifesto I had shown the Guardian editors.
But this document had facts the others did not. It included the source’s name—the first time I learned it—along with clear predictions for what would likely be done to him once he identified himself. Referring to events that proceeded from the 2005 NSA scandal, the note ended this way:
Many will malign me for failing to engage in national relativism, to look away from [my] society’s problems toward distant, external evils for which we hold neither authority nor responsibility, but citizenship carries with it a duty to first police one’s own government before seeking to correct others. Here, now, at home, we suffer a government that only grudgingly allows limited oversight, and refuses accountability when crimes are committed. When marginalized youths commit minor infractions, we as a society turn a blind eye as they suffer insufferable consequences in the world’s largest prison system, yet when the richest and most powerful telecommunications providers in the country knowingly commit tens of millions of felonies, Congress passes our nation’s first law providing their elite friends with full retroactive immunity—civil and criminal—for crimes that would have merited the longest sentences in [] history.
These companies . . . have the best lawyers in the country on their staff and they do not suffer even the slightest consequences. When officials at the highest levels of power, to specifically include the Vice President, are found on investigation to have personally directed such a criminal enterprise, what should happen? If you believe that investigation should be stopped, its results classified above-top-secret in a special "Exceptionally Controlled Information" compartment called STLW (STELLARWIND), any future investigations ruled out on the principle that holding those who abuse power to account is against the national interest, that we must "look forward, not backward," and rather than closing the illegal program you would expand it with even more authorities, you will be welcome in the halls of America’s power, for that is what came to be, and I am releasing the documents that prove it.
I understand that I will be made to suffer for my actions, and that the return of this information to the public marks my end. I will be satisfied if the federation of secret law, unequal pardon, and irresistible executive powers that rule the world that I love are revealed for even an instant. If you seek to help, join the open source community and fight to keep the spirit of the press alive and the internet free. I have been to the darkest corners of government, and what they fear is light.
Edward Joseph Snowden, SSN: ■■■■■
CIA Alias "■■■■■"
Agency Identification Number: ■■■■■
Former Senior Advisor | United States National Security Agency, under corporate cover
Former Field Officer | United States Central Intelligence Agency, under diplomatic cover
Former Lecturer | United States Defense Intelligence Agency, under corporate cover
Copyright © 2014 by Glenn Greenwald
Amazon.com Review
An Amazon Best Book of the Month, May 2014: In May of 2013, Edward Snowden, a young systems administrator contracting for the National Security Agency, fled the United States for Hong Kong, carrying with him thousands of classified documents outlining the staggering capabilities of the NSA.’s surveillance programs--including those designed to collect information within the U.S. There Snowden arranged a meeting with Guardian columnist Glenn Greenwald, and so began the most explosive leak of classified material since the Pentagon Papers, over 40 years ago. No Place to Hide opens with Greenwald’s tense account of his initial cloak-and-dagger encounters with Snowden, then transitions into descriptions of the NSA’s vast information-collection apparatus, including a selection of the “Snowden files” with commentary on the alphabet soup of agencies and code names. And--in typical Greenwald style--the book is packed with his opinions on government snooping, its legality, and the impacts on our Constitutional freedoms. Whether you consider Snowden a whistleblower crying foul on government overreach, or a self-aggrandizing traitor who put national security at risk, Greenwald’s book is thrilling and enlightening, a bellwether moment in a crucial debate. --Jon Foro
--This text refers to an out of print or unavailable edition of this title.About the Author
Review
“Impassioned . . . gripping . . . Greenwald amplifies our understanding of the N.S.A.'s sweeping ambitions . . . and delivers a fierce argument in defense of the right of privacy.” ―Michiko Kakutani, The New York Times
“Rings with authority . . . vital for anyone interested in civil liberties . . . this book is an antidote to the common public perception that government spooks are only interested in ‘bad' people.” ―Chicago Tribune
“Incisive, slashing . . . Greenwald's pugilistic skills are on full display . . . If you want to get a handle on what was at stake when Snowden downloaded the government's most precious secrets onto a thumb drive, this book is your primer.” ―Slate
“Provides an excellent overview of the NSA's still-classified activities and lack of legal controls, putting the pieces together in a way that daily journalism cannot.” ―The Economist
“A vital discussion on Snowden's revelations.” ―Los Angeles Times
“Reads like a thriller . . . With heart-pounding suspense, John le Carre-like intrigue and Jeffersonian fidelity to the principles of human freedom . . . No Place to Hide is also a morality tale about the personal courage required of Snowden and Greenwald and his colleagues to expose government wrongdoing and the risk to their lives, liberties and properties in doing so.” ―Judge Andrew P. Napolitano, FOX News
“Shocking . . . It is hard to argue with Greenwald's contention that ‘the NSA is the definitive rogue agency.'” ―The Christian Science Monitor
“A fascinating read that adds much to the debate on national security and privacy.” ―Los Angeles Review of Books
“Pulse-pounding.” ―Wired
“A smart, impassioned indictment of what Greenwald calls ‘fear-driven, obsequious journalism.'” ―San Francisco Chronicle
“A compelling narrative that puts the most explosive revelations about official criminality into vital context . . . The book ends with a beautiful, barn-burning coda in which Greenwald sets out his case for a society free from surveillance. It reads like the transcript of a particularly memorable speech--an ‘I have a dream' speech; a ‘Blood, sweat, toil and tears' speech. . . . It's a speech I hope to hear Greenwald deliver himself someday.” ―Cory Doctorow, Boing Boing
“Eloquent . . . powerful . . . Greenwald makes a persuasive case that this is a battle that has engulfed us all, and one that has not yet ended” ―VICE
Product details
- ASIN : B00E0CZX0G
- Publisher : Metropolitan Books; 0 edition (May 13, 2014)
- Publication date : May 13, 2014
- Language : English
- File size : 108092 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Enabled
- Word Wise : Enabled
- Sticky notes : On Kindle Scribe
- Print length : 302 pages
- Best Sellers Rank: #199,855 in Kindle Store (See Top 100 in Kindle Store)
- Customer Reviews:
About the author

Glenn Greenwald is the author of several bestsellers, including How Would a Patriot Act? and With Liberty and Justice for Some. His most recent book is No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Acclaimed as one of the 25 most influential political commentators by The Atlantic, one of America's top 10 opinion writers by Newsweek, and one of the Top 100 Global Thinkers for 2013 by Foreign Policy, Greenwald is a former constitutional law and civil rights litigator. He was a columnist for The Guardian until October 2013 and is now a founding editor of a new media outlet, The Intercept. He is a frequent guest on CNN, MSNBC, and various other television and radio outlets. He has won numerous awards for his NSA reporting, including the 2013 Polk Award for national security reporting, the top 2013 investigative journalism award from the Online News Association, the Esso Award for Excellence in Reporting (the Brazilian equivalent of the Pulitzer Prize), and the 2013 Pioneer Award from Electronic Frontier Foundation. He also received the first annual I. F. Stone Award for Independent Journalism in 2009 and a 2010 Online Journalism Award for his investigative work on the arrest and detention of Chelsea Manning. In 2013, Greenwald led the Guardian reporting that was awarded the Pulitzer Prize for public service.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Glenn Greenwald spends the last third of his excellent new book, No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, exposing the mentality and function of pseudo-journalists like David Gregory who are in fact better understood as courtiers to power. So it was kind of Michael Kinsley to offer himself up today as living proof of Greenwald's arguments.
In a New York Times book review, Kinsley says:
"The question is who decides [what to publish]. It seems clear, at least to me, that the private companies that own newspapers, and their employees, should not have the final say over the release of government secrets, and a free pass to make them public with no legal consequences. In a democracy (which, pace Greenwald, we still are), that decision must ultimately be made by the government."
Pause for a moment to let that sink in. How can the government have ultimate decision-making power consistent with the First Amendment with regard to the publication of leaks? As Kinsley himself goes on to say, "You can't square this circle." Indeed. Unless you believe the government should be able to impose prior restraint on the publication of anything it deems secret. Unless you want to argue that the Constitution should be amended accordingly. Unless you believe the government should have been able to prevent the publication of, say, the Pentagon Papers (it certainly tried).
By the way, that "in a democracy (which, pace Greenwald, we still are)" is worth pausing to consider. Not just for the pretentious use of pace, which I admit is amusing, but more for the childlike notion that America is a democracy and there's nothing more to be said about it. It's almost like Kinsley has never heard of gerrymandering, or doesn't understand that when voters are no longer choosing their politicians and politicians are now choosing their voters, democracy isn't what's at work. It's almost like he's never heard of former IMF Chief Economist Simon Johnson's argument that modern America is best understood as an oligarchy (pro tip for Kinsley: oligarchies and democracies are not the same thing). It's almost like he's never even heard of Noam Chomsky (more on whom below -- for now, suffice to say that Chomsky is great at explaining people like Kinsley, who are simultaneously sophisticated about irrelevancies and simple-minded about fundamentals).
Anyway, never fear, "No doubt the government will usually be overprotective of its secrets, and so the process of decision-making -- whatever it turns out to be -- should openly tilt in favor of publication with minimal delay."
"Whatever it turns out to be"? Kinsley has already explained the "decision must ultimately be made by the government." By comparison, does it really matter what specific mechanism the government then decides on? This is a lot like conceding that the government should have the power to execute American citizens without any recognizable due process, then confining the argument merely to mechanics (Terror Tuesdays, anyone? Due Process just means there is a process that you do?). In both cases, the government's arguments and those of its media flunkies are indistinguishable.
(Again, see Chomsky below on the propagandistic technique of narrowing the range of acceptable debate, and then permitting vigorous discussion only within that narrow range.)
And here's a bit of the current reality of what Kinsley breezily refers to as a government "usually overprotective of its secrets." Secrecy metastasis would be a far better way of describing what's going on in America, where the government knows more and more about the citizenry and the citizenry knows less and less about the government (otherwise known as "Kinsleyan Democracy").
By the way, if we were to implement the Kinsleyan notion that the government be vested with ultimate decision-making authority with regard to the publication of any information the government itself has stamped secret, what do you think would be the impact on secrecy metastasis? Do you think there would be less secrecy? Or even more secrecy abuse?
Ah, forget I said it. Silly question. It's not like the government has any history at all of using secrecy to cover up incompetence, corruption, and criminality.
Kinsley is a guy who's spent his adult life as a journalist -- or at least pretending to be one -- and it's as though he has no notion at all of George Orwell's pithy definition: "Journalism is printing what someone else does not want printed: everything else is public relations." Now, if Kinsley wants to cede his journalistic autonomy to the government (I think Matt Taibbi would have said "journalistic balls," but there is only one Taibbi. I'm halfway through his new book, The Divide: American Injustice in the Age of the Wealth Gap, another study of Kinsleyan Democracy, and it is awesome), that's fine. Kinsley pretty clearly prefers the role of servile government flack to that of independent journalist. But would it really be healthy for the republic if all people calling themselves journalists were in fact doing government PR work? Surely we have enough of that already?
There are so many other unintentional instances of Kinsley's status as an exemplar of regulatory capture, of his own person functioning as elegant proof of Greenwald's arguments. He calls Greenwald "the go-between for Edward Snowden and the newspapers that reported on Snowden's collection of classified documents." I'm guessing he settled on "go-between" because James Clapper had already used "accomplice"...?
Also, did you know that Greenwald is a "self-righteous sourpuss" (my God, who still uses this word? People who like to say "pace," I guess). Or maybe you didn't care? I get so tired of these astonishingly shallow critiques. How much you might want to disguise your disgust with the Kinsleys of the world is primarily a tactical question, and different people will arrive at different conclusions. But if you're not disgusted, if you're not in fact outraged, by the government criminality and journalistic complicity Greenwald chronicles in No Place to Hide, then at best you're not paying attention. Criticizing the demeanor of someone uninterested in concealing his disgust reveals a warped set of priorities and a pernicious set of allegiances.
As for substance, for all his flamboyant displays of largely irrelevant erudition (Henry James, Michael Frayn, Herbert Marcuse... bingo! And this guy calls Assange a narcissist?), Kinsley comes across most fundamentally as... a simpleton:
"Greenwald doesn't seem to realize that every piece of evidence he musters demonstrating that people agree with him undermines his own argument that 'the authorities' brook no dissent. No one is stopping people from criticizing the government or supporting Greenwald in any way. Nobody is preventing the nation's leading newspaper from publishing a regular column in its own pages dissenting from company or government orthodoxy. If a majority of citizens now agree with Greenwald that dissent is being crushed in this country, and will say so openly to a stranger who rings their doorbell or their phone and says she's a pollster, how can anyone say that dissent is being crushed? What kind of poor excuse for an authoritarian society are we building in which a Glenn Greenwald, proud enemy of conformity and government oppression, can freely promote this book in all media and sell thousands of copies at airport bookstores surrounded by Homeland Security officers?"
There are several problems with this bit of self-indulgence.
First, Greenwald never argues that the authorities (and why the scare quotes? Kinsley's the one who wants the government to be able to enforce total secrecy. If that's not "the authorities," what is?), "brook no dissent." This is just a straw man, the kind of fake argument people trot out when they can't respond to the real one, or when the voices in their heads get so loud they can no longer hear the actual conversation. Greenwald never argues that there is no dissent in America or that the First Amendment Kinsley is so keen to abridge is doing nothing to protect free speech. His argument is more akin to what Noam Chomsky has said about propaganda:
"One of the ways you control what people think is by creating the illusion that there's a debate going on, but making sure that that debate stays within very narrow margins. Namely, you have to make sure that both sides in the debate accept certain assumptions, and those assumptions turn out to be the propaganda system. As long as everyone accepts the propaganda system, then you can have a debate."
Chomsky also had this to say. See if you can recognize Kinsley in here:
"Propaganda very often works better for the educated than it does for the uneducated. This is true on many issues. There are a lot of reasons for this, one being that the educated receive more of the propaganda because they read more. Another thing is that they are the agents of propaganda. After all, their job is that of commissars; they're supposed to be the agents of the propaganda system so they believe it. It's very hard to say something unless you believe it. Other reasons are that, by and large, they are just part of the privileged elite so they share their interests and perceptions."
And here's how Kinsley misinterprets the section on David Gregory's infamous Meet the Press "To the extent that you have aided and abetted Snowden... why shouldn't you, Mr. Greenwald, be charged with a crime?" question:
"But Greenwald does not deny that he has 'aided and abetted Snowden.' So this particular question was not baseless. Furthermore, it was a question, not an assertion -- a perfectly reasonable question that many people were asking, and Gregory was giving Greenwald a chance to answer it: If the leaker can go to prison, why should the leakee be exempt?"
As Greenwald notes in the book, Gregory's "perfectly reasonable question" was in fact a rare textbook instance of "When did you stop beating your wife?" Someone with Kinsley's ostentatious learning ought to know that such a loaded question is by design impossible to answer. It can only be responded to via an attack on the question's false premises, which is what Greenwald did in that interview and then again in the book. Kinsley ignores all this and tries to argue instead that, "A-ha, Greenwald does not deny beating his wife, you see?" Which is as asinine as it is dishonest.
"Greenwald's determination to misinterpret the evidence can be comic. He writes about attending a bat mitzvah ceremony where the rabbi told the young woman that 'you are never alone' because God is always watching over you. 'The rabbi's point was clear,' Greenwald amplifies. 'If you can never evade the watchful eyes of a supreme authority, there is no choice but to follow the dictates that authority imposes.' I don't think that was the rabbi's point."
I'm sure it wasn't -- it was merely the rabbi's unavoidable implication. Similarly, though the de facto end of the First Amendment's guarantee of a free press, and the advent of a new system of prior restraint, might not have been Kinsley's point, it's certainly his unavoidable implication. You'd think a guy who tosses around references to James and Frayn and Marcuse and all that would understand the difference. That he doesn't isn't comic at all. It's sad.
"As the news media struggles to expose government secrets and the government struggles to keep them secret, there is no invisible hand to assure that the right balance is struck."
Well, there kind of is, though it takes an actual journalist to describe it. Here's Washington Post go-between -- sorry, reporter -- Barton Gellman explaining how he handles classified information in reporting on war and weapons. If you follow only one link in this post, make it this one -- it's that thoughtful, thought-provoking, and nuanced. I doubt Kinsley could understand it, but most people will find it illuminating.
"So what do we do about leaks of government information? Lock up the perpetrators or give them the Pulitzer Prize? (The Pulitzer people chose the second option.)"
Yes, clearly these are the only two options.
I know I'm being hard on Kinsley, but... is he dishonest? Or is he really this simple-minded?
"This is not a straightforward or easy question."
Pause for a moment to gaze in wonder at a guy who self-identifies as a journalist... and who just said that whether to lock up a journalist for publishing something the government wanted kept secret is not a straightforward or easy question.
"But I can't see how we can have a policy that authorizes newspapers and reporters to chase down and publish any national security leaks they can find."
It's technically correct to say we can't have such a policy -- just as we can't have a policy that the people's right to keep and bear arms shall not be infringed; or a policy that the people will be secure in their persons, houses, papers, and effects against unreasonable searches and seizures; or a policy that no person shall be deprived of life, liberty, or property, without due process of law. Because these things are not "policies." They are constitutional guarantees -- explicit carve-outs from the broad powers we the people have otherwise granted the government. What we really can't have -- literally can't, because of the Bill of Rights -- are policies against those things. Like the policies Kinsley advocates.
Kinsley claims that "Especially in the age of blogs, it is impossible to distinguish between a professional journalist and anyone else who wants to publish his or her thoughts."
Really? I think a good working test of whether someone is a journalist, professional or otherwise, is whether he or she agrees with Kinsley. Because if you believe the government should have ultimate decision-making authority over what leaks to publish, you might be many things. But a real journalist isn't one of them.
Reviewer
Today I saw an article on the website of Investigative Reporters and Editors. The headline asks: Should law enforcement tell the public about new surveillance tech?
I didn't bother to read the article because my journalist's education makes the content plain enough. Other Americans may remember a time (as I do) when the proper response to such a question was "What the hell kind of a question is that? Are you stupid or just plain crazy?"
Too bad: many Americans no longer think that way. Our vaunted 'Land of the Free' is presently peopled by a lot of paranoid wimps who depend on government to protect them from any person, any thing, and any idea that might possibly scare them for any conceivable reason.
Government, naturally, gives them what they ask for (We live in a democracy, right?) while it dreams up more 'scary' things from which to protect them. In short, many Americans think blanket surveillance is a Good Thing - until comes the day (soon, I hope) when they find themselves strapped down on a waterboard because secret police saw them speaking with or reading a book written by someone Big Sam doesn't like.
Luckily, there are still some Americans who don't believe blanket surveillance is a Good Thing. They don't believe government has any right to listen to our phone calls, record our emails, snoop in our medicine chests, send murder squads into our homes, or poke its nose into our body cavities at airports.
Noting some disparity between those who like and those who don't like surveillance, an enterprising journalist named Glenn Greenwald has written a book he calls 'No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State'. Greenwald's book could reunite Americans - those who like being watched and those who don't - because it will scare the livin' crap out of everybody who reads it.
Mr. Greenwald is what I call a good writer, by which I mean that 'No Place to Hide' is well-organized, and the author's prose is an easy read for being both coherent and lively.
Greenwald's 'Introduction' tells how he got interested in surveillance: He once made a career of civil rights and constitutional law. He took up journalism (political blogging) in the first few years of this century, when, as a lawyer, he grew more and more aware that our country was being run by a lot of dangerous cranks. Shortly after Greenwald took up blogging, the 'New York Times' reported that President Bush II secretly ordered warrantless, blanket surveillance of Americans' electronic communications.
That's how and why, for the next few years, Mr. Greenwald got a living reporting dirt on the Bushmen. As Heaven and the world both now know, the Bushmen had no dearth of dirt on which to report. Of course, Greenwald's criticism of government and especially the Bushmen put him in the way of counterattacks by government, by the Bushmen, and by the many human and institutional actors within journalism who defended the Bushmen and their vicious, idiotic policy initiatives.
Greenwald knew he was making enemies. But little did he realize that his treatment of government-by-perfidious cranks and his disdain of mainstream journalism would bring him a reward - a scoop - as big or bigger than any journalist probably ever hoped for or thought possible.
Speaking now of 'No Place to Hide' (NPTH), Chapter 1 is titled 'Contact.' There, Greenwald tells how he was first contacted by Edward Snowden, a person of whom neither Greenwald nor anybody else had heard at the time.
Snowden acted anonymously when first approaching Greenwald. He assumed the (to me) laughably melodramatic moniker, 'Cincinnatus.' Too bad: Greenwald had never heard of 'Cincinnatus,' either.
When Greenwald found the first 'Cincinnatus' message in his email inbox, he ignored it. Over the next few weeks he ignored several more, believing they came from some kind of a nut. So it was through a third party - journalist and documentary filmmaker Laura Poitrus - that Greenwald and Snowden finally started 'talking' via encrypted email. The rest of the chapter tells how the three of them finally found their way onto the same page and agreed to meet in Hong Kong, there to deal in smoking-hot, national-security documents.
Chapter 2, 'Ten Days in Hong Kong,' tells Greenwad's version of what went on in Hong Kong, tells of how well and how carefully Snowden had organized and stored and closely kept the many tens of thousands of electronic documents.
No sooner did they get the documents (all on thumb drives) from Snowden than Greenwald used them to write two stories for 'The Guardian,' the newspaper that had paid for Greenwald's Hong Kong 'vacation.' The stories splashed around and over Washington, D.C. for the next couple of weeks and predictably left those embarrassed by them howling 'Murder! Treason! Kill the Swine!' and screaming for investigations.
How the documents changed hands is told. How they were divided up, for obvious reasons, is not made plain. Surely no one person carried the whole trove back to the States - or to Rio - or wherever they were taken. If one mule got arrested, everything would be lost.
My own surmise is that the world will never know any of those who might have taken part in that escapade beyond the few Greenwald named in the book. Regardless, he and his did the deal with Snowden and filed two stories, and then beat it the hell out of there.
Snowden was spirited away by some Chinese hoteliers and eventually ended - as the world knows - in Russia. The chapter ends with Greenwald in a television studio at an undisclosed location sweating under a nasty, on-camera grilling by noxious 'journalists' who host noxious, daytime TV 'news' shows called 'Morning Joe' and 'Today.'
Chapter 3, titled 'Collect It All,' fingers the NSA for precisely what it is and all it hopes to be in the future. Nothing in Chapter 3 is pretty except Greenwald's own prose and his take-down of the sneaking, treasonous creeps that establishment journalism calls 'our leaders.' Beautiful, black-and-white reproductions of secret NSA documents are replete with handy NSA graphics. The documents and the graphics amply support every last accusations that lawyer Greenwald hurls at the agency. And yes: there are lots of accusations.
Chapter 3 is NOT an indictment; it is a nuclear 'smart-bomb' and it hits the target squarely. Of the 5 chapters in NPTH, 'Collect It All' is the meatiest and most laborious read because it does the bulk of the heavy lifting.
Chapter 4 discusses 'The Harm of Surveillance'. Author Greenwald's essay explains for readers the numerous ways that a surveillance state does damage to us as individuals, to democracy in America, and to the nation at large. If you're one of those who cannot understand why people such as Greenwald and this writer preach that government surveillance will yet be the ruin of us and of our country, Chapter 4 is for you. Folks who read History and other sentient beings already know such stuff.
Finally, Chapter 5 is dubbed 'The Fourth Estate,' because that's where Greenwald takes his lawyer's rhetorical ax to the likes of David Gregory and Michael Kinsley, and other yahoo 'journalists' who in this, that, or the other mainstream venue do their cussed, pathetic best to tar-and-feather Greenwald's credibility. The author disposes of their arguments in ways that look easy because, when their arguments are cut wide open (as good lawyers like Greenwald can do) readers see there's nothing but a few cubic feet of hot ventosity in the heads of David Gregory, Michael Kinsley, and the rest.
Considering the entire Greenwald-Snowden-NSA surveillance scandal, this review will now make a long, complex story as short as possible: Edward Snowden gave Glenn Greenwald a huge cache of top-secret documents, the sum of which prove beyond any doubt that if you use the telephone, the Internet, or any other electronic communication device for any purpose whatsoever, the NSA hears every word you say and sees every message you send.
Summing up, every American had best depend on this one thing: every word you say on the telephone and every message you post on the Internet can and will be used against you if ever for any reason something you've said or done or borrowed from the library makes Big Sam or some of his friends sore at you. It's there; it's real; it's really there, and there it is.
Americans are privileged (and encouraged by government) to stick their heads in the sand at any time they choose. Americans are also privileged to rue the day, the hour, the minute, the second they chose to do so.
Top reviews from other countries
El autor hace un detallado relato de cómo lo contacto Snowden, qué información le dio, en dónde y los problemas que enfrentaron para publicar los artículos, no ahonda tanto en los miles de archivos recibidos, pero si hace un resumen de ellos. Básicamente "no hay lugar donde esconderse" como dice el título.
Both are excellent, all citations are substantiated by documents and very carefully researched.
Unfortunately not given enough credit by the media, as only very few ones dare to mention them.
The mainstream media is controlled by "Big Brother" with a few notable exceptions!






