‘No Place to Hide’ uses Snowden documents to analyze NSA program
05/29/2014 11:47 AM
06/03/2014 10:17 AM
At a meeting with his British counterparts in 2008, Keith Alexander, then head of the National Security Agency, reportedly asked, “Why can’t we collect all the signals, all the time?”
The NSA has since sought to dismiss that remark as a quip taken out of context. In his new book, “No Place to Hide,” Glenn Greenwald, one of three recipients of the voluminous, top-secret material that NSA contractor Edward Snowden chose to leak, uses those documents to prove that this was indeed the agency’s guiding principle.
In one remarkable slide presented at a 2011 meeting of five nations’ intelligence agencies and revealed here for the first time, the NSA described its “collection posture” as “Collect It All,” “Process It All,” “Exploit It All,” “Partner It All,” “Sniff It All” and, ultimately, “Know It All.”
Much has been written about the NSA’s omnivorous appetite for personal data, much of it by Greenwald for the Guardian and other outlets. Stories based on the leaked material resulted in The Washington Post and the Guardian winning Pulitzer Prizes for public service this year.
In his new book, however, Greenwald offers a revealing and disturbing overview, illustrated by dozens of reproduced secret documents, of just how far the NSA has gone to achieve Alexander’s vision.
Relying on newly disclosed and already disclosed documents, Greenwald shows that the scope of the NSA’s surveillance exceeds not only our imagination but also the agency’s capacity even to store, much less analyze, it all.
In a one-month period last year, for example, a single unit of the NSA, the Global Access Operations unit, collected data on more than 97 billion emails and 124 billion phone calls from around the world; more than 3 billion of those calls and emails were collected as they passed through the United States.
As of 2012, the agency, working hand in hand with private phone companies and Internet service providers, was processing more than 20 billion telecommunications a day. The NSA has admitted that “it collects far more content than is routinely useful to analysts.”
Under another program revealed here, the NSA intercepts routers, servers and other network equipment being shipped overseas; installs back-door surveillance bugs; rewraps the packages with factory seals; and sends them on their way, thereby ensuring that the agency will have clandestine access to all information that passes through them.
Other documents describe X-KEYSCORE, the NSA’s most powerful tool, which, as its name implies, enables the agency to track every keystroke on a computer, permitting the agency to monitor in real time all of a user’s email, social-media and Web-browsing activity.
In a single month in 2012, X-KEYSCORE collected 41 billion records for one NSA unit.
Greenwald contends that this is the program Snowden was referring to when he said that, with an email address, he could tap into any American’s communications. (The NSA has accused Snowden of exaggerating, but the documents suggest that he may be right.)
Some of Greenwald’s most disturbing disclosures concern not the NSA but its British counterpart, the Government Communications Headquarters (GCHQ). His documents reveal that the GCHQ engages in “online covert action” against loosely defined “hacktivists” designed to disrupt, degrade and discredit their online presence.
GCHQ’s tactics include luring targets to sexually compromising websites, posting false blogs and launching other “info ops to damage reputations.”
Other revelations are less surprising, although Greenwald tends to deliver them as if they were all equally scandalous. He reports, for example, that the NSA cooperates with other countries’ spy agencies, even as they spy on us and we on them.
Is anyone other than Greenwald “shocked, shocked” by this news?
He notes that the NSA collects data not only for counterterrorism purposes but for economic and diplomatic advantage. Again, did anyone think otherwise?
And it hardly follows that, as Greenwald claims, “stopping terror is clearly a pretext” for the NSA.
Some disclosures raise more questions about Greenwald’s judgment than about the NSA’s activities. One document, for example, identifies the specific methods used to bug 24 named foreign embassies; its disclosure is likely to undermine legitimate intelligence-gathering and cause serious diplomatic problems. Yet it is difficult to see what possible value it adds to the public debate.
It is one thing to disclose secret government practices that raise serious moral, political and constitutional concerns, but bugging foreign embassies has always been at the core of foreign intelligence.
Greenwald does not always recognize the difference between justified and unjustified disclosures. And that’s too bad, as Snowden placed his trust in Greenwald to make such calls.
Greenwald’s descriptions of NSA programs can also be misleading.
He never mentions, for example, that there are significant “back-end” limits on how the agency can search and use much of the data it collects. These limitations constitute the core of the NSA’s defenses of its programs.
While I don’t find those defenses entirely convincing, a serious effort to grapple with the issue would not simply ignore them.
The force of Greenwald’s argument is sometimes undermined by his hyperbolic style and more-radical-than-thou attitude. He depicts the NSA, for example, as part of a grand scheme by elites to control the masses, of a piece with what he sees as “the response to the Occupy movement … to crush it with force, through tear gas, pepper spray, and prosecution.”
Really? Maybe I’m imagining things, but I recall seeing Occupy demonstrations for months on end throughout the country, including in the nation’s capital.
This is an important and illuminating book. It would have been more important and illuminating were Greenwald able to acknowledge that the choices we face about regulating surveillance in the modern age are difficult and that there are no simple answers. (He notably suggests virtually nothing in the way of positive reforms, sticking instead to criticism.)
Part of the problem is that Greenwald sees the world in black and white. As he puts it, “There are, broadly speaking, two choices: obedience to institutional authority or radical dissent from it.” For him there is apparently nothing in between. Anyone who does not share his radical dissent is, therefore, a tool for the political elite.
Handed the story of a lifetime, Greenwald has helped spark a much-needed national and worldwide debate about how to preserve privacy when we do so much online, and when the NSA and others have the technological means to track virtually all we do there.
But his book would have been more persuasive had he confronted what is difficult about the issue and not simply been satisfied with lobbing grenades at all who are less radical than he is.
David Cole is the Hon. George Mitchell professor in law and public policy at Georgetown University Law Center and the legal affairs correspondent for the Nation.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, by Glenn Greenwald (259 pages; Metropolitan; $27)
Join the Discussion
The Kansas City Star is pleased to provide this opportunity to share information, experiences and observations about what's in the news. Some of the comments may be reprinted elsewhere on the site or in the newspaper. We encourage lively, open debate on the issues of the day, and ask that you refrain from profanity, hate speech, personal comments and remarks that are off point. Thank you for taking the time to offer your thoughts.