{"id":222,"date":"2014-07-05T13:58:53","date_gmt":"2014-07-05T20:58:53","guid":{"rendered":"http:\/\/digitalmanticore.com\/?p=222"},"modified":"2014-07-05T13:58:53","modified_gmt":"2014-07-05T20:58:53","slug":"come-at-me-nsa","status":"publish","type":"post","link":"https:\/\/digitalmanticore.com\/?p=222","title":{"rendered":"Come at Me, NSA"},"content":{"rendered":"<p style=\"margin-bottom: 0in;\"><b>Book Review: <span style=\"text-decoration: underline;\">No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State<\/span><span style=\"text-decoration: none;\"> by Glenn Greenwald<\/span><\/b><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\">\n<figure style=\"width: 243px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ecx.images-amazon.com\/images\/I\/71QopTNqZmL.jpg\" alt=\"book cover\" width=\"243\" height=\"365\" \/><figcaption class=\"wp-caption-text\">Book cover: No Place to Hide<\/figcaption><\/figure>\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.powells.com\/biblio\/1-9781627790734-1\"><span style=\"font-weight: normal;\">No Place to Hide<\/span><\/a><\/span><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> is the culmination of a year&#8217;s worth of work with Edward Snowden&#8217;s cache of NSA documents. The author, Glenn Greenwald, is perhaps best known for his articles in <\/span><\/span><i><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The Guardian<\/span><\/span><\/i><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> documenting national security abuses and the NSA&#8217;s surveillance programs. <\/span><\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"font-style: normal;\"><span style=\"font-weight: normal;\">No Place to Hide<\/span><\/span><\/span><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> gives context to the whole event and speaks in detail to the NSA&#8217;s actions, the problems with mass surveillance, and the complicity of the media in the whole affair.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><b><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\">What the NSA is doing \u2026 <\/span><\/span><\/b><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The first section of the book reads a bit like a thriller novel. Greenwald receives an anonymous message from someone promising a major scoop, but the source won&#8217;t share the information unless Greenwald sets up some complicated email encryption. Although Greenwald was interested, he did not follow up with the source. Later, Laura Poitras, friend to Greenwald and the other journalist involved in the Snowden leaks (by the way, they <a href=\"http:\/\/mashable.com\/2014\/04\/14\/pulitzer-greenwald-poitras-snowden\/\">won a Pulitzer Prize<\/a> for their work on this subject) encourages Greenwald to follow a lead that she has. The lead, of course, turns out to be from Snowden who was also the person trying to convince Greenwald to set up encryption Greenwald almost missed the most important story of the decade. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Both Greenwald and Poitras, along with another reporter from <\/span><\/span><\/span><i><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The Guardian<\/span><\/span><\/i><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> (with which Greenwald was affiliated) to Hong Kong to meet Snowden. The set up for the meeting is elaborate\u2014the reporters identify Snowden by looking for a man with a Rubik&#8217;s cube and exchange pass phrases. Eventually, they begin interviewing Snowden, barely beat <\/span><\/span><\/span><i><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The Washington Post<\/span><\/span><\/i><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> to the story and have to leave Hong Kong in a hurry to avoid discovery. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I did want to hear more about the personal story of Snowden, Greenwald, and everyone else involved just because it seems like the kind of story that does not really happen in the modern world. Yet, it did happen. But <\/span><\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"font-style: normal;\"><span style=\"font-weight: normal;\">No Place to Hide<\/span><\/span><\/span><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">, while garnering the reader&#8217;s attention with this exciting tale, then turns to the real issue after this exciting introduction: NSA surveillance.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Greenwald reviews some of the major revelations from Snowden&#8217;s meticulously organized material. Snowden explained that one of the reasons he wanted to provide this information to a reporter, rather than dump it onto the internet, was that he wanted someone who could put the information in context and make it meaningful. I know that if I were to scan all the documents Snowden provided, I would not get a lot out of it. Fortunately, Greenwald helps readers understand the ecosystem of NSA surveillance, guiding the reader through some rather complex issues.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">As usual, I do not want to summarize in any great detail because the book is available to those who want to read it. The overall theme that I took from Greenwald&#8217;s descriptions of the NSA&#8217;s programs was that the scope of these programs is much, much larger than the average person realizes. The goal of the NSA is literally to collect everything. That is not hyperbole. Greenwald includes slides from various training presentations in the book and the \u201cgotta catch &#8217;em all\u201d attitude is prevalent. The NSA has multiple programs, plus collaborates with the other \u201cFive Eyes\u201d countries (the United States, England, Canada, Australia, and New Zealand) to gather everything about everyone. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Metadata is one of the critical pieces of the NSA&#8217;s program. As someone with a degree in library science, I know what metadata is without asking. When we talk about phone records, metadata is information about when you make calls or send texts, who you call, and how long you stay on the phone. Most people dismiss metadata collection as a minor issue. Greenwald points out that, using metadata, an expert can get a strong sense of how you spend your time. An analyst could determine when you normally sleep, what religion you are (do you make a lot of phone calls on Christmas?), your social network, and a lot more. In fact, metadata can be more informative than the content of a call. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\">\n<figure id=\"attachment_223\" aria-describedby=\"caption-attachment-223\" style=\"width: 576px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/digitalmanticore.com\/wp-content\/uploads\/2014\/07\/NSAheadquarters.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-223\" src=\"https:\/\/digitalmanticore.com\/wp-content\/uploads\/2014\/07\/NSAheadquarters.jpg\" alt=\"the exterior of the NSA headquarters in Maryland\" width=\"576\" height=\"324\" srcset=\"https:\/\/digitalmanticore.com\/wp-content\/uploads\/2014\/07\/NSAheadquarters.jpg 690w, https:\/\/digitalmanticore.com\/wp-content\/uploads\/2014\/07\/NSAheadquarters-300x168.jpg 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/a><figcaption id=\"caption-attachment-223\" class=\"wp-caption-text\">NSA Headquarters<\/figcaption><\/figure>\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Another startling issue was what tools the NSA uses for surveillance. A lot of people heard about <a href=\"http:\/\/en.wikipedia.org\/wiki\/PRISM_(surveillance_program)\">PRISM<\/a>, the program that uses technology companies including Microsoft, Yahoo, Google, and Facebook to collect people&#8217;s information. What I found more alarming was what the NSA does with hardware. Greenwald writes, \u201cFor years, the US government loudly warned the world that Chinese routers and other Internet devices post a &#8216;threat&#8217; because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA&#8217;s documents show is that Americans have been engaged in precisely the activity that the United States accused the Chinese of doing.\u201d So, so much for quitting specific websites to avoid being spied on.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The reason all this is a problem, Greenwald explains, is that mass surveillance limits our freedoms. People behave differently when they know they are being watched. They self-censor, limiting possible choices because they know they need to behave within a certain range of social norms. This is problematic in fields such as the arts. If authors or film-makers are censored (like during the McCarthy Era <a href=\"http:\/\/en.wikipedia.org\/wiki\/Hollywood_blacklist\">Hollywood Blacklist<\/a>), they don&#8217;t make things that they know will not be published or produced. They create works that are within the realm of social acceptability. People become afraid to speak out even if no one is being punished (yet). The fact that they are being observed and that there may be repercussions for deviant behavior is enough to stop people from creating dissident works or otherwise speaking out against the government. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Finally, Greenwald calls out the media, the \u201cfourth estate,\u201d for failing us. The main criticism is that the media has become a comfortable part of the political establishment. Reporters are no longer the outsiders they were in the mid-twentieth century. Greenwald describes the media as courtiers to the throne of American political power, \u201ceager to defend the system that vests them with their privileges and contemptuous of anyone who challenges that system.\u201d He also rails against so-called objectivity, which, for the media, is \u201cnothing more than reflecting the biases and serving the interests of entrenched Washington. Opinions are problematic only when they deviate from the acceptable range of Washington orthodoxy.\u201d <\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: none;\">\u2026 <b>and what you can do about it<\/b><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">After reading <\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: normal;\">No Place to Hide<\/span><\/span><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">, I realized what is really insane about all of this: the scope of it. The fact that the NSA intercepts shipments of hardware like routers, outfits them with their spyware, then sends the shipments on their way. That is insane. Even if you delete your Facebook and stop using Skype, there is no way to get around someone snooping in your internet pipes unless you quit the internet entirely. And who would do that? <\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I don&#8217;t know what the answer is to all this, but I think that educating people on the issues of privacy, civil liberties, and surveillance is an important starting point. The fact that my boss thinks it is a good idea to say things to me along the lines of \u201cI would rather be safe because of my children!\u201d or the classic \u201cIt doesn&#8217;t bother me because I&#8217;m not doing anything wrong.\u201d<\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\">\n<figure style=\"width: 226px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.freeimages.com\/assets\/1\/5351\/fat-elvis-69296-m.jpg\" alt=\"a man dressed as Elvis talking to another man\" width=\"226\" height=\"243\" \/><figcaption class=\"wp-caption-text\">A man impersonating a dangerous terrorist icon<\/figcaption><\/figure>\n<p style=\"margin-bottom: 0in;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Well, this bothers me <\/span><\/span><i><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">because <\/span><\/span><\/i><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I&#8217;m not doing anything wrong. I&#8217;m not breaking the law. I&#8217;m not selling drugs or supporting terrorism (domestic or otherwise). The problem with mass surveillance is that whoever is doing the surveilling has the power to decide what is wrong. What if you read about anonymous? Elvis? Are tracking a package? Curious about satellite phones? You need to <a href=\"https:\/\/www.youtube.com\/watch?feature=player_detailpage&amp;v=lwnFE_NpMsE#t=48\">look at your life and look at your choices<\/a>, you potential threat to national security! Those are all topics on the <a href=\"http:\/\/www.businessinsider.com\/nsa-prism-keywords-for-domestic-spying-2013-6\">NSA&#8217;s list of words<\/a> that flag you as a potential threat. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">If you think it&#8217;s insane that your email discussions about encryption or the dictionary might be of interest to the NSA, you are not the only one. The site <a href=\"http:\/\/nsa.motherboard.tv\/\">Hello, NSA<\/a> generates keyword-rich phrases based on the NSA&#8217;s wordlist. In 2013, RedditGifts had an anonymous gift exchange called <a href=\"http:\/\/redditgifts.com\/exchanges\/now-sharing-absurdity\/\">Now Sharing Absurdity \u2013 the NSA Gift Exchange,<\/a> which encouraged participants to theme their gifts around subjects in the NSA word list. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I am glad that there are other people who find the NSA&#8217;s behavior ridiculous, but unfortunately, a lot of people with decision-making power are not among them. The secret <a href=\"http:\/\/en.wikipedia.org\/wiki\/FISA\">FISA<\/a> court has made this type of warrantless spying permissible. Greenwald writes that Snowden hoped that the Obama administration would \u201cchange the excessive abuses of national security that had been justified by the War on Terror \u2026 &#8216;but then it became clear that Obama was not just continuing, but in many cases expanding these abuses.&#8217;\u201d<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">Right now the only method that seems like it will be effective in curbing these \u201cabuses of national security\u201d is putting pressure on legislators to make changes and voting for people who are not committed to the status quo. One positive outcome is that the House of Representatives voted in support of an amendment that would \u201cprevent intelligence agencies from using the funds to force software companies to build back doors into their products,\u201d according to an <a href=\"http:\/\/www.thedailybeast.com\/articles\/2014\/06\/20\/house-votes-to-defund-nsa-backdoor-searches.html\">article in The Daily Beast<\/a>. <\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I wish I had more ideas for how to do something, but I do not. My biggest advice is to vote. Don&#8217;t just vote for anyone, but cast an educated vote. Follow organizations like the <a href=\"https:\/\/www.eff.org\/\">Electronic Frontier Foundation<\/a>, which works to defend civil liberties in digital space. Educate yourself and don&#8217;t be afraid of having an unpopular opinion if your opinion is based on the facts. Edward Snowden said that his biggest concern with leaking his trove of NSA documents would be that no one would react and nothing would change. The least we can do is read up on the issue and move forward with our eyes open.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0in;\">\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"><strong>What to read next<\/strong>:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">I started working my way through the <a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/23\/edward-snowden-nsa-files-timeline\">original articles that Greenwald wrote<\/a> for <\/span><\/span><\/span><i><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">The Guardian<\/span><\/span><\/i><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> about the Snowden leaks. I did not read many of them as they were coming out; most of my news on the subject came from <a href=\"http:\/\/www.democracynow.org\/\">Democracy Now<\/a>. I am interested in seeing the progression of the leaks. Also, Greenwald is not done yet, there is at least one more major article set to release soon, as of this writing. Greenwald is now writing on a site called <a href=\"https:\/\/firstlook.org\/theintercept\/dispatches\/\">The Intercept<\/a>. <\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p style=\"margin-bottom: 0in;\"><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">When Greenwald and Laura Poitras met Snowden, they asked why he did what he did. Snowden cited the book <\/span><\/span><\/span><a href=\"http:\/\/www.powells.com\/biblio\/17-9780691017846-55\"><span style=\"font-style: normal;\"><span style=\"text-decoration: underline;\"><span style=\"font-weight: normal;\">The Hero with a Thousand Faces<\/span><\/span><\/span><\/a><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\"> by Joseph Campbell as one of his influences. I found this interesting because I had already checked it out from the library. Campbell wrote prolifically on comparative mythology and the role of myth in our culture. I enjoyed his book <\/span><\/span><\/span><span style=\"font-style: normal;\"><span style=\"text-decoration: underline;\"><span style=\"font-weight: normal;\">The Power of Myth<\/span><\/span><\/span><span style=\"font-style: normal;\"><span style=\"text-decoration: none;\"><span style=\"font-weight: normal;\">, so this is definitely on my to-read list.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Book Review: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald No Place to Hide is the culmination of a year&#8217;s worth of work with Edward Snowden&#8217;s cache of NSA documents. The author, Glenn Greenwald, is perhaps best known for his articles in The Guardian documenting national security&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[188,16,30,163,157,13,159,161,158,162,29],"class_list":["post-222","post","type-post","status-publish","format-standard","hentry","category-book-review","tag-book-review","tag-current-events","tag-internet","tag-national-security","tag-no-place-to-hide","tag-non-fiction","tag-nsa","tag-prism","tag-snowden","tag-surveillance","tag-technology"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p3ni6N-3A","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/posts\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=222"}],"version-history":[{"count":1,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/posts\/222\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=\/wp\/v2\/posts\/222\/revisions\/224"}],"wp:attachment":[{"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalmanticore.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}