Laura Poitras

37 results back to index


pages: 159 words: 42,401

Snowden's Box: Trust in the Age of Surveillance by Jessica Bruder, Dale Maharidge

air gap, anti-communist, Bay Area Rapid Transit, Berlin Wall, Black Lives Matter, blockchain, Broken windows theory, Burning Man, Cambridge Analytica, cashless society, Chelsea Manning, citizen journalism, computer vision, crowdsourcing, deep learning, digital rights, disinformation, Donald Trump, Edward Snowden, Elon Musk, end-to-end encryption, Evgeny Morozov, Ferguson, Missouri, Filter Bubble, Firefox, information security, Internet of things, Jeff Bezos, Jessica Bruder, John Perry Barlow, Julian Assange, Laura Poitras, license plate recognition, Mark Zuckerberg, mass incarceration, medical malpractice, messenger bag, Neil Armstrong, Nomadland, Occupy movement, off grid, off-the-grid, pattern recognition, Peter Thiel, Robert Bork, Seymour Hersh, Shoshana Zuboff, Silicon Valley, Skype, social graph, Steven Levy, surveillance capitalism, tech bro, Tim Cook: Apple, web of trust, WikiLeaks

p. 15 “no credible evidence”: Jamie Williams and Karen Gullo, “Government Documents Show FBI Cleared Filmmaker Laura Poitras after Six-Year Fishing Expedition,” Electronic Frontier Foundation, December 6, 2017, Eff.org. p. 16 she offered to write with crayons: Peter Maass, “How Laura Poitras Helped Snowden Spill His Secrets,” New York Times Magazine, August 18, 2013. Substantiated in interviews with Laura Poitras. p. 17 Salon ran an article: Glenn Greenwald, “US Filmmaker Repeatedly Detained at Border,” Salon, April, 8, 2012. p. 18 Laura was editing The Program: Laura Poitras, “The Program,” New York Times Op-Docs, video, Nytimes.com; Paul Harris, “US Data Whistleblower: ‘It’s a Violation of Everybody’s Constitutional Rights,’” Guardian, September 15, 2012.

That’s what the mysterious source did when he contacted Greenwald, and once again when he decided to try Micah instead. When Micah got the source’s request, he sent Laura an encrypted version of the following message: From: Micah Lee To: Laura Poitras Date: Sat, 12 Jan 2013 Hey Laura, This person just sent me this GPG encrypted email. Do you want to respond? If you want to, and you need any help with using crypto, I’m happy to help. Laura wrote back: From: Laura Poitras To: Micah Lee Date: Sat, 12 Jan 2013 Hey Micah, Thanks for asking. Sure, you can tell this person I can be reached with GPG at: XXXXX@gmail.com I’ll reply with my public key.

We conducted interviews from 2016 to 2019 with Barton Gellman, Micah Lee, Kirsten Johnson, Laura Poitras, Trevor Timm, Ben Wizner, and confidential sources. Foreword p. 2 The cover of the Guardian bore a giant yellow headline: Julian Borger and Glenn Greenwald, “The Whistleblower” Guardian, October 6, 2013. p. 2 Snowden’s trademark eyeglasses: James Bamford, “The Most Wanted Man In The World,” Wired, September 2014. p. 2 an existential threat to democracy: Glenn Greenwald, Ewen MacAskill, and Laura Poitras, “Edward Snowden: The Whistleblower behind the NSA Surveillance Revelations,” Guardian, June 9, 2013.


pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State by Barton Gellman

4chan, A Declaration of the Independence of Cyberspace, Aaron Swartz, active measures, air gap, Anton Chekhov, Big Tech, bitcoin, Cass Sunstein, Citizen Lab, cloud computing, corporate governance, crowdsourcing, data acquisition, data science, Debian, desegregation, Donald Trump, Edward Snowden, end-to-end encryption, evil maid attack, financial independence, Firefox, GnuPG, Google Hangouts, housing justice, informal economy, information security, Jacob Appelbaum, job automation, John Perry Barlow, Julian Assange, Ken Thompson, Laura Poitras, MITM: man-in-the-middle, national security letter, off-the-grid, operational security, planetary scale, private military company, ransomware, Reflections on Trusting Trust, Robert Gordon, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Saturday Night Live, seminal paper, Seymour Hersh, Silicon Valley, Skype, social graph, standardized shipping container, Steven Levy, TED Talk, telepresence, the long tail, undersea cable, Wayback Machine, web of trust, WikiLeaks, zero day, Zimmermann PGP

The film’s broadcast premiere was October 25, 2006, on the Public Broadcasting Service. See www.pbs.org/pov/mycountry/. For the 2007 Academy Award nomination, see https://to.pbs.org/1QJZkGk. failed attempt to install democracy: “Interview: Laura Poitras, Director of ‘My Country, My Country,’” Indiewire, July 31, 2006, www.indiewire.com/article/indiewire_interview_laura_poitras_director_of_my_country_my_country. her latest, The Oath: See Zeitgeist Films, press kit, 2010, https://zeitgeistfilms.com/media/films/182/oath.presskit.pdf. pulled aside for interrogation and search: This account, which Poitras gave to me at the time, has not been disputed by the U.S. government.

Snowden is a complicated figure, far from the cartoon templates of “hero” or “traitor.” He can be fine company: funny and profane, an autodidact with a nimble mind and eclectic interests. He can also be stubborn, self-important, and a scold. Our relationship was fraught. He knew that I would not join his crusade, and he never relied on me to take his side as he did with Laura Poitras and Glenn Greenwald. We struggled over boundaries—mine as a journalist who wanted to know more, his as an advocate who saw his cause at stake in every choice of words. He broke ties with me, briefly, when I did not accept his conditions for my first story. The second time he withdrew, believing I had done him harm, we did not speak for months.

Not because we knew it was blown, but because we could not know. These email accounts were anonymous, encrypted, isolated from our everyday internet lives. Best I could tell, there was no way to lock them down tighter. That thought had reassured me once. It was the second half of May 2013. Nearly four months had passed since Laura Poitras, an independent filmmaker, reached out to me for advice about a confidential source. Verax, as I came to know him later, had brought her an enigmatic tip about U.S. government surveillance. Poitras and I teamed up to see what would come of it. The previous night, months of suspense had come to an end.


pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan

active measures, air gap, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, British Empire, Cass Sunstein, citizen journalism, Citizen Lab, credit crunch, cryptocurrency, cuban missile crisis, data acquisition, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, family office, Hacker News, hive mind, information security, Internet Archive, Jacob Appelbaum, John Markoff, John von Neumann, Julian Assange, Kevin Roose, Kickstarter, kremlinology, Laura Poitras, MITM: man-in-the-middle, Nate Silver, operational security, post-truth, profit motive, RAND corporation, ransomware, risk tolerance, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Russian election interference, seminal paper, Silicon Valley, South China Sea, Steve Jobs, Stuxnet, subscription business, technoutopianism, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, Wargames Reagan, WikiLeaks, zero day

For a partial listing of the cables to which GCHQ has access, see “Cables: Where We Are,” UK Government Communications Headquarters, ca. 2012. This document was shared publicly in Frederick Obermaier, Henrik Moltke, Laura Poitras, and Jan Strozyk, “Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts,” Süddeutsche Zeitung International, November 25, 2014. 16. Julia Angwin, Jeff Larson, Charlie Savage, James Risen, Henrik Moltke, and Laura Poitras, “NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help,’ ” ProPublica, August 15, 2015. 17. Michelle Nichols, “United Nations Says It Will Contact United States over Spying Report,” Reuters, August 26, 2013. 18. “2011 Acquisition Plan—Communications,” United Nations Procurement Division, 2011, https://web.archive.org/web/20120108022955/http:/www.un.org/depts/ptd/2011plan_coms.htm. 19.

“Subject: NSA Intelligence Relationship with Saudi Arabia,” National Security Agency information paper, April 8, 2013, published online with Glenn Greenwald and Murtaza Hussain, “The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police,” The Intercept, July 25, 2014. 56. Laura Poitras, Marcel Rosenbach, Fidelius Schmid, Holger Stark, and Johnathan Stock, “How the NSA Targets Germany and Europe,” Der Spiegel, July 1, 2013; Matthew M. Aid, “The CIA’s New Black Bag Is Digital,” Foreign Policy, July 17, 2013; Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies, and James Ball, “Mastering the Internet: How GCHQ Set Out to Spy on the World Wide Web,” Guardian, June 21, 2013. 57. Jacob Appelbaum, Laura Poitras, Marcel Rosenbach, Christian Stöcker, Jörg Schindler, and Holger Stark, “Inside TAO: Documents Reveal Top NSA Hacking Unit,” Der Spiegel, December 20, 2013; “New Nuclear Sub Is Said to Have Special Eavesdropping Ability,” Associated Press, February 20, 2005. 58.

Mark Halperin and John Heilemann, “The Hunt for Pufferfish: A Double Down Excerpt,” Time, November 2, 2013. 6. Jens Gluesing, Laura Poitras, Marcel Rosenbach, and Holger Stark, “Fresh Leak on US Spying: NSA Accessed Mexican President’s Email,” Der Spiegel, October 20, 2013. For a broader look at the NSA’s activities against political targets, see Scott Wilson and Anne Gearan, “Obama Didn’t Know about Surveillance of U.S.-Allied World Leaders until Summer, Officials Say,” Washington Post, October 28, 2013. 7. Laura Poitras, Marcel Rosenbach, and Holger Stark, “ ‘A’ for Angela: GCHQ and NSA Targeted Private German Companies and Merkel,” Der Spiegel, March 29, 2014. 8.


pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Adam Curtis, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, AOL-Time Warner, Apple's 1984 Super Bowl advert, bitcoin, Black Lives Matter, borderless world, Boston Dynamics, British Empire, Californian Ideology, call centre, Charles Babbage, Chelsea Manning, cloud computing, collaborative editing, colonial rule, company town, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, data science, digital map, disinformation, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, drone strike, dual-use technology, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, end-to-end encryption, fake news, fault tolerance, gentrification, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Greyball, Hacker Conference 1984, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, Laura Poitras, life extension, Lyft, machine readable, Mark Zuckerberg, market bubble, Menlo Park, military-industrial complex, Mitch Kapor, natural language processing, Neal Stephenson, Network effects, new economy, Norbert Wiener, off-the-grid, One Laptop per Child (OLPC), packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, Snow Crash, SoftBank, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, Tony Fadell, uber lyft, vertical integration, Whole Earth Catalog, Whole Earth Review, WikiLeaks

Fight for the Future, the hip, young Silicon Valley activist group, declared Tor to be “NSA-proof” and recommended that people use it every day. Laura Poitras, director of Citizen Four, the Academy Award–winning documentary on Edward Snowden, endorsed Tor as well. “When I was communicating with Snowden for several months before I met him in Hong Kong, we talked often about the Tor Network and it is something that actually he feels is vital for online privacy and defeating surveillance. It is our only tool to be able to do that,” she told an auditorium full of people at a hacker conference in Germany, a giant picture of Edward Snowden projected behind her on stage (Katina, “This Is What a Tor Supporter Looks Like: Laura Poitras,” Tor Project [blog], November 23, 2015, https://blog.torproject.org/blog/what-tor-supporter-looks-laura-poitras). 68.

Every year, Tor’s annual presentation—“The State of the Onion”—is the most well-attended event in the program. An audience of several thousand packs a massive auditorium to watch Tor developers and celebrity supporters talk about their fights against Internet surveillance. Last year, the stage featured Laura Poitras, the Academy Award–winning director of the Edward Snowden documentary, Citizen Four. In her speech, she held up Tor as a powerful antidote to America’s surveillance state. “When I was communicating with Snowden for several months before I met him in Hong Kong, we talked often about the Tor network, and it is something that actually he feels is vital for online privacy and to defeat surveillance.

He was a member of the Internet Freedom elite, championed by the American Civil Liberties Union and the Electronic Frontier Foundation, given a board seat on eBay founder Pierre Omidyar’s Freedom of the Press Foundation, and occupied an advisory role for London’s Centre for Investigative Journalism. His fame and rebel status only made his job as Tor’s pitchman more effective. In Berlin, Appelbaum caught another lucky break for the Tor Project. In 2013, his good friend and sometimes-lover Laura Poitras, an American documentary filmmaker who also lived in the German capital in self-imposed exile, was contacted by a mysterious source who told her he had access to the crown jewels of the National Security Agency: documents that would blow America’s surveillance apparatus wide open.107 Poitras tapped Appelbaum’s knowledge of Internet systems to come up with a list of questions to vet the possible leaker and to make sure he really was the NSA technician he claimed to be.


pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier

23andMe, Airbnb, airport security, AltaVista, Anne Wojcicki, AOL-Time Warner, augmented reality, behavioural economics, Benjamin Mako Hill, Black Swan, Boris Johnson, Brewster Kahle, Brian Krebs, call centre, Cass Sunstein, Chelsea Manning, citizen journalism, Citizen Lab, cloud computing, congestion charging, data science, digital rights, disintermediation, drone strike, Eben Moglen, Edward Snowden, end-to-end encryption, Evgeny Morozov, experimental subject, failed state, fault tolerance, Ferguson, Missouri, Filter Bubble, Firefox, friendly fire, Google Chrome, Google Glasses, heat death of the universe, hindsight bias, informal economy, information security, Internet Archive, Internet of things, Jacob Appelbaum, James Bridle, Jaron Lanier, John Gilmore, John Markoff, Julian Assange, Kevin Kelly, Laura Poitras, license plate recognition, lifelogging, linked data, Lyft, Mark Zuckerberg, moral panic, Nash equilibrium, Nate Silver, national security letter, Network effects, Occupy movement, operational security, Panopticon Jeremy Bentham, payday loans, pre–internet, price discrimination, profit motive, race to the bottom, RAND corporation, real-name policy, recommendation engine, RFID, Ross Ulbricht, satellite internet, self-driving car, Shoshana Zuboff, Silicon Valley, Skype, smart cities, smart grid, Snapchat, social graph, software as a service, South China Sea, sparse data, stealth mode startup, Steven Levy, Stuxnet, TaskRabbit, technological determinism, telemarketer, Tim Cook: Apple, transaction costs, Uber and Lyft, uber lyft, undersea cable, unit 8200, urban planning, Wayback Machine, WikiLeaks, workplace surveillance , Yochai Benkler, yottabyte, zero day

US National Security Agency (8 Jan 2007), “XKEYSCORE (training slides),” https://www.eff.org/document/2013-07-31-guard-xkeyscore-training-slides (page 2). One called MARINA: James Ball (30 Sep 2013), “NSA stores metadata of millions of web users for up to a year, secret files show,” Guardian, http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents. Another NSA database, MYSTIC: Ryan Devereaux, Glenn Greenwald, and Laura Poitras (19 May 2014), “Data pirates of the Caribbean: The NSA is recording every cell phone call in the Bahamas,” Intercept, https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas. Julian Assange (23 May 2014), “WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA,” WikiLeaks, https://wikileaks.org/WikiLeaks-statement-on-the-mass.html.

Jonathan Mayer and Patrick Muchler (9 Dec 2013), “MetaPhone: The NSA three-hop,” Web Policy, http://webpolicy.org/2013/12/09/metaphone-the-nsa-three-hop. phone numbers common to unrelated people: Amy Davidson (16 Dec 2013), “The domino’s hypothetical: Judge Leon vs. the N.S.A.,” New Yorker, http://www.newyorker.com/news/amy-davidson/the-dominos-hypothetical-judge-leon-vs-the-n-s-a. NSA documents note: Barton Gellman and Laura Poitras (10 Jul 2013), “NSA slides explain the PRISM data-collection program,” Washington Post, http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents. total number of people being surveilled: Shane Harris (17 Jul 2013), “Three degrees of separation is enough to have you watched by the NSA,” Foreign Policy, http://complex.foreignpolicy.com/posts/2013/07/17/3_degrees_of_separation_is_enough_to_have_you_watched_by_the_nsa.

total number of people being surveilled: Shane Harris (17 Jul 2013), “Three degrees of separation is enough to have you watched by the NSA,” Foreign Policy, http://complex.foreignpolicy.com/posts/2013/07/17/3_degrees_of_separation_is_enough_to_have_you_watched_by_the_nsa. President Obama directed the NSA: Tony Bradley (17 Jan 2014), “NSA reform: What President Obama said, and what he didn’t,” Forbes, http://www.forbes.com/sites/tonybradley/2014/01/17/nsa-reform-what-president-obama-said-and-what-he-didnt. This is what both the NSA: James Risen and Laura Poitras (20 Sep 2013), “NSA gathers data on social connections of U.S. citizens,” New York Times, http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html. One of Facebook’s most successful: Vauhini Vara (23 Aug 2007), “Facebook gets personal with ad targeting plan,” Wall Street Journal, http://online.wsj.com/news/articles/SB118783296519606151.


Bottoms Up and the Devil Laughs by Kerry Howley

air gap, Bernie Sanders, Chelsea Manning, cognitive bias, disinformation, Donald Trump, drone strike, Edward Snowden, Evgeny Morozov, failed state, fake news, Joan Didion, Julian Assange, Laura Poitras, Nelson Mandela, operational security, pre–internet, QAnon, Russian election interference, security theater, Shoshana Zuboff, social graph, surveillance capitalism, WikiLeaks

The correspondent then sent him video instructions, as if written for a child, on how to set it up. He ignored that too. “I mean, now I had to watch a fucking video?” Greenwald later told Rolling Stone, in perhaps his most relatable moment. The correspondent gave up. Six months later, Greenwald heard from Laura Poitras, the filmmaker documenting Assange. Poitras was on a terrorist watchlist the government would not acknowledge existed. She had been stopped at the border “probably fifty times,” her notebooks seized, her devices confiscated, her credit cards taken, and so she had moved to Berlin, where she could move in and out free of harassment.

This was in 2014. Chelsea Manning was serving her sentence in a military prison in Kansas, during which she would not have the opportunity to appear on Real Time with Bill Maher, which is perhaps part of the reason why Snowden had accepted Julian Assange’s help to find asylum in Russia. In 2014 Laura Poitras, Glenn Greenwald, and journalist Jeremy Scahill founded The Intercept, an entire publication intended to analyze and exploit what former NSA and CIA director Michael Hayden called “the greatest hemorrhaging of legitimate American secrets in the history of the republic,” funded by eBay billionaire Pierre Omidyar.

Assange argued that it was a “honeytrap” operation set up by the CIA, though one imagines a honeytrap operation would be cleaner; he called Sweden “the Saudi Arabia of fundamentalist feminism.” On Facebook, his twenty-one-year-old son Daniel said it would be “interesting” to find out whether the charges had been part of “a government plot or personal grudges,” which indeed it would. “The man does have a way of making a lot of female enemies,” he said. In a documentary filmed by Laura Poitras, a polished, gray-haired lawyer named Helena Kennedy in a plaid blazer and turquoise necklace comes to talk to Assange about managing public relations as these accusations become public. They are on the British estate where Assange has set up base. “It’s about you getting your mind into not using language that sounds hostile to women,” she says gently.


pages: 305 words: 93,091

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick, Mikko Hypponen, Robert Vamosi

4chan, big-box store, bitcoin, Bletchley Park, blockchain, connected car, crowdsourcing, data science, Edward Snowden, en.wikipedia.org, end-to-end encryption, evil maid attack, Firefox, Google Chrome, Google Earth, incognito mode, information security, Internet of things, Kickstarter, Laura Poitras, license plate recognition, Mark Zuckerberg, MITM: man-in-the-middle, off-the-grid, operational security, pattern recognition, ransomware, Ross Ulbricht, Salesforce, self-driving car, Silicon Valley, Skype, Snapchat, speech recognition, Tesla Model S, web application, WikiLeaks, zero day, Zimmermann PGP

But e-mail is not point-to-point, meaning that a single e-mail might hit several servers around the world before landing in the intended recipient’s inbox. Snowden knew that whatever he wrote could be read by anyone who intercepted the e-mail anywhere along its journey. So he had to perform a complicated maneuver to establish a truly secure, anonymous, and fully encrypted means of communication with privacy advocate and filmmaker Laura Poitras, who had recently finished a documentary about the lives of whistle-blowers. Snowden wanted to establish an encrypted exchange with Poitras, except only a few people knew her public key. She didn’t make her public key very public. To find her public key, Snowden had to reach out to a third party, Micah Lee of the Electronic Frontier Foundation, a group that supports privacy online.

They know all our purchases. They know where we have subscriptions. They know when we leave the country. And they know whenever we use a new machine to make a purchase online. According to Micah Lee of the EFF, at one point Snowden was in his Hong Kong hotel room discussing government secrets with Laura Poitras and Glenn Greenwald, a reporter from the Guardian, and at the same time he was on hold with the customer support department at DreamHost, an Internet provider based in Los Angeles. Apparently Snowden explained to DreamHost that he was overseas and didn’t trust the local Internet service, hence his use of Tor.

If I have to leave my laptop behind, then I never leave it in hibernate mode. Rather, I power it down. If I didn’t, an attacker could possibly dump the memory and obtain my PGP Whole Disk encryption keys.6 So I turn it all the way off. At the beginning of the book I talked about the many precautions that Edward Snowden took to keep his communication with Laura Poitras private. Once Snowden’s secret cache of data was ready to be released to the public, however, he and Poitras needed a place to store it. The most common operating systems—Windows, iOS, Android, and even Linux—contain vulnerabilities. All software does. So they needed a secure operating system, one that is encrypted from day one and requires a key to unlock it.


pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man by Luke Harding

affirmative action, air gap, airport security, Anton Chekhov, Apple's 1984 Super Bowl advert, Berlin Wall, Big Tech, Bletchley Park, Chelsea Manning, disinformation, don't be evil, drone strike, Edward Snowden, Etonian, Firefox, Google Earth, information security, Jacob Appelbaum, job-hopping, Julian Assange, Khan Academy, kremlinology, Laura Poitras, Mark Zuckerberg, Maui Hawaii, MITM: man-in-the-middle, national security letter, operational security, Panopticon Jeremy Bentham, pre–internet, Ralph Waldo Emerson, rolodex, Rubik’s Cube, Silicon Valley, Skype, social graph, Steve Jobs, TechCrunch disrupt, undersea cable, web application, WikiLeaks

Greenwald felt the location was ‘bizarre’ and confusing: did he have a senior foreign posting there? The rendezvous was to be in Kowloon’s Mira Hotel, a chic, modern edifice in the heart of the tourist district, and a short cab ride away from the Star Ferry to Hong Kong Island. Accompanying Greenwald was Laura Poitras, also an American citizen, documentary film-maker and notable thorn in the side of the US military. She had been a matchmaker, the first to point Greenwald in the ghost’s direction. The two journalists were given meticulous instructions. They were to meet in a less-trafficked, but not entirely obscure, part of the hotel, next to a large plastic alligator.

Marauding jungle monkeys would often invade, picking fights with the dogs, sometimes pelting them with branches, or retreating into dense thickets of bamboo. At other times Greenwald rolled around with his animals; he says this is a welcome distraction from politics and the remorseless stream of Twitter. At the end of January 2013, Snowden tried a different way to get to him. He sent an email to Laura Poitras. He was hoping to open an anonymous channel to the documentary film-maker, who was Greenwald’s friend and a close collaborator. Poitras was another leading critic of the US security state – and one of its more prominent victims. For nearly a decade, Poitras had been working on a trilogy of feature-length films about America in the years following 9/11.

They suspected he was in fact carrying copies of Edward Snowden’s NSA and GCHQ files, which Greenwald was engaged in researching and publishing. Their prime purpose, as they were later to admit, was simply to get hold of the files, and find out how much Greenwald knew. On 11 August, Miranda had set off from their home in Rio de Janeiro to Berlin, flying via Heathrow. He spent several days with Greenwald’s fellow journalist Laura Poitras in the German capital. They discussed film projects. He did some sightseeing. He spent a couple of nights in a hotel. He was now flying home, again via the UK. The British and Americans had him under surveillance – possibly even the same spooks who had bugged Angela Merkel’s phone. The heavily encrypted Snowden files Miranda was carrying formed the basis of Greenwald and Poitras’s numerous articles for the Guardian and for other international publications, including France’s Le Monde, Germany’s Der Spiegel, the Washington Post and the New York Times.


pages: 283 words: 85,824

The People's Platform: Taking Back Power and Culture in the Digital Age by Astra Taylor

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Aaron Swartz, Alan Greenspan, American Legislative Exchange Council, Andrew Keen, AOL-Time Warner, barriers to entry, Berlin Wall, big-box store, Brewster Kahle, business logic, Californian Ideology, citizen journalism, cloud computing, collateralized debt obligation, Community Supported Agriculture, conceptual framework, content marketing, corporate social responsibility, creative destruction, cross-subsidies, crowdsourcing, David Brooks, digital capitalism, digital divide, digital Maoism, disinformation, disintermediation, don't be evil, Donald Trump, Edward Snowden, Evgeny Morozov, Fall of the Berlin Wall, Filter Bubble, future of journalism, Gabriella Coleman, gentrification, George Gilder, Google Chrome, Google Glasses, hive mind, income inequality, informal economy, Internet Archive, Internet of things, invisible hand, Jane Jacobs, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, Kickstarter, knowledge worker, Laura Poitras, lolcat, Mark Zuckerberg, means of production, Metcalfe’s law, Naomi Klein, Narrative Science, Network effects, new economy, New Journalism, New Urbanism, Nicholas Carr, oil rush, peer-to-peer, Peter Thiel, planned obsolescence, plutocrats, post-work, power law, pre–internet, profit motive, recommendation engine, Richard Florida, Richard Stallman, self-driving car, shareholder value, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, slashdot, Slavoj Žižek, Snapchat, social graph, Steve Jobs, Stewart Brand, technological solutionism, technoutopianism, TED Talk, the long tail, trade route, Tragedy of the Commons, vertical integration, Whole Earth Catalog, WikiLeaks, winner-take-all economy, Works Progress Administration, Yochai Benkler, young professional

Marvin Ammori, “The Next Big Battle in Internet Policy,” Slate.com, October 2, 2012, http://www.slate.com/articles/technology/future_tense/2012/10/network_neutrality_the_fcc_and_the_internet_of_things_html. 2: FOR LOVE OR MONEY 1. Quotes from an interview with the author except for this one, which is from Justin Cox, “Documenting a Bin Laden Ex-Confidante: Q&A with Filmmaker Laura Poitras,” TheHill.com, July 13, 2010, http://thehill.com/capital-living/cover-stories/108553-documenting-a-bin-laden-ex-confidante-qaa-with-filmmaker-laura-poitras#ixzz2YfhpMdXu. 2. The other person Snowden contacted was the journalist Glenn Greenwald of the Guardian, with whom Poitras collaborated. 3. That start-up is Narrative Science, a computer program that generates sports stories.

We need to find other principles that can guide us, principles that better equip us to comprehend and confront the market’s role in shaping our media system, principles that help us rise to the unique challenge of bolstering cultural democracy in a digital era. Openness cannot protect us from, and can even perpetuate, the perils of a peasant’s kingdom. 2 FOR LOVE OR MONEY Not that many years ago, Laura Poitras was living in Yemen, alone, waiting. She had rented a house close to the home of Abu Jandal, Osama bin Laden’s former bodyguard and the man she hoped would be the subject of her next documentary. He put her off when she asked to film him, remaining frustratingly elusive. Next week, he’d tell her, next week, hoping the persistent American would just go away.

And the consequences of the digital upheaval are far more equivocal than the Shirkys and Benklers acknowledge. While the economics of the Web might apply to remixing memes or posting in online forums, the costs and risks associated with creative acts that require leaving one’s computer have hardly collapsed. Where will this new paradigm leave projects like The Oath? Following Shirky’s logic, Laura Poitras is one of those professionals who should be overthrown by noble amateurs, her labor-intensive filmmaking process a throwback to another era, before creativity was a connected, collective process. The Internet might be a wonderful thing, but you can’t crowdsource a relationship with a terrorist or a whistle-blower.


pages: 579 words: 160,351

Breaking News: The Remaking of Journalism and Why It Matters Now by Alan Rusbridger

"World Economic Forum" Davos, accounting loophole / creative accounting, Airbnb, Andy Carvin, banking crisis, Bellingcat, Bernie Sanders, Bletchley Park, Boris Johnson, Brexit referendum, Cambridge Analytica, centre right, Chelsea Manning, citizen journalism, country house hotel, cross-subsidies, crowdsourcing, data science, David Attenborough, David Brooks, death of newspapers, Donald Trump, Doomsday Book, Double Irish / Dutch Sandwich, Downton Abbey, Edward Snowden, Etonian, Evgeny Morozov, fake news, Filter Bubble, folksonomy, forensic accounting, Frank Gehry, future of journalism, G4S, high net worth, information security, invention of movable type, invention of the printing press, Jeff Bezos, jimmy wales, Julian Assange, Large Hadron Collider, Laura Poitras, Mark Zuckerberg, Mary Meeker, Menlo Park, natural language processing, New Journalism, offshore financial centre, oil shale / tar sands, open borders, packet switching, Panopticon Jeremy Bentham, post-truth, pre–internet, ransomware, recommendation engine, Ruby on Rails, sexual politics, Silicon Valley, Skype, Snapchat, social web, Socratic dialogue, sovereign wealth fund, speech recognition, Steve Bannon, Steve Jobs, the long tail, The Wisdom of Crowds, Tim Cook: Apple, traveling salesman, upwardly mobile, WikiLeaks, Yochai Benkler

In 2014 I joined the board of the New York-based Committee to Protect Journalists, which does the most extraordinary work around the globe to help reporters and editors in trouble. In 2016 I investigated threats to the Kenyan press for the CPJ and in 2017 led a delegation to protest at the extra-judicial killings of Ukrainian journalists. 59. Alan Rusbridger, Janine Gibson, Stuart Millar, Laura Poitras, Ewen MacAskill, Spencer Ackerman. The other main journalists, lawyers, technical advisers involved and so on, apart from Glenn Greenwald and Laura Poitras – included Jeff Larson, Stephen Engelberg, Paul Steiger, James Ball, Nick Hopkins, David Leigh, Nick Davies, David Blishen, Henry Porter, Wolfgang Blau, Lenore Taylor, Gabriel Dance, Nadja Popovich, Greg Chen, Julian Borger, Richard Norton Taylor, Simon Jenkins, Gill Phillips, Sheila Fitzsimons, Dave Boxall, Kath Viner, Paul Johnson, Fielding Cage, Luke Harding, Jo Murray, Geraldine Proudler, Rebecca Ashton, Matt Rogerson, Gavin Millar QC, Tony Danker, Ken MacDonald QC, Gennady Kolker, Jan Clements, Dominic Rushe, David Schulz and Matt Rogerson.

It was, by a mile, the most complex story we had ever handled – logistically, ethically, legally, editorially, technologically. It made WikiLeaks look easy. From the very first there were multiple decisions. Greenwald, as already discussed, lived in Rio with his partner, David Miranda, and 13 rescue dogs. I had never met him. Snowden had also contacted Laura Poitras,7 a gifted filmmaker with, it seemed, a marked antipathy to mainstream media. I had never met her either. Finally, Snowden was also in touch with Barton Gellman, a senior writer for the Washington Post. He was – to all intents and purposes – a rival. My first knowledge of the Greenwald contact came from Janine Gibson, our US editor.

Greenwald would obviously resign and continue with the revelations – and he definitely didn’t believe in engaging with the agencies before publishing.13 Any legal action could take two or three years and cost millions. We (and the government) would watch impotently as the NYT, Washington Post, ProPublica, Der Spiegel and Laura Poitras had a field day with the material we no longer had. We were certainly not handing anything over to the government. We owed it to our source not to do that. So – given that we had another copy in the US – destruction of the London copy was the least worst option. A couple of days later two GCHQ technicians arrived to supervise the destruction of the machines we had been working on.


pages: 523 words: 154,042

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro

3D printing, 4chan, active measures, address space layout randomization, air gap, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, availability heuristic, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, business logic, call centre, carbon tax, Cass Sunstein, cellular automata, cloud computing, cognitive dissonance, commoditize, Compatible Time-Sharing System, Computing Machinery and Intelligence, coronavirus, COVID-19, CRISPR, cryptocurrency, cyber-physical system, Daniel Kahneman / Amos Tversky, Debian, Dennis Ritchie, disinformation, Donald Trump, double helix, Dr. Strangelove, dumpster diving, Edward Snowden, en.wikipedia.org, Evgeny Morozov, evil maid attack, facts on the ground, false flag, feminist movement, Gabriella Coleman, gig economy, Hacker News, independent contractor, information security, Internet Archive, Internet of things, invisible hand, John Markoff, John von Neumann, Julian Assange, Ken Thompson, Larry Ellison, Laura Poitras, Linda problem, loss aversion, macro virus, Marc Andreessen, Mark Zuckerberg, Menlo Park, meta-analysis, Minecraft, Morris worm, Multics, PalmPilot, Paul Graham, pirate software, pre–internet, QWERTY keyboard, Ralph Nader, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Richard Thaler, Ronald Reagan, Satoshi Nakamoto, security theater, Shoshana Zuboff, side hustle, Silicon Valley, Skype, SoftBank, SQL injection, Steve Ballmer, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, surveillance capitalism, systems thinking, TaskRabbit, tech billionaire, tech worker, technological solutionism, the Cathedral and the Bazaar, the new new thing, the payments system, Turing machine, Turing test, Unsafe at Any Speed, vertical integration, Von Neumann architecture, Wargames Reagan, WarGames: Global Thermonuclear War, Wayback Machine, web application, WikiLeaks, winner-take-all economy, young professional, zero day, éminence grise

“this law means”: “In Speech, Wyden Says Official Interpretations of Patriot Act Must Be Made Public,” United States Senate, May 26, 2011, https://www.wyden.senate.gov/news/press-releases/in-speech-wyden-says-official-interpretations-of-patriot-act-must-be-made-public. perhaps intentionally so: Charlie Savage, Power Wars: A Relentless Rise of Presidential Authority (New York: Back Bay, 2015), 174. Laura Poitras’s riveting documentary: Laura Poitras, Citizenfour (2014). one party outside: 50 USC §1881a, often known as Section 702 of the FISA Amendments Act (2008). not because the NSA told us: The Office of the Director of National Intelligence has since published a helpful infographic: https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf.

The next day, both The Washington Post and The Guardian published articles describing a program code-named PRISM, which both papers claimed allowed the NSA to directly access the servers of major tech companies to retrieve the content of international messages. “The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets,” wrote Barton Gellman and Laura Poitras on June 6, 2013. Greenwald’s and Gellman and Poitras’s articles would win The Guardian and The Washington Post the Pulitzer Prize in Public Service. Snowden not only caused an intelligence crisis for the national security community—a Pentagon review concluded that his theft of secrets was the “largest in American history”—but he also created a political crisis.

Snowden revealed that the U.S. government was actively subverting the rule of law by hiding upcode behind a secret court so as to conceal what the NSA was doing with downcode. The American people therefore had no way of knowing what they were authorizing, and their representatives did not know what they were enacting, because the U.S. government had made the law a highly classified state secret. NSA Has Upcode Too In Laura Poitras’s riveting documentary Citizenfour, a wan and tired Edward Snowden is shown at the moments he leaks to the journalists in his Hong Kong hotel room. He shows them the infamous PowerPoint deck of forty-one slides explaining the workings of PRISM, the surveillance program that collects internet communications from various U.S. companies.


pages: 383 words: 105,021

Dark Territory: The Secret History of Cyber War by Fred Kaplan

air gap, Big Tech, Cass Sunstein, Charles Babbage, computer age, data acquisition, drone strike, dumpster diving, Edward Snowden, game design, hiring and firing, index card, information security, Internet of things, Jacob Appelbaum, John Markoff, John von Neumann, kremlinology, Laura Poitras, Mikhail Gorbachev, millennium bug, Morris worm, national security letter, Oklahoma City bombing, operational security, packet switching, pre–internet, RAND corporation, Ronald Reagan, seminal paper, Seymour Hersh, Silicon Valley, Skype, Stuxnet, tech worker, Timothy McVeigh, unit 8200, uranium enrichment, Wargames Reagan, Y2K, zero day

These were the first of many stories, published over the next several months by The Guardian, the Post, Der Spiegel, and eventually others, based on a massive trove of beyond-top-secret documents that NSA systems administrator Edward Snowden had swiped off his computer at the agency’s facility in Oahu, Hawaii, and leaked to three journalists before fleeing to Hong Kong, where he met with two of them, Laura Poitras and Glenn Greenwald. (The other reporter, Barton Gellman, couldn’t make the trip.) The timing of the leak, coming on the eve of the Obama-Xi summit, was almost certainly happenstance—Snowden had been in touch with the reporters for months—but the effect was devastating. Obama brought up Chinese cyber theft; Xi took out a copy of The Guardian.

On June 6, The Washington Post and The Guardian: “Verizon Forced to Hand Over Telephone Data—Full Court Ruling,” The Guardian, June 5, 2013, accompanying Glenn Greenwald, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,” The Guardian, June 6, 2013; “NSA Slides Explain the Prism Data-Collection Program,” Washington Post, June 6, 2013, which accompanied Barton Gellman and Laura Poitras, “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,” Washington Post, June 7, 2013; Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps in to User Data of Apple, Google, and others,” The Guardian, June 7, 2013. The Guardian and the Post, which both had Snowden documents, were locked in a fierce competition over who could publish first.

For a list of all the Post’s Snowden-based stories, see http://dewitt.sanford.duke.edu/gellmanarticles/. These were the first of many stories: For the journalists’ accounts of their encounters with Snowden, see “Live Chat: NSA Surveillance: Q&A with Reporter Barton Gellman,” July 15, 2014, http://live.washingtonpost.com/nsa-surveillance-bart-gellman.html; and Laura Poitras’s documentary film, CitizenFour, 2014. For critical views of Snowden, see Fred Kaplan, “Why Snowden Won’t (and Shouldn’t) Get Clemency,” Slate, Jan. 3, 2014, http://www.slate.com/articles/news_and_politics/war_stories/2014/01/edward_snowden_doesn_t_deserve_clemency_the_nsa_leaker_hasn_t_proved_he.html; Mark Hosenball, “NSA Memo Confirms Snowden Scammed Passwords from Colleagues,” Reuters, Feb. 13, 2014, http://www.reuters.com/article/2014/02/13/us-usa-security-idUSBREA1C1MR20140213; George Packer, “The Errors of Edward Snowden and Glenn Greenwald,” Prospect, May 22, 2014, http://www.prospectmagazine.co.uk/features/the-errors-of-edward-snowden-and-glenn-greenwald.


pages: 324 words: 106,699

Permanent Record by Edward Snowden

A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Berlin Wall, call centre, Chelsea Manning, cloud computing, cognitive dissonance, company town, disinformation, drone strike, Edward Snowden, Fall of the Berlin Wall, Free Software Foundation, information security, it's over 9,000, job-hopping, John Perry Barlow, Julian Assange, Laura Poitras, Mark Zuckerberg, McMansion, Neal Stephenson, Occupy movement, off-the-grid, operational security, pattern recognition, peak oil, pre–internet, Rubik’s Cube, Silicon Valley, Skype, Snow Crash, sovereign wealth fund, surveillance capitalism, trade route, WikiLeaks, zero day

As I narrowed down my list of potential partners, I realized I’d been going about this all wrong, or just wastefully. Instead of trying to select the journalists on my own, I should have been letting the system that I was trying to expose select them for me. My best partners, I decided, would be journalists whom the national security state had already targeted. Laura Poitras I knew as a documentarian, primarily concerned with America’s post-9/11 foreign policy. Her film My Country, My Country depicted the 2005 Iraqi national elections that were conducted under (and frustrated by) the US occupation. She had also made The Program, about the NSA cryptanalyst William Binney—who had raised objections through proper channels about TRAILBLAZER, the predecessor of STELLARWIND, only to be accused of leaking classified information, subjected to repeated harassment, and arrested at gunpoint in his home, though never charged.

I’d briefly jam a network, causing its legitimate users to be booted off-line; in their attempt to reconnect, they’d automatically rebroadcast their “authentication packets,” which I could intercept and effectively decipher into passwords that would let me log on just like any other “authorized” user. With this network map in hand, I’d drive around Oahu like a madman, trying to check my email to see which of the journalists had replied to me. Having made contact with Laura Poitras, I’d spend much of the evening writing to her—sitting behind the wheel of my car at the beach, filching the Wi-Fi from a nearby resort. Some of the journalists I’d chosen needed convincing to use encrypted email, which back in 2012 was a pain. In some cases, I had to show them how, so I’d upload tutorials—sitting in my idling car in a parking lot, availing myself of the network of a library.

I’d had a plan—I’d had multiple plans—in which a single mistake would have meant getting caught, and yet I hadn’t been: I’d made it out of the NSA, I’d made it out of the country. I had beaten the game. By every standard I could imagine, the hard part was over. But my imagination hadn’t been good enough, because the journalists I’d asked to come meet me weren’t showing up. They kept postponing, giving excuses, apologizing. I knew that Laura Poitras—to whom I’d already sent a few documents and the promise of many more—was ready to fly anywhere from New York City at a moment’s notice, but she wasn’t going to come alone. She was busy trying to get Glenn Greenwald to commit, trying to get him to buy a new laptop that he wouldn’t put online. Trying to get him to install encryption programs so we could better communicate.


pages: 253 words: 75,772

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald

air gap, airport security, anti-communist, Cass Sunstein, Chelsea Manning, cognitive dissonance, David Brooks, Edward Snowden, false flag, Gabriella Coleman, Julian Assange, Laura Poitras, Mark Zuckerberg, Occupy movement, off-the-grid, operational security, Panopticon Jeremy Bentham, Rubik’s Cube, Seymour Hersh, Silicon Valley, Skype, Ted Kaczynski, WikiLeaks

On April 18, I flew from my home in Rio de Janeiro to New York, where I was scheduled to give some talks on the dangers of government secrecy and civil liberties abuses done in the name of the War on Terror. On landing at JFK Airport, I saw that I had an email message from Laura Poitras, the documentary filmmaker, which read: “Any chance you’ll be in the US this coming week? I’d love to touch base about something, though best to do in person.” I take seriously any message from Laura Poitras. One of the most focused, fearless, and independent individuals I’ve ever known, she has made film after film in the riskiest of circumstances, with no crew or the support of a news organization, just a modest budget, one camera, and her determination.

Snowden’s fearlessness and unbreakable tranquility—grounded in the conviction that he was doing the right thing—drove all the reporting I did on this story, and will profoundly influence me for the rest of my life. The impact this story had would have been impossible without my incomparably brave and brilliant journalistic partner and friend, Laura Poitras. Despite years of harassment at the hands of the US government for the films she made, she never once hesitated in pursuing this story aggressively. Her insistence on personal privacy, her aversion to the public spotlight, has sometimes obscured how indispensable she has been to all of the reporting we were able to do.


pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous by Gabriella Coleman

1960s counterculture, 4chan, Aaron Swartz, Amazon Web Services, Bay Area Rapid Transit, bitcoin, Chelsea Manning, citizen journalism, cloud computing, collective bargaining, corporate governance, creative destruction, crowdsourcing, data science, David Graeber, Debian, digital rights, disinformation, do-ocracy, East Village, Eben Moglen, Edward Snowden, false flag, feminist movement, Free Software Foundation, Gabriella Coleman, gentrification, George Santayana, Hacker News, hive mind, impulse control, information security, Jacob Appelbaum, jimmy wales, John Perry Barlow, Julian Assange, Laura Poitras, lolcat, low cost airline, mandatory minimum, Mohammed Bouazizi, Network effects, Occupy movement, Oklahoma City bombing, operational security, pirate software, power law, Richard Stallman, SETI@home, side project, Silicon Valley, Skype, SQL injection, Steven Levy, Streisand effect, TED Talk, Twitter Arab Spring, WikiLeaks, zero day

Stephen Duncombe, Dream: Re-imagining Progressive Politics in an Age of Fantasy (New York: New Press, 2007). Conclusion: Daybreak 1. Lauren Cornell, “Primary Documents” (interview with Laura Poitras), Mouse Magazine, issue 40, last accessed July 7, 2014, available at http://www.moussemagazine.it/articolo.mm?id=1020. 2. Barton Gellman and Julie Tate, “In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are,” washingtonpost.com, July 5, 2014. 3. James Risen and Laura Poitras, “N.S.A. Report Outlined Goals for More Power,” nytimes.com, Nov. 22, 2013. 4. Samuel Warren and Louis Brandeis, “The Right to Privacy” Harvard Law Review, vol.

Snowden’s decision to blow the top off the NSA (and, by extension, its British counterpart, the GCHQ) was a risky but carefully plotted act. It substantiated what privacy activists had been warning about for years, but the leaks provided them with far more solid and extensive facts on which to base their claims. Laura Poitras, one of the first three journalists to receive the NSA documents, remarked on the novelty of this situation: “The disclosures made by Snowden have lifted a curtain and revealed a vast hidden world where decisions are made and power operates in secret outside of any public oversight or consent … my vision hasn’t really changed, but what I’m able to see has vastly increased.”1 Here is but a fraction of what we we can now see: the NSA spied upon or directly surveilled thirty-eight embassies; until 2011, the NSA harvested and stored vast troves of American emails and metadata under a program called Stellar Wind; the NSA compelled tech giants to hand over data using FISA court warrants—while also covertly tapping into fiber-optic cables, like those owned by Google, to secretly siphon even more data; the NSA hacked into Al Jazeera’s internal communications systems; the GCHQ led a DDoS attack against Anonymous and hacked Belgacom, a partly state-owned Belgian telecommunications company; and under a program fittingly called Optic Nerve, the GCHQ intercepted and stored webcam images from millions of Yahoo!

users; a four-month investigation by Barton Gellman and Julie Tate demonstrated that “ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency.”2 Astonishingly, a 2012 NSA report, also included in the leaks, revealed the spy agency’s dissatisfaction with all of these accomplishments. The NSA sought to broaden its reach further by deploying an even more aggressive cyberoffensive strategy, so that they might gather data from “anyone, anytime, anywhere,” as reported by Laura Poitras and James Risen for the New York Times.3 Such aggressive and wide-ranging forms of surveillance preemptively decimate the possibility of a “right to be let alone,” to use the famous 1890 phrasing of Samuel Warren and Louis Brandeis, who were among the first to consider the legal basis of privacy.4 And the style of surveillance employed today strikes not only at the personal, exploratory private sphere deemed valuable in liberal subject formation—it also preempts many forms of association that are essential to democratic life.


pages: 50 words: 15,603

Orwell Versus the Terrorists: A Digital Short by Jamie Bartlett

augmented reality, barriers to entry, Big Tech, bitcoin, blockchain, crowdsourcing, cryptocurrency, Edward Snowden, eternal september, Ethereum, ethereum blockchain, Free Software Foundation, John Perry Barlow, Kuwabatake Sanjuro: assassination market, Laura Poitras, Mondo 2000, Satoshi Nakamoto, technoutopianism, Zimmermann PGP

Orwell versus the Terrorists Crypto-Wars and the Future of Internet Surveillance Jamie Bartlett Introduction In late 2012 the National Security Agency (NSA) contractor Edward Snowden contacted Guardian journalist Glenn Greenwald, saying he had sensitive documents about government surveillance he would like to share. In early 2013 he started sending Greenwald – along with the documentary maker Laura Poitras – evidence that revealed the extent of internet surveillance by the US, UK and other governments. In May, fearing prosecution, Snowden left the US, and flew to Hong Kong. On 5 June 2013 the Guardian published the first of what would become a long-running series of articles based on his leaked documents, followed in short order by Der Spiegel, the Washington Post, the New York Times and Le Monde, who had also received part of the cache.


pages: 302 words: 85,877

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

"World Economic Forum" Davos, 4chan, A Declaration of the Independence of Cyberspace, Andy Rubin, Apple II, autonomous vehicles, Berlin Wall, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Cambridge Analytica, Chelsea Manning, Citizen Lab, commoditize, corporate governance, digital rights, disinformation, Donald Trump, dumpster diving, Edward Snowden, end-to-end encryption, fake news, Firefox, Gabriella Coleman, Google Chrome, Haight Ashbury, independent contractor, information security, Internet of things, Jacob Appelbaum, Jason Scott: textfiles.com, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Laura Poitras, machine readable, Mark Zuckerberg, military-industrial complex, Mitch Kapor, Mondo 2000, Naomi Klein, NSO Group, Peter Thiel, pirate software, pre–internet, Ralph Nader, ransomware, Richard Stallman, Robert Mercer, Russian election interference, self-driving car, Sheryl Sandberg, side project, Silicon Valley, Skype, slashdot, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, tech worker, Whole Earth Catalog, WikiLeaks, zero day

When he felt compelled to warn the world about what his agency had been doing, Snowden first reached out anonymously to a new EFF spin-off called the Freedom of the Press Foundation, which had been formed in support of WikiLeaks by Barlow, Pentagon Papers leaker Daniel Ellsberg, Boing Boing’s Xeni Jardin, and a few EFF staffers. One of the staffers recommended Snowden get in touch with Freedom of the Press Foundation director Laura Poitras, who had been making a movie about WikiLeaks, and former Salon columnist Glenn Greenwald at the UK’s Guardian. The Guardian published many of the most important revelations from Snowden’s trove, but the pair also collaborated with other publications, including the Washington Post and the New York Times, to write up Snowden’s disclosures.

He attached his name to security research on other issues that drew wide attention, but some coauthors later complained that he had asked to be added so that he could use his fame to promote the work. Jake flouted his edginess in multiple ways, including boasting of his past work for San Francisco bondage porn site Kink.com and sexually propositioning people at first meeting, even in professional contexts. He bragged of multiple lovers and had relationships with filmmaker Laura Poitras, who later acknowledged that he had mistreated a friend of hers, as well as Boing Boing’s Xeni Jardin, a friend to several in cDc. Jake spoke of waking up in bed with Assange and two women, and he attended private sex parties (less rare in hacker culture than elsewhere). Even there, he pushed past the norms of the environment.


pages: 420 words: 100,811

We Are Data: Algorithms and the Making of Our Digital Selves by John Cheney-Lippold

algorithmic bias, bioinformatics, business logic, Cass Sunstein, centre right, computer vision, critical race theory, dark matter, data science, digital capitalism, drone strike, Edward Snowden, Evgeny Morozov, Filter Bubble, Google Chrome, Google Earth, Hans Moravec, Ian Bogost, informal economy, iterative process, James Bridle, Jaron Lanier, Julian Assange, Kevin Kelly, late capitalism, Laura Poitras, lifelogging, Lyft, machine readable, machine translation, Mark Zuckerberg, Marshall McLuhan, mass incarceration, Mercator projection, meta-analysis, Nick Bostrom, Norbert Wiener, offshore financial centre, pattern recognition, price discrimination, RAND corporation, Ray Kurzweil, Richard Thaler, ride hailing / ride sharing, Rosa Parks, Silicon Valley, Silicon Valley startup, Skype, Snapchat, software studies, statistical model, Steven Levy, technological singularity, technoutopianism, the scientific method, Thomas Bayes, Toyota Production System, Turing machine, uber lyft, web application, WikiLeaks, Zimmermann PGP

This recognition is often done through the apparatus of the state, which is how I connect citizenship to Arendt’s conception. See Alison Kesby, The Right to Have Rights: Citizenship, Humanity, and International Law (Oxford: Oxford University Press: 2012); and Hannah Arendt, The Human Condition, 2nd ed. (Chicago: University of Chicago Press, 1998). 15. Barton Gellman and Laura Poitras, “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,” Washington Post, June 6, 2013, www.washingtonpost.com. 16. John Cheney-Lippold, “Jus Algoritmi: How the NSA Remade Citizenship,” International Journal of Communications 10 (2016): 1721–1742. 17.

See antimatter15, “X-No-Wiretap—Blog,” September 2013, http://antimatter15.com. 20. Eric Holder, as cited in Glenn Greenwald and James Ball, “The Top Secret Rules That Allow NSA to Use US Data without a Warrant,” Guardian, June 20, 2013, www.theguardian.com (emphasis added). 21. Barton Gellman and Laura Poitras, “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,” Washington Post, June 6, 2013, www.washingtonpost.com. 22. Eric Holder, “Procedures Used by the National Security Agency for Targeting Non–United States Persons Reasonably Believed to Be Located outside the United States to Acquire Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as Amended,” 2009, www.aclu.org. 23.


pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

4chan, active measures, activist lawyer, air gap, Airbnb, Albert Einstein, Apollo 11, barriers to entry, Benchmark Capital, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, blood diamond, Boeing 737 MAX, Brexit referendum, Brian Krebs, Citizen Lab, cloud computing, commoditize, company town, coronavirus, COVID-19, crony capitalism, crowdsourcing, cryptocurrency, dark matter, David Vincenzetti, defense in depth, digital rights, disinformation, don't be evil, Donald Trump, driverless car, drone strike, dual-use technology, Edward Snowden, end-to-end encryption, failed state, fake news, false flag, Ferguson, Missouri, Firefox, gender pay gap, George Floyd, global pandemic, global supply chain, Hacker News, index card, information security, Internet of things, invisible hand, Jacob Appelbaum, Jeff Bezos, John Markoff, Ken Thompson, Kevin Roose, Laura Poitras, lockdown, Marc Andreessen, Mark Zuckerberg, mass immigration, Menlo Park, MITM: man-in-the-middle, moral hazard, Morris worm, move fast and break things, mutually assured destruction, natural language processing, NSO Group, off-the-grid, offshore financial centre, open borders, operational security, Parler "social media", pirate software, purchasing power parity, race to the bottom, RAND corporation, ransomware, Reflections on Trusting Trust, rolodex, Rubik’s Cube, Russian election interference, Sand Hill Road, Seymour Hersh, Sheryl Sandberg, side project, Silicon Valley, Skype, smart cities, smart grid, South China Sea, Steve Ballmer, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, TED Talk, the long tail, the scientific method, TikTok, Tim Cook: Apple, undersea cable, unit 8200, uranium enrichment, web application, WikiLeaks, zero day, Zimmermann PGP

Joe Menn at Reuters took that reporting a step further with an investigation, published that December, which revealed that NSA had paid RSA, a leading cybersecurity company, to use a weak algorithm in its commercial encryption products that the NSA could break. The vast majority of reporting on how the NSA and GCHQ are capturing data in transit and from the end points came from the Snowden documents and was first reported by Glenn Greenwald, then at the Guardian, Barton Gellman, and Laura Poitras, for the Washington Post. Subsequent reporting by Poitras also appeared in Der Spiegel, with Marcel Rosenbach and Holger Stark. My colleagues James Glanz, Andrew Lehren, and Jeff Larson, then of ProPublica, wrote an account of how the NSA and its Five Eyes partners tap data from mobile apps in January 2014.

The Intercept’s Ryan Gallagher and Peter Maass detailed the NSA’s move to hack IT System administrators in 2014, “Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators.” The most comprehensive account of AT&T’s work with NSA was written by Julia Angwin, Charlie Savage, Jeff Larson, Henrik Moltke, Laura Poitras, and James Risen in their 2015 collaboration for the New York Times, “AT&T Helped U.S. Spy on Internet on a Vast Scale.” Barton Gellman and Ellen Nakashima provided the most granular look at the NSA’s offensive cyber operations in their 2013 Washington Post piece “U.S. Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show.”

The first Snowden leaks of the NSA’s Prism project appeared in June 2013 in the Guardian, which described Prism as a “team sport” between tech companies and the FBI, CIA, and NSA: Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps into User Data of Apple, Google and Others,” June 7, 2013. One month later, Greenwald, MacAskill, Laura Poitras, Spencer Ackerman, and Dominic Rushe reported that Microsoft was giving the NSA access to encrypted messages: “Microsoft Handed the NSA Access to Encrypted Messages,” Guardian, July 12, 2013. My colleague Claire Cain Miller and I reported on the aftermath for the technology companies, as officials overseas threatened to “Balkanize” the internet: “N.S.A.


pages: 394 words: 117,982

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger

active measures, air gap, autonomous vehicles, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Bletchley Park, British Empire, call centre, Cambridge Analytica, Cass Sunstein, Chelsea Manning, computer age, cryptocurrency, cuban missile crisis, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, Google Chrome, Google Earth, information security, Jacob Appelbaum, John Markoff, Kevin Roose, Laura Poitras, Mark Zuckerberg, MITM: man-in-the-middle, mutually assured destruction, off-the-grid, RAND corporation, ransomware, Sand Hill Road, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Skype, South China Sea, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, Tim Cook: Apple, too big to fail, Twitter Arab Spring, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

the existence of the NSA program: Barton Gellman and Laura Poitras, “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,” Washington Post, June 7, 2016, www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html. Mark Zuckerberg posted a heated defense: Mark Zuckerberg, Facebook post, June 7, 2013, www.facebook.com/zuck/posts/10100828955847631. a long history of cooperation: Julia Angwin, Charlie Savage, Jeff Larson, Henrik Moltke, Laura Poitras, James Risen, “AT&T Helped U.S.


pages: 389 words: 111,372

Raising Lazarus: Hope, Justice, and the Future of America’s Overdose Crisis by Beth Macy

2021 United States Capitol attack, Affordable Care Act / Obamacare, Bernie Sanders, big-box store, Black Lives Matter, coronavirus, COVID-19, critical race theory, crowdsourcing, defund the police, Donald Trump, drug harm reduction, Easter island, fake news, Haight Ashbury, half of the world's population has never made a phone call, knowledge economy, labor-force participation, Laura Poitras, liberation theology, mandatory minimum, mass incarceration, medical malpractice, medical residency, mutually assured destruction, New Journalism, NSO Group, obamacare, off grid, opioid epidemic / opioid crisis, Overton Window, pill mill, Ponzi scheme, QAnon, RAND corporation, rent-seeking, Ronald Reagan, shareholder value, single-payer health, social distancing, The Chicago School, Upton Sinclair, working poor, working-age population, Y2K, zero-sum game

Kapler, a slight blonde, had spotted someone surveilling the group outside of Goldin’s apartment in Brooklyn. In the following weeks she saw him again twice, including outside her own apartment in another neighborhood. When her companion started videoing him, he fled. “He looked like a big old Staten Island guy,” said Goldin, who sought advice from filmmaker Laura Poitras, whose national security reporting had won an Academy Award and who was working on a documentary about PAIN. “It was very scary,” Goldin said. “At one point, I went and stayed with somebody else.” Quinn feared that the moment the Sacklers secured legal immunity, they would sue his clients. He, too, had been spooked by the presence of a man walking outside his family home in ten-degree weather with a flashlight—in New York’s Hudson Valley, where he’d retreated when the pandemic hit.

Van Rooyan had spent several years following his death petitioning and calling on the FDA to restrict OxyContin use to severe pain only, but her efforts were thwarted repeatedly. “Having to make that video really put me back into a funk,” she told the group. “But today, for me at least, my soul feels like it’s flying.” Flanked by her assistants (and with Laura Poitras’s documentary crew filming from the sidelines), Nan Goldin watched the hearing in her apartment, frantically texting her cohorts every time an official landed a blow. “The world is hearing us, finally,” she said. Quinn encouraged them to emphasize to reporters they spoke with how “good it was that there was bipartisan hatred of the Sacklers.”


pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman

23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, Alvin Toffler, Apollo 11, Apollo 13, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Boston Dynamics, Brian Krebs, business process, butterfly effect, call centre, Charles Lindbergh, Chelsea Manning, Citizen Lab, cloud computing, Cody Wilson, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, data science, Dean Kamen, deep learning, DeepMind, digital rights, disinformation, disintermediation, Dogecoin, don't be evil, double helix, Downton Abbey, driverless car, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, Firefox, Flash crash, Free Software Foundation, future of work, game design, gamification, global pandemic, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, Hacker News, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Joi Ito, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Kiva Systems, knowledge worker, Kuwabatake Sanjuro: assassination market, Large Hadron Collider, Larry Ellison, Laura Poitras, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, low earth orbit, M-Pesa, machine translation, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, MITM: man-in-the-middle, mobile money, more computing power than Apollo, move fast and break things, Nate Silver, national security letter, natural language processing, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, offshore financial centre, operational security, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, printed gun, RAND corporation, ransomware, Ray Kurzweil, Recombinant DNA, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Ross Ulbricht, Russell Brand, Salesforce, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, SimCity, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, SoftBank, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, subscription business, supply-chain management, synthetic biology, tech worker, technological singularity, TED Talk, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, the long tail, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Virgin Galactic, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, you are the product, zero day

Of course, there have also been widespread allegations of hacking by the United States against the rest of the world, based largely on the numerous classified documents stolen and unilaterally released by the former National Security Agency (NSA) contractor Edward Snowden beginning in June 2013. Snowden detailed at great length the global technical surveillance apparatus run by the National Security Agency and provided documentary evidence to support his claims in discussions with the journalists Glenn Greenwald and Laura Poitras. Programs such as PRISM and XKeyscore subsequently came to light, as did the NSA’s purported ability to track billions of e-mails, phone messages, chat sessions, and SMS texts each and every day. While living in Moscow, Russia, under temporary asylum status, Snowden continued to catalog U.S. offensive cyber and technical operations, including the tapping of the personal mobile phones belonging to world leaders ranging from the German chancellor Angela Merkel to the Brazilian president Dilma Rousseff.

Arkin, “A Hidden World, Growing Beyond Control,” Washington Post, July 19, 2010; James Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, March 15, 2012. 59 Given the exponential growth: Dan Nosowitz, “Every Six Hours, the NSA Gathers as Much Data as Is Stored in the Entire Library of Congress,” Popular Science, May 10, 2011. 60 In response, the government: Bamford, “NSA Is Building the Country’s Biggest Spy Center.” 61 NSA’s PRISM program allowed: Timothy B. Lee, “Here’s Everything We Know About PRISM to Date,” Washington Post, June 12, 2013. 120 Snowden also revealed: James Risen and Laura Poitras, “N.S.A. Gathers Data on Social Connections of U.S. Citizens,” New York Times, Sept. 28, 2013. 62 These network graphs: Barton Gellman and Ashkan Soltani, “NSA Collects Millions of E-mail Address Books Globally,” Washington Post, Nov. 1, 2013. 63 Not only did the NSA: Barton Gellman and Ashkan Soltani, “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say,” Washington Post, Nov. 1, 2013. 64 Using the same basic techniques: Floor Boon, Steven Derix, and Huib Modderkolk, “NSA Infected 50,000 Computer Networks with Malicious Software,” Nrc.​nl, Nov. 23, 2013. 65 The agency even posed as Facebook: Dustin Volz, “The NSA Is Using Facebook to Hack into Your Computer,” National Journal, March 12, 2014. 66 Together, the agencies participated: Spencer Ackerman and James Ball, “Optic Nerve: Millions of Yahoo Webcam Images Intercepted by GCHQ,” Guardian, Feb. 27, 2014. 67 For example, the spy agency: Ashkan Soltani, Rea Peterson, and Barton Gellman, “NSA Uses Google Cookies to Pinpoint Targets for Hacking,” Washington Post, Dec. 10, 2013. 68 According to Snowden, the NSA: James Larson, Jeff Glanz, and Andrew W.

Study,” Engadget, Dec. 11, 2005. 45 In Germany in 2008: Kim Zetter, “Hackers Publish German Minister’s Fingerprint,” Wired, March 31, 2008; Cory Doctorow, “Hackers Publish Thousands of Copies of Fingerprint of German Minister Who Promotes Fingerprint Biometrics,” Boing Boing, April 1, 2008. 46 Lin paid doctors: Stuart Fox, “Chinese Woman Surgically Switches Fingerprints to Evade Japanese Immigration Officers,” Popular Science, Dec. 8, 2009. 47 Japanese police report: “Japan ‘Fake Fingerprints’ Arrest,” BBC, Dec. 7, 2009. 48 Lewis created the first-ever: Kelly Jackson Higgins, “Black Hat Researcher Hacks Biometric System,” Dark Reading, March 31, 2008. 49 Back in today’s world: Mark Brown, “Japanese Billboard Recognises Age and Gender,” Wired UK, Sept. 23, 2010. 50 If one is detected: Natasha Singer, “When No One Is Just a Face in the Crowd,” New York Times, Feb. 1, 2014. 51 A similar system: Barbara De Lollis, “Houston Hilton Installs Facial Recognition,” USA Today, Oct. 1, 2010. 52 They might: “Biometric Surveillance Means Someone Is Always Watching,” Newsweek, April 17, 2014. 53 Facial-recognition technologies: Ibid. 54 All the major Internet companies: Darren Murph, “Face.​com Acquired by Facebook for an Estimated $80 Million+, Facial Tagging Clearly at the Forefront,” Engadget, June 18, 2012. 55 Facebook’s automatic: Adam Clark Estes, “Facebook’s Doing Face Recognition Again and This Time America Doesn’t Seem to Mind,” Motherboard, Feb. 5, 2013. 56 More than a quarter of a trillion: Adi Robertson, “Facebook Users Have Uploaded a Quarter-Trillion Photos Since the Site’s Launch,” Verge, Sept. 17, 2013; “Biometrics and the Future of Identification,” NOVA Next, accessed Aug. 6, 2014. 57 In his series of revelations: “How Spy Scandal Unravelled,” BBC News, Nov. 7, 2013. 58 “facial recognition quality”: James Risen and Laura Poitras, “N.S.A. Collecting Millions of Faces from Web Images,” New York Times, May 31, 2014. 59 When facial-recognition is combined: Sebastian Anthony, “UK, the World’s Most Surveilled State, Begins Using Automated Face Recognition to Catch Criminals,” ExtremeTech, July 17, 2014. 60 The program that makes this: Steve Henn, “9/11’s Effect on Tech,” Marketplace.​org, Sept. 8, 2011; Tim Greene, “Black Hat: System Links Your Face to Your Social Security Number and Other Private Things,” Network World, Aug. 1, 2011. 61 In mid-2011: Amir Efrati, “Google Acquires Facial Recognition Technology Company,” Digits (blog), Wall Street Journal, July 22, 2011; Kit Eaton, “How Google’s New Face Recognition Tech Could Change the Web’s Future,” Fast Company, July 25, 2011. 62 NameTag allows users: Simson Garfinkel, “Google Glass Will Be a Huge Success—Unless People Find It Creepy,” MIT Technology Review, Feb. 17, 2014; Kashmir Hill, “Google Glass Facial Recognition App Draws Senator Franken’s Ire,” Forbes, Feb. 5, 2014. 63 Such facial-recognition apps: Michelle Starr, “Facial Recognition App Matches Strangers to Online Profiles,” CNET, Jan. 7, 2014. 64 The FBI’s billion-dollar: Jeremy Hsu, “FBI’s Facial Recognition Database Will Include Non-criminals,” IEEE Spectrum, April 16, 2014; Mark Rockwell, “Details Emerge on Scope of FBI’s Identification System,” FCW, April 15, 2014. 65 Not only can the system: Sara Reardon, “FBI Launches $1 Billion Face Recognition Project,” New Scientist, Sept. 7, 2012. 66 Of course no biometric technology: Adam Goldman, “More Than 1 Million People Are Listed in U.S.


pages: 268 words: 76,702

The System: Who Owns the Internet, and How It Owns Us by James Ball

"World Economic Forum" Davos, behavioural economics, Big Tech, Bill Duvall, bitcoin, blockchain, Cambridge Analytica, Chelsea Manning, cryptocurrency, digital divide, don't be evil, Donald Trump, Douglas Engelbart, Edward Snowden, en.wikipedia.org, fake news, financial engineering, Firefox, Frank Gehry, Internet of things, invention of movable type, Jeff Bezos, jimmy wales, John Gilmore, John Perry Barlow, Julian Assange, Kickstarter, Laura Poitras, Leonard Kleinrock, lock screen, Marc Andreessen, Mark Zuckerberg, Menlo Park, military-industrial complex, Minecraft, Mother of all demos, move fast and break things, Network effects, Oculus Rift, packet switching, patent troll, Peter Thiel, pre–internet, ransomware, RFC: Request For Comment, risk tolerance, Ronald Reagan, Rubik’s Cube, self-driving car, Shoshana Zuboff, Silicon Valley, Silicon Valley startup, Skype, Snapchat, Steve Crocker, Stuxnet, surveillance capitalism, systems thinking, The Chicago School, the long tail, undersea cable, uranium enrichment, WikiLeaks, yield management, zero day

Having failed to get him they then even roused their colleagues in MI5 to wake UK-based Guardian staff to see if any could overrule Gibson. None could. The story ran and immediately led bulletin after bulletin. And then the next day came another, then another – and then that Sunday, Edward Snowden revealed himself to the world in a video interview with Greenwald, MacAskill and film-maker Laura Poitras. Given he had worked for them, Snowden knew the meaning and contents of what he handed over on the USA’s intelligence agencies. But he had suspected the UK’s agencies would be doing much the same, so had taken classified internal documents (routinely shared with the US) from the UK’s GCHQ (short for Government Communications Headquarters) signals intelligence agency which he handed over to MacAskill in Hong Kong, before destroying everything still in his possession and attempting to flee to Ecuador – only to get stuck in Moscow, where he still resides.


pages: 743 words: 201,651

Free Speech: Ten Principles for a Connected World by Timothy Garton Ash

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Aaron Swartz, activist lawyer, Affordable Care Act / Obamacare, Andrew Keen, Apple II, Ayatollah Khomeini, battle of ideas, Berlin Wall, bitcoin, British Empire, Cass Sunstein, Chelsea Manning, citizen journalism, Citizen Lab, Clapham omnibus, colonial rule, critical race theory, crowdsourcing, data science, David Attenborough, digital divide, digital rights, don't be evil, Donald Davies, Douglas Engelbart, dual-use technology, Edward Snowden, Etonian, European colonialism, eurozone crisis, Evgeny Morozov, failed state, Fall of the Berlin Wall, Ferguson, Missouri, Filter Bubble, financial independence, Firefox, Galaxy Zoo, George Santayana, global village, Great Leap Forward, index card, Internet Archive, invention of movable type, invention of writing, Jaron Lanier, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Laura Poitras, machine readable, machine translation, Mark Zuckerberg, Marshall McLuhan, Mary Meeker, mass immigration, megacity, mutually assured destruction, national security letter, Nelson Mandela, Netflix Prize, Nicholas Carr, obamacare, Open Library, Parler "social media", Peace of Westphalia, Peter Thiel, power law, pre–internet, profit motive, public intellectual, RAND corporation, Ray Kurzweil, Ronald Reagan, semantic web, Sheryl Sandberg, Silicon Valley, Simon Singh, Snapchat, social graph, Stephen Fry, Stephen Hawking, Steve Jobs, Steve Wozniak, Streisand effect, technological determinism, TED Talk, The Death and Life of Great American Cities, The Wisdom of Crowds, Tipper Gore, trolley problem, Turing test, We are Anonymous. We are Legion, WikiLeaks, World Values Survey, Yochai Benkler, Yom Kippur War, yottabyte

The proceedings, like all Ditchley conferences, were held under the Chatham House Rule (nothing may be attributed to any identifiable individual), but a good summary is given in this note by the foundation’s director: ‘Intelligence, Security and Privacy’, http://perma.cc/5S5T-7VF5 54. see the chapter by Sudha Setty in Cole et al., eds. 2013, 57–71; this detail is on 68 55. see the chapter by Shiri Krebs in Cole et al., eds. 2013, 133–53 56. see the footage from his hotel room in Hong Kong in Laura Poitras’s documentary film ‘Citizenfour’ 57. Harding 2014, 182 58. see Joss Wright, ‘How Can You Tell What’s Banned on the Internet?’, Free Speech Debate, http://freespeechdebate.com/en/discuss/how-free-is-the-internet-in-liberal-democracies/ 59. Kohn 2011, 201–12 60. Clarke et al. 2014, 225 61. SEC: Office of the Whistleblower, http://perma.cc/5DNQ-CZVB 62.

See also Margaret Sullivan, ‘The Disconnect on Anonymous Sources’, New York Times, 12 October 2013, http://www.nytimes.com/2013/10/13/opinion/sunday/the-public-editor-the-disconnect-on-anonymous-sources.html, which reports that back in 2004 the use of anonymous sources had been the top concern of Times readers 82. see Margaret Sullivan, ‘The Disconnect on Anonymous Sources’, New York Times, 12 October 2013, http://www.nytimes.com/2013/10/13/opinion/sunday/the-public-editor-the-disconnect-on-anonymous-sources.html?_r=0 83. see the footage from his hotel room in Hong Kong in Laura Poitras’s documentary film ‘Citizenfour’ at 1:03:37. Similarly, you can watch on freespeechdebate.com an interview with Thomas Drake, the earlier NSA whistleblower. If you do not conclude after watching that video—and then, if you want more, reading everything you can about him—that here was a patriotic, public-spirited person, grotesquely mistreated as a result, then you and I have different eyes.


pages: 301 words: 85,263

New Dark Age: Technology and the End of the Future by James Bridle

AI winter, Airbnb, Alfred Russel Wallace, AlphaGo, Anthropocene, Automated Insights, autonomous vehicles, back-to-the-land, Benoit Mandelbrot, Bernie Sanders, bitcoin, Boeing 747, British Empire, Brownian motion, Buckminster Fuller, Cambridge Analytica, Capital in the Twenty-First Century by Thomas Piketty, carbon footprint, coastline paradox / Richardson effect, cognitive bias, cognitive dissonance, combinatorial explosion, computer vision, congestion charging, cryptocurrency, data is the new oil, disinformation, Donald Trump, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, Dr. Strangelove, drone strike, Edward Snowden, Eyjafjallajökull, Fairchild Semiconductor, fake news, fear of failure, Flash crash, fulfillment center, Google Earth, Greyball, Haber-Bosch Process, Higgs boson, hive mind, income inequality, informal economy, Internet of things, Isaac Newton, ITER tokamak, James Bridle, John von Neumann, Julian Assange, Kickstarter, Kim Stanley Robinson, Large Hadron Collider, late capitalism, Laura Poitras, Leo Hollis, lone genius, machine translation, mandelbrot fractal, meta-analysis, Minecraft, mutually assured destruction, natural language processing, Network effects, oil shock, p-value, pattern recognition, peak oil, recommendation engine, road to serfdom, Robert Mercer, Ronald Reagan, security theater, self-driving car, Seymour Hersh, Silicon Valley, Silicon Valley ideology, Skype, social graph, sorting algorithm, South China Sea, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, stem cell, Stuxnet, technoutopianism, the built environment, the scientific method, Uber for X, undersea cable, University of East Anglia, uranium enrichment, Vannevar Bush, warehouse robotics, WikiLeaks

Code words multiplied, becoming a kind of sinister poetry: TEMPORA, MUSCULAR, MYSTIC, BLARNEY and BOUNDLESS INFORMANT; NOSEY SMURF, HIDDEN OTTER, CROUCHING SQUIRREL, BEARDED PIGGY and SQUEAKY DOLPHIN. Ultimately, these endless lists come to obscure the practical reality of a global surveillance system that is irreducible to its component parts. As Edward Snowden wrote in his first email to the filmmaker Laura Poitras, ‘Know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.’25 But what remains most striking, just a few years after the revelations, is ultimately not their extent, but how obvious they should have been – and how little has changed.


pages: 318 words: 82,452

The End of Policing by Alex S. Vitale

Affordable Care Act / Obamacare, anti-communist, Black Lives Matter, Broken windows theory, citizen journalism, Columbine, deindustrialization, desegregation, Donald Trump, drug harm reduction, Edward Snowden, equal pay for equal work, Ferguson, Missouri, gentrification, ghettoisation, hiring and firing, Housing First, illegal immigration, immigration reform, income inequality, independent contractor, Laura Poitras, mandatory minimum, mass immigration, mass incarceration, moral panic, Occupy movement, open borders, open immigration, rent-seeking, Ronald Reagan, San Francisco homelessness, strikebreaker, The Bell Curve by Richard Herrnstein and Charles Murray, traumatic brain injury, white flight

Miller also highlights the troubling practices of detaining and searching US citizens because of their political, academic, and journalistic activities. Agents have watchlists; people on these lists can be arrested and interrogated and have their electronic possessions seized when crossing the border. The journalist and filmmaker Laura Poitras was detained multiple times after she worked with whistleblower Edward Snowden and produced a film called My Country, My Country, which criticizes US policy in the Middle East. American scholars of Islam and the Middle East have been accused of terrorism, detained without lawyers, and had their personal and electronic possessions searched and seized without a warrant.


pages: 295 words: 84,843

There's a War Going on but No One Can See It by Huib Modderkolk

AltaVista, ASML, Berlin Wall, Big Tech, call centre, COVID-19, disinformation, Donald Trump, drone strike, Edward Snowden, end-to-end encryption, Evgeny Morozov, fake news, Fall of the Berlin Wall, Firefox, Google Chrome, information security, Jacob Appelbaum, John Markoff, Julian Assange, Laura Poitras, machine translation, millennium bug, NSO Group, ransomware, Skype, smart meter, speech recognition, Stuxnet, undersea cable, unit 8200, uranium enrichment, WikiLeaks, zero day

From there, we used a chat program with end-to-end encryption. This, we hoped, would let us get closer to the right people. * From the Netherlands we took the autobahn to Hamburg, where Der Spiegel occupies a vast, shimmering edifice on a branch of the Norderelbe. The German newspaper had been working with Laura Poitras, an American documentary filmmaker. It was to her and the American journalist Glenn Greenwald that Edward Snowden handed over those thousands of secret NSA files in Hong Kong. Poitras in turn shared them with Der Spiegel, and now we had invited ourselves to the paper’s head office in the hope that they might want to collaborate on the Dutch angle.


pages: 326 words: 103,170

The Seventh Sense: Power, Fortune, and Survival in the Age of Networks by Joshua Cooper Ramo

air gap, Airbnb, Alan Greenspan, Albert Einstein, algorithmic trading, barriers to entry, Berlin Wall, bitcoin, Bletchley Park, British Empire, cloud computing, Computing Machinery and Intelligence, crowdsourcing, Danny Hillis, data science, deep learning, defense in depth, Deng Xiaoping, drone strike, Edward Snowden, Fairchild Semiconductor, Fall of the Berlin Wall, financial engineering, Firefox, Google Chrome, growth hacking, Herman Kahn, income inequality, information security, Isaac Newton, Jeff Bezos, job automation, Joi Ito, Laura Poitras, machine translation, market bubble, Menlo Park, Metcalfe’s law, Mitch Kapor, Morris worm, natural language processing, Neal Stephenson, Network effects, Nick Bostrom, Norbert Wiener, Oculus Rift, off-the-grid, packet switching, paperclip maximiser, Paul Graham, power law, price stability, quantitative easing, RAND corporation, reality distortion field, Recombinant DNA, recommendation engine, Republic of Letters, Richard Feynman, road to serfdom, Robert Metcalfe, Sand Hill Road, secular stagnation, self-driving car, Silicon Valley, Skype, Snapchat, Snow Crash, social web, sovereign wealth fund, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, superintelligent machines, systems thinking, technological singularity, The Coming Technological Singularity, The Wealth of Nations by Adam Smith, too big to fail, Vernor Vinge, zero day

And it’s not just lone teen hackers: Wael Khalifa, Kenneth Revett, and Abdel-Badeeh Salem, “In the Hacker’s Eye: The Neurophysiology of a Computer Hacker,” in Global Security, Safety and Sustainability & e-Democracy, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Berlin: Springer Verlag, 2012), 112–19. “Surprising realization”: Thomas Dullien, “Offensive Work and Addiction: Why Offense Is Hard to Contain” (speech, ISACA Nordic Conference, Oslo, April 8, 2014). “I remember what the Internet was like”: Snowden interview in the film Citizenfour, dir. Laura Poitras (2014). They will know and design: Nikos Virvilis, Dimitris Gritzalis, and Theodoros Apostolopoulos, “Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?” Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing (Washington, DC: IEEE Computer Society, 2013), 396–403.


pages: 372 words: 109,536

The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money by Frederik Obermaier

air gap, banking crisis, blood diamond, book value, credit crunch, crony capitalism, Deng Xiaoping, Edward Snowden, family office, Global Witness, high net worth, income inequality, Jeremy Corbyn, Kickstarter, Laura Poitras, liquidationism / Banker’s doctrine / the Treasury view, mega-rich, megaproject, Mikhail Gorbachev, mortgage debt, Nelson Mandela, offshore financial centre, optical character recognition, out of africa, race to the bottom, vertical integration, We are the 99%, WikiLeaks

Whoever leaked these papers to me also spotted Roldugin’s name, and he or she is worried. Probably with good reason. [Obermayer]: Who are you? [john doe]: I’m no one. Just a concerned citizen. This is a clear reference to the whistle-blower Edward Snowden, who called himself ‘Citizen Four’ when he made contact with the journalist and filmmaker Laura Poitras. Snowden has been trapped in Moscow since fleeing from Hong Kong. [Obermayer]: Why are you doing this? [john doe]: I want you to report on the material and to make these crimes public. This story could rival the Snowden documents in importance but you’re publishing in German. You need to partner with the New York Times or a similar caliber English paper.


pages: 422 words: 104,457

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance by Julia Angwin

AltaVista, Ayatollah Khomeini, barriers to entry, bitcoin, Chelsea Manning, Chuck Templeton: OpenTable:, clean water, crowdsourcing, cuban missile crisis, data is the new oil, David Graeber, Debian, disinformation, Edward Snowden, Filter Bubble, Firefox, Free Software Foundation, Garrett Hardin, GnuPG, Google Chrome, Google Glasses, Ida Tarbell, incognito mode, informal economy, Jacob Appelbaum, John Gilmore, John Markoff, Julian Assange, Laura Poitras, Marc Andreessen, market bubble, market design, medical residency, meta-analysis, mutually assured destruction, operational security, Panopticon Jeremy Bentham, prediction markets, price discrimination, randomized controlled trial, RFID, Robert Shiller, Ronald Reagan, security theater, Silicon Valley, Silicon Valley startup, Skype, smart meter, sparse data, Steven Levy, Tragedy of the Commons, Upton Sinclair, WikiLeaks, Y2K, zero-sum game, Zimmermann PGP

In 2006, the Baltimore Sun published an article: Siobhan Gorman, “NSA Rejected System That Sifted Phone Data Legally,” Baltimore Sun, May 18, 2006, http://articles.baltimoresun.com/2006-05-18/news/0605180094_1_surveillance-national-security-agency-well-informed. On July 26, 2007, the FBI: William Binney, in discussion with author, May 24, 2012. “The guy came in and pointed a gun at me”: Laura Poitras, “Surveillance Teach-In,” April 20, 2012, http://whitney.org/WatchAndListen/Exhibitions?play_id=722. Wiebe, who had retired: William Binney, Kirk Wiebe, and Thomas Drake, in discussion with author, May 24, 2012. On November 28, 2007: Thomas Drake, in discussion with author, May 24, 2012. Two and a half years later, Drake was indicted: United States v.


pages: 349 words: 114,038

Culture & Empire: Digital Revolution by Pieter Hintjens

4chan, Aaron Swartz, airport security, AltaVista, anti-communist, anti-pattern, barriers to entry, Bill Duvall, bitcoin, blockchain, Boeing 747, bread and circuses, business climate, business intelligence, business process, Chelsea Manning, clean water, commoditize, congestion charging, Corn Laws, correlation does not imply causation, cryptocurrency, Debian, decentralized internet, disinformation, Edward Snowden, failed state, financial independence, Firefox, full text search, gamification, German hyperinflation, global village, GnuPG, Google Chrome, greed is good, Hernando de Soto, hiring and firing, independent contractor, informal economy, intangible asset, invisible hand, it's over 9,000, James Watt: steam engine, Jeff Rulifson, Julian Assange, Kickstarter, Laura Poitras, M-Pesa, mass immigration, mass incarceration, mega-rich, military-industrial complex, MITM: man-in-the-middle, mutually assured destruction, Naomi Klein, national security letter, Nelson Mandela, new economy, New Urbanism, no silver bullet, Occupy movement, off-the-grid, offshore financial centre, packet switching, patent troll, peak oil, power law, pre–internet, private military company, race to the bottom, real-name policy, rent-seeking, reserve currency, RFC: Request For Comment, Richard Feynman, Richard Stallman, Ross Ulbricht, Russell Brand, Satoshi Nakamoto, security theater, selection bias, Skype, slashdot, software patent, spectrum auction, Steve Crocker, Steve Jobs, Steven Pinker, Stuxnet, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, trade route, transaction costs, twin studies, union organizing, wealth creators, web application, WikiLeaks, Y2K, zero day, Zipf's Law

Other whistle blowers of note are Annie Machon, Gareth Williams, Russel Tice, Jeffrey Sterling, Stephen Jin-Woo Kim, Jesselyn Radack, Thomas Drake, Daniel Ellsberg, and William Binney. We then have the independent media who are willing to report these documents, at personal risk. There is Julian Assange, building wikileaks.org around Manning's leaks, and Glenn Greenwald and Laura Poitras, reporting in the Guardian on Edward Snowden's leaks. Again, heroic figures who have changed the course of history. We see academics like Dr Daniele Ganser, who know their history and are immune to this particular Narrative because they have seen so many like it. They look at events over the last twenty years and they see continuation of old patterns.


pages: 397 words: 110,222

Habeas Data: Privacy vs. The Rise of Surveillance Tech by Cyrus Farivar

Apple's 1984 Super Bowl advert, autonomous vehicles, call centre, citizen journalism, cloud computing, computer age, connected car, do-ocracy, Donald Trump, Edward Snowden, en.wikipedia.org, failed state, Ferguson, Missouri, Frank Gehry, Golden Gate Park, information security, John Markoff, Laura Poitras, license plate recognition, lock screen, Lyft, national security letter, Occupy movement, operational security, optical character recognition, Port of Oakland, RAND corporation, Ronald Reagan, sharing economy, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Steven Levy, tech worker, The Hackers Conference, Tim Cook: Apple, transaction costs, uber lyft, WikiLeaks, you are the product, Zimmermann PGP

Google did not offer full-disk encryption on its Android devices either. However, everyone’s notion of security changed overnight when Edward Snowden became a household name in June 2013. Snowden, a young contractor for the NSA, leaked a trove of classified documents to two American reporters, Glenn Greenwald and Laura Poitras. (Greenwald famously almost missed the Snowden story as he found setting up encrypted e-mail too difficult.) They reported on a seemingly endless amount of materials from Snowden’s cache, describing in detail how the NSA was conducting its espionage and by what legal means. The net result was that all of a sudden journalists, activists, and even average citizens began taking these issues more seriously than ever before.


pages: 482 words: 121,173

Tools and Weapons: The Promise and the Peril of the Digital Age by Brad Smith, Carol Ann Browne

"World Economic Forum" Davos, Affordable Care Act / Obamacare, AI winter, air gap, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, augmented reality, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, Bletchley Park, Blitzscaling, Boeing 737 MAX, business process, call centre, Cambridge Analytica, Celtic Tiger, Charlie Hebdo massacre, chief data officer, cloud computing, computer vision, corporate social responsibility, data science, deep learning, digital divide, disinformation, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, Hacker News, immigration reform, income inequality, Internet of things, invention of movable type, invention of the telephone, Jeff Bezos, Kevin Roose, Laura Poitras, machine readable, Mark Zuckerberg, minimum viable product, national security letter, natural language processing, Network effects, new economy, Nick Bostrom, off-the-grid, operational security, opioid epidemic / opioid crisis, pattern recognition, precision agriculture, race to the bottom, ransomware, Ronald Reagan, Rubik’s Cube, Salesforce, school vouchers, self-driving car, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, Skype, speech recognition, Steve Ballmer, Steve Jobs, surveillance capitalism, tech worker, The Rise and Fall of American Growth, Tim Cook: Apple, Wargames Reagan, WikiLeaks, women in the workforce

., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data,” Washington Post, June 8, 2013, https://www.washingtonpost.com/world/national-security/us-company-officials-internet-surveillance-does-not-indiscriminately-mine-data/2013/06/08/5b3bb234-d07d-11e2-9f1a-1a7cdee20287_story.html?utm_term=.b5761610edb1. Back to note reference 4. Glenn Greenwald, Ewen MacAskill, and Laura Poitras, “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations,” Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance. Back to note reference 5. Michael B. Kelley, “NSA: Snowden Stole 1.7 Million Classified Documents and Still Has Access to Most of Them,” Business Insider, December 13, 2013, https://www.businessinsider.com/how-many-docs-did-snowden-take-2013-12.


pages: 470 words: 125,992

The Laundromat : Inside the Panama Papers, Illicit Money Networks, and the Global Elite by Jake Bernstein

Albert Einstein, banking crisis, Berlin Wall, bitcoin, blockchain, blood diamond, British Empire, central bank independence, Charlie Hebdo massacre, clean water, commoditize, company town, corporate governance, cryptocurrency, Deng Xiaoping, Donald Trump, Edward Snowden, fake news, Fall of the Berlin Wall, high net worth, income inequality, independent contractor, Julian Assange, Laura Poitras, liberation theology, mega-rich, Mikhail Gorbachev, new economy, offshore financial centre, optical character recognition, pirate software, Ponzi scheme, profit motive, rising living standards, Ronald Reagan, Seymour Hersh, Skype, traveling salesman, WikiLeaks

David Ford to author, August 2017. 43 even surfaced in a Swiss newspaper: François Pilet and Marie Maurisse, “David Ford, L’homme de Washington,” L’Hebdo, February 12, 2015, https://francoispilet.net/david-ford-lhomme-de-washington/. 44 Somewhere in Geneva was a covert CIA listening post: Glenn Greenwald, Ewen MacAskill, and Laura Poitras, “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations,” Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance. 45 By the end of 1953, they had devised a plan: Riggs Docs from CIA Reading Room—Secret Security Information, declassified, CIA Reading Room. 46 The island’s ruler, France-Albert René: “President Steps Down After 27 Years,” Los Angeles Times, April 15, 2004, http://articles.latimes.com/2004/apr/15/world/fg-briefs15.6. 47 fished the body of a Mafia soldier out of the swamps: The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project, Ambassador David J.


pages: 527 words: 147,690

Terms of Service: Social Media and the Price of Constant Connection by Jacob Silverman

"World Economic Forum" Davos, 23andMe, 4chan, A Declaration of the Independence of Cyberspace, Aaron Swartz, Airbnb, airport security, Amazon Mechanical Turk, augmented reality, basic income, Big Tech, Brian Krebs, California gold rush, Californian Ideology, call centre, cloud computing, cognitive dissonance, commoditize, company town, context collapse, correlation does not imply causation, Credit Default Swap, crowdsourcing, data science, deep learning, digital capitalism, disinformation, don't be evil, driverless car, drone strike, Edward Snowden, Evgeny Morozov, fake it until you make it, feminist movement, Filter Bubble, Firefox, Flash crash, game design, global village, Google Chrome, Google Glasses, Higgs boson, hive mind, Ian Bogost, income inequality, independent contractor, informal economy, information retrieval, Internet of things, Jacob Silverman, Jaron Lanier, jimmy wales, John Perry Barlow, Kevin Kelly, Kevin Roose, Kickstarter, knowledge economy, knowledge worker, Larry Ellison, late capitalism, Laura Poitras, license plate recognition, life extension, lifelogging, lock screen, Lyft, machine readable, Mark Zuckerberg, Mars Rover, Marshall McLuhan, mass incarceration, meta-analysis, Minecraft, move fast and break things, national security letter, Network effects, new economy, Nicholas Carr, Occupy movement, off-the-grid, optical character recognition, payday loans, Peter Thiel, planned obsolescence, postindustrial economy, prediction markets, pre–internet, price discrimination, price stability, profit motive, quantitative hedge fund, race to the bottom, Ray Kurzweil, real-name policy, recommendation engine, rent control, rent stabilization, RFID, ride hailing / ride sharing, Salesforce, self-driving car, sentiment analysis, shareholder value, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Snapchat, social bookmarking, social graph, social intelligence, social web, sorting algorithm, Steve Ballmer, Steve Jobs, Steven Levy, systems thinking, TaskRabbit, technological determinism, technological solutionism, technoutopianism, TED Talk, telemarketer, transportation-network company, Travis Kalanick, Turing test, Uber and Lyft, Uber for X, uber lyft, universal basic income, unpaid internship, women in the workforce, Y Combinator, yottabyte, you are the product, Zipcar

“Top 5 Ways Bleacher Report Rules the World!” 129 “emerging culture of surveillance”: David Lyon. “The Culture of Surveillance: Who’s Watching Whom, Now?” Lecture, University of Sydney. March 1, 2012. sydney.edu.au/sydney_ideas/lectures/2012/professor_david_lyon.shtml. 129 “They quite literally”: Barton Gellman and Laura Poitras. “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program.” Washington Post. June 7, 2013. washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html. 130 Utah data center: James Bamford.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

That report was the first of a trove of classified files leaked by a onetime NSA employee and contractor who had illegally downloaded thousands of files on Western surveillance programs from his workplace and then fled to China-controlled Hong Kong, where he handed over the files to journalists that included Glenn Greenwald, Laura Poitras, the New York Times, the Washington Post, and Der Spiegel. When his location in Hong Kong became public, Snowden fled to Russia, where he sought temporary asylum from Vladimir Putin. The subsequent weeks of public revelations about secret programs and Western surveillance operations caused an international uproar.


The Code: Silicon Valley and the Remaking of America by Margaret O'Mara

A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, affirmative action, Airbnb, Alan Greenspan, AltaVista, Alvin Toffler, Amazon Web Services, An Inconvenient Truth, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, autonomous vehicles, back-to-the-land, barriers to entry, Ben Horowitz, Berlin Wall, Big Tech, Black Lives Matter, Bob Noyce, Buckminster Fuller, Burning Man, business climate, Byte Shop, California gold rush, Californian Ideology, carried interest, clean tech, clean water, cloud computing, cognitive dissonance, commoditize, company town, Compatible Time-Sharing System, computer age, Computer Lib, continuous integration, cuban missile crisis, Danny Hillis, DARPA: Urban Challenge, deindustrialization, different worldview, digital divide, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Doomsday Clock, Douglas Engelbart, driverless car, Dynabook, Edward Snowden, El Camino Real, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Fairchild Semiconductor, Frank Gehry, Future Shock, Gary Kildall, General Magic , George Gilder, gig economy, Googley, Hacker Ethic, Hacker News, high net worth, hockey-stick growth, Hush-A-Phone, immigration reform, income inequality, industrial research laboratory, informal economy, information retrieval, invention of movable type, invisible hand, Isaac Newton, It's morning again in America, Jeff Bezos, Joan Didion, job automation, job-hopping, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kitchen Debate, knowledge economy, knowledge worker, Larry Ellison, Laura Poitras, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, Mary Meeker, mass immigration, means of production, mega-rich, Menlo Park, Mikhail Gorbachev, military-industrial complex, millennium bug, Mitch Kapor, Mother of all demos, move fast and break things, mutually assured destruction, Neil Armstrong, new economy, Norbert Wiener, old-boy network, Palm Treo, pattern recognition, Paul Graham, Paul Terrell, paypal mafia, Peter Thiel, pets.com, pirate software, popular electronics, pre–internet, prudent man rule, Ralph Nader, RAND corporation, Richard Florida, ride hailing / ride sharing, risk tolerance, Robert Metcalfe, ROLM, Ronald Reagan, Salesforce, Sand Hill Road, Second Machine Age, self-driving car, shareholder value, Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social graph, software is eating the world, Solyndra, speech recognition, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, supercomputer in your pocket, Susan Wojcicki, tacit knowledge, tech billionaire, tech worker, technoutopianism, Ted Nelson, TED Talk, the Cathedral and the Bazaar, the market place, the new new thing, The Soul of a New Machine, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas L Friedman, Tim Cook: Apple, Timothy McVeigh, transcontinental railway, Twitter Arab Spring, Uber and Lyft, uber lyft, Unsafe at Any Speed, upwardly mobile, Vannevar Bush, War on Poverty, Wargames Reagan, WarGames: Global Thermonuclear War, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, work culture , Y Combinator, Y2K

Nearly every other boldface tech name appeared in the cache of classified documents, but 98 percent of the data came from only three: Yahoo!, Google, and Microsoft. The NSA had been in the electronic surveillance business since its 1947 inception, but involvement of consumer tech’s biggest brands—including the “don’t be evil” empire of Page and Brin—precipitated a major scandal. See Barton Gellman and Laura Poitras, “U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program,” The Washington Post, June 7, 2013, A1. 20. Nick Wingfield, “Amazon Reports Annual Net Profit for the First Time,” The Wall Street Journal, January 28, 2004; Ron Miller, “How AWS Came to Be,” TechCrunch, July 2, 2016; Jordan Novet, “Microsoft narrows Amazon’s lead in cloud, but the gap remains large,” CNBC, April 27, 2018. 21.


pages: 712 words: 212,334

Empire of Pain: The Secret History of the Sackler Dynasty by Patrick Radden Keefe

always be closing, Apollo 11, barriers to entry, benefit corporation, Black Lives Matter, Chuck Templeton: OpenTable:, coronavirus, corporate social responsibility, COVID-19, disinformation, Donald Trump, double helix, driverless car, East Village, estate planning, facts on the ground, Laura Poitras, lockdown, mandatory minimum, mass incarceration, medical residency, moral panic, Neil Armstrong, New Journalism, Norman Mailer, offshore financial centre, opioid epidemic / opioid crisis, pill mill, plutocrats, Ralph Nader, tech billionaire, TED Talk, tontine, Upton Sinclair

At WME, I’m grateful to Tracy Fisher, Svetlana Katz, Matilda Forbes Watson, Eric Simonoff, Ben Davis, Anna DeRoy, and Christina Lee. I’m grateful also to Ravi Mirchandani and his colleagues at Picador. Thanks, for various reasons, to Rachel Aviv, Joel Lovell, Raffi Khatchadourian, Andrew Marantz, Henry Molofsky, David Grann, Tyler Foggatt, Micah Hauser, Victoria Beale, Phil Keefe, Jim Keefe, Laura Poitras, Daniel Gorman, Sravya Tadepalli, Sam Rosen, David De Jong, Naomi Fry, Nick Paumgarten, Bart Gellman, Tim Weiner, Paul DeMarco, Jennifer Kinsley, Paulina Rodríguez, Peter Smith, Pauline Peek, Scott Podolsky, David Juurlink, Andrew Kolodny, Ed Bisch, David Fein, David Segal, Larissa MacFarquhar, Jillian Fennimore, Evan Hughes, Lily Bullitt, Ed Conlon, Mark Rosenberg, Oriana Hawley, Mark Bomback, Andy Galker, Jason Burns, Dave Park, Noah Harpster, Micah Fitzerman-Blue, Will Hettinger, Eric Newman, Alex Gibney, Svetlana Zill, John Jordan, Jed Lipinski, Mike Quinn, Sarah Margon, Sarah Stillman, Ed Caesar, Sheelah Kolhatkar, Ben Taub, Gideon Lewis-Kraus, Sai Sriskandarajah, and “the Michaels,” as my kids call them: Michael Wahid Hanna and Michael Shtender-Auerbach.


pages: 745 words: 207,187

Accessory to War: The Unspoken Alliance Between Astrophysics and the Military by Neil Degrasse Tyson, Avis Lang

active measures, Admiral Zheng, airport security, anti-communist, Apollo 11, Arthur Eddington, Benoit Mandelbrot, Berlin Wall, British Empire, Buckminster Fuller, Carrington event, Charles Lindbergh, collapse of Lehman Brothers, Colonization of Mars, commoditize, corporate governance, cosmic microwave background, credit crunch, cuban missile crisis, dark matter, Dava Sobel, disinformation, Donald Trump, Doomsday Clock, Dr. Strangelove, dual-use technology, Eddington experiment, Edward Snowden, energy security, Eratosthenes, European colonialism, fake news, Fellow of the Royal Society, Ford Model T, global value chain, Google Earth, GPS: selective availability, Great Leap Forward, Herman Kahn, Higgs boson, invention of movable type, invention of the printing press, invention of the telescope, Isaac Newton, James Webb Space Telescope, Johannes Kepler, John Harrison: Longitude, Karl Jansky, Kuiper Belt, Large Hadron Collider, Late Heavy Bombardment, Laura Poitras, Lewis Mumford, lone genius, low earth orbit, mandelbrot fractal, Maui Hawaii, Mercator projection, Mikhail Gorbachev, military-industrial complex, mutually assured destruction, Neil Armstrong, New Journalism, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, operation paperclip, pattern recognition, Pierre-Simon Laplace, precision agriculture, prediction markets, profit motive, Project Plowshare, purchasing power parity, quantum entanglement, RAND corporation, Ronald Reagan, Search for Extraterrestrial Intelligence, skunkworks, South China Sea, space junk, Stephen Hawking, Strategic Defense Initiative, subprime mortgage crisis, the long tail, time dilation, trade route, War on Poverty, wikimedia commons, zero-sum game

ACLU National Security Project, “National Security: What’s at Stake,” www.aclu.org/national-security. 19.National Security Agency/Central Security Service, www.nsa.gov; “Mission and Strategy,” www.nsa.gov/about/mission-strategy (accessed Apr. 10, 2017). In April 2016, the mission was expressed as “Global Cryptologic Dominance Through Responsive Presence and Network Advantage.” 20.Re Snowden, see, e.g., Citizenfour, documentary film (dir. Laura Poitras, 2014); video interviews by the New Yorker’s Jane Mayer (2014), www.youtube.com/watch?v=fidq3jow8bc; and Harvard Law School professor Lawrence Lessig (2014), www.youtube.com/watch?v=o_Sr96TFQQE (accessed Apr. 10, 2017). Following seven months of revelations and accusations by and against Snowden, a major US newspaper contended: “The shrill brigade of his critics say Mr.


pages: 788 words: 223,004

Merchants of Truth: The Business of News and the Fight for Facts by Jill Abramson

"World Economic Forum" Davos, 23andMe, 4chan, Affordable Care Act / Obamacare, Alexander Shulgin, Apple's 1984 Super Bowl advert, barriers to entry, Bernie Madoff, Bernie Sanders, Big Tech, Black Lives Matter, Cambridge Analytica, Charles Lindbergh, Charlie Hebdo massacre, Chelsea Manning, citizen journalism, cloud computing, commoditize, content marketing, corporate governance, creative destruction, crowdsourcing, data science, death of newspapers, digital twin, diversified portfolio, Donald Trump, East Village, Edward Snowden, fake news, Ferguson, Missouri, Filter Bubble, future of journalism, glass ceiling, Google Glasses, haute couture, hive mind, income inequality, information asymmetry, invisible hand, Jeff Bezos, Joseph Schumpeter, Khyber Pass, late capitalism, Laura Poitras, Marc Andreessen, Mark Zuckerberg, move fast and break things, Nate Silver, new economy, obamacare, Occupy movement, Paris climate accords, performance metric, Peter Thiel, phenotype, pre–internet, race to the bottom, recommendation engine, Robert Mercer, Ronald Reagan, Saturday Night Live, self-driving car, sentiment analysis, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social contagion, social intelligence, social web, SoftBank, Steve Bannon, Steve Jobs, Steven Levy, tech billionaire, technoutopianism, telemarketer, the scientific method, The Wisdom of Crowds, Tim Cook: Apple, too big to fail, vertical integration, WeWork, WikiLeaks, work culture , Yochai Benkler, you are the product

He had a source at the NSA who wanted the world to know about his agency’s secret use of widespread domestic spying, aided by most major tech companies, which had been turning over private communications to the government. It was on a scale no one imagined. Gellman’s source, who turned out to be Snowden, had decided not to take his stolen documents to the New York Times, having seen them hold their earlier NSA story so long. Through filmmaker Laura Poitras, a national security expert, Snowden had also approached the Guardian, the British paper that had published Wikileaks. Gellman wanted institutional backing in the U.S., and it made sense to bring the story to his former employer. Baron had been at the Post only a few months when Gellman handed him the kind of story editors dream of.


pages: 903 words: 235,753

The Stack: On Software and Sovereignty by Benjamin H. Bratton

1960s counterculture, 3D printing, 4chan, Ada Lovelace, Adam Curtis, additive manufacturing, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, Andy Rubin, Anthropocene, augmented reality, autonomous vehicles, basic income, Benevolent Dictator For Life (BDFL), Berlin Wall, bioinformatics, Biosphere 2, bitcoin, blockchain, Buckminster Fuller, Burning Man, call centre, capitalist realism, carbon credits, carbon footprint, carbon tax, carbon-based life, Cass Sunstein, Celebration, Florida, Charles Babbage, charter city, clean water, cloud computing, company town, congestion pricing, connected car, Conway's law, corporate governance, crowdsourcing, cryptocurrency, dark matter, David Graeber, deglobalization, dematerialisation, digital capitalism, digital divide, disintermediation, distributed generation, don't be evil, Douglas Engelbart, Douglas Engelbart, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Eratosthenes, Ethereum, ethereum blockchain, Evgeny Morozov, facts on the ground, Flash crash, Frank Gehry, Frederick Winslow Taylor, fulfillment center, functional programming, future of work, Georg Cantor, gig economy, global supply chain, Google Earth, Google Glasses, Guggenheim Bilbao, High speed trading, high-speed rail, Hyperloop, Ian Bogost, illegal immigration, industrial robot, information retrieval, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Jacob Appelbaum, James Bridle, Jaron Lanier, Joan Didion, John Markoff, John Perry Barlow, Joi Ito, Jony Ive, Julian Assange, Khan Academy, Kim Stanley Robinson, Kiva Systems, Laura Poitras, liberal capitalism, lifelogging, linked data, lolcat, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, McMansion, means of production, megacity, megaproject, megastructure, Menlo Park, Minecraft, MITM: man-in-the-middle, Monroe Doctrine, Neal Stephenson, Network effects, new economy, Nick Bostrom, ocean acidification, off-the-grid, offshore financial centre, oil shale / tar sands, Oklahoma City bombing, OSI model, packet switching, PageRank, pattern recognition, peak oil, peer-to-peer, performance metric, personalized medicine, Peter Eisenman, Peter Thiel, phenotype, Philip Mirowski, Pierre-Simon Laplace, place-making, planetary scale, pneumatic tube, post-Fordism, precautionary principle, RAND corporation, recommendation engine, reserve currency, rewilding, RFID, Robert Bork, Sand Hill Road, scientific management, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley ideology, skeuomorphism, Slavoj Žižek, smart cities, smart grid, smart meter, Snow Crash, social graph, software studies, South China Sea, sovereign wealth fund, special economic zone, spectrum auction, Startup school, statistical arbitrage, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, Superbowl ad, supply-chain management, supply-chain management software, synthetic biology, TaskRabbit, technological determinism, TED Talk, the built environment, The Chicago School, the long tail, the scientific method, Torches of Freedom, transaction costs, Turing complete, Turing machine, Turing test, undersea cable, universal basic income, urban planning, Vernor Vinge, vertical integration, warehouse automation, warehouse robotics, Washington Consensus, web application, Westphalian system, WikiLeaks, working poor, Y Combinator, yottabyte

Andy Greenberg, “How a ‘Deviant’ Philosopher Built Palantir, a CIA-Funded Data-Mining Juggernaut,” Forbes, August 14, 2014, http://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/2/. 21.  Jacob Appelbaum, Laura Poitras, and Trevor Paglen, “Art as Evidence” (panel at Transmediale, Haus Der Kulturen Der Welt, Berlin, 2014), http://www.transmediale.de/content/presentation-by-jacob-applebaum-at-transmediale-2014-keynote-art-as-evidence. 22.  See https://www.youtube.com/watch?v=ZJ6BuHL0EiQ. Thanks to Serene Han, programmer at Google Ideas, for helping me understand the uProxy technology. 23.