No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

( 15 )

Overview

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information ...

See more details below
Hardcover
$16.33
BN.com price
(Save 39%)$27.00 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Hardcover)
  • All (24) from $13.49   
  • New (16) from $15.22   
  • Used (8) from $13.49   
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$12.99
BN.com price

Overview

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden’s disclosures.

Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA’s unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.

Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation’s political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.

Read More Show Less

Editorial Reviews

Publishers Weekly
05/26/2014
The government's secret spying on just about everyone is laid bare in this exciting if overwrought exposé. Journalist Greenwald (With Liberty and Justice for Some) broke the story of the National Security Agency's vast warrantless surveillance operations last year after receiving top-secret documents from NSA contractor Snowden, who is briefly profiled here. Greenwald's breathless narrative is itself a spy story, complete with encrypted messages, cloak-and-dagger in Hong Kong, a possible CIA break-in at his house, the detainment of his partner on trumped-up terrorism suspicions, and furious wrangles with the mainstream press, which he denounces for its chumminess with officialdom. His involved, though sometimes confusing, rundown of NSA surveillance programs, illustrated with the agency's own incriminating graphics, details extraordinary abilities to record billions of emails and phone calls daily, follow who is communicating with whom, track individuals' web searches and page visits, plant devices in servers and routers, and even use private cell phones to eavesdrop on their owners. He also demonstrates through Foucauldian history, the FBI's COINTELPRO program, and current crackdowns on activist groups how mass surveillance attempts to stifle dissent. Greenwald's great reporting highlights the collusion of government, corporations, and media to undermine notions of privacy and democratic participation. Photos. Agent: Dan Conoway, Writer's House. (May)
From the Publisher
"Impassioned . . . gripping . . . Greenwald amplifies our understanding of the N.S.A.’s sweeping ambitions . . . and delivers a fierce argument in defense of the right of privacy."

—Michiko Kakutani, The New York Times

"Rings with authority . . . vital for anyone interested in civil liberties . . . this book is an antidote to the common public perception that government spooks are only interested in ‘bad’ people."

Chicago Tribune

"Incisive, slashing . . . Greenwald’s pugilistic skills are on full display . . . If you want to get a handle on what was at stake when Snowden downloaded the government’s most precious secrets onto a thumb drive, this book is your primer."

Slate

"Provides an excellent overview of the NSA’s still-classified activities and lack of legal controls, putting the pieces together in a way that daily journalism cannot."

The Economist

"A vital discussion on Snowden’s revelations."

Los Angeles Times

"Reads like a thriller . . . With heart-pounding suspense, John le Carre-like intrigue and Jeffersonian fidelity to the principles of human freedom . . . No Place to Hide is also a morality tale about the personal courage required of Snowden and Greenwald and his colleagues to expose government wrongdoing and the risk to their lives, liberties and properties in doing so."

—Judge Andrew P. Napolitano, FOX News

"Shocking . . . It is hard to argue with Greenwald’s contention that ‘the NSA is the definitive rogue agency.’"

The Christian Science Monitor

"A fascinating read that adds much to the debate on national security and privacy."

Los Angeles Review of Books

"Pulse-pounding."

Wired

"A smart, impassioned indictment of what Greenwald calls ‘fear-driven, obsequious journalism.’"

San Francisco Chronicle

"A compelling narrative that puts the most explosive revelations about official criminality into vital context . . . The book ends with a beautiful, barn-burning coda in which Greenwald sets out his case for a society free from surveillance. It reads like the transcript of a particularly memorable speech—an ‘I have a dream’ speech; a ‘Blood, sweat, toil and tears’ speech. . . . It's a speech I hope to hear Greenwald deliver himself someday."

—Cory Doctorow, Boing Boing

"Eloquent . . . powerful . . . Greenwald makes a persuasive case that this is a battle that has engulfed us all, and one that has not yet ended"

VICE

Kirkus Reviews
2014-05-23
Personalized account by Greenwald (With Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful, 2011, etc.) regarding his encounters with Edward Snowden and their exposure of theNational Security Agency'sprogram of “indiscriminate mass surveillance.”The author’s crisp, comprehensible outrage reflects the profound issues raised by Snowden’s whistle-blowing: “Thanks to Snowden’s bravery…we have an unparalleled firsthand look at the details of how the surveillance system actually operates.” Greenwald first examines how the secretive Snowden reached out to him due to his experience in writing about the NSA. After contentious negotiations with his Guardian editors, Greenwald traveled to Hong Kong to interview Snowden prior to the first articles revealing the NSA’s telephone and Internet monitoring endeavors: “He exuded an extraordinary equanimity when talking about what the US government might do to him,” writes the author. Next, Greenwald delves into a healthy selection of the NSA documents, providing excerpts and interpretations of PowerPoint presentations, training manuals and internal memos that demonstrate the chilling literality of the NSA’s unofficial motto, “Collect It All.” The author portrays the NSA as the epitome of Orwellian overreach, "the definitive rogue agency: empowered to do whatever it wants with very little control, transparency, or accountability." Greenwald then narrates the response to these revelations, which included Snowden and himself being slandered as rabble-rousers. The author’s partner was even detained at Heathrow Airport, while journalists like David Gregory suggested that Greenwald should face criminal charges. He depicts these responses to the legitimacy of his reporting for the Guardian as both menacing and absurd, while the “attacks on Snowden were of course far more virulent.” Greenwald’s caustic assessment of this response, and his close analysis of NSA documents and tactics, go a long way to support his assessment that “[g]iven the actual surveillance the NSA does, stopping terror is clearly a pretext.”Greenwald’s polemical tone does not lessen the disturbing quality of these revelations.
Library Journal
★ 06/15/2014
Journalist and former constitutional lawyer Greenwald (With Liberty and Justice for Some) examines the impact of the revelations in the National Security Agency (NSA) documents leaked to him by Edward Snowden. It's a fascinating read as Greenwald, a longtime writer on issues of national security and Guardian columnist at the time, describes his interactions with the whistle-blower and provides an erudite, complete time line of the events pre- and postpublication of the classified information. Greenwald dismisses the "collect it all" policy of the NSA, maintaining that its overarching surveillance powers—routinely collecting and quantifying data on billions of communications worldwide—don't prevent acts of terror. Drawing on political theory and psychology, Greenwald likewise explains that the argument that law-abiding citizens aren't affected is fundamentally flawed, because even the simple threat of universal surveillance impacts human behavior. He is scathing in his analysis of the "establishment media" (Washington Post, New York Times, etc.), both for what he views as deference to the U.S. government on matters of publication and their coverage of the leak, including the question of whether he himself is a journalist—or merely a "blogger" or "activist"—afforded constitutional press protection. In his analysis, the author breaks down the dense NSA subject matter and uses excerpts and slides from the documents to illustrate his points, making this work readable for even those unfamiliar with the technical concepts. VERDICT Greenwald's delineation of the NSA's actions, as well as his arguments for the right of privacy and a robust adversarial press, makes this book a must-read.—Amanda Mastrull, Library Journal
The Barnes & Noble Review

Long before Edward Snowden selected Glenn Greenwald as the bucket into which he would direct his NSA leaks, Greenwald enjoyed a reputation among his fellow American political bloggers as a man to avoid provoking. He lives in a compound in Rio de Janeiro, surrounded by his beloved dogs, and his style in argument resembles the behavior of a mastiff protecting a beloved chewtoy. Counterargument meets growls and indignation, and long after the arguer has decided to move on to another subject, Greenwald continues to snarl and fight, publishing post upon post, update upon update, and never conceding anything at all, even when he is clearly wrong.

His book about the Snowden Affair, No Place to Hide, is proof that fame and a Pulitzer Prize have not changed him, and his self-confidence remains at awesome highs. It is a book written in self-righteous anger, with a robust sense of the author's own heroics and relentless rage at his enemies. I hasten to add that I offer this description almost entirely by way of praise, since — however sociopathic these traits might be in an individual in normal life — in a journalist or litigator (Greenwald's former profession) they are often virtues.

The book breaks into two parts, the first considerably more fulfilling than the second. It first recounts the history of Greenwald's contact with Edward Snowden, from the first cryptic email, sent from Snowden to Greenwald under the pseudonym Cincinnatus, for the Roman patriot whose selfless service saved the Roman Republic. (Lack of irony and self-criticism is a theme here.) Greenwald at first blew off Snowden's email and later was baffled by Snowden's encryption protocols. Only with the intervention of Laura Poitras, a more cryptographically literate filmmaker, did he realize his correspondent was offering authentic and important information, from an insider's perspective.

The story of Greenwald's trip to Hong Kong with Poitras and a colleague at the Guardian newspaper is told simply and effectively, and it reveals a few flashes of the personality of the main characters of this drama. Snowden, for all the demonstrable hubris in unilaterally spilling the secrets of the country's biggest spy agency, discouraged Greenwald and others from making him rather than the secrets themselves the focus of the world's attention. Aspects of his personality have leaked out, as it were, in subsequent interviews. But from Greenwald's narrative we now know that just about everything he did was calculated, and his disclosures meticulously arranged and catalogued, rather than dumped in Greenwald's lap indiscriminately.

The second part of the book summarizes the disclosures themselves and the reactions, often embarrassing, of officials and journalists. Rep. Peter T. King (R-N.Y.) falsely suggested that Greenwald was threatening to release a list of U.S. intelligence agents abroad. David Gregory questioned Greenwald on Meet the Press, suggesting that he might have aided and abetted a crime by publishing Snowden's leaks. With few exceptions, Greenwald says, the media and government preferred to persecute the messengers, rather than fix the unconstitutional, blatantly criminal conspiracies they uncovered.

At this point I may as well admit that my sympathies are more with Greenwald and Snowden than with their antagonists — particularly those in government who have lied about domestic spying, abdicated responsibility for fixing it, or abused their power in efforts to excuse or continue it. But in this second section, Greenwald seriously tests his supporters' tolerance. Even an extreme advocate of freedom of speech, and all the acts of journalism that entails, can wonder whether a system that relies on the sound judgment of Snowden and Greenwald to keep its holiest secrets might be a system that needs to reevaluate how it keeps its secrets. Greenwald seems unperturbed by the power he and Snowden have. And even someone who considers the world of Washington journalism a virtual herpetarium of toadies and sycophants can acknowledge, as Greenwald does not, that just about every national security journalist in town wishes Snowden chose him or her instead of Greenwald and Poitras. He portrays himself as a truth teller in an industry of lickspittles, when in fact his government allows him his freedom, and his colleagues have awarded him their highest honor.

That honor is deserved. But No Place to Hide reminds us what Greenwald is and what he is not. He is not an especially talented investigative journalist — by Greenwald's own account, Snowden practically had to hire a skywriter to convince him to learn the technology necessary to accept the leaks — but he was certainly the journalist best equipped to defend and rapidly publish the most explosive material. The journalists who wish they had published the leaks (and I'm sure this includes a number whose sour grapes lead them to criticize Snowden) would have subjected the leaks to greater scrutiny than Greenwald before they published. Greenwald spends many pages detailing his badgering of his own editor, Janine Gibson of Guardian US, to publish the leaks without delay, and without fully exploring their legal and national security implications. But I know of few journalists who would have lunged forward with Greenwald's relentless zeal and complete lack of self-doubt. Snowden must have suspected that Greenwald would sink his fangs into the leaks in exactly this manner, using the material predictably yet energetically. If there were an industry prize for Canniest Leak, this book shows that Snowden would certainly have won it.

Graeme Wood is a staff editor at The Atlantic. His articles and reviews have appeared in many publications, including The New Yorker, Good magazine, and The American.

Reviewer: Graeme Wood

Read More Show Less

Product Details

  • ISBN-13: 9781627790734
  • Publisher: Holt, Henry & Company, Inc.
  • Publication date: 5/13/2014
  • Pages: 272
  • Sales rank: 13,514
  • Product dimensions: 6.10 (w) x 9.30 (h) x 1.10 (d)

Meet the Author

Glenn Greenwald is the author, most recently, of With Liberty and Justice for Some and A Tragic Legacy. A former constitutional lawyer and a columnist for The Guardian until October 2013, he earned numerous awards for his commentary and investigative reporting, including the top 2013 investigative journalism award from the Online News Association, the Esso Award for Excellence in Reporting (the Brazilian equivalent of the Pulitzer Prize), and the 2013 Pioneer Award from Electronic Frontier Foundation. He also received the 2013 George Polk Award for National Security Reporting and was named by Foreign Policy as one of the Top 100 Global Thinkers. Greenwald’s writing has appeared in many newspapers and political news magazines, including The New York Times, The Los Angeles Times and The American Conservative. In early 2014, he cofounded a new global media outlet, The Intercept.

Read More Show Less

Read an Excerpt

1

CONTACT

On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.

The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a "model of civic virtue," Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.

The email began: "The security of people’s communications is very important to me," and its stated purpose was to urge me to begin using PGP encryption so that "Cincinnatus" could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for "pretty good privacy." It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.

The program essentially wraps every email in a protective shield, which is a code composed of hundreds, or even thousands, of random numbers and case-sensitive letters. The most advanced intelligence agencies around the world—a class that certainly includes the National Security Agency—possess password-cracking software capable of one billion guesses per second. But so lengthy and random are these PGP encryption codes that even the most sophisticated software requires many years to break them. People who most fear having their communications monitored, such as intelligence operatives, spies, human rights activists, and hackers, trust this form of encryption to protect their messages.

In this email, "Cincinnatus" said he had searched everywhere for my PGP "public key," a unique code set that allows people to receive encrypted email, but could not find it. From this, he concluded that I was not using the program and told me, "That puts anyone who communicates with you at risk. I’m not arguing that every communication you are involved in be encrypted, but you should at least provide communicants with that option."

"Cincinnatus" then referenced the sex scandal of General David Petraeus, whose career-ending extramarital affair with journalist Paula Broadwell was discovered when investigators found Google emails between the two. Had Petraeus encrypted his messages before handing them over to Gmail or storing them in his drafts folder, he wrote, investigators would not have been able to read them. "Encryption matters, and it is not just for spies and philanderers." Installing encrypted email, he said, "is a critically-necessary security measure for anyone who wishes to communicate with you."

To motivate me to follow his advice, he added, "There are people out there you would like to hear from who will never be able to contact you without knowing their messages cannot be read in transit."

Then he offered to help me install the program: "If you need any help at all with this, please let me know, or alternately request help on Twitter. You have many technically-proficient followers who are willing to offer immediate assistance." He signed off: "Thank you. C."

Using encryption software was something I had long intended to do. I had been writing for years about WikiLeaks, whistle-blowers, the hacktivist collective known as Anonymous, and related topics, and had also communicated from time to time with people inside the US national security establishment. Most of them are very concerned about the security of their communications and preventing unwanted monitoring. But the program is complicated, especially for someone who had very little skill in programming and computers, like me. So it was one of those things I had never gotten around to doing.

C.’s email did not move me to action. Because I had become known for covering stories the rest of the media often ignores, I frequently hear from all sorts of people offering me a "huge story," and it usually turns out to be nothing. And at any given moment I am usually working on more stories than I can handle. So I need something concrete to make me drop what I’m doing in order to pursue a new lead. Despite the vague allusion to "people out there" I "would like to hear from," there was nothing in C.’s email that I found sufficiently enticing. I read it but did not reply.

Three days later, I heard from C. again, asking me to confirm receipt of the first email. This time I replied quickly. "I got this and am going to work on it. I don’t have a PGP code, and don’t know how to do that, but I will try to find someone who can help me."

C. replied later that day with a clear, step-by-step guide to the PGP system: Encryption for Dummies, in essence. At the end of the instructions, which I found complex and confusing, mostly due to my own ignorance, he said these were just "the barest basics. If you can’t find anyone to walk you through installation, generation, and use," he added, "please let me know. I can facilitate contact with people who understand crypto almost anywhere in the world."

This email ended with more a pointed sign-off: "Cryptographically yours, Cincinnatus."

Despite my intentions, I never created the time to work on encryption. Seven weeks went by, and my failure to do this weighed a bit on my mind. What if this person really did have an important story, one I would miss just because I failed to install a computer program? Apart from anything else, I knew encryption might be valuable in the future, even if Cincinnatus turned out to have nothing of interest.

On January 28, 2013, I emailed C. to say that I would get someone to help me with encryption and hopefully would have it done within the next day or so.

C. replied the next day: "That’s great news! If you need any further help or have questions in the future, you will always be welcome to reach out. Please accept my sincerest thanks for your support of communications privacy! Cincinnatus."

But yet again, I did nothing, consumed as I was at the time with other stories, and still unconvinced that C. had anything worthwhile to say. There was no conscious decision to do nothing. It was simply that on my always too-long list of things to take care of, installing encryption technology at the behest of this unknown person never became pressing enough for me to stop other things and focus on it.

C. and I thus found ourselves in a Catch-22. He was unwilling to tell me anything specific about what he had, or even who he was and where he worked, unless I installed encryption. But without the enticement of specifics, it was not a priority to respond to his request and take the time to install the program.

In the face of my inaction, C. stepped up his efforts. He produced a ten-minute video entitled PGP for Journalists. Using software that generates a computer voice, the video instructed me in an easy, step-by-step fashion how to install encryption software, complete with charts and visuals.

Still I did nothing. It was at that point that C., as he later told me, become frustrated. "Here am I," he thought, "ready to risk my liberty, perhaps even my life, to hand this guy thousands of Top Secret documents from the nation’s most secretive agency—a leak that will produce dozens if not hundreds of huge journalistic scoops. And he can’t even be bothered to install an encryption program."

That’s how close I came to blowing off one of the largest and most consequential national security leaks in US history.

The next I heard of any of this was ten weeks later. On April 18, I flew from my home in Rio de Janeiro to New York, where I was scheduled to give some talks on the dangers of government secrecy and civil liberties abuses done in the name of the War on Terror.


On landing at JFK Airport, I saw that I had an email message from Laura Poitras, the documentary filmmaker, which read: "Any chance you’ll be in the US this coming week? I’d love to touch base about something, though best to do in person."

I take seriously any message from Laura Poitras. One of the most focused, fearless, and independent individuals I’ve ever known, she has made film after film in the riskiest of circumstances, with no crew or the support of a news organization, just a modest budget, one camera, and her determination. At the height of the worst violence of the Iraq War, she ventured into the Sunni Triangle to make My Country, My Country, an unflinching look at life under US occupation that was nominated for an Academy award.

For her next film, The Oath, Poitras traveled to Yemen, where she spent months following two Yemeni men—Osama bin Laden’s bodyguard as well as his driver. Since then, Poitras has been working on a documentary about NSA surveillance. The three films, conceived as a trilogy about US conduct during the War on Terror, made her a constant target of harassment by government authorities every time she entered or left the country.

Through Laura, I learned a valuable lesson. By the time we first met, in 2010, she had been detained in airports by the Department of Homeland Security more than three dozen times as she entered the United States—interrogated, threatened, her materials seized, including her laptop, cameras, and notebooks. Yet she repeatedly decided not to go public with the relentless harassment, fearing that the repercussions would make her work impossible. That changed after an unusually abusive interrogation at Newark Liberty International Airport. Laura had had enough. "It’s getting worse, not better, from my being silent." She was ready for me to write about it.

The article I published in the online political magazine Salon detailing the constant interrogations to which Poitras had been subjected received substantial attention, drawing statements of support and denunciations of the harassment. The next time Poitras flew out of the United States after the article ran, there was no interrogation and she did not have her materials seized. Over the next couple of months, there was no harassment. For the first time in years, Laura was able to travel freely.

The lesson for me was clear: national security officials do not like the light. They act abusively and thuggishly only when they believe they are safe, in the dark. Secrecy is the linchpin of abuse of power, we discovered, its enabling force. Transparency is the only real antidote.

At JFK, reading Laura’s email, I replied immediately: "Actually, just got to the US this morning. . . . Where are you?" We arranged a meeting for the next day, in the lobby at my hotel in Yonkers, a Marriott, and found seats in the restaurant, At Laura’s insistence, we moved tables twice before beginning our conversation to be sure that nobody could hear us. Laura then got down to business. She had an "extremely important and sensitive matter" to discuss, she said, and security was critical.

Since I had my cell phone with me, Laura asked that I either remove the battery or leave it in my hotel room. "It sounds paranoid," she said, but the government has the capability to activate cell phones and laptops remotely as eavesdropping devices. Powering off the phone or laptop does not defeat the capability: only removing the battery does. I’d heard this before from transparency activists and hackers but tended to write it off as excess caution, but this time I took it seriously because it came from Laura. After discovering that the battery on my cell phone could not be removed, I took it back to my room, then returned to the restaurant.

Now Laura began to talk. She had received a series of anonymous emails from someone who seemed both honest and serious. He claimed to have access to some extremely secret and incriminating documents about the US government spying on its own citizens and on the rest of the world. He was determined to leak these documents to her and had specifically requested that she work with me on releasing and reporting on them. I made no connection at the time to the long-since-forgotten emails I had received from Cincinnatus months earlier. They had been parked at the back of my mind, out of view.

Laura then pulled several pages out of her purse from two of the emails sent by the anonymous leaker, and I read them at the table from start to finish. They were riveting.

The second of the emails, sent weeks after the first, began: "Still here." With regard to the question at the forefront of my mind—when would he be ready to furnish documents?—he had written, "All I can say is ‘soon.’ "

After urging her to always remove batteries from cell phones before talking about sensitive matters—or, at least, to put the phones in the freezer, where their eavesdropping capability would be impeded—the leaker told Laura that she should work with me on these documents. He then got to the crux of what he viewed as his mission:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man.

"He’s real," I said when I finished reading. "I can’t explain exactly why, but I just feel intuitively that this is serious, that he’s exactly who he says he is."

"So do I," Laura replied. "I have very little doubt."

Reasonably and rationally, Laura and I knew that our faith in the leaker’s veracity might have been misplaced. We had no idea who was writing to her. He could have been anyone. He could have been inventing the entire tale. This also could have been some sort of plot by the government to entrap us into collaborating with a criminal leak. Or perhaps it had come from someone who sought to damage our credibility by passing on fraudulent documents to publish.

We discussed all these possibilities. We knew that a 2008 secret report by the US Army had declared WikiLeaks an enemy of the state and proposed ways to "damage and potentially destroy" the organization. The report (ironically leaked to WikiLeaks) discussed the possibility of passing on fraudulent documents. If WikiLeaks published them as authentic, it would suffer a serious blow to its credibility.

Laura and I were aware of all the pitfalls but we discounted them, relying instead on our intuition. Something intangible yet powerful about those emails convinced us that their author was genuine. He wrote out of a belief in the dangers of government secrecy and pervasive spying; I instinctively recognized his political passion. I felt a kinship with our correspondent, with his worldview, and with the sense of urgency that was clearly consuming him.

Over the past seven years, I had been driven by the same conviction, writing almost on a daily basis about the dangerous trends in US state secrecy, radical executive power theories, detention and surveillance abuses, militarism, and the assault on civil liberties. There is a particular tone and attitude that unites journalists, activists, and readers of mine, people who are equally alarmed by these trends. It would be difficult, I reasoned, for someone who did not truly believe and feel this alarm to replicate it so accurately, with such authenticity.

In one of the last passages of Laura’s emails, her correspondent wrote that he was completing the final steps necessary to provide us with the documents. He needed another four to six weeks, and we should wait to hear from him. He assured us that we would.

Three days later, Laura and I met again, this time in Manhattan, and with another email from the anonymous leaker, in which he explained why he was willing to risk his liberty, to subject himself to the high likelihood of a very lengthy prison term, in order to disclose these documents. Now I was even more convinced: our source was for real, but as I told my partner, David Miranda, on the flight home to Brazil, I was determined to put the whole thing out of my mind. "It may not happen. He could change his mind. He could get caught." David is a person of powerful intuition, and he was weirdly certain. "It’s real. He’s real. It’s going to happen," he declared. "And it’s going to be huge."

After returning to Rio, I heard nothing for three weeks. I spent almost no time thinking about the source because all I could do was wait. Then, on May 11, I received an email from a tech expert with whom Laura and I had worked in the past. His words were cryptic but his meaning clear: "Hey Glenn, I’m following up with learning to use PGP. Do you have an address I can mail you something to help you get started next week?"

I was sure that the something he wanted to send was what I needed to begin working on the leaker’s documents. That, in turn, meant Laura had heard from our anonymous emailer and received what we had been waiting for.

The tech person then sent a package via Federal Express, scheduled to arrive in two days. I did not know what to expect: a program, or the documents themselves? For the next forty-eight hours, it was impossible to focus on anything else. But on the day of scheduled delivery, 5:30 p.m. came and went and nothing arrived. I called FedEx and was told that the package was being held in customs for "unknown reasons." Two days went by. Then five. Then a full week. Every day FedEx said the same thing—that the package was being held in customs, for reasons unknown.

I briefly entertained the suspicion that some government authority—American, Brazilian, or otherwise—was responsible for this delay because they knew something, but I held on to the far likelier explanation that it was just one of those coincidental bureaucratic annoyances.

By this point, Laura was very reluctant to discuss any of this by phone or online, so I didn’t know what exactly was in the package.

Finally, roughly ten days after the package had been sent to me, FedEx delivered it. I tore open the envelope and found two USB thumb drives, along with a typewritten note containing detailed instructions for using various computer programs designed to provide maximum security, as well as numerous passphrases to encrypted email accounts and other programs I had never heard of.

I had no idea what all this meant. I had never heard of these specific programs before, although I knew about passphrases, basically long passwords containing randomly arranged case-sensitive letters and punctuation, designed to make them difficult to crack. With Poitras deeply reluctant to talk by phone or online, I was still frustrated: finally in possession of what I was waiting for, but with no clue where it would lead me.

I was about to find out, from the best possible guide.

The day after the package arrived, during the week of May 20, Laura told me we needed to speak urgently, but only through OTR (off-the-record) chat, an encrypted instrument for talking online securely. I had used OTR previously, and managed to install the chat program, signed up for an account, and added Laura’s user name to my "buddy list." She showed up instantly.

I asked about whether I now had access to the secret documents. They would only come to me from the source, she told me, not from her. Laura then added some startling new information, that we might have to travel to Hong Kong immediately, to meet our source. Now I was baffled. What was someone with access to top secret US government documents doing in Hong Kong? I had assumed that our anonymous source was in Maryland or northern Virginia. What did Hong Kong have to do with any of this? I was willing to travel anywhere, of course, but I wanted more information about why I was going. But Laura’s inability to speak freely forced us to postpone that discussion.

She asked whether I’d be willing to travel to Hong Kong within the next few days. I wanted to be certain that this would be worthwhile, meaning: Had she obtained verification that this source was real? She cryptically replied, "Of course, I wouldn’t ask you to go to Hong Kong if I hadn’t." I assumed this meant she had received some serious documents from the source.

But she also told me about a brewing problem. The source was upset by how things had gone thus far, particularly about a new turn: the possible involvement of the Washington Post. Laura said it was critical that I speak to him directly, to assure him and placate his growing concerns.

Within an hour, the source himself emailed me.

This email came from Verax@■■■■■■■. Verax means "truth teller" in Latin. The subject line read, "Need to talk."

"I’ve been working on a major project with a mutual friend of ours," the email began, letting me know that it was he, the anonymous source, clearly referring to his contacts with Laura.

"You recently had to decline short-term travel to meet with me. You need to be involved in this story," he wrote. "Is there any way we can talk on short notice? I understand you don’t have much in the way of secure infrastructure, but I’ll work around what you have." He suggested that we speak via OTR and provided his user name.

I was uncertain what he had meant about "declining short-term travel": I had expressed confusion about why he was in Hong Kong but certainly hadn’t refused to go. I chalked that up to miscommunication and replied immediately. "I want to do everything possible to be involved in this," I told him, suggesting that we talk right away on OTR. I added his user name to my OTR buddy list and waited.

Within fifteen minutes, my computer sounded a bell-like chime, signaling that he had signed on. Slightly nervous, I clicked on his name and typed "hello." He answered, and I found myself speaking directly to someone who I assumed had, at that point, revealed a number of secret documents about US surveillance programs and who wanted to reveal more.

Right off the bat, I told him I was absolutely committed to the story. "I’m willing to do what I have to do to report this," I said. The source—whose name, place of employment, age, and all other attributes were still unknown to me—asked if I would come to Hong Kong to meet him. I did not ask why he was in Hong Kong; I wanted to avoid appearing to be fishing for information.

Indeed, from the start I decided I would let him take the lead. If he wanted me to know why he was in Hong Kong, he would tell me. And if he wanted me to know what documents he had and planned to provide me, he would tell me that, too. This passive posture was difficult for me. As a former litigator and current journalist, I’m accustomed to aggressive questioning when I want answers, and I had hundreds of things I wanted to ask.

But I assumed his situation was delicate. Whatever else was true, I knew that this person had resolved to carry out what the US government would consider a very serious crime. It was clear from how concerned he was with secure communications that discretion was vital. And, I reasoned,—since I had so little information about whom I was talking to, about his thinking, his motives and fears—that caution and restraint on my part were imperative. I did not want to scare him off, so I forced myself to let the information come to me rather than trying to grab it.

"Of course I’ll come to Hong Kong," I said, still having no idea why he was there, of all places, or why he wanted me to go there.

We spoke online that day for two hours. His first concern was what was happening with some of the NSA documents that, with his consent, Poitras had talked about to a Washington Post reporter, Barton Gellman. The documents pertained to one specific story about a program called PRISM, which allowed the NSA to collect private communications from the world’s largest Internet companies, including Facebook, Google, Yahoo!, and Skype.

Rather than report the story quickly and aggressively, the Washington Post had assembled a large team of lawyers who were making all kinds of demands and issuing all sorts of dire warnings. To the source, this signaled that the Post, handed what he believed was an unprecedented journalistic opportunity, was being driven by fear rather than conviction and determination. He was also livid that the Post had involved so many people, afraid that these discussions might jeopardize his security.

"I don’t like how this is developing," he told me. "I had wanted someone else to do this one story abut PRISM so you could focus on the broader archive, especially the mass domestic spying, but now I really want you to be the one to report this. I’ve been reading you a long time," he said, "and I know you’ll be aggressive and fearless in how you do this."

"I’m ready and eager," I told him. "Let’s decide now what I need to do."

"The first order of business is for you to get to Hong Kong," he said. He returned to that again and again: come to Hong Kong immediately.

The other significant topic we discussed in that first online conversation was his goal. I knew from the emails Laura had shown me that he felt compelled to tell the world about the massive spying apparatus the US government was secretly building. But what did he hope to achieve?

"I want to spark a worldwide debate about privacy, Internet freedom, and the dangers of state surveillance," he said. "I’m not afraid of what will happen to me. I’ve accepted that my life will likely be over from my doing this. I’m at peace with that. I know it’s the right thing to do."

He then said something startling: "I want to identify myself as the person behind these disclosures. I believe I have an obligation to explain why I’m doing this and what I hope to achieve." He told me he had written a document that he wanted to post on the Internet when he outed himself as the source, a pro-privacy, anti-surveillance manifesto for people around the world to sign, showing that there was global support for protecting privacy.

Despite the near-certain costs of outing himself—a lengthy prison term if not worse—he was, the source said again and again, "at peace" with those consequences. "I only have one fear in doing all of this," he said, which is "that people will see these documents and shrug, that they’ll say, ‘we assumed this was happening and don’t care.’ The only thing I’m worried about is that I’ll do all this to my life for nothing."

"I seriously doubt that will happen," I assured him, but I wasn’t convinced I really believed that. I knew from my years of writing about NSA abuses that it can be hard to generate serious concern about secret state surveillance: invasion of privacy and abuse of power can be viewed as abstractions, ones that are difficult to get people to care about viscerally. What’s more, the issue of surveillance is invariably complex, making it even harder to engage the public in a widespread way.

But this felt different. The media pays attention when top secret documents are leaked. And the fact that the warning was coming from someone on the inside of the national security apparatus—rather than an American Civil Liberties Union lawyer or a civil liberties advocate—surely meant that it would have added weight.

That night, I talked to David about going to Hong Kong. I was still reluctant to drop all of my work to fly to the other side of the world to meet someone I knew nothing about, not even his name, particularly since I had no real evidence that he was who he said he was. It could be a complete waste of time—or entrapment or some other weird plot.

"You should tell him that you want to see a few documents first to know that he’s serious and that this is worth it for you," David suggested.

As usual, I took his advice. When I signed on to OTR the next morning, I said I was planning to leave for Hong Kong within days but first wanted to see some documents so that I understood the types of disclosures he was prepared to make.

To do that, he told me again to install various programs. I then spent a couple of days online as the source walked me through, step by step, how to install and use each program, including, finally, PGP encryption. Knowing that I was a beginner, he exhibited great patience, literally on the level of "Click the blue button, now press OK, now go to the next screen."

I kept apologizing for my lack of proficiency, for having to take hours of his time to teach me the most basic aspects of secure communication. "No worries," he said, "most of this makes little sense. And I have a lot of free time right now."

Once the programs were all in place, I received a file containing roughly twenty-five documents: "Just a very small taste: the tip of the tip of the iceberg," he tantalizingly explained.

I un-zipped the file, saw the list of documents, and randomly clicked on one of them. At the top of the page in red letters, a code appeared: "TOP SECRET//COMINT/NOFORN/."

This meant the document had been legally designated top secret, pertained to communications intelligence (COMINT), and was not for distribution to foreign nationals, including international organizations or coalition partners (NOFORN). There it was with incontrovertible clarity: a highly confidential communication from the NSA, one of the most secretive agencies in the world’s most powerful government. Nothing of this significance had ever been leaked from the NSA, not in all the six-decade history of the agency. I now had a couple dozen such items in my possession. And the person I had spent hours chatting with over the last two days had many, many more to give me.

That first document was a training manual for NSA officials to teach analysts about new surveillance capabilities. It discussed in broad terms the type of information the analysts could query (email addresses, IP [Internet protocol] locator data, telephone numbers) and the type of data they would receive in response (email content, telephone "metadata," chat logs). Basically, I was eavesdropping on NSA officials as they instructed their analysts on how to listen in on their targets.

My heart was racing. I had to stop reading and walk around my house a few times to take in what I had just seen and calm myself enough to focus on reading the files. I went back to my laptop and randomly clicked on the next document, a top secret PowerPoint presentation, entitled "PRISM/US-984XN Overview." Each page bore the logos of nine of the largest Internet companies, including Google, Facebook, Skype, and Yahoo!.

The first slides laid out a program under which the NSA had what it called "collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube, Apple." A graph displayed the dates on which each of these companies had joined the program.

Again I became so excited, I had to stop reading.

The source also said he was sending me a large file that I would be unable to access until the time was right. I decided to set aside that cryptic though significant statement for the moment, in line with my approach of letting him decide when I got information but also because I was so excited by what I had in front of me.

From the first glimpse I’d had of just these few documents, I knew two things: I needed to get to Hong Kong right away, and I would have to have substantial institutional support to do this reporting. This meant involving the Guardian, the newspaper and online news website that I had joined as a daily columnist only nine months earlier. Now I was about to bring them in to what I knew already would be a major explosive story.

Using Skype, I called Janine Gibson, the British editor in chief of the US edition of the Guardian. My agreement with the Guardian was that I had full editorial independence, which meant that nobody could edit or even review my articles before they ran. I wrote my pieces, and then published them directly to the Internet myself. The only exceptions to this arrangement were that I would alert them if my writing could have legal consequences for the newspaper or posed an unusual journalistic quandary. That had happened very few times in the previous nine months, only once or twice, which meant that I had had very little interaction with the Guardian editors.

Obviously, if any story warranted a heads-up, it was this one. Also, I knew I would need the paper’s resources and support.

"Janine, I have a huge story," I plunged in. "I have a source who has access to what seems to be a large amount of top secret documents from the NSA. He’s given me a few already, and they’re shocking. But he says he has many, many more. For some reason, he’s in Hong Kong, I have no idea why yet, and he wants me to go there to meet him and get the rest. What he’s given me, what I just looked at, show some pretty shocking—"

Gibson interrupted. "How are you calling me?"

"By Skype."

"I don’t think we should talk about this on the phone, and definitely not by Skype," she wisely said, and she proposed that I get on a plane to New York immediately so that we could discuss the story in person.

My plan, which I told Laura, was to fly to New York, show the documents to the Guardian, get them excited about the story, and then have them send me to Hong Kong to see the source. Laura agreed to meet me in New York, and then we intended to travel together to Hong Kong.

The next day, I flew from Rio to JFK on the overnight flight, and by 9:00 a.m. the following day, Friday, May 31, I had checked in to my Manhattan hotel and then met Laura. The first thing we did was go to a store to buy a laptop that would serve as my "air gapped machine," a computer that never connected to the Internet. It is much more difficult to subject an Internet-free computer to surveillance. To monitor an air gapped computer, an intelligence service such as the NSA would have to engage in far more difficult methods, such as obtaining physical access to the computer and placing a surveillance device on the hard drive. Keeping the computer close at all times helps prevent that type of invasion. I would use this new laptop to work with materials that I didn’t want monitored, like secret NSA documents, without fear of detection.

I shoved my new computer into my backpack and walked the five Manhattan blocks with Laura to the Guardian’s Soho office.

Gibson was waiting for us when we arrived. She and I went directly into her office, where we were joined by Stuart Millar, Gibson’s deputy. Laura sat outside. Gibson didn’t know Laura, and I wanted us to be able to talk freely. I had no idea how the Guardian editors would react to what I had. I hadn’t worked with them before, certainly not on anything remotely approaching this level of gravity and importance.

After I pulled up the source’s files on my laptop, Gibson and Millar sat together at a table and read the documents, periodically muttering "wow" and "holy shit" and similar exclamations. I sat on a sofa and watched them read, observing the shock registering on their faces when the reality of what I possessed began to sink in. Each time they finished with one document, I popped up to show them the next one. Their amazement only intensified.

In addition to the two dozen or so NSA documents the source had sent, he had included the manifesto he intended to post, calling for signatures as a show of solidarity with the pro-privacy, anti-surveillance cause. The manifesto was dramatic and severe, but that was to be expected, given the dramatic and severe choices he had made, choices that would upend his life forever. It made sense to me that someone who had witnessed the shadowy construction of a ubiquitous system of state surveillance, with no oversight or checks, would be gravely alarmed by what he had seen and the dangers it posed. Of course his tone was extreme; he had been so alarmed that he had made an extraordinary decision to do something brave and far-reaching. I understood the reason for his tone, although I worried about how Gibson and Millar would react to reading the manifesto. I didn’t want them to think we were dealing with someone unstable, particularly since, having spent many hours talking to him, I knew that he was exceptionally rational and deliberative.

My fear was quickly validated. "This is going to sound crazy to some people," Gibson pronounced.

"Some people and pro-NSA media types will say it’s a bit Ted Kaczynski–ish," I agreed. "But ultimately, the documents are what matters, not him or his motives for giving them to us. And besides, anyone who does something this extreme is going to have extreme thoughts. That’s inevitable."

Along with that manifesto, Snowden had written a missive to the journalists to whom he gave his archive of documents. It sought to explain his purpose and goals and predicted how he would likely be demonized:

My sole motive is to inform the public as to that which is done in their name and that which is done against them. The U.S. government, in conspiracy with client states, chiefest among them the Five Eyes—the United Kingdom, Canada, Australia, and New Zealand—have inflicted upon the world a system of secret, pervasive surveillance from which there is no refuge. They protect their domestic systems from the oversight of citizenry through classification and lies, and shield themselves from outrage in the event of leaks by overemphasizing limited protections they choose to grant the governed. . . .

The enclosed documents are real and original, and are offered to provide an understanding of how the global, passive surveillance system works so that protections against it may be developed. On the day of this writing, all new communications records that can be ingested and catalogued by this system are intended to be held for [] years, and new "Massive Data Repositories" (or euphemistically "Mission" Data Repositories) are being built and deployed worldwide, with the largest at the new data center in Utah. While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography.

I instantly recognized the last sentence as a play on a Thomas Jefferson quote from 1798 that I often cited in my writing: "In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution."

After reviewing all of the documents, including Snowden’s missive, Gibson and Millar were persuaded. "Basically," Gibson concluded within two hours of my arrival that morning, "you need to go to Hong Kong as soon as possible, like tomorrow, right?"

The Guardian was on board. My mission in New York had been accomplished. Now I knew that Gibson was committed to pursuing the story aggressively, at least for the moment. That afternoon, Laura and I worked with the Guardian’s travel person to get to Hong Kong as quickly as possible. The best option was a sixteen-hour non-stop flight on Cathay Pacific that left from JFK the next morning. But just as we began to celebrate our imminent meeting with the source, we ran into a complication.

At the end of the day, Gibson declared that she wanted to involve a longtime Guardian reporter, Ewen MacAskill, who had been at the paper for twenty years. "He’s a great journalist," she said. Given the magnitude of what I was embarking on, I knew that I’d need other Guardian reporters on the story and had no objection in theory. "I’d like Ewen to go with you to Hong Kong," she added.

I didn’t know MacAskill. More important, neither did the source, and as far as he knew, only Laura and I were coming to Hong Kong. And Laura, who plans everything meticulously, was also bound to be furious at this sudden change in our plans.

I was right. "No way. Absolutely not," she responded. "We can’t just add some new person at the last minute. And I don’t know him at all. Who has vetted him?"

I tried to explain what I thought was Gibson’s motive. I didn’t really know or trust theGuardian yet, not when it came to such a huge story, and I assumed they felt the same way about me. Given how much the Guardian had at stake, I reasoned that they likely wanted someone they knew very well—a longtime company man—to tell them what was going on with the source and to assure them that this story was something they should do. Besides, Gibson would need the full support and approval of the Guardian editors in London, who knew me even less well than she did. She probably wanted to bring in someone who could make London feel safe, and Ewen fit that bill perfectly.

"I don’t care," Laura said. "Traveling with some third person, some stranger, could attract surveillance or scare the source." As a compromise, Laura suggested that they send Ewen after a few days, once we had established contact with the source in Hong Kong and built trust. "You have all the leverage. Tell them they can’t send Ewen until we’re ready."

I went back to Gibson with what seemed like a smart compromise, but she was determined. "Ewen can travel with you to Hong Kong, but he won’t meet the source until you and Laura both say you’re ready."

Clearly, Ewen coming with us to Hong Kong was crucial to the Guardian. Gibson would need assurances about what was happening there and a way to assuage any worries her bosses in London might have. But Laura was just as adamant that we would travel alone. "If the source surveils us at the airport and sees this unexpected third person he doesn’t know, he’ll freak out and terminate contact. No way." Like a State Department diplomat shuttling between Middle East adversaries in the futile hope of brokering a deal, I went back to Gibson, who gave a vague reply designed to signal that Ewen would follow a couple of days later. Or maybe that’s what I wanted to hear.

Either way, I learned from the travel person late that night that Ewen’s ticket had been bought—for the next day, on the same flight. And they were sending him on that plane no matter what.

In the car on the way to the airport, Laura and I had our first and only argument. I gave her the news as soon as the car pulled out of the hotel and she exploded with anger. I was jeopardizing the entire arrangement, she insisted. It was unconscionable to bring some stranger in at this late stage. She didn’t trust someone who hadn’t been vetted for work on something so sensitive and she blamed me for letting the Guardian risk our plan.

I couldn’t tell Laura that her concerns were invalid, but I did try to convince her that the Guardian was insistent, there was no choice. And Ewen would only meet the source when we were ready.

Laura didn’t care. To placate her anger, I even offered not to go, a suggestion she instantly rejected. We sat in miserable, angry silence for ten minutes as the car was stuck in traffic on the way to JFK.

I knew Laura was right: it shouldn’t have happened this way, and I broke the silence by telling her so. I then proposed that we ignore Ewen and freeze him out, pretend that he’s not with us. "We’re on the same side," I appealed to Laura. "Let’s not fight. Given what’s at stake, this won’t be the last time that things happen beyond our control." I tried to persuade Laura that we should keep our focus on working together to overcome obstacles. In a short time, we returned to a state of calm.

As we arrived in the vicinity of JFK Airport, Laura pulled a thumb drive out of her backpack. "Guess what this is?" she asked with a look of intense seriousness.

"What?"

"The documents," she said. "All of them."

Ewen was already at our gate when we arrived. Laura and I were cordial but cold, ensuring that he felt excluded, that he had no role until we were ready to give him one. He was the only present target for our irritation, so we treated him like extra baggage with which we had been saddled. It was unfair, but I was too distracted by the prospect of the treasures on Laura’s thumb drive and the significance of what we were doing to give much more thought to Ewen.

Laura had given me a five-minute tutorial on the secure computer system in the car and said she intended to sleep on the plane. She handed over the thumb drive and suggested that I start looking at her set of documents. Once we arrived in Hong Kong, she said, the source would ensure I had full access to my own complete set.

After the plane took off, I pulled out my new air gapped computer, inserted Laura’s thumb drive, and followed her instructions for loading the files.

For the next sixteen hours, despite my exhaustion, I did nothing but read, feverishly taking notes on document after document. Many of the files were as powerful and shocking as that initial PRISM PowerPoint presentation I had seen back in Rio. A lot of them were worse.

One of the first I read was an order from the secret Foreign Intelligence Surveillance Act (FISA) court, which had been created by Congress in 1978, after the Church Committee discovered decades of abusive government eavesdropping. The idea behind its formation was that the government could continue to engage in electronic surveillance, but to prevent similar abuse, it had to obtain permission from the FISA court before doing so. I had never seen a FISA court order before. Almost nobody had. The court is one of the most secretive institutions in the government. All of its rulings are automatically designated top secret, and only a small handful of people are authorized to access its decisions.

The ruling I read on the plane to Hong Kong was amazing for several reasons. It ordered Verizon Business to turn over to the NSA "all call detail records" for "communications (i) between the United States and abroad; and (ii) wholly within the United States, including local telephone calls." That meant the NSA was secretly and indiscriminately collecting the telephone records of tens of millions of Americans, at least. Virtually nobody had any idea that the Obama administration was doing any such thing. Now, with this ruling, I not only knew about it but had the secret court order as proof.

Moreover, the court order specified that the bulk collection of American telephone records was authorized by Section 215 of the Patriot Act. Almost more than the ruling itself, this radical interpretation of the Patriot Act was especially shocking.

What made the Patriot Act so controversial when it was enacted in the wake of the 9/11 attack was that Section 215 lowered the standard the government needed to meet in order to obtain "business records," from "probable cause" to "relevance." This meant that the Federal Bureau of Investigation, in order to obtain highly sensitive and invasive documents—such as medical histories, banking transactions, or phone records—needed to demonstrate only that those documents were "relevant" to a pending investigation.

But nobody—not even the hawkish Republican House members who authored the Patriot Act back in 2001 or the most devoted civil liberties advocates who depicted the bill in the most menacing light—thought that the law empowered the US government to collect records on everyone, in bulk and indiscriminately. Yet that’s exactly what this secret FISA court order, open on my laptop as I flew to Hong Kong, had concluded when instructing Verizon to turn over to the NSA all phone records for all of its American customers.

For two years Democratic senators Ron Wyden of Oregon and Mark Udall of New Mexico had been going around the country warning that Americans would be "stunned to learn" of the "secret interpretations of law" the Obama administration was using to vest itself with vast, unknown spying powers. But because these spying activities and "secret interpretations" were classified, the two senators, who were members of the Senate Intelligence Committee, had stopped short of disclosing to the public what they found so menacing, despite the legal shield of immunity granted to members of Congress by the Constitution to make such disclosures had they chosen to.

I knew as soon as I saw the FISA court order that this was at least part of the abusive and radical surveillance programs Wyden and Udall had tried to warn the country about. I instantly recognized the order’s significance. I could barely wait to publish it, sure that its exposure would trigger an earthquake, and that calls for transparency and accountability were sure to follow. And this was just one of hundreds of top secret documents I read on my way to Hong Kong.

Yet again, I felt my perspective shift on the significance of the source’s actions. This had already happened three times before: when I first saw the emails Laura had received, then again when I began speaking to the source, and yet again when I’d read the two dozen documents he sent by email. Only now did I feel that I was truly beginning to process the true magnitude of the leak.

On several occasions on the flight, Laura came over to the row where I was sitting, which faced the bulkhead of the plane. As soon as I saw her, I would pop up out of my seat and we’d stand in the open space of the bulkhead, speechless, overwhelmed, stunned by what we had.

Laura had been working for years on the subject of NSA surveillance, herself repeatedly subjected to its abuses. I had been writing about the threat posed by unconstrained domestic surveillance going back to 2006, when I published my first book, warning of the lawlessness and radicalism of the NSA. With this work, both of us had struggled against the great wall of secrecy shielding government spying: How do you document the actions of an agency so completely shrouded in multiple layers of official secrecy? At this moment, we had breached that wall. We had in our possession, on the plane, thousands of documents that the government had desperately tried to hide. We had evidence that would indisputably prove all that the government had done to destroy the privacy of Americans and people around the world.

As I continued reading, two things struck me about the archive. The first was how extraordinarily well organized it was. The source had created countless folders and then sub-folders and sub-sub-folders. Every last document had been placed exactly where it belonged. I never found a single misplaced or misfiled document.

I had spent years defending what I view as the heroic acts of Chelsea (then Bradley) Manning, the army private and whistle-blower who became so horrified at the behavior of the US government—its war crimes and other systematic deceit—that she risked her liberty to disclose classified documents to the world through WikiLeaks. But Manning was criticized (unfairly and inaccurately, I believe) for supposedly leaking documents that she had not first reviewed—in contrast to Daniel Ellsberg, the critics speculated. This argument, baseless though it was (Ellsberg was one of Manning’s most devoted defenders, and it seemed clear that Manning had at least surveyed the documents), was frequently used to undermine the notion that Manning’s actions were heroic.

It was clear that nothing of the sort could be said about our NSA source. There was no question that he had carefully reviewed every document he had given us, that he had understood their meaning, then meticulously placed each one in an elegantly organized structure.

The other striking facet of the archive was the extent of government lying it revealed, evidence of which the source had prominently flagged. He had titled one of his first folders "BOUNDLESS INFORMANT (NSA lied to Congress)." This folder contained dozens of documents showing elaborate statistics maintained by the NSA on how many calls and emails the agency intercepts. It also contained proof that the NSA had been collecting telephone and email data about millions of Americans every day. BOUNDLESS INFORMANT was the name of the NSA program designed to quantify the agency’s daily surveillance activities with mathematical exactitude. One map in the file showed that for a thirty-day period ending in February 2013, one unit of the NSA collected more than three billion pieces of communication data from US communication systems alone.

The source had given us clear proof that NSA officials had lied to Congress, directly and repeatedly, about the agency’s activities. For years, various senators had asked the NSA for a rough estimate of how many Americans were having their calls and emails intercepted. The officials insisted they were unable to answer because they did not and could not maintain such data: the very data extensively reflected in the "BOUNDLESS INFORMANT" documents.

Even more significant, the files—along with the Verizon document—proved that the Obama administration’s senior national security official, Director of National Intelligence James Clapper, lied to Congress when, on March 12, 2013, he was asked by Senator Ron Wyden: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

Clapper’s reply was as succinct as it was dishonest: "No, sir."

In sixteen hours of barely interrupted reading, I managed to get through only a small fraction of the archive. But as the plane landed in Hong Kong, I knew two things for certain. First, the source was highly sophisticated and politically astute, evident in his recognition of the significance of most of the documents. He was also highly rational. The way he chose, analyzed, and described the thousands of documents I now had in my possession proved that. Second, it would be very difficult to deny his status as a classic whistle-blower. If disclosing proof that top-level national security officials lied outright to Congress about domestic spying programs doesn’t make one indisputably a whistle-blower, then what does?

I knew that the harder it would be for the government and its allies to demonize the source, the more powerful the effect of the source’s disclosures would be. The two most favored lines of whistle-blower demonization—"he’s unstable" and "he’s naive"—were not going to work here.

Shortly before landing, I read one final file. Although it was entitled "README_FIRST," I saw it for the first time only at the very end of the flight. This document was another explanation from the source for why he had chosen to do what he did and what he expected to happen as a result, and it was similar in tone and content to the manifesto I had shown the Guardian editors.

But this document had facts the others did not. It included the source’s name—the first time I learned it—along with clear predictions for what would likely be done to him once he identified himself. Referring to events that proceeded from the 2005 NSA scandal, the note ended this way:

Many will malign me for failing to engage in national relativism, to look away from [my] society’s problems toward distant, external evils for which we hold neither authority nor responsibility, but citizenship carries with it a duty to first police one’s own government before seeking to correct others. Here, now, at home, we suffer a government that only grudgingly allows limited oversight, and refuses accountability when crimes are committed. When marginalized youths commit minor infractions, we as a society turn a blind eye as they suffer insufferable consequences in the world’s largest prison system, yet when the richest and most powerful telecommunications providers in the country knowingly commit tens of millions of felonies, Congress passes our nation’s first law providing their elite friends with full retroactive immunity—civil and criminal—for crimes that would have merited the longest sentences in [] history.

These companies . . . have the best lawyers in the country on their staff and they do not suffer even the slightest consequences. When officials at the highest levels of power, to specifically include the Vice President, are found on investigation to have personally directed such a criminal enterprise, what should happen? If you believe that investigation should be stopped, its results classified above-top-secret in a special "Exceptionally Controlled Information" compartment called STLW (STELLARWIND), any future investigations ruled out on the principle that holding those who abuse power to account is against the national interest, that we must "look forward, not backward," and rather than closing the illegal program you would expand it with even more authorities, you will be welcome in the halls of America’s power, for that is what came to be, and I am releasing the documents that prove it.

I understand that I will be made to suffer for my actions, and that the return of this information to the public marks my end. I will be satisfied if the federation of secret law, unequal pardon, and irresistible executive powers that rule the world that I love are revealed for even an instant. If you seek to help, join the open source community and fight to keep the spirit of the press alive and the internet free. I have been to the darkest corners of government, and what they fear is light.

Edward Joseph Snowden, SSN: ■■■■■

CIA Alias "■■■■■"

Agency Identification Number: ■■■■■

Former Senior Advisor | United States National Security Agency, 
under corporate cover

Former Field Officer | United States Central Intelligence Agency, 
under diplomatic cover

Former Lecturer | United States Defense Intelligence Agency, 
under corporate cover

Copyright © 2014 by Glenn Greenwald

Read More Show Less

Customer Reviews

Average Rating 4.5
( 15 )
Rating Distribution

5 Star

(12)

4 Star

(1)

3 Star

(1)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 15 Customer Reviews
  • Posted May 17, 2014

    Greenwald delivers an amazing insider access on the most importa

    Greenwald delivers an amazing insider access on the most important news story of the decade. As a longtime reader of his columns, I found his personal account of the unfolding Edward Snowden story to be fascinating and insightful. Greenwald begins with his initial contact with “Cincinnatus” (the code name Snowden used) and how he almost missed the NSA scoop entirely. Luckily, Snowden’s determination forced Greenwald to take note and the rest is history. Snowden’s motivation for acting and releasing these classified documents is the highlight of the book. Unlike the spin and outright lies spewed by many in Washington, Greenwald describes Snowden’s exact reasoning-from how he collected and precisely categorized the files, to his decision to release them in Hong Kong, and being fully aware of the consequences of his actions. Greenwald also stresses the precision and careful deliberation that was taken before exposing the classified NSA files.

    As someone who has followed these revelations quite avidly, I was familiar with most of the reporting, but the story behind the story was fascinating enough to grip my attention throughout. For anyone who isn’t as well versed, the book is chock-full of secret programs, such as the NSA spying for commercial purposes, and how they intercepted routers being delivered to China in order to install backdoor access. And those are just the tip of the numerous disclosures.

    The book is well sourced, including copies of the original documents, which are quite insightful. What struck me the most was how GCHQ (the British counterpart to the NSA) harassed various groups and individuals by using denial-of-service attacks, swapping online photos, and overloading fax machines with junk faxes. For any government to use these juvenile tactics against anyone, let alone someone who hasn’t been convicted of a crime, is beyond disgusting and a shame for any civil society. I hope Greenwald can expand on this topic and expose any dirty tactics the US government may likewise have used (he did discuss one antidotal example of a honey-trap, but there was no sourcing other than Snowden’s word).

    All in all, No Place to Hide is a remarkable book, the reporting solid, and I commend Greenwald for his courage in exposing the tremendous overreach (and possible illegality) of the NSA. Likewise, thank you Edward Snowden for your bravery and calm demeanor in the face of such scurrilous attacks. I can’t recommend this book highly enough and believe it should be required reading for every civic-minded American.

    13 out of 13 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 20, 2014

    This book is scary as heck and at the same time you cant just lo

    This book is scary as heck and at the same time you cant just look away from it. There is more to the story than the 24 hours news cycle is leading us to believe. I give this book a thumbs up. Also just read American Séance and it basically list ways to resolve the issues that are coming up reading this book. Seems like the federal government has become too powerful and thinks it can do what it wants. Check out the solutions in the American Séance book after you read this. You will be shocked at the concepts that are pretty simple to stop this kind of behavior.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 20, 2014

    A Must Read!

    I wasn't sure what to expect when I ordered this book, but was curious enough given the recent Snowden interview with Brian Williams. Greenwald has written an excellent account of the who, what, when and where of the NSA/Snowden case. My greatest takeaway was not to believe everything I read in the mainstream press, not a surprise, except that there were more reasons not to than I had ever dreamed. Well written and an easy read. I couldn't put it down and read it over a two day period.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 6, 2014

    If you care about this issue, read this book

    This book is well written and gives the other side of the story. The majority of what we have seen in the news is spin to portray Snowden and the revelations in a bad light. I am a flag waving, law and order patriot and conservative but we would have no idea on how bad things are if he had not leaked the information. This book is essential for anyone who wants to have all of facts so that you can make up your own mind.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted June 4, 2014

    There are many shocking factual revelations in this book. With

    There are many shocking factual revelations in this book. With solid argumentation, Greenwald's makes an excellent case for government transparency and accountability. There are disquieting indications that the surveillance state is far more interested in citizens, allies, and economic advantages than real terrorist threats. The Stasi could only fantasize about the systems and technologies that are in place and operating here. I recommend this to all who cherish their threatened constitutional freedoms. Perhaps the biggest revelation I came away with personally from reading this book is knowledge that people--any people anywhere--simply cannot be trusted with the power that is currently wielded and desired by those citizens put in positions of trust in today's hierarchies.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 4, 2014

    Read ot NOW.

    Clearly and openly written about a subject that may well affect us all, and which has had way too many uninformed opinions already expressed.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 1, 2014

    This book starts out like a spy novel- who is the man trying to

    This book starts out like a spy novel- who is the man trying to share top secret documents, why is he doing it and how can he avoid being silenced. Once the documents are reviewed, it is scary indeed. Mr. Greenwald exposes the extensive internal surveillance of the USA's citizens by their own government.

    Was this review helpful? Yes  No   Report this review
  • Posted June 27, 2014

    Informative, but a bit biased.

    Greenwald is a long time privacy advocate, and has difficulty overcoming this bias. He is informative, however, and helps the reader better understand Snowden's character as well as his intent.

    Was this review helpful? Yes  No   Report this review
  • Posted June 21, 2014

    Yellow Journalism at its worst - DONT BUY THIS

    I expected to get an unbiased account of the Snowden drama.

    Outside of the discussion on the initial contacts with Snowden this book was a combination of anti-government propaganda and self serving drivel.

    Yes the NSAs mission can be troubling, but the "secret" that they were listening or possibly listening was not news. The secret code names and techniques used were. He cites no single occasion where this information and the power that comes with it was abused.

    He paints himself as a tragic american hero, but he is closer to a traitor to the country he has decided not to live in.

    0 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 15, 2014

    Excellent book

    Snowden is a hero. This book gives great insight to everytying that happened before and during releases of NSA secrets.

    Was this review helpful? Yes  No   Report this review
  • Posted June 13, 2014

    Extremely Insightful and Full of Suspense

    It is no surprise that Glenn Greenwald has provided this remarkable book with his credentials as an investigative reported. The research provided in this book is top notch.

    He detail as to the introduction of Edward Snowden and the ultimate NSA documentation provided to The Guardian is a story in itself.

    His candid approach towards telling this important story is first rate.

    The book flows evenly from start to finish and is at times nearly impossible to put down.

    Get it!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 9, 2014

    No place to hide

    We all live by a social contract written and unwritten. When our government does something no matter what country we are from it should best represent a majority. So called whistleblowers are those who call attention to things in society they feel go against the majority by a minority. When the minority are caught they often threaten or intimidate those who call attention to them. The same types of people who bullied us as children with their fists now do it in the courts of supposed fair and just societies. Overall great book. The author used this platform to critisize the practices of other journalistic bodies in a self serving biased manner. Maybe he was just talking about the bullies in his world.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 21, 2014

    No text was provided for this review.

  • Anonymous

    Posted June 25, 2014

    No text was provided for this review.

  • Anonymous

    Posted July 18, 2014

    No text was provided for this review.

Sort by: Showing all of 15 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)