HOUSE_OVERSIGHT_019784.jpg

1.7 MB

Extraction Summary

6
People
5
Organizations
3
Locations
4
Events
3
Relationships
3
Quotes

Document Information

Type: Book page / document excerpt
File Size: 1.7 MB
Summary

This page from the book "How America Lost Its Secrets" argues that Edward Snowden deliberately orchestrated leaks to compromise U.S. and British surveillance operations, including PRISM and NSA encryption capabilities. It details his coordination with journalists like Greenwald and Poitras and suggests that by recommending end-to-end encryption, Snowden compromised intelligence gathering on terrorist activities similar to how Robert Hanssen compromised operations in the 1990s.

People (6)

Timeline (4 events)

May 2013 leaks
PRISM exposure
1990s Soviet communications interception
2015 terrorist attacks

Locations (3)

Relationships (3)

to
to
to

Key Quotes (3)

"Snowden supplied them in written answers to interrogatives sent to him by Poitras and Appelbaum in May 2013 while he was still on the NSA payroll."
Source
HOUSE_OVERSIGHT_019784.jpg
Quote #1
"He told Greenwald, for example, that encryption was "critically necessary" for anyone to evade NSA surveillance."
Source
HOUSE_OVERSIGHT_019784.jpg
Quote #2
"Just as Robert Hanssen had deliberately compromised the NSA's interception of Soviet communications... Snowden deliberately compromised the NSA's interception of concealed messages by potential terrorists on the Internet."
Source
HOUSE_OVERSIGHT_019784.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (2,531 characters)

296 | HOW AMERICA LOST ITS SECRETS
These precise tips for evading U.S. and British surveillance were
not accidentally leaked. Snowden supplied them in written answers
to interrogatives sent to him by Poitras and Appelbaum in May
2013 while he was still on the NSA payroll. He also carefully orches-
trated the exposure of the PRISM surveillance programs, precisely
specifying, as Greenwald writes in his book No Place to Hide, who
was to release the "scoops" in which newspapers. He gave Gellman a
seventy-two-hour ultimatum for exposing PRISM, as we know. He
further provided Poitras with well-organized files for publications
revealing, among other things, that the NSA had paid RSA, a lead-
ing computer security provider, to build flawed encryption protocols,
which allowed the NSA to read encrypted messages on computers
and online video games. In short, he used these journalists to accom-
plish his purpose. In light of the way he micromanaged the leaks, it is
difficult to conclude that he did not deliberately plan to compromise
and render useless these U.S. and British operations.
Whatever he intended, he clearly succeeded in blowing the cover
off NSA's operations authorized under the Foreign Intelligence Sur-
veillance Act for monitoring terrorists' activities. After all, terrorist
groups are no different from other criminal enterprises in their need
to keep their communications secret from the authorities pursuing
them. If they find out that the police are tapping their phone lines or
intercepting other channels of communication, they can be expected
to either stop using them or use them to divert attention away from
their real plans.
In addition, Snowden suggested an alternative means to those who
wanted to evade government surveillance. He recommended that
they use end-to-end encryption, which results in messages being
encrypted before they are sent over the Internet. He told Greenwald,
for example, that encryption was "critically necessary" for anyone
to evade NSA surveillance. Just as Robert Hanssen had deliberately
compromised the NSA's interception of Soviet communications in
Washington, D.C., in the 1990s, Snowden deliberately compromised
the NSA's interception of concealed messages by potential terrorists
on the Internet. We cannot know whether or not any of the jihadists
involved in subsequent terrorist attacks (such as those in Paris or
San Bernardino, California, in 2015) would have used the Internet
Epst_9780451494566_2p_all_r1.indd 296
9/30/16 8:13 AM
HOUSE_OVERSIGHT_019784

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document