The Rest Is Classified - 44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Episode Date: May 6, 2025

Edward Snowden has decided he is going to leak some of America's biggest secrets, but first he needs to steal them. How do you steal from some of America's most secure facilities? Does he have the acc...ess he needs? And is he working alone? Listen as David McCloskey and Gordon Corera share how Edward Snowden stole 1,500,000 files from the American system. ------------------- To sign up to The Declassified Club, go to www.therestisclassified.com or click this ⁠link⁠. To sign up to the free newsletter, go to: ⁠https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up⁠ ------------------- Order a signed edition of David's latest book, The Seventh Floor, ⁠⁠⁠via this link.⁠⁠⁠ Pre-order a signed edition of Gordon's latest book, The Spy in the Archive, ⁠⁠⁠via this link.⁠⁠⁠ ------------------- Get our exclusive NordVPN deal here ➼⁠⁠⁠ www.nordvpn.com/restisclassified⁠⁠⁠ It’s risk-free with Nord’s 30-day money-back guarantee! Exclusive INCOGNI Deal: To get an exclusive 60% off an annual Incogni plan, go to ⁠⁠⁠⁠⁠⁠⁠https://incogni.com/therestisclassified⁠⁠ Email: classified@goalhanger.com Twitter: ⁠⁠⁠@triclassified⁠⁠⁠ Assistant Producer: Becki Hills Producer: Callum Hill Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 I had practically unlimited access to the communications of nearly every man, woman, and child on earth who ever dialed a phone or touched a computer. Ugh. All right. Well, that was Edward Snowden, also from his memoir, Permanent Record, and we're back with episode two of the Edward Snowden journey. And despite the fact that I think that line, Gordon, that I just read, that you just made me read, which is actually the better way to say it,
Starting point is 00:00:35 is completely fabricated. Deadly Sin number one, Edward Snowden. We're going to talk a little bit today about, really, Snowden's journey to getting to a point where he is sitting on top of a trove of massive secrets. Absolutely. So last time we looked at Edward Snowden, the early years, him, the young Snowden, a kind of guy who grew up with computers and the internet, loved them.
Starting point is 00:01:03 A libertarian who goes to work as a contractor, CIA, works in the CIA elsewhere, clearly chafes at some of the restrictions on him, has some difficulties at work, also has an ideology. So one of the key questions, which I think we'll come back to is what explains his journey? How far is it about grievance and how far is it about ideology? We left him in Japan working as a contract for NSA and having seen some of the really secret programs in there, which suggested the NSA was collecting data about American phone records. So after that, he does that for a couple of years, then age 28, 2011, he goes back
Starting point is 00:01:40 to the U S and he takes another kind of tech role. He's a liaison between the company Dell and the CIA coming up with cloud computing solutions. So again, another really techie job. Also in this period, I will note that Dell had tried to move him in about September of 2010 to a position where he would support IT systems at CIA. But, but, and for those watching, this is a scattered castles reference, so mark it down. Because of his D-Rog mark, his sort of black flag mark in scattered castles, the system that
Starting point is 00:02:13 manages clearances, Dell couldn't put him in that position. They had to find another spot for him that didn't require the same level of security clearance. And so he ends up back in another role and then eventually in Hawaii. Yeah, it's quite a place to end up because by age 29, 2012, he's working again as a contractor, but for NSA. So effectively inside the NSA in Hawaii, nice place to work. He's living with his girlfriend then Lindsay Mills. She's a photographer and a dancer.
Starting point is 00:02:43 Now he's the place he works sounds amazing. He's working deep underground in a kind of tunneled out facility beneath a pineapple field. And this in World War II was an underground aircraft factory designed to be protected from bombing. And I love the way he describes it as being like a Bond villain lair but with crappier lighting. That's good. I'm going to steal that for a novel. Yeah, take it.
Starting point is 00:03:07 So here he is, you know, again, within the kind of heart, the secret state. Fair to say he's remembered by colleagues as being quite eccentric. They remember him as a kind of pale vampiric figure wearing a hoodie, a particular hoodie, which actually had a parody of the NSA logo on it. So it had an eagle, which is the kind of normal symbol, but wearing headphones and kind of spying on the world. Talents across the world. And he kept a copy of the Constitution on his desk.
Starting point is 00:03:34 So you do get a picture of a man who is perhaps at odds with his institution, which is kind of interesting, isn't it? Well, and he's also remembered in this period for not being able to show up to work on time, which I'll just mention in my fact-based. We've all been there. Right. And apparently because he's playing video games so late at night, you know, and again, it's this kind of thread of this guy is smart, actually likable in many respects.
Starting point is 00:03:59 He's introverted, but you know, he's got a long-term girlfriend, he's got relationships with people, but he's not really able to function in a normal work environment. And he's bored. And he's bored. I mean, I think in some ways he's too clever for many of the roles he takes. Gordon. Gordon. No, I think that's true.
Starting point is 00:04:17 I think that's the picture I get a bit of him. There is another feature here, which is colleagues from the sort of pineapple bunker remember that Snowden was sort of very, he would come out and say that, okay, well, things like the Stop Online Piracy Act and the Protect Intellectual Property Act, these are going to lead to online censorship, which is a theme of his. He's very concerned about that. Yeah, pre-internet is what he wants. But then he'll admit to having read neither bill and not understanding really what's in
Starting point is 00:04:44 them. So I do think you also see these glimmers in this period and even earlier of somebody who is extremely certain about his beliefs does have- Ideological beliefs. Ideological beliefs. He's not just a mercenary, but he jumps to conclusions very quickly, gets to very certain conclusions very quickly
Starting point is 00:05:03 about those beliefs. Yeah, I think that's right. Now it is at this point in 2012 that he's going to turn into someone who is not just kind of aggrieved and chafing against authority, but who is actually going to collect and steal a ton of secrets. His narrative of it is that he'd seen what the secret state was up to, he'd seen the kind of power of the surveillance state, he'd been able to look at these documents and he wants to stop it. So I think this is the kind of interesting point where, you know, how far is this being
Starting point is 00:05:40 like a whistleblower and how far is this being someone who is trying to kind of damage the state or stealing documents. Two quite different interpretations of the same actions. He says he's kind of chasing, going down rabbit holes in his spare time, trying to kind of understand what the secret state is up to and he wants to stop that because he believes it's against the constitution in terms of you know, the collection of Americans data and he believes it's unethical and against his ideas of free internet. Do you buy that, David? I'm guessing you don't.
Starting point is 00:06:13 Well, no, I don't buy it. There's a very kind of critical period in the middle of 2012. That's kind of central to this. But but up until that point, I mean, it is probably worth us talking a little bit about that kind of access he had, because he does end up in a unique position to take a massive trove of documents. And he's kind of pulling together it as, you know, cause again, in Hawaii, I mean, I think he'll say, he had like 30 minutes of work to do a day
Starting point is 00:06:42 of actual work, right? So he starts kind of pulling together, what do a day of actual work, right? Yeah. So he starts kind of pulling together what is this program called heartbeat, right? Where he's essentially trying to create a centralized repository for a lot of the documents he's going to... Yeah, kind of reading list. Yeah, reading list of documents. And it's quite interesting because he does this kind of semi-opening. At this point, he's kind of telling people he's creating this and he's got access to all the systems because he's a systems engineer. In a sense, those people who keep the systems running, by definition, have privileged high level access to all the files because they need to in order to be able to manage them. It does mean he is able to do stuff which maybe a normal spy wouldn't have been able to do in terms of collect and collate all the data that's here.
Starting point is 00:07:22 He starts to collect this material. It's an interesting point to look at here is, is he a whistleblower? Because I think that is how he is framed very much by his supporters. That he is someone who has seen the bad stuff in the secret state, and he wants to expose it, and therefore he's a whistleblower. Being a whistleblower is obviously something which also gets you certain kinds of protections. You know, it's very different from being, if like, a spy or someone who's stealing stuff or out
Starting point is 00:07:48 to damage an institution. Well, if you enter Edward Snowden on Google, his tagline will say, and it'll say whistleblower. That's how he pops up. But I think this is deadly sin number two, Gordon. This is impure motives, okay? This is critical to understand because lost in all of the memoirs, a lot of the very positive reception that Snowden's leaks received
Starting point is 00:08:14 is a very critical piece of the timeline, which is you get to June of 2012, he's in Hawaii, and Snowden has a massive fight with his supervisors over what else? A software patch that gets deployed, it fails, right? And there is a fight on his team between supervisors over why this happened. And essentially what Snowden does, which is similar to what he did in his very first months at CIA, is in this back and forth fight, he sends a note like three or four levels above the chain to a senior NSA employee at Fort Meade. Right?
Starting point is 00:09:02 And keep in mind, Snowden is a contractor working for Dell. So rightly or wrongly, he's not a blue badge NSA employee working at the fort, right? So he's elevated this issue massively. This obviously doesn't go well for him. There's a note that comes back. He gets a quick rebuke from Washington. His behavior is quote, totally unacceptable, unacceptable in all caps. And so you can only imagine what's going on in the cubicle form out under that pineapple field. And it is two weeks after this, June, 2012 incident that he starts these bulk downloads.
Starting point is 00:09:38 So I think the recipe of sort of the sauce here of Snowden's decision, I think really matters a lot. And my view is that it's kind of three things, right? Number one, you have a guy who has this incredible certainty in his own beliefs, his own kind of worldview that feels like he's been put down by the system, wronged by the system, that he should be way ahead of where he is. He should probably have his boss's job or his boss's boss's job.
Starting point is 00:10:10 And so I think you do at the base level have this kind of revenger's tale that has the ideology, this kind of, you know, free internet privacy thing layered on top. But in my view, the facts, the chronology of sort of when he starts down this journey, show it to be very much motivated by revenge. Yeah, it is a matter of interpretation. But I think ideology does play a role.
Starting point is 00:10:41 You are right that there may be triggers to do with what happens in the workplace. And I think he's kind of his views are dismissed by a supervisor, because he's a contractor, actually, he's kind of told, you know, come back as staff, if you want to talk to me like that. And he's kind of flamed out in front of colleagues, I accept that there's there is grievance there. And that grievance is really powerful. Yeah, in the in the espionage business too. Yeah, but I also think there's ideology there. He's decided he wants to do something and he's going to start collecting files. We'll look in a minute at how he does that. He doesn't go through, if you like, whistleblower channels, because there are supposed to be channels.
Starting point is 00:11:12 Now some people have said, well, you know, there's no evidence he did that and he should have done that. I think that's half true, but I also in Snowden's defense will say, you know, the evidence was people who had tried to blow the whistle about some of these programs had been shut up. I mean, there were cases of people like Thomas Drake, who'd been in the NSA and had talked about some of this attitude, and he'd basically tried to blow the whistle internally. It had failed. He'd gone out and gone to a newspaper and told them about it, and then he got arrested. And so it is true that Snowden doesn't go through, if you like, the formal channels
Starting point is 00:11:41 to go put your hand up and go, I think these programs are wrong. But I don't think he feels he would have been listened to or that there was that option to actually have any difference or make any difference about these programs by going through the formal channels. Well, I think that's my third deadly sin, Gordon, is that he doesn't avail himself of these channels. And I agree with you that you could look at Thomas Drake, you could look at these case studies of NSA folks who had tried and it had not gone well for them. But what I find interesting is that
Starting point is 00:12:10 Snowden is perfectly willing throughout his career to go to the IG. The Inspector General, yeah. The Inspector General. Yeah. To go to superiors with all manner of grievances, complaints, issues that have been detrimental to his career. And so number one, I think given the nature of the information that he's going to leak, there are protections for this.
Starting point is 00:12:35 There's a 1998 Whistleblower Protection Act that would have covered contractors. There are DOD regs that cover this. He could have gone to any number of House, Intel, or Senate Intel committee staffs with specific documents and brought them to their attention, right? But he doesn't. For someone who has shown himself willing to go to those authorities in the past,
Starting point is 00:12:59 I think there's a level of irresponsibility, right, with this material. This is material that is funded by the U.S. taxpayer. So to not go through some of irresponsibility, right, with this material. This is material that is funded by the US taxpayer. So to not go through some of those channels, I just think, man, you know, that's an irresponsible decision. Yeah. And I think, you know, it gets to a question of motive, which maybe we'll come back to when we get to the very end of the series, which is what is he seeking to do at this point? Is he trying to place greater oversight on these programs and have a debate about them? Is he trying to
Starting point is 00:13:25 stop the surveillance and the programmes? Is he trying to damage the NSA and the intelligence community? That's a big question. It's quite hard because the answer is in Edward Snowden's head and I'm not sure even he would be able to verbalise it even if he was here and be honest about it. But those are the different levels of what's going on. What is, I think, significant is that rather than take just a few documents, and I think this is one of the big questions I have, is if he was really aggrieved by, say, Stella Wynn, the program collecting American phone records and a few other surveillance programs, he could have just picked 10 files to take.
Starting point is 00:14:00 But what he's about to do and what we're going to see is he's not going to take 10 files, he's going to take almost everything he can lay his hands on about what the NSA and its allies do. And I think that, to me, is one of the question marks is why does he take so much to expose what they do, rather than if you like, the kind of narrow things where he's got an issue about the kind of, and I think a legitimate issue about the constitutionality or the ethics of it. a legitimate issue about the constitutionality or the ethics of it. Well, and I'll just again add to my Deadly Sin number one on Edward Snowden's track record of fabrication, because one of the documents that he's going to take, or one set of documents he's going to take in this 2012 period, mid 2012, he's going to steal the test and the answer key for a job inside a group at NSA called T.A.O., Tailored Access Operations,
Starting point is 00:14:46 which is essentially in that era is the NSA's. Elite hackers. Elite hackers, the guys and girls who go out and try to access really hard to access networks of our foreign adversaries. And Snowden applies for this job, but he's already, I mean, this is where I think you do get this kind of jumbled set of motives for why he's already, I mean, this is where you, I think you do get this kind of jumbled set of motives
Starting point is 00:15:06 for why he's taking all these documents, because I guess he could have chanced upon this and then thought, well, I've got the test, I might as well apply. But he's also does have some very mercenary potential motives for some of these document thefts, but he takes this test and of course passes it with flying colors, right? Because he's got all the answers.
Starting point is 00:15:25 And then he gets offered, and again, I think this is a great insight into his personality because he gets offered a job working inside TAO, which by the way is a premier, inside NSA is a premier job to have, gets offered a GS-12, government scale 12 role inside TAO and turns it down because he felt he should have been offered a GS 15 salary. And this again, it's absolutely fascinating because you just
Starting point is 00:15:52 let's, you know, get into some of these facts around how this guy behaved and who he is. He's 29 at that point. And I mean, it's a little bit different kind of depending on the agency, but it would probably have taken a really competent, no, he joins when he's 23. He gets into the secret world. It would have taken 14, 15 years, something like that for a competent person to rise to the level of GS 15. He's been in for six and he's already thinking,
Starting point is 00:16:24 well, I should have my 15. Anyway, he turns down the TAO role and stays in Hawaii. But there's some really interesting aspects to this guy's character that I think get left out of the geography. One interesting thing though, about not taking that job though, is that people have said, was he working for the Russians or the Chinese? I don't think that's true. I'm sure that's not true. And one of the reasons, and we'll come back to a few other reasons, but one of the reasons here is that if you were a spy, you'd go take the job at DAO, even for a lower pay, because that gets you access to the really hardcore secrets. So it is interesting, but it does suggest you're back to either grievance or ideology, but that's his motivation, not being a spy. So here he is. He's angry. He's
Starting point is 00:17:04 angry at the system, angry at his employers, it here he is, he's angry, he's angry at the system, angry at his employers, it looks like, and he's going to do something about it. After the break, we'll come back and look at how he takes those secrets and what he does with them. From Wandery, I'm Raaza Jaffrey, and this is The Spy Who. This series, we open the file on Eamon Dean, the spy who betrayed Bin Laden. In 1994, 16-year-old Eamon wants to die. He heads to war-torn Bosnia to join the Mujahideen and save his fellow Muslims. He hopes to become a martyr so that he can be reunited with his dead parents in paradise.
Starting point is 00:17:43 Instead, he's about to be confronted by a cruel and bloody reality. A reality that'll lead him to turn his back on terrorism and become the West's top spy inside Al-Qaeda. Follow the Spy Who on the Wandery app, or wherever you listen to podcasts. Or you can binge the full season of the Spy Who betrayed Bin Laden early and ad-free with
Starting point is 00:18:06 Wanderi+. All right, well, welcome back. We are with Edward Snowden. He is bunkered under a pineapple field in Hawaii with headphones on, probably looking quite vampiric after a night of playing video games and arriving late to work. Edward Stoden has now moved in his sort of ongoing odyssey through the United States secret state. He has moved and he is now an analyst working for another contractor, right?
Starting point is 00:18:45 Booz Allen Hamilton. Still in Hawaii. Still in Hawaii, still working under contract for NSA, but at this other contractor, Booz Allen. And it is 2012. He has started these kind of bulk downloads off of his computer and out of these internal databases at NSA. And despite his sort of sunlight deprived looks, Edward Snowden has a tremendous amount of access inside this world and is starting to really harvest it. Yeah. I mean, he's working with something called an infrastructure analyst at Booz Allen, earning 120k, 120,000.
Starting point is 00:19:21 It seems like quite a lot of money for me, but maybe that's the contractor world in the US intelligence community. There we go. But he says the key thing here is he had access to something called X-key Score, which is one of the systems used to search through all the different streams of data that NSA collects. And as we'll kind of explore, I think, as we go through the series, there were huge amounts of streams of different ways in which NSA was able to grab different types of data and different types of record and electronic communications.
Starting point is 00:19:52 And X-keyScore was the kind of search tool, if you like, to kind of put an email address in that and see what you could bring up. Will Barron Well, I suppose that wonderful quote you made me read at the beginning of this episode, Gordon, about Stodin having access to every communication on planet Earth, it's total garbage, right? I mean, it's not true, but I think his access to like a sort of a search like X-key score tool like that gave him, you know, I think in his own kind of serial fabricator mind, the willingness to say that because he does have access. It's true, right? He has access to a tremendous
Starting point is 00:20:25 amount of information. Yeah. And I think if you or I or our audience were sitting at X-key score, I think we'd be astonished at the kind of, you know, what you could pull up if you went into it. So I think there is a lot, you know, that's not, you know, the exact who you, you know, whether you can wiretap the president, I don't know. But the idea that there's a lot of data there that you could use. I think that's true. Well, I've seen the PowerPoint documents that have leaked. The complexity makes me wonder if I would be able to operate XPScore because I think I would stare befuddled at the screen for a while
Starting point is 00:20:54 without being able to use it. And Snowden even, I mean, and we'll, I'm sure come to this a little bit later, he did claim to have wiretapped a bunch of Congress people and Supreme Court judges. Yeah. And it's not entirely clear to me what that means. We'll come to that. Deadly Sin number one continues a theme, Gordon, theme through the series. But here's the thing. He's seeing all this stuff.
Starting point is 00:21:18 He's in a job where he's got access. He's decided he wants to blow the whistle or cause damage, however we want to put it. That's his view. So he's decided he's to blow the whistle or cause damage, however we want to put it. That's his view. So he's decided he's going to download this material and it's fascinating how he does it. So he starts to copy the files that he has access to from his reading list system, which is called Heartbeat. And what's interesting is he transfers it onto old legacy PCs, so really old computers left in the office.
Starting point is 00:21:41 So these are not internet connected in a way you'd normally expect. So again, that just stops the trail being clear about what he's doing and stops leaving a digital trail to it. He then takes the material and transferred it onto tiny SD cards. It's really interesting. He doesn't want to use thumb drives, you know, kind of USB flash drives. He wants to use tiny SD cards because one of the reasons is you can smuggle them out much more easily. He can put them in a sock. They're not going to set off metal detectors because they're so small. I mean, at one point he hides one of the cards in his cheek. You know, they're small enough. You put it in his cheek so if someone stops him or asks him something, he could just swallow it.
Starting point is 00:22:17 The problem is it's very slow transferring this. Anytime they're pretty slow, but on probably old computers and old SD cards. So he spends hours overnight on the night shift, kind of copying and compressing the files so that he can fit them onto the SD cards. And it sounds like it is literally like those old movies where the spy is trying to steal something, it's like in the original Mission Impossible film with Tom Cruise, where you're seeing the bar move across the screen, like 81%, 82%, if slowly moving across the screen as he's trying to move those files around.
Starting point is 00:22:47 That's the process initially for stealing them. And then he also has got this thing about Rubik's cubes. And this is, I guess, the thing he loves doing. I find this entirely unsurprising. It is a bit of a hacker trope, I think, the Rubik's cube, and he's definitely got it. And so he starts carrying them around the office, and it's quite useful to do that every day because people get used to him carrying them and they know him as the Rubik cube guy.
Starting point is 00:23:09 And then what he does is he kind of peels off the square on the Rubik's cube and he hides the SD cards underneath so that he can just carry them past the armed guards who were there at the door. Cause there's a fair bit of security there. There's, you know, there's armed guards, there's, you know, you've got to scan your badges, there's, you know, those kind of. There's armed guards, you've got to scan your badges, there's those air-locked security doors you've got to swipe through. But he's able to get this data out, I guess.
Starting point is 00:23:32 He understands the system, that's the point. I think most maybe outsiders who are looking at intelligence community buildings or sites through the lens of Hollywood would probably be surprised to know that there are basically no checks. Once you're in the system, right? Once you're kind of inside. You're cleared, yeah. Obviously, if you were carrying a garbage bag
Starting point is 00:23:52 of documents out, someone might stop him. But if you're carrying an NSD card, or if you have 30 pages of documents or something in a briefcase or a bag, no one's checking this stuff. You could just walk out. And it actually, I mean, I remember every day leaving CIA, kind of going through this process.
Starting point is 00:24:13 And it was a little stressful actually of trying to check all of my bags and stuff to make sure that I wasn't carrying anything out on accident that was highly classified. And that kind of thing happened all the time. I had friends who, and analysts actually, tend to sweat this more than the case officers because the case officers are out there in the world
Starting point is 00:24:34 recruiting people and kind of dealing with classified stuff outside of a SCIF, a secure department and information facility, or vaults. I had a friend who would walk out and he walked out one time with a document he shouldn't have. He was about to have a heart attack. The point is it's easy. People in Britain have done it. They've left them on trains and made mistakes about it. He takes them home and then he transfers them onto a large storage device and encrypts them.
Starting point is 00:24:59 He puts a hood over his head in case there's a camera in his house. Classic spy stuff. Now what's so interesting is it's not entirely clear how many documents he's able to take, but some accounts are up to 1.5 million. I mean, there are different accounts and there's the smaller figures, but it's astonishing how much. And I guess this is also the reality of the digital world because 50 years ago, or 30 years ago, these documents would have been on paper, basically, rather than electronic. You were not going to carry 1.5 million documents out of a secret facility and then hide
Starting point is 00:25:30 them in your room at home, whereas he can do it and stick them on a hard drive. That has changed intelligence, it's changed security, it's changed what people call the insider threat, it's changed what you can do with spying and stealing secrets now, even though Edward Snowden, as we said, is not a spy, because of the ability to kind of collect large amounts of information in a tiny place. Well, and you've just teed up my fourth deadly sin of Edward Snowden, which is completely indiscriminate leaking. Right?
Starting point is 00:26:00 So 1.5 million documents are what he takes. So 1.5 million documents are what he takes. The vast majority, of course, unrelated to any of the domestic surveillance programs that angered him. How high, Gordon, do you think those documents would reach into the sky if they were stacked? I don't know, but you're going to tell me. I am going to tell you. To the moon? I'm going to tell you in kilometers.
Starting point is 00:26:24 Okay, go for it. A measure that you will understand. Five kilometers high. Okay. If you stack those up. Okay. He's a system administrator. So he's got access to massive databases,
Starting point is 00:26:37 kind of read, write, delete access, right? So he can see all this stuff. So the scraping tools that he uses to do these downloads are more or less completely indiscriminate. Now he does do some specific searches, right? But he's scraping through these databases. He has no idea what's even on these.
Starting point is 00:26:56 And there's an interesting kind of techie reason for some of this, which is that when senior NSA officials would come from around the world, come from Fort Meade and would log on to computers out at Hawaii, essentially their hard drive, what was on their system, really their user profile rather in DC at Fort Meade would replicate out in Hawaii. And so a lot of the flashier, sexier PowerPoints that ended up getting leaked initially are because
Starting point is 00:27:25 senior NSA policy people had come out, not to meet with Snowden, but for other meetings and their files are downloaded there and he pulls them unknowingly in many cases off of these databases. So totally indiscriminate. Your point about indiscriminate is taken in terms of what he takes. But here's the interesting thing. The question is, what is he going to do with them? Okay, that is the big question for him.
Starting point is 00:27:49 He's not indiscriminate in what he wants to do with them. And I think this is important because one option for him, if he'd simply wanted to do as much damage as possible, if that had been his motivation, he could have self-published onto the internet these files. That's true. And you know, that is, if you like, the WikiLeaks option. And we should say WikiLeaks, Julian Assange had really just emerged in, I think, 2010. I mean, a few years before, but particularly at that time, there'd been this huge leak of diplomatic cables, which were kind of State Department cables, which WikiLeaks had got hold of, and they just put them out on the internet. And the WikiLeaks,
Starting point is 00:28:22 Julian Assange attitude was information must be free. You know, doesn't matter classification, doesn't matter risk. Just put it all out there. You know, that's what it's for. Now at this point, if Snowden had been seeking maximum damage, he could have given them to WikiLeaks or he could have put themselves onto the internet. And he was capable of doing that. And he does not want to do that.
Starting point is 00:28:43 So I think that, you know, goes back to this point where the complexity of his motives, it's not as simple as just wanting to do damage. He says he wants people who can, if you like, work through the documents, validate them, explain them and publicize them. That's what he wants to do rather than just take indiscriminately and publish them. And I do agree with that and I'm grateful that Edward Snowden did not go the WikiLeaks route. It also bears mentioning that if he had gone the WikiLeaks route and just pushed them out, he would have given Assange and his organization, or something like it, the
Starting point is 00:29:22 credit. I think at his core, Edward Snowden, good, bad, and ugly, he is a narcissist. It would have been almost unthinkable for him to just push this stuff out there and not be the face of it. It's actually more strategic for someone who wants to be the face of this thing. And to kind of ride this, to have journalists or somebody else writing stories that you can sort of catapult yourself on. Yeah, and it is also true that I think working through journalists, he thinks will give him a bit more protection, in a sense, because you can go through kind of First Amendment and the freedom
Starting point is 00:29:54 of the press, and that that will give him a bit of institutional protection, if you like, as he seeks to kind of expose what he sees as the surveillance state. So certainly that is a decision that he's consciously taken, that this is the best route to try and get this information out there. So here he is, he's decided he wants to reach out for journalists. But how? I mean, how do you do that without being spotted? So he sets up a series of anonymous, at least pseudonymous email accounts to try and contact people using kind of particularly interesting encrypted email services. Encrypted so it's hard to trace, you know, who owns the account.
Starting point is 00:30:34 And actually the NSA and FBI will try and trace that eventually. And they go through lots of efforts to do that. It's interesting. He comes up with names for these accounts. Cincinnati, a Roman who voluntarily relinquished power. Tell me you're a narcissist without telling me you're a narcissist. And he uses another one, okay, Virax, truth teller. He's coming up with these email accounts, which he's going to use to reach out to journalists
Starting point is 00:30:56 to say, I've got this stuff for you. Now he's worried about using the internet and being traced, obviously, because he knows a fair bit about what can be done. So he used something called war driving around Hawaii. It's really interesting. So war driving is basically where you drive a car around with your antenna looking for Wi-Fi and hotspots and internet access that you can just kind of jump onto. So it's someone else's, you know, kind of Wi-Fi or network that you can connect to and then use so that you can use that to send your email and then move on.
Starting point is 00:31:25 And then obviously if someone comes to try and trace which IP address or where the email passed through in terms of the network, it'll just be some cafe or something like that. So he drives around doing this kind of wall driving thing, trying to send these emails to check whether it's been replied to on this special account. He then has to go back and find another network. So it's not an easy process, but this is the moment where he thinks, I've got something for the journalists. They're bound to want to listen and to hear what I've got to say.
Starting point is 00:31:51 Because he's sitting on a stack of 1.5 million top secret documents. He has a five kilometer high stack, three miles for American listeners, of documents, 1.5 million documents. And he's going to try to give them to journalists. And so I guess, I mean, the question here is, well, who is he going to reach out to? Which journalist is he gonna try? And who's really gonna help him tell this story?
Starting point is 00:32:15 I think as he sees it, this fantastic story, this lewd story about the surveillance state, NSA spying on Americans, and it's all gonna lead into an absolutely insane encounter and really a chase, I think, in a most unusual place. That's right, and it's going to lead to what was the biggest story of the year in news terms back in 2013.
Starting point is 00:32:39 Join us next week for that, but if you join the Declassified Club, you can hear the whole series right now. Our first bonus where David and I answer the questions you've sent in will be out this Friday but in the weeks to come our bonuses will include interviews with former CIA chiefs, the former head of MI5 and other people from the spy world. So to join just sign up at therestisclassified.com and take advantage of our launch discount. And we may also finally give me an opportunity, Gordon, to watch War Games, right, and discuss
Starting point is 00:33:12 it with you, thus completing my delayed entry into American manhood. So thank you for listening and we will see you next time. See you next time. See you next time. of the American dream. Nine-to-five jobs, dropping the kids off at soccer practice, and just the right amount of charm to slide into the orbits of the powerful. But behind closed doors, they were Russian operatives, meticulously crafting coded messages and feeding Moscow everything it needed to stay one step ahead of the US. When a powerful mole reveals the names and locations
Starting point is 00:34:02 of the undercover spies, the FBI finds itself walking a tightrope, protect its most crucial informant, whilst avoiding a catastrophic diplomatic firestorm. Follow the Spy Who on the Wondery app or wherever you listen to podcasts. Or you can binge the full season of The Spies Who Invaded Suburbia early and ad-free with Wondery Plus.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.