The Rest Is Classified - 48. The Leak That Changed The World: Death of Privacy (Ep 6)
Episode Date: May 20, 2025Do we have any privacy in the modern era? Why did Snowden do the things he did? Was he successful? And what is the closest Gordon Corera ever came to being a spy? Listen as David McCloskey and Gord...on Corera discuss the legacy of Edward Snowden. ------------------- To sign up to The Declassified Club, go to www.therestisclassified.com or click this link. To sign up to the free newsletter, go to: https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up ------------------- Order a signed edition of David's latest book, The Seventh Floor, via this link. Pre-order a signed edition of Gordon's latest book, The Spy in the Archive, via this link. ------------------- Email: classified@goalhanger.com Twitter: @triclassified Assistant Producer: Becki Hills Producer: Callum Hill Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices
Transcript
Discussion (0)
The expected call from the British government finally came.
The cabinet secretary, the most powerful unelected figure in the machinery of state, and the
prime minister's closest official aide, would like to visit me.
He turned up in my office first thing on Friday, the 21st of June.
The government was grateful for our responsible behavior so far, he said, in tones of polite
reasonableness.
But enough was enough.
British menace comes in many disguises.
On the surface, there was nothing intimidating about Jeremy Haywood, Quaker and Oxford educated
with a playful little tin-tin quiff of hair.
But there was an edge of steel in his voice, as he implied he was the nice guy and he wouldn't
like me to meet his rough friends.
A lot of people in government believe you should be closed down and that the Chinese are behind this. He pointed to
the block of social housing across the canal from my office. I wonder where our guys are, he possibly
joked. Do you know how many Chinese agents are on your staff? If we had some, it would be nice to
know. Well, welcome to the Russ is Classified. I'm David McCloskey. And I'm Golden Carrera. And that, dear listeners, was a quote not from Edward Snowden.
Thank you, Gordon. You've become generous as this series has aged. That is a quote from
Alan Russbridger, who is in 2013 the editor of The Guardian newspaper. To our American
listeners, that's some version of the British New York Times, I guess, although I imagine there's many other newspapers here who are going to review me poorly
after I describe them that way. And he is writing in his memoir about the moment when the British state
effectively comes to him and says that really his fun's over and it's time to be done
writing about Edward
Snowden and these leaks. And I think a little bit on how we got here. So prior to
this, an absolute flood of articles have come out about GCHQ, Britain's signals
intelligence agency, mastering the internet, tapping under sea cables about
the NSA and its capabilities to conduct domestic surveillance
on Americans.
Edward Snowden is in Moscow in this time, but really at this point now, the UK government
is kind of striking back against The Guardian for what it has published so far.
That's right.
The UK government has had enough of these Guardian stories coming out. Crucially
as well, the Guardian has the files from Snowden. It has an archive of what are thought to be
60,000 documents relating to GCHQ and to the UK, which Edward Snowden gave to the Guardian
journalist Ewan McCaskill, who was the Guardian reporter who'd been sent out to Hong Kong, he has brought them back and they are now in the Guardian's office in London.
The Guardian journalists are working on them under Rusbridge's oversight, there as also
in New York, to try and produce articles about mass surveillance, about other issues.
These are top secret documents and the government is not happy. I mean, one
Downing Street aide does say, you've had your fun, now it's time to hand the files back, as if they're
a kind of party piece. Where were the files? Well, we'll come to that. But Oliver Robbins, who's
actually just become the head of the British Foreign Office, is one of the people who's sent
to get in touch and to say, we want these files, we want them destroyed.
And there's a threat there because basically they're saying, if you don't give us the files,
we're going to close you down.
I mean, that's the implicit threat which the Guardian feel was there, whether it was explicit
or not.
And as we heard in that quote from Alan Rusbridge, the government officials are saying, how can
we be sure, this is their argument from the government, that those files
with really top secret information on them are secure in the office of the Guardian from
foreign spy agencies.
Hence the comment about assets and Chinese intelligence being on staff or having access
to the building, that kind of thing.
And that becomes the discussion between them because the guardians say, well, look, we've
got controls over who goes in there.
It's in a special room, it's not connected to the internet. The files are not online. There's a physical security
list. Only two people can write names onto the list. And then the spies from government say,
well, who enforces the list? And the guardian goes, well, you know, the security guards who
are there 24 seven. And then the government goes, well, what's the background of the security guards?
You know, how do we know they're not being paid by the Chinese to kind of let people
in out of hours?
You know, and how many Chinese agents might be on your staff?
And this is the kind of argument.
Couple guardian rent a cops smoking outside the office guarding the secrets.
Yeah.
And the government is clearly unhappy on that.
Now Alan Ruspiger feels, you know, Snowden has entrusted the Guardian with these files.
They don't want to just hand them back.
You know, they feel that's the kind of wrong thing to do.
And they're also worried whether it might allow some of the state to investigate
them and work out how they were taken and build a case against him or use it to
uncover journalistic sources.
They don't want to hand it back.
So in this fascinating kind of compromise, they agree that staff from GCHQ will be allowed to come to the office and
supervise the smashing and destruction of the files.
I mean, it is interesting because the Guardian are like, we don't want you destroying it,
but we're going to let it be destroyed so you can come and tell us how to do it.
I think American listeners will be a little bit befuddled as to why the
government has the authority to do this.
Because, you know, I guess in the States you would have,
You have first amendment protection.
And fourth amendment protection against unlawful search and seizure, which of
course was originally about you people and what you were up to, but now I think
it is kind of an interesting contrast.
It is.
It's going to be dealt with very differently across the Atlantic. And I think the answer is partly there are less
protections for journalists in the UK. You don't have the first amendment protections.
And the laws around things like the Official Secrets Act and the ability to put injunctions
on people are, if you like, a bit looser and open to interpretation and to be used for pressure.
And I think this is one of the problems in the UK for journalists is that, you know,
there's kind of ambiguity about when an injunction
might be slapped on someone or when, you know,
the Official Secrets Act could be used
to prosecute journalists.
And without some of those constitutional protections,
there is a higher degree of risk.
You know, they're aware of that, the Guardian.
So two men from GCHQ come to the Guardian offices
and they start saying that perhaps the Russians
could turn the plastic cups onto the table into microphones through some clever way.
The Guardian, I think, rather unfairly nicknamed the pair the Hobbits, but they agree that
they're going to be able to come back, I think, the next day and destroy them.
The pair say there'll be a lot of smoke and fire.
So the first day is kind of a reconnaissance mission by the two Hobbits to figure out how
they're going to destroy these things.
It's a bit like smorgue the dragon from, you know, you think it's going to be some kind
of Tolkien-like tale.
So they come in on Friday the 19th of July, right?
They're going to very politely do the destruction over the weekend.
Yeah.
I mean, it's all kind of bizarrely British and polite, this act.
So the next day they come back and three Guardian staff are there.
And it's so interesting
because I think we all wonder like if you've got a computer and you've got some sensitive information
on it, how do you really make sure that it's destroyed? I think everyone probably realizes
it's a lot different from just dragging and dropping the files to your, you know, recycle bin
on the thing to make sure that top secret files are not available.
Yes, all of our 13 year old listeners are gonna be very interested to learn here. This is
gonna be a Gordon Carrera tutorial on how to destroy things on your computer that
you don't want your parents to see. Listen closely. I've got some bad news for you
because if you really want to wipe it from a foreign intelligence agency or
your parents being able to get hold of it, it's not gonna be easy. So it's not
enough just to wipe the hard drive.
You have to destroy physically every part of the computer that could store data.
I spoke to someone, let's just say in the know, who may or may not have been involved
in some of this, about why it was so complex.
They said you can even hide small amounts of data outside of the hard drive on a device.
So it's not enough just to destroy or wipe the hard drive.
You have to destroy every significant chip on the board of the computer.
And they use angle grinders to just kind of pound them.
So this is like sparks and flame and the sweat and there's dust as they literally break apart
and just every single chip has to be smashed physically.
And then that is even that I
These guys had a lot of fun. Didn't they I don't know. I don't know. I mean, I think it's a bizarre scene
I mean the next problem is even that's not enough because you're gonna need something called a de Gausser which in the show notes
Yeah, we are selling rest is classified branded. Yeah
We are selling rest is classified branded. Yeah.
The Gausser.
Okay.
So we advertise.
I think they cost about $30,000 or so.
They thousand pounds each.
So they're not, and ours are more expensive because of the, you know, superior brand.
Yeah, of course.
And they are basically a microwave oven for electronics, electronics.
And again, I kind of asked them, I said, really, what does this do?
And it turns out you feed, you then feed the chips and the boards into it and
it uses an electromagnetic pulse to realign their magnetic elements on the hard disk and
on the computer. So in other words, it uses physics rather than code to wipe it.
To wipe the drive.
So that it's impossible to recover the data. Because otherwise if you just hit delete,
basically it's just overwriting it, but you can recover it. But this, you know, you're feeding the bits of computer into it and it goes pop as it
wipes it.
And this whole thing, you know, it takes three hours to destroy these computers.
And then they just, they shake hands and then walk away.
That is very British.
It is very British.
Handshake is kind of mysterious of why anyone, anyone on either side offered that at the
end of this degaussing, this sweaty degaussing session.
I mean, it does remind me in my continual quest to work breaking bad references into
our podcast, Gordon.
There is an episode in which I believe Walter and Jesse, Walter is of course the guy who
was making crystal math for those who have not watched the show.
Not something we endorse. Not something we endorse.
Not something we endorse. No, no, no. Not a friend of the podcast.
And I believe the hard drive is in police custody. It's come off of, there's a laptop that's been taken from a drug dealer that's in police custody.
There's some incriminating evidence on that hard drive and they wire up a van that delivers this electromagnetic pulse outside of the police station.
It's a very interesting scene where basically all of the electronics inside this kind of vault,
once they bring the van close enough, go smash against the wall and are sort of, I guess, de-gaussed.
Yeah.
Right?
Well, if you feel the need to de-gauss, then that's what it takes.
Between that episode, your instructions, and the link in the show notes to the rest is
classified officially branded degausser.
People, people now know how to do it.
Your 13 year old, if you have $40,000, you can wipe your hard drive down to the subatomic
level.
Very good.
And it's described by Alan Ruspiger, I think as a piece of theater.
Yeah, it sounds like complete with the handshake at the very end.
I understand that there is this kind of vagueness in the law.
And the guardian of course, doesn't want to run totally afoul of the British state.
But I mean, why, why is he willing to do this?
Well, it's an interesting story because one of the reasons is that
that's not the only copy.
And, you know, as we said, British law is somewhat more restrictive, but they have another
copy which is in New York where it's under First Amendment protection and where the Guardian
are also going to be working eventually with the New York Times to whom they will actually
give one of the archives in order to kind of keep it protected.
At the very start, I did tease the idea that I might reveal something of a clandestine
mission.
That's right, you did.
I did.
And for those who remember all the way back, because it was a long time ago, I'll lift
the cover.
Like Chekhov's shotgun, you're delivering now.
Put it on the mantelpiece, now it must be fired.
It's my tiny bit part in the story of Edward Snowden and the archive. So in that summer, kind of September, 2013, I get summoned by my boss, BBC,
the head of BBC news who said, come and see me.
And he says, I've got a mission for you.
Should you choose to accept it?
And I didn't quite say it like that.
Oh, don't ruin it, did he say mission though?
Close.
And the stories at that point, the Guardian was feeling pretty lonely.
And it was actually-
They've been de-gaussed.
They've been de-gaussed.
And also a lot of the British press was having a go at them for endangering national security.
And I think they were looking for allies, which is one of the reasons they were in touch
with the New York Times and others.
I was told that senior leadership, the Guardian had contacted senior leadership of the BBC
to discuss, would we be interested in partnering and looking at this archive?
And so my boss said, the mission is to go to New York and to look at the archive.
And the instructions from my boss were, do not write anything down electronically.
So don't put anything on a computer.
Don't use your phone out to contact anyone about this.
Just go and then come back and tell me what I think, you
know, give me a judgment on the archive and what we think could happen.
Have a quick breezy look at one and a half million top secret documents.
Come back with a synthesis.
I was like, sure.
So anyway, I head out to New York following my instructions, my clandestine mission.
What was your cover for the travel?
Gordon Carrera, BBC journalist.
I was not using, I was not, this is not deep cover spy the travel. Gordon Carrera, BBC journalist. I was not using, this is not Deep
Cover Spy, David. And I go to New York and I meet actually in the Guardian office. I
meet Alan Ruspacher, Janine Gibson, who is the US editor, Stuart Miller, her deputy.
And they're very nice to me. And they say, sit down and go and have a look at the raw
Snowden archive. I wasn't given rights to browse through the whole lot.
I was given a kind of selection of the raw documents.
And it's very interesting because even now,
how many years later are we? 12 years later.
Firstly, I can remember it vividly.
And secondly, I still don't think I can describe
some of the things I saw
because I think they were that sensitive.
To see stuff which is top secret,
strap to, you know, in front of you.
And also the stuff I saw was not stuff that had been made public.
Probably interesting to give people a sense of it, but I'm going to be very careful what I say
because I still think some of the stuff is very classified.
So there was stuff about how the bearers kind of pick up data from the fibre optic cables.
There was a very interesting report from a GCHQ staffer who'd been to a foreign country about what signals could be intercepted in a capital of that country and
how they could be intercepted.
Obviously quite interesting.
Also with the name of the staffer on the file, there was something which was very sensitive,
which was, and this was one of the most strangest things, was the problem book for GCHQ mathematicians,
right?
It outlined what they could do in terms of finding certain types of
communications and what they couldn't do.
And then laid out the problem for the mathematicians to try and
solve mathematically.
And the booklet was just full of maths, which I even with my A level maths, I
could not understand because this is like for the most advanced mathematicians
in the country, but what was so sensitive about it and so fascinating was that it absolutely showed what they could do and what the limits were of their capability.
So it told you exactly what, and this is why I'm being very careful and I'm sure they
may be changed now, but exactly what kinds of communications in a certain way could be
accepted and what kinds couldn't be, which obviously is very sensitive. And so it was amazingly interesting to see.
But one of the things that I came away realizing was, A, there was some really top secret stuff
in that archive.
I mean, like, properly top secret stuff.
And secondly, that the Guardian actually had been very careful about what it was publishing.
And I think now government officials I've spoken to recognize this with The Guardian.
They were angry at the time, but there was a whole load of stuff that The Guardian didn't
touch, which was incredibly sensitive and which could have been incredibly damaging.
Anyway, last point of my story is two things happened, which were interesting.
One was, so I've been told no electronic notes.
I'd taken some very careful paper notes because I thought I need a kind of a
memoir to know what to think about this, not of the actual content of the
documents, but kind of just general stuff about what I thought about it or whatever.
I got out of the guardian office and I remember thinking to myself, going back
to my hotel room and thinking, I'm not even sure I should have these paper notes.
Well, because I think, I think this is, this is slightly dangerous.
Did you eat them?
I'll come back to that because there's a particular risk because actually in August, Glenn Greenwald's
partner David Miranda had been stopped at Heathrow Airport under terrorism powers because
they believed he was taking documents from the archive and taking them, I think, from
Berlin, Laura Poitras to Rio, to Glenn Green World, but via London.
And they'd stopped him under the terrorism act, which was very controversial because
it was basically someone couriering.
Yeah.
But for journalism and they're using terrorism pounds against him.
And so there was quite a lot of worry, right?
Hang on a sec.
If the authorities know I'm coming back, might they think I've got something you're mule
in papers, papers, am I going to get arrested?
So I thought God destroy this. How do you destroy papers, David? I'm in a hotel room. I do house them. Yeah.
I was sat there with like, and I just, I remember thinking to myself, I don't know how to do
this. I've not had spy training because in the old Cold War spy movies, you put it in
an ashtray, don't you? And burn it. But you haven't got an ashtray in it. No one has an
ashtray. Now you tell me what I should have done. Well, I'll tell you what I did.
You tell me what you did first.
I, I tore it up into tiny bits and then I went around various cafes in Manhattan
and then flushed it down toilets.
I think that's the right answer.
Oh, good.
Yeah, no, I do.
I think that's the right answer.
I think critical to hit multiple.
Multiple.
Yeah.
Better if you had a map of the sewage network to make sure it didn't end up in
the same place and someone's gonna reconstruct
Yeah, I think multiple toilets small pieces and I'll give you my last weird you shredded or did you rip it yourself?
I ripped it. Okay. Yeah, you should have bought a shredder. Okay last
Bit of this story, which is also bizarre
So I don't make this all about me
But so phone and laptop locked into a safe in the hotel room all the time never, you know never took them out
So then I go back to the airport to fly home.
And this I remember vividly, I'm on the plane at JFK in my seat economy before you ask,
and switch on my phone.
And in front of me, I look at my email inbox, all my emails start deleting one by one, as
if someone is pressing the delete key.
By the end of about a couple of minutes, my inbox is empty of emails.
Now that was deeply suspicious.
Sure.
And I asked people afterwards, I said from, you know, GCHQ and from
America, I said, come on, what was that?
And they said, no, we'd never do something like that.
But I, at the time interpreted it as someone saying, we know what you've been
doing and we're going to send a little signal to you to say, we know what you've
been doing, you know, we're going to let you know that you thought you were doing a kind of very
clever secret mission, but actually we know exactly what you've been doing.
But they, people I've spoken to Adamant, they wouldn't do that, but then it's a little bit
of a weird coincidence.
Did you get the emails back?
Yeah, well I had to reconstruct my inbox and kind of rebuild it when I went back because
it's not clandestine surveillance, is it?
If you're deleting someone's inbox. I guess it could have been Because it's not clandestine surveillance, is it? If you're deleting someone's inbox.
I guess it could have been a mistake
by the clandestine surveillance.
Who got it there and started monkeying around.
I mean, maybe it was our feed friends,
having a little fun with you in New York.
You're not an American citizen
and don't have the same rights and privileges
that I do. I should be under five eyes protections though.
Well.
You think that has its limits.
Winking and nodding.
But anyway, I remember myself
someone's got an eye on me on what I'm doing on my
Not very clandestine mission and you never got any closure on this though
No
I never got an answer to it if anyone knows the answer if any members of the intelligence community
Listening who were involved in deleting my inbox and would like to get in touch
We'd like to like to be whistleblowers the email you know where to reach us. Scroll down past the Degasser link.
But that was my very brief.
Interesting.
Introduction into seeing the raw documents and the archive and to understand what it
really looked like.
And it was eye opening.
So you have brought back firsthand evidence of Snowden's fourth deadly sin.
Which one was that again?
Which is the indiscriminate nature of what he provided.
Because you're attesting to documents that really any responsible British or American journalist should never have printed.
But also to say that they have not come to light since then. So there are archives which
I think are in the US, I think with the New York Times, for instance, maybe bits in other
places as well. And still there, right?
Still there. And one of the deals the Guardian made was we're going to let you have it, but only for a very narrow type of story about mass events, not for kind of
dipping into to look for other stories or what else you can find. And so yes, that the stuff is
there and it's probably also less sensitive now than it used to be, but it has been, you know,
limited in how it's been used, I'd say.
And maybe there Gordon Carrera has returned from his secret mission,
albeit with his inbox completely scrambled mysteriously.
Edward Snowden still in Moscow.
When we come back, maybe we'll deal with Snowden the man, his life in Russia and the legacy of what he leaked.
See you after the break.
of what he leaked. See you after the break. quietly collecting your personal information, building detailed profiles, and then selling them on without a warrant and without any warning. That's right, your address, phone number, family ties,
even political leanings all online.
It's like your personnel files
being left open on a cafe table.
And once it's out there, it spreads to scammers,
identity thieves, really anyone
with a Wi-Fi signal and bad intentions.
That's why we use Incogni.
They act on your behalf, demanding data brokers delete your information and they keep doing
that automatically because it's not a one-time breach, it's the risk of constant exposure.
Think of it as your own digital counterintelligence service.
So head to incogni.com slash rest is classified for 60% off an annual plan.
That's incogni.com slash rest is classified.
This episode is sponsored by Nord VPN, which Gordon frankly is essential if you'd rather not have your online life monitored like some Cold War embassy.
Who wants that? Well, these days, there are eyes and ears everywhere
across the Internet.
Ad companies, data harvesters, parties unknown.
NordVPN blocks all of it's malware pop-ups
and the creepier corners of the web.
It's like having your own digital dead drop,
secure, untraceable,
nobody quietly rifling through your browsing history
or collecting your personal information.
And so threat protection works even when the VPN's off.
So even if you forget to switch it on,
it's still covering your back.
It also encrypts your data on public wifi.
Think cafes, airports, hotels, so you're not handing your information over to whoever's
lurking on the same network.
So if you want to stay one step ahead, and really, who doesn't, head to NordVPN.com
slash rest is classified for an exclusive deal with four extra months free.
Plus there's a 30 day money back guarantee.
No risk, no trace, no loose ends.
The link is in the episode description.
Welcome back.
We are in the home stretch of our death march through the life and
times of Edward Snowden.
And I think maybe Gordon, as we sort of bring this all to a head, we start with Snowden himself,
because we've been talking a lot about journalists, your undercover secret mission to New York to look
at the archives, all of these incredible just bombshell stories that have come out.
But Ed Snowden has actually just been in Moscow.
He has been there ever since.
Most of what we talked about, it happens in 2013.
It's now 2025 and he's still there, really in exile.
Yeah, he is.
I mean, it is a strange life for him, a very different life, maybe not the one he expected.
And first he kind of keeps his head down.
You know, he says he fears being head down. He says he fears being
snatched, he didn't speak Russian. I think maybe it got easier for him as his girlfriend
came out. But while I think maybe the surroundings physically may have got easier for him, politically
I think the surroundings have got trickier for him in a way. Because Russia of 2013 is
different from the Russia of today of 2025, and particularly
in the relations with the West. Being stuck in Moscow looks like a more difficult thing
and a more problematic thing now in terms of the way we see Snowden than perhaps it
did in 2013 and than perhaps he expected. Given the darker turn Russia has taken under
Vladimir Putin and the idea of Edward Snowden, a kind of champion of internet freedom being in this country, which has become increasingly authoritarian and repressive. I mean, that
is, I think, you know, even though he can't say it must be uncomfortable and harder for
him, as well as for the story about him. It's taken a turn. I think that's the way of putting
it.
Well, and this is more, I think on the Deadly City number five, which is Ed Snowden as essentially
a stooge for the Russians.
A mouthpiece.
I don't buy that.
In many cases.
But, I mean, interestingly enough, he speaks pretty frequently, virtually, from Moscow.
And I think between 2015 and 2020, he actually earned a little over a million dollars in
speaking fees.
Right.
You know, he's spoken to the EU Parliament.
He speaks to, you speaks to companies, conferences.
He actually gave a talk at a big Bitcoin conference in 2024,
I believe, where sort of Ed Snowden's head pipes in
virtually, and he speaks to this big group convened in Las
Vegas or wherever.
It's interesting, because I think he's,
unlike a lot of other defectors that we'll probably
talk about on this program, he is very
comfortable in the virtual world.
I do wonder if for him kind of exile in Moscow is a little bit less painful.
Then it might be for other people.
Then it might, as long as he's online, you'd get shits online.
Obviously, you know, and he's, he's not talked about this or refuses to talk about
it, but clearly the Russians have set some boundaries around what
he is able to say.
You know, he's very clearly enabled by his Russian handlers or sort of minders to speak
publicly, to speak negatively about the United States, NSA, the intelligence community.
Yeah, yeah, but I also think he's also not been afraid at points to be critical of Russia.
I mean, I agree, there are going to be boundaries because he is there.
But I think the idea he's some kind of Russian stooge, I don't think that's right.
I think he's a person who has to live under limits.
Yes, and I guess maybe stooge isn't the most precise word I could use.
I think what seems to have happened and what I think Putin,
because this would have been a Putin level decision to allow him to stay,
to kind of create this environment for him.
I think the decision was let's just let this guy continue his crusade and do it
from Moscow and I imagine almost the Russian pitch to some degree, which is
not a cold or nasty pitch, but is kind of a subtle one is you just stay here and
we'll kind of help you communicate your message.
Yeah.
Right.
We'll let you get on these conferences and video conferences and, and undermine
confidence in American society, the Western system, the intelligence and
security agencies that continues to be defended in his views on the internet
freedom, you know, and privacy continues to be a privacy jihadist, as I've said, you know, and he's consistent in
that.
He is consistent in that.
It's very interesting.
He essentially has come out and said that he believes that the provisions of the US
constitution around the right to expression and the right to privacy really apply to everybody,
not just Americans.
And so he's kind of continued that really pretty extreme viewpoint.
He's, he's taken that to its logical end in what he communicates from Russia.
But let's step back at this point, because I think it is interesting 12
years on to kind of look at the legacy and what all of this led to and what it
meant, because at the time it was very intense, but I think now with a bit of
hindsight, you can see a more balanced view, I think, of what
Snowden left behind from that amazing period.
He wanted to expose some of these programs.
He exposed them.
I think the reality is, and I think this is really interesting, is that most of those
programs, whether it's the US or the UK, are still going.
But they are going under much greater public understanding, oversight and accountability
and under different legal frameworks.
That I think is important as a legacy because I think there is this comment from David Anderson,
who did a big study about the kind of British powers that GCHQ, for instance, had.
And his argument was, it's not necessarily that they shouldn't
have had the powers, but the lack of accountability and
transparency about them made them undemocratic, because there
wasn't enough control or understanding of how those
powers were being exercised.
And I think that is an important legacy of Snowden is to create a public debate
and to improve the oversight of these powers that the state had rather than stop them having
the powers though, which is a different point.
It probably is worth just a little bit of a reminder on precisely what he exposed because I think it is basically three buckets of capabilities, right?
And I'll just speak to the American context here.
The first one is that the national security agency was collecting information from
US tech companies to be able to target foreign citizens of the United States
and their communications outside of the United States,
but that would pass through those US tech companies, right?
So that's kind of like one bucket prism.
The second one is that the NSA,
the National Security Agency,
was collecting telephone metadata in bulk
on American citizens from Verizon, AT&T,
to enable not searches on directed on US persons,
but to enable connections to be made.
For example, if a safe house in Karachi gets taken down by CIA,
phones are collected, they want to see
who in the United States those phones might be in contact with.
It allows for that kind of searching and connection, right? And then there's another, I think, bucket around the NSA
collecting information from US tech companies abroad. Right. Yeah. Right. That's more kind of
traditional sort of foreign hacking, right? Yeah. So in those cases, and actually, Bart Gellman,
who is the Washington Post reporter who wrote
this book, Dark Mirror, on these collection programs, basically says that the NSA behaved
responsibly in its searches through those databases.
And there wasn't anything he could dig up to really show that they were misused.
I just think it's an important context to set.
Yeah, no, no, it's a good bit of context.
But for instance, the database of US phone numbers, they searched it 288 times in 2012
for times when a foreign terrorist dials a US number.
13 leads are passed to the FBI.
One person, you know, this is according to official statistics, gets caught planning
an attack in Times Square and arrested.
But the FBI actually knew about him anyway.
So you have a kind of mass collection of data on Americans, but actually, is it proportional? Is it worth
it? You know, it's part of that post 9 11 era of kind of collect everything who knows
how it'll be useful. And that metadata program has kind of died, you know, effectively and
it's gone.
It was, I think it was sunsetted those Patriot act stipulations, which suggests it had some
utility but not enough to keep it going.
Prism is still there, effectively 702, but debated, you know, and it's quite political
about how very political in the US.
Some of those capabilities are there and clearly had some use, but I think it's quite hard
to judge from the outside how vital it was they had these capabilities.
As I said, to my mind, the mistake was not necessarily building the capabilities, but
thinking that you could do some of this without greater public understanding or transparency
or accountability.
I'd put it down to just read that quote from Bart Gelman, where he said, quote, nothing
in the Snowden archive and nothing I learned independently offered reason to doubt that
the NSA workforce did its best to follow the rules and good faith.
And so I just, there's a lot of different kind of core debates we could kind of bring
this down to.
I don't think this is a debate so much about whether the NSA or the FBI was really spying
on Americans.
I think this is a debate about whether we as a society want our government to possess
this information in the first place, right?
It's about whether the government has the right or whether it's good that the government
possesses this.
A lot of the real scary scenarios here are not what's happened with this already as it
relates to Americans.
It's about what could happen in a future where this information is potentially used by a more
authoritarian
without wishing to get into US politics. I mean, you could
argue we are in a more authoritarian world, you know,
in which states and how they use intelligence agencies change
over time. And therefore, you can have these capabilities in
secret and go, well, it's fine, because it's all all under strict controls and the people are good people. But all it takes
is a more authoritarian government to go I want to use that capability in a slightly
different way and tweak the secret way in which it's used. And suddenly you're on the
road to something else. So that's why I think how much you want those controls over the
state I think is a really interesting question. Another area I think is how much damage did
Snowden do to this spying game. I mean you know at the time again I think it's a really interesting question. Another area I think is how much damage did Snowden do to this spying game?
I mean, you know, at the time again, I think you can see this in a different way now that
we look back, because there was a lot of like, he's done huge damage to capabilities, stuff
has been switched off.
We're going dark, which is the kind of intelligence phrase for when you could watch something,
the target, you know, on the internet or their communications, and then you lose that ability.
I spoke to someone recently, they said, it wasn't so much we went dark, it went spotty.
It lost a bit of insight and it did have, I think, some damage to some of those capabilities
because it revealed to terrorists and others how much the US could observe them, that they
could get their Gmail through Prism and things like that.
And therefore they changed their behavior.
But I think the intelligence agencies are pretty good at adapting.
It was interesting.
One person said to me that if there was a mistake or a loss to it, it was that they
spent so long really focused on regaining their access and their capability to watch
terrorists and insurgents at that point.
And that if anything, that meant they took their eye off the ball of what other states were
doing.
You're kind of Russia and China because they were so focused on rebuilding the capability
over Snowden.
And that might be one of the kind of consequences of it is that Russia and China got a bit more
of a pass.
You can see China since then thinking, how can we build an equivalent capability? How, for instance,
potentially could they use some of their tech companies? We've talked about TikTok in the past
to collect data or to do things like that. TikTok obviously say they wouldn't do it,
but you could imagine if you're in China, you're thinking, hey, America is using its tech companies,
it's using all this access, it's got all these databases. We want to be able to do something
similar. I think you start to see changes in Chinese behavior after Snowden as it tries to almost
replicate the kind of capability it now understands the US has.
So that is irrespective of the kind of specific intelligence.
You do see, I think, those quite significant changes.
Well, I think in addition to the just the very clear hard costs of, okay, there's
a lost platform that enabled us to collect on a foreign adversary, terrorist group, criminal
network, whatever it might be that could potentially go away, right?
I mean, that obviously that happened.
I would imagine a lot of that over time was regained, right?
But there was a massive effort inside the intelligence community.
I mean, this was when I was still inside, I mean, and I was not directly related to this at all,
but a massive effort to try to understand who had what information and really conduct a kind of damage assessment.
So there's a massive number of man hours.
It's probably just not even possible to calculate dealing with the Snowden fallout internally.
There's also the
fallout, you know, we talked a couple episodes ago about those tech companies on that slide.
They had been sort of some mixture of kind of coercion and payouts had sort of compelled them
to cooperate. And now you look at the latest, I mean, it was early, it was early mid 2024 when section 702 of the FISA
Act came back for reauthorization, nasty political fight around it.
And you can see that the tech companies now have basically said, look, unless you actually
compel us to do this, we're not cooperating.
So there's a massive chilling, I think, that has happened between Washington and Silicon
Valley in the years since.
Yeah.
A much more adversarial relationship.
Yeah, there was. I mean, there was in the immediate aftermath of Snowden because the
tech companies were furious, I think.
Mark Zuckerberg went to see Obama in the White House and said, you blew it by saying that
PRISM is only used to spy on foreigners, not Americans, because of course, most of the
customers of Facebook are foreigners, not Americans. Right. And so they were kind of angry at this bad for Zuckerberg's business to know
poor, poor, poor Zuck that actually at the time Facebook and the NSA were working together
to collect intelligence or, you know, to get details of basically their customers. And
of course, foreigners knew this was happening. He was just frustrated that it came to light.
And so I think it definitely had a kind of chilling effect with the tech companies.
Although I think now the tech bros are perhaps a bit closer to the, to the white house, you
know, again, and they're a bit more aligned, I think, tech companies to nations.
Whereas in that period, in 2013, 2015, they kind of saw themselves as kind of above nations
and above politics.
And I think we have a different view of tech companies now than then.
Yeah.
Many ordinary citizens just sort of assume that, well, look, tech companies are selling
all of our data anyway.
Yeah.
So there's maybe less of an assumption of privacy now.
Yeah.
Although the focus of that kind of ire or concern is now much more focused on the tech
companies themselves, maybe as opposed to the NSA or GCHQ.
Because I always think this is one of the interesting aspects of it is the reason the
state could get this data was because the tech companies were collecting it, you know,
and the state's getting it off the tech companies.
And Snowden made everyone go look at the state, but actually the tech companies were hoovering
up people's data in a massive way and continue to do it and continue basically to mine it
and do the kind of data analysis about it, but for the purposes of selling advertising
and for understanding them. And you're right, I think at the time Snowden came out, we became
very attuned to the state doing it. And it was only maybe Cambridge Analytica 2016, 2017, that
we started to think about what the tech companies could do and were doing. We came to think much
more about this kind of, you know, surveillance capitalism
model and, and, and, you know, what constitutes surveillance collecting
large amounts of data about us, keeping on a computer and having it automatically
processed is that surveillance.
I mean, in the Snowden world, that is surveillance because it's what the NSA
we're doing, if it's surveillance, then we're, we're certainly living in a
surveillance society now, but it is as much driven by companies as it is by governments, I think.
It goes to big issues about consent. How do we consent to our data being collected and
used and analyzed, whether it's by companies in the state, especially when the systems
are so complex? I think those big questions, which I think Snowden raised, which are really interesting,
which is if you are living in a world in which all your data is collected and analysed, whether
it's by companies or the state, does that take away your privacy or privacy?
Does it remove your ability for free expression?
Does it reduce the ability to have dissent?
I think those questions that he raised are still valid.
But as I said, I think they're as valid about corporate data collection as they are about, if you like,
the NSA or GCHQ's data collection. The flip side of that privacy or privacy argument is,
and this is the case that continues to be made when that Section 702 authorization comes up,
it is it now will again two years from now, right? Lawmakers really on both sides of the aisle continue to make the case that these capabilities
for the NSA, GCHQ, in particular to be able to intercept or collect data from US tech
companies abroad are absolutely critical to national security, right?
And that there is a pile of evidence to show that they are critical to disrupting terrorist
plots, to gaining an information advantage over adversaries.
I believe they've even been linked to the takedown, really the targeted killing of Ayman
al-Zawahiri, the head of al-Qaeda
a few years ago.
So there is a national security argument to be made that these capabilities are critical.
And I would argue that at least in the US, policymakers again on both sides of the aisle,
I think they feel a tremendous responsibility to their constituents and American citizens
to continue to provide these capabilities to NSA to protect people.
Yeah.
And it's to some extent, it's about, do you worry more about your government spying on
you or do you worry about your government protecting you from other threats?
Yeah.
And to some extent, that's a very personal individual thing.
It depends a little bit on your own mindset, your own personal politics about where you're coming from, about what kind
of person you are, whether you fear being persecuted by your own government, what kind of state you
live in, how you view your state. If you're in Germany and you have a history of the kind of,
you know, Gestapo and the Stasi, you have a different attitude towards government surveillance
and monitoring from other countries. And America has a more libertarian tradition in some extent than the UK.
But I think it is quite a personal thing, you know, about where you sit as to how you
balance those different risks and threats and therefore how much power the state should
have.
I think it's critical to frame it as a trade-off because if these authorizations were taken
away and if Ed Snowden had been able to wave his magic wand, he has really worked hard again,
because I think he's being dishonest about this intellectually.
He's worked hard to say,
oh, look, there's sort of no actual cost, right,
to me revealing these programs,
and there's no real national security argument to be made
to justify them.
And I would say-
They're trade-offs.
There's an absolute trade-off here.
If you decided to wave your wand and, and that bulk metadata collection, which eventually did.
And the section 702 authorization, those come with real costs.
Yeah.
And I think that the public should have the ability or its proxy in the form of parliamentarians and Congress people to have an informed debate about those trade-offs.
I think the problem was before that there wasn't an informed enough debate and consent
to work out what those trade-offs to even decide what they were to determine.
So I mean, as we come to the end, I guess it's interesting, isn't it?
Because it's important not to make this all about Snowden the man, but I think it is interesting
to go back to him.
And I think one of the questions I have, which has gone through the series is what was he
trying to do to ask the question, did he succeed and what was his legacy?
If he was trying to stop surveillance, if that was his aim to kind of destroy the NSA
and its powers, he's failed because the institutions have continued and a lot of the
powers, maybe not all, are still there.
If his aim was to expose them in order to put them under better
democratic control, then he's arguably succeeded in that aim.
But I actually, I'm not quite sure which of those two, you know, is he an
ideologue or is he a vandal?
Ed, if you're out there, kind of get in touch and tell us what, what, what is
the way that you feel, whether you feel you've succeeded or not.
But to me, it's kind of one of the big questions.
Well, he also has, I believe he's got over 5 million followers on X slash Twitter.
So he's definitely succeeded from the standpoint of his egomania.
And maybe it is worth just sort of bluntly returning to one of the kind of questions
that we started this whole series with, which is he a hero
or is he a villain?
And I'm going to relitigate.
I know you love this, Gordon.
I'm going to relitigate my deadly sins against Ed Snowden, right?
Because I do have a final view on the man.
Gordon is leaving to go to the bathroom.
I'm going to communicate this to the audience directly in between pitches
for my personally branded degasser that we're selling.
Okay.
So, number one, he has a demonstrated track record throughout this whole episode of fabricating
stories and exaggerating his access and telling outright falsehoods about the chronology.
Second one, very impure motives, I would argue.
I think there's a little top hat of ideology on this one.
I think that the core of this is a bit of a revenge's tale against the NSA
and against really his superiors for not seeing his genius, right?
The downloads start in 2012 after a big fight at NSA with his superiors about a software patch
in which he gets reamed for having raised the issue to Fort Meade.
Sin number three, he does not avail himself of any of the whistleblowing roots.
Now, having worked in a monstrous government bureaucracy. I completely sympathize with the fact that these roots are clunky, uncertain.
He had other whistleblowers before him who were sort of told to pound sand.
Yep.
The roots were available to him.
He decided to not take them.
Yeah.
Okay.
The fourth one, the completely disproportionate nature of what he leaked relative to his
stated goals.
If he wanted to focus entirely on the NSA surveillance on Americans, there's a very
small portion of the documentation of the 1.5 million documents, pages of documents
that he took that he could have taken to make that case.
And I think he would have been treated a lot differently.
The last one, you know, you've disputed Sin 5,
you disputed my word that he's a Russian stooge,
but he has become, I think, a mouthpiece
in a Russian active measures campaign against the West,
passively they let him talk, right?
They let him spread this message.
I think all of this to my mind is absolutely no way he's hero.
I see him as an arsonist, right?
And here's the way, I think that there have been,
and out of this debate over privacy versus national security,
more transparency, more openness with the public about what's actually going on.
I think that is good.
I think it's probably good, not to get too technical, I think it's probably good that
that bulk metadata collection was sunsetted and taken away.
Because I actually think that is the most egregious example of really unlawful search and seizure
on the part of the US government, right?
I'm glad that's gone.
But to my mind, the system that we have today,
which I think is better than the system that he,
you know, was fighting against,
is kind of like if I had a house,
you burned my house down.
And then I build a better house 10 years later.
I'm not really thanking the arsonist
for burning my old house down.
And I think that's the role he played.
And I think, you know,
he could have done things a lot differently.
I think that if he had been proportional,
I think that if he had stayed in the United States,
he would be a free man
in the US today and he'd be more or less a hero.
Now, obviously there'd be people inside the national security establishment who would
disagree with that, but he made these decisions along the way that I've just outlined that
I think firmly cast him in that role as arsonist and then to my mind, absolutely not a hero.
Yeah.
I mean, thank you for that very, very long indictment of Edward Snowden.
I'm not just returning from the bathroom.
I have a good on that.
I mean, look, I actually think not just on Edward Snowden, but generally I think trying
to separate the world into heroes and villains is a mistake generally.
And I think it's too simplistic.
And I think it's always a mistake.
People are more complicated than that.
People's motives, I think we can see with Edward Snowden, may have been complicated
and confused between the ideological and the grievance.
I think that is true.
I think the legacy and the effects of him are complicated and not binary.
I think more democratic accountability over the surveillance systems and the intelligence
collection systems are
a plus.
But I think there is a legacy of damage in certain ways, in certain places, but maybe
not as much as people say.
Just as a kind of final thought, I do think he's an interesting figure because going back
to the man slightly, he is a figure who comes from a kind of different age of the internet.
To go back to that kid who grew up with computers and this idea that the internet could be free.
Today that seems like a very romantic, idealistic notion, but also utterly bewildering, I think,
to people.
The idea that the internet could be a place of free expression and anonymity and privacy
when the reality is actually it does look like a darker place.
It looks like a darker place where darker things happen online, where the state feels
it needs to be online to find the darker things that are happening, you know, and what people
are doing online and including bad people online, and in which, you know, kind of cyber
warfare, cyber attacks are happening, and in which states and companies are, you know,
acquiring data and eroding that privacy online.
So I think fundamentally I come away thinking Edward Snowden might have been a man driven
by both ideology and grievance, but he also kind of figure trapped almost in a time of
the past.
And whether you view that as a kind of happier time or not, it's not today anymore.
No, no.
We're in a kind of a different darker world of the internet than that idea that
that we had in the past.
Well, and I guess it also, I appreciate Gordon that you're, you're justifying my
description of him as a privacy jihadist because he is sort of like a jihadist
trying to go back to this golden era.
But isn't there something, isn't there something quite attractive about that?
About, about elements of that when it, when it was a freer place. I don't know.
Maybe it's unrealistic to think it could be that though.
Well, it certainly doesn't seem like a past that we can ever really return to.
Given all that's happened.
And I think it, just as we close out this series on Snowden, I think it leaves us
with this question, this tension over privacy and national security that is
really kind of unresolved or unresolvable now in this new world of the internet.
So with that we come to the end of this long and I think fascinating story of Edward Snowden.
We really hope you've enjoyed it.
And before we go, we'd like to say a massive thank you especially to everyone who signed up to be a member of the Declassified Club.
We're thrilled to have you on board.
And for those who want
one more Snowden High, the bonus content this week will be an interview with Chris Inglis and he was
Deputy Director of the NSA at the time of the whole Snowden affair. So if you want to hear that,
you can join at therestisclassified.com and remember to take advantage of our launch discount.
That's right, one last Snowden High,
one punch into your veins.
Join us for that one.
We will see you next time.
See you next time.
See you next time.