The Rest Is Classified - 48. The Leak That Changed The World: Death of Privacy (Ep 6)

Episode Date: May 20, 2025

Do we have any privacy in the modern era? Why did Snowden do the things he did? Was he successful? And what is the closest Gordon Corera ever came to being a spy? Listen as David McCloskey and Gord...on Corera discuss the legacy of Edward Snowden. ------------------- To sign up to The Declassified Club, go to www.therestisclassified.com or click this ⁠link⁠. To sign up to the free newsletter, go to: ⁠https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up⁠ ------------------- Order a signed edition of David's latest book, The Seventh Floor, ⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠ Pre-order a signed edition of Gordon's latest book, The Spy in the Archive, ⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠ ------------------- Email: classified@goalhanger.com Twitter: ⁠⁠⁠⁠⁠@triclassified⁠⁠⁠⁠⁠ Assistant Producer: Becki Hills Producer: Callum Hill Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 The expected call from the British government finally came. The cabinet secretary, the most powerful unelected figure in the machinery of state, and the prime minister's closest official aide, would like to visit me. He turned up in my office first thing on Friday, the 21st of June. The government was grateful for our responsible behavior so far, he said, in tones of polite reasonableness. But enough was enough. British menace comes in many disguises.
Starting point is 00:00:30 On the surface, there was nothing intimidating about Jeremy Haywood, Quaker and Oxford educated with a playful little tin-tin quiff of hair. But there was an edge of steel in his voice, as he implied he was the nice guy and he wouldn't like me to meet his rough friends. A lot of people in government believe you should be closed down and that the Chinese are behind this. He pointed to the block of social housing across the canal from my office. I wonder where our guys are, he possibly joked. Do you know how many Chinese agents are on your staff? If we had some, it would be nice to know. Well, welcome to the Russ is Classified. I'm David McCloskey. And I'm Golden Carrera. And that, dear listeners, was a quote not from Edward Snowden.
Starting point is 00:01:09 Thank you, Gordon. You've become generous as this series has aged. That is a quote from Alan Russbridger, who is in 2013 the editor of The Guardian newspaper. To our American listeners, that's some version of the British New York Times, I guess, although I imagine there's many other newspapers here who are going to review me poorly after I describe them that way. And he is writing in his memoir about the moment when the British state effectively comes to him and says that really his fun's over and it's time to be done writing about Edward Snowden and these leaks. And I think a little bit on how we got here. So prior to this, an absolute flood of articles have come out about GCHQ, Britain's signals
Starting point is 00:01:57 intelligence agency, mastering the internet, tapping under sea cables about the NSA and its capabilities to conduct domestic surveillance on Americans. Edward Snowden is in Moscow in this time, but really at this point now, the UK government is kind of striking back against The Guardian for what it has published so far. That's right. The UK government has had enough of these Guardian stories coming out. Crucially as well, the Guardian has the files from Snowden. It has an archive of what are thought to be
Starting point is 00:02:33 60,000 documents relating to GCHQ and to the UK, which Edward Snowden gave to the Guardian journalist Ewan McCaskill, who was the Guardian reporter who'd been sent out to Hong Kong, he has brought them back and they are now in the Guardian's office in London. The Guardian journalists are working on them under Rusbridge's oversight, there as also in New York, to try and produce articles about mass surveillance, about other issues. These are top secret documents and the government is not happy. I mean, one Downing Street aide does say, you've had your fun, now it's time to hand the files back, as if they're a kind of party piece. Where were the files? Well, we'll come to that. But Oliver Robbins, who's actually just become the head of the British Foreign Office, is one of the people who's sent
Starting point is 00:03:19 to get in touch and to say, we want these files, we want them destroyed. And there's a threat there because basically they're saying, if you don't give us the files, we're going to close you down. I mean, that's the implicit threat which the Guardian feel was there, whether it was explicit or not. And as we heard in that quote from Alan Rusbridge, the government officials are saying, how can we be sure, this is their argument from the government, that those files with really top secret information on them are secure in the office of the Guardian from
Starting point is 00:03:50 foreign spy agencies. Hence the comment about assets and Chinese intelligence being on staff or having access to the building, that kind of thing. And that becomes the discussion between them because the guardians say, well, look, we've got controls over who goes in there. It's in a special room, it's not connected to the internet. The files are not online. There's a physical security list. Only two people can write names onto the list. And then the spies from government say, well, who enforces the list? And the guardian goes, well, you know, the security guards who
Starting point is 00:04:17 are there 24 seven. And then the government goes, well, what's the background of the security guards? You know, how do we know they're not being paid by the Chinese to kind of let people in out of hours? You know, and how many Chinese agents might be on your staff? And this is the kind of argument. Couple guardian rent a cops smoking outside the office guarding the secrets. Yeah. And the government is clearly unhappy on that.
Starting point is 00:04:39 Now Alan Ruspiger feels, you know, Snowden has entrusted the Guardian with these files. They don't want to just hand them back. You know, they feel that's the kind of wrong thing to do. And they're also worried whether it might allow some of the state to investigate them and work out how they were taken and build a case against him or use it to uncover journalistic sources. They don't want to hand it back. So in this fascinating kind of compromise, they agree that staff from GCHQ will be allowed to come to the office and
Starting point is 00:05:06 supervise the smashing and destruction of the files. I mean, it is interesting because the Guardian are like, we don't want you destroying it, but we're going to let it be destroyed so you can come and tell us how to do it. I think American listeners will be a little bit befuddled as to why the government has the authority to do this. Because, you know, I guess in the States you would have, You have first amendment protection. And fourth amendment protection against unlawful search and seizure, which of
Starting point is 00:05:37 course was originally about you people and what you were up to, but now I think it is kind of an interesting contrast. It is. It's going to be dealt with very differently across the Atlantic. And I think the answer is partly there are less protections for journalists in the UK. You don't have the first amendment protections. And the laws around things like the Official Secrets Act and the ability to put injunctions on people are, if you like, a bit looser and open to interpretation and to be used for pressure. And I think this is one of the problems in the UK for journalists is that, you know,
Starting point is 00:06:05 there's kind of ambiguity about when an injunction might be slapped on someone or when, you know, the Official Secrets Act could be used to prosecute journalists. And without some of those constitutional protections, there is a higher degree of risk. You know, they're aware of that, the Guardian. So two men from GCHQ come to the Guardian offices
Starting point is 00:06:22 and they start saying that perhaps the Russians could turn the plastic cups onto the table into microphones through some clever way. The Guardian, I think, rather unfairly nicknamed the pair the Hobbits, but they agree that they're going to be able to come back, I think, the next day and destroy them. The pair say there'll be a lot of smoke and fire. So the first day is kind of a reconnaissance mission by the two Hobbits to figure out how they're going to destroy these things. It's a bit like smorgue the dragon from, you know, you think it's going to be some kind
Starting point is 00:06:48 of Tolkien-like tale. So they come in on Friday the 19th of July, right? They're going to very politely do the destruction over the weekend. Yeah. I mean, it's all kind of bizarrely British and polite, this act. So the next day they come back and three Guardian staff are there. And it's so interesting because I think we all wonder like if you've got a computer and you've got some sensitive information
Starting point is 00:07:10 on it, how do you really make sure that it's destroyed? I think everyone probably realizes it's a lot different from just dragging and dropping the files to your, you know, recycle bin on the thing to make sure that top secret files are not available. Yes, all of our 13 year old listeners are gonna be very interested to learn here. This is gonna be a Gordon Carrera tutorial on how to destroy things on your computer that you don't want your parents to see. Listen closely. I've got some bad news for you because if you really want to wipe it from a foreign intelligence agency or your parents being able to get hold of it, it's not gonna be easy. So it's not
Starting point is 00:07:44 enough just to wipe the hard drive. You have to destroy physically every part of the computer that could store data. I spoke to someone, let's just say in the know, who may or may not have been involved in some of this, about why it was so complex. They said you can even hide small amounts of data outside of the hard drive on a device. So it's not enough just to destroy or wipe the hard drive. You have to destroy every significant chip on the board of the computer. And they use angle grinders to just kind of pound them.
Starting point is 00:08:14 So this is like sparks and flame and the sweat and there's dust as they literally break apart and just every single chip has to be smashed physically. And then that is even that I These guys had a lot of fun. Didn't they I don't know. I don't know. I mean, I think it's a bizarre scene I mean the next problem is even that's not enough because you're gonna need something called a de Gausser which in the show notes Yeah, we are selling rest is classified branded. Yeah We are selling rest is classified branded. Yeah. The Gausser.
Starting point is 00:08:44 Okay. So we advertise. I think they cost about $30,000 or so. They thousand pounds each. So they're not, and ours are more expensive because of the, you know, superior brand. Yeah, of course. And they are basically a microwave oven for electronics, electronics. And again, I kind of asked them, I said, really, what does this do?
Starting point is 00:09:00 And it turns out you feed, you then feed the chips and the boards into it and it uses an electromagnetic pulse to realign their magnetic elements on the hard disk and on the computer. So in other words, it uses physics rather than code to wipe it. To wipe the drive. So that it's impossible to recover the data. Because otherwise if you just hit delete, basically it's just overwriting it, but you can recover it. But this, you know, you're feeding the bits of computer into it and it goes pop as it wipes it. And this whole thing, you know, it takes three hours to destroy these computers.
Starting point is 00:09:36 And then they just, they shake hands and then walk away. That is very British. It is very British. Handshake is kind of mysterious of why anyone, anyone on either side offered that at the end of this degaussing, this sweaty degaussing session. I mean, it does remind me in my continual quest to work breaking bad references into our podcast, Gordon. There is an episode in which I believe Walter and Jesse, Walter is of course the guy who
Starting point is 00:10:01 was making crystal math for those who have not watched the show. Not something we endorse. Not something we endorse. Not something we endorse. No, no, no. Not a friend of the podcast. And I believe the hard drive is in police custody. It's come off of, there's a laptop that's been taken from a drug dealer that's in police custody. There's some incriminating evidence on that hard drive and they wire up a van that delivers this electromagnetic pulse outside of the police station. It's a very interesting scene where basically all of the electronics inside this kind of vault, once they bring the van close enough, go smash against the wall and are sort of, I guess, de-gaussed. Yeah.
Starting point is 00:10:36 Right? Well, if you feel the need to de-gauss, then that's what it takes. Between that episode, your instructions, and the link in the show notes to the rest is classified officially branded degausser. People, people now know how to do it. Your 13 year old, if you have $40,000, you can wipe your hard drive down to the subatomic level. Very good.
Starting point is 00:10:58 And it's described by Alan Ruspiger, I think as a piece of theater. Yeah, it sounds like complete with the handshake at the very end. I understand that there is this kind of vagueness in the law. And the guardian of course, doesn't want to run totally afoul of the British state. But I mean, why, why is he willing to do this? Well, it's an interesting story because one of the reasons is that that's not the only copy. And, you know, as we said, British law is somewhat more restrictive, but they have another
Starting point is 00:11:26 copy which is in New York where it's under First Amendment protection and where the Guardian are also going to be working eventually with the New York Times to whom they will actually give one of the archives in order to kind of keep it protected. At the very start, I did tease the idea that I might reveal something of a clandestine mission. That's right, you did. I did. And for those who remember all the way back, because it was a long time ago, I'll lift
Starting point is 00:11:52 the cover. Like Chekhov's shotgun, you're delivering now. Put it on the mantelpiece, now it must be fired. It's my tiny bit part in the story of Edward Snowden and the archive. So in that summer, kind of September, 2013, I get summoned by my boss, BBC, the head of BBC news who said, come and see me. And he says, I've got a mission for you. Should you choose to accept it? And I didn't quite say it like that.
Starting point is 00:12:17 Oh, don't ruin it, did he say mission though? Close. And the stories at that point, the Guardian was feeling pretty lonely. And it was actually- They've been de-gaussed. They've been de-gaussed. And also a lot of the British press was having a go at them for endangering national security. And I think they were looking for allies, which is one of the reasons they were in touch
Starting point is 00:12:34 with the New York Times and others. I was told that senior leadership, the Guardian had contacted senior leadership of the BBC to discuss, would we be interested in partnering and looking at this archive? And so my boss said, the mission is to go to New York and to look at the archive. And the instructions from my boss were, do not write anything down electronically. So don't put anything on a computer. Don't use your phone out to contact anyone about this. Just go and then come back and tell me what I think, you
Starting point is 00:13:05 know, give me a judgment on the archive and what we think could happen. Have a quick breezy look at one and a half million top secret documents. Come back with a synthesis. I was like, sure. So anyway, I head out to New York following my instructions, my clandestine mission. What was your cover for the travel? Gordon Carrera, BBC journalist. I was not using, I was not, this is not deep cover spy the travel. Gordon Carrera, BBC journalist. I was not using, this is not Deep
Starting point is 00:13:25 Cover Spy, David. And I go to New York and I meet actually in the Guardian office. I meet Alan Ruspacher, Janine Gibson, who is the US editor, Stuart Miller, her deputy. And they're very nice to me. And they say, sit down and go and have a look at the raw Snowden archive. I wasn't given rights to browse through the whole lot. I was given a kind of selection of the raw documents. And it's very interesting because even now, how many years later are we? 12 years later. Firstly, I can remember it vividly.
Starting point is 00:13:51 And secondly, I still don't think I can describe some of the things I saw because I think they were that sensitive. To see stuff which is top secret, strap to, you know, in front of you. And also the stuff I saw was not stuff that had been made public. Probably interesting to give people a sense of it, but I'm going to be very careful what I say because I still think some of the stuff is very classified.
Starting point is 00:14:15 So there was stuff about how the bearers kind of pick up data from the fibre optic cables. There was a very interesting report from a GCHQ staffer who'd been to a foreign country about what signals could be intercepted in a capital of that country and how they could be intercepted. Obviously quite interesting. Also with the name of the staffer on the file, there was something which was very sensitive, which was, and this was one of the most strangest things, was the problem book for GCHQ mathematicians, right? It outlined what they could do in terms of finding certain types of
Starting point is 00:14:46 communications and what they couldn't do. And then laid out the problem for the mathematicians to try and solve mathematically. And the booklet was just full of maths, which I even with my A level maths, I could not understand because this is like for the most advanced mathematicians in the country, but what was so sensitive about it and so fascinating was that it absolutely showed what they could do and what the limits were of their capability. So it told you exactly what, and this is why I'm being very careful and I'm sure they may be changed now, but exactly what kinds of communications in a certain way could be
Starting point is 00:15:19 accepted and what kinds couldn't be, which obviously is very sensitive. And so it was amazingly interesting to see. But one of the things that I came away realizing was, A, there was some really top secret stuff in that archive. I mean, like, properly top secret stuff. And secondly, that the Guardian actually had been very careful about what it was publishing. And I think now government officials I've spoken to recognize this with The Guardian. They were angry at the time, but there was a whole load of stuff that The Guardian didn't touch, which was incredibly sensitive and which could have been incredibly damaging.
Starting point is 00:15:55 Anyway, last point of my story is two things happened, which were interesting. One was, so I've been told no electronic notes. I'd taken some very careful paper notes because I thought I need a kind of a memoir to know what to think about this, not of the actual content of the documents, but kind of just general stuff about what I thought about it or whatever. I got out of the guardian office and I remember thinking to myself, going back to my hotel room and thinking, I'm not even sure I should have these paper notes. Well, because I think, I think this is, this is slightly dangerous.
Starting point is 00:16:24 Did you eat them? I'll come back to that because there's a particular risk because actually in August, Glenn Greenwald's partner David Miranda had been stopped at Heathrow Airport under terrorism powers because they believed he was taking documents from the archive and taking them, I think, from Berlin, Laura Poitras to Rio, to Glenn Green World, but via London. And they'd stopped him under the terrorism act, which was very controversial because it was basically someone couriering. Yeah.
Starting point is 00:16:52 But for journalism and they're using terrorism pounds against him. And so there was quite a lot of worry, right? Hang on a sec. If the authorities know I'm coming back, might they think I've got something you're mule in papers, papers, am I going to get arrested? So I thought God destroy this. How do you destroy papers, David? I'm in a hotel room. I do house them. Yeah. I was sat there with like, and I just, I remember thinking to myself, I don't know how to do this. I've not had spy training because in the old Cold War spy movies, you put it in
Starting point is 00:17:18 an ashtray, don't you? And burn it. But you haven't got an ashtray in it. No one has an ashtray. Now you tell me what I should have done. Well, I'll tell you what I did. You tell me what you did first. I, I tore it up into tiny bits and then I went around various cafes in Manhattan and then flushed it down toilets. I think that's the right answer. Oh, good. Yeah, no, I do.
Starting point is 00:17:36 I think that's the right answer. I think critical to hit multiple. Multiple. Yeah. Better if you had a map of the sewage network to make sure it didn't end up in the same place and someone's gonna reconstruct Yeah, I think multiple toilets small pieces and I'll give you my last weird you shredded or did you rip it yourself? I ripped it. Okay. Yeah, you should have bought a shredder. Okay last
Starting point is 00:17:54 Bit of this story, which is also bizarre So I don't make this all about me But so phone and laptop locked into a safe in the hotel room all the time never, you know never took them out So then I go back to the airport to fly home. And this I remember vividly, I'm on the plane at JFK in my seat economy before you ask, and switch on my phone. And in front of me, I look at my email inbox, all my emails start deleting one by one, as if someone is pressing the delete key.
Starting point is 00:18:23 By the end of about a couple of minutes, my inbox is empty of emails. Now that was deeply suspicious. Sure. And I asked people afterwards, I said from, you know, GCHQ and from America, I said, come on, what was that? And they said, no, we'd never do something like that. But I, at the time interpreted it as someone saying, we know what you've been doing and we're going to send a little signal to you to say, we know what you've
Starting point is 00:18:44 been doing, you know, we're going to let you know that you thought you were doing a kind of very clever secret mission, but actually we know exactly what you've been doing. But they, people I've spoken to Adamant, they wouldn't do that, but then it's a little bit of a weird coincidence. Did you get the emails back? Yeah, well I had to reconstruct my inbox and kind of rebuild it when I went back because it's not clandestine surveillance, is it? If you're deleting someone's inbox. I guess it could have been Because it's not clandestine surveillance, is it? If you're deleting someone's inbox.
Starting point is 00:19:05 I guess it could have been a mistake by the clandestine surveillance. Who got it there and started monkeying around. I mean, maybe it was our feed friends, having a little fun with you in New York. You're not an American citizen and don't have the same rights and privileges that I do. I should be under five eyes protections though.
Starting point is 00:19:21 Well. You think that has its limits. Winking and nodding. But anyway, I remember myself someone's got an eye on me on what I'm doing on my Not very clandestine mission and you never got any closure on this though No I never got an answer to it if anyone knows the answer if any members of the intelligence community
Starting point is 00:19:36 Listening who were involved in deleting my inbox and would like to get in touch We'd like to like to be whistleblowers the email you know where to reach us. Scroll down past the Degasser link. But that was my very brief. Interesting. Introduction into seeing the raw documents and the archive and to understand what it really looked like. And it was eye opening. So you have brought back firsthand evidence of Snowden's fourth deadly sin.
Starting point is 00:20:00 Which one was that again? Which is the indiscriminate nature of what he provided. Because you're attesting to documents that really any responsible British or American journalist should never have printed. But also to say that they have not come to light since then. So there are archives which I think are in the US, I think with the New York Times, for instance, maybe bits in other places as well. And still there, right? Still there. And one of the deals the Guardian made was we're going to let you have it, but only for a very narrow type of story about mass events, not for kind of dipping into to look for other stories or what else you can find. And so yes, that the stuff is
Starting point is 00:20:36 there and it's probably also less sensitive now than it used to be, but it has been, you know, limited in how it's been used, I'd say. And maybe there Gordon Carrera has returned from his secret mission, albeit with his inbox completely scrambled mysteriously. Edward Snowden still in Moscow. When we come back, maybe we'll deal with Snowden the man, his life in Russia and the legacy of what he leaked. See you after the break. of what he leaked. See you after the break. quietly collecting your personal information, building detailed profiles, and then selling them on without a warrant and without any warning. That's right, your address, phone number, family ties,
Starting point is 00:21:29 even political leanings all online. It's like your personnel files being left open on a cafe table. And once it's out there, it spreads to scammers, identity thieves, really anyone with a Wi-Fi signal and bad intentions. That's why we use Incogni. They act on your behalf, demanding data brokers delete your information and they keep doing
Starting point is 00:21:49 that automatically because it's not a one-time breach, it's the risk of constant exposure. Think of it as your own digital counterintelligence service. So head to incogni.com slash rest is classified for 60% off an annual plan. That's incogni.com slash rest is classified. This episode is sponsored by Nord VPN, which Gordon frankly is essential if you'd rather not have your online life monitored like some Cold War embassy. Who wants that? Well, these days, there are eyes and ears everywhere across the Internet. Ad companies, data harvesters, parties unknown.
Starting point is 00:22:25 NordVPN blocks all of it's malware pop-ups and the creepier corners of the web. It's like having your own digital dead drop, secure, untraceable, nobody quietly rifling through your browsing history or collecting your personal information. And so threat protection works even when the VPN's off. So even if you forget to switch it on,
Starting point is 00:22:44 it's still covering your back. It also encrypts your data on public wifi. Think cafes, airports, hotels, so you're not handing your information over to whoever's lurking on the same network. So if you want to stay one step ahead, and really, who doesn't, head to NordVPN.com slash rest is classified for an exclusive deal with four extra months free. Plus there's a 30 day money back guarantee. No risk, no trace, no loose ends.
Starting point is 00:23:10 The link is in the episode description. Welcome back. We are in the home stretch of our death march through the life and times of Edward Snowden. And I think maybe Gordon, as we sort of bring this all to a head, we start with Snowden himself, because we've been talking a lot about journalists, your undercover secret mission to New York to look at the archives, all of these incredible just bombshell stories that have come out. But Ed Snowden has actually just been in Moscow.
Starting point is 00:23:46 He has been there ever since. Most of what we talked about, it happens in 2013. It's now 2025 and he's still there, really in exile. Yeah, he is. I mean, it is a strange life for him, a very different life, maybe not the one he expected. And first he kind of keeps his head down. You know, he says he fears being head down. He says he fears being snatched, he didn't speak Russian. I think maybe it got easier for him as his girlfriend
Starting point is 00:24:09 came out. But while I think maybe the surroundings physically may have got easier for him, politically I think the surroundings have got trickier for him in a way. Because Russia of 2013 is different from the Russia of today of 2025, and particularly in the relations with the West. Being stuck in Moscow looks like a more difficult thing and a more problematic thing now in terms of the way we see Snowden than perhaps it did in 2013 and than perhaps he expected. Given the darker turn Russia has taken under Vladimir Putin and the idea of Edward Snowden, a kind of champion of internet freedom being in this country, which has become increasingly authoritarian and repressive. I mean, that is, I think, you know, even though he can't say it must be uncomfortable and harder for
Starting point is 00:24:52 him, as well as for the story about him. It's taken a turn. I think that's the way of putting it. Well, and this is more, I think on the Deadly City number five, which is Ed Snowden as essentially a stooge for the Russians. A mouthpiece. I don't buy that. In many cases. But, I mean, interestingly enough, he speaks pretty frequently, virtually, from Moscow.
Starting point is 00:25:16 And I think between 2015 and 2020, he actually earned a little over a million dollars in speaking fees. Right. You know, he's spoken to the EU Parliament. He speaks to, you speaks to companies, conferences. He actually gave a talk at a big Bitcoin conference in 2024, I believe, where sort of Ed Snowden's head pipes in virtually, and he speaks to this big group convened in Las
Starting point is 00:25:36 Vegas or wherever. It's interesting, because I think he's, unlike a lot of other defectors that we'll probably talk about on this program, he is very comfortable in the virtual world. I do wonder if for him kind of exile in Moscow is a little bit less painful. Then it might be for other people. Then it might, as long as he's online, you'd get shits online.
Starting point is 00:25:57 Obviously, you know, and he's, he's not talked about this or refuses to talk about it, but clearly the Russians have set some boundaries around what he is able to say. You know, he's very clearly enabled by his Russian handlers or sort of minders to speak publicly, to speak negatively about the United States, NSA, the intelligence community. Yeah, yeah, but I also think he's also not been afraid at points to be critical of Russia. I mean, I agree, there are going to be boundaries because he is there. But I think the idea he's some kind of Russian stooge, I don't think that's right.
Starting point is 00:26:32 I think he's a person who has to live under limits. Yes, and I guess maybe stooge isn't the most precise word I could use. I think what seems to have happened and what I think Putin, because this would have been a Putin level decision to allow him to stay, to kind of create this environment for him. I think the decision was let's just let this guy continue his crusade and do it from Moscow and I imagine almost the Russian pitch to some degree, which is not a cold or nasty pitch, but is kind of a subtle one is you just stay here and
Starting point is 00:27:05 we'll kind of help you communicate your message. Yeah. Right. We'll let you get on these conferences and video conferences and, and undermine confidence in American society, the Western system, the intelligence and security agencies that continues to be defended in his views on the internet freedom, you know, and privacy continues to be a privacy jihadist, as I've said, you know, and he's consistent in that.
Starting point is 00:27:29 He is consistent in that. It's very interesting. He essentially has come out and said that he believes that the provisions of the US constitution around the right to expression and the right to privacy really apply to everybody, not just Americans. And so he's kind of continued that really pretty extreme viewpoint. He's, he's taken that to its logical end in what he communicates from Russia. But let's step back at this point, because I think it is interesting 12
Starting point is 00:27:53 years on to kind of look at the legacy and what all of this led to and what it meant, because at the time it was very intense, but I think now with a bit of hindsight, you can see a more balanced view, I think, of what Snowden left behind from that amazing period. He wanted to expose some of these programs. He exposed them. I think the reality is, and I think this is really interesting, is that most of those programs, whether it's the US or the UK, are still going.
Starting point is 00:28:27 But they are going under much greater public understanding, oversight and accountability and under different legal frameworks. That I think is important as a legacy because I think there is this comment from David Anderson, who did a big study about the kind of British powers that GCHQ, for instance, had. And his argument was, it's not necessarily that they shouldn't have had the powers, but the lack of accountability and transparency about them made them undemocratic, because there wasn't enough control or understanding of how those
Starting point is 00:28:58 powers were being exercised. And I think that is an important legacy of Snowden is to create a public debate and to improve the oversight of these powers that the state had rather than stop them having the powers though, which is a different point. It probably is worth just a little bit of a reminder on precisely what he exposed because I think it is basically three buckets of capabilities, right? And I'll just speak to the American context here. The first one is that the national security agency was collecting information from US tech companies to be able to target foreign citizens of the United States
Starting point is 00:29:45 and their communications outside of the United States, but that would pass through those US tech companies, right? So that's kind of like one bucket prism. The second one is that the NSA, the National Security Agency, was collecting telephone metadata in bulk on American citizens from Verizon, AT&T, to enable not searches on directed on US persons,
Starting point is 00:30:11 but to enable connections to be made. For example, if a safe house in Karachi gets taken down by CIA, phones are collected, they want to see who in the United States those phones might be in contact with. It allows for that kind of searching and connection, right? And then there's another, I think, bucket around the NSA collecting information from US tech companies abroad. Right. Yeah. Right. That's more kind of traditional sort of foreign hacking, right? Yeah. So in those cases, and actually, Bart Gellman, who is the Washington Post reporter who wrote
Starting point is 00:30:46 this book, Dark Mirror, on these collection programs, basically says that the NSA behaved responsibly in its searches through those databases. And there wasn't anything he could dig up to really show that they were misused. I just think it's an important context to set. Yeah, no, no, it's a good bit of context. But for instance, the database of US phone numbers, they searched it 288 times in 2012 for times when a foreign terrorist dials a US number. 13 leads are passed to the FBI.
Starting point is 00:31:16 One person, you know, this is according to official statistics, gets caught planning an attack in Times Square and arrested. But the FBI actually knew about him anyway. So you have a kind of mass collection of data on Americans, but actually, is it proportional? Is it worth it? You know, it's part of that post 9 11 era of kind of collect everything who knows how it'll be useful. And that metadata program has kind of died, you know, effectively and it's gone. It was, I think it was sunsetted those Patriot act stipulations, which suggests it had some
Starting point is 00:31:44 utility but not enough to keep it going. Prism is still there, effectively 702, but debated, you know, and it's quite political about how very political in the US. Some of those capabilities are there and clearly had some use, but I think it's quite hard to judge from the outside how vital it was they had these capabilities. As I said, to my mind, the mistake was not necessarily building the capabilities, but thinking that you could do some of this without greater public understanding or transparency or accountability.
Starting point is 00:32:15 I'd put it down to just read that quote from Bart Gelman, where he said, quote, nothing in the Snowden archive and nothing I learned independently offered reason to doubt that the NSA workforce did its best to follow the rules and good faith. And so I just, there's a lot of different kind of core debates we could kind of bring this down to. I don't think this is a debate so much about whether the NSA or the FBI was really spying on Americans. I think this is a debate about whether we as a society want our government to possess
Starting point is 00:32:46 this information in the first place, right? It's about whether the government has the right or whether it's good that the government possesses this. A lot of the real scary scenarios here are not what's happened with this already as it relates to Americans. It's about what could happen in a future where this information is potentially used by a more authoritarian without wishing to get into US politics. I mean, you could
Starting point is 00:33:13 argue we are in a more authoritarian world, you know, in which states and how they use intelligence agencies change over time. And therefore, you can have these capabilities in secret and go, well, it's fine, because it's all all under strict controls and the people are good people. But all it takes is a more authoritarian government to go I want to use that capability in a slightly different way and tweak the secret way in which it's used. And suddenly you're on the road to something else. So that's why I think how much you want those controls over the state I think is a really interesting question. Another area I think is how much damage did
Starting point is 00:33:43 Snowden do to this spying game. I mean you know at the time again I think it's a really interesting question. Another area I think is how much damage did Snowden do to this spying game? I mean, you know, at the time again, I think you can see this in a different way now that we look back, because there was a lot of like, he's done huge damage to capabilities, stuff has been switched off. We're going dark, which is the kind of intelligence phrase for when you could watch something, the target, you know, on the internet or their communications, and then you lose that ability. I spoke to someone recently, they said, it wasn't so much we went dark, it went spotty. It lost a bit of insight and it did have, I think, some damage to some of those capabilities
Starting point is 00:34:17 because it revealed to terrorists and others how much the US could observe them, that they could get their Gmail through Prism and things like that. And therefore they changed their behavior. But I think the intelligence agencies are pretty good at adapting. It was interesting. One person said to me that if there was a mistake or a loss to it, it was that they spent so long really focused on regaining their access and their capability to watch terrorists and insurgents at that point.
Starting point is 00:34:44 And that if anything, that meant they took their eye off the ball of what other states were doing. You're kind of Russia and China because they were so focused on rebuilding the capability over Snowden. And that might be one of the kind of consequences of it is that Russia and China got a bit more of a pass. You can see China since then thinking, how can we build an equivalent capability? How, for instance, potentially could they use some of their tech companies? We've talked about TikTok in the past
Starting point is 00:35:10 to collect data or to do things like that. TikTok obviously say they wouldn't do it, but you could imagine if you're in China, you're thinking, hey, America is using its tech companies, it's using all this access, it's got all these databases. We want to be able to do something similar. I think you start to see changes in Chinese behavior after Snowden as it tries to almost replicate the kind of capability it now understands the US has. So that is irrespective of the kind of specific intelligence. You do see, I think, those quite significant changes. Well, I think in addition to the just the very clear hard costs of, okay, there's
Starting point is 00:35:45 a lost platform that enabled us to collect on a foreign adversary, terrorist group, criminal network, whatever it might be that could potentially go away, right? I mean, that obviously that happened. I would imagine a lot of that over time was regained, right? But there was a massive effort inside the intelligence community. I mean, this was when I was still inside, I mean, and I was not directly related to this at all, but a massive effort to try to understand who had what information and really conduct a kind of damage assessment. So there's a massive number of man hours.
Starting point is 00:36:18 It's probably just not even possible to calculate dealing with the Snowden fallout internally. There's also the fallout, you know, we talked a couple episodes ago about those tech companies on that slide. They had been sort of some mixture of kind of coercion and payouts had sort of compelled them to cooperate. And now you look at the latest, I mean, it was early, it was early mid 2024 when section 702 of the FISA Act came back for reauthorization, nasty political fight around it. And you can see that the tech companies now have basically said, look, unless you actually compel us to do this, we're not cooperating.
Starting point is 00:37:00 So there's a massive chilling, I think, that has happened between Washington and Silicon Valley in the years since. Yeah. A much more adversarial relationship. Yeah, there was. I mean, there was in the immediate aftermath of Snowden because the tech companies were furious, I think. Mark Zuckerberg went to see Obama in the White House and said, you blew it by saying that PRISM is only used to spy on foreigners, not Americans, because of course, most of the
Starting point is 00:37:22 customers of Facebook are foreigners, not Americans. Right. And so they were kind of angry at this bad for Zuckerberg's business to know poor, poor, poor Zuck that actually at the time Facebook and the NSA were working together to collect intelligence or, you know, to get details of basically their customers. And of course, foreigners knew this was happening. He was just frustrated that it came to light. And so I think it definitely had a kind of chilling effect with the tech companies. Although I think now the tech bros are perhaps a bit closer to the, to the white house, you know, again, and they're a bit more aligned, I think, tech companies to nations. Whereas in that period, in 2013, 2015, they kind of saw themselves as kind of above nations
Starting point is 00:38:01 and above politics. And I think we have a different view of tech companies now than then. Yeah. Many ordinary citizens just sort of assume that, well, look, tech companies are selling all of our data anyway. Yeah. So there's maybe less of an assumption of privacy now. Yeah.
Starting point is 00:38:17 Although the focus of that kind of ire or concern is now much more focused on the tech companies themselves, maybe as opposed to the NSA or GCHQ. Because I always think this is one of the interesting aspects of it is the reason the state could get this data was because the tech companies were collecting it, you know, and the state's getting it off the tech companies. And Snowden made everyone go look at the state, but actually the tech companies were hoovering up people's data in a massive way and continue to do it and continue basically to mine it and do the kind of data analysis about it, but for the purposes of selling advertising
Starting point is 00:38:49 and for understanding them. And you're right, I think at the time Snowden came out, we became very attuned to the state doing it. And it was only maybe Cambridge Analytica 2016, 2017, that we started to think about what the tech companies could do and were doing. We came to think much more about this kind of, you know, surveillance capitalism model and, and, and, you know, what constitutes surveillance collecting large amounts of data about us, keeping on a computer and having it automatically processed is that surveillance. I mean, in the Snowden world, that is surveillance because it's what the NSA
Starting point is 00:39:20 we're doing, if it's surveillance, then we're, we're certainly living in a surveillance society now, but it is as much driven by companies as it is by governments, I think. It goes to big issues about consent. How do we consent to our data being collected and used and analyzed, whether it's by companies in the state, especially when the systems are so complex? I think those big questions, which I think Snowden raised, which are really interesting, which is if you are living in a world in which all your data is collected and analysed, whether it's by companies or the state, does that take away your privacy or privacy? Does it remove your ability for free expression?
Starting point is 00:39:58 Does it reduce the ability to have dissent? I think those questions that he raised are still valid. But as I said, I think they're as valid about corporate data collection as they are about, if you like, the NSA or GCHQ's data collection. The flip side of that privacy or privacy argument is, and this is the case that continues to be made when that Section 702 authorization comes up, it is it now will again two years from now, right? Lawmakers really on both sides of the aisle continue to make the case that these capabilities for the NSA, GCHQ, in particular to be able to intercept or collect data from US tech companies abroad are absolutely critical to national security, right?
Starting point is 00:40:47 And that there is a pile of evidence to show that they are critical to disrupting terrorist plots, to gaining an information advantage over adversaries. I believe they've even been linked to the takedown, really the targeted killing of Ayman al-Zawahiri, the head of al-Qaeda a few years ago. So there is a national security argument to be made that these capabilities are critical. And I would argue that at least in the US, policymakers again on both sides of the aisle, I think they feel a tremendous responsibility to their constituents and American citizens
Starting point is 00:41:27 to continue to provide these capabilities to NSA to protect people. Yeah. And it's to some extent, it's about, do you worry more about your government spying on you or do you worry about your government protecting you from other threats? Yeah. And to some extent, that's a very personal individual thing. It depends a little bit on your own mindset, your own personal politics about where you're coming from, about what kind of person you are, whether you fear being persecuted by your own government, what kind of state you
Starting point is 00:41:53 live in, how you view your state. If you're in Germany and you have a history of the kind of, you know, Gestapo and the Stasi, you have a different attitude towards government surveillance and monitoring from other countries. And America has a more libertarian tradition in some extent than the UK. But I think it is quite a personal thing, you know, about where you sit as to how you balance those different risks and threats and therefore how much power the state should have. I think it's critical to frame it as a trade-off because if these authorizations were taken away and if Ed Snowden had been able to wave his magic wand, he has really worked hard again,
Starting point is 00:42:26 because I think he's being dishonest about this intellectually. He's worked hard to say, oh, look, there's sort of no actual cost, right, to me revealing these programs, and there's no real national security argument to be made to justify them. And I would say- They're trade-offs.
Starting point is 00:42:43 There's an absolute trade-off here. If you decided to wave your wand and, and that bulk metadata collection, which eventually did. And the section 702 authorization, those come with real costs. Yeah. And I think that the public should have the ability or its proxy in the form of parliamentarians and Congress people to have an informed debate about those trade-offs. I think the problem was before that there wasn't an informed enough debate and consent to work out what those trade-offs to even decide what they were to determine. So I mean, as we come to the end, I guess it's interesting, isn't it?
Starting point is 00:43:17 Because it's important not to make this all about Snowden the man, but I think it is interesting to go back to him. And I think one of the questions I have, which has gone through the series is what was he trying to do to ask the question, did he succeed and what was his legacy? If he was trying to stop surveillance, if that was his aim to kind of destroy the NSA and its powers, he's failed because the institutions have continued and a lot of the powers, maybe not all, are still there. If his aim was to expose them in order to put them under better
Starting point is 00:43:46 democratic control, then he's arguably succeeded in that aim. But I actually, I'm not quite sure which of those two, you know, is he an ideologue or is he a vandal? Ed, if you're out there, kind of get in touch and tell us what, what, what is the way that you feel, whether you feel you've succeeded or not. But to me, it's kind of one of the big questions. Well, he also has, I believe he's got over 5 million followers on X slash Twitter. So he's definitely succeeded from the standpoint of his egomania.
Starting point is 00:44:17 And maybe it is worth just sort of bluntly returning to one of the kind of questions that we started this whole series with, which is he a hero or is he a villain? And I'm going to relitigate. I know you love this, Gordon. I'm going to relitigate my deadly sins against Ed Snowden, right? Because I do have a final view on the man. Gordon is leaving to go to the bathroom.
Starting point is 00:44:41 I'm going to communicate this to the audience directly in between pitches for my personally branded degasser that we're selling. Okay. So, number one, he has a demonstrated track record throughout this whole episode of fabricating stories and exaggerating his access and telling outright falsehoods about the chronology. Second one, very impure motives, I would argue. I think there's a little top hat of ideology on this one. I think that the core of this is a bit of a revenge's tale against the NSA
Starting point is 00:45:15 and against really his superiors for not seeing his genius, right? The downloads start in 2012 after a big fight at NSA with his superiors about a software patch in which he gets reamed for having raised the issue to Fort Meade. Sin number three, he does not avail himself of any of the whistleblowing roots. Now, having worked in a monstrous government bureaucracy. I completely sympathize with the fact that these roots are clunky, uncertain. He had other whistleblowers before him who were sort of told to pound sand. Yep. The roots were available to him.
Starting point is 00:45:58 He decided to not take them. Yeah. Okay. The fourth one, the completely disproportionate nature of what he leaked relative to his stated goals. If he wanted to focus entirely on the NSA surveillance on Americans, there's a very small portion of the documentation of the 1.5 million documents, pages of documents that he took that he could have taken to make that case.
Starting point is 00:46:27 And I think he would have been treated a lot differently. The last one, you know, you've disputed Sin 5, you disputed my word that he's a Russian stooge, but he has become, I think, a mouthpiece in a Russian active measures campaign against the West, passively they let him talk, right? They let him spread this message. I think all of this to my mind is absolutely no way he's hero.
Starting point is 00:46:55 I see him as an arsonist, right? And here's the way, I think that there have been, and out of this debate over privacy versus national security, more transparency, more openness with the public about what's actually going on. I think that is good. I think it's probably good, not to get too technical, I think it's probably good that that bulk metadata collection was sunsetted and taken away. Because I actually think that is the most egregious example of really unlawful search and seizure
Starting point is 00:47:26 on the part of the US government, right? I'm glad that's gone. But to my mind, the system that we have today, which I think is better than the system that he, you know, was fighting against, is kind of like if I had a house, you burned my house down. And then I build a better house 10 years later.
Starting point is 00:47:48 I'm not really thanking the arsonist for burning my old house down. And I think that's the role he played. And I think, you know, he could have done things a lot differently. I think that if he had been proportional, I think that if he had stayed in the United States, he would be a free man
Starting point is 00:48:05 in the US today and he'd be more or less a hero. Now, obviously there'd be people inside the national security establishment who would disagree with that, but he made these decisions along the way that I've just outlined that I think firmly cast him in that role as arsonist and then to my mind, absolutely not a hero. Yeah. I mean, thank you for that very, very long indictment of Edward Snowden. I'm not just returning from the bathroom. I have a good on that.
Starting point is 00:48:34 I mean, look, I actually think not just on Edward Snowden, but generally I think trying to separate the world into heroes and villains is a mistake generally. And I think it's too simplistic. And I think it's always a mistake. People are more complicated than that. People's motives, I think we can see with Edward Snowden, may have been complicated and confused between the ideological and the grievance. I think that is true.
Starting point is 00:48:53 I think the legacy and the effects of him are complicated and not binary. I think more democratic accountability over the surveillance systems and the intelligence collection systems are a plus. But I think there is a legacy of damage in certain ways, in certain places, but maybe not as much as people say. Just as a kind of final thought, I do think he's an interesting figure because going back to the man slightly, he is a figure who comes from a kind of different age of the internet.
Starting point is 00:49:19 To go back to that kid who grew up with computers and this idea that the internet could be free. Today that seems like a very romantic, idealistic notion, but also utterly bewildering, I think, to people. The idea that the internet could be a place of free expression and anonymity and privacy when the reality is actually it does look like a darker place. It looks like a darker place where darker things happen online, where the state feels it needs to be online to find the darker things that are happening, you know, and what people are doing online and including bad people online, and in which, you know, kind of cyber
Starting point is 00:49:56 warfare, cyber attacks are happening, and in which states and companies are, you know, acquiring data and eroding that privacy online. So I think fundamentally I come away thinking Edward Snowden might have been a man driven by both ideology and grievance, but he also kind of figure trapped almost in a time of the past. And whether you view that as a kind of happier time or not, it's not today anymore. No, no. We're in a kind of a different darker world of the internet than that idea that
Starting point is 00:50:26 that we had in the past. Well, and I guess it also, I appreciate Gordon that you're, you're justifying my description of him as a privacy jihadist because he is sort of like a jihadist trying to go back to this golden era. But isn't there something, isn't there something quite attractive about that? About, about elements of that when it, when it was a freer place. I don't know. Maybe it's unrealistic to think it could be that though. Well, it certainly doesn't seem like a past that we can ever really return to.
Starting point is 00:50:51 Given all that's happened. And I think it, just as we close out this series on Snowden, I think it leaves us with this question, this tension over privacy and national security that is really kind of unresolved or unresolvable now in this new world of the internet. So with that we come to the end of this long and I think fascinating story of Edward Snowden. We really hope you've enjoyed it. And before we go, we'd like to say a massive thank you especially to everyone who signed up to be a member of the Declassified Club. We're thrilled to have you on board.
Starting point is 00:51:24 And for those who want one more Snowden High, the bonus content this week will be an interview with Chris Inglis and he was Deputy Director of the NSA at the time of the whole Snowden affair. So if you want to hear that, you can join at therestisclassified.com and remember to take advantage of our launch discount. That's right, one last Snowden High, one punch into your veins. Join us for that one. We will see you next time.
Starting point is 00:51:50 See you next time. See you next time.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.