Since I Met Edward Snowden, I’ve Never Stopped Watching My Back
WHISTLEBLOWING - SURVEILLANCE, 25 May 2020
After receiving a trove of documents from the whistleblower, I found myself under surveillance and investigation by the U.S. government.
Jun 2020 issue – “What time exactly does your clock say?” asked the voice on the telephone, the first words Edward Snowden ever spoke to me aloud. (Our previous communications had all been via secure text chats over encrypted anonymous links on secret servers.) I glanced at my wrist—3:22 p.m. “Good. Meet me exactly at four. I’ll be wearing a backpack.” Of course he would; Snowden would never leave his laptop unattended.
He resisted questioning about his private life, but he allowed that he missed small things from home. Milkshakes, for one. Why not make your own? Snowden refused to confirm or deny possession of a blender. Like all appliances, blenders have an electrical signature when switched on. He believed that the U.S. government was trying to discover where he lived. He did not wish to offer clues, electromagnetic or otherwise. U.S. intelligence agencies had closely studied electrical emissions when scouting Osama bin Laden’s hideout in Pakistan. “Raising the shields and lowering the target surface” was one of Snowden’s security mantras.
On bathroom breaks, he took his laptop with him. “There’s a level of paranoia where you go, ‘You know what? This could be too much,’ ” he said when I smiled at this. “But it costs nothing. It’s—you get used to it. You adjust your behavior. And if you’re reducing risk, why not?”
Over six hours that day and eight hours the next, Snowden loosened up a bit, telling me for the first time why he had reached out to me the previous spring. “It was important that this not be a radical project,” he said, an allusion to the politics of Glenn Greenwald and Laura Poitras, the other two journalists with whom he’d shared digital archives purloined from the National Security Agency a few months earlier. “I thought you’d be more serious but less reliable. I put you through a hell of a lot more vetting than everybody else. God, you did screw me, so I didn’t vet you enough.” He was referring to my profile of him in The Washington Post that June, in which I had inadvertently exposed an online handle that he had still been using. (After that he had disappeared on me for a while.)
I moved the audio files from the memory card of my voice recorder to an encrypted archive on my laptop, along with the notes I had typed. I locked the archive in such a way that I could not reopen it without a private electronic key that I’d left hidden back in New York. I uploaded the encrypted archive to an anonymous server, then another, then a third. Downloading it from the servers would require another private key, also stored in New York. I wiped the encrypted files from my laptop and cut the voice recorder’s unencrypted memory card into pieces. Russian authorities would find nothing on my machines. When I reached the U.S. border, where anyone can be searched for any reason and the warrant requirement of the Fourth Amendment does not apply, I would possess no evidence of this interview. Even under legal compulsion, I would be unable to retrieve the recordings and notes in transit. I hoped to God I could retrieve them when I got home.
Were my security measures excessive? I knew the spy agencies of multiple governments—most notably the United States’—were eager to glean anything they could from Edward Snowden. After all, he had stolen massive amounts of classified material from NSA servers and shared it with Poitras, Greenwald, and me, and we had collectively published only a fraction of it. The U.S. government wanted Snowden extradited for prosecution. But I’m not a thief or a spy myself. I’m a journalist. Was I just being paranoid?
# root:xnu …
# dumping kernel …
# patching file system …
Wait, what? It looked like a Unix terminal window. The word root and the hashtag symbol meant that somehow the device had been placed in super-user mode. Someone had taken control of my iPad, blasting through Apple’s security restrictions and acquiring the power to rewrite anything that the operating system could touch. I dropped the tablet on the seat next to me as if it were contagious. I had an impulse to toss it out the window. I must have been mumbling exclamations out loud, because the driver asked me what was wrong. I ignored him and mashed the power button. Watching my iPad turn against me was remarkably unsettling. This sleek little slab of glass and aluminum featured a microphone, cameras on the front and back, and a whole array of internal sensors. An exemplary spy device.
I took a quick mental inventory: No, I had not used the iPad to log in to my online accounts. No, I didn’t keep sensitive notes on there. None of that protected me as much as I wished to believe. For one thing, this was not a novice hacking attempt. Breaking into an iPad remotely, without a wired connection, requires scarce and perishable tools. Apple closes holes in its software as fast as it finds them. New vulnerabilities are in high demand by sophisticated criminals and intelligence agencies. Shadowy private brokers pay millions in bounties for software exploits of the kind I had just seen in action. Someone had devoted resources to the project of breaking into my machine. I did not understand how my adversary had even found the iPad. If intruders had located this device, I had to assume that they could find my phone, too, as well as any computer I used to access the internet. I was not meant to see the iPad do what it had just done; I had just lucked into seeing it. If I hadn’t, I would have thought it was working normally. It would not have been working for me.
This was the first significant intrusion into my digital life—that I knew of. It was far from the last. In the first days of 2014, an NSA whistleblower, Tom Drake, told me he had received an invitation from one of my email addresses, asking him to join me for a chat in Google Hangouts. It looked exactly like an authentic notice from Google, but Drake had the presence of mind to check whether the invitation had really come from me. It had not. An impostor posing as me wanted to talk with Drake.
Which state sponsor? Per company policy, Google will not say, fearing that information could enable evasion of its security protocols. I did some further reporting and later learned from confidential sources that the would-be intruder in my accounts was Turkey’s national intelligence service, the Millî Istihbarat Teşkilatı. Even though I never send anything confidential over email, this was terrible news. A dozen foreign countries had to have greater motive and wherewithal to go after the NSA documents Snowden had shared with me—Russia, China, Israel, North Korea, and Iran, for starters. If Turkey was trying to hack me too, the threat landscape was more crowded than I’d feared. Some of the hackers were probably better than Turkey’s—maybe too good to be snared by Google’s defenses. Not encouraging.
The MacBook Air I used for everyday computing seemed another likely target. I sent a forensic image of its working memory to a leading expert on the security of the Macintosh operating system. He found unexpected daemons running on my machine, serving functions he could not ascertain. (A daemon is a background computing process, and most of them are benign, but the satanic flavor of the term seemed fitting here.) Some software exploits burrow in and make themselves very hard to remove, even if you wipe and reinstall the operating system, so I decided to abandon the laptop.
I brought the machine for repair to Tekserve, a New York City institution that at the time was the largest independent Apple service provider in the United States. I had been doing business there since at least the early 1990s, a couple of years after Tekserve set up shop in a Flatiron warehouse space. I liked the quirky vibe of the place, which had a porch swing indoors and an ancient Coke machine that once charged a nickel a bottle. But Tekserve’s most important feature was that its service manager allowed me to stand with a senior technician on the repair floor as he worked on my machine. I preferred not to let it out of my sight.
The technician tested and swapped out, seriatim, the keyboard, the logic board, the input/output board, and, finally, the power interface. After three visits, the problem remained unsolved. Keystrokes would produce nothing at first, then a burst of characters after a long delay. Tekserve consulted with supervisors at Apple. Nobody could explain it. I asked the technician whether he saw anything on the circuit boards that should not be there, but he said he was not equipped to detect spy gear like that. “All I know is I’ve replaced every single part in the machine,” he told me. “We’ve never seen this kind of behavior before.” I gave up and got another one.
In January 2014, I became an early adopter of SecureDrop, an anonymous, encrypted communications system for sources and journalists. It is still the safest way to reach me in confidence, and I have received valuable reporting tips this way. Having advertised a way to reach me anonymously, I’ve also gotten my share of submissions from internet trolls and conspiracy theorists, as well as run-of-the-mill malware. I never run executable files or scripts that arrive by email, so these were not a big concern. One day, however, a more interesting exploit showed up—a file disguised as a leaked presentation on surveillance. I asked Morgan Marquis-Boire, a security researcher then affiliated with the Toronto-based Citizen Lab, if he would care to have a look. “You’ve got a juicy one,” he wrote back.
Most hacking attempts are sent to thousands, or millions, of people at a time, as email attachments or links to infected websites. This one was customized for me. It was a class of malware known as a “remote access trojan,” or RAT, capable of monitoring keystrokes, capturing screenshots, recording audio and video, and exfiltrating any file from my computer. “Piss off any Russians lately?” Marquis-Boire asked. The RAT was designed to link my computer to a command-and-control server hosted by Corbina Telecom, in Moscow. If I had triggered the RAT, a hacker could have watched and interacted with my computer in real time from there. Other IP addresses the malware communicated with were in Kazakhstan. And internal evidence suggested that the coder was a native speaker of Azeri, the language of Azerbaijan and the Russian republic of Dagestan. But the moment Marquis-Boire tried to probe the RAT for more information, the command-and-control server disappeared from the internet.
Overtures of another kind came to my colleague Ashkan Soltani soon after his byline appeared alongside mine in The Washington Post. “Within the span of a week, three hot, really attractive women messaged me out of the blue” on OkCupid, he later told me over beers. Two of the women made their intentions known right away.
Then, on the day they set, she proposed getting together at his place. “It’s gloomy out. makes me want to cuddle,” she wrote.
“The fact that two girls in a row were making themselves available on the first date, I was like, What the fuck?” he told me. “Am I being, what—there’s a word for that—”
“Honey trapped,” I said.
“Yeah, honey trapped. I do okay, but it usually involves going out on a couple dates or whatever,” he said. “I don’t think I’m a bad-looking guy, but I’m not the kind of guy women message out of the blue and invite me to cuddle.” He decided to cancel.
Soltani suspected an intelligence-agency setup—“the Chinese government trying to get up on me”—in an effort to elicit information about the NSA documents, or to steal digital files. A well-known information-security attack known as the “evil maid” relies on brief physical access to a computer to steal its encryption credentials. As it happened, the Snowden files were at that time locked in a Washington Post vault, and kept separate from the electronic keys that allowed access to them, but outsiders would not know that. And an attractive spy might assume that, with the right enticements, anything was possible.
When Soltani returned to OkCupid to document these interactions in more detail, he searched for the two women who had pursued him so aggressively. Their online profiles no longer existed.
By the time we had this conversation, in the late fall of 2015, Soltani and I had stopped writing stories for the Post. I was working on a book. Soltani had moved on to other things. He had retired his old laptop, returned an encryption key fob to me, and shed his last connection to classified materials. “When we were wrapping up, it felt really good that I didn’t have to carry this burden anymore,” he told me. “I mean, from the perspective of the duty to protect this stuff—there’s still stuff in there that I think should absolutely never see light of day.”
“You still constantly have to be diligent,” he said to me. “You’ve been doing it for, like, three years. How do you do on vacation?”
Well, about that. Preoccupation with surveillance had distorted my professional and personal life. I had balked at the main gate of Disney World when I realized I would have to scan a fingerprint and wear a radio-tagged wristband everywhere in the park. My partner, Dafna, standing with our 7-year-old son, dared me with her eyes to refuse. I caved, of course. I brought my laptop almost everywhere I went, even on beach and hiking trips. I refused to leave my bag at coat checks at parties. The precautions I took to protect my electronics inconvenienced my friends and embarrassed my family. “You’re moving further and further into a world that I’m not a part of, and that I don’t understand and I don’t want to be a part of,” Dafna said one night. I had not come to terms, until that moment, with how abnormal my behavior had become. I never felt safe enough.
I built ever-thicker walls of electronic and physical self-defense. At one point in the spring of 2013, I requested a dedicated locked room at the Post for use by the reporters who worked with the Snowden documents. On a subsequent visit, a facilities staff member proudly showed me and Soltani the new space, in a place of honor beside the company president’s office. The room had one feature I had specifically asked to avoid: a wall full of windows. If you craned your neck you could see a beaux-arts mansion half a block to the west—the Russian ambassador’s residence in Washington. “You have to be kidding me,” Soltani said. Crestfallen, I asked for a windowless space. The Post found one, installed a high-security lock, put a video camera in the hall outside, and brought in a huge safe that must have weighed 400 pounds.
I acquired a heavy safe for my office in New York as well. I will not enumerate every step I took to keep my work secure, but they were many and varied and sometimes befuddled me. The computers we used for the NSA archive were specially locked down. Soltani and I used laptops from which we’d removed the Wi-Fi and Bluetooth hardware, and disconnected the batteries. If a stranger appeared at the door, we merely had to tug on the quick-release power cables to switch off and re-encrypt the machines instantly. We stored the laptops in the vault and kept encryption keys on hardware, itself encrypted, that we took away with us each time we left the room, even for bathroom breaks. We sealed the USB ports. I disconnected and locked up the internet-router switch in my New York office every night. I dabbed epoxy and glitter on the screws along the bottom of all my machines, to help detect tampering in my absence. (The glitter dries in unique, random patterns.) A security expert had told me that detection of compromise was as important as prevention, so I experimented with ultraviolet powder on the dial of my safe in New York. (Photographing dust patterns under a UV flashlight beam turns out to be messy.) I kept my digital notes in multiple encrypted volumes, arranging the files in such a way that I had to type five long passwords just to start work every day.
But I felt I had to be, and my fear was that any single barrier could be breached. A friend who runs a lock and safe company told me that an expert safecracker could break into just about any commercial vault in less than 20 minutes. Intelligence agencies have whole departments working on how to stealthily circumvent barriers and seals. Special antennae can read the emanations of a computer monitor through walls. Against adversaries like this, all I could do was make myself a less appealing target. I layered on so many defenses that navigating through them became a chronic drain on my time, mental energy, and emotional equilibrium.
Years later Richard Ledgett, who oversaw the NSA’s media-leaks task force and went on to become the agency’s deputy director, told me matter-of-factly to assume that my defenses had been breached. “My take is, whatever you guys had was pretty immediately in the hands of any foreign intelligence service that wanted it,” he said, “whether it was Russians, Chinese, French, the Israelis, the Brits. Between you, Poitras, and Greenwald, pretty sure you guys can’t stand up to a full-fledged nation-state attempt to exploit your IT. To include not just remote stuff, but hands-on, sneak-into-your-house-at-night kind of stuff. That’s my guess.” Because I’d been one of Snowden’s principal interlocutors, Ledgett told me he was sure there was “a nice dossier” on me in both Russia and China.
On January 29, 2014, James Clapper, then the director of national intelligence, sat down at a Senate witness table to deliver his annual assessment of worldwide threats, covering the gravest dangers facing the United States. He did not open his remarks with terrorism or nuclear proliferation or Russia or China. He opened with Edward Snowden, and within a few words he was quoting one of my stories. “Snowden claims that he’s won and that his mission is accomplished,” Clapper said. “If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed, to prevent even more damage to U.S. security.”
I pretty much stopped listening after the word accomplices. This was not an off-the-cuff remark. It was prepared testimony on behalf of the Obama administration, vetted across multiple departments, including Justice. Accomplice has a meaning in criminal law.
“I had in mind Glenn Greenwald or Laura Poitras,” Clapper told me years later. “They conspired with him, they helped him in protecting his security and disseminating selectively what he had, so to me they are co-conspirators.”
“Well, then maybe you are too. This is the whole business about one man’s whistleblower is another man’s spy.”
I asked Clapper whether I was a valid counterintelligence target.
“Theoretically you could be,” Clapper said. “Given how Snowden is viewed by the intelligence community, someone who’s in league with him, conspiring with him, that’s a valid counterintelligence—and for that matter law-enforcement—target.”
Twice in February 2014, George Ellard, then the NSA inspector general, referred to journalists on the story as Snowden’s “agents.” We had done more damage, he said at a Georgetown University conference, than the notorious FBI traitor Robert Hanssen, who’d helped Soviet security services hunt down and kill U.S. intelligence assets.
It became a running joke among U.S. officials that Bart Gellman should watch his back. In May 2014, I appeared on a panel alongside Robert Mueller, the former FBI director, to talk about Snowden. Mueller cross-examined me: Were the NSA documents not lawfully classified? Were they not stolen? Did I not publish them anyway? I held out my arms toward him, wrists together, as if for handcuffs. The audience laughed. Mueller did not.
I know perfectly well that government agencies prefer not to read their secrets on the front page. Sometimes they resent a story enough to investigate. How in the blazes did the reporter find that out? In serious cases maybe the Justice Department steps in. I knew all that—but despite years of reporting on government secrets, I had not often experienced it personally. So, in the summer of 2013, when I came across my own name in the NSA archive Snowden had shared with me, I gawped at the screen and bit back an impulse to swear.
The most intriguing part of the memo was the framing of the harm that the NSA ascribed to my stories. “Press leaks could result in our adversaries implementing Denial and Deception (D&D) practices,” the agency wrote. If adversaries know how the United States spies on them, in other words, they can do a better job of covering their tracks. That is a legitimate concern. But good journalism sometimes exposes deception by the U.S. government itself—not only in tradecraft but in matters of basic policy and principle.
One whole folder in the Snowden archive was devoted not to foreign spies but to journalists and the people who gave us information. The memos and slide decks laid out the grave dangers posed by news reporting. They also sketched the beginnings of a plan to do something about it: Every file in the folder mentioned a cryptonym that seemed to be the cover name for an effort to track and trace journalistic leaks.
Then came the day I found my name in the Snowden archive. Sixteen documents, including the one that talked about me, named firstfruits as a counterintelligence database that tracked unauthorized disclosures in the news media. According to top-secret briefing materials prepared by Joseph J. Brand, a senior NSA official who was also among the leading advocates of a crackdown on leaks, firstfruits got its name from the phrase the fruits of our labor. “Adversaries know more about SIGINT sources & methods today than ever before,” Brand wrote. Some damaging disclosures came from the U.S. government’s own official communications, he noted; other secrets were acquired by foreign spies. But “most often,” Brand wrote, “these disclosures occur through the media.” He listed four “flagrant media leakers”: the Post, The New York Times, The New Yorker, and The Washington Times. The firstfruits project aimed to “drastically reduce significant losses of collection capability” at journalists’ hands.
By far the most frequent accusation invoked in debates about whether journalists cause “impairment” to the U.S. government is that it was journalists’ fault that the U.S. lost access to Osama bin Laden’s satellite-phone communications in the late 1990s. It is hard to overstate the centrality of this episode to the intelligence community’s lore about the news media. The accusation, as best as I can ascertain, was first made publicly in 2002 by then–White House Press Secretary Ari Fleischer. After a newspaper reported that the NSA could listen to Osama bin Laden on his satellite phone, as Fleischer put it, the al‑Qaeda leader abandoned the device. President Bush and a long line of other officials reprised this assertion in the years to come.
But the tale of the busted satellite-phone surveillance is almost certainly untrue. The story in question said nothing about U.S. eavesdropping. And one day before it was published, the United States launched barrages of cruise missiles against al‑Qaeda training camps in Afghanistan and a factory in Sudan, including a facility that bin Laden had recently visited. After this, bin Laden went deep underground, forswearing electronic communications that might give his location away. Blaming a news story for this development, rather than a close miss on bin Laden’s life, strained all logic. Yet somehow it became an article of faith in the intelligence community.
The firstfruits project produced 49 “crime reports to DOJ,” three of them involving me. The FBI, in turn, was left with a conundrum. What crime, exactly, was it being asked to investigate? Congress has never passed a law that squarely addresses unauthorized disclosures to reporters by public officials. The United States has no counterpart to the United Kingdom’s Official Secrets Act. Government employees sign a pledge to protect classified information; if they break that pledge, they can lose their security clearance or their job. Those are civil penalties. When it comes to criminal law, they may be subject to charges of theft or unlawful possession of government property. The nearest analogy in the law, however, and the charge most commonly prosecuted in such cases, is espionage.
Some people will see a kind of sense in that. A secret has been spilled, and damage potentially done. From the NSA’s point of view, a loss is a loss, regardless of whether a foreign adversary learns the secret from a spy or a published news report. Before the disclosure, the NSA had a valuable source or method. Afterward, it does not.
Yes, news sources have on occasion been tried and convicted of espionage—but in general forcing a whistleblower into the mold of a spy is disfiguring. If news is espionage, then George Ellard is right to call me an “agent” of the adversary, and James Clapper is right to call me an “accomplice.” From that basis, deploying the government’s most intrusive counterintelligence powers against a journalist is but a short step.
I’ve thought a lot over the years about what the public’s “right to know” is in the context of national security. Clearly there are circumstances in which the careful journalistic disclosure of certain classified facts is the right thing to do.
What if the U.S. government deliberately exposed American troops to nuclear radiation in order to learn more about the medical effects? That really happened after World War II, and the public didn’t learn about it until 1994. If reporters had known the truth in the ’40s and ’50s, should they have suppressed it?
What if a classified military investigation found “numerous incidents of sadistic, blatant, and wanton criminal abuses” against foreign detainees, in violation of the Geneva Conventions and the Uniform Code of Military Justice? That happened at the Abu Ghraib prison in 2003. Much the same sequence of events, with classification stamps employed to conceal information that public officials could not or did not wish to justify, took place after the government tortured al‑Qaeda suspects in secret prisons, authorized warrantless surveillance of U.S. citizens, and lied about intelligence on weapons of mass destruction in Iraq. These were history-making events, full of political and legal repercussions, but they were hidden from public scrutiny until news stories broke through barriers of classification.
At heart, national-security secrecy presents a conflict of core values: self-government and self-defense. If we do not know what our government is doing, we cannot hold it accountable. If we do know, our enemies know too. That can be dangerous. This is our predicament. Wartime heightens the case for secrecy because the value of security is at its peak. But secrecy is never more damaging to self-government than in wartime, because making war is the very paradigm of a political choice.
I learned something else by way of FOIA. It turned out, according to internal government correspondence I received in the course of my lawsuit, that government spokesmen were forwarding my emails to the FBI. The NSA public-affairs shop subsumed its work entirely to law enforcement. The spokesmen did not even have to be asked. They volunteered. “Below please find correspondence between reporter Bart Gellman and NSA & ODNI public affairs,” a senior intelligence official, whose name is redacted in the FOIA release, wrote on December 21, 2013, to a manager in the Office of the National Counterintelligence Executive, or NCIX. “In the email, Gellman references conversations he has with Edward Snowden … Are these emails useful for NCIX?”
According to an affidavit from David M. Hardy, the section chief in the FBI’s Information Management Division, my name appears in files relating to “investigations of alleged federal criminal violations and counterterrorism, counterintelligence investigations of third party subjects.” Not only the Snowden case, that is—investigations and third-party subjects, plural. Some of those files, Hardy said, may appear in an electronic-surveillance database that includes “all persons whose voices have been monitored.” Turns out I wasn’t being paranoid.
Equally unsettling were the redactions themselves and the reasons given for them. Even the names of the FBI files, Hardy told the court, would give too much away. The file names specify “non-public investigative techniques” and “non-public details about techniques and procedures that are otherwise known to the public.” The FBI is especially concerned about protecting one unspecified intelligence-gathering method. “Its use in the specific context of this investigative case is not a publically known fact,” Hardy wrote. The bureau wants to protect “the nature of the information gleaned by its use.”
Those are not comforting words.
This article was adapted from Barton Gellman’s book Dark Mirror: Edward Snowden and the American Surveillance State (Penguin Press). It appears in the June 2020 print edition with the headline “Operation FIRSTFRUITS.”
Barton Gellman is a staff writer at The Atlantic and author of Dark Mirror: Edward Snowden and the American Surveillance State and Angler: The Cheney Vice Presidency.
Tags: Big Brother, Communication, Edward Snowden, NSA, Privacy, Social media, Spying, Surveillance, Whistleblowing
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
WHISTLEBLOWING - SURVEILLANCE: