{"id":41387,"date":"2014-03-24T12:00:34","date_gmt":"2014-03-24T12:00:34","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=41387"},"modified":"2015-05-05T21:35:10","modified_gmt":"2015-05-05T20:35:10","slug":"snowdens-leaked-nsa-trove-yields-its-secrets-only-slowly","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/03\/snowdens-leaked-nsa-trove-yields-its-secrets-only-slowly\/","title":{"rendered":"Snowden\u2019s Leaked NSA Trove Yields Its Secrets Only Slowly"},"content":{"rendered":"<p>Another day, another news flash about the National Security Agency\u2019s global surveillance program.<\/p>\n<p>Over the past 10 days, the Intercept has published reports on the NSA\u2019s ability to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >infect computers with malware<\/a> and to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/03\/20\/inside-nsa-secret-efforts-hunt-hack-system-administrators\/\" >hack into computers of system administrators <\/a>to gain access to their networks. On Tuesday, it was <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls\/2014\/03\/18\/226d2646-ade9-11e3-a49e-76adc9210f19_story.html\" >a Washington Post article <\/a>about an NSA program known as MYSTIC that can collect and record every phone call in an unidentified country for up to 30 days.<\/p>\n<p>The articles are just the most recent in the long drip of NSA revelations. The string dates back to early June, when Britain\u2019s Guardian newspaper and The Post began breaking story after story based on documents leaked weeks earlier by Edward Snowden, the fugitive former government contractor.<\/p>\n<p>Why, given that Snowden\u2019s leak occurred about 10 months ago, are revelations still emerging?<\/p>\n<p>The short answer, according to the journalists behind the articles, is that the documents don\u2019t give up the NSA\u2019s secrets clearly or cleanly. Their technical, and often cryptic, references to NSA programs require painstaking reporting and consultations with national-security and technical experts to unravel.<\/p>\n<p>\u201cIt takes a long time to go through tens of thousands of complex surveillance documents,\u201d said Glenn Greenwald, who has written dozens of stories about the NSA since last year, mostly for <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\" >the Guardian <\/a>and lately for <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/\" >the Intercept, a start-up backed by First Look Media. <\/a>\u201cIt takes an even longer time to process and understand them sufficiently to report them accurately and to make informed decisions about what should be disclosed in accordance with our agreement with our source,\u201d who is Snowden.<\/p>\n<p>Martin Baron, The Post\u2019s executive editor, said the Snowden documents are filled with \u201chints and clues and fragments. These are pieces of a puzzle that you have to put together,\u201d a time-consuming process.<\/p>\n<p>The documents, for example, use cover names, abbreviations and operational concepts familiar to government security officials \u2014 their intended readers \u2014 but not to the average reader or journalist, said Barton Gellman, The Post\u2019s principal reporter on the story.<\/p>\n<p>\u201cA bunch of them require a foundation in computer science or network technologies,\u201d Gellman said. \u201cThe documents we\u2019ve published required a lot of annotation for general readers, and we chose them because they were among the clearest.\u201d<\/p>\n<p>Greenwald and Gellman declined to reveal many details about their reporting methods. Neither would disclose how many pages of documents Snowden turned over to them and documentary filmmaker Laura Poitras last year before fleeing the United States. Snowden now resides in Moscow under temporary asylum from the Russian government.<\/p>\n<p>Gellman said the reporting has been complicated by gaps in the Snowden trove. Also, he said, its archive is not easily searchable.<\/p>\n<p>At one point last year, Gellman came across a hand-drawn smiley-face cartoon in one of the archive\u2019s PowerPoint slides. He figured the cartoon and slide referred to an NSA operation, but which one exactly? Working with <a target=\"_blank\" href=\"http:\/\/ashkansoltani.org\/about\/#bio\" >Ashkan Soltani,<\/a> an independent researcher and security expert who has co-written several of The Post\u2019s NSA articles, Gellman spent more than a month vetting theories about the meaning of the slide and icon. \u201cAll of them [were] wrong,\u201d Gellman said.<\/p>\n<p>Gellman and Soltani eventually were able to find people who helped them solve the mystery of the smiley-face slide. In crude form, it described how the NSA had broken into links that connect data centers operated by Google and Yahoo, enabling the agency to collect data from millions of user accounts stored in the \u201ccloud.\u201d<\/p>\n<p>As Gellman\u2019s and Soltani\u2019s story documented, an unidentified artist had added the smiley face to the <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\" >\u201cGoogle Cloud Exploitation\u201d<\/a> slide to emphasize how the agency had defeated Google\u2019s security measures.<\/p>\n<p>With the NSA articles, the reporting process doesn\u2019t just involve the usual steps of verifying the authenticity and accuracy of the information. The reporters also hold discussions with their publication\u2019s lawyers and consult government officials about security concerns. Gellman said the process is slowed further by internal security measures meant to protect documents from electronic theft and protect sources\u2019 anonymity.<\/p>\n<p>Greenwald and Gellman say there are more articles to come.<\/p>\n<p>\u201cI believe many of the most recent articles have been among the most important,\u201d said Greenwald, \u201cand I truly believe that the most significant stories are ones that we are still working on reporting.\u201d<\/p>\n<p><i>\u00a9 The Washington Post Company<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/lifestyle\/style\/snowdens-leaked-nsa-trove-yields-its-secrets-only-slowly\/2014\/03\/21\/8f800552-b07b-11e3-9627-c65021d6d572_story.html?tid=hpModule_d39b60e8-8691-11e2-9d71-f0feafdd1394&amp;hpid=z11\" >Go to Original \u2013 washingtonpost.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why, given that Snowden\u2019s leak occurred about 10 months ago, are revelations still emerging? The short answer, according to the journalists behind the articles, is that the documents don\u2019t give up the NSA\u2019s secrets clearly or cleanly.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-41387","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=41387"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41387\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=41387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=41387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=41387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}