{"id":79859,"date":"2016-09-19T12:00:49","date_gmt":"2016-09-19T11:00:49","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=79859"},"modified":"2016-09-17T18:30:04","modified_gmt":"2016-09-17T17:30:04","slug":"new-film-tells-the-story-of-edward-snowden-here-are-the-surveillance-programs-he-helped-expose","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/09\/new-film-tells-the-story-of-edward-snowden-here-are-the-surveillance-programs-he-helped-expose\/","title":{"rendered":"New Film Tells the Story of Edward Snowden; Here Are the Surveillance Programs He Helped Expose"},"content":{"rendered":"<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-79860\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1-1024x512.jpg\" alt=\"snowden-sh-fin1\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1-1024x512.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1-300x150.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1-768x384.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/Snowden-SH-FIN1.jpg 1363w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><em>16 Sep 2016 &#8211; <\/em>Oliver Stone\u2019s latest film, \u201cSnowden,\u201d bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.<\/p>\n<p>Stone\u2019s rendering of Snowden\u2019s life combines facts with Hollywood invention, covering Snowden being discharged from the military after an\u00a0injury in basic training, meeting his girlfriend, and training in the CIA with fictitious mentors (including Nicolas Cage\u2019s character, most likely a composite of whistleblowers like Thomas Drake and Bill Binney). Snowden then goes undercover, only to see an op turn ugly; becomes a contractor for the CIA and NSA; and finally chooses to leave the intelligence community and disclose its vast surveillance apparatus, some of which he helped develop.<\/p>\n<p>The movie hits key points in Snowden\u2019s story, including his growing interest in constitutional law and the Foreign Intelligence Surveillance Court, some of the U.S. surveillance programs he eventually unmasked, and parts of his furtive meetings in Hong Kong with Glenn Greenwald and Laura Poitras (co-founders of The Intercept), as well as\u00a0The Guardian\u2019s Ewen MacAskill.<\/p>\n<p>There are doses of artistic license \u2014 for example, a Rubik\u2019s Cube hiding the drive where he stored the documents, and Snowden\u2019s CIA mentor spying on his girlfriend through her webcam. In hazier focus are the global questions his revelations raised, including the legal and moral implications of the U.S. government collecting data on foreigners and Americans with relative impunity, and the very real stories born of Snowden\u2019s massive disclosures.<\/p>\n<p>So here\u2019s a retrospective of sorts for moviegoers and others interested in the journalism Edward Snowden made possible through his decision to become a whistleblower: In all, over 150 articles from 23 news organizations worldwide have incorporated documents provided by Snowden, and The Intercept and other outlets continue to mine the archive for stories of social and political significance.<\/p>\n<p>In the hope that Stone\u2019s movie will spark more widespread interest in the NSA programs Snowden helped bring to light, The Intercept has compiled its stories based on the archive of documents, which can be explored through the chart below.<\/p>\n<table>\n<tbody>\n<tr>\n<td>Published<\/td>\n<td>Article<\/td>\n<td>Code Names<\/td>\n<\/tr>\n<tr>\n<td>2\/14\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/02\/10\/the-nsas-secret-role\/\" >The NSA\u2019s Secret Role in the U.S. Assassination Program<\/a><\/td>\n<td>GILGAMESH, SHENANIGANS, VICTORYDANCE<\/td>\n<\/tr>\n<tr>\n<td>2\/18\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/02\/18\/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters\/\" >Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters<\/a><\/td>\n<td>ANTICRISIS GIRL, TEMPORA, XKEYSCORE<\/td>\n<\/tr>\n<tr>\n<td>2\/24\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/02\/24\/jtrig-manipulation\/\" >How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>3\/7\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/03\/07\/nsa-advice-columnist-seriously\/\" >The NSA Has an Advice Columnist. Seriously.<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>3\/12\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >How the NSA Plans to Infect \u201cMillions\u201d of Computers With Malware<\/a><\/td>\n<td>CAPTIVATEDAUDIENCE, FOGGYBOTTOM, FOXACID, GROK, GUMFISH, HAMMERCHANT, HAMMERSTEIN, QUANTUM, QUANTUMCOPPER, QUANTUMHAND, QUANTUMSKY, SADDLEBACK, SECONDDATE, SOCIALIST, STELLARWIND, TURBINE, TURMOIL, UNITEDRAKE, VALIDATOR, WILLOWVIXEN<\/td>\n<\/tr>\n<tr>\n<td>3\/13\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/03\/13\/nsa-elected-officials-foreign-countries-unaware-countries-cooperation-us\/\" >Foreign Officials in the Dark About Their Own Spy Agencies\u2019 Cooperation With NSA<\/a><\/td>\n<td>PRISM, TEMPORA<\/td>\n<\/tr>\n<tr>\n<td>3\/15\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/03\/15\/nsa-facebook-malware-turbine-non-denial-denial\/\" >Compare the NSA\u2019s Facebook Malware Denial to Its Own Secret Documents<\/a><\/td>\n<td>QUANTUMHAND, QUANTUMTHEORY, TURBINE<\/td>\n<\/tr>\n<tr>\n<td>3\/20\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/03\/20\/inside-nsa-secret-efforts-hunt-hack-system-administrators\/\" >Inside the NSA\u2019s Secret Efforts to Hunt and Hack System Administrators<\/a><\/td>\n<td>QUANTUM<\/td>\n<\/tr>\n<tr>\n<td>4\/4\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/04\/04\/cuban-twitter-scam-social-media-tool-disseminating-government-propaganda\/\" >The \u201cCuban Twitter\u201d Scam Is a Drop in the Internet Propaganda Bucket<\/a><\/td>\n<td>ROYAL CONCIERGE, SALAMANCA<\/td>\n<\/tr>\n<tr>\n<td>4\/30\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/04\/30\/gchq-prism-nsa-fisa-unsupervised-access-snowden\/\" >British Spy Chiefs Secretly Begged to Play in NSA\u2019s Data Pools<\/a><\/td>\n<td>BLARNEY, GHOSTMACHINE, PRISM, STORMBREW,<\/td>\n<\/tr>\n<tr>\n<td>5\/19\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/05\/19\/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas\/\" >Data Pirates of the Caribbean: The NSA Is Recording Every Cellphone Call in the Bahamas<\/a><\/td>\n<td>MYSTIC, SOMALGET<\/td>\n<\/tr>\n<tr>\n<td>7\/9\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/07\/09\/under-surveillance\/\" >Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>7\/14\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/07\/14\/manipulating-online-polls-ways-british-spies-seek-control-internet\/\" >Hacking Online Polls and Other Ways British Spies Seek to Control the Internet<\/a><\/td>\n<td>ANGRY PIRATE, CHANGELING, ELATE, GATEWAY, GESTATOR, IMPERIAL BARGE, PREDATORS FACE, ROLLING THUNDER, SLIPSTREAM, SPRING BISHOP, UNDERPASS<\/td>\n<\/tr>\n<tr>\n<td>7\/23\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/07\/25\/nsas-new-partner-spying-saudi-arabias-brutal-state-police\/\" >The NSA\u2019s New Partner in Spying: Saudi Arabia\u2019s Brutal State Police<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>8\/3\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/08\/04\/cash-weapons-surveillance\/\" >Cash, Weapons, and Surveillance: The U.S. Is a Key Party to Every Israeli Attack<\/a><\/td>\n<td>YESTERNIGHT<\/td>\n<\/tr>\n<tr>\n<td>8\/5\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/08\/12\/nprs-dina-temple-raston-passed-cia-funded-nsa-contractor-independent-fear-monger-snowden-reporting\/\" >NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>8\/25\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/article\/2014\/08\/25\/icreach-nsa-cia-secret-google-crisscross-proton\" >ICREACH: How the NSA Built Its Own Secret Google<\/a><\/td>\n<td>CRISSCROSS, GLOBALREACH, ICREACH, PROTON,<\/td>\n<\/tr>\n<tr>\n<td>9\/14\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/09\/14\/nsa-stellar\/\" >The NSA and GCHQ Campaign Against German Satellite Companies<\/a><\/td>\n<td>TREASURE MAP<\/td>\n<\/tr>\n<tr>\n<td>9\/15\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/09\/15\/new-zealand-gcsb-speargun-mass-surveillance\/\" >New Zealand Launched Mass Surveillance Project While Publicly Denying It<\/a><\/td>\n<td>SPEARGUN, XKEYSCORE<\/td>\n<\/tr>\n<tr>\n<td>10\/10\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/10\/10\/core-secrets\/\" >Core Secrets: NSA Saboteurs in China and Germany<\/a><\/td>\n<td>SENTRYCONDOR, SENTRYEAGLE, SENTRYHAWK, SENTRYOSPREY, SENTRYRAVEN<\/td>\n<\/tr>\n<tr>\n<td>12\/4\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/12\/04\/nsa-auroragold-hack-cellphones\/\" >Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide<\/a><\/td>\n<td>AURORAGOLD, OPULANT PUP, WOLFRAMITE<\/td>\n<\/tr>\n<tr>\n<td>12\/13\/14<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/12\/13\/belgacom-hack-gchq-inside-story\/\" >Operation Socialist: How GCHQ Spies Hacked Belgium\u2019s Largest Telco<\/a><\/td>\n<td>HACIENDA, HOPSCOTCH, LEGSPIN, NOCTURNAL SURGE, STELLARWIND, SOCIALIST<\/td>\n<\/tr>\n<tr>\n<td>2\/4\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/02\/04\/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise\/\" >Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise<\/a><\/td>\n<td>INTOLERANT, LOVELY HORSE<\/td>\n<\/tr>\n<tr>\n<td>2\/10\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/02\/10\/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks\/\" >NSA Claims Iran Learned From Western Cyberattacks<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>2\/19\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/02\/19\/great-sim-heist\/\" >The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle<\/a><\/td>\n<td>DAPINO GAMMA, HIGHLAND FLING, XKEYSCORE<\/td>\n<\/tr>\n<tr>\n<td>3\/10\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\" >iSpy: The CIA Campaign to Steal Apple\u2019s Secrets<\/a><\/td>\n<td>DREAMY SMURF, NOSEY SMURF, PARANOID SMURF, TRACKER SMURF, WARRIORPRIDE<\/td>\n<\/tr>\n<tr>\n<td>4\/2\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/04\/02\/gchq-argentina-falklands\/\" >Britain Used Spy Team to Shape Latin American Public Opinion on Falklands<\/a><\/td>\n<td>QUITO<\/td>\n<\/tr>\n<tr>\n<td>5\/5\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/05\/nsa-speech-recognition-snowden-searchable-text\/\" >The Computers Are Listening: How the NSA Converts Spoken Words Into Searchable Text<\/a><\/td>\n<td>RHINEHART<\/td>\n<\/tr>\n<tr>\n<td>5\/11\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/11\/speech-recognition-nsa-best-kept-secret\/\" >The Computers Are Listening: Speech Recognition Is NSA\u2019s Best-Kept Open Secret<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>6\/8\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/08\/nsa-transcription-american-phone-calls\/\" >The Computers Are Listening: NSA Won\u2019t Say If It Automatically Transcribes American Phone Calls In Bulk<\/a><\/td>\n<td>PRISM, UPSTREAM<\/td>\n<\/tr>\n<tr>\n<td>5\/8\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/08\/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list\/\" >U.S. Government Labeled Al Jazeera Journalist as Al Qaeda<\/a><\/td>\n<td>SKYNET<\/td>\n<\/tr>\n<tr>\n<td>5\/18\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/18\/snowden-osama-bin-laden-raid\/\" >Snowden Files Give New Details on Osama Bin Laden Raid<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>5\/21\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/21\/nsa-plan-find-osama-bin-laden-infiltrating-medical-supply-chain\/\" >The NSA Plan to Find Bin Laden by Hiding Tracking Devices in Medical Supplies<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>5\/28\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/05\/28\/nsa-officials-privately-criticize-collect-it-all-surveillance\/\" >Inside NSA, Officials Privately Criticize \u201cCollect It All\u201d Surveillance<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>6\/22\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/22\/controversial-gchq-unit-domestic-law-enforcement-propaganda\/\" >Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>6\/22\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/22\/nsa-gchq-targeted-kaspersky\/\" >Popular Security Software Came Under Relentless NSA and GCHQ Attacks<\/a><\/td>\n<td>CAMBERDADA, PRISM<\/td>\n<\/tr>\n<tr>\n<td>6\/22\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/22\/gchq-reverse-engineering-warrants\/\" >Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>6\/26\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/26\/nsa-started-investigating-new-york-times-original-warrantless-wiretapping-story\/\" >How the NSA Started Investigating the New York Times\u2019s Warrantless Wiretapping Story<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>7\/1\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/07\/01\/nsas-google-worlds-private-communications\/\" >XKEYSCORE: NSA\u2019s Google for the World\u2019s Private Communications<\/a><\/td>\n<td>BADASS, NUCLEON, XKEYSCORE<\/td>\n<\/tr>\n<tr>\n<td>7\/15\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/07\/15\/israeli-special-forces-assassinated-senior-syrian-official\/\" >Israeli Special Forces Assassinated Senior Syrian Official<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>8\/3\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/08\/03\/life-unmasking-british-eavesdroppers\/\" >GCHQ and Me: My Life Unmasking British Eavesdroppers<\/a><\/td>\n<td>CARBOY, FROSTING, ECHELON, SHAMROCK, SOUNDER, TRANSIENT<\/td>\n<\/tr>\n<tr>\n<td>8\/11\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/08\/11\/surveillance-philosopher-nsa\/\" >The Philosopher of Surveillance: What Happens When a Failed Writer Becomes a Loyal Spy?<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>9\/25\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/09\/25\/gchq-radio-porn-spies-track-web-users-online-identities\/\" >From Radio to Porn, British Spies Track Web Users\u2019 Online Identities<\/a><\/td>\n<td>BLACKHOLE, INFINITE MONKEYS, KARMA POLICE, MARBLED GECKO, MEMORY HOLE, MUTANT BROTH, SAMUEL PEPYS, SOCIAL ANTHROPOID, TEMPORA, XKEYSCORE<\/td>\n<\/tr>\n<tr>\n<td>9\/28\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/09\/28\/death-athens-rogue-nsa-operation\/\" >Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?<\/a><\/td>\n<td>SENTRYOWL<\/td>\n<\/tr>\n<tr>\n<td>11\/18\/15<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/11\/18\/overwhelmed-nsa-surprised-to-discover-its-own-surveillance-goldmine-on-venezuelas-oil-executives\/\" >Overwhelmed NSA Surprised to Discover Its Own Surveillance \u201cGoldmine\u201d on Venezuela\u2019s Oil Executives<\/a><\/td>\n<td>CADENCE, PINWALE<\/td>\n<\/tr>\n<tr>\n<td>1\/28\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/01\/28\/israeli-drone-feeds-hacked-by-british-and-american-intelligence\/\" >Israeli Drone Feeds Hacked by British and American Intelligence<\/a><\/td>\n<td>ANARCHIST<\/td>\n<\/tr>\n<tr>\n<td>5\/16\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/05\/16\/nsa-closely-involved-in-guantanamo-interrogations-documents-show\/\" >NSA Closely Involved in Guant\u00e1namo Interrogations, Documents Show<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>6\/7\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/06\/07\/mi5-gchq-digint-surveillance-data-deluge\/\" >Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure<\/a><\/td>\n<td>MILKWHITE, PRESTON<\/td>\n<\/tr>\n<tr>\n<td>6\/28\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/06\/28\/he-was-a-hacker-for-the-nsa-and-he-was-willing-to-talk-i-was-willing-to-listen\/\" >The Hunter: He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>8\/15\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/08\/14\/nsa-gcsb-prism-surveillance-fullman-fiji\/\" >In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner<\/a><\/td>\n<td>PRISM<\/td>\n<\/tr>\n<tr>\n<td>8\/19\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/08\/19\/the-nsa-was-hacked-snowden-documents-confirm\/\" >The NSA Leak Is Real, Snowden Documents Confirm<\/a><\/td>\n<td>BADDECISION, BLINDDATE, ELIGIBLE BOMBSHELL, FOXACID, MAGICBEAN, MAGIC SQUIRREL, NIGHTSTAND, POLARSNEEZE, SECONDDATE, TURBINE<\/td>\n<\/tr>\n<tr>\n<td>9\/6\/16<\/td>\n<td><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/09\/06\/nsa-menwith-hill-targeted-killing-surveillance\/\" >Inside Menwith Hill: The NSA\u2019s British Base at the Heart of U.S. Targeted Killing<\/a><\/td>\n<td>GHOSTHUNTER, GHOSTWOLF<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Since the first revelations from Snowden were published in Glenn Greenwald\u2019s June 6, 2013, Guardian article, \u201cNSA Collecting Phone Records of Millions of Verizon Customers Daily,\u201d nearly 1,200 documents from Snowden\u2019s disclosures have been released to the public. These include fragments of the \u201cblack budget,\u201d a secret document presented to Congress by intelligence agencies, images hacked from drone feeds, and PowerPoint presentations that painstakingly detail the technology behind the NSA\u2019s surveillance efforts.<\/p>\n<p>The Intercept and other outlets have <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/06\/08\/nsa-transcription-american-phone-calls\/\" >reported<\/a> extensively on some of the major technical programs mentioned during the film \u2014 PRISM and Upstream, both authorized under Section 702 of the Foreign Intelligence Surveillance Act. PRISM vacuums up hundreds of millions of internet communications every day from the people it \u201ctargets,\u201d and those they communicate with \u2014 as well as some irrelevant communications it picks up \u201cincidentally\u201d because of the way the technology works. It\u2019s unclear how many of those communications belong to Americans. Upstream gathers communications while they\u2019re traveling through the cables of the internet \u2014 voice, text, and more. In the movie, Snowden gets a glimpse at\u00a0these programs while going undercover for the CIA.<\/p>\n<p>When Snowden shares a map with a few of his colleagues displaying data on surveillance conducted within different countries, the film is likely nodding toward a program called Boundless Informant \u2014 another one of the first Snowden <a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/08\/nsa-boundless-informant-global-datamining\" >stories<\/a>\u00a0reported by Greenwald and MacAskill. The NSA denied at the time that it could determine with absolute certainty \u201cthe identity or location\u201d of all the communications it collected \u2014 but the program gave\u00a0it a general sense of the volume of information it got\u00a0from each country, appearing like a sort of heat map. The U.S. was not, like the movie suggests, the country where the NSA collected the most information; there were many more intercepts from Iran, at least during the time period reported on by The Guardian.<\/p>\n<p>The Intercept debuted its Snowden coverage with a February 10, 2014, article by Jeremy Scahill and Glenn Greenwald titled \u201cThe NSA\u2019s Secret Role in the U.S. Assassination Program.\u201d Since then, we have published at least 50 other pieces based on documents from the Snowden archive.<\/p>\n<p>In July 2015, The Intercept <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/07\/02\/look-under-hood-xkeyscore\/\" >delved into<\/a> one of the NSA\u2019s central programs, also mentioned in the film, called XKeyscore. The program runs like a search engine that helps NSA detect, analyze, and extract information from the massive amounts of communications and online information it collects every day through various filters. Otherwise, the sheer volume of information would be overwhelming.<\/p>\n<p>The agency\u2019s use of cellphone and computer hacking for surveillance has been a recurring theme in The Intercept\u2019s reporting on the Snowden documents. In May 2015, Jeremy Scahill and Josh Begley uncovered the CIA and NSA\u2019s joint mission to crack the security of popular consumer products, including Apple\u2019s notoriously secure iPhone. In the movie, Snowden covers his laptop\u2019s webcam, which he knows the NSA is capable of <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >exploiting<\/a> through a program called QUANTUM. In reality, the NSA has developed malware implants potentially capable of infecting millions of targeted computers covertly, and automated some of the processes involved in the attacks, as Ryan Gallagher and Glenn Greenwald <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >reported<\/a>\u00a0in March 2014.<\/p>\n<p>Many news stories from the Snowden archive involve foreign surveillance and the NSA\u2019s partnerships with intelligence agencies from other countries, a subject the Snowden film barely touches\u00a0\u2014 for example, never mentioning\u00a0the NSA\u2019s close relationship to the British spy agency Government Communications Headquarters (GCHQ); its partnership with countries like Saudi Arabia; or foreign officials\u2019\u00a0lack of understanding about their own spies\u2019 connections to the NSA. The film\u2019s only nod to foreign intelligence occurs when Snowden passes off a special microchip to MacAskill, suggesting it might help him learn more about British spying.<\/p>\n<p>The NSA is obviously more than its technical programs and tools. Stone conjures up Snowden\u2019s friends and colleagues at the spy agencies, including T-shirt-wearing hackers, super genius engineers, and domineering bosses. The Intercept\u2019s Peter Maass has written about the human side of the agency, including its resident advice columnist, who <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/03\/07\/nsa-advice-columnist-seriously\/\" >went by<\/a> \u201cZelda\u201d and answered questions about things like kitchen etiquette and gossip, as well as a <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/08\/11\/surveillance-philosopher-nsa\/\" >columnist<\/a> with literary ambitions who called himself \u201cthe SIGINT Philosopher.\u201d<\/p>\n<p>Ultimately, the movie reflects Stone\u2019s image\u00a0of the life of an NSA contract employee. For a real window into the agency, there may be no better resource than the NSA\u2019s own documents. In May 2016, The Intercept began the first concerted effort to make large portions of the Snowden archive available to the public with the <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/05\/16\/what-its-like-to-read-the-nsas-newspaper-for-spies\/\" >release of<\/a> a set of SIDtoday newsletters, the internal news organ of the Signals Intelligence Directorate at the NSA. The batch releases are ongoing\u00a0and will likely constitute one of the largest single collections of NSA files.<\/p>\n<p>________________________________<\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/jennamclaughlin\/\" >Jenna McLaughlin<\/a> &#8211; <a href=\"mailto:jenna.mclaughlin@theintercept.com\">\u2709jenna.mclaughlin@theintercept.com<\/a><\/em><\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/talyacooper\/\" >Talya Cooper<\/a> &#8211; <a href=\"mailto:talya.cooper@firstlook.org\">\u2709talya.cooper@firstlook.org<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/09\/16\/new-film-tells-the-story-of-edward-snowden-here-are-the-surveillance-programs-he-helped-expose\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the hope that Oliver Stone\u2019s movie will spark more widespread interest in the NSA programs Snowden helped bring to light, The Intercept has compiled its stories based on the archive of documents, which can be explored through the chart below.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-79859","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/79859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=79859"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/79859\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=79859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=79859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=79859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}