{"id":20989,"date":"2014-05-13T10:45:45","date_gmt":"2014-05-13T14:45:45","guid":{"rendered":"http:\/\/www.opensource.im\/?p=20989"},"modified":"2014-05-13T10:45:45","modified_gmt":"2014-05-13T14:45:45","slug":"glenn-greenwalds-pulse-pounding-tale-of-breaking-the-snowden-leaks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/glenn-greenwalds-pulse-pounding-tale-of-breaking-the-snowden-leaks.php","title":{"rendered":"Glenn Greenwald\u2019s Pulse-Pounding Tale of Breaking the Snowden Leaks"},"content":{"rendered":"<p><p>      Edward Snowden photographed in      Moscow, Russia December, 2013. Photo: Barton      Gellman\/Getty Images    <\/p>\n<p>    In June 2013, Edward Snowden was    sitting in his room at the Mira hotel in Hong Kong, watching    the world react to the first of his explosive leaks about the    NSAs out-of-control surveillance, when he was tipped off that    the NSA might be closing in on him.  <\/p>\n<p>    Snowdens identity as the source    of the documents was still unknown to the public. But through a    net-connected device he installed at his now-abandoned home    in Hawaii to watch out for the watchers  presumably an IP    surveillance camera with microphone  he knew when two people    from the NSA     showed up at the house looking for him, an NSA police    officer and someone from human resources.  <\/p>\n<p>    This is one of the new details    revealed in No Place to Hide, the much-anticipated    book by journalist Glenn Greenwald, who worked with Snowden and    documentary filmmaker Laura Poitras to publish a number of    blockbuster stories about the NSA.  <\/p>\n<p>    Snowden had known it would only be    a matter of time before the NSA was on his trail  he had    intentionally left electronic footprints behind that would help    the agency identify him as the leaker.  <\/p>\n<p>    Though he could have covered his    tracks  the NSAs internal security was so poor the agency    failed to catch him downloading thousands of documents over    many weeks  he hadnt wanted his colleagues to be subjected to    needless suspicion or false accusations during the inevitable    investigation that would follow the leaks. Snowden in fact    intended to reveal his identity with the first story that was    published, but Greenwald convinced him to wait so that the    publics initial reactions would be focused on the NSA leaks    and not the leaker.  <\/p>\n<p>    The book, which is being released    today, provides an extensive look at Greenwalds earliest    encounters  online and in person  with the mysterious    whistleblower who for months would only identify himself as    Cincinnatus. It also expands on existing reporting about the    agencys spy operations through the publication of more than 50    previously unpublished documents.  <\/p>\n<p>    Although there may be little in    the documents thats startling to anyone who has carefully    followed the leak revelations over the last year, the book does    a good job of providing an overview of what the documents and    stories have revealed until now, while adding fresh detail.    [One complaint with the book, however, is the lack of an index.    Greenwald has said he plans to publish it online today, but    this won't likely satisfy readers with print copies who don't    want to jump on their computer or phone each time they want to    find something in the book.]  <\/p>\n<p>    Among the fresh details he reports     the NSA routinely intercepts networking devices such as    routers, servers, and switches as theyre in transit from U.S.    sellers to international customers and plants digital bugging    devices in them, before repackaging them with a factory seal    and sending them on their way. Although its     been previously reported that the NSA, CIA and FBI    intercept laptops to install spyware, the tampering with    network hardware would potentially affect more users and    data.  <\/p>\n<p>    He also reports that U.S. telecoms    partnering with foreign telecoms to upgrade their networks help    subvert foreign networks for the spy agency.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661467\/s\/3a5c1a18\/sc\/21\/l\/0L0Swired0N0C20A140C0A50Cgreenwald0Eno0Eplace0Eto0Ehide0C\/story01.htm\/RK=0\/RS=y3tZaUa0cS_R9BybqacBwvx3Hi8-\" title=\"Glenn Greenwald\u2019s Pulse-Pounding Tale of Breaking the Snowden Leaks\">Glenn Greenwald\u2019s Pulse-Pounding Tale of Breaking the Snowden Leaks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Edward Snowden photographed in Moscow, Russia December, 2013. Photo: Barton Gellman\/Getty Images In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSAs out-of-control surveillance, when he was tipped off that the NSA might be closing in on him. Snowdens identity as the source of the documents was still unknown to the public. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-20989","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/20989"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=20989"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/20989\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=20989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=20989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=20989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}