'State of Surveillance' with Edward Snowden and Shane Smith (VICE on HBO: Season 4, Episode 13)

VICE
8 Jun 201626:56

Summary

TLDRThe video script from VICE explores the pervasive issue of surveillance, featuring an interview with Edward Snowden. It delves into the capabilities of government agencies like the NSA to hack and monitor personal devices, the use of IMSI catchers for metadata collection, and the implications of mass surveillance on privacy and civil liberties. Snowden warns of the potential for 'turnkey tyranny,' emphasizing the risks of unchecked surveillance powers in the hands of future administrations.

Takeaways

  • ๐Ÿ“ฑ The script discusses the capability of hackers and surveillance programs to remotely control and monitor devices like phones and laptops, raising privacy concerns.
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ It suggests that even if a person buys a device, if it's hacked, the hacker essentially becomes the owner, able to operate the device's features independently.
  • ๐Ÿ” The script highlights the difficulty in detecting if a phone has been hacked, emphasizing the invisible nature of modern surveillance.
  • ๐Ÿ—ฃ๏ธ The conversation between Edward and Shane explores the extent to which government agencies can spy on individuals, including accessing all personal information on a phone.
  • ๐ŸŒ The script mentions the use of technology like IMSI catchers that can intercept metadata without hacking the phone, indicating how easily surveillance can be conducted.
  • ๐Ÿ”‘ The script reveals the 'Shenanigans' program, showing how surveillance technology can be transferred from war zones to domestic use, raising questions about civil liberties.
  • ๐Ÿ›‘ It points out the ineffectiveness of mass surveillance in preventing terrorist attacks, referencing independent commissions that found no evidence of success in stopping attacks.
  • ๐Ÿ“‰ The script criticizes the lack of implementation of recommended reforms for surveillance programs, suggesting a resistance to change within the government.
  • ๐Ÿ”’ Edward Snowden's perspective is presented, warning about the potential for future abuse of surveillance systems, even if the current government is trusted.
  • ๐Ÿ‘ฎโ€โ™‚๏ธ The script touches on the use of surveillance technology by police forces worldwide, including its use in monitoring protesters and everyday citizens.
  • ๐Ÿ“ The final takeaway is about the importance of having a legal framework to protect privacy and the dangers of 'secret law' that operates without public knowledge or consent.

Q & A

  • What is the main concern expressed by Edward regarding the ownership of a phone after it has been hacked?

    -Edward's main concern is that once a phone is hacked, the person who hacked it effectively becomes the owner of the device, capable of operating it independently without the user's knowledge.

  • What capability does Shane suggest might be possible after hacking into a phone?

    -Shane suggests that after hacking into a phone, it might be possible to remotely turn on the phone's camera, indicating a breach of privacy.

  • Why does Edward say it's terrifying if your phone has been hacked?

    -Edward finds it terrifying because if your phone has been hacked, you would likely never know, leaving you unaware of the potential privacy invasions and surveillance.

  • What is the significance of the hotel Metropol in Moscow in the context of the script?

    -The hotel Metropol in Moscow is significant because it was historically the designated hotel for foreigners, rumored to have every room bugged, symbolizing the pervasive nature of surveillance.

  • What was the controversy that raged for three years regarding the US government's surveillance?

    -The controversy was about the US government's surveillance of its own people, which was brought to a tipping point after the terrorist attack in San Bernardino, CA, and the subsequent legal battle between Apple and the FBI over accessing a shooter's phone.

  • What was the outcome when the FBI attempted to force Apple to help break into a phone used by one of the San Bernardino shooters?

    -Apple refused to comply, stating that no court could order them to do so. However, it was later revealed that the FBI was able to crack the iPhone without Apple's help.

  • How does Edward Snowden's whistleblowing impact the perception of surveillance capabilities of the government?

    -Edward Snowden's whistleblowing proved that the government already had the capability to conduct mass surveillance, which polarized public opinion about him, with some considering him a hero and others a traitor.

  • What is an IMSI catcher, and how does it relate to the surveillance discussed in the script?

    -An IMSI catcher is a device that can intercept a phone's metadata remotely by masquerading as a legitimate cellphone tower. It is relevant to the surveillance discussed in the script as it exemplifies the technology that can be used to spy on individuals without their knowledge.

  • What is the 'Shenanigans' program, and how does it illustrate the shift from war front to home front surveillance?

    -The 'Shenanigans' program is a joint CIA/NSA initiative that involved mounting IMSI catchers on airplanes to monitor cities. It illustrates the shift from war front to home front surveillance as the same technology initially tested in Yemen for targeting terrorists was later used domestically within the United States.

  • What is the significance of the statement 'We already knew about these guys in the databases' in the context of mass surveillance?

    -This statement highlights the ineffectiveness of mass surveillance in preventing terrorist attacks. Despite having extensive surveillance, the individuals involved in terrorist activities were already known to the databases, suggesting that mass surveillance does not necessarily lead to effective prevention.

  • What is the term 'turnkey tyranny' as mentioned by Edward, and what does it imply about future governance?

    -The term 'turnkey tyranny' refers to a situation where the infrastructure for mass surveillance and control is already in place and can be activated by a government at any time. It implies a future where citizens could be vulnerable to unchecked surveillance and control by the state, regardless of who is in power.

  • What does Edward suggest about the potential misuse of recorded data in the future?

    -Edward suggests a dangerous future where recorded data could be misused against individuals. For example, if someone's unguarded statement is recorded and later used against them when political circumstances change, it could lead to severe consequences.

Outlines

00:00

๐Ÿ˜จ Privacy Invasion and Surveillance

The video script begins with a chilling discussion on the ease with which phones can be hacked and controlled remotely, with Edward explaining that once a device is compromised, the hacker essentially owns it. Shane is alarmed to learn that the phone's camera can be activated without the user's knowledge. Edward emphasizes that the signs of a hacked phone are nearly undetectable. The conversation shifts to the broader implications of surveillance, with references to America's surveillance programs and the potential for abuse of power, especially when trust in government changes over time. The setting moves to Moscow's storied hotel Metropol, known for its history of bugging rooms, highlighting the ubiquity of surveillance even in places meant for privacy.

05:01

๐Ÿ“ก The Reality of Mass Surveillance

The script delves into the transformation of surveillance practices within the NSA and other agencies, shifting from targeted to mass surveillance. Technology has enabled a passive form of constant observation through the devices we use daily. Metadata, while seemingly innocuous, provides a detailed trail of an individual's movements and activities. The ease of accessing this metadata through IMSI catchers is discussed, a technology that intercepts mobile data and is increasingly used by law enforcement. The conversation touches on the international use of such surveillance, including an incident in Norway where IMSI catchers were found near government facilities, and the CIA/NSA's 'Shenanigans' program, which uses planes to conduct surveillance without warrants.

10:04

๐Ÿ›ก๏ธ Hacking, Spyware, and Activism

Activist Ala'a Shehabi's experience with government surveillance is highlighted, revealing the use of spyware by oppressive regimes to maintain power. The spyware's capabilities are staggering, including activating microphones and cameras, logging keystrokes, and tracking locations. The script discusses the ease with which such software can be obtained and used, as demonstrated by a hacker who takes control of a reporter's phone to extract personal data, record calls, and track movements. The implications for journalism and source protection are dire, as the very tools that enable global communication also enable surveillance.

15:06

๐Ÿ” Uncovering Government Deception

The script uncovers the CIA's alleged hacking of Senate Intelligence Committee computers, an act that contradicts the CIA Director's public statements. The revelation comes from a FOIA request that inadvertently received an apology letter from John Brennan acknowledging the CIA's wrongdoing. Senator Ron Wyden discusses the challenges of overseeing an agency that conducts secret searches on its overseers, emphasizing the need for legal protections against such abuses of power.

20:08

๐Ÿšจ The Ineffectiveness of Mass Surveillance

The conversation shifts to the effectiveness of mass surveillance, with Edward Snowden arguing that it has not prevented terrorist attacks and has instead created a false sense of security. He cites two independent commissions that found the mass surveillance programs ineffective and in need of reform. The reluctance of politicians to reform these programs is attributed to the fear of being blamed for any future attacks if they were to curtail surveillance powers.

25:09

๐ŸŒ The Future of Privacy and Surveillance

In the final paragraph, the script contemplates the future of privacy, raising the question of whether society will continue down a path of constant surveillance or recognize the importance of personal space and the potential dangers of unchecked surveillance. Edward Snowden warns of the potential for 'turnkey tyranny,' where the systems of surveillance can be weaponized by any government official, regardless of the public's trust in the current administration. The script concludes with a call to consider the implications of a world where every action and word could be recorded and used against individuals.

Mindmap

Keywords

๐Ÿ’กSurveillance

Surveillance refers to the act of monitoring individuals or groups, often secretly, for the purpose of gathering information. In the context of the video, it is a central theme as it explores the extent to which technology enables widespread surveillance by government agencies and third parties. The script discusses how devices like phones and laptops can be hacked to turn on cameras and microphones without the user's knowledge, exemplifying the intrusive nature of modern surveillance.

๐Ÿ’กHacking

Hacking involves gaining unauthorized access to computer systems, networks, or devices to manipulate or extract data. The video script mentions hacking as a means through which phones can be compromised, allowing hackers to operate the device's camera and microphone independently. This highlights the vulnerability of personal devices in an era where hacking skills are becoming more accessible.

๐Ÿ’กIMSI Catcher

An IMSI Catcher is a device that mimics a cell tower to intercept mobile phone traffic and collect data, such as call records and text messages. The script discusses IMSI catchers as tools that can be used for mass surveillance, noting their availability to law enforcement and the potential for abuse. The mention of IMSI catchers in the video underscores the reality of how metadata can be easily accessed without hacking into individual devices.

๐Ÿ’กMetadata

Metadata refers to data that provides information about other data, such as the time and date of a communication, the participants, and the device used. In the video, metadata is highlighted as a valuable source of information for surveillance, as it can reveal patterns of behavior and associations. The script explains how even seemingly innocuous data points can paint a detailed picture of an individual's life, emphasizing the privacy concerns associated with metadata collection.

๐Ÿ’กEdward Snowden

Edward Snowden is a former NSA contractor who leaked classified information about mass surveillance programs, becoming a central figure in discussions on privacy and government overreach. The video script references Snowden as it delves into the implications of surveillance technologies and the debate over their use. His role in the narrative serves to underscore the real-world consequences and ethical considerations of mass surveillance.

๐Ÿ’กEncryption

Encryption is the process of encoding information in such a way that only authorized parties can access it. While not explicitly mentioned in the script, the concept is implicit in the discussion of secure communications and the need to protect data from unauthorized surveillance. Encryption is a key tool in the ongoing battle to maintain privacy in the digital age, as highlighted by the video's exploration of surveillance capabilities.

๐Ÿ’กPrivacy

Privacy refers to the state of being free from unauthorized intrusion or attention, particularly in one's personal matters. The video script repeatedly touches on privacy as a fundamental right that is increasingly threatened by advanced surveillance technologies. The discussions around hacked phones and IMSI catchers emphasize the erosion of privacy and the need for individuals to be aware of and protect their digital footprints.

๐Ÿ’กTerrorism

Terrorism is the use of violence and intimidation to achieve political aims. In the video, terrorism is often cited as the rationale behind mass surveillance programs, with the script highlighting the debate over the balance between security and civil liberties. The reference to terrorist attacks and the subsequent calls for increased surveillance illustrate the complexity of the issue and the challenges in formulating effective and ethical policy responses.

๐Ÿ’กFISA

FISA stands for the Foreign Intelligence Surveillance Act, a U.S. law that governs surveillance for foreign intelligence purposes. The script mentions FISA in the context of secret courts and the authorization of domestic spying programs. The discussion of FISA in the video underscores the legal framework that enables mass surveillance and the controversy surrounding secret interpretations of the law.

๐Ÿ’กWhistleblower

A whistleblower is an individual who exposes wrongdoing, typically within an organization or by a government. The video script features Edward Snowden as a prominent whistleblower, highlighting his role in revealing the extent of mass surveillance. The concept of whistleblowing is central to the narrative, as it raises questions about the moral responsibility to inform the public about potentially unethical practices and the personal risks whistleblowers face.

๐Ÿ’กMass Surveillance

Mass surveillance refers to the monitoring of a large number of people, often entire populations, rather than individuals who are specifically suspected of wrongdoing. The video script discusses mass surveillance as a pervasive and controversial practice, with implications for individual privacy and civil liberties. The script's exploration of mass surveillance includes discussions of its effectiveness, legal justifications, and the potential for abuse of power.

Highlights

Devices can be hacked to operate independently, allowing hackers to control them remotely.

Phone cameras can be activated without the owner's knowledge, raising privacy concerns.

The possibility of phone hacking is so subtle that users are often unaware it has occurred.

Surveillance programs in the US have been a subject of controversy, especially after the San Bernardino attack.

Apple's resistance to the FBI's request to break into a phone used by a shooter sparked a debate on privacy vs. security.

Edward Snowden revealed that mass surveillance capabilities already exist within government agencies.

Snowden's disclosures have led to a polarized view of him in America, as both a hero and a traitor.

Government agencies like the NSA, CIA, and FBI have the capability to access personal devices and information.

Metadata can reveal a person's movements and interactions, essentially acting as a digital shadow.

IMSI catchers are used to intercept phone metadata, and their use is widespread and increasing.

Surveillance technology has been used to target activists and suppress opposition in countries like Bahrain.

Hacking software can take complete control of a device, accessing calls, messages, and location data.

Ambient recordings through hacked devices can capture conversations without the target's awareness.

The possibility of going dark or being untraceable in the digital age is becoming increasingly difficult.

Surveillance has become so ubiquitous that even government agencies are not secure from it.

Mass surveillance has not been proven effective in preventing terrorist attacks, according to two independent commissions.

The potential for 'turnkey tyranny' exists with current surveillance systems, where future administrations could misuse these tools.

The debate over surveillance is not just about legality, but also about its impact on society and individual privacy.

Transcripts

play00:00

Edward -You might have bought the phone but whoever hacked it

play00:02

they are the one who owns it.

play00:04

Any device that is on here you can operate independently.

play00:06

Shane - So it is true, you can get into the phone and turn the camera on?

play00:08

E - Ya, absolutely.

play00:09

S - Is there a way you can tell if your phone has been hacked?

play00:12

E - Perhaps the most terrifying thing is if your phone had been hacked you would never know.

play00:25

S - This week on VICE: The inside story of America's surveillance program.

play00:30

E - I'm going to be detaching the camera.

play00:33

The devices that you paid for, watch you, on our behalf.

play00:40

S - It seems like technology allows, almost anyone to spy, on almost anyone.

play00:46

E - Even if you trust the government today...

play00:48

What happens when it changes?

play00:50

When eventually we get an individual who says...

play00:52

"You know what? Let's flip that switch."

play01:21

S - First of all I'd like to say thank you for meeting us

play01:23

today here at the storied hotel Metropol in Moscow.

play01:26

I say storied because for the longest time it was the

play01:28

designated hotel where foreigners were allowed to stay.

play01:32

And it was rumoured that every room was bugged.

play01:34

E - *Laughs* I would definitely presume that in any

play01:39

world capital when you're in a major business hotel...

play01:42

If the hotel rooms aren't pre-wired for surveillance

play01:45

they can be wired almost immediately.

play01:56

S - For the last 3 years, a controversy has raged about

play01:59

the US governments surveillance of its own people.

play02:01

The terrorist attack last December in San Bernardino, CA

play02:05

brought this debate to a tipping point.

play02:08

Reporter - 14 people are dead and 21 people have been

play02:10

injured after a married couple opened fire at the Inland

play02:14

Regional centre in San Bernardino.

play02:16

Reporter #2 - A judge is ordering apple to help the FBI

play02:19

break into a cellphone used by one of the San Bernardino shooters.

play02:22

Reporter #3 - Apple is saying "Look this is something

play02:25

that no court can order us to do.

play02:27

Tim Cook - What is at stake here is...

play02:29

Can the government compel Apple to write software

play02:33

that would make hundreds of millions of customers

play02:36

vulnerable around the world?

play02:38

Obama - If it is possible to make an impenetrable

play02:42

device. How do we solve or disrupt a terrorist plot?

play02:47

S - But according to the most famous whistleblower in the world,

play02:50

the government already had this capability.

play03:03

S - As it turns out, Snowden, was proved right.

play03:05

Because the FBI was able to crack the iPhone,

play03:08

without Apples help.

play03:10

Now Edward Snowden remains a polarizing figure in America.

play03:12

Politics. Because on one side he's considered a hero

play03:16

on the level of Woodward and Bernstein

play03:18

who broke the Watergate scandal.

play03:20

But on the other, he is considered a traitor

play03:22

who jeapardized American intelligence

play03:24

and security around the world

play03:27

Senator Burr - A Traitor! A traitor to the United States.

play03:30

Senator Nelson - These records were

play03:33

spread about publicly by Edward Snowden.

play03:38

Intentionally.

play03:40

Recklessly.

play03:41

And I might say illegally.

play03:44

S - So we went to Moscow to speak to this controversial

play03:47

figure about the state of surveillance in America today.

play03:54

So NSA, CIA, FBI...

play03:56

Can they get into my phone?

play03:58

E - Yes.

play03:58

S - Can they get into my laptop?

play04:00

E - Absolutely.

play04:01

S - iPad...?

play04:02

E - Anything. As long as they can dedicate

play04:04

people, money and time to the target... they can get it.

play04:07

S - And what kind of information can they get from my

play04:10

phone for example?

play04:11

E - Uh, everything in your contacts list.

play04:13

Every SMS messenger that you use.

play04:15

Every place that has ever been where the phone

play04:17

is physically located. Even if you've got GPS disabled

play04:20

because they can see which wireless access points are near you.

play04:23

Every part of a private life, today, is found on someones phone.

play04:27

We used to say a mans home is his castle.

play04:30

Today, a mans phone is his castle.

play04:32

S - My question to you is why don't more people care?

play04:36

Because we've gone from cold war, pre-9/11

play04:39

To effectively a police state that is watching your every

play04:42

move and everyone went "meh". Why?

play04:45

E - Part of it is the fact it happened invisibly.

play04:48

If a politician had said we want to watch everybody in the Country.

play04:51

People would have been up in arms about it.

play04:55

In the wake of September 11th

play04:56

the Vice President of the United States, Dick Cheney,

play04:58

and his personal lawyer David Addington

play05:01

conspired with a number of top level officials

play05:03

In the NSA and other agencies to change not only

play05:07

what they considered to be the legal restraints

play05:10

but actually the culture of surveillance in the intelligence community.

play05:14

They moved from the exceptional surveillance

play05:19

to the surveillance of everyone.

play05:22

Technology has changed, instead of sending people

play05:26

to follow you; we use the devices that you pay for.

play05:29

The services and the systems that surround you

play05:32

invisibly every day to watch you, on our behalf.

play05:36

Metadata, is the fact that a communication occurred.

play05:40

S - So I called you

play05:42

E - You called me, when you called me,

play05:44

where you called me from.

play05:46

This information is the same thing that's produced

play05:50

when a private investigator follows you around all day.

play05:52

They can't sit close enough to you in every cafe

play05:55

to hear every word you're saying. But they can

play05:58

be close enough to know when you left your house,

play06:01

what the license plate of the car you're driving with,

play06:03

where you went, who you sat with.

play06:05

How long you were there, when you left, where you went after that.

play06:08

That's metadata.

play06:09

S - Now all of this metadata it turns out

play06:11

is actually remarkably easy to get at.

play06:14

In fact you don't even have to hack the phone at all.

play06:16

All you need is technology that is readily available.

play06:20

Called an IMSI catcher that can intercept your phones

play06:23

metadata remotely.

play06:24

E - Every phone has what's called an IMSI.

play06:27

S - Uh huh.

play06:29

E - Which is actually for the SIM card.

play06:31

That's your subscriber information.

play06:33

What your name is; What your phone number is.

play06:35

All of our devices, as they travel throughout the day

play06:38

are constantly broadcasting in sort of this radio orchestra.

play06:43

IMSI catchers masquerade as the legitimate cellphone tower.

play06:47

So when you're saying "Hey - cell phone tower"

play06:49

"Can you hear me?" - Instead a man in the middle,

play06:53

somebody with an IMSI catcher in the trunk of their car.

play06:56

In a briefcase in their office

play06:58

Has it send a louder signal back to you,

play07:01

than the cell phone tower,

play07:03

then say "I'm the cell phone tower".

play07:05

S - Now this sounds pretty complex. How hard is it to

play07:08

make or buy an IMSI catcher?

play07:09

E - It's incredibly easy. You buy these things off the shelf.

play07:11

Every police department in the United States

play07:13

seems to be buying these things nowadays.

play07:15

S - Really?

play07:16

Now the use of IMSI catchers by police

play07:19

recently caused international headlines

play07:21

when a newspaper in Norway attempted to track the

play07:24

amount of IMSI catchers in Oslo.

play07:26

And actually found so many that they questioned

play07:29

if their tracker was working properly.

play07:31

After hiring a cyber security firm they discovered

play07:34

not only were they indeed correct but that these devices

play07:37

were actually being used to spy on their own government facilities.

play07:42

Andreas - 5 places in Oslo the measurement was so serious

play07:45

that they could say with high probability that there was

play07:48

IMSI catchers. The most clear signs was in the area of

play07:52

the Prime Ministers office and the Ministry of Defense.

play07:55

We also got alerts up in the Embassies area.

play07:58

And in front of the Parliament.

play08:00

S - And while the police initially denied using IMSI

play08:03

catchers extensively; In the face of overwhelming

play08:05

evidence they were eventually forced to admit it.

play08:08

A - The police stated that "We are using IMSI catchers

play08:12

at minimum once a week."

play08:14

That was the first time, ever, that the police had

play08:17

gone out and stated how often they were using these kinds of equipment.

play08:21

In all the areas that we detected signals, thousands of

play08:24

people are flowing by every day.

play08:26

So that's, I think that is some of the problem with these

play08:29

kinds of technology because you are looking for one

play08:31

number but you are, in the same phase, you are

play08:33

collecting hundreds of numbers.

play08:35

S - Now this technology is being used by police forces

play08:38

all over the world. In fact in New York City alone

play08:41

IMSI catchers have been used more than a thousand

play08:43

times, by police, since 2008

play08:46

And that's just the tip of the iceberg.

play08:48

As they are now being used all around us... all the time

play08:52

E - There is a joint CIA/NSA program called

play08:54

appropriately enough, "Shenanigans".

play08:56

Shenanigans was a project to mount on airplanes

play09:01

an IMSI catcher and fly it around the city.

play09:05

They can tell when you've travelled, they can tell when

play09:06

you move and this all happens without warrants.

play09:09

S - Right.

play09:10

E - Shenanigans was happening in Yemen.

play09:12

That is where it was being tested and you go

play09:14

"Well look this is being used to aim missiles at terrorists."

play09:17

I'm okay with that.

play09:19

But these programs have a disturbing frequency,

play09:22

a tendency...

play09:23

to move from war front to home front.

play09:26

S - Right.

play09:27

E - And within six months of Shenanigans being reported,

play09:30

the Wall Street Journal reported,

play09:32

that the same technology was now being used

play09:34

domestically inside the United States.

play09:36

The FBI has a specific aviation unit

play09:40

that is flying around cities

play09:42

and frequently they are monitoring protesters instead of violent criminals.

play09:46

The Black Lives Matter protests in Baltimore,

play09:49

the FBI was flying surveillance over the protesters.

play09:53

S - Now this has been cause for alarm

play09:55

because modern surveillance technologies are

play09:57

already being used by oppressive regimes

play10:00

to suppress government opposition.

play10:03

"Allahu akbar" (over and over)

play10:09

Ala'a - Since 2011, Bahrain has witnessed some of the

play10:11

largest protests in its history where

play10:13

there are thousands of protesters taking to the streets.

play10:15

Who are demanding more democratic reforms and

play10:19

a change in regime.

play10:22

S - Ala'a Shehabi is a Bahraini activist who found herself the target

play10:26

of government surveillance.

play10:27

A - In 2012 I was briefly arrested.

play10:29

Immediately after I was released,

play10:31

I received a string of 4 or 5 emails

play10:35

that were very suspicious to me.

play10:37

I suspected that this was a cyber attack so I

play10:39

immediately sent the suspicious emails to my colleague

play10:43

Morgan, at Citizen Lab, it actually turned out that

play10:46

this spyware was produced and operated by a British

play10:49

and German company called Finfisher.

play10:52

This is a company that specializes in producing hacking

play10:55

software. It claims it sells it to government regimes.

play10:59

So that immediately fitted with my suspicion that

play11:02

this was the Bahraini regime. The spyware is capable

play11:04

of switching your microphone on, your camera,

play11:08

it is capable of logging every single thing that you type.

play11:11

There are a handful of key companies, in Europe,

play11:15

that are openly marketing, promoting and selling these

play11:19

tools in Arms Exhibitions.

play11:22

In European capitals.

play11:24

They are not being used in the name of tackling terrorism.

play11:27

They are being used to keep these regimes in place

play11:30

and in power.

play11:32

S - Now to see exactly what type of information

play11:34

a hacked phone can yield, we contacted the same

play11:37

hacker who uncovered the Bahraini scandal

play11:39

and asked him to hack one of our own reporters.

play11:42

Using the same type of software that targeted Ala'a Shehabi.

play11:46

We were able to completely commandeer Bens phone

play11:49

and he never knew it.

play11:52

So Ben was in Pakistan doing a shoot on Polio.

play11:55

So you hacked his phone and you figured out who he called

play11:57

Morgan - Right and so I mean what we've got here

play11:59

is I can see who he is calling and when he called them

play12:02

and how long the calls were. We can actually record

play12:05

his calls, lets have a listen to them.

play12:19

M - This will also keep a list of Bens web browsing history.

play12:21

And so for instance you can see here he is google searching for

play12:24

BBC. You can see news articles that he is writing.

play12:26

Checking his twitter. It's sort of like reading someones mind.

play12:29

Because you can sort of see what they're thinking while they're on the internet.

play12:31

So we've been location tracking Ben.

play12:33

You can even get it to animate and so it will show

play12:35

where Ben is at various sort of times.

play12:38

You can see him travelling around the city there

play12:40

and you can tell exactly where he is. Which is obviously

play12:43

you know in terms of keeping on someone a highly desirable thing.

play12:50

Think about anything that the phone can do.

play12:53

Right, like once you've actually installed this malicious software

play12:56

on the phone, then it's simply a matter of activating the phones capabilities.

play13:01

So I mean the phone has a camera right? Well now we can turn on the camera.

play13:07

S - What are these ambient recordings?

play13:09

M - Ya so the ambient recording is kind of the invisible

play13:11

microphone, the real sort of spy stuff.

play13:24

S - So he's interviewing a Gitmo detainee - a former Gitmo detainee -

play13:27

So I guess when you talk about protecting journalists,

play13:30

protecting your source is a big issue.

play13:34

M - Can you be said to be practicing journalism in a

play13:36

traditional sense if you can't guarantee source protection?

play13:38

You may be sort of actively endangering their livelihood,

play13:41

welfare and life.

play13:42

S - Now with software like this

play13:44

and the other more commercially available software

play13:47

it seems like technology allows...

play13:52

almost anyone to spy on almost anyone

play13:55

M - We live in a golden age of convenience enabled by technology.

play13:58

So that means that you and I can be on other sides of

play14:02

the planet and we can have a conversation in real time

play14:04

for no money. Technology has enabled convenience of communication

play14:08

but also convenience of surveillance.

play14:11

S - Now this so called golden age of technology

play14:14

has essentially made it possible for anyone to spy on anyone else

play14:18

It begs the question - Can people, for example journalists,

play14:22

ever go dark? Is that even possible now with these new advancements?

play14:26

How do we go black?

play14:29

E - Well so going black is a pretty big ask.

play14:33

For me for example, I really know what I'm doing.

play14:35

S - Ya.

play14:35

E - But if the NSA wants to pop my box.

play14:37

You know they're totally going to do it.

play14:39

But if you know you're actively under threat,

play14:41

if you know your phone has been hacked,

play14:43

these are ways that you can ensure that your phone

play14:45

works for you rather than working for somebody else.

play14:48

You might have bought the phone but whoever hacked it

play14:50

they are the one who owns it.

play14:52

S - That's because third parties can actually turn on your

play14:55

phones microphones and cameras without you knowing it.

play14:58

E - Any device that is on here you can operate independently.

play15:00

S - So it's true you can get into the phone and turn the camera on?

play15:03

E - Ya, absolutely. So you would turn this guy on

play15:06

and you'll just heat that guy until the solders molten.

play15:08

Because I'm going to be detaching the rhythm cables...

play15:13

that are connecting the camera...

play15:16

As a surface mount device you'll be able to just pull it off like that.

play15:19

S - So this is the camera?

play15:21

What's that?

play15:22

E - This is the other camera.

play15:24

You got 2 cameras in your phone, you got your front

play15:26

facing camera, for sort of the selfies.

play15:28

And you got your rear facing camera, that's it.

play15:30

I think this one has a multi microphone array

play15:33

which is going to be this guy

play15:35

this guy and this guy.

play15:37

S - But if you take out the microphones then

play15:40

how do you use it as a phone?

play15:44

E - You would add your own external microphone.

play15:47

For example the iPod type earbuds that have the mic

play15:51

integrated on the lanyard.

play15:52

S - Is there a way you can tell if your phone has been hacked?

play15:55

E - Perhaps the most terrifying thing is, if your phone

play15:57

had been hacked you would never know.

play15:59

S - And as VICE news reporter Jason Leopold found

play16:02

surveillance has become so ubiquitious

play16:04

that even the government agencies responsible for

play16:06

policing it are not secure.

play16:08

You got a FOIA request recently in the mail

play16:12

that is causing quite a stir.

play16:14

J - The way that this all surfaced, Dianne Feinstein,

play16:17

she made this extraordinary floor speech.

play16:19

S - As the head of the senate intelligence committee

play16:21

Feinstein delivered some shocking allegations.

play16:24

Senator Feinstein - On 2 occasions CIA personnel

play16:27

electronically removed committee access

play16:31

to CIA documents.

play16:33

J - She said that the CIA

play16:35

had hacked into Senate computers

play16:39

while these staffers who worked for her were

play16:42

writing a report about the CIA's torture program.

play16:45

John Brennan, the director of the CIA

play16:47

said that is proposterous.

play16:49

Our only way to look deeper into it was to

play16:51

file a Freedom of information act request.

play16:53

So these documents absolutely backed up everything

play16:57

that Dianne Feinstein said.

play16:59

What's most interesting though, what I would call a smoking gun,

play17:02

John Brennan wrote a letter and he said that the CIA

play17:05

staff had improperly accessed your computers.

play17:09

But John Brennan never sent this letter to Dianne Feinstein.

play17:13

They said that this letter was mistakenly turned over to us.

play17:16

It was an accident and it actually should not have

play17:19

been released to us and they asked us not to, uh, post it.

play17:23

S - Because it's embarrassing?

play17:25

J - Completely embarrassing for them. And we declined

play17:27

that request because there was no National

play17:30

security concerns in this letter. This is simply

play17:32

something that John Brennan did not want the public

play17:35

to see after making after making all of these statements

play17:38

about what the CIA did not do.

play17:41

S - We now know that the CIA officers were in fact

play17:44

spying on the committee charged with keeping them in line.

play17:47

So we spoke to one of those committee members

play17:50

Senator Ron Wyden

play17:51

about the letter than Brennan never meant to send.

play17:55

Senator Ron Wyden - This will be the first time I've ever said this publicly.

play17:59

My sense is there were clearly people

play18:04

at the CIA who understood

play18:07

that what Mister Brennan had done was flat out wrong.

play18:13

And they drafted an apology letter.

play18:17

And yet, Mr Brennan was just unwilling to publicly acknowledge wrongdoing.

play18:25

This is basically re-writing the law.

play18:28

We are the agency that is required by law

play18:33

to conduct vigorous oversight over the CIA.

play18:37

We can't do vigorous oversight over the agency

play18:41

if the agency we're supposed to be overseeing

play18:45

is in fact secretly searching our files.

play18:50

S - Now Senator Wyden has become a leader

play18:52

in attempting to reign in our intelligence community.

play18:56

W - Director Clapper, I want to ask you...

play18:58

E - Senator Ron Wyden said "is the NSA collecting any

play19:02

kind of data at all on millions or hundreds of millions of Americans?"

play19:08

And James Clapper sort of scratched his head

play19:12

James Clapper - No sir.

play19:13

E - And he said no... Senator Wyden - It does not? E - ...they do not

play19:17

Clapper - Not wittingly.

play19:18

E - The most senior intelligence official in the United

play19:21

States of America raised his hand and swore an oath

play19:23

to tell the truth to congress. And he lied on camera.

play19:28

He wasn't charged, despite the fact that is a felony;

play19:31

he didn't even lose his job, he's still doing the same thing today.

play19:34

Within a few months he admitted that he had lied.

play19:36

He said his answer was too cute by half

play19:39

and the least untruthful statement that he felt he could

play19:43

have made at the time.

play19:45

W - My view is that if you're going to protect

play19:49

the American people

play19:51

you've got to embed those protections into law.

play19:54

And we of course have been very concerned about

play19:58

with what I call "Secret Law"

play20:00

S - And at the heart of that secret law

play20:02

is FISA

play20:03

the foreign intelligence surveillance act.

play20:05

Which authorised secret courts

play20:07

to greenlight domestic spying programs

play20:10

W - The government persuaded

play20:12

the court to say it was okay

play20:14

to collect metadata.

play20:16

When you read the fundamental law you didn't hear

play20:19

anything about metadata and collecting millions of

play20:22

records on law abiding people.

play20:26

That was all done in secret.

play20:29

And in fact I went to the floor of the senate

play20:32

and I warned that when the American people found out

play20:36

how that law had been secretly interpreted

play20:40

they would be very angry. And that in fact was the case.

play20:44

S - Now public anger hasn't been enough to end many of

play20:46

these programs. But increasingly the question isn't

play20:50

whether or not they can be justified under law

play20:52

but whether they're actually effective

play20:54

in the first place.

play20:55

Recently there were attacks in Paris.

play20:59

What happens when you have a terrorist attack like that-

play21:03

Within security agencies, the NSA for example?

play21:05

E - I was working at the NSA during the Boston Marathon

play21:09

bombing investigation.

play21:12

And as it was playing on the news

play21:13

myself and colleagues were in the cafeteria

play21:16

and we turned to each other

play21:18

and said...

play21:20

I'll bet you anything...

play21:22

We already knew about these guys in the databases.

play21:25

And in Paris, I'm certain that the same conversation happened.

play21:29

This is really the legacy of mass surveillance.

play21:32

It's the fact that when you are watching everyone

play21:35

you know who these individuals are, they're in the banks,

play21:38

you had the information you needed

play21:40

to stop, to prevent even the worst atrocities.

play21:43

But the problem is when you cast the net too wide,

play21:48

when you're collecting everything,

play21:49

you understand nothing.

play21:51

We know for a fact

play21:53

that it is not effective

play21:55

for stopping terrorist attacks and it never has been.

play21:59

The White House appointed 2 independent commissions

play22:03

in the wake of my disclosures in 2013

play22:05

to review mass surveillance programs

play22:07

and go "Alright do these have value?

play22:10

Should they be changed? Should they be reformed?"

play22:12

They looked at the evidence, the classified evidence,

play22:15

and they found wow, despite the fact that this been

play22:19

going since 2001, it had never stopped a single terrorist

play22:23

attack in the United States.

play22:25

And that's after monitoring the phone calls

play22:27

of everyone in the Country.

play22:28

S - So that's a huge point. So two independent

play22:31

commissions, started by the White House,

play22:33

said "Mass surveillance has not stopped a terrorist attack."

play22:38

E - And both of them found that these programs

play22:40

should be ended

play22:42

and then they came up with forty two different points

play22:45

for reform that they recommended should happen to

play22:48

restrict the use of these powers.

play22:50

The last time that I saw a review of this, the President

play22:53

only adopted three of the forty two points.

play22:55

S - Why?

play22:56

E - Because they would limit the exercise of executive power.

play23:01

This is something that you have to understand is

play23:04

not about this president...

play23:05

it's about...the Presidency.

play23:07

It's clear that the public opposes

play23:09

a majority of these policies.

play23:11

And yet politicians, because the word terrorism is involved,

play23:16

They can't justify being the one to stand

play23:20

and mount the vote, because they know there will be another terrorist attack.

play23:23

S - Because if they say "No we're not doing this"

play23:26

and then there is a terrorist attack, they get painted with that brush.

play23:28

E - They know they'll be blamed by their political opponents

play23:30

and they're right.

play23:32

Of course their political opponents will do this

play23:34

it's the easiest thing in the world to do.

play23:36

And unfortunately it's quite effective.

play23:38

Because we live in a time where the

play23:40

politics of fear are the most

play23:42

persuasive thing on the table.

play23:44

S - Now while the debate over surveillance

play23:46

continues to rage here in the US,

play23:48

Edward Snowden remains a fugitive

play23:50

for his revelations about the NSA.

play23:52

And he had a cautionary statement about what's at stake.

play23:56

When the world was first introduced to you,

play23:58

you made a statement about turnkey tyranny...

play24:02

What did you mean by that?

play24:04

E - It means that even if you trust the government today

play24:06

what happens when it changes?

play24:08

In our democracy we're never more than 8 years away

play24:11

from a total change of government.

play24:13

Suddenly, everybody is vulnerable to this individual

play24:17

and the systems are already in place.

play24:20

What happens tomorrow,

play24:22

in a year, in 5 years, in 10 years,

play24:25

when eventually we get an individual who says

play24:27

"You know what?

play24:29

Lets flip that switch... and

play24:31

use the absolute full extent

play24:33

of our technical capabilities

play24:35

to ensure the political stability

play24:38

of this new administration."

play24:42

When we think about the future and where we go from here

play24:47

the question is are we going to change?

play24:50

And enter sort of a quantified world

play24:53

where everywhere you've been,

play24:55

everyone you talk to, it's indexed

play24:57

it's analyzed, it's stored and it's used.

play25:00

Maybe against you.

play25:02

Cop - Within our technologies here we have our license

play25:04

plate reader system, which we can capture

play25:06

dozens of license plates in a matter of a second.

play25:08

E - Or will we recognize the danger of that

play25:11

and embrace the fact that people should have

play25:15

space to make mistakes,

play25:17

without judgement, to have sort of

play25:19

the unconsidered thought or conversation

play25:21

with your friend. But if that was recorded in a database

play25:24

Where you know,

play25:26

you say "I think Donald Trump should be kicked off a cliff"

play25:29

And Donald Trump becomes President someday,

play25:31

and then everybody who said that ends up getting thrown off a cliff.

play25:37

That's a very dangerous world.

play25:38

And I think this really is...

play25:40

the question that...

play25:42

our political structures...

play25:44

are not yet comfortable even discussing.

play25:49

But whether they like it or not,

play25:52

it's a world that is coming and

play25:54

we're going to have to confront.

play25:56

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
SurveillancePrivacySecuritySnowdenNSACIAFBITechnologyWhistleblowerMass Data