[This essay is a shortened and adapted version of Chapter 1 of Glenn Greenwald’s new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Security State.]

On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.

The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a “model of civic virtue,” Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.

The email began: “The security of people’s communications is very important to me,” and its stated purpose was to urge me to begin using PGP encryption so that “Cincinnatus” could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for “pretty good privacy.” It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.

In this email, “Cincinnatus” said he had searched everywhere for my PGP “public key,” a unique code set that allows people to receive encrypted email, but could not find it. From this, he concluded that I was not using the program and told me, “That puts anyone who communicates with you at risk. I’m not arguing that every communication you are involved in be encrypted, but you should at least provide communicants with that option.”

“Cincinnatus” then referenced the sex scandal of General David Petraeus, whose career-ending extramarital affair with journalist Paula Broadwell was discovered when investigators found Google emails between the two. Had Petraeus encrypted his messages before handing them over to Gmail or storing them in his drafts folder, he wrote, investigators would not have been able to read them. “Encryption matters, and it is not just for spies and philanderers.”  

“There are people out there you would like to hear from,” he added, “but they will never be able to contact you without knowing their messages cannot be read in transit.” Then he offered to help me install the program.  He signed off: “Thank you. C.”

Using encryption software was something I had long intended to do. I had been writing for years about WikiLeaks, whistleblowers, the hacktivist collective known as Anonymous, and had also communicated with people inside the U.S. national security establishment. Most of them are concerned about the security of their communications and preventing unwanted monitoring. But the program is complicated, especially for someone who had very little skill in programming and computers, like me. So it was one of those things I had never gotten around to doing.

C.’s email did not move me to action. Because I had become known for covering stories the rest of the media often ignores, I frequently hear from all sorts of people offering me a “huge story,” and it usually turns out to be nothing. And at any given moment I am usually working on more stories than I can handle. So I need something concrete to make me drop what I’m doing in order to pursue a new lead.

Three days later, I heard from C. again, asking me to confirm receipt of the first email. This time I replied quickly. “I got this and am going to work on it. I don’t have a PGP code, and don’t know how to do that, but I will try to find someone who can help me.”

C. replied later that day with a clear, step-by-step guide to PGP: Encryption for Dummies, in essence. At the end of the instructions, he said these were just “the barest basics.” If I couldn’t find anyone to walk me through the system, he added, “let me know. I can facilitate contact with people who understand crypto almost anywhere in the world.”

This email ended with more a pointed sign-off: “Cryptographically yours, Cincinnatus.”

Despite my intentions, I did nothing, consumed as I was at the time with other stories, and still unconvinced that C. had anything worthwhile to say.

In the face of my inaction, C. stepped up his efforts. He produced a 10-minute video entitled PGP for Journalists.

It was at that point that C., as he later told me, became frustrated. “Here am I,” he thought, “ready to risk my liberty, perhaps even my life, to hand this guy thousands of Top Secret documents from the nation’s most secretive agency — a leak that will produce dozens if not hundreds of huge journalistic scoops. And he can’t even be bothered to install an encryption program.”

That’s how close I came to blowing off one of the largest and most consequential national security leaks in U.S. history.

“He’s Real”

The next I heard of any of this was 10 weeks later. On April 18th, I flew from my home in Rio de Janeiro to New York, and saw on landing at JFK Airport, that I had an email from Laura Poitras, the documentary filmmaker. “Any chance you’ll be in the U.S. this coming week?” she wrote. “I’d love to touch base about something, though best to do in person.”

I take seriously any message from Laura Poitras. I replied immediately: “Actually, just got to the U.S. this morning… Where are you?” We arranged a meeting for the next day in the lobby at my hotel and found seats in the restaurant. At Laura’s insistence, we moved tables twice before beginning our conversation to be sure that nobody could hear us. Laura then got down to business. She had an “extremely important and sensitive matter” to discuss, she said, and security was critical. 

First, though, Laura asked that I either remove the battery from my cell phone or leave it in my hotel room. “It sounds paranoid,” she said, but the government has the capability to activate cell phones and laptops remotely as eavesdropping devices. I’d heard this before from transparency activists and hackers but tended to write it off as excess caution.  After discovering that the battery on my cell phone could not be removed, I took it back to my room, then returned to the restaurant.

Now Laura began to talk. She had received a series of anonymous emails from someone who seemed both honest and serious. He claimed to have access to some extremely secret and incriminating documents about the U.S. government spying on its own citizens and on the rest of the world. He was determined to leak these documents to her and had specifically requested that she work with me on releasing and reporting on them.

Laura then pulled several pages out of her purse from two of the emails sent by the anonymous leaker, and I read them at the table from start to finish. In the second of the emails, the leaker got to the crux of what he viewed as his mission:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man.

“He’s real,” I said when I finished reading. “I can’t explain exactly why, but I just feel intuitively that this is serious, that he’s exactly who he says he is.”

“So do I,” Laura replied. “I have very little doubt.”

I instinctively recognized the author’s political passion. I felt a kinship with our correspondent, with his worldview, and with the sense of urgency that was clearly consuming him.

In one of the last passages, Laura’s correspondent wrote that he was completing the final steps necessary to provide us with the documents. He needed another four to six weeks, and we should wait to hear from him.

Three days later, Laura and I met again, and with another email from the anonymous leaker, in which he explained why he was willing to risk his liberty, to subject himself to the high likelihood of a very lengthy prison term, in order to disclose these documents. Now I was even more convinced: our source was for real, but as I told my partner, David Miranda, on the flight home to Brazil, I was determined to put the whole thing out of my mind. “It may not happen. He could change his mind. He could get caught.” David is a person of powerful intuition, and he was weirdly certain. “It’s real. He’s real. It’s going to happen,” he declared. “And it’s going to be huge.”

“I Have Only One Fear”    

A message from Laura told me we needed to speak urgently, but only through OTR (off-the-record) chat, an encrypted instrument for talking online securely.

Her news was startling: we might have to travel to Hong Kong immediately to meet our source. I had assumed that our anonymous source was in Maryland or northern Virginia. What was someone with access to top-secret U.S. government documents doing in Hong Kong?  What did Hong Kong have to do with any of this?

Answers would only come from the source himself. He was upset by the pace of things thus far, and it was critical that I speak to him directly, to assure him and placate his growing concerns. Within an hour, I received an email from Verax@******. Verax means “truth teller” in Latin. The subject line read, “Need to talk.”

“I’ve been working on a major project with a mutual friend of ours,” the email began. “You recently had to decline short-term travel to meet with me. You need to be involved in this story,” he wrote. “Is there any way we can talk on short notice? I understand you don’t have much in the way of secure infrastructure, but I’ll work around what you have.” He suggested that we speak via OTR and provided his user name.

My computer sounded a bell-like chime, signaling that the source had signed on. Slightly nervous, I clicked on his name and typed “hello.” He answered, and I found myself speaking directly to someone who I assumed had, at that point, revealed a number of secret documents about U.S. surveillance programs and who wanted to reveal more.

“I’m willing to do what I have to do to report this,” I said. The source — whose name, place of employment, age, and all other attributes were still unknown to me — asked if I would come to Hong Kong to meet him. I did not ask why he was there; I wanted to avoid appearing to be fishing for information and I assumed his situation was delicate. Whatever else was true, I knew that this person had resolved to carry out what the U.S. government would consider a very serious crime.

“Of course I’ll come to Hong Kong,” I said.

We spoke online that day for two hours, talking at length about his goal. I knew from the emails Laura had shown me that he felt compelled to tell the world about the massive spying apparatus the U.S. government was secretly building. But what did he hope to achieve?

“I want to spark a worldwide debate about privacy, Internet freedom, and the dangers of state surveillance,” he said. “I’m not afraid of what will happen to me. I’ve accepted that my life will likely be over from my doing this. I’m at peace with that. I know it’s the right thing to do.” He then said something startling: “I want to identify myself as the person behind these disclosures. I believe I have an obligation to explain why I’m doing this and what I hope to achieve.” He told me he had written a document that he wanted to post on the Internet when he outed himself as the source, a pro-privacy, anti-surveillance manifesto for people around the world to sign, showing that there was global support for protecting privacy.

“I only have one fear in doing all of this,” he said, which is “that people will see these documents and shrug, that they’ll say, ‘We assumed this was happening and don’t care.’ The only thing I’m worried about is that I’ll do all this to my life for nothing.”

“I seriously doubt that will happen,” I assured him, but I wasn’t convinced I really believed that. I knew from my years of writing about NSA abuses that it can be hard to generate serious concern about secret state surveillance.

This felt different, but before I took off for Hong Kong, I wanted to see some documents so that I understood the types of disclosures the source was prepared to make.

I then spent a couple of days online as the source walked me through, step by step, how to install and use the programs I would need to see the documents.  

I kept apologizing for my lack of proficiency, for having to take hours of his time to teach me the most basic aspects of secure communication. “No worries,” he said, “most of this makes little sense. And I have a lot of free time right now.”

Once the programs were all in place, I received a file containing roughly twenty-five documents: “Just a very small taste: the tip of the tip of the iceberg,” he tantalizingly explained.

I unzipped the file, saw the list of documents, and randomly clicked on one of them. At the top of the page in red letters, a code appeared: “TOP SECRET//COMINT/NO FORN/.”

This meant the document had been legally designated top secret, pertained to communications intelligence (COMINT), and was not for distribution to foreign nationals, including international organizations or coalition partners (NO FORN). There it was with incontrovertible clarity: a highly confidential communication from the NSA, one of the most secretive agencies in the world’s most powerful government. Nothing of this significance had ever been leaked from the NSA, not in all the six-decade history of the agency. I now had a couple dozen such items in my possession. And the person I had spent hours chatting with over the last two days had many, many more to give me.

As Laura and I arrived at JFK Airport to board a Cathay Pacific flight to Hong Kong, Laura pulled a thumb drive out of her backpack. “Guess what this is?” she asked with a look of intense seriousness.

“What?”

“The documents,” she said. “All of them.”

“README_FIRST”

For the next 16 hours, despite my exhaustion, I did nothing but read, feverishly taking notes on document after document. One of the first I read was an order from the secret Foreign Intelligence Surveillance Act (FISA) court, which had been created by Congress in 1978, after the Church Committee discovered decades of abusive government eavesdropping. The idea behind its formation was that the government could continue to engage in electronic surveillance, but to prevent similar abuse, it had to obtain permission from the FISA court before doing so. I had never seen a FISA court order before. Almost nobody had. The court is one of the most secretive institutions in the government. All of its rulings are automatically designated top secret, and only a small handful of people are authorized to access its decisions.

The ruling I read on the plane to Hong Kong was amazing for several reasons. It ordered Verizon Business to turn over to the NSA “all call detail records” for “communications (i) between the United States and abroad; and (ii) wholly within the United States, including local telephone calls.” That meant the NSA was secretly and indiscriminately collecting the telephone records of tens of millions of Americans, at least. Virtually nobody had any idea that the Obama administration was doing any such thing. Now, with this ruling, I not only knew about it but had the secret court order as proof.

Only now did I feel that I was beginning to process the true magnitude of the leak. I had been writing for years about the threat posed by unconstrained domestic surveillance; my first book, published in 2006, warned of the lawlessness and radicalism of the NSA. But I had struggled against the great wall of secrecy shielding government spying: How do you document the actions of an agency so completely shrouded in multiple layers of official secrecy? At this moment, the wall had been breached. I had in my possession documents that the government had desperately tried to hide. I had evidence that would indisputably prove all that the government had done to destroy the privacy of Americans and people around the world.

In 16 hours of barely interrupted reading, I managed to get through only a small fraction of the archive. But as the plane landed in Hong Kong, I knew two things for certain. First, the source was highly sophisticated and politically astute, evident in his recognition of the significance of most of the documents. He was also highly rational. The way he chose, analyzed, and described the thousands of documents I now had in my possession proved that. Second, it would be very difficult to deny his status as a classic whistleblower. If disclosing proof that top-level national security officials lied outright to Congress about domestic spying programs doesn’t make one indisputably a whistleblower, then what does?

Shortly before landing, I read one final file. Although it was entitled “README_FIRST,” I saw it for the first time only at the very end of the flight. This message was an explanation from the source for why he had chosen to do what he did and what he expected to happen as a result — and it included one fact that the others did not: the source’s name.

“I understand that I will be made to suffer for my actions, and that the return of this information to the public marks my end. I will be satisfied if the federation of secret law, unequal pardon, and irresistible executive powers that rule the world that I love are revealed for even an instant. If you seek to help, join the open source community and fight to keep the spirit of the press alive and the internet free. I have been to the darkest corners of government, and what they fear is light.

Edward Joseph Snowden, SSN: *****
CIA Alias “***** ”
Agency Identification Number: *****
Former Senior Advisor | United States National Security Agency, under corporate cover
Former Field Officer | United States Central Intelligence Agency, under diplomatic cover
Former Lecturer | United States Defense Intelligence Agency, under corporate cover”

Glenn Greenwald, a former constitutional lawyer and a Guardian columnist until October 2013, has earned numerous awards for his commentary and investigative journalism, including most recently the 2013 George Polk Award for national security reporting. In early 2014, he cofounded a new global media outlet, The Intercept. This essay is adapted from his new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Security State (Metropolitan Books), published today.

Excerpted and adapted from No Place to Hide: Edward Snowden, the NSA, and the U.S. Security State by Glenn Greenwald, published by Metropolitan Books, an imprint of Henry Holt and Company, LLC.

Copyright 2014 Glenn Greenwald

The Snowden Saga Begins

As intense protests spawned by Occupy Wall Street continue to grow, it is worth asking: Why now? The answer is not obvious. After all, severe income and wealth inequality have long plagued the United States. In fact, it could reasonably be claimed that this form of inequality is part of the design of the American founding — indeed, an integral part of it.

Income inequality has worsened over the past several years and is at its highest level since the Great Depression.  This is not, however, a new trend. Income inequality has been growing at rapid rates for three decades.  As journalist Tim Noah described the process:

“During the late 1980s and the late 1990s, the United States experienced two unprecedentedly long periods of sustained economic growth — the ‘seven fat years’ and the ‘long boom.’ Yet from 1980 to 2005, more than 80% of total increase in Americans' income went to the top 1%. Economic growth was more sluggish in the aughts, but the decade saw productivity increase by about 20%. Yet virtually none of the increase translated into wage growth at middle and lower incomes, an outcome that left many economists scratching their heads.”

The 2008 financial crisis exacerbated the trend, but not radically: the top 1% of earners in America have been feeding ever more greedily at the trough for decades.

In addition, substantial wealth inequality is so embedded in American political culture that, standing alone, it would not be sufficient to trigger citizen rage of the type we are finally witnessing. The American Founders were clear that they viewed inequality in wealth, power, and prestige as not merely inevitable, but desirable and, for some, even divinely ordained. Jefferson praised “the natural aristocracy” as “the most precious gift of nature” for the “government of society.” John Adams concurred: “It already appears, that there must be in every society of men superiors and inferiors, because God has laid in the… course of nature the foundation of the distinction.”

Not only have the overwhelming majority of Americans long acquiesced to vast income and wealth disparities, but some of those most oppressed by these outcomes have cheered it loudly. Americans have been inculcated not only to accept, but to revere those who are the greatest beneficiaries of this inequality.

In the 1980s, this paradox — whereby even those most trampled upon come to cheer those responsible for their state — became more firmly entrenched. That’s because it found a folksy, friendly face, Ronald Reagan, adept at feeding the populace a slew of Orwellian clichés that induced them to defend the interests of the wealthiest. “A rising tide,” as President Reagan put it, “lifts all boats.” The sum of his wisdom being: it is in your interest when the rich get richer.

Implicit in this framework was the claim that inequality was justified and legitimate. The core propagandistic premise was that the rich were rich because they deserved to be. They innovated in industry, invented technologies, discovered cures, created jobs, took risks, and boldly found ways to improve our lives. In other words, they deserved to be enriched. Indeed, it was in our common interest to allow them to fly as high as possible because that would increase their motivation to produce more, bestowing on us ever greater life-improving gifts.

We should not, so the thinking went, begrudge the multimillionaire living behind his 15-foot walls for his success; we should admire him. Corporate bosses deserved not our resentment but our gratitude. It was in our own interest not to demand more in taxes from the wealthiest but less, as their enhanced wealth — their pocket change — would trickle down in various ways to all of us. 

This is the mentality that enabled massive growth in income and wealth inequality over the past several decades without much at all in the way of citizen protest. And yet something has indeed changed.  It’s not that Americans suddenly woke up one day and decided that substantial income and wealth inequality are themselves unfair or intolerable. What changed was the perception of how that wealth was gotten and so of the ensuing inequality as legitimate.

Many Americans who once accepted or even cheered such inequality now see the gains of the richest as ill-gotten, as undeserved, as cheating.  Most of all, the legal system that once served as the legitimizing anchor for outcome inequality, the rule of law — that most basic of American ideals, that a common set of rules are equally applied to all — has now become irrevocably corrupted and is seen as such.

While the Founders accepted outcome inequality, they emphasized — over and over — that its legitimacy hinged on subjecting everyone to the law’s mandates on an equal basis. Jefferson wrote that the essence of America would be that “the poorest laborer stood on equal ground with the wealthiest millionaire, and generally on a more favored one whenever their rights seem to jar.” Benjamin Franklin warned that creating a privileged legal class would produce “total separation of affections, interests, political obligations, and all manner of connections” between rulers and those they ruled. Tom Paine repeatedly railed against “counterfeit nobles,” those whose superior status was grounded not in merit but in unearned legal privilege.

After all, one of their principal grievances against the British King was his power to exempt his cronies from legal obligations. Almost every Founder repeatedly warned that a failure to apply the law equally to the politically powerful and the rich would ensure a warped and unjust society.  In many ways, that was their definition of tyranny.

Americans understand this implicitly. If you watch a competition among sprinters, you can accept that whoever crosses the finish line first is the superior runner. But only if all the competitors are bound by the same rules: everyone begins at the same starting line, is penalized for invading the lane of another runner, is barred from making physical contact or using performance-enhancing substances, and so on.

If some of the runners start ahead of others and have relationships with the judges that enable them to receive dispensation for violating the rules as they wish, then viewers understand that the outcome can no longer be considered legitimate. Once the process is seen as not only unfair but utterly corrupted, once it’s obvious that a common set of rules no longer binds all the competitors, the winner will be resented, not heralded.

That catches the mood of America in 2011.  It may not explain the Occupy Wall Street movement, but it helps explain why it has spread like wildfire and why so many Americans seem instantly to accept and support it.  As was not true in recent decades, the American relationship with wealth inequality is in a state of rapid transformation.

It is now clearly understood that, rather than apply the law equally to all, Wall Street tycoons have engaged in egregious criminality — acts which destroyed the economic security of millions of people around the world — without experiencing the slightest legal repercussions. Giant financial institutions were caught red-handed engaging in massive, systematic fraud to foreclose on people’s homes and the reaction of the political class, led by the Obama administration, was to shield them from meaningful consequences. Rather than submit on an equal basis to the rules, through an oligarchical, democracy-subverting control of the political process, they now control the process of writing those rules and how they are applied.

Today, it is glaringly obvious to a wide range of Americans that the wealth of the top 1% is the byproduct not of risk-taking entrepreneurship, but of corrupted control of our legal and political systems. Thanks to this control, they can write laws that have no purpose than to abolish the few limits that still constrain them, as happened during the Wall Street deregulation orgy of the 1990s.  They can retroactively immunize themselves for crimes they deliberately committed for profit, as happened when the 2008 Congress shielded the nation’s telecom giants for their role in Bush’s domestic warrantless eavesdropping program.  

It is equally obvious that they are using that power not to lift the boats of ordinary Americans but to sink them. In short, Americans are now well aware of what the second-highest-ranking Democrat in the Senate, Illinois’s Dick Durbin, blurted out in 2009 about the body in which he serves: the banks “frankly own the place.” 

If you were to assess the state of the union in 2011, you might sum it up this way: rather than being subjected to the rule of law, the nation’s most powerful oligarchs control the law and are so exempt from it; and increasing numbers of Americans understand that and are outraged.  At exactly the same time that the nation’s elites enjoy legal immunity even for egregious crimes, ordinary Americans are being subjected to the world's largest and one of its harshest penal states, under which they are unable to secure competent legal counsel and are harshly punished with lengthy prison terms for even trivial infractions. 

In lieu of the rule of law — the equal application of rules to everyone — what we have now is a two-tiered justice system in which the powerful are immunized while the powerless are punished with increasing mercilessness. As a guarantor of outcomes, the law has, by now, been so completely perverted that it is an incomparably potent weapon for entrenching inequality further, controlling the powerless, and ensuring corrupted outcomes.

The tide that was supposed to lift all ships has, in fact, left startling numbers of Americans underwater. In the process, we lost any sense that a common set of rules applies to everyone, and so there is no longer a legitimizing anchor for the vast income and wealth inequalities that plague the nation.

That is what has changed, and a growing recognition of what it means is fueling rising citizen anger and protest. The inequality under which so many suffer is not only vast, but illegitimate, rooted as it is in lawlessness and corruption. Obscuring that fact has long been the linchpin for inducing Americans to accept vast and growing inequalities.  That fact is now too glaring to obscure any longer.

Glenn Greenwald is a former constitutional and civil rights litigator and a current contributing writer at Salon.com. He is the author of two New York Times bestselling books on the Bush administration's executive power and foreign policy abuses. His just-released book, With Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful (Metropolitan Books), is a scathing indictment of America's two-tiered system of justice.  He is the recipient of the first annual I.F. Stone Award for Independent Journalism.

Copyright 2011 Glenn Greenwald

Immunity and Impunity in Elite America