Edward Snowden is seen on a screen as he speaks via video conference with members of the Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe during an hearing on "mass surveillance" in Strasbourg, April 8, 2014.
"United States of Secrets," a new PBS Frontline airing tonight, explores 'the dramatic inside story of the U.S. government’s massive and controversial secret surveillance program—and the lengths they went to trying to keep it hidden from the public.'
Part of that story is highlighted on PRI's 'The World' radio show today. After 9/11, the National Security Agency wanted new ways to spy on electronic interactions in the US. "The Program, as it was called, spied on telephones, Internet connections, metadata from emails and almost every form of electronic communication."
But when The Program began, there were people in the NSA and others who questioned its legality, including Department of Justice attorney Thomas Tamm. His father and uncle worked at the Federal Bureau of Investigation. There’s even a photo of 8-year-old Tamm with J. Edgar Hoover. Tamm worked at the Foreign Intelligence Surveillance Court and authorized warrants. And he saw items coming across his desk of investigations and snooping that lacked probable cause. He started to wonder how the NSA was getting the information.
He asked around, but many don’t want to talk about it. His colleagues felt like something illegal was going on. “He sees this and says, ‘There is something not very kosher here, I don’t know what exactly is going on,’ and begins to worry about it,” Kirk recounts.
Tamm claims he tried to blow the whistle on the subject, working with New York Times reporter James Risen to make the story public. But Risen’s editors decided to run the story by the government. They wanted to get the government’s take, before the Times revealed “The Program.” Kirk says top White House officials made three arguments to Times editors, in trying to convince them not to run the story.
1. It’s completely legal.
2. It’s a vulnerable secret. If you reveal it, hundreds of thousands of Americans may die in a future attack.
3. It’s working. You wouldn’t believe the threats we’re stopping.
Former Editor Bill Keller spiked the story, outraging Risen.
Where are our petabyte drives? Brian Hayes takes us through the reasons storage is “stuck” in the low terabytes. The tl;dr is that we got such exceptional capacity growth in the late 90s and early 00s we don’t need much more right now, so the focus since then has been on SSDs, networking, interfaces, etc, […]
Amélie Lamont, a former staffer at website-hosting startup Squarespace, writes that she often found herself disregarded and disrespected by her colleagues. One comment in particular, though, set her reeling — and came to exemplify her experiences there.
In this episode of the Flash Forward podcast we travel to a future where humans have decided to eradicate the most dangerous animal on the planet: mosquitos. How would we do it? Is it even possible? And what are the consequences? Flash Forward: RSS | iTunes | Twitter | Facebook | Web | Patreon We […]
If you’ve got a killer app idea, but don’t have the technical expertise to pull it off, get a crash course in all things app development with the Comprehensive Android Development Bundle, now over 90% off in the Boing Boing Store. Across 83 hours of training, you’ll learn to develop for the world’s most popular mobile OS, mastering […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]