Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

1935-Edward-Snowden-Gives-John-Oliver-Vital-Password-Protection.jpg

CIA whistleblower Edward Snowden who leaked thousands of classified documents has recently been interviewed a number of times and recently he confessed that he hadn’t thoroughly looked at the sensitive information before leaking them for publication despite knowing they were “harmful”.

Snowden was backed into a corner by the British host of Last Week Tonight John Oliver, who flew to Moscow to interview the ex-CIA systems administrator. Edward Snowden and an unlikely interviewer have squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.

Snowden, the former NSA contractor who has released thousands of classified documents since 2013 and has been charged with espionage by the US government, has lived in Russia for the past one and a half years to avoid prosecution.
Oliver, like his former boss Jon Stewart, has a knack for using comedy to transform complicated issues, such as Net neutrality and now the NSA's spying, into easier-to-grasp subjects. While much of Snowden interview focused on Oliver's typical comical take on politics, things did turn contentious at one point when the HBO host challenged Snowden on whether he read all of the documents he handed over to journalists.
"I have evaluated all of the documents that are in the archive," Snowden said in response to Oliver asking him how many of the thousands of NSA documents he had read. After Oliver pushed him on whether he actually read each document, Snowden provided a non-answer, saying that he does "understand" what he handed over.
Oliver pounced, saying there's a "difference between understanding what's in the documents and reading what's in the documents." He went on to argue that actually reading the documents is important, given the significance of the material that Snowden leaked.
"Well, in my defense, I'm not handling anything anymore," Snowden argued. Oliver pressed on, saying that Snowden should take responsibility for handing over any documents "that could be harmful."
Snowden did acknowledge that the release of information can be harmful "if people act in bad faith" or if the information is handled -- as Oliver described it -- with "incompetence." Oliver specifically pointed to an improperly redacted document published by The New York Times that allowed anyone to see how the US government was combating al-Qaeda operatives in Mosul, Iraq. Snowden acknowledged that the redaction issue was a "problem."

The interview has taken some by surprise, considering Oliver, a former writer and guest host for the comedy news series "The Daily Show," has used his HBO show to take a comical stance on real-world politics. However, he often includes commentaries that, while still comedic, take a strong stance on topics.

After making Snowden squirm for five minutes or so, Oliver retreated back to his comedic side. He showed Snowden videos of people on the streets who were asked if they knew who Edward Snowden was. Nearly all of them guessed incorrectly, with some identifying him as the man behind Julian Assange's WikiLeaks.

In typical fashion, Oliver was able to illustrate a point through his comedy. He argued that Americans generally don't care as much about NSA surveillance -- especially foreign spying -- as Snowden would like.

Oliver turned his attention to the difference in interest between the Snowden leaks and last year's leak of nude celebrity pictures caused by an apparent hack of Apple iCloud accounts. Nude images of celebrities hit the Web, causing a frenzy. Oliver brought the issue full circle to Snowden, arguing that what Americans care most about -- indeed, more than how the NSA operates -- are "dick pics."

Oliver again showed Snowden a video featuring people on the streets who were interviewed on whether they would take issue with the NSA gaining access to private photos. Nearly all of them said they would have a problem with it.
With Snowden's help, Oliver went through the various NSA programs that have been leaked through his data dump, including Prism and Upstream, to see whether such pictures could be obtained and viewed by the NSA. In each case, Snowden explained how the programs could allow for such private pictures to be collected and viewed by NSA officials.
"Yeah, this is something where it's not actually seen as a big deal in the culture of NSA," Snowden said in response to a question on the collection and viewing of naked pictures of people within the government agency. "Because you see naked pictures all the time."

Oliver's intention was clear: to make the impact of Snowden's leaks easier for the average person to understand. Snowden agreed it takes real technical know-how to appreciate how the NSA collects information. Conveying that in short sound bites is nearly impossible, he said.
"When you send your junk through Gmail, that's stored on Google's servers," Snowden said, explaining one way in which a "pic" could find its way to the NSA through the government's Prism program. "Google moves data from data center to data center -- invisibly to you without your knowledge -- your data could be moved outside the borders of the United States, temporarily. When your junk was passed by Gmail, the NSA caught a copy of that."

The NSA did not immediately respond to a request for comment.

CNET

« US: Comcast Ultra-fast Internet by 2016
French Media’s Emergency Meeting After Isis Hack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.