Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

1935-Edward-Snowden-Gives-John-Oliver-Vital-Password-Protection.jpg

CIA whistleblower Edward Snowden who leaked thousands of classified documents has recently been interviewed a number of times and recently he confessed that he hadn’t thoroughly looked at the sensitive information before leaking them for publication despite knowing they were “harmful”.

Snowden was backed into a corner by the British host of Last Week Tonight John Oliver, who flew to Moscow to interview the ex-CIA systems administrator. Edward Snowden and an unlikely interviewer have squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.

Snowden, the former NSA contractor who has released thousands of classified documents since 2013 and has been charged with espionage by the US government, has lived in Russia for the past one and a half years to avoid prosecution.
Oliver, like his former boss Jon Stewart, has a knack for using comedy to transform complicated issues, such as Net neutrality and now the NSA's spying, into easier-to-grasp subjects. While much of Snowden interview focused on Oliver's typical comical take on politics, things did turn contentious at one point when the HBO host challenged Snowden on whether he read all of the documents he handed over to journalists.
"I have evaluated all of the documents that are in the archive," Snowden said in response to Oliver asking him how many of the thousands of NSA documents he had read. After Oliver pushed him on whether he actually read each document, Snowden provided a non-answer, saying that he does "understand" what he handed over.
Oliver pounced, saying there's a "difference between understanding what's in the documents and reading what's in the documents." He went on to argue that actually reading the documents is important, given the significance of the material that Snowden leaked.
"Well, in my defense, I'm not handling anything anymore," Snowden argued. Oliver pressed on, saying that Snowden should take responsibility for handing over any documents "that could be harmful."
Snowden did acknowledge that the release of information can be harmful "if people act in bad faith" or if the information is handled -- as Oliver described it -- with "incompetence." Oliver specifically pointed to an improperly redacted document published by The New York Times that allowed anyone to see how the US government was combating al-Qaeda operatives in Mosul, Iraq. Snowden acknowledged that the redaction issue was a "problem."

The interview has taken some by surprise, considering Oliver, a former writer and guest host for the comedy news series "The Daily Show," has used his HBO show to take a comical stance on real-world politics. However, he often includes commentaries that, while still comedic, take a strong stance on topics.

After making Snowden squirm for five minutes or so, Oliver retreated back to his comedic side. He showed Snowden videos of people on the streets who were asked if they knew who Edward Snowden was. Nearly all of them guessed incorrectly, with some identifying him as the man behind Julian Assange's WikiLeaks.

In typical fashion, Oliver was able to illustrate a point through his comedy. He argued that Americans generally don't care as much about NSA surveillance -- especially foreign spying -- as Snowden would like.

Oliver turned his attention to the difference in interest between the Snowden leaks and last year's leak of nude celebrity pictures caused by an apparent hack of Apple iCloud accounts. Nude images of celebrities hit the Web, causing a frenzy. Oliver brought the issue full circle to Snowden, arguing that what Americans care most about -- indeed, more than how the NSA operates -- are "dick pics."

Oliver again showed Snowden a video featuring people on the streets who were interviewed on whether they would take issue with the NSA gaining access to private photos. Nearly all of them said they would have a problem with it.
With Snowden's help, Oliver went through the various NSA programs that have been leaked through his data dump, including Prism and Upstream, to see whether such pictures could be obtained and viewed by the NSA. In each case, Snowden explained how the programs could allow for such private pictures to be collected and viewed by NSA officials.
"Yeah, this is something where it's not actually seen as a big deal in the culture of NSA," Snowden said in response to a question on the collection and viewing of naked pictures of people within the government agency. "Because you see naked pictures all the time."

Oliver's intention was clear: to make the impact of Snowden's leaks easier for the average person to understand. Snowden agreed it takes real technical know-how to appreciate how the NSA collects information. Conveying that in short sound bites is nearly impossible, he said.
"When you send your junk through Gmail, that's stored on Google's servers," Snowden said, explaining one way in which a "pic" could find its way to the NSA through the government's Prism program. "Google moves data from data center to data center -- invisibly to you without your knowledge -- your data could be moved outside the borders of the United States, temporarily. When your junk was passed by Gmail, the NSA caught a copy of that."

The NSA did not immediately respond to a request for comment.

CNET

« US: Comcast Ultra-fast Internet by 2016
French Media’s Emergency Meeting After Isis Hack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.