Barton Gellman ’82 was among a small handful of journalists who earlier this year published bombshell revelations about the U.S. government’s electronic-surveillance practices, based on documents leaked by former National Security Agency contractor Edward Snowden. The stories prompted a national debate over how far the government should go in tracking telephone and electronic communications under the banner of protecting national security — and what should be reported about the actions. Gellman published the stories in The Washington Post, where he had spent years covering national-security issues. A two-time Pulitzer Prize winner, Gellman wrote Angler: The Cheney Vice Presidency, and is now working on a book about the evolution of U.S. surveillance since the 9/11 attacks. He is a senior fellow at the Century Foundation as well as a freelance contributor to the Post and Time magazine. Gellman spoke with PAW in October.
Did you realize when Snowden first contacted you that the story was the real deal?
My first instinct was that this was probably the real thing. It looked good, and it kept looking better with each interaction. But I did have significant doubts for a substantial period of time. There’s an old expression that extraordinary claims require extraordinary evidence. I had to distinguish what I was seeing from a couple possible ways it could have gone wrong. Was it put together by a very close student of the public record who just added on top of that in a plausible way? Was it someone with ill intent offering a false story? I’d seen any number of scenarios over the years. In our early interactions, he [Snowden] demonstrated his knowledge — he didn’t give up much, but enough to continue the conversation.
Did you have concerns or qualms about pursuing this story?
There was no doubt I was interested in it and that I was going to pursue it if it proved to be authentic. I have been acutely aware from the beginning that this is a very sensitive matter, and that some of it, if exposed, really would do damage to operations that almost anyone would support. There was stuff in what he gave me that, if I published it, people would say, “That’s really cool — we didn’t know they could do that, and we’re glad they’re doing that.”
Were you concerned about your own legal situation?
This story raised all kinds of legal issues, so I have been talking to lawyers at every stage of it. There is a much more aggressive anti-leaks campaign in this administration, so I wanted to consider the risk of being subpoenaed. And there are all kinds of other hypothetical concerns. I wanted to go down the line and say we’re sticking to the letter and the spirit of the law while also doing our jobs as journalists.
Do you believe that your own communications are monitored? How do you deal with that?
I assumed that if my anonymous source was who he purported to be, his communications could certainly be monitored. So we took every precaution one can take. He was trying to blow the whistle on a surveillance state without being surveilled himself, which is tricky. On the other hand, he knew about surveillance from the inside, and he let me know how to communicate securely. I already knew how to use many of these tools and had been worrying about protecting my confidential sources and notes for 10 years now.
Did you change how you operated as a result of what he revealed?
I’ve learned more about what works and what doesn’t. Everyone who understands security knows it all depends on what the threat model is. You have all this jargon — “reduce your attack surface,” “layers of security,” “raise the cost of surveillance for the other side.” But no one can say that if you did all this, you’d guarantee you wouldn’t be surveilled. People who promise that are quacks.
What I reconfirmed for myself by looking through the Snowden material is that if an entity with the capability of the U.S. government is willing to devote resources to you as a target, they will get what they want. There is no complete technological answer. You can raise the bar — legally, technically, by using defensive resources — but at the end of the day, they can still do it. I’ve always taken considerable precautions, but I’m taking even more now.
What percentage of the material Snowden provided did you decide not to reveal?
I can’t go there.
With 20-20 hindsight, would you have handled the story any differently?
There are a few things on the margins that I can’t talk about. But on the whole, I’m quite happy with the way things have gone. I wish I could have moved faster in some ways, but this was not a story for speed. I’ve spent most of the last 20 years covering national security, but this was by far the most complicated and difficult set of journalistic and national-security and legal decisions I’ve ever been faced with. I’ve taught about national–security secrets at Princeton and made public lectures, so I was reasonably well prepared. But this was a 100-year storm. It was sui generis. WikiLeaks had more documents — quite a bit more than we did — but none of them were classified as higher than “Secret.” I’ve seen U.S. Navy laundry manuals classified as secret. It’s not a stamp you put on stuff when you really care about it. But the Snowden stuff is all “Top Secret” and above.
You come out of a background as a mainstream journalist, whereas Glenn Greenwald, another journalist who worked with Snowden, is more from the activist mold. How did that shape your approach to covering the story?
I approached it the same way I always have as a journalist, with verification and thinking through what the public interest is. Generally speaking, I have been writing the facts as I see them without saying what I think the policy should be. The book I’m writing will have more of a point of view, and that’s more appropriate for a book.
Have you personally decided where the proper line is for government surveillance, or do you go back and forth?
Everyone should be grateful I’m not in charge. As a citizen, there are times when I am bothered by what I’m seeing, and am surprised and disturbed by the degree of intrusiveness. And also as a citizen, I’m bothered by the dishonesty of the U.S. government about what’s going on, both at the professional and the political level. There has been a succession of statements that turned out to be false under any normal definition of the term. Officials have used specifics in extraordinarily deceptive ways, and I think it’s not OK to do something like that on behalf of the public.
Transparency serves the public good in deciding how we should draw the line. Transparency is what allows political debate about regulation and legislation. Surveillance depends to a certain extent on what the private sector does, and previously, the private sector had no reason to object. There was almost no functioning market for privacy before, because there wasn’t enough information to drive demand. We didn’t know what the threats were, and so the companies had no big reason to address them. Now the big Internet companies are beginning to compete on privacy. In specific response to one of my stories, Yahoo announced that it would begin encrypting all its Web Mail connections in January. Google, which had done that long ago, now says it will also encrypt the links that connect its data centers around the world. The list goes on.
Do you think Snowden’s concern for privacy is genuine?
I think it’s very clear, whether you agree with him or not, that he is acting out of idealistic motives and that he believes what he’s saying. He’s taken enormous risks and paid an enormous price for it. One of the things I do with any source is pay close attention to their motives. I’m alert to exaggeration, self-aggrandizement, self-promotion, and hidden agendas. This guy believed he was witnessing an out-of-control surveillance state. And as we’ve seen, it hasn’t been beyond the pale of American public opinion, because when it became public, people welcomed the debate. The director of national intelligence and the president and the NSA have felt obliged to say that having this debate is a good thing, even if it shouldn’t have come about this way. Interview conducted and condensed by Louis Jacobson ’92
8 Responses
Randolph Hobler ’68
8 Years AgoWhistle-blowing and Security
Both Princeton alums — Robert Deitz *72 and Michael Mantyla ’93, both from the intelligence community — who claim that Edward Snowden had legal channels he could have pursued to report wrongdoing in the National Security Agency (Inbox, March 5) are right. There are channels. But this system is rigged to the hilt to ensure no whistle-blower ever gets a fair trial.
To cite just one example, former NSA executive Thomas Drake disclosed massive fraud, waste, and abuse in NSA surveillance programs. He was charged with espionage. 1) He was not allowed to defend himself in open court before a jury. 2) He had to spend $100,000 on legal fees even before pretrial proceedings began. He had to take out a second mortgage on his house and emptied his retirement account to pay for subsequent fees. 3) The government files things in secret, under seal that the defendant is not allowed access to. 4) The law precluded Drake from arguing that any information was classified improperly. 5) During response filings, his attorney was not allowed a laptop or phone and was not even allowed to take notes.
Anyone who’s had the experience of trying to fight city hall at any level, much less at this high government level, knows that these repeated choruses of “Snowden should have gone through channels” are utter nonsense.
The system does not tolerate whistle-blowers. It chews them up, spits them out, and ruins their lives. Snowden obviously knew this. He knew that unless he did something, no one would say anything, and the abuses would continue and grow.
David H. Shore *76
8 Years AgoPrivacy and Leaks
As deputy chief of the National Security Agency’s Media Leaks Task Force, I was disheartened by the April 2 issue’s negative responses to the previous issue’s letters from my former colleague, Bob Deitz *72, and from Michael Mantyla ’93. The responses indicated a lack of faith in all three branches of our government.
I take the opposite view. If President James Madison 1771 came back to Earth today, I think that he would be proud of how our democracy has evolved, including our contentious Congress. He also would appreciate how our government, on the whole, continues to learn from past lessons and improve its obligation to self-regulate. As for PAW’s Jan. 8 special issue on privacy, the tone about government overreach shocked me the most, perhaps because I have been cloistered in the intelligence community for the past 38 years. I, too, am highly concerned about how the advances in information technology and the proliferation of publicly available personal information can permit intrusion by the government — the government of Russia or China, that is.
When it comes to our intelligence community and the NSA in particular, we fully support the president’s Jan. 17 decision on privacy. I am pleased to cite the comments about the NSA’s workforce by constitutional law professor Geoffrey Stone, an ACLU adviser and a member of the Presidential Review Group. In an April 1 Huffington Post article, he stated that the NSA is “an organization that operates with a high degree of integrity and a deep commitment to the rule of law.”
Many alumni probably are tired of the media leaks and privacy subject. But for those who remain interested and concerned, I am willing to engage in a dialogue at Princeton forums on the issue and clarify how the NSA really operates. Perhaps this year’s Reunions would be a good start.
Bruce E. Schundler ’70
8 Years AgoPrivacy and Leaks
Unfortunately, I agree with Randolph Hobler ’68 (Inbox, April 2) completely. Most agencies of the government do a good job of complying with the sections of the Whistleblower Protection Act that mandate effective education and training in the act, but they do nothing to enforce it, they don’t discipline violators of the law, and if anything, they participate in the retaliation that inevitably occurs against anyone who reports “waste, fraud, and abuse” as they are supposed to do.
On my family’s website, I’ve described what happened to my wife and me as park rangers for the National Park Service (www.schundler.net). If our “reward” for writing the inspector general’s office about abuses and waste in one small park of the National Park Service resulted in not being rehired (as we were supposed to be) and then not getting any support from anyone in the government until the Office of Special Counsel had to prosecute our case (successfully), imagine what happens in other agencies, and in cases where much more significant problems are being exposed!
In the final analysis, what Edward Snowden did was wrong, but what is even more wrong is a Whistleblower Protection Act that is not enforced in almost every agency of the government — which then drives people to take more drastic (and sometimes illegal) action.
Andrew J. Lazarus ’79
8 Years AgoWhistle-blowing and Security
Reading the recent letters excoriating Bart Gellman ’82 (Q&A, Jan. 8), I am reminded of the wisdom of James Madison 1771 (Federalist 51): “If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary. In framing a government which is to be administered by men over men, the great difficulty lies in this: You must first enable the government to control the governed; and in the next place oblige it to control itself.”
I am sure the American security officials believe their measures are necessary to protect us from terrorists, even though to keep us safe they cannot tell us how or why. But Gellman and his source, Edward Snowden, show us that we suffer a secret surveillance network answering to secret (lax) protocols nominally enforced by secret (complacent) courts that moreover are secretly ignored (spying on love interests, etc.). Secret internal controls on government do not work; they have never worked. The maligned eavesdroppers of the East German Stasi kept their country safe from terrorists and insurrectionists, but I choose to live in the United States, and I would like open, published, enforced limits on government’s right to snoop on my phone calls without a warrant.
Charles W. McCutchen ’50
8 Years AgoWhistle-blowing and Security
Robert L. Deitz and Michael Mantyla say Edward Snowden should have gone to his agency’s inspector general. Have inspectors general ever taken the whistle-blowers’ side against the agencies that pay their salaries?
Both writers believe we are menaced by sinister forces that would do us ill. But we have learned again and again that people everywhere are most hurt by their leaders, ours included. Driven by vanity and corrupted by power, they scheme with and against each other in secret until wars result. Perhaps by publishing their plans, present and future Snowdens may stop the progression from planning to war.
Michael Mantyla ’93
8 Years AgoReporting on Surveillance
As a federal government employee with almost 20 years of service in both the law-enforcement and intelligence communities, I would note that within government, there are multiple mechanisms to report abuses of power, from each agency’s office of inspector general to reporting directly to the congressional oversight committees. Edward Snowden very easily could have availed himself of these mechanisms, but made the choice to violate federal law and illegally disclose classified material.
All federal employees take an oath to protect the Constitution of the United States against all enemies, foreign and domestic. Post 9/11, this oath has become especially salient for those who have the job of protecting the United States from future attacks in the homeland and elsewhere. Analysts work around the clock using any and all tools to prevent this from happening. The analysts I know would never use the extensive intelligence-collection tools at their disposal for personal or political gain. Any organization occasionally will have individuals who violate the oath, and federal agencies must develop the safeguards to identify these individuals and take swift and immediate action when warranted.
The intelligence community, by its nature, must remain clandestine to effectively provide U.S. policy makers with the information they need to protect us. Our government was founded on checks and balances, and all three branches of government currently play an active part in intelligence oversight. Contrary to Professor Edward Felten’s prerogative that “we” should make choices about the appropriateness of government surveillance programs, I believe that spreading sunshine in the black world of intelligence collection would do nothing more than give our adversaries the upper hand in future terrorist operational planning.
Jim DiOrio ’73
8 Years AgoReporting on Surveillance
As I read the features on privacy in the Jan. 8 edition, all I could think about was my late roommate, Bob Capuano ’73, working diligently on his junior paper for his fall Woodrow Wilson School conference on “The Boundaries of Privacy in American Society.” Bob’s paper, along with those of classmates Steve Glauberman, Eric Vinson, Marilyn Green, Rich Nenno, Alex Hartnett, Betsy Freeman, Michael Theodore, Bob Wolf, and Mark Stevens, became the basis for the Alito Princeton Privacy Report.
This report was named after the senior, Sam Alito ’72, who chaired the conference and later became a Supreme Court justice. I am very proud of my classmates for being way ahead of their time in analyzing issues such as “Federal Agencies Involved in Domestic Surveillance” and “Technology and the Control of Stored Data.” Pretty heady work for a bunch of 20-year-olds in 1971.
Robert L. Deitz *72
8 Years AgoReporting on Surveillance
With respect to your interview with Bart Gellman ’82 on the Edward Snowden leaks (Q&A, Jan. 8), a couple of points:
First, Gellman seems to have had little concern about publishing information that is classified at the highest level. Why? He claims that he thought through “what the public interest is ... .” Fair enough. But in our political system, the president, who is elected by the people, is charged with determining how and if government information is classified. Bart was not elected by anybody. Moreover, he has few, if any, qualifications for determining what the public interest is. His notional “public” well might conclude that keeping the nation safe is more important than revealing information that is certainly of great interest — to our enemies.
Second, Gellman claims to have “st[uck] to the letter and the spirit of the law ... .” Puhleeze! By his own admission, Snowden committed a number of felonies. Under at least some theories of the law, Gellman was an aider and abettor.
Third, Gellman tries to turn Snowden into a folk hero because he “believed he was witnessing an out-of-control surveillance state.” Had Snowden really felt that way, there were numerous outlets, wholly legal, that would have given his views a full and sympathetic airing: the National Security Agency and Defense Department inspectors general, the Department of Justice, the Hill intel committees, and the U.S. attorney’s office. But they would not have afforded him what he apparently desperately wants: the ego stroke that going public provides. It is worth at least asking the question whether an honorable person would violate an oath of office to keep secrets that have been entrusted to him.
Finally, to be sure, “transparency serves the public good” in many contexts. But transparency with respect to the conduct of intelligence may be incredibly costly. It might have been worthwhile for your interviewer to ask Gellman what price he is willing to pay for telling our adversaries the sources and methods we employ for obtaining intelligence.