Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

1935-Edward-Snowden-Gives-John-Oliver-Vital-Password-Protection.jpg

CIA whistleblower Edward Snowden who leaked thousands of classified documents has recently been interviewed a number of times and recently he confessed that he hadn’t thoroughly looked at the sensitive information before leaking them for publication despite knowing they were “harmful”.

Snowden was backed into a corner by the British host of Last Week Tonight John Oliver, who flew to Moscow to interview the ex-CIA systems administrator. Edward Snowden and an unlikely interviewer have squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.

Snowden, the former NSA contractor who has released thousands of classified documents since 2013 and has been charged with espionage by the US government, has lived in Russia for the past one and a half years to avoid prosecution.
Oliver, like his former boss Jon Stewart, has a knack for using comedy to transform complicated issues, such as Net neutrality and now the NSA's spying, into easier-to-grasp subjects. While much of Snowden interview focused on Oliver's typical comical take on politics, things did turn contentious at one point when the HBO host challenged Snowden on whether he read all of the documents he handed over to journalists.
"I have evaluated all of the documents that are in the archive," Snowden said in response to Oliver asking him how many of the thousands of NSA documents he had read. After Oliver pushed him on whether he actually read each document, Snowden provided a non-answer, saying that he does "understand" what he handed over.
Oliver pounced, saying there's a "difference between understanding what's in the documents and reading what's in the documents." He went on to argue that actually reading the documents is important, given the significance of the material that Snowden leaked.
"Well, in my defense, I'm not handling anything anymore," Snowden argued. Oliver pressed on, saying that Snowden should take responsibility for handing over any documents "that could be harmful."
Snowden did acknowledge that the release of information can be harmful "if people act in bad faith" or if the information is handled -- as Oliver described it -- with "incompetence." Oliver specifically pointed to an improperly redacted document published by The New York Times that allowed anyone to see how the US government was combating al-Qaeda operatives in Mosul, Iraq. Snowden acknowledged that the redaction issue was a "problem."

The interview has taken some by surprise, considering Oliver, a former writer and guest host for the comedy news series "The Daily Show," has used his HBO show to take a comical stance on real-world politics. However, he often includes commentaries that, while still comedic, take a strong stance on topics.

After making Snowden squirm for five minutes or so, Oliver retreated back to his comedic side. He showed Snowden videos of people on the streets who were asked if they knew who Edward Snowden was. Nearly all of them guessed incorrectly, with some identifying him as the man behind Julian Assange's WikiLeaks.

In typical fashion, Oliver was able to illustrate a point through his comedy. He argued that Americans generally don't care as much about NSA surveillance -- especially foreign spying -- as Snowden would like.

Oliver turned his attention to the difference in interest between the Snowden leaks and last year's leak of nude celebrity pictures caused by an apparent hack of Apple iCloud accounts. Nude images of celebrities hit the Web, causing a frenzy. Oliver brought the issue full circle to Snowden, arguing that what Americans care most about -- indeed, more than how the NSA operates -- are "dick pics."

Oliver again showed Snowden a video featuring people on the streets who were interviewed on whether they would take issue with the NSA gaining access to private photos. Nearly all of them said they would have a problem with it.
With Snowden's help, Oliver went through the various NSA programs that have been leaked through his data dump, including Prism and Upstream, to see whether such pictures could be obtained and viewed by the NSA. In each case, Snowden explained how the programs could allow for such private pictures to be collected and viewed by NSA officials.
"Yeah, this is something where it's not actually seen as a big deal in the culture of NSA," Snowden said in response to a question on the collection and viewing of naked pictures of people within the government agency. "Because you see naked pictures all the time."

Oliver's intention was clear: to make the impact of Snowden's leaks easier for the average person to understand. Snowden agreed it takes real technical know-how to appreciate how the NSA collects information. Conveying that in short sound bites is nearly impossible, he said.
"When you send your junk through Gmail, that's stored on Google's servers," Snowden said, explaining one way in which a "pic" could find its way to the NSA through the government's Prism program. "Google moves data from data center to data center -- invisibly to you without your knowledge -- your data could be moved outside the borders of the United States, temporarily. When your junk was passed by Gmail, the NSA caught a copy of that."

The NSA did not immediately respond to a request for comment.

CNET

« US: Comcast Ultra-fast Internet by 2016
French Media’s Emergency Meeting After Isis Hack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.