Permanent Record(73)
It’s only in this context that the US government’s latitudinal relationship to leaking can be fully understood. It has forgiven “unauthorized” leaks when they’ve resulted in unexpected benefits, and forgotten “authorized” leaks when they’ve caused harm. But if a leak’s harmfulness and lack of authorization, not to mention its essential illegality, make scant difference to the government’s reaction, what does? What makes one disclosure permissible, and another not?
The answer is power. The answer is control. A disclosure is deemed acceptable only if it doesn’t challenge the fundamental prerogatives of an institution. If all the disparate components of an organization, from its mailroom to its executive suite, can be assumed to have the same power to discuss internal matters, then its executives have surrendered their information control, and the organization’s continued functioning is put in jeopardy. Seizing this equality of voice, independent of an organization’s managerial or decision-making hierarchy, is what is properly meant by the term “whistleblowing”—an act that’s particularly threatening to the IC, which operates by strict compartmentalization under a legally codified veil of secrecy.
A “whistleblower,” in my definition, is a person who through hard experience has concluded that their life inside an institution has become incompatible with the principles developed in—and the loyalty owed to—the greater society outside it, to which that institution should be accountable. This person knows that they can’t remain inside the institution, and knows that the institution can’t or won’t be dismantled. Reforming the institution might be possible, however, so they blow the whistle and disclose the information to bring public pressure to bear.
This is an adequate description of my situation, with one crucial addition: all the information I intended to disclose was classified top secret. To blow the whistle on secret programs, I’d also have to blow the whistle on the larger system of secrecy, to expose it not as the absolute prerogative of state that the IC claimed it was but rather as an occasional privilege that the IC abused to subvert democratic oversight. Without bringing to light the full scope of this systemic secrecy, there would be no hope of restoring a balance of power between citizens and their governance. This motive of restoration I take to be essential to whistleblowing: it marks the disclosure not as a radical act of dissent or resistance, but a conventional act of return—signaling the ship to return back to port, where it’ll be stripped, refitted, and patched of its leaks before being given the chance to start over.
A total exposure of the total apparatus of mass surveillance—not by me, but by the media, the de facto fourth branch of the US government, protected by the Bill of Rights: that was the only response appropriate to the scale of the crime. It wouldn’t be enough, after all, to merely reveal a particular abuse or set of abuses, which the agency could stop (or pretend to stop) while preserving the rest of the shadowy apparatus intact. Instead, I was resolved to bring to light a single, all-encompassing fact: that my government had developed and deployed a global system of mass surveillance without the knowledge or consent of its citizenry.
Whistleblowers can be elected by circumstance at any working level of an institution. But digital technology has brought us to an age in which, for the first time in recorded history, the most effective will come up from the bottom, from the ranks traditionally least incentivized to maintain the status quo. In the IC, as in virtually every other outsize decentralized institution that relies on computers, these lower ranks are rife with technologists like myself, whose legitimate access to vital infrastructure is grossly out of proportion to their formal authority to influence institutional decisions. In other words, there is usually an imbalance that obtains between what people like me are intended to know and what we are able to know, and between the slight power we have to change the institutional culture and the vast power we have to address our concerns to the culture at large. Though such technological privileges can certainly be abused—after all, most systems-level technologists have access to everything—the highest exercise of that privilege is in cases involving the technology itself. Specialist abilities incur weightier responsibilities. Technologists seeking to report on the systemic misuse of technology must do more than just bring their findings to the public, if the significance of those findings is to be understood. They have a duty to contextualize and explain—to demystify.
A few dozen or so of the people best positioned to do this in the whole entire world were here—they were sitting all around me in the Tunnel. My fellow technologists came in every day and sat at their terminals and furthered the work of the state. They weren’t merely oblivious to its abuses, but incurious about them, and that lack of curiosity made them not evil but tragic. It didn’t matter whether they’d come to the IC out of patriotism or opportunism: once they’d gotten inside the machine, they became machines themselves.
22
Fourth Estate
Nothing is harder than living with a secret that can’t be spoken. Lying to strangers about a cover identity or concealing the fact that your office is under the world’s most top-secret pineapple field might sound like it qualifies, but at least you’re part of a team: though your work may be secret, it’s a shared secret, and therefore a shared burden. There is misery but also laughter.