Permanent Record(79)



I could easily justify needing to use these stolid, reliable boxes by claiming that I was trying to make sure Heartbeat worked with older operating systems. After all, not everybody at every NSA site had one of the new “thin clients” just yet. And what if Dell wanted to implement a civilian version of Heartbeat? Or what if the CIA, or FBI, or some similarly backward organization wanted to use it? Under the guise of compatibility testing, I could transfer the files to these old computers, where I could search, filter, and organize them as much as I wanted, as long as I was careful. I was carrying one of the big old hulks back to my desk when I passed one of the IT directors, who stopped me and asked me what I needed it for—he’d been a major proponent of getting rid of them. “Stealing secrets,” I answered, and we laughed.

The Read phase ended with the files I wanted all neatly organized into folders. But they were still on a computer that wasn’t mine, which was still in the Tunnel underground. Enter, then, the Write phase, which for my purposes meant the agonizingly slow, boring-but-also-cripplingly-scary process of copying the files from the legacy Dells something that I could spirit out of the building.

The easiest and safest way to copy a file off any IC workstation is also the oldest: a camera. Smartphones, of course, are banned in NSA buildings, but workers accidentally bring them in all the time without anyone noticing. They leave them in their gym bags or in the pockets of their windbreakers. If they’re caught with one in a random search and they act goofily abashed instead of screaming panicked Mandarin into their wristwatch, they’re often merely warned, especially if it’s their first offense. But getting a smartphone loaded with NSA secrets out of the Tunnel is a riskier gambit. Odds are that nobody would’ve noticed—or cared—if I walked out with a smartphone, and it might have been an adequate tool for a staffer trying to copy a single torture report, but I wasn’t wild about the idea of taking thousands of pictures of my computer screen in the middle of a top secret facility. Also, the phone would have had to be configured in such a way that even the world’s foremost forensic experts could seize and search it without finding anything on it that they shouldn’t.

I’m going to refrain from publishing how exactly I went about my own writing—my own copying and encryption—so that the NSA will still be standing tomorrow. I will mention, however, what storage technology I used for the copied files. Forget thumbdrives; they’re too bulky for the relatively small amount they store. I went, instead, for SD cards—the acronym stands for Secure Digital. Actually, I went for the mini-and micro-SD cards.

You’ll recognize SD cards if you’ve ever used a digital camera or video camera, or needed more storage on a tablet. They’re tiny little buggers, miracles of nonvolatile flash storage, and—at 20 x 21.5 mm for the mini, 15 x 11 mm for the micro, basically the size of your pinkie fingernail—eminently concealable. You can fit one inside the pried-off square of a Rubik’s Cube, then stick the square back on, and nobody will notice. In other attempts I carried a card in my sock, or, at my most paranoid, in my cheek, so I could swallow it if I had to. Eventually, as I gained confidence, and certainty in my methods of encryption, I’d just keep a card at the bottom of my pocket. They hardly ever triggered metal detectors, and who wouldn’t believe I’d simply forgotten something so small?

The size of SD cards, however, has one downside: they’re extremely slow to write. Copying times for massive volumes of data are always long—at least always longer than you want—but the duration tends to stretch even more when you’re copying not to a speedy hard drive but to a minuscule silicon wafer embedded in plastic. Also, I wasn’t just copying. I was deduplicating, compressing, encrypting, none of which processes could be accomplished simultaneously with any other. I was using all the skills I’d ever acquired in my storage work, because that’s what I was doing, essentially. I was storing the NSA’s storage, making an off-site backup of evidence of the IC’s abuses.

It could take eight hours or more—entire shifts—to fill a card. And though I switched to working nights again, those hours were terrifying. There was the old computer chugging, monitor off, with all but one fluorescent ceiling panel dimmed to save energy in the after-hours. And there I was, turning the monitor back on every once in a while to check the rate of progress and cringing. You know the feeling—the sheer hell of following the completion bar as it indicates 84 percent completed, 85 percent completed … 1:58:53 left … As it filled toward the sweet relief of 100 percent, all files copied, I’d be sweating, seeing shadows and hearing footsteps around every corner.



* * *



EXECUTE: THAT WAS the final step. As each card filled, I had to run my getaway routine. I had to get that vital archive out of the building, past the bosses and military uniforms, down the stairs and out the empty hall, past the badge scans and armed guards and mantraps—those two-doored security zones in which the next door doesn’t open until the previous door shuts and your badge scan is approved, and if it isn’t, or if anything else goes awry, the guards draw their weapons and the doors lock you in and you say, “Well, isn’t this embarrassing?” This—per all the reports I’d been studying, and all the nightmares I’d been having—was where they’d catch me, I was sure of it. Each time I left, I was petrified. I’d have to force myself not to think about the SD card. When you think about it, you act differently, suspiciously.

Edward Snowden's Books