Glenn Greenwald: NSA Believes It Should Be Able To Monitor All Communication

Play associated audio

Glenn Greenwald, the Pulitzer Prize-winning journalist who helped to break stories about mass surveillance in the United States, is making more revelations in a new book coming out Tuesday.

In an interview with NPR's Morning Edition, Greenwald says one of the more "shocking" things he's found is that the National Security Agency physically intercepted shipments of computer hardware, like routers, switches and servers, to outfit them with surveillance equipment.

Once they were done, they repackaged the hardware with "factory sealing" and sent it on its way to unsuspecting companies.

Greenwald says that for years, the United States has been warning global companies about buying Chinese products because they could be outfitted with surveillance hardware. This revelation, Greenwald says, exposes "an extreme form of gross hypocrisy" on the part of the U.S. government.

Of course, all of this reporting is rooted in a massive cache of classified documents leaked by former NSA contractor Edward Snowden. Greenwald, along with reporters from The Guardian and The Washington Post, have used those documents to provide details on the NSA's use of mass surveillance. The reporting has led to congressional hearings, sweeping reports and an effort from President Obama to rein in some of the NSA's ability to collect metadata on the phone calls of all Americans.

Greenwald says no one disputes that the NSA should be trying to intercept communications sent by al-Qaida and its affiliates, but that the system has grown too powerful.

The problem, he tells Steve Inskeep, is that "a system has been built without our knowledge that has incredible dangers embedded within and very few controls."

One example Greenwald writes about in his book, No Place to Hide, is about the NSA trying to make sure it could tap into conversations that were originating from airplanes.

Greenwald says there was no particular security reason the NSA wanted to do this.

"It's just simply the fact that they do not think anybody should be able to communicate anywhere on the Earth without they being able to invade it," Greenwald says.

During the wide-ranging conversation, Steve asks him if he expects anything to change because of his reporting. Back in 2005, The New York Times, for example, reported on the government's collection of Americans' phone records without a court order. Congress reacted by making that type of intelligence-gathering legal.

Greenwald says he doesn't expect Congress to reform the NSA. But this is different, he says. Back in 2005, the story was national. Today, the story is about the U.S. domination of the Internet, which makes it a global issue.

When you have friendly countries like Germany, France and Brazil and big companies like Facebook protesting mass surveillance, things might just change, Greenwald says.

Much more of Greenwald's conversation with Steve will be on Monday's Morning Edition. Click here for your local NPR member station. We'll add the as-aired version of the interview later this morning.

Copyright 2014 NPR. To see more, visit http://www.npr.org/.

NPR

With 'Formation,' Beyoncé Lights Up The Internet. Here's What People Are Saying

The singer's new music video quickly drew commentary of all kinds — on its references to being black in America, Hurricane Katrina and Black Lives Matter.
NPR

Calif. Restaurant Gives Diners — And Sea Lions — An Ocean View

The Marine Room is a restaurant right on the beach. When the tide is high, waves hit the windows, and bring in unexpected visitors.
NPR

In The Light Of The Morning After, How Bad Was Rubio's Repetition?

"I would pay for them to keep running that clip, because that's what I believe passionately," Rubio said of a much-aired video excerpt if him repeating a line at Saturday's debate.
NPR

Super Bowl 50 Tightens Cybersecurity

This year's Super Bowl will be held in the most technologically advanced stadium in the world. FBI special agent John Lightfoot talks to NPR's Rachel Martin about the threat of cyber attacks.

Leave a Comment

Help keep the conversation civil. Please refer to our Terms of Use and Code of Conduct before posting your comments.