Summary of "The Rest Is Classified" Episode 44: "The Leak That Changed The World: Stealing State Secrets (Ep 2)"
Release Date: May 6, 2025
Introduction
In Episode 44 of The Rest Is Classified, titled "The Leak That Changed The World: Stealing State Secrets (Ep 2)," hosts David McCloskey and Gordon Corera delve deeper into the enigmatic journey of Edward Snowden. Building upon the foundation laid in the previous episode, this installment examines Snowden's transition from a seemingly disaffected contractor to the pivotal figure behind one of the most significant intelligence leaks in modern history.
Snowden's Role and Personality in Hawaii
By 2012, Edward Snowden found himself stationed in Hawaii, working as an infrastructure analyst for Booz Allen Hamilton under contract with the NSA. Gordon Corera describes Snowden as an "eccentric" figure, recalling colleagues' memories of him as a "pale vampiric figure wearing a hoodie" adorned with a parody of the NSA logo (04:00). Snowden's personal workspace was notable for holding a copy of the U.S. Constitution, symbolizing his internal conflict with the very institution he served.
David McCloskey adds, “He kept a copy of the Constitution on his desk. So you do get a picture of a man who is perhaps at odds with his institution” (04:00). This duality paints Snowden as both a dedicated employee and a man grappling with deep-seated ideological concerns.
Motivations: Ideology vs. Grievance
A central theme of the discussion revolves around Snowden's motivations for leaking classified information. Gordon posits, "What explains his journey? How far is it about grievance and how far is it about ideology?" (01:20). David echoes this sentiment, highlighting Snowden's "extremly certain" ideological beliefs juxtaposed with a growing sense of personal grievance.
Gordon further explores this dichotomy, suggesting that Snowden's actions post-June 2012 were driven by a combination of personal frustrations and a belief that the NSA's surveillance programs were unconstitutional and unethical (05:35). However, David is skeptical, labeling Snowden's motives as "impure" and arguing that his actions were more about revenge than purely ideological concerns (06:50).
The Start of the Leak: Conflict in June 2012
The episode details a critical incident in June 2012 that served as a catalyst for Snowden's decision to leak classified information. A dispute over a failed software patch escalated, leading Snowden to raise concerns beyond his immediate chain of command. David notes, “He sends a note like three or four levels above the chain to a senior NSA employee at Fort Meade... and he gets a quick rebuke from Washington. His behavior is, quote, totally unacceptable, unacceptable in all caps” (07:14).
This confrontation underscored Snowden's increasing frustration with the NSA's internal processes and his belief that internal channels were ineffective for addressing his grievances.
Methodology of Stealing Documents
Snowden's methodical approach to exfiltrating classified data is meticulously examined. Gordon explains that Snowden utilized his privileged access as a systems engineer to compile a vast repository of documents, dubbed "Heartbeat" (07:23). To avoid detection, Snowden employed old legacy PCs and transferred the data onto small SD cards, which he ingeniously concealed within Rubik's Cubes—earning him the nickname "Rubik's Cube guy" among colleagues (23:25).
David criticizes this method, describing Snowden's approach as “completely indiscriminate,” highlighting the sheer volume of documents—up to 1.5 million—that Snowden managed to steal (26:21). The hosts discuss the feasibility of such an operation, emphasizing the transformative impact of digital data on espionage and security protocols.
Scale and Indiscriminate Nature of the Leak
One of the most striking aspects of Snowden's leak was its scale. David dramatizes the magnitude by stating, “If you stack those up, measure that, you will understand, five kilometers high” (26:49). This hyperbolic imagery underscores the unprecedented volume of data Snowden accessed and extracted. Gordon adds that Snowden’s scraping tools were "more or less completely indiscriminate," capturing vast swaths of NSA data, much of which was unrelated to the surveillance programs that purportedly motivated him (26:21).
This indiscriminate approach raised questions about Snowden's intent: Was he selectively targeting specific programs, or was he aiming to expose as much information as possible?
Approach to Disseminating the Information
Unlike other whistleblowers or leakers, Snowden chose not to release the documents directly to platforms like WikiLeaks. Instead, he opted to work with established journalists, believing this would provide a more controlled and responsible dissemination of the information. Gordon asserts, “He thinks journalists will give him a bit more protection... he seeks to expose what he sees as the surveillance state” (28:34).
David appreciates this choice, noting, “I'm grateful that Edward Snowden did not go the WikiLeaks route” and suggesting it was a strategic move to ensure he remained the face of the revelations (29:33). This decision highlights Snowden's desire for accountability and narrative control, contrasting sharply with the more anarchic approach of direct leaks.
Critical Analysis: "Deadly Sins"
Throughout the episode, David and Gordon introduce a critical framework they refer to as "Deadly Sins" to evaluate Snowden's actions:
-
Fabrication of Narratives: David points out Snowden's tendency to exaggerate his access, referencing a fabricated quote about having "practically unlimited access" to global communications (00:48).
-
Impure Motives: They argue that Snowden's actions were driven by a mix of grievance and ideology, questioning the purity of his intentions (06:50).
-
Failure to Utilize Official Channels: David criticizes Snowden for not leveraging existing whistleblower protections and formal channels, deeming his approach as irresponsible given the sensitive nature of the leaked information (12:48).
-
Indiscriminate Leaking: As discussed earlier, the vast and non-selective extraction of data is labeled a critical flaw in Snowden's methodology (26:21).
These "Deadly Sins" provide a structured critique, suggesting that while Snowden's motivations might have noble aspects, his methods and actions reveal significant ethical and procedural shortcomings.
Conclusion
Episode 44 of The Rest Is Classified offers a comprehensive and nuanced exploration of Edward Snowden's transformation from a disillusioned contractor to a key figure in global intelligence leaks. Through detailed analysis and critical commentary, David McCloskey and Gordon Corera illuminate the complexities of Snowden's motivations, methods, and the far-reaching implications of his actions. By examining both the technical aspects of the leak and the moral dilemmas it presents, the episode provides listeners with a deeper understanding of one of the most controversial figures in modern espionage.
Notable Quotes
-
David McCloskey (00:48): "I had practically unlimited access to the communications of nearly every man, woman and child on earth who ever dialed a phone or touched a computer."
-
Gordon Corera (04:00): "He kept a copy of the Constitution on his desk."
-
David McCloskey (06:50): "This is impure motives. This is critical to understand..."
-
Gordon Corera (26:21): "He is going to take almost everything he can lay his hands on about what the NSA and its allies do."
-
David McCloskey (29:33): "I'm grateful that Edward Snowden did not go the WikiLeaks route."
This structured summary captures the essence of Episode 44, providing an insightful overview for listeners and readers alike.
