Narrator with the story of the man who exposed it all. Snowden said he was risking his freedom and possibly his life. This was a stupendous intelligence breach. Narrator and the convergence of government surveillance and an information revolution. The googles, the facebooks collect as much of our Sensitive Data as possible. But anything you hand to a private company is potentially the governments. Narrator tonight on frontline. Corporate america and the National Security state know so much about us, and we know so little about them. Narrator privacy lost, part two of United States of secrets. Frontlinis made possible by contributions to your pbs station from and by the corporation for public broadcasting. Major support for frontliis provided by the john d. And catherine t. Macarthur foundation, committed to building a more just, verdant and peaceful world. More information is available at macfound. Org. Additional funding is provided by the park foundation, dedicated to heightening Public Awareness of critical issues. The wyncote foundation. And by the frontline journalism fund, with major support from john and Jo Ann Hagler and Additional Support from chris and lisa kaneb and bill and cile hicks. Narrator hong kong, may 2013. Nsa contractor Edward Snowden was holed up deep inside the crowded kowloon district. He chose hong kong, he would say later, because he trusted the chinese would not betray him to u. S. Authorities. Before leaving his home in hawaii, he had downloaded a huge store of top secret files from the nsas internal networks, and he had sent many of them through encrypted channels to a few journalists he trusted. Two of them, Glenn Greenwald of the guardian and documentary filmmaker laura poitras, came to the mira hotel to meet him. Greenwald and poitras wanted to be sure snowdens story was rock solid. And they needed to work fast. We knew that this was incredibly consequential and that it was super important that we get it right. Um. But also, there was always this kind of uncertainty, one might even say danger, hovering over the room. Because we didnt know what the nsa knew about what he was doing. We didnt know what the chinese and hong kong governments knew about him being there. So we thought it was very possible that the door could be barged down at any moment. Narrator the guardian also sent a Senior Correspondent to vet their source. I asked him, do you mind if i tape the interview on an iphone . And as soon as he saw the iphone, it was like bringing out a microphone direct into the nsa headquarters. He was totally appalled. And he said, get that out of the room as quickly as possible. Narrator even then, snowden still worried that someone might be recording them. He would often put a blanket over his head when he wanted to enter this Computer System to prevent overhead cameras from picking up the passwords to the encryption. Narrator as snowden explained more about the tens of thousands of documents, macaskill listened carefully. I was sort of warming to the idea that, you know, this guy was for real. Narrator one of the first files they discussed was this one. It directed Verizon Business services to turn customer phone records over to the nsa. The journalists were stunned. What this document revealed is that the nsa Surveillance System is not directed at very bad people or about terrorists. Its directed at the american citizenry and other citizenries around the world, indiscriminately, in bulk. Narrator the document directly contradicted what director of National Intelligence general James Clapper had said before Congress Just a few months earlier. Does the nsa collect any type of data at all on millions or hundreds of millions of americans . No, sir. It does not . Not wittingly. There are cases where they could inadvertently, perhaps, collect, but not wittingly. I think for snowden, the clapper testimony was the final nail in the coffin. Watching president obamas top National Security official go before the Senate Intelligence committee and outright lie about what the nsa was doing convinced him, i think, beyond any shadow of a doubt, that the only hope for public discussion and reform was for him to do what he was going to do. cars honking narrator at tguardians new york bureau, senior editors received a message from hong kong. phone ringing i sent a message saying the guinness is good, which meant snowden is for real. And one of the deputy editors in new york said when he saw those words come over, he just went, fantastic, weve got a real story. Narrator the guardian decided to publish the story as fast as possible. They called the white house and gave them four hours to comment. I remember well getting the phone call. And it was one of these situations where it almost took us a few minutes to get our minds around how big of a leak this was and how comprehensive the set of revelations were. We had very little time to react. Narrator they sounded the alarm and reached out to an nsa official, john delong. I have two computers on my desk a classified computer and an unclassified computer. And im used to seeing that document on the classified computer. And i did a real double take. I remember just sitting there for 30 seconds checking and rechecking to see what computer this classified document appeared on. The gravity of it was quite palpable, and i thought, this is going to be a really tough story as it comes out. Narrator at tguardian, editorinchief Janine Gibson took a return call from the white house. She has the deputy head of the nsa and the white house on the phone, and they essentially are trying to persuade her not to publish. The white house tactic was one of, okay, come and see us, lets talk about this, and you can chat to our officials and we can discuss what might be published and what might not. Janine has her own script, which is to say, look, if you have any significant objections, objections on the grounds of National Security, then tell us. Now is the moment to tell us. And of course, they dont. They just want to stall her. Narrator the guardian refused to wait. The british newspaper the guardian reports that verizon is providing phone records of some businesses to the u. S. Government. Narrator it was just the beginning. At the washington posreporter Barton Gellman the only other reporter to receive documents directly from snowden was working on another story. Before publishing, he contacted the nsa. I sent notes to two highranking people and a spokesperson in government and said, i have something very sensitive to talk to you about. Narrator the story concerned another nsa program called prism. Documents showed how beginning in 2007, nine Internet Companies were cooperating with the nsa. Gellman wanted to make sure his reporting wouldnt damage National Security. We very much did want to know what they thought would do concrete harm, and how, and why. And the u. S. Government asked me not to publish the names of the Nine Companies that were supplying information to the government in the Prism Program. And i said, why . Their argument was that if we publish the names, then the companies would be less inclined to cooperate. And i guess we agreed to disagree on that one. The Washington Post is reporting that the. Narrator the post went ahead. Narrator the prism revelations reached beyond the collection of phone records. This was about the acquisition of content from tens of thousands of nsa targets. Did you check your account on gmail . Secret spying program is. The Prism Program is not about metadata. Its about content. Its the photos and videos you send. Its the words of your emails. Its the sounds of your voice on a skype call. Its all the files you have stored on a cloud drive service. Its content, its everything. Narrator the president was on a fundraising trip in Silicon Valley. At a press conference, he agreed to take one question about the leaks. Good morning, everybody. Im going to take one question. I dont want the whole day to just be a bleeding press conference but im going to take Jackie Calmes question. Mr. President , could you please react to the reports of secret government surveillance of phone and internet, and can you also assure americans that your government doesnt have some massive secret database of all their personal online information and activities . Yeah. What the Intelligence Community is doing is looking at phone numbers and durations of calls. They are not looking at peoples names and theyre not looking at content. Narrator the president tried to downplay the revelations. Now, with respect to the internet and emails, this does not apply to u. S. Citizens and it does not apply to People Living in the United States. In the abstract, you can complain about big brother and how this is a potential, you know. You know, program run amok. But when you actually look at the details. In hong kong, snowden was sitting with three people under contract with the guardian. They were sitting there on the bed watching the reaction on cnn. They are not looking at peoples names and theyre not looking at content. Obama was saying the nsa isnt listening to the telephone calls or reading the emails of americans, which is absolutely wrong. There were documents that we had that proved president obamas claims in that regard were false. And we just could tell, as well, that he at that moment didnt have any idea of the true magnitude of what was coming, given how dismissive and casual his tone was. Thank you very much, guys. Narrator snowden now decided to make a bold move. He would reveal his identity, posting a video he had recorded a few days earlier. Laura set up the camera. Glenn was asking the questions. And normally snowden wore a tshirt, and glenn says, can you not find a shirt . And snowden went off and found the grey shirt. My name is ed snowden. Im 29 years old. I worked for Booz Allen Hamilton as an infrastructure analyst for nsa in hawaii. What we see is someone who is calm, rational, persuasive. The nsa specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them. The language was clear, sympathetic. And when he did the interview it was as if he was a media natural. So we knew that when snowden went public it was going to be a huge story. Why should people care about surveillance . Because even if youre not doing anything wrong, youre being watched and recorded. And he sets out why hes done this thing, what his motives are, and basically sort of puts the ball in the court of the public and says, you make up your minds as to whether this is right or not. These things need to be determined by the public, not by somebody who is simply hired by the government. This is the truth. This is whats happening. You should decide whether we need to be doing this. Edward snowden, according to the guardian, is in hong kong. Who leaked the existence of nsa programs. woman speaking chinese three weeks ago after copying a last set of documents. We knew that the minute we unveiled his identity that he was going to have to go into hiding, because the media horde was about to descend onto hong kong and would be looking for him. And the u. S. Government would certainly be looking for him. At that point he knew it was untenable. Some enterprising journalist had put up on twitter the pictures of the hotel room and says, does anybody recognize these light fittings . And someone was able to establish it was the mira. Snowden is believed to. The mira hotel is just across the harbor. So snowden knew they were on their way, so about midday he left his hotel room. Um, and there was definitely a kind of air of sadness over our last meeting, because i assumed that the next time i saw him, he was going to be in u. S. Custody on a television screen. Narrator snowden left it to the journalists to decide which documents to publish, and then he disappeared into the crowded streets of hong kong. For two weeks, he managed to elude the worlds press corps. Hiding in hong kong. Apparently still in hong kong. Narrator and to avoid u. S. Authorities. Edward snowdens been charged with two counts of espionage. This guy is a traitor, hes a defector. Narrator on june 23, Edward Snowden set off for south america via russia. Transit through russia, supposedly hes headed for ecuador. He ended up in russia for one very simple reason, and that is that the United States government forced him to stay there by preventing him from leaving. Snowden is believed to be holed up inside moscows airport. He could no longer get a ticket and leave russia because his passport had been revoked by the u. S. Government. People may die as a consequence of what this man did, and anybody who wants to make him a hero is misjudging how they stay safe. The man on the run from u. S. Authorities. One of the greatest Security Breaches in american history. Russia has granted Edward Snowden asylum. Edward snowden was granted asylum in russia. Less likely he will ever see inside of a u. S. Courtroom. Narrator back in the u. S. , at nsa headquarters, the news hit hard. Headline, and it has grown bigger. It was hard to read in the press, nsa is lawless, nsa out of control. None of those resonate with us. Thats not us. Thats not what we are aiming towards. Thats not how we hold ourselves accountable. Our ultimate goal is to prevent things from. Bad things from happening to ensure the National Security. You want to draw the box differently . You want to have the Security Community work in a smaller box . I got it. But before you do that, you got to understand, you got to understand what the costs might be. I mean, we live inside a democracy. And, you know, the public will matters in a democracy. I just hope its informed public will. And frankly, when the decisions are made, you understand the costs. We have to strike the right balance between protecting our security and preserving our freedoms. Narrator the president did what executives in the midst of a controversy often do. Review of our surveillance programs. Narrator he appointed a panel. So i am tasking this independent group to step back. Narrator this one to review the nsas programs. And they will provide an interim report in 60 days and a final report by the end of this year, so that we can move forward with a better understanding. The president s directions were, go wherever you want. You can see any classified program. No one can deny you any information. You can go anywhere in the Intelligence Community. You can recommend anything. Except, realize that what i wont accept is any block between me and my constitutional oath of defending the United States. The highly classified program is codenamed prism. The guardiand the Washington Post both reporting that the National Security agency. Narrator on the other side of the country, in Silicon Valley, there was anger and confusion over just what kind of access major Internet Companies were giving the nsa. There was shock and disbelief and horror. A lot of people i know, Silicon Valleytype people, just felt, it cant be right. Its not possible google, facebook, these guys are collaborating. Its not just what they would do. The ceos of Internet Companies like facebook and google denied. Narrator the companies scrambled to respond to the news. Google denies that they have direct access. Whos right . They freaked out because theyd never heard of a program called prism. And they were not letting the nsa get direct access to their servers. They were cooperating with a secret program that they really couldnt describe in sufficient detail to their customers. These nsa folks are saying. They saw here a big threat to their image, to their business model, which relies on people to trust them with their communications. And they started issuing quite heated statements, taking issue with the idea that they would be just handing over free access to the nsa. Narrator but then there was more bad news. The Washington Post, citing documents stolen and released by Edward Snowden. Narrator prism was only part of what the nsa was up to. Narrator in a program called muscular, the nsa was secretly extracting data from fiber optic cables overseas, where intelligence operations are much less restrained by surveillance laws. Prism was a front door. Prism was the court saying, you have to cooperate with the nsa and give specific information when asked. Now, they find out that through the backdoor, the government is actually breaking into their infrastructure and taking whatever they want. They cant intentionally look for a u. S. Persons information unless they believe its a legitimate foreign target. But otherwise theyre free to collect it at. Pretty much unrestricted abroad. They can hack into companies internal networks and collect information in bulk. Narrator the nsa did this by invoking a reaganera president ial order, from a time long before the modern internet. The nsa decided it was okay under executive order 12333 and with the backing of the Justice Department and the white house to break into the private links, the private data links that connect the data centers of google and yahoo around the world. Youre collecting a very large fraction of the whole planets internet traffic. And that includes a very large number of americans. The project identified by the code name muscular. We do not just tap into lines in the United States. Overseas, the ability to do that in bulk is critical for finding the communications of people who are trying to hide. If you can look for certain patterns and dive into those communications, you find people utterly unknown to you who are very dangerous. Narrator google was shocked. They had leased what they thought were secure data lines. The idea that one of our own Government Agencies would go out and essentially break into googles own data streams to go beyond what google thought had been a skeptical and resistant, but nevertheless cooperative relationship, i find that quite shocking. That is sort of a betrayal of the relationship that i think google felt like it had with the government. Narrator the leaked files even showed the nsa operatives bragging about their accomplishment. There was one slide, the internal nsa slide, showing a little diagram how it worked. It sort of boasted about it and it put a little smiley face there. This little, you know, like emoji, gotcha. You know, saying, you know, ha ha, you know, we figured out a way to get that information. Narrator google, which had a better record than most companies on encryption, was criticized for leaving its internal data lines vulnerable. I dont know why google wasnt encrypting the information traveling between their data centers. But we know that they werent and we know that the nsa revelations have prompted them to make massive changes in the way their systems work. And theyre now trying to encrypt that data on a Crash Program to get all of that information encrypted. Narrator the nsa will now have a harder time reading googles data without googles knowledge. Obviously, the National Security agency did not design its programs on the assumption that they would be exposed. Much of this damage is down to snowden, who is quite deliberately causing as much harm to u. S. Companies and the u. S. National interest as he possibly can, leaking these stories in media that are most likely to hype them in ways that will be damaging to the United States. Narrator it should have been no surprise that the nsa would be digging into the companies data. Immediately after 9 11, the companies had been warned. This new law that i sign today will allow surveillance of all communications used by terrorists, including emails, the internet and cell phones. As of today well be able to better meet the technological challenges posed by this proliferation of communications technology. Narrator with the signing of the patriot act in 2001, a new era of intelligence gathering and surveillance had been set in motion. The American People need to know that we are collecting a lot of information and we are spending a great deal of time trying to gather as much intelligence as we possibly can to chase down every lead, to run down every hint so that we can keep america safe, and its happening. Narrator it was happening, but it was veiled from public view. In San Francisco in the summer of 2002, a technician at at t, mark klein, was one of the first to witness something. There was some speculation of some kind of spying they are doing, having to do with the new era of fighting terrorism or something. But nobody knew. Narrator then one day an agent of the National Security agency showed up to talk to one of kleins supervisors. I happened to answer the door. He comes in. Hes wearing a business suit, looking very stern and not smiling at all. Thats all i knew about it and i thought i would never hear about this ever again. Narrator but later, inside this at t facility, klein noticed something unusual on the sixth floor. Its room 641a, says on the door. And whats mysterious about it is there is no door handle. So it looks kind of odd. Narrator klein began to investigate. I traced the cabling coming out of the room. I could not find direct cabling going from the secret room to the phone switch. The cabling all seemed to go upstairs. Narrator upstairs on the seventh floor was where at t handled internet traffic. What mark klein found was an infrastructure that suggested that the government was copying all traffic going through the at t internet backbone. Narrator klein got hold of engineering drawings that showed the cables he had traced were going to a device called a splitter. The splitter is basically a glass prism. So you put a cable in there. The light beam goes in there and its split like that. One half is going to the secret room and the other half is going to its normal, assigned destination. But its been copied in the process. And this was important because if one can split the light or divert the light out of one of those networks, one can copy everyones traffic on the network. Its kind of an unfathomable amount of information. The internet chops everything up into little data packets. So theres your email, your web browsing, photos you might be sending. This was a huge dragnet operation. And i was furious because i never signed up to work for the nsa. But i was in my late 50s and i didnt want to lose my job. So i was stuck. And i was afraid. Narrator klein was afraid to speak out for several years. The New York Times broke the story about the National Security agency spying inside. Narrator but went public after reading a front page new york timstory about nsa spying in 2005. When mark klein came out and said, i work at at t and the nsa is tapping into our network, that was the first time that the American Public realized how far things had gone since 9 11. How much domestic surveillance there was. He raised this allegation. No one ever acknowledged that it was actually happening. It still remains an open question. But no one has ever denied it either. Do you remember the incident in San Francisco where the technician mark klein had found the room with the splitter . Vaguely. What was that about . Im not going to talk about that. Was it a Legal Program . Absolutely legal, yes. It was . Mmhmm. Was it part of warrantless wiretapping . sighs i dont think so. Was it under a fisa court order . Im not going to get into that. To the best of my knowledge, its still a classified program and im not here to divulge National Security information. One of the big stories this week the National Security agencys collection. Narrator news stories on warrantless wiretapping brought unwanted attention to the telecom companies. Mr. Whitacre, has at t provided customer information to any Law Enforcement agency . Senator, we protect the privacy of our customers and we follow the law. Thats all i can say about that. Are you declining to answer my question, mr. Whitacre . We follow the law, senator. Does at t provide customer information to any Law Enforcement agency . We follow the law, senator. That is not an answer. At t, verizon, the bell phone companies, have seen themselves in a kind of partnership with the government for almost 100 years. Im telling you we dont violate the law. We follow the law. Thats a legal conclusion. For almost 70 years, the government guaranteed them a monopoly. Im asking you for a factual matter. And so they have always been and continue to be faithful handmaidens of the governments will. If youre under instructions by the federal government as a matter of state secrecy not to talk, say so. Senator, we follow the law. Surveillance assistance is now in the structure of these companies. Its something theyre very comfortable with. Theres no ceo of a Telephone Company thats losing sleep over the wiretap assistance that theyre providing to Law Enforcement or the Intelligence Community. Narrator the new t companies, on the other hand, were less comfortable cooperatig with the government. But even be the nsas Prism Program, they too had been complying. One ceo, however, decided to fight back. In 2004, i got a phone call from the fbi. And they said that they had a letter for me. And within an hour or two, an agent had come to handdeliver a letter to me. The fbi handed him a letter. He looked at the letter, and it asked for what he describes as a significant array of information from his company. And he noticed that it didnt appear to have been signed by a judge. It didnt appear to be a regular court order. It was not a warrant. It was not stamped or signed by a court or a judge. It was this letter demanding this information from me, and it also told me that i could never tell anyone that i had gotten the letter. It said that i could tell no person. Narrator nick merrill ran a small Web Hosting Company in new york named calyx. It was a company that i started in 1994. We hosted mitsubishi motors, ikea, snapple, tanqueray you know, blue chip clients. And we hosted a lot of independent media and nonprofit organizations that seemed like good people that i wanted to help, and that was really where my passion was. Narrator the letter merrill received was a National Security letter, or nsl. After 9 11, the patriot act allowed any fbi office in the country to issue nsls without a courts review and with a gag order. It said he couldnt tell anyone about this letter at all. And that gag order is part of what made him concerned about going even to a lawyer. To be honest with you, i was terrified to talk to anyone about it, so i didnt. I didnt call any of my colleagues, i didnt speak to anyone about it. It was clear to me that this was an official and genuine document, but i thought that it was not legal and not constitutional. And so i decided to disobey the commandment that i couldnt tell anyone, and i called my lawyer. Narrator merrill enlisted the aid of the American Civil Liberties union to challenge the letter in court. I had doubts myself about whether i was doing the right thing, but what gave me confidence was the fact that we offered to give them the information if they would simply get a real warrant and the fact that they refused to get one. Narrator that same year, the fbi issued 56,000 National Security letters, but merrill was the first person who had challenged a letter on constitutional grounds. He was an independent operator of an Internet Company who really cared about privacy and the trust of his users. Most companies are not in that business. Most companies are Offering Services to large numbers of users and dont really want to deal with some kind of lengthy legal fight. To litigate is expensive. When youre getting tens of thousands of these letters a year, to litigate any substantial number of them is ruinous. Besides which, the Big Companies that are receiving these letters have regulatory business before the u. S. Government and they dont want to annoy the authorities. Narrator until 2013, no major internet or phone company is known to have questioned the constitutionality of a National Security letter. I think that nick challenged that is fantastic. I would love it if google had challenged that. Why didnt they . I have no clue. No idea. I mean, the number of people at google who can know about the existence of the letter is arguably, like, two or three. You know, presumably its the lawyer who has been designated to receive them. So maybe two people at google would know about it. You look at it on its face, it looks like it relates to National Security, so you comply. Narrator finally, in 2013, google did challenge 19 nsls. By that time, the fbi had withdrawn merrills National Security letter after an Appeals Court ruled it unconstitutional. I think that they were afraid that we would make it to the Supreme Court and they were not 100 certain that they would get the answer that they want. The fbi dropped its request, but whats interesting is that hes still not able to talk about exactly what they requested other than that it was information. And he says that if we knew what had been requested that we would be shocked. Narrator the big Internet Companies had different priorities. At the same time as the government was expanding its intelligence gathering, the companies were trying to find out as much as possible about their users, amassing huge data troves. The nsa was watching. These companies are in a very difficult spot because the types of activities they engage in is very similar to surveillance. It is surveillance, just for advertising rather than for Law Enforcement. The private sector is where the whole game is. I remember i was talking to someone at google and i was like, you mean you keep all that stuff, all those things i search for . And he said, well, yeah. Narrator from the beginning, google founders larry page and sergey brin had discovered that web searches were very revealing and very valuable. Every search is in some sense an expression of intention. Its an expression of what you want to do, where you want to go, what youre looking for. And that maps very nicely with the desire of advertisers to target their messages towards people at the moment when they are intending to go buy something. Narrator from a simple search box, google struck gold. I think its the most effective product the internet has ever seen. Googles ads were so effective that all of a sudden, their problem was hiding how much money they made so that microsoft and other competitors didnt come after them. Narrator page and brin would make billions. But it was their 2004 launch of gmail with vastly more storage than Microsofts Hotmail and yahoo mail that immediately sparked controversy for how it mined email content. They would scan your mail and try to figure out if there was a relevant ad they could show you alongside the mail. They said, were going to basically recover our costs and make a profit by showing ads when you send email or when you receive email. And in order to determine what ads to show you, they read your emails. There was a wave of negative news stories, comments, blog posts and so forth that came out that day. And the alarm bell was really rung by privacy advocates who said, we cannot allow this to go forward. This is crossing a rubicon. You cannot scan our emails. And google tried to assure them, really, no, no, its not people. You know, were just scanning the mail. Other places scan your mail for spam, you know, so were really not even doing anything different by that. Were just showing you ads. And a lot of people just felt it was creepy. If i were to go attach alligator clips to the phone wire, itd be a felony. Id go to prison for that. What gmail proposed was exactly that a kind of wiretap of all email looking at the content to pitch advertising in real time. Narrator at google, Andrew Mclaughlin got a phone call. I got a phone call from a staffer for a state senator in california named liz figue a. The staffer said, senator figueroa is deeply concerned about this practice of targeting ads to email messages. Shes very much interested in pursuing legislation that would ban this practice, and could we have a conversation . We walk into this room, and its myself and two of my staff my chief of staff and one of my attorneys and across from us was larry sergey and their attorney. All of a sudden, sergey started talking to me. He said, senator, how would you feel if a robot went into your home and read your diary and read your financial records, read your love letters, read everything, but before leaving the house, it imploded . He said, thats not violating privacy. I immediately said, of course it is. Yes, it is. And he said, no, it isnt. Nothings kept. Nobody knows about it. I said, that robot has read everything. Does that robot know if im sad or if im feeling fear or whats happening . And he looked at me and he said, oh no, that robot knows a lot more than that. Narrator believing that google would never retain the information they collected, senator figueroa backed off and amended her bill. Unbeknownst to me, ultimately they were going to store the information, and thats why they were against it. And i think it was also, we dont want legislators interrupting our business model. They were going to move forward. And the whole Tech Industry went against the bill. I believe then and still do that gmail was a privacy disaster. The moment you allow people to look at the content of your communication for some advertising purpose is the moment that the government is going to come along and say, if youre going to let them listen in for advertising, why dont you let us listen in for antiterrorism or for serious crimes . And it becomes very difficult for courts to say that the private sector can listen in but the government cant. Narrator in fact, much more listening and looking was about to happen. How big an impact has facebook had on our lives . Its huge. Half a billion users. I mean, in terms of sheer volume, this is remarkable. My friends at the fbi say that they love facebook. They love it. It is a fantastic tool to see who one communicates and associates with, what theyre interested in, etcetera. Facebook realized that with the allure of a social network, people were willing to tell them just about everything about themselves. Advertisers are willing to pay for information about people and facebook has so much data about its members, so they got into this personal data business collecting information about you and allowing advertisers to access it in order to sell you targeted ads. Narrator with millions of people posting on facebook, the executives at google became worried. There was a deep sense of anxiety inside google that facebook was nailing a new kind of interaction that google was proving to be very clunky at doing. And i suspect that they thought, well shoot, facebook has Something Better to sell to advertisers. We need to boost our data trove too. And i think what happens is that its a race to build the best database. And so it begins what you might call the data wars the idea that to really win in this game, you need to have the most data possible. Narrator to muster more firepower, google had bought a leading Internet Advertising Company doubleclick. The doubleclick acquisition consolidated the fact that google was an advertising company. They really became the most powerful company in the internet ad world after that. One google executive told me that they made a staggering, that was his word, amount of money from tracking where youd been on the web. Narrator doubleclick had pioneered and refined the tracking of peoples web browsing. When you go to a website, the website has the opportunity to drop a little file onto your computer called a cookie. Its basically a tracking number. Its just a id number attached to you. And anytime you go to another website that sees that id number, they know, oh, its that same person. So a cookie is a unique identifier set by any website that your computer interacts with. And to be clear, it doesnt have to be the website that youre visiting. You visit any given site and your computer will interact with dozens, if not hundreds, of servers run by different companies. Narrator today, all the big Internet Companies use advanced tracking technology. And the nsa has carefully studied their methods. For them, commercial tracking is an opportunity. The nsa sees all this data thats flowing to these advertisers, and theyre thinking, look at all this data about peoples behavior thats just flying out there to hundreds of different parties, and oftentimes not encrypted. And so they can just snatch it. Narrator at tWashington Post, bart gellman was going through his snowden files, thousands upon thousands of them, unpacking highly technical terms, engineering jargon and computer code. Then one day, he came across this slide. At first, he couldnt understand it. He consulted with his colleague, Internet Security expert ashkan soltani. The slide indicated the use of a specific google cookie its called the pref cookie thats set by google. Even if youve never been on google. Com, in fact, when you turned on your computer and opened the browser, you were likely to get one of these cookies. And we found out that the nsa was piggybacking on that. But of course, if youre an nsa collections manager and you want to know, how do i figure out, you know, where bart was or whether hes changed devices or all this other kind of information about him . Why dont i just go and get that information that conveniently has been collected for me by Silicon Valley companies who do it for their own commercial motives . Because googles using a tracking cookie, the nsa can sit back and see all that stuff go by. They can monitor all of that activity, all those cookies, and use it in order to track your browsing activity or inject malware into your computer. And if they sent you malware, it would take over your computer and let them access all your data, all your keystrokes, all your passwords, etcetera. Narrator before publishing, the reporters called google for comment. And google pushed back very hard. They said, you should not be associating our commercial ad Cookie Technology with u. S. Government surveillance. And ashkan said, we can prove it. We can prove that theyre using this, that the nsa is piggybacking on your technology. And i had their own material indicating how its used to track people and how its an identifier. So we were going back and forth, and the google person was insisting that this is not a tracking cookie. And i said, look, heres some links. This is your own video on youtube that you made in 2007 about this cookie and how its an identifier. Cookies remind us of your preferences from the last time you visited. Narrator as the article went to press, google emailed an editor at the newspaper, claiming that soltani had received funds from a Foundation Known for supporting privacy projects. Soltani says he never received the alleged funding. It was a personal hit on me, and that really surprised me, that they would go after me personally. And so my editor talked to google and said, is anything technically wrong with the story . And the person said, no. In fact, it was very technically accurate. Narrator the article had revealed the privacy risks associated with advertising. Frontline asked google for an interview, but they declined. All of the major Internet Companies we called in the course of reporting this program refused to participate. Google, apple, twitter, yahoo, facebook, just some of the names represented over at the white house. Narrator on december 17, 2013, executives from Silicon Valley went to the white house. The heads of some of the countrys Top Tech Companies speaking with the president. Narrator they had been called in to advise the president on how to fix the administrations troubled health care website. That meeting was supposed to be mainly about healthcare. Gov, but the tech officials refused to go along with that agenda, and they made the nsa stuff the number one subject there. And they, you know, expressed pretty clearly how unhappy they were with the position that theyd been put in. They raised strong objections with president obama. The heads and general counsels of major Silicon Valley companies tell the president that what hes authorized and what the nsa is doing is doing huge damage to their global markets. All of them deeply concerned with what the nsa has been doing. We make a tremendous amount of money providing technology and online services, advertising and Everything Else to people around the world. And all of that goes away if people no longer trust the American Government and the companies that are subject to its authority. Narrator the next day, the panel the president had appointed to review nsa policies and programs issued its report. It found that some programs like prism had played an Important Role in preventing terrorist attacks. But it was sharply critical of bulk data collection, dragnet surveillance and the use of National Security letters. It concluded that the nsa was overreaching and that americans Civil Liberties were at risk. We say in the report, our concern is about what happens after the next 9 11. In that moment of National Panic after a traumatic attack on the United States, will we again throw out Civil Liberties . Will we again empower the government to erode a little bit of the constitution . As long as the government has spent taxpayers money and built up this huge technical collection infrastructure, that could be abused at a time after some other tragedy. Weve got to be damn sure, since weve built this thing, that it cant be used against us. Narrator over the last few months, there have been more reports. Access the popular game angry birds. Narrator about potential surveillance of smartphone apps and webcam images and hundreds of millions of text messages, how the nsa is capable of recording all of a foreign countrys phone calls and is racing to build a computer that can defeat most kinds of encryption. Could allow the nsa to map out a persons life. Look, let me give you the existential complaint of the american Intelligence Community. Heres how it works living inside americas liberal democracy, of which, by the way, the intel guys are really a part. American political elites feel very empowered to criticize the american Intelligence Community for not doing enough when they feel in danger. And as soon as weve made them feel safe again, they feel equally empowered to complain that were doing too much. Narrator in late december 2013, bart gellman flew to moscow. Snowden had agreed to meet. I went to a hotel that was arranged in advance. I got a phone call. He gave me a place to meet within a certain time period, and he showed up. He met me, shook my hand, said almost nothing and led me away, and we moved to a place that he considered secure. Narrator gellman interviewed snowden for 14 hours over two days. I asked him the hard questions about being in moscow, or about whether he thought any of these stories were doing damage or, you know, all the other things that people want to know when theyre thinking about his conduct. And i found a guy who was almost zenlike in his serenity and his comfort with what he had done, that he had consciously decided he was willing to take huge risks to provoke a public debate. And he provoked a public debate that no one could possibly have foreseen. Thats a fundamentally dangerous thing to democracy. Surveillance that the president himself said was urgent. You cant have 100 security and also then have 100 privacy. We take our role really seriously. I think its my job to protect everyone who uses facebook and all the information that they share with us. So where we are now is in a place where were living behind oneway mirrors. Corporate america and Law Enforcement and National Security state know so much about us, and we know so little about them, we know so little about what theyre doing, how theyre doing it. And we cant actually hold our government accountable because we truly dont know what its doing. Next timfrontline. Two countries in crisis. Two countries in crisis. On the ground in ukraine, with both sides of the conflict. And our unprecedented reporting from syria continues. Uncovering how the United States is arming and training the rebels. Two new reports, one exclusive hour, on the next frontline. Go to pbs. Org frontline. How can you protect your personal data online . Find out in our special podcast. What does it mean when the nsa has your number . Learn what your data trail reveals about you. How did we get here . Illegal and unconstitutional. Watch part one of this series, and connect to tfrontline community. Follow us on facebook, twitter or pbs. Org frontline. Frontlinis made possible by contributions to your pbs station from and by the corporation for public broadcasting. Major support for frontliis provided by the john d. And catherine t. Macarthur foundation, committed to building a more just, verdant and peaceful world. More information is available at macfound. Org. Additional funding is provided by the park foundation, dedicated to heightening Public Awareness of critical issues. The wyncote foundation. And by the frontline journalism fund, with major support from john and Jo Ann Hagler and Additional Support from chris and lisa kaneb and bill and cile hicks. Captioned by Media Access Group at wgbh access. Wgbh. Org for more on this and other frontline programs, visit our website at pbs. Org frontline. Frontlines United States of secrets is available on dvd. To order, visit shoppbs. Org or call 1800playpbs. Frontline is also available for download on itunes. What if television. Ali i shook up the world could remember the heroes we honored . The music we danced to . The dreams we chased . Kennedy the hope still lives, and the dream shall never die. No one tells our nations story like pbs. Give to your pbs station, and help bring americas story to life. Im kristi yamaguchi. Japanese american lives. On march 11, 2011, the world witnessed the tragic earthquake, tsunami, and Nuclear Disaster in the region of japan known as tohoku. Less known were the stories of the survivors and the roles many japanese americans played in the relief and Recovery Efforts poignantly portrayed in our next film, stories from tohoku, which i was fortunate to be a part of. Stories from tohoku, by Dianne Fukami and eli olson. Next on japanese american lives. Funding for this program provided by