Edward Snowden
Ten years on, William Fitzgerald, then a 27-year-old policy worker, tells of his part in the story and explores how tech has changed since
Sun 18 Jun 2023 09.00 EDT
Early on the morning of 10 June 2013, Hong Kong time, the journalist Glenn Greenwald and film-maker Laura Poitras published on the Guardian site a video revealing the identity of the NSA whistleblower behind one of the most damning leaks in modern history. It began: My name is Ed Snowden.
William Fitzgerald, then a 27-year-old policy employee at Google, knew he wanted to help. But he didnt yet know how.
Snowden was arguably the most wanted man in the world. The confidential documents he shared with Greenwald, Poitras and the Guardians Ewen MacAskill detailed a sweeping US government surveillance program that was global in reach and involved some of the worlds best-known tech companies. Fitzgerald, who had been working at Google since 2008 and was then based in its Hong Kong office, emailed Greenwald from his personal Gmail on a whim.
if looking for alternative options to protect Edward within Hong Kong, i am on hand to assist, read the email, reviewed by the Guardian.
Hours later, Fitzgerald found himself waiting in the lobby of the Hong Kong W Hotel to meet Greenwald and introduce him to Robert Tibbo and Jonathan Man the men who became Snowdens legal representatives and hid him in the homes of Tibbos Sri Lankan refugee clients.
Its been 10 years since the Snowden files were first published, by the Guardian, and Fitzgerald, who continued to work at Google until 2018, feels ready to share the small role he had in the story. Referred to only as a longtime reader of Greenwalds in the then Guardian columnists book detailing the marathon week he spent in Hong Kong meeting with Snowden and dealing with the aftermath of his disclosures, Fitzgerald admits the motivation to share his story is not entirely selfless. He wants it written in history that he was the longtime reader and that at the time, he was willing to risk everything just as he believed Snowden had.
In 2013, the internet and tech industry especially his employer felt like a wholly different place than it is today, Fitzgerald said. In the aftermath of the Arab spring, there was hope and optimism the tools connecting the world in unprecedented ways could be forces of social good. But the Snowden files told a more sinister story, revealing mass surveillance by the US National Security Agency (NSA), using those tools to spy on the very consumers the companies that built them purported to empower.
The NSA files suggested that some tech firms, including Google, Facebook and Apple, were aware. These companies vehemently denied any role in the governments spying programs and even took a stance against them, joining with groups like the digital advocacy non-profit Electronic Frontier Foundation to increase the use of encryption on the internet.
For Fitzgerald, it was hard to reconcile Snowdens disclosures with the optimism he felt about the internets potential. But he believed the documents were authentic. By watching Greenwalds TV interviews as the first Snowden stories broke in the Guardian, Fitzgerald realized they were both in Hong Kong. He asked Greenwald for coffee, eager to meet one of the reporters behind these monumental stories even if they indicated his employer, Google, knew the NSA was tapping directly into its servers to access user data. By the time Snowden revealed his identity, Fitzgerald and Greenwald already planned to meet.
Are you a lawyer? Greenwald responded to his email offering to help protect Snowden. While Fitzgerald wasnt, he knew one of the pre-eminent human rights lawyers in the city through a masters program at Hong Kong University. No, but I have some friends who are, he responded.
Greenwald doesnt remember knowing if Fitzgerald worked for Google when they first met. He just knew Snowden needed help. Snowden had urged Greenwald to focus on reporting rather than protecting him, Greenwald said, which is how Snowden wound up outing himself as the source without legal counsel. Though Greenwald had never met Fitzgerald before, he said he trusted his intuition. Obviously, our skepticism was at an all-time high about everything, Greenwald told the Guardian.
We didnt know what the US government knew, what the CIA was doing, what the Hong Kong local authorities were doing, he said. So when someone just appears out of nowhere like this offering to help, of course youre very suspicious.
Greenwald wasnt surprised that a Google employee would be supportive of Snowden, however, because that was really the ethos of what Silicon Valley was originally meant to bring.
When Fitzgerald joined Google in 2010, the company appeared committed to preserving free expression and privacy. Shortly after, for instance, the company hired several people to staff a free expression team in several regions that advised on policies to maintain a free and open internet.
Lokman Tsui, then an assistant professor of journalism at the City University of Hong Kong, was hired to lead that team in Asia. In 2010, the company also became the first tech firm to publish a transparency report detailing how often governments requested access to user data and for content to be taken down, a mechanism intended to shame those countries who most frequently issued them, Fitzgerald said. (Google said the transparency report was created as a tool to inform users and public debate.)
After the Snowden leaks, Google and other tech firms worked to distance themselves from the NSAs efforts because as a global company, they could not afford to be seen as servants of the US intelligence community, said Ben Wizner, the director of the ACLUs Speech, Privacy, and Technology Project and Snowdens current attorney.
But over time, the company culture appeared to shift, reflecting the changing needs of various governments. Before he left Google in 2014, for instance, Tsui said some local Asian governments became more hostile to free expression efforts and he struggled to convince colleagues responsible for maintaining relationships with those governments to prioritize free speech. If your job is to maintain good relationships with the local government, the last thing you want to do is bring up freedom of speech in at least most Asian places, he told the Guardian.
Fitzgerald stayed on four years longer, but said he also witnessed the culture shift as the company matured. For instance, he said Google stopped promoting its transparency report to the media, free expression advocates were replaced by more traditional business-focused executives, and then there was Project Maven the controversial Department of Defense drone project that Google signed on to build artificial intelligence for, and later succumbed to employee pressure to back out of in 2018.
There was a slow erosion of a lot of these things that Google had said they cared about, said Fitzgerald, who has since founded The Worker Agency, an advocacy and communications firm that counts a Google worker union among its clients.
Google isnt alone in vying for government contracts Microsoft, Amazon, IBM have all since made a play for or struck multimillion-dollar deals to build tools of surveillance for various entities including the Pentagon.
Google has a long track record of pushing back on overly broad or otherwise inappropriate demands and, at times, rejects government requests entirely, said Christa Muldoon, a company spokesperson.
That commitment is just as strong today as it was in 2013, Muldoon said in a statement. Our transparency reports give people detailed information about government demands, as well as the progress of our work to drive encryption technologies across our products and the Internet.
Opinions differ on how much the tech industry has evolved since Snowden. Fitzgerald and Greenwald both say it has increasingly given in to government pressures to hand over user data or censor posts. Wizner, on the other hand, credits tech firms for bolstering their legal defense against government requests for data. The default before Snowdens revelations was for companies to comply with legal orders; today, he says, theres more evidence theyre pushing back.
But all agree that one of the most enduring legacies, and the one Wizner says Snowden is most proud of, is peoples awareness of the limits of their privacy and the resulting encryption of the web.
What followed in the weeks after the stories were published has been well documented. After Greenwald introduced Snowden to Tibbo and Man, the duo hid him in the cramped tenement-style apartments of Tibbos Sri Lankan refugee clients, who, at great personal risk, took turns hosting the person the world was searching for. One of those families only received asylum in Canada in 2021 while others involved remain in Hong Kong. Snowden, who is facing multiple criminal charges in the US, then fled to Russia, where he still resides.
At the headquarters of the Electronic Frontier Foundation (EFF), organizers understood the NSA files could spur companies to finally implement end-to-end encryption, a method of securing communications so only the sender and recipient can access it. Very quickly after the leak, tech companies began signing on to the EFFs efforts to push for more encryption, according to EFFs executive director, Cindy Cohn. In 2016, James Clapper, the US director of national intelligence, said that the leaks had accelerated the adoption of encryption by seven years.
While theres still work to be done on encrypting more of the web, encryption has become the default for many messaging apps such as Signal, WhatsApp and iMessage. As a result of Snowdens disclosures, secure and encrypted communications are no longer the weird province of computer-savvy geeks, but are tools that are used by and available to the masses, Wizner said.
Ten years after Snowden first revealed himself, Fitzgerald has spent his time helping other people hold tech firms accountable through his communications firm. Today, he remains proud of the small role he played in Snowdens story.
In Snowdens book, he said he put himself at the mercy of the world and other people, Fitzgerald said. I remember thinking in my head when I read that, I was one of those people. And I responded, and was one of the contributing factors that meant that he didnt end up in an orange jumpsuit and wearing handcuffs.
{{topLeft}}
{{bottomLeft}}
{{topRight}}
{{bottomRight}}
{{.}}
Read this article:
The Google employee who helped Edward Snowden in Hong Kong - The Guardian US
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]