Citizenfour Page #5

Synopsis: In January 2013, Laura Poitras started receiving anonymous encrypted e-mails from "CITIZENFOUR," who claimed to have evidence of illegal covert surveillance programs run by the NSA in collaboration with other intelligence agencies worldwide. Five months later, she and reporters Glenn Greenwald and Ewen MacAskill flew to Hong Kong for the first of many meetings with the man who turned out to be Edward Snowden. She brought her camera with her. The resulting film is history unfolding before our eyes.
Director(s): Laura Poitras
Production: Radius-TWC
  Won 1 Oscar. Another 43 wins & 35 nominations.
 
IMDB:
8.1
Metacritic:
88
Rotten Tomatoes:
96%
R
Year:
2014
114 min
Website
4,110 Views


Um, so this is what I'd like

to do in terms of scheduling,

if it's good with everybody else.

Um, are you... do you feel like

you're done with what you...?

I am done.

I'm anxious to go back,

get those articles done.

And then there's a bunch of

documents that aren't about

those first two or three stories that

I'd like to spend time with you...

- Sure, yeah...

- ...you know, kind of going over it.

- Um, and...

- I'm not going anywhere!

You're available?

You want to check your book first?

Yeah! Let me...

uh... let me check my schedule.

Is that good for you, Laura?

- It's great.

- Okay.

Hello?

Yes.

My meal was great, thank you very much.

No, I still have some left, and I think

I'm gonna be eating it later.

So, uh, you can just

leave me alone for now.

Okay, great. Thank you so much.

Have a good one. Bye.

Let's fix that real quick.

So uh, another fun thing,

I was telling Laura about this:

all these new VOIP phones,

they have little computers in them,

and you can hot mic these

over the network...

all the time,

even when the receiver's down.

So as long as it's plugged in,

it can be listening in on you.

And I hadn't even considered

that earlier, but yeah.

Okay.

There are so many ways this could be...

Everything in here is gonna be

on the public record at some point.

We, we should operate on that,

that basis, because...

Yeah, we are.

Do you have your air-gapped

machine with you?

I do, I do.

You can pop that out.

Do you have an understanding

or commitment

on when you guys are going to

press with the first stories?

I suppose seven or eight

in the morning in London.

Uh-huh, okay.

Now let's see here.

Oh, hey, look, there's the other one.

Pro tip, let's not leave

the same SD cards

in our laptops forever, in the future.

Did you know this was still

kicking around in your laptop?

Yeah, um, that was the...

- Okay, just making sure.

- Okay, yeah.

- This is that.

- Right there.

You will have a new one that looks exactly

identical that's a different archive,

so you might want to

take a Sharpie to it, or something.

Could you pass me

my magic mantle of power?

Mm-hmm. I'm gonna go pick up...

Is that about the possibility of...

Visual... yeah, visual collection.

I don't think at this point there's

anything that will shock us.

We've become pretty...

In fact, Ewen said before, he's like,

he's like "I'm never leaving my room...

I'm never leaving anything in my room

again, not a single machine."

I was like, "You've been

infected by the paranoia bug.

- Happens to all of us!"

- Yeah.

The way he said it, he was like,

"I would never leave a single device

in the room again alone."

My bag is getting heavier and heavier.

That's your evil influence, Ed.

All right, I'm going need you

to enter your root password

because I don't know what it is.

If you want to use this,

you're more than welcome to.

Looks like your root password's about

four characters long anyway, so...

It's usually a lot longer, but that's

just a one-time-only thing, right?

So it is... uh...

It had been a lot longer,

but ever since I knew that

it was just like a one time

only session one,

I've been making it shorter.

Is that not good?

It's actually not.

I was expressing this with Laura.

The issue is, because of the fact that

it's got a hardware mac address

and things like that, if people are able

to identify your machine,

and they're able to...

This is the fact you're about

to break the most upsetting story...

Right, that's true, that's true.

Yeah, so they might kind of

prioritize you...

It's ten letters. I type very quickly.

It actually is ten letters.

Okay, so ten letters would be good

if they had to brute force

the entire keyspace.

Right.

That would still probably

only take a couple days for NSA.

That's a fire alarm.

Okay.

Hopefully it just sounds like

a three second test.

Or is... do you want to call

the desk and ask?

I think it's fine.

Yeah, I don't think it's an issue,

but it's interesting that it just...

Did that happen before?

Maybe they got mad when they couldn't

listen in to us via the phone anymore.

Has the fire alarm gone off before?

No, that's the first time

that's happened.

Let me see, just in case,

they've got an alert that goes to...

That's unusual.

- You probably...

- We might have to evacuate.

...shouldn't ignore that.

I don't know.

- It's not continuous.

- It's not continuous.

No, I'm just saying, if it continues.

And then we go and we meet

the guys down in the lobby...

- Yeah, right?

- Yeah.

Yeah, let's uh, let's leave it for now.

Let me just finish this up.

All right.

Not that they're going to answer,

because they probably got

like 7,000 calls.

Hi, uh, we hear a loud buzzing

on the tenth floor,

can you tell us what that is?

Oh, okay.

Okay great. Thank you. Bye.

Fire alarm testing maintenance.

That's good. That's what

we wanted to hear.

Nice of them to uh...

nice of them to let us know

about that in advance.

Um...

I just wanted to

give you kind of a quick tour,

uh, when Laura was looking at this,

she was kind of salivating

and couldn't stop actually

reading the documents...

Right, right.

So we'll try and restrain ourselves

without promising that we'll succeed.

Yeah, I just wanted to kind of explain

a brief overview of what these are

and how they're organized.

Um, the beginning are

just some documents of interest.

The primary purpose

of the second archive

is to bring the focus over to SSO,

as opposed to uh, PRISM.

And this is in general.

SSO are the Special Source Operations,

those are the worldwide

passive collection on networks.

They're both domestic to the US

and international.

There's a lot of different ways

they do it,

but corporate partnerships

are one of the primary things,

uh, they do domestically,

they also do this with multinationals

that might be headquartered

in the US they can kind of coerce,

or just pay into giving them access.

And they also do it bilaterally, with

the assistance of certain governments.

And that's basically

on the premise that they go,

"All right, we'll help you

set this system up

if you give us all the data from it."

Um, so yeah...

There's, there's...

There's a lot more in here than any

one person or probably one team could do.

Right.

Um, XKeyscore DeepDive,

XKeyscore in general,

and there's a huge folder

of documentation

on XKeyscore and how it works,

is the front-end system

that analysts use

for querying that sort of ocean of

raw SIGINT that I was telling you about.

All of that stuff where you can

sort of do the retroactive searches

and live searches

and get flagging and whatnot,

XKeyscore is the front end for that.

I'm just gonna show you one slide here

'cause Laura thought it was valuable,

and I was talking about

kind of how these,

uh, capabilities ramp up

in sophistication over time.

This is kinda nice.

As of fiscal year 2011,

they could monitor one billion

Rate this script:5.0 / 1 vote

Unknown

The writer of this script is unknown. more…

All Unknown scripts | Unknown Scripts

4 fans

Submitted on August 05, 2018

Discuss this script with the community:

0 Comments

    Translation

    Translate and read this script in other languages:

    Select another language:

    • - Select -
    • 简体中文 (Chinese - Simplified)
    • 繁體中文 (Chinese - Traditional)
    • Español (Spanish)
    • Esperanto (Esperanto)
    • 日本語 (Japanese)
    • Português (Portuguese)
    • Deutsch (German)
    • العربية (Arabic)
    • Français (French)
    • Русский (Russian)
    • ಕನ್ನಡ (Kannada)
    • 한국어 (Korean)
    • עברית (Hebrew)
    • Gaeilge (Irish)
    • Українська (Ukrainian)
    • اردو (Urdu)
    • Magyar (Hungarian)
    • मानक हिन्दी (Hindi)
    • Indonesia (Indonesian)
    • Italiano (Italian)
    • தமிழ் (Tamil)
    • Türkçe (Turkish)
    • తెలుగు (Telugu)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Čeština (Czech)
    • Polski (Polish)
    • Bahasa Indonesia (Indonesian)
    • Românește (Romanian)
    • Nederlands (Dutch)
    • Ελληνικά (Greek)
    • Latinum (Latin)
    • Svenska (Swedish)
    • Dansk (Danish)
    • Suomi (Finnish)
    • فارسی (Persian)
    • ייִדיש (Yiddish)
    • հայերեն (Armenian)
    • Norsk (Norwegian)
    • English (English)

    Citation

    Use the citation below to add this screenplay to your bibliography:

    Style:MLAChicagoAPA

    "Citizenfour" Scripts.com. STANDS4 LLC, 2024. Web. 22 Nov. 2024. <https://www.scripts.com/script/citizenfour_5600>.

    We need you!

    Help us build the largest writers community and scripts collection on the web!

    Watch the movie trailer

    Citizenfour

    The Studio:

    ScreenWriting Tool

    Write your screenplay and focus on the story with many helpful features.


    Quiz

    Are you a screenwriting master?

    »
    In screenwriting, what is a "logline"?
    A The first line of dialogue
    B A brief summary of the story
    C A character description
    D The title of the screenplay