mr. carlin addressed, some of which he chose not to address.t did this guy, harold thomas martin, take? >> well, from the best we can take right now -- we can understand right now, it was different than the snowden probe. mr. snowden took big power point slides describing classified operations of getting in -- breaking into china or the mass collection of metadata from phone calls to the united states. it looks like mr. martin's trove is mostly source code. the computer code used by the nsa to break in foreign computer systems, put in what are called implants. we saw a little bit of this, we're not sure if it came from mr. martin's trove, in august, when some of this was posted by a group that was trying to put it up for auction. >> some of the source code. >> some of the source code. and the code you should think of as sort of a tool kit. if you were working at the nsa, particularly in their tailored access operations unit and had to figure out how you were going to break into a computer system in iran or in russia or in china. >> mr. carlin d