Snowden Sees Victory – But it’s From a Distance

1394516629.png

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

May has been another month of virtual globe hopping for Edward Snowden, the former National Security Agency contractor, with video appearances so far at Princeton and in a “distinguished speakers” series at Stanford and at conferences in Norway and Australia. By the end of the month, he spoke by video to audiences in Italy, and also in Ecuador, where there will be a screening of “Citizenfour,” the Oscar-winning documentary about him.

But there have been far more consequential victories for Snowden’s cause two years after he flew from Hawaii to Hong Kong carrying laptops loaded with NSA secrets.

At the beginning of May, a federal appeals court ruled that the first NSA program he disclosed, which collects the phone call records of millions of Americans, is illegal. A week or so later, the House of Representatives voted overwhelmingly to transform the program by keeping the bulk phone records out of government hands, a change President Obama has endorsed and the Senate is now debating. And Apple and Google have angered the FBI by stepping up encryption, including on smartphones, to scramble communications and protect customers from the kind of government surveillance Snowden exposed.

The fallout has been deeply satisfying to Snowden, who at first feared that his revelations might be ignored, said Ben Wizner, an American Civil Liberties Union lawyer who represents him. But the debate about Snowden is far from over.
“His life is very, very rich and full,” said Wizner, eager to refute predictions by Edward Snowden’s critics in 2013 that he would end up in bitter obscurity in Russia. “What a remarkable public citizen he’s become. How fitting that he has been able to use technology to defeat exile and participate in the debate he started.”

American intelligence officials tell a different story about the saga that began on May 20, 2013, the day Snowden flew to Hong Kong. 

Snowden’s decision to leak hundreds of thousands of highly classified NSA documents to selected reporters still prompts fury from many in the Obama administration, who say his revelations taught terrorists and other adversaries how to dodge the agency’s eavesdropping. They note that his disclosures, some of which were printed in The New York Times, went far beyond the phone records collection, touching on many programs that target foreign countries and do not involve Americans’ privacy.
“The only debate we’re really having in the US is about the very first document that Snowden produced,” said Stewart A. Baker, a former NSA general counsel and outspoken critic of the leaks, referring to the secret court order authorizing the phone records program. “The rest of the documents have been used as a kind of intelligence porn for the rest of the world — ‘Oooh, look at what NSA is doing.’ ”

In a new memoir, Michael J. Morell, former deputy director and acting director of the CIA, expresses the dark view of many intelligence veterans, even blaming Snowden’s leaks for empowering the Islamic State extremist group, also known as ISIS or ISIL. “ISIS was one of the terrorist groups that learned from Snowden, and it is clear his actions played a role in the rise of ISIS,” Mr. Morell writes in “The Great War of Our Time,” offering no elaboration. “In short, Snowden has made the United States and our allies considerably less safe. I do not say this lightly: Americans may well die at the hands of terrorists because of Edward Snowden’s actions.”

Given such assessments, prosecutors have shown no inclination to offer Snowden a plea bargain he would accept. The Russian government granted him a three-year residency last summer, and he has no obvious prospect of leaving any time soon. Even if Snowden acquired some kind of travel documents, the United States has revoked his passport and he is not a citizen of Russia, so he has no Russian passport, he would face a high risk of arrest in any other country and a return to the United States for trial.

Some Russian commentators have remarked on the paradox of Snowden’s calls for liberty and privacy from President Vladimir V. Putin’s increasingly authoritarian country.
“All these months he’s been pretending successfully he was not in Russia, but just somewhere, in some limbo,” Andrei Soldatov, a journalist who runs an investigative website covering Russian intelligence, said in an email. Snowden has found asylum, he added, “in a country which is on a crusade against Internet freedoms.”

Snowden’s main source of income, his lawyer said, is speaking fees, which have sometimes exceeded $10,000 for an appearance. His American girlfriend, Lindsay Mills, who represented him at the Academy Awards ceremony in February, has joined him in Moscow.

But Snowden’s standing, if complicated, is still a far cry from what it was after he first went public from Hong Kong in June 2013 as the source of the leaked NSA archive. In Congress and on cable television at that time, there was much talk of treason, suggestions that Snowden must be an agent of Russia or China and even calls for killing him with a drone strike.
To date, there has been no evidence that Snowden took the NSA data on behalf of any other country or shared it except with journalists. Mr. Morell, the former CIA official, says he believes that Snowden would have rebuffed any offers from Russia or China, “given his mind-set and his clear dislike for intelligence services of any stripe.”    

He has proved a far more lasting draw than many predicted. His gaunt visage, with the shaggy haircut, stylish glasses and thin beard, has appeared on T-shirts and posters worldwide.

He was edged out by Pope Francis as Time magazine’s Person of the Year for 2013, and a campaign on Facebook and by Norwegian politicians to put him forward for the Nobel Peace Prize fell short. But he has given a hip, young face to the abstract anxiety shared by many people in the United States and beyond about the menace posed by government snooping when it is fully empowered by technology.

At Princeton this month, the director of the university’s program in law and public affairs, Kim Lane Scheppele, introduced Snowden to a crowd that filled a large auditorium and two overflow rooms. She acknowledged that it was unusual for a program on law to feature as speaker someone facing serious criminal charges.
“But the very size of this audience today,” she said, “indicates that Edward Snowden has done something very important, by disclosing information that alerted the public to what was being done in our name.”
Then the huge, projected image of Snowden himself loomed over the stage. He laughed sheepishly, muttering about looking like Big Brother.

The next week, he spoke to the Nordic Media Festival in Bergen, Norway, a day after the court ruled against the NSA’s phone data program. “This being struck down is really a radical sea change in the level of resistance that the United States government has faced thus far,” Snowden said, clearly excited. He predicted a ripple effect far beyond that program, saying, “It will affect every other mass surveillance program in the United States going forward.”

Recently, at Stanford, he fielded the inevitable question: Is he a hero or a traitor? “It’s not about me,” he insisted. “It’s about us. I’m not a hero. I’m not a traitor. I’m an ordinary American like anyone else in the room.”

But he was not in that room in California, and he spoke a little wistfully about that. “If the opportunity was presented, I would of course come home,” he said. “Because that’s where I live. That’s where my family is.”

New York Times:                Dark Reading

« German BND Intelligence Cooperation with NSA has Actually Expanded.
Device to protect your vehicle from “Sticky bombs” »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.

CyberForceHQ

CyberForceHQ

CyberForce helps cyber security professionals take real-world tests, get ranked and get paid better. It's that simple.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.

Cyber Solutions Inc

Cyber Solutions Inc

Cyber Solutions has been providing professional IT Support for businesses since 1998.