Snowden Sees Victory – But it’s From a Distance

1394516629.png

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

May has been another month of virtual globe hopping for Edward Snowden, the former National Security Agency contractor, with video appearances so far at Princeton and in a “distinguished speakers” series at Stanford and at conferences in Norway and Australia. By the end of the month, he spoke by video to audiences in Italy, and also in Ecuador, where there will be a screening of “Citizenfour,” the Oscar-winning documentary about him.

But there have been far more consequential victories for Snowden’s cause two years after he flew from Hawaii to Hong Kong carrying laptops loaded with NSA secrets.

At the beginning of May, a federal appeals court ruled that the first NSA program he disclosed, which collects the phone call records of millions of Americans, is illegal. A week or so later, the House of Representatives voted overwhelmingly to transform the program by keeping the bulk phone records out of government hands, a change President Obama has endorsed and the Senate is now debating. And Apple and Google have angered the FBI by stepping up encryption, including on smartphones, to scramble communications and protect customers from the kind of government surveillance Snowden exposed.

The fallout has been deeply satisfying to Snowden, who at first feared that his revelations might be ignored, said Ben Wizner, an American Civil Liberties Union lawyer who represents him. But the debate about Snowden is far from over.
“His life is very, very rich and full,” said Wizner, eager to refute predictions by Edward Snowden’s critics in 2013 that he would end up in bitter obscurity in Russia. “What a remarkable public citizen he’s become. How fitting that he has been able to use technology to defeat exile and participate in the debate he started.”

American intelligence officials tell a different story about the saga that began on May 20, 2013, the day Snowden flew to Hong Kong. 

Snowden’s decision to leak hundreds of thousands of highly classified NSA documents to selected reporters still prompts fury from many in the Obama administration, who say his revelations taught terrorists and other adversaries how to dodge the agency’s eavesdropping. They note that his disclosures, some of which were printed in The New York Times, went far beyond the phone records collection, touching on many programs that target foreign countries and do not involve Americans’ privacy.
“The only debate we’re really having in the US is about the very first document that Snowden produced,” said Stewart A. Baker, a former NSA general counsel and outspoken critic of the leaks, referring to the secret court order authorizing the phone records program. “The rest of the documents have been used as a kind of intelligence porn for the rest of the world — ‘Oooh, look at what NSA is doing.’ ”

In a new memoir, Michael J. Morell, former deputy director and acting director of the CIA, expresses the dark view of many intelligence veterans, even blaming Snowden’s leaks for empowering the Islamic State extremist group, also known as ISIS or ISIL. “ISIS was one of the terrorist groups that learned from Snowden, and it is clear his actions played a role in the rise of ISIS,” Mr. Morell writes in “The Great War of Our Time,” offering no elaboration. “In short, Snowden has made the United States and our allies considerably less safe. I do not say this lightly: Americans may well die at the hands of terrorists because of Edward Snowden’s actions.”

Given such assessments, prosecutors have shown no inclination to offer Snowden a plea bargain he would accept. The Russian government granted him a three-year residency last summer, and he has no obvious prospect of leaving any time soon. Even if Snowden acquired some kind of travel documents, the United States has revoked his passport and he is not a citizen of Russia, so he has no Russian passport, he would face a high risk of arrest in any other country and a return to the United States for trial.

Some Russian commentators have remarked on the paradox of Snowden’s calls for liberty and privacy from President Vladimir V. Putin’s increasingly authoritarian country.
“All these months he’s been pretending successfully he was not in Russia, but just somewhere, in some limbo,” Andrei Soldatov, a journalist who runs an investigative website covering Russian intelligence, said in an email. Snowden has found asylum, he added, “in a country which is on a crusade against Internet freedoms.”

Snowden’s main source of income, his lawyer said, is speaking fees, which have sometimes exceeded $10,000 for an appearance. His American girlfriend, Lindsay Mills, who represented him at the Academy Awards ceremony in February, has joined him in Moscow.

But Snowden’s standing, if complicated, is still a far cry from what it was after he first went public from Hong Kong in June 2013 as the source of the leaked NSA archive. In Congress and on cable television at that time, there was much talk of treason, suggestions that Snowden must be an agent of Russia or China and even calls for killing him with a drone strike.
To date, there has been no evidence that Snowden took the NSA data on behalf of any other country or shared it except with journalists. Mr. Morell, the former CIA official, says he believes that Snowden would have rebuffed any offers from Russia or China, “given his mind-set and his clear dislike for intelligence services of any stripe.”    

He has proved a far more lasting draw than many predicted. His gaunt visage, with the shaggy haircut, stylish glasses and thin beard, has appeared on T-shirts and posters worldwide.

He was edged out by Pope Francis as Time magazine’s Person of the Year for 2013, and a campaign on Facebook and by Norwegian politicians to put him forward for the Nobel Peace Prize fell short. But he has given a hip, young face to the abstract anxiety shared by many people in the United States and beyond about the menace posed by government snooping when it is fully empowered by technology.

At Princeton this month, the director of the university’s program in law and public affairs, Kim Lane Scheppele, introduced Snowden to a crowd that filled a large auditorium and two overflow rooms. She acknowledged that it was unusual for a program on law to feature as speaker someone facing serious criminal charges.
“But the very size of this audience today,” she said, “indicates that Edward Snowden has done something very important, by disclosing information that alerted the public to what was being done in our name.”
Then the huge, projected image of Snowden himself loomed over the stage. He laughed sheepishly, muttering about looking like Big Brother.

The next week, he spoke to the Nordic Media Festival in Bergen, Norway, a day after the court ruled against the NSA’s phone data program. “This being struck down is really a radical sea change in the level of resistance that the United States government has faced thus far,” Snowden said, clearly excited. He predicted a ripple effect far beyond that program, saying, “It will affect every other mass surveillance program in the United States going forward.”

Recently, at Stanford, he fielded the inevitable question: Is he a hero or a traitor? “It’s not about me,” he insisted. “It’s about us. I’m not a hero. I’m not a traitor. I’m an ordinary American like anyone else in the room.”

But he was not in that room in California, and he spoke a little wistfully about that. “If the opportunity was presented, I would of course come home,” he said. “Because that’s where I live. That’s where my family is.”

New York Times:                Dark Reading

« German BND Intelligence Cooperation with NSA has Actually Expanded.
Device to protect your vehicle from “Sticky bombs” »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.