Snowden Sees Victory – But it’s From a Distance

1394516629.png

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

May has been another month of virtual globe hopping for Edward Snowden, the former National Security Agency contractor, with video appearances so far at Princeton and in a “distinguished speakers” series at Stanford and at conferences in Norway and Australia. By the end of the month, he spoke by video to audiences in Italy, and also in Ecuador, where there will be a screening of “Citizenfour,” the Oscar-winning documentary about him.

But there have been far more consequential victories for Snowden’s cause two years after he flew from Hawaii to Hong Kong carrying laptops loaded with NSA secrets.

At the beginning of May, a federal appeals court ruled that the first NSA program he disclosed, which collects the phone call records of millions of Americans, is illegal. A week or so later, the House of Representatives voted overwhelmingly to transform the program by keeping the bulk phone records out of government hands, a change President Obama has endorsed and the Senate is now debating. And Apple and Google have angered the FBI by stepping up encryption, including on smartphones, to scramble communications and protect customers from the kind of government surveillance Snowden exposed.

The fallout has been deeply satisfying to Snowden, who at first feared that his revelations might be ignored, said Ben Wizner, an American Civil Liberties Union lawyer who represents him. But the debate about Snowden is far from over.
“His life is very, very rich and full,” said Wizner, eager to refute predictions by Edward Snowden’s critics in 2013 that he would end up in bitter obscurity in Russia. “What a remarkable public citizen he’s become. How fitting that he has been able to use technology to defeat exile and participate in the debate he started.”

American intelligence officials tell a different story about the saga that began on May 20, 2013, the day Snowden flew to Hong Kong. 

Snowden’s decision to leak hundreds of thousands of highly classified NSA documents to selected reporters still prompts fury from many in the Obama administration, who say his revelations taught terrorists and other adversaries how to dodge the agency’s eavesdropping. They note that his disclosures, some of which were printed in The New York Times, went far beyond the phone records collection, touching on many programs that target foreign countries and do not involve Americans’ privacy.
“The only debate we’re really having in the US is about the very first document that Snowden produced,” said Stewart A. Baker, a former NSA general counsel and outspoken critic of the leaks, referring to the secret court order authorizing the phone records program. “The rest of the documents have been used as a kind of intelligence porn for the rest of the world — ‘Oooh, look at what NSA is doing.’ ”

In a new memoir, Michael J. Morell, former deputy director and acting director of the CIA, expresses the dark view of many intelligence veterans, even blaming Snowden’s leaks for empowering the Islamic State extremist group, also known as ISIS or ISIL. “ISIS was one of the terrorist groups that learned from Snowden, and it is clear his actions played a role in the rise of ISIS,” Mr. Morell writes in “The Great War of Our Time,” offering no elaboration. “In short, Snowden has made the United States and our allies considerably less safe. I do not say this lightly: Americans may well die at the hands of terrorists because of Edward Snowden’s actions.”

Given such assessments, prosecutors have shown no inclination to offer Snowden a plea bargain he would accept. The Russian government granted him a three-year residency last summer, and he has no obvious prospect of leaving any time soon. Even if Snowden acquired some kind of travel documents, the United States has revoked his passport and he is not a citizen of Russia, so he has no Russian passport, he would face a high risk of arrest in any other country and a return to the United States for trial.

Some Russian commentators have remarked on the paradox of Snowden’s calls for liberty and privacy from President Vladimir V. Putin’s increasingly authoritarian country.
“All these months he’s been pretending successfully he was not in Russia, but just somewhere, in some limbo,” Andrei Soldatov, a journalist who runs an investigative website covering Russian intelligence, said in an email. Snowden has found asylum, he added, “in a country which is on a crusade against Internet freedoms.”

Snowden’s main source of income, his lawyer said, is speaking fees, which have sometimes exceeded $10,000 for an appearance. His American girlfriend, Lindsay Mills, who represented him at the Academy Awards ceremony in February, has joined him in Moscow.

But Snowden’s standing, if complicated, is still a far cry from what it was after he first went public from Hong Kong in June 2013 as the source of the leaked NSA archive. In Congress and on cable television at that time, there was much talk of treason, suggestions that Snowden must be an agent of Russia or China and even calls for killing him with a drone strike.
To date, there has been no evidence that Snowden took the NSA data on behalf of any other country or shared it except with journalists. Mr. Morell, the former CIA official, says he believes that Snowden would have rebuffed any offers from Russia or China, “given his mind-set and his clear dislike for intelligence services of any stripe.”    

He has proved a far more lasting draw than many predicted. His gaunt visage, with the shaggy haircut, stylish glasses and thin beard, has appeared on T-shirts and posters worldwide.

He was edged out by Pope Francis as Time magazine’s Person of the Year for 2013, and a campaign on Facebook and by Norwegian politicians to put him forward for the Nobel Peace Prize fell short. But he has given a hip, young face to the abstract anxiety shared by many people in the United States and beyond about the menace posed by government snooping when it is fully empowered by technology.

At Princeton this month, the director of the university’s program in law and public affairs, Kim Lane Scheppele, introduced Snowden to a crowd that filled a large auditorium and two overflow rooms. She acknowledged that it was unusual for a program on law to feature as speaker someone facing serious criminal charges.
“But the very size of this audience today,” she said, “indicates that Edward Snowden has done something very important, by disclosing information that alerted the public to what was being done in our name.”
Then the huge, projected image of Snowden himself loomed over the stage. He laughed sheepishly, muttering about looking like Big Brother.

The next week, he spoke to the Nordic Media Festival in Bergen, Norway, a day after the court ruled against the NSA’s phone data program. “This being struck down is really a radical sea change in the level of resistance that the United States government has faced thus far,” Snowden said, clearly excited. He predicted a ripple effect far beyond that program, saying, “It will affect every other mass surveillance program in the United States going forward.”

Recently, at Stanford, he fielded the inevitable question: Is he a hero or a traitor? “It’s not about me,” he insisted. “It’s about us. I’m not a hero. I’m not a traitor. I’m an ordinary American like anyone else in the room.”

But he was not in that room in California, and he spoke a little wistfully about that. “If the opportunity was presented, I would of course come home,” he said. “Because that’s where I live. That’s where my family is.”

New York Times:                Dark Reading

« German BND Intelligence Cooperation with NSA has Actually Expanded.
Device to protect your vehicle from “Sticky bombs” »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.