Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon

Lawyers working with Edward Snowden, the National Security Agency whistleblower who received sanctuary in Russia after fleeing the US, have vowed to step up pressure on Barack Obama’s administration for a Presidential Pardon.

“We’re going to make a very strong case between now and the end of this administration that this is one of those rare cases for which the pardon power exists,” Ben Wizner, the ACLU lawyer who is Snowden’s principal legal adviser, told New York magazine in a cover story published late on Sunday.

“It’s not for when somebody didn’t break the law. It’s for when they did and there are extraordinary reasons for not enforcing the law against the person.”

From safety in Moscow, Snowden has conceded that Obama is unlikely to offer such a pardon before he leaves office.

“There is an element of absurdity to it,” he said. “More and more, we see the criticisms levelled toward this effort are really more about indignation than they are about concern for real harm.”

The comments were reported in lengthy article about Snowden’s use of a “Snowbot”, technically a BeamPro robot, to appear at US galleries and events. The Snowbot is a $14,000 machine that consists of a flatscreen monitor and camera atop a moving base.

From a home studio in Moscow, the magazine reported, the former NSA contractor can control the Snowbot with his computer, moving around and swiveling to make eye contact with people as they speak.

“I’m able to actually have influence on the issues that I care about, the same influence I didn’t have when I was sitting at the NSA,” Snowden said.

The Snowbot, he said, has given him a degree of autonomy. “There’s always that initial friction, that moment where everybody’s like, ‘Wow, this is crazy,’ but then it melts away. Regardless of the fact that the FBI has a field office in New York, I can be hanging out in New York museums.”

The Snowbot was sourced by Wizner, but it has found an enthusiastic audience amongst the whistleblower’s supporters. In the New York magazine piece Glenn Greenwald, one of the journalists to whom in 2013 Snowden leaked thousands of NSA files, imagines him – or it – “let loose in the parking lot of [NSA headquarters at] Fort Meade”.

At a recent event at the Brooklyn Academy of Music, Snowden used the Snowbot to tell his audience: “In an extraordinary and unpredictable way, my own circumstances show there is a model that ensures that even if we’re left without a state, we aren’t left without a voice.”

Former attorney general Eric Holder conceded last month that Snowden “actually performed a public service” and said: “I think a judge could take into account the usefulness of having had that national debate.”

But neither candidate to succeed Obama in the White House has shown much sign of sympathy. Hillary Clinton has said Snowden should not be allowed to return to the US without “facing the music”. In 2013, Donald Trump suggested Snowden should be executed.

Snowden told the magazine he did not expect to die in Russia and has criticised Russia’s surveillance legislation.

Snowden has also condemned a “dangerous” package of anti-terrorism legislation passed by Russia’s parliament last week, in a rare criticism of the authorities in his host country.  

Mr. Snowden, who fled to Russia in 2013 after exposing a surveillance programme run by the US National Security Agency (NSA), urged Vladimir Putin to reject an” unjustifiable violation of rights".

Mr. Snowden described the bill approved by the State Duma as a “Big Brother law” that was “unworkable” and “should never be signed”.

He added: “Mass surveillance doesn't work. This bill will take money and liberty from every Russian without improving safety.”

The new measures would force Russian mobile phone operators to store the details of all calls and text messages made by their clients for six months, and keep the metadata of calls and messages - information about the date, time and users - for three years. 

Providers of messaging apps, email services and any other electronic communication will be required to provide the security services with a key to decode encrypted messages.

The bill also lowers the age of criminal responsibility for a range of offences to 14, makes it an offence not to report a crime, and drastically increases punishments for “extremism,” inciting “mass unrest” and writing social media posts “justifying terrorism.” 

Guardian
Telegraph

 

« What Might ‘Brexit’ Mean For Cybersecurity In The UK?
Government In The Information Age »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

TechForing

TechForing

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.