Snowden Sees Victory – But it’s From a Distance

1394516629.png

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

May has been another month of virtual globe hopping for Edward Snowden, the former National Security Agency contractor, with video appearances so far at Princeton and in a “distinguished speakers” series at Stanford and at conferences in Norway and Australia. By the end of the month, he spoke by video to audiences in Italy, and also in Ecuador, where there will be a screening of “Citizenfour,” the Oscar-winning documentary about him.

But there have been far more consequential victories for Snowden’s cause two years after he flew from Hawaii to Hong Kong carrying laptops loaded with NSA secrets.

At the beginning of May, a federal appeals court ruled that the first NSA program he disclosed, which collects the phone call records of millions of Americans, is illegal. A week or so later, the House of Representatives voted overwhelmingly to transform the program by keeping the bulk phone records out of government hands, a change President Obama has endorsed and the Senate is now debating. And Apple and Google have angered the FBI by stepping up encryption, including on smartphones, to scramble communications and protect customers from the kind of government surveillance Snowden exposed.

The fallout has been deeply satisfying to Snowden, who at first feared that his revelations might be ignored, said Ben Wizner, an American Civil Liberties Union lawyer who represents him. But the debate about Snowden is far from over.
“His life is very, very rich and full,” said Wizner, eager to refute predictions by Edward Snowden’s critics in 2013 that he would end up in bitter obscurity in Russia. “What a remarkable public citizen he’s become. How fitting that he has been able to use technology to defeat exile and participate in the debate he started.”

American intelligence officials tell a different story about the saga that began on May 20, 2013, the day Snowden flew to Hong Kong. 

Snowden’s decision to leak hundreds of thousands of highly classified NSA documents to selected reporters still prompts fury from many in the Obama administration, who say his revelations taught terrorists and other adversaries how to dodge the agency’s eavesdropping. They note that his disclosures, some of which were printed in The New York Times, went far beyond the phone records collection, touching on many programs that target foreign countries and do not involve Americans’ privacy.
“The only debate we’re really having in the US is about the very first document that Snowden produced,” said Stewart A. Baker, a former NSA general counsel and outspoken critic of the leaks, referring to the secret court order authorizing the phone records program. “The rest of the documents have been used as a kind of intelligence porn for the rest of the world — ‘Oooh, look at what NSA is doing.’ ”

In a new memoir, Michael J. Morell, former deputy director and acting director of the CIA, expresses the dark view of many intelligence veterans, even blaming Snowden’s leaks for empowering the Islamic State extremist group, also known as ISIS or ISIL. “ISIS was one of the terrorist groups that learned from Snowden, and it is clear his actions played a role in the rise of ISIS,” Mr. Morell writes in “The Great War of Our Time,” offering no elaboration. “In short, Snowden has made the United States and our allies considerably less safe. I do not say this lightly: Americans may well die at the hands of terrorists because of Edward Snowden’s actions.”

Given such assessments, prosecutors have shown no inclination to offer Snowden a plea bargain he would accept. The Russian government granted him a three-year residency last summer, and he has no obvious prospect of leaving any time soon. Even if Snowden acquired some kind of travel documents, the United States has revoked his passport and he is not a citizen of Russia, so he has no Russian passport, he would face a high risk of arrest in any other country and a return to the United States for trial.

Some Russian commentators have remarked on the paradox of Snowden’s calls for liberty and privacy from President Vladimir V. Putin’s increasingly authoritarian country.
“All these months he’s been pretending successfully he was not in Russia, but just somewhere, in some limbo,” Andrei Soldatov, a journalist who runs an investigative website covering Russian intelligence, said in an email. Snowden has found asylum, he added, “in a country which is on a crusade against Internet freedoms.”

Snowden’s main source of income, his lawyer said, is speaking fees, which have sometimes exceeded $10,000 for an appearance. His American girlfriend, Lindsay Mills, who represented him at the Academy Awards ceremony in February, has joined him in Moscow.

But Snowden’s standing, if complicated, is still a far cry from what it was after he first went public from Hong Kong in June 2013 as the source of the leaked NSA archive. In Congress and on cable television at that time, there was much talk of treason, suggestions that Snowden must be an agent of Russia or China and even calls for killing him with a drone strike.
To date, there has been no evidence that Snowden took the NSA data on behalf of any other country or shared it except with journalists. Mr. Morell, the former CIA official, says he believes that Snowden would have rebuffed any offers from Russia or China, “given his mind-set and his clear dislike for intelligence services of any stripe.”    

He has proved a far more lasting draw than many predicted. His gaunt visage, with the shaggy haircut, stylish glasses and thin beard, has appeared on T-shirts and posters worldwide.

He was edged out by Pope Francis as Time magazine’s Person of the Year for 2013, and a campaign on Facebook and by Norwegian politicians to put him forward for the Nobel Peace Prize fell short. But he has given a hip, young face to the abstract anxiety shared by many people in the United States and beyond about the menace posed by government snooping when it is fully empowered by technology.

At Princeton this month, the director of the university’s program in law and public affairs, Kim Lane Scheppele, introduced Snowden to a crowd that filled a large auditorium and two overflow rooms. She acknowledged that it was unusual for a program on law to feature as speaker someone facing serious criminal charges.
“But the very size of this audience today,” she said, “indicates that Edward Snowden has done something very important, by disclosing information that alerted the public to what was being done in our name.”
Then the huge, projected image of Snowden himself loomed over the stage. He laughed sheepishly, muttering about looking like Big Brother.

The next week, he spoke to the Nordic Media Festival in Bergen, Norway, a day after the court ruled against the NSA’s phone data program. “This being struck down is really a radical sea change in the level of resistance that the United States government has faced thus far,” Snowden said, clearly excited. He predicted a ripple effect far beyond that program, saying, “It will affect every other mass surveillance program in the United States going forward.”

Recently, at Stanford, he fielded the inevitable question: Is he a hero or a traitor? “It’s not about me,” he insisted. “It’s about us. I’m not a hero. I’m not a traitor. I’m an ordinary American like anyone else in the room.”

But he was not in that room in California, and he spoke a little wistfully about that. “If the opportunity was presented, I would of course come home,” he said. “Because that’s where I live. That’s where my family is.”

New York Times:                Dark Reading

« German BND Intelligence Cooperation with NSA has Actually Expanded.
Device to protect your vehicle from “Sticky bombs” »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.