Snowden: The Deep State’s Influence On The Presidency

Famed whistleblower Edward Snowden was recently interviewed by the Italian publication, La Repubblica. The publication noted the 5-year mark of Snowden’s historic act of blowing the whistle on the NSA’s expansive surveillance programs and that “many thought he would end up very badly".

But when he connects via video-link for this interview with la Repubblica, he seems to be doing very well: the frank smile and peaceful face of someone who is easy in his mind.”

Snowden explained how the presidencies of both Obama and Trump are shaped by the Deep State following an illuminating question by journalist Stefania Maurizi.

Stefania Maurizi: We saw that President Obama, who was an outsider to the US military-intelligence complex, initially wanted to reign in the abuses of agencies like the CIA and the NSA, but in the end he did very little.

Now we see a confrontation between president Trump and so-called Deep State, which includes the CIA and the NSA. Can a US president govern in opposition to such powerful entities?

Edward Snowden: Obama is certainly an instructive case. This is a president who campaigned on a platform of ending warrantless wiretapping in the United States, he said “that’s not who we are, that’s not what we do,” and once he became the president, he expanded the program.  

He said he was going to close Guantanamo but he kept it open, he said he was going to limit extrajudicial killings and drone strikes that has been so routine in the Bush years. But Obama went on to authorise vastly more drone strikes than Bush. It became an industry.

As for this idea that there is a Deep State, now the Deep State is not just the intelligence agencies, it is really a way of referring to the career bureaucracy of government.

These are officials who sit in powerful positions, who don’t leave when presidents do, who watch presidents come and go, they influence policy, they influence presidents and say: this is what we have always done, this is what we must do, and if you don’t do this, people will die.

It is very easy to persuade a new president who comes in, who has never had these powers, but has always wanted this job and wants very, very badly to do that job well.

A bureaucrat sitting there for the last twenty years says: I understand what you said, I respect your principles, but if you do what you promised, people will die.

It is very easy for a president to go: well, for now, I am going to set this controversy to the side, I’m going to take your advice, let you guys decide how these things should be done, and then I will revisit it, when I have a little more experience, maybe in a few months, maybe in a few years, but then they never do.

This is what we saw quite clearly happen in the case of Barack Obama: when this story, of Snowden exposing the NSA’s mass surveillance, came forward in 2013, when Obama had been president for five years, one of the defences for this from his aides and political allies was: oh, Obama was just about to fix this problem! 

And sure enough, he eventually was forced from the wave of criticism to make some limited reforms, but he did not go far enough to end all of the programs that were in violation of the law or the constitution of the United States.

That too was an intentional choice: he could have certainly used the scandal to advocate for all of the changes that he had campaigned on, to deliver on all of his promises, but in those five years he had become president, he discovered something else, which is that there are benefits from having very powerful intelligence agencies, there are benefits from having these career bureaucrats on your side, using their spider web over government for your benefit.

Imagine you are Barack Obama, and you realise, yes, when you were campaigning you were saying: spying on people without a warrant is a problem, but then you realise: you can read Angela Merkel’s text messages. Why bother calling her and asking her opinion, when you can just read her mind by breaking the law?

It sounds like a joke, but it is a very seductive thing. Secrecy is perhaps the most corrupting of all government powers, because it takes public officials and divorces them from accountability to the public.

When we look at the case of Trump, who is perhaps the worst of politicians, we see the same dynamic occurring. This is a president who said the CIA is the enemy, it’s like Nazi Germany, they’re listening to his phone calls, and all of these other things, some claims which are true, some claims which are absolutely not.  A few months later, he is authorising major powers for these same agencies that he has called his enemies.

And this gets to the central crux of your question, which is: can any president oppose this?  The answer is certainly. The president has to have some familiarity going in with the fact that this pitch is going to be made, that they are going to try to scare him or her into compliance.

The president has to be willing to stand strongly on line and say: ‘I was elected to represent the interests of the American people, and if you’re not willing to respect the constitution and our rights, I will disband your agency, and create a new one’. I think they can definitely be forced into compliance, because these officials fear prison, just like every one of us.

Eurasia Review:

Snowden Says Social Media Is Surveillance 'Rebranded':

« Australia’s Cybersecurity Adviser Calls For Privacy
The US Power Grid Needs Better Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.