As he seeks a pardon, the NSA thief has told multiple lies about what he stole and his dealings with Russian intelligence.
Edward Jay Epstein writes: Of all the lies that Edward Snowden has told since his massive theft of secrets from the National Security Agency and his journey to Russia via Hong Kong in 2013, none is more provocative than the claim that he never intended to engage in espionage, and was only a “whistleblower” seeking to expose the overreach of NSA’s information gathering. With the clock ticking on Mr. Snowden’s chance of a pardon, now is a good time to review what we have learned about his real mission.
Mr. Snowden’s theft of America’s most closely guarded communication secrets occurred in May 2013, according to the criminal complaint filed against him by federal prosecutors the following month. At the time Mr. Snowden was a 29-year-old technologist working as an analyst-in-training for the consulting firm of Booz AllenHamilton at the regional base of the National Security Agency (NSA) in Oahu, Hawaii. On May 20, only some six weeks after his job there began, he failed to show up for work, emailing his supervisor that he was at the hospital being tested for epilepsy.
This excuse was untrue. Mr. Snowden was not even in Hawaii. He was in Hong Kong. He had flown there with a cache of secret data that he had stolen from the NSA.
This was not the only lie Mr. Snowden told. As became clear during my investigation over the past three years, nearly every element of the narrative Mr. Snowden has provided, which reached its final iteration in Oliver Stone’s 2016 movie, “Snowden,” is demonstrably false.
This narrative began soon after Mr. Snowden arrived in Hong Kong, where he arranged to meet with Laura Poitras, a Berlin-based documentary filmmaker, and Glenn Greenwald, a Brazil-based blogger for the Guardian. Both journalists were longtime critics of NSA surveillance with whom Mr. Snowden (under the alias Citizen Four) had been in contact for four months.
To provide them with scoops discrediting NSA operations, Mr. Snowden culled several thousand documents out of his huge cache of stolen material, including two explosive documents he asked them to use in their initial stories. One was the now-famous secret order from America’s Foreign Intelligence Surveillance Act court requiring Verizon to turn over to the NSA its billing records for its phone users in the U.S. The other was an NSA slide presentation detailing its ability to intercept communications of non-American users of the internet via a joint program with the FBI code-named Prism.
These documents were published in 2013 on June 5 and 6, followed by a video in which he identified himself as the leaker and a whistleblower.
At the heart of Mr. Snowden’s narrative was his claim that while he may have incidentally “touched” other data in his search of NSA files, he took only documents that exposed the malfeasance of the NSA and gave all of them to journalists.
Yet even as Mr. Snowden’s narrative was taking hold in the public realm, a secret damage assessment done by the NSA and Pentagon told a very different story. According to a unanimous report declassified on Dec. 22 by the House Permanent Select Committee on Intelligence, the investigation showed that Mr. Snowden had “removed” (not merely touched) 1.5 million documents. That huge number was based on, among other evidence, electronic logs that recorded the selection, copying and moving of documents.
The number of purloined documents is more than what NSA officials were willing to say in 2013 about the removal of data, possibly because the House committee had the benefit of the Pentagon’s more-extensive investigation. But even just taking into account the material that Mr. Snowden handed over to journalists, the December House report concluded that he compromised “secrets that protect American troops overseas and secrets that provide vital defenses against terrorists and nation-states.” These were, the report said, “merely the tip of the iceberg.”
The Pentagon’s investigation during 2013 and 2014 employed hundreds of military-intelligence officers, working around the clock, to review all 1.5 million documents. Most had nothing to do with domestic surveillance or whistle blowing. They were mainly military secrets, as Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, testified before the House Armed Services Committee on March 6, 2014. Read the rest of this entry »
It’s a brand of information warfare, known as ‘dezinformatsiya,’ that has been used by the Russians since at least the Cold War. The disinformation campaigns are only one ‘active measure’ tool used by Russian intelligence to ‘sow discord among,’ and within, allies perceived hostile to Russia.
Natasha Bertrand reports: Russia’s troll factories were, at one point, likely being paid by the Kremlin to spread pro-Trump propaganda on social media.
That is what freelance journalist Adrian Chen, now a staff writer at The New Yorker, discovered as he was researching Russia’s “army of well-paid trolls” for an explosive New York Times Magazine exposé published in June 2015.
“The DNC hack and dump is what cyberwar looks like.”
“A very interesting thing happened,” Chen told Longform‘s Max Linsky in a podcast in December.
“I created this list of Russian trolls when I was researching. And I check on it once in a while, still. And a lot of them have turned into conservative accounts, like fake conservatives. I don’t know what’s going on, but they’re all tweeting about Donald Trump and stuff,” he said.
Linsky then asked Chen who he thought “was paying for that.”
“I don’t know,” Chen replied. “I feel like it’s some kind of really opaque strategy of electing Donald Trump to undermine the US or something. Like false-flag kind of thing. You know, that’s how I started thinking about all this stuff after being in Russia.”
In his research from St. Petersburg, Chen discovered that Russian internet trolls — paid by the Kremlin to spread false information on the internet — have been behind a number of “highly coordinated campaigns” to deceive the American public.
“I created this list of Russian trolls when I was researching. And I check on it once in a while, still. And a lot of them have turned into conservative accounts, like fake conservatives. I don’t know what’s going on, but they’re all tweeting about Donald Trump and stuff.”
— Adrian Chen
It’s a brand of information warfare, known as “dezinformatsiya,” that has been used by the Russians since at least the Cold War. The disinformation campaigns are only one “active measure” tool used by Russian intelligence to “sow discord among,” and within, allies perceived hostile to Russia.
“An active measure is a time-honored KGB tactic for waging informational and psychological warfare,” Michael Weiss, a senior editor at The Daily Beast and editor-in-chief of The Interpreter — an online magazine that translates and analyzes political, social, and economic events inside the Russian Federation — wrote on Tuesday.
He continued (emphasis added):
“It is designed, as retired KGB General Oleg Kalugin once defined it, ‘to drive wedges in the Western community alliances of all sorts, particularly NATO, to sow discord among allies, to weaken the United States in the eyes of the people in Europe, Asia, Africa, Latin America, and thus to prepare ground in case the war really occurs.’ The most common subcategory of active measures is dezinformatsiya, or disinformation: feverish, if believable lies cooked up by Moscow Centre and planted in friendly media outlets to make democratic nations look sinister.”
It is not surprising, then, that the Kremlin would pay internet trolls to pose as Trump supporters and build him up online. In fact, that would be the easy part. Read the rest of this entry »
Nearly 20,000 emails sent and received by Democratic National Committee staff members were released by Wikileaks, with one message in particular raising questions about the committee’s impartiality during the Democratic primary.
Fr. Marcel Guarnizo writes: With each passing news day, the scandal deepens around Hillary Clinton’s unauthorized removal of U.S. secrets during her tenure as Secretary of State.
The process of this unauthorized extraction of U.S. secrets by Mrs. Clinton makes one thing impossibly clear. This conspiracy was anything but convenient to Mrs. Clinton. Contrary to what she disingenuously claimed, convenience was most definitely not the reason for her actions. To remove Top Secret information and hundreds of other classified documents from the government’s care, she had to risk jail and even get others to collude in this process.
For nearly eight months, I observe that the most important question is still not being asked of Hillary Clinton and her partisans. Why was Clinton doing this?
As anyone knows it is impossible for Hillary Clinton to end up with a colossal stash of U.S. national secrets on her personal server by accident. She could not simply email herself most of this information. She had to engage others to do that which put them at obvious risk of breaking the espionage act and ending up in jail. It is absurd that the F.B.I. director Comey and several pundits continue to give her a pass on the absolutely bogus and irrational excuse that it was all done for the sake of convenience.
The real question is why was Hillary Clinton doing this? Here is one theory. She was trafficking in U.S. National Security secrets for personal gain, money. She was also making this information available to Bill Clinton and the Clinton foundation people. Their information being extremely valuable to intelligence services and private corporations was being rewarded through contributions to the Clinton foundation. The Clinton foundation essentially was being used to launder payments for influence and information under the guise of a legitimate charitable purpose.
The Clinton National Security Scandal is a more accurate name for what is occurring than the cynical euphemism, “ The Clinton E-mail scandal.” E-mail scandals are a dime a dozen.
Her unprecedented actions are materially no different than the actions of any person (formally charged for espionage), who provides or makes available secrets of the highest caliber to a host of “contributors”.
It matters little, that someone trafficking in U.S. secrets may not have been enlisted formally by a foreign government. Trafficking in U.S. National security secrets is exactly what these notorious spies were doing and in this regard it is becoming apparently clear, that Clinton’s actions are really all that any mole or spy would have to do to sell or profit from revealing U.S. secrets.
Allegedly the Clinton breach also contained names of our human assets and their methods, endangering thus their lives and indeed making available by her actions the most coveted information sought by foreign intelligence services.
Selling Secretes in the Age of Cyber Space
From a philosophical point of view, the essence of spying and treason (trafficking in U.S. National Security secrets), requires that fundamentally two necessary actions take place:
1. The spy or traitor has to accomplish the removal in an unauthorized manner of sensitive information, classified information, or, even graver, top secret information, from its rightful owner, namely the U.S. government. Indeed Clinton had authority to read the information, she had access. But she certainly did not have the authority to remove top secret information and put it on an unsecured server. Or allow others not authorized, access to U.S. National secrets.
Stealing information, or removing the information from its proper owner (The U.S. government) without proper authorization is half of the operation required for a mole to betray secrets.
Most information mercenaries and spies have licit access to the information, but they certainly do not have permission to remove it or make it their own and certainly they are not allowed to put it on an unsecured servers where the enemies of America can come and collect the information. Read the rest of this entry »
MOSCOW—James Marson and Andrey Ostroukh report: Striking a defiant tone, President Vladimir Putin on Thursday accused the West of provoking a crisis in Ukraine and using sanctions to try to constrain Russia.
In his annual state of the union address, Mr. Putin defended Moscow’s annexation of Ukraine’s Crimea region in March, saying Russia would never give up the “sacred” peninsula. He accused the U.S. and Europe of cynically using the Ukraine crisis as an excuse to pursue a long-held strategy aimed at weakening Russia.
“The policy of containment was not invented yesterday. It has been carried out against our country for many years,” he said. “Whenever someone thinks that Russia has become too strong or independent, these tools are quickly put into use.”
Mr. Putin’s one-hour speech in the Kremlin’s ornate St. George’s Hall underscored his hard-line response to Western sanctions that, along with low oil prices, have pushed Russia’s economy toward recession. Read the rest of this entry »
“We are aware that the Russian ships Viktor Leonov and Nikolay Chiker are currently operating in waters that are beyond U.S. territorial seas but near Cuba…”
— Lt. Col. Tom Crosson, a Pentagon spokesman
For The Washington Free Beacon, Bill Gertz reports: A Russian intelligence-gathering ship has been operating off the U.S. East Coast and near the Gulf of Mexico for the past month, the Pentagon said Thursday.
“We are aware that the Russian ships Viktor Leonov and Nikolay Chiker are currently operating in waters that are beyond U.S. territorial seas but near Cuba,” said Lt. Col. Tom Crosson, a Pentagon spokesman. “We respect the freedom of all nations, as reflected in international law, to operate military vessels beyond the territorial seas of other nations.”
The Leonov is an intelligence gathering ship outfitted with high-tech electronic spying gear. The Chiker is an ocean-going naval tug that has been accompanying the spy ship on its mission. Pentagon officials suspect the ships were part of a spying operation since March against the U.S. nuclear missile submarine base at Kings Bay, Ga. and other U.S. military facilities. Read the rest of this entry »