The government has charged Snowden under the Espionage Act, a World War One-era law that doesn’t distinguish between selling secrets to foreign governments and giving them to journalists working in the public interest. If Snowden were to be tried under the charges he faces, any argument that his actions benefited the public would be inadmissible in court.
The Pardon Snowden campaign will work through the end of Obama’s administration to make the case that Snowden’s act of whistleblowing benefited the United States and enriched democratic debate worldwide, and we’re asking citizens to write to the president via our website.
Though some government officials claimed that irreversible harm had been done to US national security, little evidence has been aired publicly. Snowden entrusted the release of information to seasoned journalists and made them promise to inform the government and consider any claim of harm to national security in advance of publication. Adm. Michael Rogers, on taking the helm of the NSA a year into the revelations, told the New York Times he couldn’t say “the sky is falling.” Even Attorney General Eric Holder, who still advocated Snowden’s prosecution as he left office, conceded he performed “a public service.”
“Edward Snowden clearly acted in the public interest. He sparked one of the most important debates about government surveillance in decades, and brought about a global movement in defence of privacy in the digital age. Punishing him for this sends out the dangerous message that those who witness human rights violations behind closed doors should not speak out,” said Salil Shetty, Amnesty International’s Secretary General.
“It is ironic that it is Snowden who is being treated like a spy when his act of courage drew attention to the fact that the US and UK governments were illegally spying on millions of people without their consent.
“The mass surveillance exposed by Snowden impacts the human rights of people around the world. Our new campaign gives the public a chance to call for his pardon and thank him for triggering action by concerned individuals around the world to take back their privacy.”
Several prominent individuals have lent their support to the effort as well, including Steve Wozniak, Eve Ensler, Daniel Ellsberg, and Teju Cole. Bernie Sanders is also urging some form of clemency fror Snowden.
Why this push now? Obama is leaving office (typically a good time for pardons) and Oliver Stone’s Snowden is due out in theaters tomorrow. The reviews aren’t bad and Joseph Gordon-Levitt’s impersonation of Snowden is uncanny (see the trailer).
National Security Agency whistleblower Edward Snowden has been working with prominent hardware hacker Andrew “Bunnie” Huang to solve this problem. The pair are developing a way for potentially imperiled smartphone users to monitor whether their devices are making any potentially compromising radio transmissions. They argue that a smartphone’s user interface can’t be relied to tell you the truth about that state of its radios. Their initial prototyping work uses an iPhone 6.
“We have to ensure that journalists can investigate and find the truth, even in areas where governments prefer they don’t,” Snowden told me in a video interview. “It’s basically to make the phone work for you, how you want it, when you want it, but only when.”
They are calling the device an introspection engine:1
Snowden and Huang are calling this device an “introspection engine” because it will inspect the inner-workings of the phone. The device will be contained inside a battery case, looking similar to a smartphone with an extra bulky battery, except with its own screen to update the user on the status of the radios. Plans are for the device to also be able to sound an audible alarm and possibly to also come equipped with a “kill switch” that can shut off power to the phone if any radio signals are detected. “The core principle is simple,” they wrote in the blog post. “If the reporter expects radios to be off, alert the user when they are turned on.”
Huang also announced today that he’s suing the US government over Section 1201 of the Digital Millennium Copyright Act:
Section 1201 means that you can be sued or prosecuted for accessing, speaking about, and tinkering with digital media and technologies that you have paid for. This violates our First Amendment rights, and I am asking the court to order the federal government to stop enforcing Section 1201.
Good name, although I believe they missed a good opportunity to call it the Snow Bunnie. Perhaps that was the code name? โฉ
Joseph Gordon-Levitt plays Edward Snowden in this film directed by Oliver Stone. I was not at all curious about seeing this, but after watching the trailer, I may give it a shot. See also Citizenfour (which was excellent).
HLN (which used to be CNN Headline News) needed someone to talk about Edward Snowden, US government whistleblower. They meant to invite a gentleman named John Hendren, a journalist for Al Jazeera, onto the show but instead invited funnyman Jon Hendren, who goes by the username of @fart on Twitter. Hendren, Jon used the opportunity to defend both Edward Snowden, briefly, and then sexy-but-misunderstood barber Edward Scissorhands.
Well, you know, to say he couldn’t harm someone, well, absolutely he could. But I think to cast him out, to make him invalid in society, simply because he has scissors for hands, I mean, that’s strange. People didn’t get scared until he started sculpting shrubs into dinosaur shapes and whatnot.
The best part is that anchor Yasmin Vossoughian just keeps on plowing right through her script like they’re not talking suddenly about a man with scissors for hands, deftly demonstrating what a farce these TV news “conversations” are. (via nymag)
“If you look at encrypted communication, if they are properly encrypted, there is no real way to tell that they are encrypted,” Snowden said. “You can’t distinguish a properly encrypted communication from random behaviour.”
Therefore, Snowden continued, as human and alien societies get more sophisticated and move from “open communications” to encrypted communication, the signals being broadcast will quickly stop looking like recognisable signals.
“So if you have an an alien civilization trying to listen for other civilizations,” he said, “or our civilization trying to listen for aliens, there’s only one small period in the development of their society when all their communication will be sent via the most primitive and most unprotected means.”
After that, Snowden said, alien messages would be so encrypted that it would render them unrecognisable, “indistinguishable to us from cosmic microwave background radiation”. In that case, humanity would not even realise it had received such communications.
Snowden shared his hypothesis with Neil deGrasse Tyson on Tyson’s podcast, StarTalk.
Last night on Last Week Tonight, John Oliver took on the topic of government surveillance and traveled to Moscow to interview Edward Snowden. After some softball questions โ “Do you miss Hot Pockets?” โ Oliver presses Snowden on his personal responsibility with regard to the information he revealed.
Considering the enormous value of the information he has revealed, and the abuses he has exposed, Mr. Snowden deserves better than a life of permanent exile, fear and flight. He may have committed a crime to do so, but he has done his country a great service. It is time for the United States to offer Mr. Snowden a plea bargain or some form of clemency that would allow him to return home, face at least substantially reduced punishment in light of his role as a whistle-blower, and have the hope of a life advocating for greater privacy and far stronger oversight of the runaway intelligence community.
He took the name of a humble saint and then called for a church of healing. The first non-European pope in 1,200 years is poised to transform a place that measures change by the century.
According to Time, its award, which will be bestowed on Wednesday, goes to the person who, in the opinion of the magazine’s editors, had the most influence on the news. By this metric, it’s no contest. In downloading thousands of files from the computers of the electronic spying agency and handing them over to journalists like Glenn Greenwald, Laura Poitras, and Barton Gellman, Snowden unleashed a torrent of news stories that began in May, when the Guardian and the Washington Post published a series of articles about the N.S.A.’s surveillance activities. Seven months later, the gusher is still open. Just last week, we learned that the agency is tracking the whereabouts of hundreds of millions of cell phones, gathering nearly five billion records a day.
Edward Snowden’s leak of NSA documents keeps paying dividends. The latest report (in the Guardian, the NY Times, and Pro Publica) alleges that the NSA has cracked or circumvented many of the internet security protocols designed to keep communications private from third parties. From the Pro Publica piece:
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume โ or have been assured by Internet companies โ that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
Probably the biggest concern in all this is the evidence of collaboration between the NSA and unspecified ‘telecom providers’. We already know that the major US (and international) telecom carriers routinely assist the NSA in collecting data from fiber-optic cables. But all this data is no good if it’s encrypted.
While software compromises and weak standards can help the NSA deal with some of this, by far the easiest way to access encrypted data is to simply ask for โ or steal โ the keys. This goes for something as simple as cellular encryption (protected by a single key database at each carrier) all the way to SSL/TLS which is (most commonly) protected with a few relatively short RSA keys.
1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.
2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections โ and it may have explicit exploits against these protocols โ you’re much better protected than if you communicate in the clear.
By now, you’ve likely heard of Edward Snowden, the former NSA contractor who leaked secret documents to the press regarding that agency’s electronic surveillance activities. From Glenn Greenwald’s excellent coverage for The Guardian, here are a few of the most interesting passages from interviews with Snowden.
From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.
โ
Despite these fears, he remained hopeful his outing will not divert attention from the substance of his disclosures. “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.” He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them.”
He has had “a very comfortable life” that included a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves. “I’m willing to sacrifice all of that because I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”
โ
“All my options are bad,” he said. The US could begin extradition proceedings against him, a potentially problematic, lengthy and unpredictable course for Washington. Or the Chinese government might whisk him away for questioning, viewing him as a useful source of information. Or he might end up being grabbed and bundled into a plane bound for US territory.
“Yes, I could be rendered by the CIA. I could have people come after me. Or any of the third-party partners. They work closely with a number of other nations. Or they could pay off the Triads. Any of their agents or assets,” he said.
“We have got a CIA station just up the road โ the consulate here in Hong Kong โ and I am sure they are going to be busy for the next week. And that is a concern I will live with for the rest of my life, however long that happens to be.”
โ
He left the CIA in 2009 in order to take his first job working for a private contractor that assigned him to a functioning NSA facility, stationed on a military base in Japan. It was then, he said, that he “watched as Obama advanced the very policies that I thought would be reined in”, and as a result, “I got hardened.”
The primary lesson from this experience was that “you can’t wait around for someone else to act. I had been looking for leaders, but I realised that leadership is about being the first to act.”
โ
“I carefully evaluated every single document I disclosed to ensure that each was legitimately in the public interest,” he said. “There are all sorts of documents that would have made a big impact that I didn’t turn over, because harming people isn’t my goal. Transparency is.”
A: “The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.
“I don’t want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.”
โ
Q: What do the leaked documents reveal?
A: “That the NSA routinely lies in response to congressional inquiries about the scope of surveillance in America. I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinised most. We collect more digital communications from America than we do from the Russians.”
โ
Q: What is your reaction to Obama denouncing the leaks on Friday while welcoming a debate on the balance between security and openness?
A: “My immediate reaction was he was having difficulty in defending it himself. He was trying to defend the unjustifiable and he knew it.”
โ
Q: Washington-based foreign affairs analyst Steve Clemons said he overheard at the capital’s Dulles airport four men discussing an intelligence conference they had just attended. Speaking about the leaks, one of them said, according to Clemons, that both the reporter and leaker should be “disappeared”. How do you feel about that?
A: “Someone responding to the story said ‘real spies do not speak like that’. Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process - they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general.”
Four decades ago, Daniel Ellsberg surrendered to federal authorities to face charges of violating the Espionage Act. During his trial, he was allowed to go free on bail, giving him a chance to explain his actions to the media. His case was eventually thrown out after it was revealed that the government had wiretapped him illegally.
Bradley Manning, a soldier who released classified documents to WikiLeaks in 2010, has had a very different experience. Manning was held for three years without trial, including 11 months when he was held in de facto solitary confinement. During some of this period, he was forced to sleep naked at night, allegedly as a way to prevent him from committing suicide. The United Nations’ special rapporteur on torture has condemned this as “cruel, inhuman and degrading treatment in violation of Article 16 of the convention against torture.”
Stay Connected