Sunday, October 12, 2014

Snowden is No Traitor, and Here is Why.

"He told me, in Moscow: "It's not that I'm some special messenger blessed by God or anyone else to take on this role. It's just that, if you look around the table and nobody else is doing it, year after year, you realize, if you don't do it, it's not going to happen."
 --Barton Gellman
How the Treason Meme Began
At the bottom of this page is a link to an interview with Edward Snowden, conducted on 11 October, 2014, courtesy of The New Yorker. It is a little more than an hour long. It is conducted by Jane Mayer.
I recommend that you watch this interview, then rewind it to about the 25:00 minute mark and watch it again. That is where you will see Snowden explain the widely reported criticisms of William Binney, who stated over a year ago that Snowden "went too far," that Snowden's leaks regarding foreign targets compromised by NSA verged on "treason."
Mr. Binney later recanted that statement, he now subscribes to Snowden’s assessment of the situation, and he characterizes Snowden as a "patriot," not as a "traitor."
In the debate on Snowden as either patriot or traitor, Binney opts for the former: “I would put him as a patriot, yes. He is trying to stand up for the Constitution. That’s what we all did and our government attacked us for doing that. So, in my view, the government is the criminal here.”
Worse for Snowden critics, after more than a year of Snowden revelations, Mr. Binney, the architect of THINTHREAD, now warns of a global despotic tyranny that is intended to control entire populations

Snowden is Working for the Chinese? 
One of the earliest Snowden leaks was made by Snowden himself to the South China Morning Post. Speaking from Hong Kong, that revelation rocked NSA's world, and the fears of the deep state and the paranoia of American intelligence skyrocketed. In retrospect, sober analysts realized that Snowden's leak in this instance did not concern military targets, it did not refer to NSA penetration of Chinese military targets, which are appropriately surveilled by American intelligence. What it revealed was NSA penetration of Chinese economic targets, Chinese health infrastructure, Chinese university networks, Chinese civilian networks
There is no question that Snowden knows in detail which Chinese military targets are penetrated by NSA. He could provide lists of those devices, or he could have done so before he went to Moscow, had he desired to curry favor with the Chinese government or if he had engaged in any sort of quid pro quo exchange with them. That never happenedIf Snowden blew every Chinese military target and every Chinese infrastructure node compromised by NSA, the consequences would be catastrophic, and American intelligence efforts would suffer a setback that would take us a generation to repair, if it were even feasible. It would be impossible to conceal such a disaster.

I have long said that the most valuable real estate on the planet is the six inches between Snowden's ears. Nobody in history so meticulously stole, read, processed, sorted and filed such an archive of the most highly classified information possessed by American intelligence. Nobody knows more about NSA and FVEY than Snowden, not even the current DIRNSA. He does not have time to read it all. Snowden did. Snowden sorted his archive with a diligence that Glenn Greenwald characterized as "elegant," including explanatory FAQs and definitions of highly technical material. 

Snowden is often criticized because he blew the whistle in Hong Kong, and then accepted asylum in Russia. Snowden carefully studied the persecution of prior NSA whistleblowers, and he realized that there was no internal policy that he could follow. Snowden knew that he would be immediately arrested and imprisoned pending trial if he leaked NSA documents in any American jurisdiction. So to Hong Kong he went. And in contrast to previous NSA whistleblowers, he decided to take documents. Conservatively 200,000 of them. The family jewels of American SIGINT.

" ... He talked about Bill Binney. He talked about Tom Drake. He talked about some of the others. He said that when you try to work the system from the inside, first of all, the system will reach out and crush you. ... 
The other lesson he learned from Drake and Binney is that you can be discredited or your claims deflected, or people won't know whether to believe you if you don't have proof. And it was because of that that he decided it had to be documents, and it had to be a lot of documents, because one document would be one story. ... 
It had to be proof. It had to be documents, and it had to be a lot of documents, because one document is one story. Maybe it goes on for a few days, and people stop. And in the context that will be described by the U.S. government, it will be, "Well, that's just this thing over here." He wanted to show the breadth and depth of the surveillance state that had grown up with(out) our knowledge. And to do that, there had to be a lot of material, a lot of perspectives on it, and a lot of stories over time."

More Detail
Here are the words of Thomas Drake, a former super grade at NSA, who was prosecuted under the Espionage Act for dissenting against the wholesale surveillance of Americans. After a ruinous legal battle, all charges were dropped, except for a lone charge of unauthorized use of a computer. Drake was bankrupted by his prosecution. His life was demolished. On Snowden:
"He knew he would have to escape the United States to have any chance of getting explosive documentation detailing how vast the surveillance state had grown, had gone, both domestically as well as overseas, just bulk-copy access to millions and millions of records of citizens, both U.S. citizens as well as other citizens, completely innocent, had nothing to do with any kind of investigation, right -- this pathological condition now that is now fully institutionalized."
Snowden by his own testimony purged all copies of purloined documents in his possession after he turned them over to Glenn Greenwald and Laura Poitras in Hong Kong. Snowden took no documents with him when he departed Hong Kong, he sanitized his devices, and he landed in Moscow empty handed, because he knew that he would be vulnerable to interdiction as he traveled to asylum in South America. Snowden stored no data on his infamous four laptops. He kept it all on encrypted thumb drives. He took none with him. 

Barton Gellman describes Snowden:
"But one of the jobs he had was to train U.S. intelligence personnel on how to operate in what's called a high-threat digital environment, how to go to a place where you know you're under surveillance by somebody good, and threat model is China, and how to use, even on untrusted hardware, even on a machine that might have been compromised by the bad guys, how to communicate securely. That's the kind of thing he was good at. And sometimes he was asked to train other intelligence personnel on how to do that."
It is rumored, often speculated, that Snowden uploaded an encrypted archive of his purloined documents to some dark corner of the internet, where it waits, as a sort of doom's day deadman's switch, to erupt in the event of his untimely death or his arrest. Snowden scoffs at the notion, asking why he would do something that might incite his assassination by agents of the American state. The rumors persist. Diane Roarke states that Snowden indeed did do this, precisely because he feared assassination. 

You must keep in mind that Snowden was selected by DIA to teach cyber-countermeasures for the Chinese counterintelligence course at the Joint Counterintelligence Training Academy. Snowden is deeply trained, contrary to glib criticisms that he "could not possibly know what he knows," or "he could not possibly have access to so many compartments." To assess this high school dropout with a Microsoft Certified Systems Engineer certificate as "bright" would be an understatement (Glenn Greenwald, No Place to Hide, pg. 59). No one in history ever pulled a coup comparable to Snowden.

Again, Barton Gellman on Snowden:

"Right. In the early days, people talked about him as some kind of a low-level technician. He couldn't possibly have access to all this stuff. You have to realize that, in the CIA and the NSA, a lot of times the number of policymakers, people at the top who know about a thing, is very small. But you need a lot more people at the operating level to know, or you can't get done at all.

So in the CIA, Snowden had clearances for human intelligence. In the NSA, he had clearances for many, many compartments, specially protected parts of top-secret information in what's called signals intelligence. That's the electronic surveillance. And he had a third set of powers, which is actually called super user, when you're a system administrator in which you have root-level access to processes that anybody else would be locked out from. And that combination of human and signals intelligence and super user, sys admin power, it's a very potent combination that opened many, many doors to him."

The Task Force Fails
As events transpired, Snowden ended up stranded in Moscow, in a misstep that should have caused heads to roll in Langley, Foggy Bottom, and the White House. The task force running the effort to apprehend Snowden directed the State Department to cancel Snowden's passport while he was in Hong Kong, hoping to strand him there, and then pressure the Chinese government to expel him back to America. Instead, the Chinese put Snowden on a plane, and once he landed at Sheremetyevo, ahead of a connecting flight to Havana and then South America, the Russians declined to let him continue on his way. And why would they? Never in history had such a prize just plopped into their hands. 

Snowden spent 40 days in the transit terminal at that airport, and there is no question that he was interviewed by the Russian FSB. The geniuses responsible for stranding Snowden in Moscow, and delivering him straight into the loving hands of the Russian FSB, were never held accountable.  No one knows what transpired between Snowden and the FSB, but he should not have been stranded there in the first place. Seriously: what the fuck was that? 
The bottom line: no Chinese military penetrations by NSA went offline after Snowden went public. NSA would know instantly if Snowden compromised NSA military penetrations because they would go dark. Snowden did not do that, and NSA knows it. Compromised Chinese military devices remain online, and NSA retains much access, though China is incrementally hardening its networks, an exercise which will take some time. 

Indeed, China is now counterattacking, in a deniable cyberwar that pits hackers against hackers. Likewise with Russia. There is no evidence that the FSB got anything useful out of Snowden. Just as in China, no Russian devices that were compromised by NSA went offline. NSA has compromised legions of devices worldwide: routers, switches, controllers, servers, all manner of infrastructure, and such network devices in China and Russia will always be priority targets. 

One observation that Snowden makes, and it is pertinent: if NSA had proof of treason committed by him, it would be front page news. The task force demonizing Snowden would exploit it to escalate their continuing campaign of character assassination against him. That has not happened, because Snowden did not commit treason. Not by any definition. 

Treason and the Founding Fathers
Treason is the lone crime defined in the Constitution, in Article I, Section 3: "Treason against the United States shall consist only in levying war against them, or in adhering to their Enemies, giving them Aid and Comfort." Accordingly, 18 U.S. Code  §  2831 incorporates the same definition. Snowden has manifestly not waged war on America, nor adhered to our enemies. Residing in Russia because the American government trapped him there does not qualify as adhesion.

Indeed, Snowden acted out of profound patriotism, and a deep understanding of what it means to be American. Remember that the Framers were themselves brigands and revolutionaries who waged a war of independence against the English Crown. They knew exactly what was treason, and what was not. Think on that, the next time that some Snowden critic, some Congressman, some bureaucrat, condemns Snowden as a traitor. They could not even be bothered to read the actual statute. Groupthink much? 

Finally, you could always go back and ask William Binney about his statement. That old quote of his alleging potential “treason” on the part of Snowden happened a million years ago in internet time, and his theoretical response to a hypothetical question was quickly revised. Binney continually issues retractions and clarifications on the issue, but the meme persists, mostly because it meshes with the party line flogged by Snowden critics. 

Mr. Binney appeared at the New Yorker event. His patriotism and his integrity are unimpeachable. If Mr. Binney felt that Snowden engaged in treason, he would not attend such functions, nor would he speak in support of him. Remember that Mr. Binney is not well. His health is not good. The American government is not doing him any favors, and this is a man who dedicated 36 years of his life to the service of NSA. We owe a debt of gratitude to Mr. Binney. 

In truth, we owe an un-payable debt to all recent NSA whistleblowers. It is worth mentioning that they unanimously support Edward Snowden.

The FVEY Panopticon
Understanding the global surveillance network which is arising in the form of FVEY is critical, not just because it affects Americans, but because it affects the liberties, the security, and the privacy of all users of the internet worldwide. Suspicionless mass surveillance threatens the integrity of the internet itself as a whole, and Snowden, like any cypherpunk, comes down on the side of the digital proletariat, his people, opposing The Man, opposing any threat imperiling the liberties of mankind. 

Above all, Snowden acts as any good son of the internet should. Snowden acts to secure the net, he sees the net as the patrimony of humanity. While it is true that the net was invented in America, deriving from the DOD program ARPANET, and it is also true that ICANN, an American nonprofit, controls the root DNS registries, there is increasing pushback from other countries that insist that the American government must temper its digital hegemony.

Although the net may reflect much American innovation in practice, it does not belong to us, and no lone nation, not us, not anyone, can claim “ownership” of it. That NSA would seek to subvert the internet and convert it into a mechanism of global surveillance is cynical and heretical in the extreme.
I myself think that the problem of FVEY could end up eclipsing NSA and FBI domestic abuses which directly violate the Fourth Amendment. When you understand how FVEY works, how the British GCHQ acts for the benefit of NSA, and NSA acts for the benefit of GCHQ, the supporting roles played by the Canadian CSEC, Australian ASD, and the New Zealand GCSB, you suddenly realize that FVEY is a transnational entity that is subject to no independent oversight and it acts with near impunity due to the cult of state secrecy, the perpetual fear of terrorism,™ and the endless sums available to it through NSA black budgets. 

When you fold in the role played by the German BND and the Israeli ISNU, aka Unit 8200, which enjoys unfettered, non-minimized access to raw NSA intercepts, and other "Third Party SIGINT relationships" with national SIGINT agencies worldwide, you see that NSA created a global Leviathan whose potential for abuse is off the charts (Greenwald, No Place to Hide, pp. 150-1). FVEY as currently comprised is a threat of historical proportions, and a temptation for tyrants. If you wish, think of it in terms of SkyNet

The monster that was birthed is weakly shackled at this time because it is still young, but it is evolving and maturing, and it was usurped by the mandarins of the intelligence community from its inception. When a turnkey system of global social control can be abused by all too human hegemons, the potential dystopia lurking in our collective future can barely be imagined. As Snowden told Greenwald and Poitras in Hong Kong, this is not science fiction. 

Collect It All
The FVEY grid, in fact, threatens everybody that interacts with the internet. It is the “collect it allmentality, the malign vision of near omniscience, the cover provided by public ignorance, the cult of official secrecy, and the proliferation of black budgets that enables FVEY to metasticize with no oversight (Greenwald, No Place to Hide, pp. 124-5). 

This is a serious, serious problem. It endangers humanity. All of us. Snowden characterized it by saying, "we are building the greatest weapon for oppression in the history of man." The danger that FVEY will be abused for purposes of political control has already come to pass, and the temptation to exploit it further will prove irresistible  Nobody can truly control all of the multifarious parts of FVEY. Not even NSA. The only control that can potentially curb the boundless ambition of FVEY is funding. The more that we permit NSA to redirect its unaccountable black budgets to FVEY systems, the more that we undermine the integrity and the security of the internet as a whole. 
You must also remember that systemic vulnerabilities cannot be monopolized by FVEY. The Chinese and the Russians are digesting the Snowden disclosures, and they are seeking to piggyback on American innovation and exploit the same weaknesses that we are propagating. As we warn and arm ourselves with information, we are also raising alarms in Beijing and Moscow, and they will act. Indeed, they must. You see similar patterns everywhere, in countries worldwide.

Corporate malefactors will also be able to exploit these vulnerabilities, and there are mafias in the world that are so wealthy that they can play in this sandbox, and they will. Hackers are a perennial threat. Corporations that sell solutions for mass surveillance are doing gangbuster business, with few constraints

Russia also deniably delegates its dirty work to poorly controlled hacking gangs, with recent cyber attacks against American financial firms. It is speculated that this is a Russian response to American-led sanctions concerning the Ukraine. The integrity of the dollar as the de facto reserve currency of the world is undermined by recent currency agreements between China and Russia. The secondary and tertiary effects of American SIGINT policies are wide-ranging, and we cannot foresee all ends. Nobody can.

FVEY Must be Blown
When you understand the scope and the intent of the FVEY system, you realize that the Snowden disclosures that blow foreign intelligence programs focused on other countries are crucial, as they expose the anatomy of the global grid and their national agencies participating in multilateral intelligence sharing agreements (Greenwald, No Place to Hide, pp. 149-50). 

It is likewise imperative to reveal the complicity of both American and foreign firms that cooperate with NSA and with FVEY, whether their cooperation is coerced or willing, not to mention unilateral GCHQ and NSA penetrations of companies handling the infrastructure of the net. 

Indeed, blowing such programs is principled: such abuses must be compromised, as they abet an American imperialism that is destined for the dustheap of history, and domestic violations of the Constitution which rise to the level of impeachable offenses. 

Diane Roarke was the senior staffer responsible for the NSA account at the House Intelligence Committee at the time that FVEY was unleashed, working there between 1985-2002. She is a whistleblower that you have not heard about. This is what she says about NSA mass surveillance directed at Americans:
"So I think what has happened is this has trickled down from we initially became a national security state; we are now becoming a police state in which this huge database with everything on everybody is being used for criminal prosecutions. That's a police state. That is our liberties just simply evaporating."
"It is now quite obvious, since the Snowden revelations, that the program grew progressively over time. Initially, I knew that it involved a lot of broad domestic surveillance, bulk collection, domestically. And I knew that it involved emails, landlines, regular house phones, cell phones. I also knew that they had branched out into non-communications data. [ ... ] ... we all know that transportation data, airline data is connected. We know that international banking data is collected; that has been acknowledged. But there have been allusions to other items, too, by people hypothetically, such as credit, medical, banking and so on."
The "Foreign Intelligence" Lie
It is an outright lie that such NSA systems are solely focused on foreign intelligence targets, which would be compliant with the NSA charter. There are numerous systems which deliberately collect the data of Americans, most run by NSA and FVEY, and others under the aegis of the FBI Data Intercept Technology Unit (DITU), and the DEA Special Operations Division. The mechanisms exploited to authorize such data capture include National Security Letters, an artifice which is indistinguishable from the hated general warrants of the Revolutionary War era, FISA warrants justified by the Patriot Act Section 215 and Section 702 of the Foreign Intelligence Surveillance Act Amendments Act, and reinterpretations and amendments to Executive Order 12333

Glenn Greenwald:
"So much of the spying that we revealed has blatantly nothing to do with terrorism, whether it be spying on oil companies in Brazil, such as Petrobras, or spying on economic summits where governments negotiate economic agreements, or spying on U.S. law firms representing Indonesia in trade talks, or directing the spying system at hundreds of millions or billions of people indiscriminately.  
Terrorism is the pretext used to justify the system but is not, in fact, its actual purpose as evidenced by the huge amount of spying they do that have nothing to do with that. 
The other aspect to it is, that if you were to have a system that actually was about directed spying, targeted spying aimed at terrorists, you could make the case that the system is about stopping terrorist plots. When you collect billions of emails and telephone calls around the world every day indiscriminately, it actually makes it more difficult to stop terrorist plots because you have such a vast amount of information that it's impossible even to know what it is that you had. What the NSA is doing actually makes detecting terrorist plots harder not easier, on top of destroying people's privacy." 
The other members of FVEY also collect data on American citizens and share the take with NSA, and by extension, with DOJ, CIA, FBI, and DHS. Multiple data sources from foreign and domestic systems are integrated, including location metadata, banking transactions, travel, and medical records, in addition to telecommunications metadata, internet data of all types, content, and even snail mail. This assault on our liberties is insidious, and it threatens our cherished self-image of what it means to be American.

The true danger of such systems was described by NSA whistleblower Russell Tice, who has been characterized by the intelligence community as crazy. Tice may indeed be crazy. That does not mean that he is wrong. Diane Roarke cites him, and that is good enough for me. This excerpt is from his Wikipedia entry. I have inserted links to the sources:
Later during the summer of 2013 Tice alleged that during his employment with the NSA, the agency had a program that targeted the phone and computer conversations, word for word, of members of Congress, the Supreme Court, Admirals and Generals, and that the NSA had wiretapped Barack Obama while he was a Senate candidate, saying he had seen and held papers ordering such actions. Tice claimed the surveillance extended to lawyers and law firms, judges (one of whom, Samuel Alito "is now sitting on the Supreme Court ... two are former FISA court judges"), State Department officials, people "in the executive service that were part of the White House", antiwar groups, US companies and banking and financial firms that do international business, NGOs and humanitarian groups such as the Red Cross, and antiwar civil rights groups. In his opinion, this 'wide-ranging' surveillance could offer intelligence agencies 'unthinkable power to blackmail their opponents'.
Abuse of State Power
For undeniable proof of domestic misuse and abuse of such systems, you need look no further than the war that NSA and the deep state waged against NSA whistleblowers. Though many Americans may not know the names of James BamfordDiane Roarke, Kirk Wiebe, Ed Loomis, Thomas Drake, James Risen, William Binney, Thomas Tamm and Russell Tice, Snowden was acutely aware of them, and their legal maltreatment convinced him that he had no alternative but to flee America, absconding with the family jewels. Abusing our legal system to persecute American patriots obeying their sworn oaths to defend the Constitution against all enemies, foreign and domestic, disfigures our own rule of law, a cornerstone of our Republic. 

Here is Kirk Wiebe on NSA whistleblowing:
"Clearly there's no adequate outlet for whistleblowers who have legitimate, honest complaints to make. I don't think we'd be sitting here today if Kirk Wiebe, Ed Loomis, Bill Binney, Tom Drake, Diane Roark and Ed Snowden had a good, robust path for whistleblowers to get an honest hearing about things wrong in their home organizations, especially those that violate the basic rights of Americans.

When that process is broken, there can be no truth. And there will be no truth, because all of this going after Snowden and going after us tells all other employees: "Don't you ever cross us by telling the truth. We don't want you to." Imagine running your family that way, teaching people to lie, or hold a lie. It's not a secret. This isn't about classified material. This is about corrupt, dishonest, criminal behavior. There's a huge difference."
Here are the words of Thomas Tamm, a former DOJ lawyer in the Office of Intelligence Policy and Review, who leaked information regarding warrantless surveillance of Americans to James Risen and Eric Lichtblau of The New York Times:
"So I started asking questions, and I asked a supervisor of mine if she knew what the program was about. She told me that she just assumed that what we were doing was illegal and she didn't want to ask any questions. That really ate away at me and bothered me, because I thought I had gone into law enforcement to enforce the law. I didn't like the fact that I thought, or that a supervisor thought, that we might be doing something illegal."
Again, William Binney:
"Well, I couldn't be an accessory to the violation of the constitutional rights of everybody in the country. I couldn't be an accessory to that, or an accessory to other crimes being committed, like exposing all this data to the FBI. It was acquired without a warrant, you know. And this is the kind of data that they would use to arrest people, which they did. So I couldn't be a party to that. That's just a total violation of our justice process."
Abuse of State Power is Now Systemic
You see a similar pattern of misconduct in New Zealand, where the deep state was exposed by a journalist named Nicky Hagar. Mr Hagar just had his electronic devices impounded. Hagar published a celebrated book called Dirty Politics right before recent elections, documenting political malfeasance by the government. A minister was forced to resign, but the John Key government won a convincing victory at the polls, which it interpreted as a mandate to crush dissent. It wasted no time.

In Germany, the Federal Chancellery threatened members of the Bundestag with prosecution after documents provided to an NSA Committee of Inquiry were leaked to the media. The data that was leaked referred to BND collaboration with NSA, including programs that compromised the data of millions of German citizens. 

The German government claimed that Germans were not subject to mass surveillance. Then it furnished an oversight committee populated with opposition members with documents that demonstrated the opposite, and they were upset when these documents leaked. Now the government is refusing to disclose further documents which detail its close collaboration with NSA, stating that its bilateral agreement with NSA prohibits it. 

An unnamed American official actually stated that NSA could veto information shared with the Bundestag, a shockingly arrogant statement, indicative of the worst American imperialism. When legislative oversight cannot happen without intimidation, the checks and balances of our mechanisms of governance are threatened. When information that should be divulged to the citizenry cannot be shared due to a cult of state secrecy, a fundamental abuse of state power occurs. When the United States of America decrees that it can dictate what documents are shared by a foreign government with its Parliament, it is clear that we are led by buffoons. 

What we see with NSA, FBI and FVEY running amok is evidence of the transnational deep state, a nepotistic commingling of national security agencies and global private contractors, a concept which is antithetical to our national values. And yet, it undeniably exists, and in suppressing whistleblowers, we see it acting for the most malign purposes. The only known antidote is transparency. The perpetrators fear exposure beyond all other threats. They can only do what they do if we permit them to cloak themselves in a mantle of state secrecy. 

As the saying goes, we live in interesting times. Defending the Constitution against all enemies foreign and domestic is now an act of resistance.

FVEY Blowback
NSA routinely denies that it collects intelligence that is then relayed to American companies for their financial benefit. But the historical record, as it has been corrected and informed by the Snowden disclosures, reveals otherwise. Examples, deceit and hypocrisy abound (Greenwald, No Place to Hide, pp. 164-6). There is no question that SIGINT informs American diplomatic efforts internationally, and this is often about trade agreements and economic concerns. But the problem goes deeper than that, and there is a flip side to it that is profoundly negative. 
When NSA alternately conspires with and victimizes American technology firms, German companies, French companies, Brazilian companies, Chinese companies, Russian companies, and customers of all nationalities worldwide, rebel against the American internet hegemony embodied by corporations like Google, Apple, Microsoft, Yahoo and all the rest. These are American service providers, yes, but they are also international firms, the net is global, and so must they be, and their commercial viability is imperiled by FVEY. 

The Snowden disclosures unmask pervasive collaboration between American technology companies and NSA which grants NSA total access to all customer data, domestic and international. Such collaboration could be coerced or voluntary, with NSA paying technology firms and telecommunications providers significant sums for cooperation. NSA also engages in unilateral penetrations of internet infrastructure companies. 

NSA penetrated Google, sniffing data shuttled between internal servers. NSA suborned Microsoft, bullying that firm into abetting NSA criminality, granting access to its cloud services and actively assisting NSA in sniffing Skype and cracking Outlook. NSA infamously compromised Apple, with NSA trumpeting its ability through DROPOUTJEEP to gain root access to any iPhone worldwide. NSA extorted Yahoo when it resisted, and threatened massive fines that would quickly wipe out the company. Twitter remains embroiled in litigation against NSA, refusing to roll over like other firms. 
Just this week, the Chairman of Google warned against the balkanization of the internet. The Chinese internet already flourishes on the other side of a digital Great Wall that sequesters billions of potential customers from American internet services. China is a market that American companies covet, but the Chinese government is waging cyberwar against America, indisputably as a reaction to NSA policies. 

Silicon Valley protests NSA abuses, because the FVEY conspiracy damages their bottom lines and undermines advantages historically enjoyed by American firms. Foreign governments increasingly insist on "data localization," requiring international firms to situate servers within their national boundaries where they can be subject to national laws, and theoretically protect the data of their citizens from FVEY predation and overreach. Various countries are imposing "right to be forgotten" laws on search giants like Google. American companies are caught in a Catch-22 situation that complicates their ability to compete. 

When they attempt to protect customer privacy and resist NSA overreach, NSA and FBI respond with National Security Letters. FBI prohibits American firms from publicly complaining, swearing them to secrecy under penalty of prosecution. American firms either take NSA's money and comply, or they are compelled to cooperate under legal threat. The legal term of art for such misconduct is "extortion." This is not an exaggeration.

FVEY: Parasitical Shadow of the Net
The idea that data can be protected by preventing it from flowing through NSA's vast global dragnet is antithetical to the architecture of the internet itself, as the net is a self-correcting entity which automatically shunts data flows via the cheapest route of least resistance, routing around damage, congestion and blockages. It may be forbiddingly complex to dictate that data be fire-walled away from NSA, and it may not be feasible considering the current architecture of the internet. 

The FVEY surveillance platform that NSA erected is parasitical, attacking the internet at multiple nodes like a shadow of the net, lurking always in the background. These programs are ruinously expensive, they corrupt the SIGINT agencies and private corporations of other countries, and they threaten American dominance of the internet in the longterm. FVEY does not ultimately benefit us, it does not ultimately give us mastery. 

FVEY undermines the fundamental faith between user and service that must exist before any customer clicks on a link. Researchers estimate that the blowback from the Snowden scandal could cost cloud service providers up to $180 billion dollars over the next three years. The true cost in totality is far more. Indeed, it is not an exaggeration to state that the soul of the internet is jeopardized. 

FVEY is stupendously bad policy, more than just evil. It unites everyone against us, and it ensures that American firms encounter a hostile reception and suspicion worldwide. What is particularly dismaying is that the Snowden disclosures reveal an hypocrisy among American firms that demonstrates that they deserve this opprobrium. Most of them sold out their customers. Despite initial resistance, all of them rolled over for NSA, with the lone exception of Twitter. All American internet firms, including Twitter, currently comply with FBI National Security Letters and dragnet warrants issued by the FISC, the Foreign Intelligence Surveillance Court.

Although NSA is converting the internet as a whole into a massive surveillance system that monitors everybody, everywhere, all the time, the FVEY Leviathan has not yet attained utter completeness, many gaps and inefficiencies remain, but the intent to complete the system is an undeniable subtext throughout the NSA documents that we so far possess, and test beds running in Afghanistan, the Bahamas, and in Mexico are just the beginning. All digital events in those countries are collected, monitored, processed, databased, and sifted. So omniscience remains a goal not yet attained, for the moment. 
NSA's intention to expand the scope of such systems worldwide is a dangerous goal that can have only one purpose, and this was enunciated by William Binney: totalitarian and despotic control of captive populations. You may think that this is an apocalyptic statement, and surely, it must be an artifact of a conspiratorial mindset that has no basis in fact. You would be wrong. There can be no other purpose for the global network under construction by FVEY, and NSA's own documents attest to their ambition to capture everything and to store it in perpetuity. All that constrains them is budgets. When legal regimes are unfavorable, FVEY changes the laws. This happened most recently in New Zealand and in Australia. It is happening in Canada now. 

While present employees of the American intelligence community look at their shoes, working within insulated Special Access Programs in compartmented bureaucracies, the implications of their shortsightedness imperil us all. You need to wake up. Stop drinking the Kool-Aid and snap out of your groupthink programming. Look at what you are doing. The legal authorities cited in your indoctrination are tortured and based upon flawed foundations. Look at the capabilities of these systems. Research the experiences of the NSA whistleblowers that preceded Snowden, and ask yourself why these fine Americans spoke up while you remain silent. We all understand why you do it: Fear

Resist: Doctrine of the Singleton
Find your courage. Snowden exemplifies what just one person can do. Even after the wholesale compromise of data by Chelsea Manning, nobody saw Snowden coming. Go back and read the Fourth Amendment, then reread the oath that you swore when you were hired, and focus on "all enemies, foreign and domestic." Our intelligence agencies are violating the Constitution, they are pointing the collection systems at American citizens, and you make it feasible. Finally, permit yourself to admit that these programs are ineptly administered, they are weakly audited, there is no return on investment analysis, there is no effective oversight. Fraud, waste and abuse are far too common. You see it every day. 

Here is William Binney on NSA:
"They are violating the constitutional rights of everybody by taking in all this data and building the social networks of everybody. It's a violation of the First Amendment." 
You have the right to free association. It doesn't say you have the right to free association as long as the NSA knows about it, because collecting all this metadata gives them everybody you're associating with, and how frequently and how often, and the timeline for all that association. 
So it's a violation of that one, not counting the collection of content or anything else that's related to that, which is, you know, a violation of your Fourth Amendment rights, or use of it to arrest you, which is a violation of your Fifth Amendment rights, not testifying against yourself. 
So it was a total violation of the Constitution, not counting the Electronic [Communications] Privacy Act, the [Cyberspace] Electronic Security Act [CESA], all those things, and all the laws covering FCC regulations, covering telecoms. ..."

Never forget that Snowden scraped 1.7 million documents, and he did it sloppily, by intent, so that NSA would know precisely what he took. That he was able to do it at all indicts NSA management, and the question has to be asked: if a high school dropout got so much data, who else did? You need look no further than Chelsea Manning. Between the two of them, Manning and Snowden are the worst compromises of the American intelligence community in history. We can only hope that we have not been utterly penetrated by hostile intelligence services using moles that we do not know about. It must be admitted that this is a possibility.

The Snowden damage control task force is still not certain how many documents that Snowden exfiltrated, and those rocket scientists manipulated him into the opportunistic clutches of the Russian FSB, where he remains to this day, with a priceless payload between his ears. Those are your bosses. The administrators of the American intelligence community are incompetent, in over their heads, these systems are growing too fast and without adult supervision, and some programs are unquestionably unconstitutional. The potential consequences verge on the unthinkable.

Generals Hayden, Clapper and Alexander
Remember that it was Generals Michael Hayden and Keith Alexander that presided over the Frankenstein creation of the surveillance Leviathan. In the case of Alexander, his post-retirement activities evince boundless personal corruption, as he shamelessly seeks patents that derive from his years as DIRNSA, and he flogs his expertise to financial firms for retainers of hundreds of thousands of dollars a month. Alexander played ball as DIRNSA, now he wants to get paid.

Consider the public statements of General Michael Hayden, who was also DIRNSA and DCI. Hayden was the man that agreed to implement the Bush administration program of warrantless surveillance against Americans that violated the Constitution, accepting the illegal authority of a misinterpreted presidential executive order that had to be twisted to compensate for the absence of legislative authority. Hayden's mea culpa, in an interview with 60 Minutes, was that mass surveillance of Americans post 9-11 was "warrantless, but warranted." This man shamelessly rationalizes a decision to rape the Constitution.

I believe that it was this act, championed by Vice President Richard Cheney's staff lawyer David Addington, this decision to reinterpret EO12333 and presidential powers under Article II of the Constitution, which will end up delineating the dawn of the FVEY era. These are not men to be trusted, they midwifed a Leviathan that cannot be sent back to the monster store, and they should be held accountable to the American people under oath before a Joint Special Committee on Mass Surveillance. 

The last time that America had intelligence committee hearings, the Pike Committee and the Church Committee fostered intelligence community reform that rectified the DNA of NSA for decades. Until 9-11. Then the focus on foreign intelligence was sacrificed out of fear of another terror™ attack, and the systems were pointed at American citizens. Along with DNI Clapper, both Alexander and Hayden lied to America, they subjected Americans to dragnet surveillance, and Clapper and Alexander both lied under oath to the Congress. Hayden wittingly broke the law.

A Magnificent Act of Civil Disobedience
So the next time that you call Snowden a traitor, all that you do is confirm for me that you do not understand his disclosures, you have not done your homework, and you are hypnotized by your programming. Your short-range, limited perspective is a threat to the Republic, and your lack of a spine jeopardizes America and Americans. I have no patience for it. You cannot claim that you lack exemplars to follow. This article has been lushly hyperlinked, and every statement made is sourced. If you insist on calling Snowden a traitor, against all evidence to the contrary, do it in your echo chambers where I will not hear it. 

Here are the words of Thomas Drake and Kurt Wiebe, NSA whistleblowers who preceded Snowden:
Drake: "I actually salute him. I will say it right here. I actually salute him, given my experience over many, many years both inside and outside the system. Remember, I saw what he saw. I want to re-emphasize that. What he did was a magnificent act of civil disobedience. He's exposing the inner workings of the surveillance state. And it's in the public interest. It truly is." 
Wiebe: "Well, I don't want anyone to think that he had an alternative. No one should (think that). There is no path for intelligence-community whistle-blowers who know wrong is being done. There is none. It's a toss of the coin, and the odds are you are going to be hammered."
Here is more from Wiebe:
"The Snowden data is irrefutable evidence that the government, on a large scale, is breaking our laws under the Constitution of the United States, breaking them unequivocally, and on a large scale. And if you want to think globally, it's doing the same for innocent people all over the world. And it has partners in crime doing the same thing. So we have a rogue bunch of intelligence people who think it's OK to do this. We've got a real problem, because now your privacy of thought and actions as an individual is gone. ..."
No one should trivialize the personal impact that NSA whistleblowing entails. Your life will be upended, should you choose to follow the path blazed by previous whistleblowers. But the trend line of history is now clear, NSA and FVEY are on the wrong side, they represent everything that is pernicious and foul about the dark side of humanity. 

Here is Barton Gellman on the character of Edward Snowden:
"I said to Snowden, before and after I knew his identity, that I was going to do everything in my power as a journalist, in a normal journalistic way, to keep his identity secure, that I was not going to be sharing it, for example, with my editors, and he said: "You're not going to have to worry about that. It won't be long before I announce myself." 
I said, "Why would you do that?," and he said he didn't want the story to be about some sneaky leaker. He did not want his co-workers and his family to bear the brunt of one of these come-down-on-everyone investigations, where everyone is a suspect, and everyone's life is disrupted. He wanted to take responsibility.

And he told me that he wanted to be actually a model for other whistleblowers, that he wanted to show that you could come out and tell the truth about something you thought was wrong, and you didn't have to hide."
By now, there have been enough disclosures for any thinking, sane analyst to recognize the true threat represented by FVEY. If you have not yet done your homework, get moving. More disclosures are coming, and principled and informed opposition is needed, particularly from inside the belly of the beast. 

Wake up. For God’s sake: wake up. America needs us. Let the Snowden documents set you free. 

You can find them at,,,, and elsewhere. 
Here is the interview:


Anonymous Anonymous said...

Great article

11:20 AM, October 13, 2014  
Anonymous Anonymous said...

Excellent reading, we can only hope the "people" can put a stop to it before it's too late.

Been reading the blog for years.

Keep up the good work.

2:40 PM, October 28, 2014  
Blogger Jimbo said...

Excellent article and an excellent defense of your opinion on the SFB page.

1:19 AM, March 29, 2015  
Blogger Esteban Trujillo de Gutierrez said...

Thank you very much. I deeply appreciate it.

1:53 AM, March 29, 2015  
Anonymous Savoy6 said...

Bien hecho, tio.

11:57 AM, March 29, 2015  
Blogger Esteban Trujillo de Gutierrez said...

Gracias. :)

3:49 PM, March 29, 2015  

Post a Comment

<< Home