Snowden’s Pardon Fantasy

NSA Complex, Fort Meade, MD.

September 22, 2016 | Posted in 4th Amendment, Al-Qaeda, Classified Information, Department of Defense, Director of National Intelligence, E.O. 12333, FISA, FISC, Intelligence, Leaks, NSA, President Obama, Russia, Snowden, Terrorism | By

In recent days, in the run-up to the release of an Oliver Stone helmed movie about him and his self-admitted theft of secrets from NSA and subsequent flight to China and then Russia, Edward Snowden has stated that he believes he deserves a presidential pardon for his crimes.

He bases this on a belief that, “If not for these disclosures, if not for these revelations, we would be worse off,” and goes on to say that a pardon would be appropriate, “…for the exceptions, for the things that may seem unlawful in letters on a page but when we look at them morally, when we look at them ethically, and when we look at the results, it seems obvious that these were necessary things,”. Both these quotes come from a CNN article that cites an interview in The Guardian.

Estimates reported by news outlets vary, but he allegedly stole approximately 1.5 million classified documents from NSA’s internal networks, far more material than anyone could have possibly needed to demonstrate alleged malfeasance and abuse by the government. According to NBC and Defense One, he did so by using computer passwords and credentials belonging to a civilian employee of NSA, a member of the military, and an NSA contractor to hide his criminal acts – in other words, he acted as a thief and con man to gain access to as much classified material as he could before he fled to China, and Russia – two great bastions of freedom and personal privacy.

Much has been made in various media outlets of the alleged impropriety, illegality, or unconstitutionality of NSA’s foreign intelligence efforts, both within the U.S. and abroad. However, after extensive public debate, the most controversial tools that concerned U.S. citizens remain in NSA’s toolbox, one of them, the ‘Section 215’ program, retooled by Congress and the Obama administration to ally the public’s concerns about potential overreach or misuse, but not halt it.

Moreover, NSA’s extensive efforts to preserve and protect the privacy rights of U.S. citizens is now documented the Director of National Intelligence’s ‘IC on the Record’ pages on Tubmlr. Thousands of now declassified documents that demonstrate how the government worked within the constitutional and complex legal framework set up to protect U.S. citizen privacy rights during the conduct of NSA’s SIGINT operations – controls that have been in place since at least 1980.

With regard to Mr. Snowden’s assertion that we “…look at the results…” of his actions to see that his pardon is warranted, we can do that. The report from the DoD Information Review Task Force-2 (IRTF-2) Initial assessment in December of 2013, titled ‘Impact Resulting from the Compromise of Classified material by a Former NSA Contractor’, said in its overall assessment that, “The IRTF-2 assesses with high confidence that the information compromise by a former NSA contractor….will have a GRAVE impact on U.S. national defense.”

In January 2015, Al-Qaeda created a YouTube video after the Snowden leaks teaching its operatives how to evade what the terrorists referred to somewhat erroneously as ‘FBI Secret Spying technology’. In May of 2015, the Henry Jackson Society, a conservative British think-tank published a 78-page report that drew heavily from the testimony from senior security sources outlining how terror groups had changed their communications methods and began more extensive use of encryption to hide terrorist operations from intelligence agencies. A July 2015 report in the New York Times also reported the Islamic State learning communications security from the Snowden leaks.

More recently, a Wall Street Journal article discussed how an Islamic State terrorist who led the November 13th terror attacks in Paris, evaded western intelligence agencies using better operational discipline and technical savvy in his communications. An awareness of which Mr. Snowden’s leaks undoubtedly raised, given the previous reporting.

The results of Mr. Snowden’s theft and leaks are pretty clear to my mind. Operating from a misguided sense of superiority and a flawed and incomplete understanding of the extensive U.S. person privacy protections in place within the intelligence community more broadly, and NSA in particular; he elected himself congressman, attorney general, and judge of a process and an oversight regime he initially tried to cheat his way into, and then barely had three months of experience in as a contractor (I’ll bet none of that is in the movie).

President Obama believes Snowden should stand trial, and so do I.

Read More →

Winter 2015 News

An E-3B Sentry AWACS is refueled.

December 20, 2015 | Posted in Air Force, Author, Blog, Classified, Classified Information, Congress, Cyber attack, Department of Defense, E.O. 12333, FISA, Intelligence, Law Enforcement, Leaks, NSA, PPD-28, President Obama, Privacy, Snowden, U.S. Code Title 10, U.S. Code Title 50, Writing | By

Hello Everyone,

I hope you’ve had a great summer and fall, and are enjoying the holiday season. I’d like to extend my thanks for being fans of my work, and wish you happy holidays and a bright new year.

I’ve been busy crafting my next novel, a project I’ve named ROGUE SENTINEL, and I will finish the manuscript shortly after the New Year. ROGUE SENTINEL will see Shane Mathews take on a solo mission to Jordan to find and capture an Islamic State mission planner known only as ‘Al-Amriki’ – The American.
Up next, I’ll be resuming work on SWIFT JUSTICE, the third and concluding novel of the ‘Aziz Trilogy’ that started with THE INHERITOR and AUTUMN FIRE, with main characters Shane Mathews and Emily Thompson.

During the year I’ve written a few Op-Eds on current issues that have been published in the Baltimore Sun and in The Hill’s Congress Blog. Here’s a list so you can look at them if you’re interested.

‘The NSA data collection program isn’t criminal; ending it is’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-nsa-data-20151203-story.html

‘Open Letter from a cyber terrorist’ – http://thehill.com/blogs/congress-blog/homeland-security/255370-open-letter-from-a-cyber-terrorist

‘Stand with our watchers’ – http://thehill.com/blogs/congress-blog/homeland-security/261237-stand-with-our-watchers

‘Access to encrypted communication, a balancing act’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-encryption-data-20151001-story.html

‘Clinton E-mails: Who else was involved?’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-clinton-emails-20150908-story.html

‘The country is vulnerable without CISPA’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-cispa-redux-20150209-story.html

Thanks again for being fans of my stories, and feel free make them presents for the fiction reader on your holiday list – they can be purchased from Amazon or Barnes & Nobel as e-books or hardcopies in trade paperback. You can even contact me via tom@tomwither.com for a signed copy if you like.
Take care and Happy Holidays!

Tom Wither

Read More →

Clemency for Snowden? Not likely.

NSA Complex, Fort Meade, MD.

January 26, 2014 | Posted in Classified Information, Department of Defense, Director of National Intelligence, E.O. 12333, FISA, FISC, Intelligence, NSA, President Obama, Snowden, Terrorism, U.S. Code Title 18 | By

NSA Complex, Fort Meade, MD.

NSA Complex, Fort Meade, MD.

The editorial boards of the New York Times and Washington Post, a handful of members of Congress and others in the general public will undoubtedly continue to advocate for the extension of clemency for Mr. Snowden.  The reasons why he will not be receiving clemency are pretty clear to me.

THE CHARGES

Let’s review what he’s charged with (you can read the criminal complaint filed with the court yourself).  Bear in mind that this is likely only the initial set of charges.  They could be amended once he’s in custody and a fuller understanding of his actions and activities is known (charges of misuse of government computer and telecommunications systems, etc.).

Snowden is charged with:

  • Theft of Government Property  –  18 U.S.C. Section 641
  • Unauthorized Communication of National Defense Information  – 18 U.S.C. 793(d)
  • Willful Communication of Classified Communications Intelligence Information to an Unauthorized Person – 18 U.S.C. 798(a) (3)

 

HOW MANY COUNTS & THE PENALTY IF CONVICTED

One of the things missing so far is the number of counts for each of these charges.  Something the government may amend the compliant to include once Mr. Snowden is in custody or been arraigned.  Statements by various NSA officials to the media have provided the following numbers to consider:  1.7 million documents stolen.  200,000 of those leaked to journalists so far.  In briefly perusing the 2013 Federal Sentencing guidelines, for just one conviction of violating 18 U.S.C 793(d) or 18 U.S.C. 798(a)(3), the minimum sentence is between seven and nine years.

Even if we assume the best case, and the government treats the entire theft of 1.7 million documents as one theft, and the communication of the information to Mr. Greenwald and Ms. Poitras are treated as two counts of unauthorized communication of National Defense Information, and two counts of Willful Communication of Classified Communications Intelligence Information; Mr. Snowden is looking at between 35 and 45 years in prison, aside from whatever fines the court may impose.

Worst case, the government chooses to make a point with Mr. Snowden’s case, and they charge him with just 10 counts each (out of a possible 1.7 million thefts and 200,000 unauthorized and willful communications).  Do the math for 10 counts on each charge and that’s 210 to 270 years in prison.

 

THE GOVERNMENT’S POSITION

Any hope that some in Congress, the public, and the media may have that Mr. Snowden will be given clemency should be tempered by the following statements:

President Obama – “…I will say that our nation’s defense depends in part on the fidelity of those entrusted with our nation’s secrets. If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy. Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.”

Attorney General Holder – “We’ve always indicated that the notion of clemency isn’t something that we were willing to consider. Instead, were he coming back to the U.S. to enter a plea, we would engage with his lawyers.

FBI Director Comey – “I have trouble applying the ‘whistle-blower’ label to someone who just disagrees with the way our country is structured and operates,

Senator Feinstein – “I think the answer is no clemency,” she said, adding that he should be prosecuted.

 

A CRIMINAL NOT A WHISTLEBLOWER

What Mr. Snowden continues to fail to understand is something the President pointed out in his speech, and that FBI Director Comey pointed to in his remark quoted above.

“What I did not do is stop these programs wholesale — not only because I felt that they made us more secure, but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.” – President Obama

You can’t ‘blow the whistle’ on a program that is implemented under a law Congress passed, the President signed, and that the Courts oversaw in concert with Congress.   Should Congressional Oversight have been tighter?  From what I’ve seen in the open hearings, there is a reasonable argument to made there.  Should legislators and the Courts keep better pace in all areas of law regarding the rapid advances in telecommunications technology and related privacy issues? There is a case for that too.

Did those changes need to be fomented by a series of media sensationalized, unauthorized leaks of classified material describing lawful activities by the intelligence community where no evidence of willful abuse had occurred?  Leaks that damaged diplomatic relations with our allies and other friendly nations?  Leaks that have, according to members of the intelligence committees, caused terrorists to change their communications methods and potentially exposed military operations, increasing the risk to our military service members at home and abroad?   Leaks that will in all likelihood continue because ‘journalists’ like Mr. Greenwald and Ms. Poitras care more about selling stories than they do about the safety and security of American, allied, and friendly nation’s citizens throughout the world?  No, it did not.

Mr. Snowden could (and should) have gone to the NSA Inspector General, or the Director of National Intelligence’s Inspector General, or the Department of Defense’s Complaint Hotline for classified complaints.   He also could have made a complaint to the FBI or Attorney General’s Office, or his company’s security office or leadership.  If all of those failed, he could have gone to Congress himself with his concerns.  Oversight committees LOVE to investigate potentially unlawful acts by the executive branch, and moreover, it’s their job to do so.

Instead, Snowden chose to steal 1.7 million classified documents and shared at least 200,000 of them (so far) with two members of the media, then made sure everyone knew he did it as soon as possible, so he could rise from obscurity, and show everyone that he really did know better than the collective wisdom of the members of Congress, the 15 judges on the FISA Court, and the administrations of two Presidents.  Moreover, real whistle blowers have the courage to stand up and be counted, even if they must stand in a courtroom to do it.   They don’t run away to a foreign nation to avoid the consequences of their actions, afraid of punishment for their criminal activities before the charges are even filed.

Read More →

Cyberweapon Usage in Libya & Elsewhere

A_24_hour_watch_center_at_the_Defense_Intelligence_Agency_(DIA)

October 17, 2011 | Posted in China, Cyber attack, Cyberspace, Libya, President Obama, Russia | By

A_24_hour_watch_center_at_the_Defense_Intelligence_Agency_(DIA)The New York Times reported today that the Obama administration, as part of the military options presented for the initial U.S. action in Libya, considered conducting a cyber attack against the air defense systems in order to protect U.S. and allied war planes. The administration and the Pentagon chose not to exercise that option.

According to the article, “….administration officials and even some military officers balked, citing the precedent it might set for other nations, in particular Russia or China, to carry out cyber raids of their own, and questioning whether the attack could be mounted on such short notice. They were also unable to resolve whether the president had the power to proceed with such an attack without informing Congress.”

It’s gratifying to see well intended people at senior levels in government debating these kinds of issues; the military readiness and ability to conduct such an attack, the legal issues involved, the potential actions of other nations, and the need to coordinate with and keep Congress properly informed.

I only hope nations like Russia and China would actually debate and discuss these issues as thoroughly.  I strongly suspect they won’t.  Russia and China very likely have cyber attack capabilities that are comparable to whatever the U.S. may have developed, and I strongly suspect we would not see a lively debate within the Russian or Chinese command structures about using such capabilities.  They will use them as needed to protect their soldiers and their nation’s interests, and so should we to protect our military forces and our interests.

Cyber warfare is one of the new weapon sets of the 21st Century.  We are hardly the only nation on the planet that possesses them, and we should not be hesitant in using them.  Our adversaries will not hesitate, and we need not suffer an electronic Pearl Harbor or 9/11 before electing to use the force multiplying advantage that they can afford us when we send our servicemen and women into battle anywhere on the globe, for any reason.

Read More →