The Edward Snowden Affair
Page 1
The Edward
Snowden Affair
EXPOSING THE POLITICS AND
MEDIA BEHIND THE NSA SCANDAL
Michael Gurnow
Blue River Press
Indianapolis
www.brpressbooks.com
The Edward Snowden Affair © 2014 Michael Gurnow
ISBN: 9781935628361
eISBN: 9781935628736
Library of Congress Control Number: 2014930448
All rights reserved under International and Pan-American Copyright Conventions
Cover designed by Phil Velikan
Editorial assistance provided by Dorothy Chambers
Packaged by Wish Publishing
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
No part of this book may be reproduced, stored in a database or other retrieval system, or transmitted in any form, by any means, including mechanical, photocopy, recording or otherwise, without the prior written permission of the publisher.
Distributed in the United States by
Cardinal Publishers Group
www.cardinalpub.com
For my wife, may your watchful eye remain ever-present
ACKNOWLEDGMENTS
Though there were many hands that crafted my ability and willingness to undertake this endeavor, I am obligated to pay my respects to a handful in particular.
Before I met Tom Doherty, I didn’t believe laughter within the publication industry could be bilateral. This project might have stagnated if it wasn’t for his humorous reprieves, pragmatic sensibility and level-headed judgment.
To my editors, Dorothy Chambers and Holly Kondras, who are living proof literary alchemists walk among us.
Kelly McDaniel not only taught me how government functioned in theory and actuality, he continues to do so with equal amounts of patience and courage.
My IT knowledge and understanding of technopolitics would be nonexistent if it weren’t for Floyd Lockhart. Our understated, muffled conversations prove endlessly rewarding.
Without the devoted efforts of my IT team—Daniel Ellinghouse, Latham Hunter and the Bushido Chemist—this project would have come to a premature end.
I owe a debt to Timothy Chism for being a very timely second set of eyes.
I would also like to tip my hat to Philip Dorling, author of one of the Snowden disclosure reports, whose willingness to provide a vital puzzle piece helped maintain the consistency of the narrative.
And my wife, who manipulated me into believing I could do this.
Table of Contents
Prologue: A Busy Day for Washington
Introduction
1: The Man Holding the Rubik’s Cube
2: How to Blow a Whistle
3: The Whistle Blows
4: Pearl of the Orient
5: Polar Bear in a Snowstorm
6: From Russia, With Love
7: Black Rain
8: The Band Played On
Afterword
Appendix: Chronology of disclosures supplied by Snowden
Sources
Prologue:
A Busy Day for Washington
WASHINGTON HAD ITS HANDS FULL. The day before, June 5, a British daily newspaper The Guardian revealed that the FBI, with the power of the United States Foreign Intelligence Surveillance Court behind it, was actively utilizing a provision within the PATRIOT Act. A highly secretive order had been issued requiring one of the world’s largest telecommunication providers, Verizon, to hand over all domestic call records between the dates of April 25 to July 19, 2013. The government was quick to respond as it reassured everyone the content of Verizon users’ calls were not included, merely when and where a call was made, to what number, and on what phones. What the White House conveniently failed to include in its briefing was that the three-month window was not an exception but an ongoing rule: Consecutive extensions had been occurring for the past seven years and, though only hinted at in The Guardian’s report, included culled customer information of Verizon’s competitors, AT&T and Sprint. The government was also in the process of accommodating the massive amount of incoming data. It was putting the finishing touches on a $1.5 billion top secret building located in the middle of the Utah desert.
A day later as the American capital attempted to quell the flames which were being fanned by the ACLU, Fourth Amendment advocates and enraged Verizon users, not one but two bombs were dropped. Pulitzer-winning journalist Barton Gellman and Oscar-nominated filmmaker Laura Poitras presented another, albeit much grander, revelation about the U.S. government’s surveillance methods. In a Washington Post article titled, “U.S. intelligence mining data from nine U.S. Internet companies in broad secret program,” the duo disclosed classified information obtained from an anonymous source which had been extracted from the most enigmatic and secretive organization in America and perhaps the world: the National Security Agency. A few minutes later, an American attorney living in Brazil and the man partially responsible for the Verizon story, Glenn Greenwald, seconded the claim in The Guardian’s “NSA Prism program taps in to user data of Apple, Google and others.” As the same groups who were up in arms about the previous day’s shocking headlines lunged forward in protest while gaining international support and sympathy from countries around the world, many anticipated this was the tip of the proverbial iceberg and much, much more was taking place behind the security curtain in Fort Meade, Maryland. Yet, as the White House steadfastly backpedaled amid the incessant barrage of questions, one remained unanswered: Where had Greenwald, Gellman and Poitras gotten their information? If history was any guide, the public might never know unless the person responsible was caught, killed or opted to make a deathbed confession.
Three days later, the world would meet Edward Snowden, a former CIA and NSA contractor who had orchestrated the information dump not months but years prior, who had already fled the country and was now holed up in a hotel room in Hong Kong. This was the person responsible for, in The New York Times’ approximation, “The most significant security breach in American history.”
In the months ahead, a worldwide manhunt would ensue as the press continued to dispense piecemeal information about other covert surveillance programs. Democrats and Republicans would find themselves in uneasy agreement. Global demonstrations would take place. World leaders would learn America had been spying on them. A foreign president’s plane would be forbidden safe passage for fear it contained the fugitive. Congress would consider demolishing the foundation upon which democracy was built. In less than two months, after three nations had offered Snowden asylum before the whistleblower accepted temporary sanctuary in Russia, President Barack Obama would appear on national television and unrepentantly announce the former Soviet Union had “slip[ped] back into Cold War thinking and a Cold War mentality.” Amid public discussion on whether Snowden’s actions might become analogous to Archduke Franz Ferdinand of Austria’s assassination leading to the First World War, desperate to dilute the positive public opinion of the American exile and with the aid of the world’s leading news source, the Capitol would stage a faux global terror threat. It would order bombings half a world away in hopes of wagging the dog.
Washington had its hands very, very full.
Introduction
IT IS NO SIMPLE MATTER to write a book about a trained spy. It is more difficult when that spy goes to great lengths to cover his tracks. It is a whole different monster to attempt to pin down a spy that was so good at keeping in the shadows, he collectively duped the greatest intelligence agencies the world has ever known. To make matters worse, a lot of what could be known about Edward Snowden will remain locked in olive drab filing cabinets. The U.S. government will mak
e sure of that. It will use the excuse his information must remain classified because he worked for the CIA and NSA. However true, his records will also stay tightly sealed because Washington wants the public to know as little as possible about the embarrassing particulars. Needless to say, when I first approached the project, there were a lot of holes and a monumental amount of questions that needed to be answered. Hopefully I have filled some of those gaps, but many remain.
But this is not just a book about Edward Snowden. It is also about the debates his actions created. Though I devote a portion of time explaining the legal, political and technological aspects of the Snowden affair, my primary agenda is to provide the reader with a transcription of the argumentative evolution between the media, U.S. intelligence, the Capitol, corporations and various world leaders and nations. As can be expected, the discussions are often inadvertently—as well as deliberately—vague. This manifested in many conflicting reports and statements made about the whistleblower and the events surrounding him.
I approached divergent evidence with mental due diligence and benefit of the doubt. When deductive reasoning followed by cross-referenced sources and reverse-engineered data failed to produce a satisfactory answer, I reluctantly kowtowed to majority opinion, meaning I relied on the editorial integrity of disassociated fact-checkers in newsrooms across the globe. An example of reverse engineering can be seen in the attempt to determine when Snowden had broken both of his legs during military training. No press report tried to pinpoint when this had taken place, but all the information was there, all a person had to do was count backward. The results of this technique were often rewarding but consistently revealed other unasked questions. Some cases of reconciling opposing data were met with simple solutions. A South China Morning Post report fell outside the periodical’s publication pattern. Upon closer examination I realized it housed an erroneous timestamp because a multitude of responses to the report were dated three weeks prior. The same occurred with The Guardian’s Boundless Informant exposé. These situations are probably the product of an edit updating an article’s origination date. Automatic updates are the bane of a documentarian and a perpetual problem in the digital age. SCMP rectified its error shortly before this work went to press. To the best of my knowledge, at the time of publication all listed and cited dates are consistent with those posted by their representative sources.
Many riddles were solved by placing two books side-byside. When a foreign president’s flight crew reported it didn’t have enough fuel to reach their destination, I called their bluff after conducting a little research on particular airplanes’ fuel capacities while staring at a map. Other instances of irreconcilable information were more demanding because the only available sources were the conflicting reports. This is a frequent dilemma when dealing with newly revealed classified materials whose authors and representatives deny even exist. All one can do is hope additional information will one day be released, but there is no guarantee. Until that time, inductive reasoning is the only compass. For example, an article about a clandestine file stated 2.3 million bits of spy data had been corralled over the course of a decade. Another exposé claimed the same surveillance records had been gathered in a single month. There was no third party to consult, and the primary document was nondescript. I resolved the issue by looking at technological capabilities a decade prior and considering similar numbers in a German report dealing with a comparable espionage method. As always, I discuss how I came to certain conclusions and the methodology used.
However, if an incongruity doggedly persisted and the press’s divide was 70/30 or less, I made the conscientious decision to include and discuss the divergent viewpoints. Also, if a reliable source was the only dissenter, especially if an argument was crafted by those who worked directly with Snowden or his stolen files, I include and annotate the fact. In a few instances, a dependable source contradicted itself. Snowden’s father reported three different timelines for when his son started working in intelligence. Despite two dates being implausible because I could account for Snowden being elsewhere at that time, I nonetheless include the information so others can consider the possibility and, in the event I overlooked or misinterpreted something along the way, rectify my error.
Another challenge in writing this book was, unlike most historical studies, the Snowden Affair has no natural stopping point. It is one of the rare instances in which the conversation may exhaust itself before the events which initiated the debate come to a close. There are two reasons for continuing the discussion after the titular character steps offstage. One, as mentioned, the work is a study of Snowden, the media and the NSA. It would deprive the reader if the book ended with Snowden’s biographical epilogue. Two, Snowden rightfully stated he wants the debate to focus upon modern surveillance policies and practices and not the person who brought them to light. From the present look of things, unless the U.S. government collapses or society suddenly abandons technology, the book—like most—will be a single chapter in a dialogue that spans many volumes. With that said, I chose to end on a thematic high note. For any reader skeptical about whether the surveillance debate should be taken seriously, I ask you read page 254 relating to smartphones.
In respect to the various classified disclosures: I had two diametrically-opposed objectives when writing about them. Though any interpretation harbors implicit bias, NSA analysts, surveillance watch groups and IT professionals may say my reading of the disclosures is too conservative. Legal experts, U.S. intelligence administrators and officials in Washington are apt to claim it is too liberal. Corporations, foreign nations and the press are the most likely to state I am close to the mark. I try to appease no particular audience, faction or party and merely attempt to present an examination of the information provided by the press through the government documents issued by Snowden. Because what is being presented is often highly technical and riddled with legal, technological and military jargon, I provide an introduction to the basic ideas and themes being discussed for readers not as acquainted with the fields as they might like. I refused to ignore any logistic warts for the sake of argumentative convenience while denying the urge to pick at others which begged to be inflamed. I save the rhetorical scratching for the Afterword. Conversely, on an equally frequent basis, I dive further into the materials than the original reports. This is not presumption on my behalf.
Though only a select few individuals and news sources were granted access to Snowden’s documents, hundreds of reports emerged from them. The journalists entrusted with the materials were consistent in presenting information in a timely manner that not only steadily progressed the public debate while frequently relating to (con)current events but exhausted the available knowledge at the time of publication. Most of the editorials, especially the early ones, had to be published at a breakneck pace and at an exact time. It is obvious in the tone and organization of the early disclosures that the journalists wanted to say more. I simply try to extend these conversations. However, like any long-term discussion, the contents of many reports overlap. Some are continuations of previous editorials that nonetheless afford new insight. In these cases I offer an overview of a program, policy or law when it is first cited and try not to betray the development of the surveillance argument. However, if a topic is introduced, but a forthcoming discussion will grant the reader a better understanding of the subject matter, I postpone inclusion until the appropriate time. An example of this is SIGADs. Though passing reference is made to Signals Intelligence Activity Designators in numerous preceding reports, in the context of the Snowden affair, their use and purpose only becomes clear in a later disclosure.
I took the liberty of presenting the international edition of Der Spiegel exclusives. This admittedly shifts the publication chronology slightly, but the translations nonetheless appeared before thematically related events and never disrupt the progression of discussion. I made this decision because the alternative versions are clearly intended to be the focal exposés. They are m
ore thorough in their coverage and deliberately designed to reach a broader audience.
I preemptively apologize for any vagaries or misreadings found within my analysis of the disclosures, especially those conveyed through a foreign press. These include original editorials in German, Portuguese and French and some tertiary sources in Chinese and Russian. Though my linguistic training took place under an NSA language analyst and I possess an IT and legal background, the Snowden affair extends into many, many fields—often to an exacting degree—which are far abreast of my expertise or even competence. Though no person can be all things all the time, I cannot be faulted for lack of trying; admittedly my ambition exceeds my ability at times. Any and all mistakes have been made in oblivious good faith. For this, I ask the reader to be kind.
I have no doubt the story of the Snowden affair will continue to expand. I hope to one day see entire books devoted to the divisions of his life: Pre-June 5, his time in Hong Kong and the whistleblower in Russia. However unlikely, I am free to dream that one or more of his intelligence colleagues, such as the intern assigned to work alongside him in Switzerland, will write a memoir. Nothing would make me happier than to see enough information float to the surface to generate an extended account of the NSA leaker’s 38 days in Sheremetyevo International Airport, the Morales plane incident or the period Snowden spent with his editorial staff while ensconced in the Mira Hotel. I also hope someone will provide a thorough analysis of the Amash Amendment proceedings. Maybe a doctoral student in history or political science will choose to write about Germany or Brazil’s response to the disclosures. Intelligence aficionados pray forthcoming Snowden documents will house enough information to fashion volumes, however slim, on the various surveillance programs. And I have no doubt, there will be biographies and autobiographies about and by many of the major players in the Snowden affair, perhaps even one from the whistleblower himself. Until then, I offer this early survey as a starting point for future authors to utilize and rightfully dispute what I read, discovered and learned about the NSA, the media and the one that got away.