The Edward Snowden Affair (41 page)

Read The Edward Snowden Affair Online

Authors: Michael Gurnow

Tags: #History, #Legal, #Nonfiction, #Political, #Retail

Regardless of who or what Snowden is and was, his impact is irrefutable.

In America, bill upon bill is being proposed on Capitol Hill. The White House’s premature declassification of data and release of The White Paper is a simultaneous confession and defense of its surveillance activities. Numerous privacy and Fourth Amendment lawsuits have been filed against the federal government.
15
Restore the Fourth, a grassroots movement supporting the Fourth Amendment, held rallies nationwide on the Independence Day following the first disclosures.
16
A protest march on Washington took place on October 26. Attendees included Thomas Drake and former presidential candidate Gary Johnson.
17
In late October after it was revealed that the German chancellor’s phone had been tapped,
18
the White House continued to deny wrongdoing by deliberately ignoring the past. Carney announced, “And I noted the other day a readout from a phone call the President had with Chancellor Merkel made clear that we do not and will not monitor the Chancellor’s communications.”
19
Under immense political pressure, Senate hearings ensued. During the proceedings Rogers echoed Chambliss’s circular defense of American surveillance, “You can’t have your privacy violated if you don’t know your privacy is violated.”
20
Using the congressman’s logic, it is morally permissible to rob someone so long as the crime goes undetected. The chair of the House Intelligence Committee obviously sees the only misstep the NSA has made is having been caught. As for the NSA, Keith Alexander and Deputy Director John Inglis will leave their respective positions in the spring of 2014. Though new faces will be emerging, the spy agency shows no signs of slowing down.

Somewhat predictably given Clapper’s adamant defense, the NSA hasn’t changed its policies; it has merely tightened its security. Instead of conducting surveillance in a manner that won’t plague an employee’s conscience and spur another Snowden to action, the agency instituted an information lockdown. Shortly after the disclosures stared appearing, a two-person data extraction rule was instituted.
21
Whenever a file needs to be moved, another agent or analyst must be present. The same in-house legislation had been implemented in 2010 after Manning was suspected of having stolen thousands of files.
22
It is anyone’s guess why the regulation was not being reinforced or did not apply to contractors handling top secret documents. Regular audits now take place.
23
Snowden was also found to have used the intelligence community’s cloud service to steal files. The surveillance cloud was the product of pre-9/11 interagency information dispersal issues. Ironically and out of stubbornness and hubris, instead of cataloguing the data contained within the various departments’ databases, the post-Snowden NSA decided to keep the massive security liability open and available as well as expand its capabilities. The super storage unit is code-named “Wildsage.”
24

Many critics of Snowden pondered whether the surveillance state is as omnipotent as the whistleblower has made it out to be. Their argument is Snowden himself. They cite his ability to evade detection as proof that not everything is being watched and recorded.
25
Ignoring that Snowden knew the intelligence community’s blind spots, he also exploited the NSA’s Achilles’ Heel: volume (that is, if one doesn’t count its atrocious grammar, poor spelling and juvenile PowerPoint construction and design). But U.S. intelligence had already begun to remedy this problem pre-Snowden. The NSA has since finished building the $1.5 billion Intelligence Community Comprehensive National Cybersecurity Initiative Data Center at Camp Williams, near Bluffdale, Utah. It is five times the size of the U.S. Capitol. The facility’s capacities are modest. It houses the capability to store emails, cell calls, Internet searches and parking and banking receipts. Its mission is to be able to record and catalog a person’s entire life. The Utah Data Center is estimated to be able to retain between three to 12 exabytes of data, or up to 12,000,000,000,000,000,000 bits of information.
26
The intelligence community no longer has to dump its full-take buffer after three days and metadata is now immortal.

Snowden had been wrong about one thing. He understated the NSA’s ability to break encryption codes. He told Poitras, “Assume that your adversary is capable of a trillion guesses per second.” Currently the intelligence agency has “Jaguar,” a supercomputer capable of executing 2.33 quadrillion operations per second. In laymen’s terms, Snowden’s trillion is the next series of zeroes after a million. A quadrillion is the round after that: 1,000,000,000,000,000. Jaguar was slated to be upgraded and metamorphose into “Titan” by the end of 2013, which should enable the NSA to make 20,000,000,000,000,000 password guesses per second.
27

Abroad, an entire continent has been alienated. Snowden had inadvertently unified all of Latin America. Brazil may never speak to Washington ever again and U.S. administration has dashed any hopes of forming an alliance with Venezuela after Hugo Chavez’s death. It is not fairing much better with its southern neighbor.
Der Spiegel
followed
Fantastico
’s September 1 report with a more in-depth look at American intelligence’s Mexican surveillance.
28
Across the Atlantic, divisions have formed. Merkel’s reelection bid was challenged on the issue of NSA surveillance
29
but she ultimately won. Due to the spying allegations, she now insists all U.S.-German joint spying activities be contractually bound.
30
In late September, India learned its diplomatic offices in New York and Washington were surveilled.
31
Instead of responding with technological counterintelligence, India instituted a security technique that makes espionage much more challenging: All sensitive documents are now composed on typewriters and Indian officials have top secret meetings outside embassy buildings.
32
France finally found itself center stage in mid-October when the long-standing daily
Le Monde
reported the NSA had intercepted 70 million French calls and texts in a 30-day period.
33
The European Union has proposed legislation which would force Internet companies to disclose when user data is being retained and to whom it is being reported.
34
The EU also moved to instate punitive measures against the United States. Various members of European Parliament have called to suspend the SWIFT Agreement with America.
35
The first step was taken two days after
Le Monde
’s exposé premiered: a European council passed a non-binding resolution by a vote of 280-254 to boot the United States from the Terrorist Finance Tracking Program.
36
Clear lines of demarcation with America have been drawn by China and Russia. Obama did not meet with Putin at the G20 Summit though he talked with Hollande, Jinping and Japan’s Prime Minister Shinzo Abe.
37

Snowden’s cultural influence threatens to rival his political impact.

German lingerie ads have used his name to promote their products, “Dear Edward Snowden, there’s still a lot to uncover” and “Dear NSA, intimates—don’t spy them, buy them.”
38
An engineering firm in China registered to trademark Snowden’s name.
39
The term “Snowball Effect” has been adapted to include sociological results. “The Snowden Effect” is loosely defined as the consequence of an initial report manifesting in direct and indirect gains in public knowledge.
40
The European Union holds no grudges. Its foreign affairs department recommended the NSA leaker for the Sakharov Prize, which is annually awarded to freedom of thought and civil rights activists. Snowden received the Sam Adams Associates for Integrity in Intelligence award on October 9. The whistleblower has been called the John Brown of the 21
st
century.
41
He has been nominated for the Nobel Peace Prize.
42

His influence has also permeated the entertainment industry. The animated television satire
South Park
devoted an entire episode to NSA surveillance.
43
Verax
, a five-minute independent film about Snowden’s arrival in Hong Kong, went viral in early July.
44
Hollywood has already started initial planning on a feature film about the American whistleblower.
45
An independent, small-budget movie titled
Classified: The Edward Snowden Story
is slated for release in September 2014.
46
A three-minute PSA about suspicionless surveillance narrated by John Cusak, Maggie Gyllenhall and Oliver Stone among others premiered in October.
47
Perhaps the greatest cultural signifier of Snowden’s impact is seen in George Orwell’s
Nineteen Eighty-Four
. Shortly after the world saw Snowden’s face for the first time, sales of the 64-year-old classic skyrocketed. It witnessed a 5,800% overnight increase in sales. The novel went from 7,397 to 125 on Amazon’s bestseller list.
48

Though the NSA whistleblower has changed the lives of millions of anonymous individuals worldwide, he permanently shifted the life trajectory of those closest to him. After Lon fought to see his son, only to be told time and again doing so was a security risk,
49
he arrived in Russia and met with Edward a little over four months since the NSA leaker became the most wanted man in the world. To date, his mother has never spoken to the press or offered comment. She did not accompany her ex-husband to the former Soviet Union.
50
At the time Snowden was issued the Sam Adams award, Jesselyn Radack, Director for the Government Accountability Project, reported, “Laura Poitras is living in Germany and does not feel she can return to the U.S. without being detained. I believe Glenn Greenwald harbors similar concerns because his partner was detained. [ … ] Also, WikiLeaks journalist Sarah Harrison is stranded in Russia with Mr. Snowden because of the prospect of being detained on terrorism charges in the UK.”
51
A small legion of journalists noticed that over one weekend in October, Snowden’s former girlfriend, Mills, had downloaded pictures to her blog which bore cryptic titles that included symbols. It was theorized that though she might not have forgiven Snowden for abruptly fleeing under false pretenses, she was nonetheless covertly communicating with the American exile.
52
As for Snowden, Kucherena relayed to the press that the whistleblower has a new girlfriend
53
and started working as a security technician for a Russian website on November 1.
54
To date, he has offered to personally assist both Germany
55
and Brazil
56
in their inquiries and investigations into NSA surveillance.

While Snowden, the disclosures and government and corporate reactions have been discussed, analyzed and debated, few have addressed the elephant in the surveillance room. U.S. intelligence was revealed to have additional resources by which to cross-reference data. The White Paper states, “The FBI must rely on publicly available information, other available intelligence, or other legal processes in order to identify the subscribers of any of the numbers that are retrieved.” “Other available intelligence” and “other legal processes” is intelligence jargon for the sister of government spying: corporate espionage. Ironically, the industry term for this is “business intelligence.” In many respects this is a graver concern than government surveillance. Though federal spying is more invasive and has the law on its side, corporate espionage is more pervasive and largely unregulated. It is often more revealing than what the government has collected. The Snowden affair makes clear Big Business and U.S. government are doting bedfellows. It is also obvious Big Business is making a pretty penny from being forced to play along. But the public has only heard of the questionable means Washington goes to acquire data directly from communication sources. What is not being talked about is the intelligence it obtains from civilian data mining enterprises. These businesses come in two flavors: Private data collection companies and corporate retailers.

The latter consists of commercial retail and fast food establishments. Considering Microsoft, Yahoo, AT&T, Google, Sprint and Verizon’s relationship with the federal government, it is not unreasonable to assume the data these two types of businesses collect is also sequestered by Washington.
57
Target’s ability to determine a young woman was pregnant before she knew is the tip of the spying iceberg. For example, many cell phone owners forget wifi usage is a revolving door. Most give little thought to accessing and using a store’s wifi, not realizing the company’s systems may be programmed to exploit the Internet connection. Once a connection is made, customer data—including gender, address, telephone number and a consumer’s personal interests (via Internet searches and an individual’s social network pages, which are frequently left open for convenience)—are recorded. In retail outlets, a corporation’s programming may also be set to track a person’s movements throughout the building and catalog the individual’s browsing habits. For the customer, the result is customized advertisements and coupons; for the company, consumer analysis is completed at a fraction of the traditional cost. Sadly, advances in technology permit businesses to supersede any attempts at protecting one’s privacy. Much like the U.S. intelligence’s ability to stalk a phone that is turned off, corporations are now able to access phones even if they aren’t deliberately connected to a store’s wifi.
58

The other and much darker side of corporate surveillance is data mining companies. These include firms such as Acxiom, Datalogix, Euclid, Federated Media, Epsilon, Digital Advertising Alliance, BlueKai and Network Advertising Initiative. Acxiom, the leader in the industry, has over 190 million profiles on American adults.
59
These entities make it their business to collect every conceivable type of knowledge about U.S. citizens. They first scour the Internet for any information a person is willing to make known before proceeding to public records. Yet these techniques are time and labor-intensive. Both data mining companies and corporations have a surveillance tool which is much more thorough, revealing and, most importantly, automated. They hire software engineers to design and implement third-party cookies.

Other books

Ultimate Sins by Lora Leigh
Consumed by Melissa Toppen
Grand Master by Buffa, D.W.
King Pinch by David Cook, Walter (CON) Velez
The Bone Conjurer by Archer, Alex
Forest of Shadows by Hunter Shea