Sam Adams Associates for Integrity in Intelligence

Edward Snowden

Edward Snowden

Know all ye by these presents that Edward Snowden is hereby awarded the Corner-Brightener Candlestick, presented by Sam Adams Associates for Integrity in Intelligence.

Sam Adams Associates are proud to honor Mr. Snowden’s decision to heed his conscience and give priority to the Common Good over concerns about his own personal future. We are confident that others with similar moral fiber will follow his example in illuminating dark corners and exposing crimes that put our civil rights as free citizens in jeopardy…

Heeding the dictates of conscience and patriotism, Mr. Snowden sacrificed his career and put his very life at risk, in order to expose what he called ‘turnkey tyranny.’ His whistleblowing has exposed a National Security Agency leadership captured by the intrusive capabilities offered by modern technology, with little if any thought to the strictures of law and Constitution. The documents he released show an NSA enabled, rather than restrained, by senior officials in all three branches of the U.S. government.

Just as Private Manning and Julian Assange exposed criminality with documentary evidence, Mr. Snowden’s beacon of light has pierced a thick cloud of deception. And, again like them, he has been denied some of the freedoms that whistleblowers have every right to enjoy.
Mr. Snowden was also aware of the cruel indignities to which other courageous officials had been subjected — whistleblowers like Sam Adams Award honorees (ex aequo in 2011) Thomas Drake and Jesselyn Radack — when they tried to go through government channels to report abuses. Mr. Snowden was able to outmaneuver those who, as events have shown, are willing to go to ridiculous lengths to curtail his freedom and quarrel with his revelations. We are gratified that he has found a place of sanctuary where his rights under international law are respected.

Whistleblower Daniel Ellsberg, a Sam Adams ‘Awardee Emeritus,’ has asserted that Mr. Snowden’s whistleblowing has given U.S. citizens the possibility to roll back an ‘executive coup against the Constitution.’ This is a mark of the seriousness and importance of what Mr. Snowden has done.
Like other truth-tellers before him, Edward Snowden took seriously his solemn oath to support and defend the Constitution of the United States against all enemies foreign and domestic. He was thus legally and morally obliged to let his fellow Americans know that their Fourth Amendment rights were being violated.
The past few years have shown that courage is contagious. Thus, we expect that still others will now be emboldened to follow their consciences in blowing the whistle on other abuses of our liberties and in this way help stave off ‘turnkey tyranny.’

Presented this 9th day of October 2013 by admirers of the example set by the late CIA analyst, Sam Adams.”

Related Articles

Edward Snowden: Trump has created a global playbook to attack those revealing uncomfortable truths

By Edward Snowden in the Washington Post on Jan 26, 2020, excerpt:

“On Tuesday, Brazilian federal prosecutors filed criminal charges against Glenn Greenwald, the Pulitzer-Prize winning journalist and founding editor at the Intercept Brazil, for his explosive reporting on corruption at the very highest levels of Brazil’s government.

The public importance of these stories was staggering. For example, one of the revelations exposed how a well-known judge named Sergio Moro had rigged a trial to jail the country’s most popular political figure in the run-up to the presidential election, clearing a path to victory for Jair Bolsonaro, who then promptly rewarded Moro with control of the Ministry of Justice and Public Security.
Given this context, it’s understandable why a significant portion of Brazilian politicians — including even some aligned with the disgraced Bolsonaro regime — have chosen to stand shoulder-to-shoulder with press freedom organizations in denouncing these preposterous “cybercrime” charges as an act of political repression.
Yet as ridiculous as these charges are, they are also dangerous — and not only to Greenwald: They are a threat to press freedom everywhere.
The legal theory used by the Brazilian prosecutors — that journalists who publish leaked documents are engaged in a criminal “conspiracy” with the sources who provide those documents — is virtually identical to the one advanced in the Trump administration’s indictment of WikiLeaks’ founder Julian Assange in a new application of the historically dubious Espionage Act….”  (read more in Washington Post here)

US Intel Vets Dispute Russia Hacking Claims

As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. (Originally posted December 12, 2016 on Consortiumnews.com)

Veteran Intelligence Professionals for Sanity

MEMORANDUM

Allegations of Hacking Election Are Baseless

A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.

Monday’s Washington Post reports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia. Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay.

In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.

We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:

Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.

All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.

In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.

Awesome Technical Capabilities

Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.

In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.

Packets: Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end.

To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.

These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.

The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.

As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking.

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

Larry Johnson, former CIA Intelligence Officer & former State Department Counter-Terrorism Official

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

Inside the Assassination Complex: Whistleblowing Is Not Just Leaking–It’s an Act of Political Resistance

By Edward Snowden, May 3, The Intercept

“I’ve been waiting 40 years for someone like you.” Those were the first words Daniel Ellsberg spoke to me when we met last year. Dan and I felt an immediate kinship; we both knew what it meant to risk so much — and to be irrevocably changed — by revealing secret truths.

One of the challenges of being a whistleblower is living with the knowledge that people continue to sit, just as you did, at those desks, in that unit, throughout the agency, who see what you saw and comply in silence, without resistance or complaint. They learn to live not just with untruths but with unnecessary untruths, dangerous untruths, corrosive untruths. It is a double tragedy: What begins as a survival strategy ends with the compromise of the human being it sought to preserve and the diminishing of the democracy meant to justify the sacrifice.

But unlike Dan Ellsberg, I didn’t have to wait 40 years to witness other citizens breaking that silence with documents. Ellsberg gave the Pentagon Papers to the New York Times and other newspapers in 1971; Chelsea Manning provided the Iraq and Afghan War logs and the Cablegate materials to WikiLeaks in 2010. I came forward in 2013. Now here we are in 2016, and another person of courage and conscience has made available the set of extraordinary documents that are published in The Assassination Complex, the new book out today by Jeremy Scahill and the staff of The Intercept. (The documents were originally published last October 15 in The Drone Papers.)

We are witnessing a compression of the working period in which bad policy shelters in the shadows, the time frame in which unconstitutional activities can continue before they are exposed by acts of conscience. And this temporal compression has a significance beyond the immediate headlines; it permits the people of this country to learn about critical government actions, not as part of the historical record but in a way that allows direct action through voting — in other words, in a way that empowers an informed citizenry to defend the democracy that “state secrets” are nominally intended to support. When I see individuals who are able to bring information forward, it gives me hope that we won’t always be required to curtail the illegal activities of our government as if it were a constant task, to uproot official lawbreaking as routinely as we mow the grass. (Interestingly enough, that is how some have begun to describe remote killing operations, as “cutting the grass.”)

A single act of whistleblowing doesn’t change the reality that there are significant portions of the government that operate below the waterline, beneath the visibility of the public. Those secret activities will continue, despite reforms. But those who perform these actions now have to live with the fear that if they engage in activities contrary to the spirit of society — if even a single citizen is catalyzed to halt the machinery of that injustice — they might still be held to account. The thread by which good governance hangs is this equality before the law, for the only fear of the man who turns the gears is that he may find himself upon them.

(Read more here.)

“Snowden Has Done a Service”: Former Bush Official Lawrence Wilkerson Applauds the Whistleblower

Salon, by Ben Norton, March 24, 2016

Wilkerson says Snowden did not threaten U.S. security, and, in a perfect world, the whistleblower would be rewarded.

“I try to stay up with Snowden,” said Lawrence “Larry” Wilkerson. “God, has he revealed a lot,” he laughed.

A retired Army colonel who served as the chief of staff to Secretary of State Colin Powell in President George W. Bush’s administration, Wilkerson has established himself as a prominent critic of U.S. foreign policy.

He sat down with Salon for an extended interview, discussing a huge range of issues from the war in Syria to climate change, from ISIS to whistle-blower Edward Snowden, of whom Wilkerson spoke quite highly.

“I think Snowden has done a service,” Wilkerson explained. “I wouldn’t have had the courage, and maybe not even the intellectual capacity, to do it the way he did it.”

(rest of article here)

The Courage from Whistle-blowing

Exclusive: Courage, like cowardice, can grow when an action by one person influences decisions by others, either toward bravery or fear. Thus, the gutsy whistle-blowing by some NSA officials inspired Edward Snowden to expose mass data collection on all Americans, recalls ex-CIA analyst Ray McGovern.

By Ray McGovern

When Edward Snowden in early June 2013 began to reveal classified data showing criminal collect-it-all surveillance programs operated by the U.S. government’s National Security Agency, former NSA professionals became freer to spell out the liberties taken with the Bill of Rights, as well as the feckless, counterproductive nature of bulk electronic data collection.

On Jan. 7, 2014, four senior retired specialists with a cumulative total of 144 years of work with NSA – William Binney, Thomas Drake, Edward Loomis, and Kirk Wiebe – prepared a Memorandum for the President providing a comprehensive account of the problems at NSA, together with suggestions as to how they might be best addressed.

The purpose was to inform President Obama as fully as possible, as he prepared to take action in light of Snowden’s revelations.

On Jan. 23, 2015 in Berlin, Binney was honored with the annual Sam Adams Award for Integrity in Intelligence. Ed Snowden was live-streamed-in for the occasion, and said, “Without Bill Binney there would be no Ed Snowden.” (Binney had been among the first to speak out publicly about NSA abuses; apparently that emboldened Snowden to do what he did.)

Snowden had already said when he fled to Hong Kong in June 2013 that he had learned an extremely important lesson from the four years of government persecution/prosecution of Tom Drake; namely, that he, Ed Snowden, had to leave the country in order to fulfill his mission – and to have some reasonable chance to avoid spending the rest of his life behind bars. (Eventually, all the felony charges against Drake were dismissed.)

An important take-away lesson from Binney’s and Drake’s boldness and tenacity is that one never knows what impetus courageous truth-tellers can give to other, potential whistleblowers – like Ed Snowden.

(full article here)