Category Archives: NSA

NSA spying has a disproportionate effect on U.S. immigrants

Conor Friedersdorf writes: The U.S. government concedes that it needs a warrant to eavesdrop on phone calls between Americans, or to read the body of their emails to one another. Everyone agrees that these communications are protected by the Fourth Amendment. But the government also argues that Fourth Amendment protections don’t apply when an American calls or writes to a foreigner in another country.

Let’s say, for example, that the head of the NAACP writes an email to a veteran of the South African civil-rights struggle asking for advice about an anti-racism campaign; or that Hillary Clinton fields a call from a friend in Australia whose daughter was raped; or that Jeb Bush uses Skype to discuss with David Cameron whether he should seek the 2016 presidential nomination for the Republican Party. Under the Obama administration’s logic, these Americans have no reasonable expectation of privacy with regard to these conversations, and it is lawful and legitimate for the NSA to eavesdrop on, record, and store everything that is said.

The arguments Team Obama uses to justify these conclusions are sweeping and worrisome, as the ACLU’s Jameel Jaffer captures in his analysis of the relevant legal briefs: [Continue reading…]

Facebooktwittermail

Everyone should know just how much the government lied to defend the NSA

Trevor Timm writes: If you blinked this week, you might have missed the news: two Senators accused the Justice Department of lying about NSA warrantless surveillance to the US supreme court last year, and those falsehoods all but ensured that mass spying on Americans would continue. But hardly anyone seems to care – least of all those who lied and who should have already come forward with the truth.

Here’s what happened: just before Edward Snowden became a household name, the ACLU argued before the supreme court that the Fisa Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional.

In a sharply divided opinion, the supreme court ruled, 5-4, that the case should be dismissed because the plaintiffs didn’t have “standing” – in other words, that the ACLU couldn’t prove with near-certainty that their clients, which included journalists and human rights advocates, were targets of surveillance, so they couldn’t challenge the law. As the New York Times noted this week, the court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans’ communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court.

It turns out that neither of those statements were true – but it took Snowden’s historic whistleblowing to prove it. [Continue reading…]

Facebooktwittermail

German government tightens rules for sensitive public IT contracts

Reuters reports: The German government has tightened tender rules for sensitive public IT contracts in the wake of reports about mass surveillance by the U.S. National Security Agency, a spokesman for the Interior Ministry said on Friday.

Last year former NSA contractor Edward Snowden exposed U.S. technology companies’ close cooperation with national intelligence agencies by leaking documents on the NSA’s access to the accounts of tens of thousands of net companies’ users.

German Interior Ministry spokesman Johannes Dimroth said suspect firms would be banned from taking on some public contracts in Germany if they had to hand over confidential data to foreign intelligence or security services. [Continue reading…]

Facebooktwittermail

Snowden fallout still echoes across cyber industry

Reuters reports: Revelations by former NSA contractor Edward Snowden changed lives in the cyber community, from slowdowns in obtaining high-level security clearances to providing material for a “really good comedy routine.”

Experts at the Reuters Cybersecurity Summit this week were asked how Snowden, now living under asylum in Russia after exposing the National Security Agency’s phone and Internet spying programs in 2013, altered their worlds.

The creation of a mini “Snowden industry” is one on them.

“I give a lot more speeches,” said Michael Hayden, the former NSA and CIA director. “It has allowed someone of my background to comment on issues of national importance.”

The website of Leading Authorities, the speakers’ bureau that represents Hayden, shows the retired four-star general can command $20,000 to as much as $75,000 for a speech.

“It’s made my life busier,” deadpanned Robert Anderson, who steered the Snowden investigation as the FBI’s assistant director of counterintelligence. “What it has done for me is to very much broaden the way I look at an issue.”

Christopher Soghoian, principal technologist with the American Civil Liberties Union, lauded the spotlight that Snowden’s disclosures shone. [Continue reading…]

Facebooktwittermail

The U.S. Intelligence Community doesn’t understand the world in which we live

Josh Kerbel writes: In 2012, the once-mighty Eastman-Kodak company declared bankruptcy. It was an event that should have reverberated strongly with the United States Intelligence Community (IC) — and not just due to the obvious connection between imaging and spying. Rather, it should have resonated because in Kodak the IC could have glimpsed a reflection of itself: an organization so captivated by its past that it was too slow in changing along with its environment.

To understand the IC’s similar captivation and lethargy — to remain focused on classified collection in an era of increasingly ubiquitous, useful and unclassified data — one must first understand the type of problem around which the modern IC business model remains designed: the Soviet Union. The Soviet Union was fundamentally a collection problem. That is to say, it was a closed system (i.e., a discrete entity) with clear edges and a hierarchical governance structure. Given that nature, knowing what was happening in the Soviet Union required the use of classified means of collection — most of which the IC alone possessed.

Today, however, the IC no longer has the luxury of watching a single discrete entity that demands classified collection in order to obtain relevant data. There is a much more expansive range of interconnected and complex challenges. These challenges — economic contagion, viral political and social instability, resource competition, migration, climate change, transnational organized crime, pandemics, proliferation, cyber security, terrorism, etc. — are interdependent phenomena, not discrete ”things.” As such, they are less collection issues than cognitive ones. To put it differently: relevant data about all these issues is widely available—the real challenge is to make sense of it.

This, of course, is a very different world for the IC, one in which it has little experience. Consequently, the IC — unfortunately, but not surprisingly — does what it knows; it grafts its own legacy experience and expertise — classified collection — onto the new challenges that loom. Accordingly, terrorism (a broad phenomenon that needs to be thought about contextually) becomes — mistakenly — about terrorists (distinct things that need to be targeted for collection). Indeed, the whole slew of complex issues mentioned above get artificially and erroneously reduced to discrete chunks. Not only is this dangerously simplistic, it effectively puts the IC on a divergent path from the increasingly complex world it is tasked to understand. [Continue reading…]

Facebooktwittermail

Bill to curb NSA spying looks like change, but isn’t really

McClatchy reports: The bipartisan bill that aims to put serious curbs on the National Security Agency’s mass collection of Americans’ communications is being hailed by Republicans and Democrats as a big breakthrough.

It’s not.

“The bottom line: This is largely faux reform and a surveillance salve,” said Thomas Drake, a former NSA senior official turned whistle-blower who’s critical of the agency’s collection programs. “To date, neither the House nor Senate attempts go far enough.”

That’s not easy to discern, thanks to an outpouring of raves for the legislation. Democrats, Republicans and traditionally skeptical watchdog groups have put their muscle behind the USA Freedom Act.

The House of Representatives is expected to vote on its version of the bill next week, the first time since news about the surveillance broke last year that major legislation supported by top congressional leaders like this has come to the floor. The Senate might take up its own version as early as this summer.

The top Republican and Democrat on the House Intelligence Committee even issued a joint statement praising the bipartisan cooperation, a rarely seen trait around Congress these days.

But peek just past all the good will and there’s serious concern that Congress has much more to do. Not only are loopholes easy to find but also the government has other ways of collecting the data. [Continue reading…]

Facebooktwittermail

NSA may be putting Israeli security interests above U.S., new document reveals

Haaretz reports: A document suggesting that the U.S. National Security Agency may put the interests of Israel above those of the United States was released Wednesday by journalist Glenn Greenwald.

The document is one of the many slides leaked by NSA defector Edward Snowden, currently a fugitive from American law in Moscow.

Greenwald, who published many of Snowden’s revelations over the last year, released his book “No Place to Hide” on Wednesday. Concurrently with the release of the book, Greenwald made public slides that Snowden obtained from the NSA. One of them deals with intelligence relations with Israel.

“Balancing the SIGINT exchange equally between U.S. and Israeli needs has been a constant challenge in the last decade; it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party CT relationship being driven almost totally by the needs of the partner,” one slide reads.

Another slide states, “The Israelis are extraordinarily good SIGINT partners for us, but … they target us to learn our positions on Middle East problems. A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the U.S.” [Continue reading…]

Facebooktwittermail

Greenwald sells movie rights of Snowden story to Sony Pictures

The New York Times reports: After a long, slow haul, the film rights to Glenn Greenwald’s book about Edward J. Snowden and his revelations about electronic surveillance by United States security officials have found a home, at Sony Pictures Entertainment.

Sony said on Wednesday that it had acquired rights to Mr. Greenwald’s book, “No Place to Hide: Edward Snowden, the NSA and the U. S. Surveillance State,” for the producers Michael G. Wilson and Barbara Broccoli. Mr. Wilson and Ms. Broccoli are known for their work on James Bond films like “Skyfall” and “Quantum of Solace,” both of which were released by Sony and Metro-Goldwyn-Mayer.

Facebooktwittermail

Report claims Anonymous will protest Glenn Greenwald for ties to PayPal billionaire

Raw Story reports: The Internet hacktivist group Anonymous is calling for protests against author and civil liberties advocate Glenn Greenwald because of his relationship with eBay founder Pierre Omidyar.

In a release posted to Pastebin, the secretive activist group is calling for members to attend and disrupt scheduled book signings where Greenwald will be promoting his new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State.

The point of contention between Greenwald and the group stems from his relationship with First Look founder and eBay billionaire Pierre Omidyar.

eBay purchased PayPal in 2002.

Representing the “PayPal 14,” — a group charged under the Computer Fraud and Abuse Act after they attempted to disrupt PayPal’s operations in retaliation for PayPal’s refusal to process donations to WikiLeaks — Anonymous stated that the 14 are “struggling to raise more than $80,000 in court-ordered restitution” that must be paid to eBay/PayPal.

Anonymous claims that, while the 14 face jail and fines, Greenwald and Omidyar have been cashing in on the “digital information war.” [Continue reading…]

Facebooktwittermail

Glenn Greenwald: How I met Edward Snowden

Make no mistake: it’s been the year of Edward Snowden.  Not since Daniel Ellsberg leaked the Pentagon Papers during the Vietnam War has a trove of documents revealing the inner workings and thinking of the U.S. government so changed the conversation.  In Ellsberg’s case, that conversation was transformed only in the United States.  Snowden has changed it worldwide.  From six-year-olds to Angela Merkel, who hasn’t been thinking about the staggering ambitions of the National Security Agency, about its urge to create the first global security state in history and so step beyond even the most fervid dreams of the totalitarian regimes of the last century?  And who hasn’t been struck by how close the agency has actually come to sweeping up the communications of the whole planet?  Technologically speaking, what Snowden revealed to the world — thanks to journalist Glenn Greenwald and filmmaker Laura Poitras — was a remarkable accomplishment, as well as a nightmare directly out of some dystopian novel.

From exploiting backdoors into the Internet’s critical infrastructure and close relationships with the planet’s largest tech companies to performing economic espionage and sending spy avatars into video games, the NSA has been relentless in its search for complete global omniscience, even if that is by no means the same thing as omnipotence.  It now has the ability to be a hidden part of just about any conversation just about anywhere.  Of course, we don’t yet know the half of it, since no Edward Snowden has yet stepped forward from the inner precincts of the Defense Intelligence Agency, the CIA, the National Geospatial Intelligence Agency, or other such outfits in the “U.S. intelligence community.”  Still, what we do know should take our collective breath away.  And we know it all thanks to one young man, hounded across the planet by the U.S. government in an “international manhunt.”

As an NSA contractor, Snowden found himself inside the blanket of secrecy that has fallen across our national security state since 9/11 and there he absorbed an emerging principle on which this country was never founded: that “they” know what’s best for us, and that, in true Orwellian fashion, our ignorance is our strength.  Increasingly, this has become Washington’s twenty-first-century mantra, which is not to be challenged.  Hence, the extremity of the outrage, as well as the threats and fantasies of harm, expressed by those in power (or their recently retired channelers) toward Snowden.

One brave young man with his head firmly fastened on his shoulders found himself trapped in Moscow and yet never lost his balance, his good sense, or his focus.  As Jonathan Schell wrote in September 2013, “What happened to Snowden in Moscow diagramed the new global reality. He wanted to leave Russia, but the State Department, in an act of highly dubious legality, stripped him of his passport, leaving him — for purposes of travel, at least — stateless. Suddenly, he was welcome nowhere in the great wide world, which shrank down to a single point: the transit lounge at Sheremetyevo [Airport]. Then, having by its own action trapped him in Russia, the administration mocked and reviled him for remaining in an authoritarian country. Only in unfree countries was Edward Snowden welcome. What we are pleased to call the ‘free world’ had become a giant prison for a hero of freedom.”

And of course, there was also a determined journalist, who proved capable of keeping his focus on what mattered while under fierce attack, who never took his eyes off the prize.  I’m talking, of course, about Glenn Greenwald.  Without him (and the Guardian, Laura Poitras, and Barton Gellman of the Washington Post), “they” would be observing us, 24/7, but we would not be observing them.  This small group has shaken the world. 

This is publication day for Greenwald’s new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Security State, about his last near-year swept away by the Snowden affair. It’s been under wraps until now for obvious reasons.  Today, TomDispatch is proud, thanks to the kindness of Greenwald’s publisher, Metropolitan Books, to be releasing an adapted, much shortened version of its first chapter on how this odyssey of our American moment began. Tom Engelhardt

The Snowden saga begins
“I have been to the darkest corners of government, and what they fear is light”
By Glenn Greenwald

[This essay is a shortened and adapted version of Chapter 1 of Glenn Greenwald’s new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Security State, and appears at TomDispatch.com with the kind permission of Metropolitan Books.]

On December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.

The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a “model of civic virtue,” Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.

The email began: “The security of people’s communications is very important to me,” and its stated purpose was to urge me to begin using PGP encryption so that “Cincinnatus” could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for “pretty good privacy.” It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.

Continue reading

Facebooktwittermail

Bush-Obama continuity and the interests of the national security establishment

Glenn Greenwald writes: The just-retired long-time NSA chief, Gen. Keith Alexander, recently traveled to Australia to give a remarkably long and wide-ranging interview with an extremely sycophantic “interviewer” with The Australian Financial Review. The resulting 17,000-word transcript and accompanying article form a model of uncritical stenography journalism, but Alexander clearly chose to do this because he is angry, resentful, and feeling unfairly treated, and the result is a pile of quotes that are worth examining, only a few of which are noted below:

AFR: What were the key differences for you as director of NSA serving under presidents Bush and Obama? Did you have a preferred commander in chief?

Gen. Alexander: Obviously they come from different parties, they view things differently, but when it comes to the security of the nation and making those decisions about how to protect our nation, what we need to do to defend it, they are, ironically, very close to the same point. You would get almost the same decision from both of them on key questions about how to defend our nation from terrorists and other threats.

The almost-complete continuity between George W. Bush and Barack Obama on such matters has been explained by far too many senior officials in both parties, and has been amply documented in far too many venues, to make it newsworthy when it happens again. Still, the fact that one of the nation’s most powerful generals in history, who has no incentive to say it unless it were true, just comes right out and states that Bush and The Candidate of Change are “very close to the same point” and “you would get almost the same decision from both of them on key questions” is a fine commentary on a number of things, including how adept the 2008 Obama team was at the art of branding. [Continue reading…]

Greenwald says Alexander “has no incentive to say it unless it were true” — but actually he does have an incentive as does every other former and current member of the national security establishment.

Whenever intelligence agencies are accused of lack of accountability, evading Congressional oversight, or any other abuse of power, their comeback is always the same: we are the humble and loyal servants of the president doing exactly what we are asked to do.

So, they very much do have an interest in portraying the continuity of their own operations as perfectly mirroring the continuity in the approaches of their commander in chief.

The irony in the continuity between Bush and Obama has been frequently noted. What seems more worthy of being underlined is the way in which Obama has turned out to be worse than Bush.

The excesses of the last administration have come to be portrayed as a product of 9/11, but the ways in which Obama has institutionalized pervasive secrecy are much more insidious and much less likely to be undone by future presidents.

And if anyone thought that the legacy of the Snowden/Greenwald revelations might be a move towards more open government, the opposite is turning out to look more likely.

Facebooktwittermail

Emails reveal close Google relationship with NSA

Jason Leopold reports: Email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt suggest a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass after last year’s revelations about NSA spying.

Disclosures by former NSA contractor Edward Snowden about the agency’s vast capability for spying on Americans’ electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law.

But Al Jazeera has obtained two sets of email communications dating from a year before Snowden became a household name that suggest not all cooperation was under pressure.

On the morning of June 28, 2012, an email from Alexander invited Schmidt to attend a four-hour-long “classified threat briefing” on Aug. 8 at a “secure facility in proximity to the San Jose, CA airport.”

“The meeting discussion will be topic-specific, and decision-oriented, with a focus on Mobility Threats and Security,” Alexander wrote in the email, obtained under a Freedom of Information Act (FOIA) request, the first of dozens of communications between the NSA chief and Silicon Valley executives that the agency plans to turn over.

Alexander, Schmidt and other industry executives met earlier in the month, according to the email. But Alexander wanted another meeting with Schmidt and “a small group of CEOs” later that summer because the government needed Silicon Valley’s help.

“About six months ago, we began focusing on the security of mobility devices,” Alexander wrote. “A group (primarily Google, Apple and Microsoft) recently came to agreement on a set of core security principles. When we reach this point in our projects we schedule a classified briefing for the CEOs of key companies to provide them a brief on the specific threats we believe can be mitigated and to seek their commitment for their organization to move ahead … Google’s participation in refinement, engineering and deployment of the solutions will be essential.”

Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society, said she believes information sharing between industry and the government is “absolutely essential” but “at the same time, there is some risk to user privacy and to user security from the way the vulnerability disclosure is done.” [Continue reading…]

One of the most corrosive effects of the revelations about the NSA’s exploitation of information security flaws is that this has created a perception that any kind of interaction between the NSA and Silicon Valley should be viewed with suspicion. In reality, information security would be undermined if the NSA wasn’t talking to the tech companies. The real problem comes when the NSA applies a definition of national security interests that conflicts with public interests.

Facebooktwittermail

Two major threats to the internet: The U.S. government and the Russian government

Ars Technica: Hector Xavier Monsegur, the hacker known as “Sabu,” became a confidential FBI informant following his 2011 arrest. But he continued to direct other hackers to attack more than 2,000 Internet domains in 2012, including sites operated by the Iranian, Syrian, and Brazilian governments.

Based on documents obtained by the New York Times, those attacks were carried out with the knowledge of the FBI agents supervising Monsegur. The Times report suggests that the data obtained in the attacks—including information on Syrian government sites—was passed to US intelligence agencies by the FBI.

Russian President Vladimir Putin clearly wants to exploit the climate of distrust that has been generated by the NSA and other branches of the U.S. government that have undermined internet security and sees in this the opportunity to push for a Russian internet — one in which the Russian government can exercise greater control over social media.

Vesti.ru reports (translation):

“The Internet emerged as a special project of the CIA USA, and continues to be developed as such,” said Putin [at the conference Mediaforum in St. Petersburg today]. Moreover, the president noted that the national search engine Yandex and the social network VKontakte are trying to develop business, mathematical and informational programming in Russia. “Our companies didn’t have resources free for such capital investments, but now they have appeared,” said the head of state. Putin expressed the hope that the Russian Internet would develop rather intensively and rapidly and will secure the interests of the Russian Federation.”

Meanwhile, ITAR-TASS reports:

Russia’s popular bloggers will now have to brace for considerable restrictions of their rights. The State Duma has just adopted a law introducing new rules they will have to abide by. The document incorporates a package of bills for effective struggle against terrorism and extremism. Earlier, the bill drew a mixed response from society, including sharp criticism from human rights activists.

The law introduces a new term: “Internet user called blogger.” Bloggers will be obliged to declare their family name and initials and e-mail address. Those authors whose personal website or page in social networks has 3,000 visitors or more a day must have themselves registered on a special list and abide by restrictions applicable to the mass media. In other words, registration requires the blogger should check the authenticity of published information and also mention age restrictions for users. Also, bloggers will have to follow mass media laws concerning electioneering, resistance to extremism and the publication of information about people’s private lives. An abuse of these requirements will be punishable with a fine of 10,000 to 30,000 roubles (roughly 300 dollars to 1,000 dollars) for individuals and 300,000 roubles (10,000 roubles) for legal entities. A second violation will be punishable with the website’s suspension for one month.

The Russian investigative journalists Andrei Soldatov and Irina Borogan write:

The NSA scandal made a perfect excuse for the Russian authorities to launch a campaign to bring global web platforms such as Gmail and Facebook under Russian law—either requiring them to be accessible in Russia by the domain extension .ru, or obliging them to be hosted on Russian territory. Under Russian control, these companies and their Russian users could protect their data from U.S. government surveillance and, most importantly, be completely transparent for Russian secret services.

Russia wants to shift supervision and control of the Internet from global companies to local or national authorities, allowing the FSB more authority and latitude to thwart penetration from outside. At December’s International Telecommunications Union (ITU) conference in Dubai, Moscow tried to win over other countries to its plan for a new system of control. The key to the project is to hand off the functions of managing distribution of domain names/IP-addresses from the U.S.-based organization ICANN to an international organization such as the ITU, where Russia can play a central role. Russia also proposed limiting the right of access to the Internet in such cases where “telecommunication services are used for the purpose of interfering in the internal affairs or undermining the sovereignty, national security, territorial integrity, and public safety of other states, or to divulge information of a sensitive nature.” Some 89 countries voted for the Russian proposals, but not the United States, United Kingdom, Western Europe, Australia, or Canada. The result is a stalemate.

Web services would be required to build backdoors for the Russian secret services to access what’s stored there. Prominent Russian MP Sergei Zheleznyak, a member of the ruling United Russia party, has called on Russia to reclaim its “digital sovereignty” and wean its citizens off foreign websites. He said he would introduce legislation this fall to create a “national server,” which analysts say would require foreign websites to register on Russian territory, thus giving the Kremlin’s own security services the access they have long been seeking. Of course, building such a national system would defeat the global value of the Internet.

Shane Harris writes:

When U.S. officials warn of the threat foreign cyber spies pose to American companies and government agencies, they usually focus on China, which has long been home to the world’s most relentless and aggressive hackers. But new information shows that Russian and Eastern European hackers, who have historically focused their energies on crime and fraud, now account for a large and growing percentage of all cyber espionage, most of which is directed at the United States.

Individuals and groups in Eastern Europe, and particularly in Russia and Russian-speaking countries, are responsible for a fifth of all cyber spying incidents in the world, according to a global study of data breaches conducted by Verizon, published this week. The spies are targeting a range of companies as varied as the global economy itself, and are stealing manufacturing designs, proprietary technology and confidential business plans. The cyber spies steal information on behalf of their governments in order to manufacture cheaper versions of technologies or weapons systems, or to give their home country’s corporations a leg up on their foreign competitors.

Facebooktwittermail

Snowden, Putin, Wyden, and Clapper

Imagine the tension inside the studio on Russian state television when Vladamir Putin was confronted by Edward Snowden. How would Russia’s president handle a direct challenge from the world’s most famous whistleblower?

Was the most powerful man in the world going to cower like DNI James Clapper did a year ago and wipe sweat from his forehead as he nervously tried to evade pointed questions from his interrogator?

It turned out the Putin remained as calm as the Buddha.

I guess it’s hard having the same impact when you can’t ask any follow-up questions, the person being questioned has no fear of perjuring himself, and he enjoys the popular support of a 71% approval rating.

The Moscow Times reports:

Most of the more than 2.5 million questions that were sent via telephone, web and text message concerned social policy, housing and infrastructure. But most of the show was occupied by questions about the ongoing crisis in eastern Ukraine and Russia’s recent annexation of Crimea.

Since Snowden’s question was among the 81 questions that made the cut, it’s safe to say that Putin and his handlers recognized that it would serve their interests. In Putin’s posture of speaking “spy to spy” there was no hint of the merciless way he deals with defectors.

The investigative journalist Andrei Soldatov, welcomed Snowden’s appearance:


Whether a debate of any consequence in Russia ensues, remains to be seen:


And while Snowden might want to applaud his own challenge to Putin, Soldatov reminded the American of an invitation he has yet to accept:


Speaking to the Washington Post, Soldatov explained why Putin’s denials on mass surveillance don’t stand up to scrutiny.

In fact, Soldatov says, Russia even has its own version of PRISM, the clandestine mass electronic surveillance program that Snowden uncovered. It’s called SORM, and has been around since 1995. During Putin’s 14 years in Russian leadership, the scope of SORM has been expanded numerous times.

Soldatov argues that there were three key points made by Putin, each of which was a half-truth or a lie. First, Soldatov says, Putin argued that the FSB, the successor agency to the Soviet era’s KGB, needs to get a warrant from a court before surveillance can begin. This is true in theory, Soldatov admits, but in practice the warrants are not required to be shown: Telecoms agencies and Internet providers do not have the necessary security clearance to view the warrants, in any case.

Secondly, Putin seemed to suggest that the Russian legislature, the Duma, has oversight over the FSB. This is not true, Soldatov says, arguing that while the State Duma does have a Special Committee for Security, it has no actual oversight for secret services.

Finally, Putin argued that Russia doesn’t have the “hardware and money the United States has.” Soldatov says this is “not entirely correct.” The biggest limitation on FSB’s spying is that Russian communication systems – for example, the social network VKontakte – are rarely used abroad, unlike U.S. systems (for example, Google and Facebook). This gives the U.S. a clear advantage in international surveillance, but it is mostly irrelevant for the discussion of domestic mass surveillance, Soldatov argues.

Facebooktwittermail