Posts Tagged ‘NSA’

NSA Whistleblower Thomas Drake speaks at National Press Club

July 7, 2013

Edward Snowden is not the only NSA whistleblower. Another is Thomas Drake.

Glenn Greenwald Speaks Out

July 3, 2013

Glenn Greenwald on journalism, Ed Snowden and US mass surveillance.

Edward Snowden: A cat and mouse game

June 23, 2013
Edward Snowden charged with spying

Edward Snowden charged with spying

Edward Snowden Hong Kong statement

Edward Snowden Hong Kong statement

If Bradley Manning had not been so abused by the US authorities, one’s concern for the fate of Snowden might not be so considerable. — Jon Snow

I think this really illustrates how vindictive this president is and how much acrimony he has towards any kind of transparency. — Glenn Greenwald

A game of cat and mouse is being played out.

The US authorities have charged Edward Snowden with spying.

Spying implies working for a foreign agent or passing information to a foreign agent.

The charges against Snowden represent the seventh instance under the Obama presidency that the Espionage Act of 1917 has been used. During all previous American presidencies, the law has been used in a total of three instances to bring charges.

Edward Snowden has done neither. Edward Snowden has exposed a massive illegal surveillance operated by the state.

We should be applauding Edward Snowden, we should be throwing a party for him.

Secret courts have determined what is legal, what is not legal. Justice has to be seen to be done, only police states have secret courts.

It is claimed numerous terror plots have been stalled. But the evidence would appear to show the opposite. It is always easy to claim something that cannot easily be verified.

Did mass surveillance stop female students being massacred on a bus? Did it stop climbers being shot dead in cold blood?

After hacking their computers and phones, US demands cooperation from countries who may just choose to aid Edward Snowden.

Is is unbelievable, US threatened China, if Hong Kong did not hand over Edward Snowden.

US has been bullying Hong Kong to hand over Edward Snowden, but they are too late, he has fled to Moscow.

Two cars of the embassy of Ecuador in Moscow are parked outside the terminal where Edward Snowden, the former contractor for the U.S. National Security Agency, is believed to have landed in Moscow's Sheremetyevo airport, June 23, 2013.(Reuters / Maxim Shemetov)

Two cars of the embassy of Ecuador in Moscow are parked outside the terminal where Edward Snowden, the former contractor for the U.S. National Security Agency, is believed to have landed in Moscow’s Sheremetyevo airport, June 23, 2013.(Reuters / Maxim Shemetov)

He may then travel on to Ecuador, as according to a their foreign minister, he has applied for political assylum in that country.

Does this mean we all have to cultivate friends in Russia, just in case we are obliged to flee?

Now US is warning Russia, if the do not hand over Edward Snowden.

Do I get the impression the bully on the block has got a bit too big for its boots, and having not got its way, is now throwing a tantrum?

Thank God we have Wikileaks!

The petition in support of Edward Snowden has now passed 100,000 signatures!

And who is the state spying on? Activists who campaigned against McDonald’s, the family of murdered teenager Stephen Lawrence.

Those who grew up in the Cold War, did so under a constant barrage of propaganda that everything the other side of the Iron Curtain was bad, that all they did was spy on their own citizens, anyone who spoke out was sent to Gulag.

Are we not now finding that the West was no different? Nineteen Eighty-Four writ large, not only is Big Brother watching our every move, but there are three power blocs, anyone who is an enemy of Big Brother is an enemy of the people and must be eliminated, a world where we are at constant war, a world of privileges for the few, poverty for the masses.

What is utterly incomprehensible, there are hacks (it would elevate their status to call them journalists) like David Gregory who are calling for the prosecution of journalists like Glenn Greenwald for doing their job, holding those in power to account. I assume David Gregory wishes US to be like Turkey or Zimbabwe. Obviously he has not read the US Constitution that guarantees a free press press. No society can be free without a free press, and that means free of corporate control, not just state control.

In the NSA we trust: The trouble with faith in an omniscient state

June 17, 2013

Too many Americans think of their nation as inherently Christian and worthy of absolute trust, but the state is not benign

NSA surveillance

NSA surveillance

It’s nothing new, this fear that there is someone out there watching my every move, knowing my inmost thoughts. It used to be a fear of God. Now it’s a fear of Google, the NSA and GCHQ. In other words, we have invented a secular form of omniscience. For the sake of argument let us bracket out the question of whether this God actually exists. For present purposes, I am interested in how human beings have historically reacted to the prospect of there being some powerful agent/agency who knows everything about us. Thousands of years ago, the psalmist had it thus:

“O Lord, you have searched me and known me. You know when I sit down and when I rise up; you discern my thoughts from far away. You search out my path and my lying down, and are acquainted with all my ways. Even before a word is on my tongue, O Lord, you know it completely. You hem me in, behind and before, and lay your hand upon me. Such knowledge is too wonderful for me; it is so high that I cannot attain it. Where can I go from your spirit? Or where can I flee from your presence? If I ascend to heaven, you are there; if I make my bed in Sheol, you are there.” (Psalm 139 vv. 1-8)

But, the psalmist concludes, if we having nothing to hide, why worry? “Search me, O God, and know my heart; test me and know my thoughts. See if there is any wicked way in me, and lead me in the way everlasting.” This is not dissimilar to Barack Obama’s line that in the trade-off between security and privacy, we ought to trust the listening spooks not to misuse information they gather about us, that they are working in our best interests. But, whatever one thinks of (let’s call it) the God idea, the big difference between God almighty and the secular almighty, is that the former is supposed to be benign, indeed the very epitome of love itself, whereas I don’t think it entirely uncontroversial to say that the NSA is not.

The problem is, however, that too many Americans think of their nation as inherently Christian, as set apart by God. For all their supposed separation of church and state, and for all their supposed suspicion of big government, in the end a significant proportion of Americans believe in America in the same way that they believe in God. They over-identify the Christian “we” with the American “we” – as Stanley Hauerwas puts it. In 1956, the USA replaced its unofficial motto, E pluribus unum (Out of the many, one), with an official motto, “In God we Trust”.

Thus the state not so subtly claims for itself the same level of trust that Christians have in the almighty – thereby answering the initial fear that the psalmist has about absolute surveillance with the reassurance that the powers that be are benign and have our ultimate interests at heart. Nothing could be more dangerous than this, that the state deserves absolute trust. Which is why it is worth stating and restating the theologically obvious: the NSA is not God – however much it might aspire to the absolute power of omniscience.

— Giles Fraser

Published in The Guardian.

We may trust God to watch over us. We should never trust the state.

PRISM part of a much larger government surveillance program

June 16, 2013

Companies have been handling requests from the FBI for years, under a program called US-98XN

 National Security Agency building at Fort Meade

National Security Agency building at Fort Meade

WASHINGTON (AP) — In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it “Hoovering” — not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet’s backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.

The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president’s daily briefing. Prism makes sense of the cacophony of the Internet’s raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.

Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism’s success.

The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.

The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

___

Deep in the oceans, hundreds of cables carry much of the world’s phone and Internet traffic. Since at least the early 1970s, the NSA has been tapping foreign cables. It doesn’t need permission. That’s its job.

But Internet data doesn’t care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from spying on Americans or anyone inside the United States. That’s the FBI’s job and it requires a warrant.

Despite that prohibition, shortly after the Sept. 11 attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans’ private conversations.

Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light.

“You have to assume everything is being collected,” said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.

The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a spot where fiber optic cables enter the U.S.

What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.

Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.

The Bush administration called it the “Terrorist Surveillance Program” and said it was keeping the United States safe.

“This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of saving lives and breaking up plots directed at the United States,” Vice President Dick Cheney said at the time.

The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer.

That means Americans’ personal emails can live in government computers, but analysts can’t access, read or listen to them unless the emails become relevant to a national security investigation.

The government doesn’t automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now.

What’s unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.

The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required.

Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.

“This administration also puts forward a false choice between the liberties we cherish and the security we provide,” Obama said in a speech two days before that vote. “I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom.”

___

When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.

One expert in national security law, who is directly familiar with how Internet companies dealt with the government during that period, recalls conversations in which technology officials worried aloud that the government would trample on Americans’ constitutional right against unlawful searches, and that the companies would be called on to help.

The logistics were about to get daunting, too.

For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn’t know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN.

It was known as Prism. Though many details are still unknown, it worked like this:

Every year, the attorney general and the director of national intelligence spell out in a classified document how the government plans to gather intelligence on foreigners overseas.

By law, the certification can be broad. The government isn’t required to identify specific targets or places.

A federal judge, in a secret order, approves the plan.

With that, the government can issue “directives” to Internet companies to turn over information.

While the court provides the government with broad authority to seize records, the directives themselves typically are specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of targets. Other company officials recall similar experiences.

All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents were first released.

“We only ever comply with orders for requests about specific accounts or identifiers,” Microsoft said in a statement.

Facebook said it received between 9,000 and 10,000 demands requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.

How many of those were related to national security is unclear, and likely classified. The numbers suggest each request typically related to one or two people, not a vast range of users.

Tech company officials were unaware there was a program named Prism. Even former law enforcement and counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past week that they didn’t know what it was called.

What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the “Hoovering” from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The government wanted the data in a structured, consistent format that was easy to search.

Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.

“They do this every two to three years,” said Janke, who said government agents have approached his company but left empty-handed because his computer servers store little information. “They ask for the moon.”

That often creates tension between the government and a technology industry with a reputation for having a civil libertarian bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified ruling in 2008, The New York Times reported Friday.

“The notion that Yahoo gives any federal agency vast or unfettered access to our users’ records is categorically false,” Ron Bell, the company’s general counsel, said recently.

Under Prism, the delivery process varied by company.

Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have set up user interfaces making it easier for the government, according to a security expert familiar with the process.

Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data “directly from the servers” of Microsoft, Yahoo, Google, Facebook, AOL and more.

Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism’s neatly organized, company-provided data from the unstructured information snatched out of the Internet’s major pipelines.

In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables.

Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.

With Prism, the government gets a user’s entire email inbox. Every email, including contacts with American citizens, becomes government property.

Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.

That’s one example of how emails belonging to Americans can become swept up in the hunt.

In that way, Prism helps justify specific, potentially personal searches. But it’s the broader operation on the Internet fiber optics cables that actually captures the data, experts agree.

“I’m much more frightened and concerned about real-time monitoring on the Internet backbone,” said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. “I cannot think of anything, outside of a face-to-face conversation, that they could not have access to.”

One unanswered question, according to a former technology executive at one of the companies involved, is whether the government can use the data from Prism to work backward.

For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if Prism provided general details, known as metadata, about when a user began chatting, could the government “rewind” its copy of the global Internet stream, find the conversation and replay it in full?

That would take enormous computing, storage and code-breaking power. It’s possible the NSA could use supercomputers to decrypt some transmissions, but it’s unlikely it would have the ability to do that in volume. In other words, it would help to know what messages to zero in on.

Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.

___

A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to.

Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.

“I came in with a healthy skepticism about these programs,” Obama explained recently. “My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards.”

Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.

“You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience,” the president said.

Obama’s administration, echoing his predecessor’s, credited the surveillance with disrupting several terrorist attacks. Leading figures from the Bush administration who endured criticism during Obama’s candidacy have applauded the president for keeping the surveillance intact.

Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said it’s no surprise Obama continued the eavesdropping.

“You can’t expect a president to not use a legal tool that Congress has given him to protect the country,” he said. “So, Congress has given him the tool. The president’s using it. And the courts are saying ‘The way you’re using it is OK.’ That’s checks and balances at work.”

Schneier, the author and security expert, said it doesn’t really matter how Prism works, technically. Just assume the government collects everything, he said.

He said it doesn’t matter what the government and the companies say, either. It’s spycraft, after all.

“Everyone is playing word games,” he said. “No one is telling the truth.”

___

Associated Press writers Eileen Sullivan, Peter Svensonn, Adam Goldman, Michael Liedtke and Monika Mathur contributed to this report.

Associated Press report published by Salon.

Leaks Are Vital For Democracy and the NSA Revelations Are the Quintessential Example Why

June 14, 2013

When looking back at the past decade, it’s hard to think of a constitutional scandal that wasn’t first brought to the public’s attention by a leak to the press. Bush’s NSA warrantless wiretapping program, black site prisons, torture, CIA drone strikes, and offensive cyberattacks are just some of the examples.

Leaks, while controversial, remain vital to democracy when the government shuts off traditional avenues of transparency and accountability. And there has never been a better example of this than the recent revelations by NSA whistleblower Edward Snowden.

Unfortunately, many lawmakers have spent the last week criticizing Snowden’s actions rather than scrutinizing the programs he’s exposed and the system that led him to do what he did. In the past five years, the government has systematically cut off congressional oversight, Freedom of Information Act requests, and the federal courts as avenues to hold the NSA accountable. Similarly, whistleblower protection laws have provided no protection those like Snowden who might wish to bring abuses to light.

In Congress, the intelligence committees have teamed up with the Obama administration and rejected even modest transparency and oversight amendments to both the Patriot Act and FISA Amendments Act in the last two years, despite ample evidence of abuse.

In federal courts, the Justice Department has used a variety of procedural moves to prevent judges from ruling on whether the NSA warrantless wiretapping program is constitutional – including ‘standing,’ ‘sovereign immunity,’ and the pernicious ‘state secrets’ privilege.

Freedom of Information Act lawsuits about the secret Patriot Act interpretations (exposed by the Verizon court order) and secret FISA court decisions have been met with absurd and Kafkaesque arguments to prevent even the administration’s interpretation of a public law from being made public.

And importantly, Congress recently passed the Whistleblower Protection Act and purposely excluded government contractors like Snowden (of which there are more than a million). So if he went through official channels he would have been provided no protection, unlike what some misguided commentators have suggested. Snowden would’ve been stifled, fired, or worse.

These efforts, taken altogether, have meant these programs have stayed largely secret and out of the public eye for the last five years. But look at what has happened in just one last week since journalists Glenn Greenwald, Laura Poitras, and others, started publishing stories based on information given to them by Snowden:

–Senators confirmed the leaked Verizon FISA order is real, orders like it are “routine,” and that the NSA has been collected all American phone records for seven years —information the administration has fought to keep secret for since 2010.

–President Obama suddenly called for debate over the surveillance program, despite trying to cut off debate on the subject for years.

–Dozens of Congressmen said they did not know the full scope of the NSA’s domestic surveillance, despite the administration’s public claims that every member of Congress has been read in.

–In response to PRISM leak, DNI Clapper declassified portions of the program and explains how it relates to broad collection of data under section 702 of the FISA Amendments Act—which they’ve avoided for years.

–Both Google and Facebook publicly demanded that the government allow them to tell the public how many users are affected by secret FISA orders—something they should have done years ago.

–ACLU filed a lawsuit alleging the government collection of all American phone records under PATRIOT Act is unconstitutional, after having their prior suit over the FISA Amendments Act dismissed just moths ago for lack of evidence.

–Possible Congressional hearings about whether Director of National Intelligence James Clapper lied to Congress when he definitively told Congress the NSA was not gathering data on millions of Americans.

— A group of eight Senators introduced a law requiring the FISA court declassifying some of its secret interpretations of law.

–Key lawmakers signaled their wish review the scope of the PATRIOT Act, including its author, despite renewing key sections with no oversight only two years ago.

–Many lawmakers plan to introduce a variety of legislation, and many groups plan to file lawsuits, regarding NSA spying in the coming days and weeks.

Now, those who wish to use the new revelations to instill permanent structural changes have a long way to go before the government gets there. And it’s possible the American people will simply choose to continue these programs, despite their Orwellian undertones. But the fact that this debate is finally happening, and that the Americans will—for the first time—be informed about what the government is doing in their name, cannot be understated.

Without Edward Snowden, none of this would be possible.

— Trevor Timm

Published by Freedom of the Press Foundation.

Sales of Nineteen Eighty-Four soar

June 13, 2013

One of the consequences of the expose by Edward Snowden of the NSA PRISM mass surveillance programme is that sales of Nineteen Eighty-Four by George Orwell have soared.

What we have seen is Big Brother writ large.

Published in 1949, Nineteen Eighty-Four is a chilling account of the future, where everything we do is monitored by Big Brother. Nothing we do escapes the attention of Big Brother, and if we err and incur the displeasure, we will be exposed and destroyed.

Revelation of PRISM has caused a huge backlash in the US, but this is nothing compared with the outrage across Europe.

There has also been some brutal attacks, calling Edward Snowden a traitor and worse. One rabid politician practically foaming at the mouth has called for all journalists associated with Edward Snowden to be prosecuted.

But these are the exceptions.

There are calls for hearings, investigations, for James Clapper National Director Intelligence to be prosecuted, questions are being asked how did PRISM come about.

DNI James Clapper appears to have lied to Congress in previous testimony, hence the calls for him to be prosecuted, and if he lied about PRISM, what else did he lie about?

Back at an open Congressional hearing on 12 March, Sen Ron Wyden (D-Ore.) asked Clapper, “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” Clapper replied, “No sir … not wittingly.” As we all now know, he was lying.

Nor was this a spontaneous lie or a lie he regretted making. Sen Ron Wyden revealed in a recent statement that he’d given Clapper advance notice that he would ask the question and that, after the hearing, he offered Clapper a chance to revise his answer. Clapper didn’t take the offer.

Speaking once PRISM was exposed, James Clapper comes across as a bumbling buffoon, a complete moron. How did this idiot ever get appointed as Director of National Intelligence?

One of the biggest lies peddled by Clapper is that mass surveillance deals with terrorism.

One of the least threats facing us is terrorism, but it is used a bogey man to clamp down on civil liberties, to infiltrate and disrupt democratic challenges to the status quo. We deal with terrorism, by addressing the causes. We track down terrorists, use good old fashioned police work. Maybe US should look to its drone attacks.

Edward Snowden: US government has been hacking Hong Kong and China for years

June 12, 2013

Former CIA operative makes more explosive claims and says Washington is ‘bullying’ Hong Kong to extradite him

Edward Snowden in Hong Kong

Edward Snowden in Hong Kong

US whistle-blower Edward Snowden yesterday emerged from hiding in Hong Kong and revealed to the South China Morning Post that he will stay in the city to fight likely attempts by his government to have him extradited for leaking state secrets.

In an exclusive interview carried out from a secret location in the city, the former Central Intelligence Agency analyst also made explosive claims that the US government had been hacking into computers in Hong Kong and on the mainland for years.

At Snowden’s request we cannot divulge details about how the interview was conducted.

A week since revelations that the US has been secretly collecting phone and online data of its citizens, he said he will stay in the city “until I am asked to leave”, adding: “I have had many opportunities to flee HK, but I would rather stay and fight the US government in the courts, because I have faith in HK’s rule of law.”

In a frank hour-long interview, the 29-year-old, who US authorities have confirmed is now the subject of a criminal case, said he was neither a hero nor a traitor and that:

He is in constant fear for his own safety and that of his family.

Snowden has been in Hong Kong since May 20 when he fled his home in Hawaii to take refuge here, a move which has been questioned by many who believe the city cannot protect him.

“People who think I made a mistake in picking HK as a location misunderstand my intentions. I am not here to hide from justice, I am here to reveal criminality,” he said.

Snowden said that according to unverified documents seen by the Post, the NSA had been hacking computers in Hong Kong and on the mainland since 2009. None of the documents revealed any information about Chinese military systems, he said.

One of the targets in the SAR, according to Snowden, was Chinese University and public officials, businesses and students in the city. The documents also point to hacking activity by the NSA against mainland targets.

Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland.

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.

Target: The Chinese University of Hong Kong

Target: The Chinese University of Hong Kong

“Last week the American government happily operated in the shadows with no respect for the consent of the governed, but no longer. Every level of society is demanding accountability and oversight.”

Snowden said he was releasing the information to demonstrate “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries”.

“Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public.”

Since the shocking revelations a week ago, Snowden has been vilified as a defector but also hailed by supporters such as WikiLeaks’ Julian Assange.

“I’m neither traitor nor hero. I’m an American,” he said, adding that he was proud to be an American. “I believe in freedom of expression. I acted in good faith but it is only right that the public form its own opinion.”

Snowden said he had not contacted his family and feared for their safety as well as his own.

“I will never feel safe.

“Things are very difficult for me in all terms, but speaking truth to power is never without risk,” he said. “It has been difficult, but I have been glad to see the global public speak out against these sorts of systemic violations of privacy.

“All I can do is rely on my training and hope that world governments will refuse to be bullied by the United States into persecuting people seeking political refuge.”

Asked if he had been offered asylum by the Russian government, he said: “My only comment is that I am glad there are governments that refuse to be intimidated by great power”.

The interview comes on the same day NSA chief General Keith Alexander appeared before Congress to defend his agency over the leaks. It was his first appearance since the explosive revelations were made last week. Alexander’s prepared remarks did not specifically address revelations about the Prism program.

Snowden’s revelations threaten to test new attempts to build US-Sino bridges after a weekend summit in California between the nations’ presidents, Barack Obama and Xi Jinping.

If true, Snowden’s allegations lend credence to China’s longstanding position that it is as much a victim of hacking as a perpetrator, after Obama pressed Xi to rein in cyber-espionage by the Chinese military.

Tens of thousands of Snowden’s supporters have signed a petition calling for his pardon in the United States while many have donated money to a fund to help him.

“I’m very grateful for the support of the public,” he said. “But I ask that they act in their interest – save their money for letters to the government that breaks the law and claims it noble.

“The reality is that I have acted at great personal risk to help the public of the world, regardless of whether that public is American, European, or Asian.”

The US consulate in Hong Kong could not be contacted yesterday on a public holiday.

Published in the South China Morning Post.

A crackpot US politician has called for the prosecution of Glenn Greenwald, the journalist who broke the story. Clearly the US Constitution guaranteeing Freedom of the Press counts for nothing with a lying rabid Republican foaming at the mouth.

Edward Snowden has taken huge risks to expose the NSA PRISM mass surveillance programme. The world owes this courageous whistleblower a huge debt of gratitude. Please show your solidarity with Edward Snowden by signing the Avaaz petition of support.

Ai Weiwei says U.S. surveillance reminds him of China

June 12, 2013
Chinese activist Ai Weiwei

Chinese activist Ai Weiwei

Chinese activist Ai Weiwei has had his share of experience with heavy-handed treatment by the government, having been detained for 81 days by China’s secret police in 2011. Now the Beijing-based artist says another country reminds him of China: the United States.

In a column in The Guardian this morning, Ai harshly criticizes the U.S. government for the NSA’s PRISM Internet surveillance program — a program The Guardian has been at the forefront of reporting on over the past week.

“Privacy is a basic human right, one of the very core values,” Ai writes. “There is no guarantee that China, the US or any other government will not use the information falsely or wrongly. I think especially that a nation like the US, which is technically advanced, should not take advantage of its power. It encourages other nations.”

In another comparison that Americans are unlikely to appreciate, Ai adds, “In the Soviet Union before, in China today, and even in the US, officials always think what they do is necessary, and firmly believe they do what is best for the state and the people. But the lesson that people should learn from history is the need to limit state power.”

Praise for Edward Snowden, the leaker behind the PRISM story who was last seen in Hong Kong, has been widespread in China.

“This is the definition of heroism,” wrote one Chinese blogger. “Doing this proves he genuinely cares about this country and about his country’s citizens. All countries need someone like him!”

“This young fellow truly is a human rights warrior!” declared the well-known nationalist writer Wang Xiaodong. “He has now fled to Chinese territory, and must be protected. We must withstand U.S. pressure, and make a contribution to world human rights!”

Ai doesn’t mention Snowden explicitly in his column, but the Chinese dissident may very well feel the same way.

Published by WP Social Reader.

Obama v Obama

June 11, 2013

Obama debates with Obama, the merits or ills of mass surveillance.

Which Obama was right?

As the old adage says, power corrupts, absolute power corrupts absolutely.