{"id":37870,"date":"2013-12-30T12:00:30","date_gmt":"2013-12-30T12:00:30","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=37870"},"modified":"2015-05-05T22:20:09","modified_gmt":"2015-05-05T21:20:09","slug":"edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/12\/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished\/","title":{"rendered":"Edward Snowden, after Months of NSA Revelations, Says His Mission\u2019s Accomplished"},"content":{"rendered":"<div id=\"attachment_37871\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/12\/snowden.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-37871\" class=\"size-medium wp-image-37871\" alt=\"New photos of Edward Snowden:\u2009The former NSA contractor\u2019s leaks have altered the U.S. government\u2019s relationship with its citizens and the rest of the world. Six months later, he reflects.\" src=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/12\/snowden-300x199.jpg\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/12\/snowden-300x199.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/12\/snowden.jpg 606w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-37871\" class=\"wp-caption-text\">New photos of Edward Snowden:\u2009The former NSA contractor\u2019s leaks have altered the U.S. government\u2019s relationship with its citizens and the rest of the world. Six months later, he reflects.<\/p><\/div>\n<p><em>24 Dec 2013<\/em> &#8211; The familiar voice on the hotel room phone did not waste words.<\/p>\n<p>\u201cWhat time does your clock say, exactly?\u201d he asked.<\/p>\n<p>He checked the reply against his watch and described a place to meet.<\/p>\n<p>\u201cI\u2019ll see you there,\u201d he said.<\/p>\n<p>Edward Joseph Snowden emerged at the appointed hour, alone, blending into a light crowd of locals and tourists. He cocked his arm for a handshake, then turned his shoulder to indicate a path. Before long he had guided his visitor to a secure space out of public view.<\/p>\n<p>During more than 14 hours of interviews, the first he has conducted in person since <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/snowden-departs-hong-kong-for-a-third-country-government-says\/2013\/06\/23\/08e9eff2-dbde-11e2-a9f2-42ee3912ae0e_story.html\" >arriving here in June<\/a>, Snowden did not part the curtains or step outside. Russia <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/europe\/snowden-leaves-moscow-airport-to-live-in-russia\/2013\/08\/01\/2f2d1aba-faa9-11e2-a369-d1954abcb7e3_story.html?tid=ts_carousel\" >granted him temporary asylum<\/a> on Aug.\u00a01, but Snowden remains a target of surpassing interest to the intelligence services whose secrets he spilled on an epic scale.<\/p>\n<p>Late this spring, Snowden supplied three journalists, <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knew-risks\/2013\/06\/09\/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story.html\" >including this one<\/a>, with caches of top-secret documents from the National Security Agency, where he worked as a contractor. Dozens of revelations followed, and then hundreds, as news organizations around the world picked up the story. Congress pressed for explanations, new evidence revived old lawsuits and the Obama administration was obliged to declassify thousands of pages it had fought for years to conceal.<\/p>\n<p>Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. One of the leaked presentation slides described the agency\u2019s \u201ccollection philosophy\u201d as \u201cOrder one of everything off the menu.\u201d<\/p>\n<p>Six months after the first revelations appeared in The Washington Post and Britain\u2019s Guardian newspaper, Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation, fueled by burgers, pasta, ice cream and Russian pastry.<\/p>\n<p>Snowden offered vignettes from his intelligence career and from his recent life as \u201can indoor cat\u201d in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed.<\/p>\n<p>\u201cFor me, in terms of personal satisfaction, the mission\u2019s already accomplished,\u201d he said. \u201cI already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn\u2019t want to change society. I wanted to give society a chance to determine if it should change itself.\u201d<\/p>\n<p>\u201cAll I wanted was for the public to be able to have a say in how they are governed,\u201d he said. \u201cThat is a milestone we left a long time ago. Right now, all we are looking at are stretch goals.\u201d<\/p>\n<p><b>\u2018Going in blind\u2019<\/b><\/p>\n<p>Snowden is an orderly thinker, with an engineer\u2019s approach to problem-solving. He had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a \u201cgraveyard of judgment,\u201d he said, manipulated by the agency it was supposed to keep in check. Classification rules erected walls to prevent public debate.<\/p>\n<p>Toppling those walls would be a spectacular act of transgression against the norms that prevailed inside them. Someone would have to bypass security, extract the secrets, make undetected contact with journalists and provide them with enough proof to tell the stories.<\/p>\n<p>The NSA\u2019s business is \u201cinformation dominance,\u201d the use of other people\u2019s secrets to shape events. At 29, Snowden upended the agency on its own turf.<\/p>\n<p>\u201cYou recognize that you\u2019re going in blind, that there\u2019s no model,\u201d Snowden said, acknowledging that he had no way to know whether the public would share his views.<\/p>\n<p>\u201cBut when you weigh that against the alternative, which is not to act,\u201d he said, \u201cyou realize that some analysis is better than no analysis. Because even if your analysis proves to be wrong, the marketplace of ideas will bear that out. If you look at it from an engineering perspective, an iterative perspective, it\u2019s clear that you have to try something rather than do nothing.\u201d<\/p>\n<p>By his own terms, Snowden succeeded beyond plausible ambition. The NSA, accustomed to watching without being watched, faces scrutiny it has not endured since the 1970s, or perhaps ever.<\/p>\n<p>The cascading effects have made themselves felt in Congress, the courts, popular culture, Silicon Valley and world capitals. The basic structure of the Internet itself is now in question, as Brazil and members of the European Union <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/europe\/germany-looks-at-keeping-its-internet-e-mail-traffic-inside-its-borders\/2013\/10\/31\/981104fe-424f-11e3-a751-f032898f2dbc_story.html\" >consider measures to keep their data away from U.S. territory<\/a> and U.S. technology giants including Google, Microsoft and Yahoo take<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/microsoft-to-encrypt-data-in-its-services-in-bid-to-prevent-snooping\/2013\/12\/04\/f91f7b02-5d2c-11e3-bc56-c6ca94801fac_story.html\" > extraordinary steps<\/a> to block the collection of data by their government.<\/p>\n<p>For months, Obama administration officials attacked Snowden\u2019s motives and said the work of the NSA was distorted by selective leaks and misinterpretations.<\/p>\n<p>On Dec. 16, in a lawsuit that could not have gone forward without the disclosures made possible by Snowden, U.S. District Judge Richard J. Leon described the NSA\u2019s capabilities as \u201c<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/national\/judge-nsas-collecting-of-phone-records-is-likely-unconstitutional\/2013\/12\/16\/6e098eda-6688-11e3-a0b9-249bbb34602c_story.html\" >almost Orwellian<\/a>\u201d and said its bulk collection of U.S. domestic telephone records was probably unconstitutional.<\/p>\n<p>The next day, in the Roosevelt Room, an unusual delegation of executives from old telephone companies and young Internet firms told President Obama that the NSA\u2019s intrusion into their networks was a threat to the U.S. information economy. The following day, an advisory panel appointed by Obama <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-shouldnt-keep-phone-database-review-board-recommends\/2013\/12\/18\/f44fe7c0-67fd-11e3-a0b9-249bbb34602c_story.html\" >recommended substantial new restrictions on the NSA<\/a>, including an end to the domestic call-records program.<\/p>\n<p>\u201cThis week is a turning point,\u201d said the Government Accountability Project\u2019s Jesselyn Radack, who is one of Snowden\u2019s legal advisers. \u201cIt has been just a cascade.\u201d<\/p>\n<p><b>\u2018They elected me\u2019<\/b><\/p>\n<p>On June 22, the Justice Department unsealed a <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/us-charges-snowden-with-espionage\/2013\/06\/21\/507497d8-dab1-11e2-a016-92547bf094cc_story.html\" >criminal complaint charging Snowden <\/a>with espionage and felony theft of government property. It was a dry enumeration of statutes, without a trace of the anger pulsing through Snowden\u2019s former precincts.<\/p>\n<p>In the intelligence and national security establishments, Snowden is widely viewed as a reckless saboteur, and journalists abetting him little less so.<\/p>\n<p>At the Aspen Security Forum in July, a four-star military officer known for his even keel seethed through one meeting alongside a reporter he knew to be in contact with Snowden. Before walking away, he turned and pointed a finger.<\/p>\n<p>\u201cWe didn\u2019t have another 9\/11,\u201d he said angrily, because intelligence enabled warfighters to find the enemy first. \u201cUntil you\u2019ve got to pull the trigger, until you\u2019ve had to bury your people, you don\u2019t have a clue.\u201d<\/p>\n<p>It is commonly said of Snowden that he broke an oath of secrecy, a turn of phrase that captures a sense of betrayal. NSA Director Keith B. Alexander and Director of National Intelligence James R. Clapper Jr., among many others, have used that formula.<\/p>\n<p>In his interview with The Post, Snowden noted matter-of-factly that Standard Form 312, the \u00adclassified-information nondisclosure agreement, is a civil contract. He signed it, but he pledged his fealty elsewhere.<\/p>\n<p>\u201cThe oath of allegiance is not an oath of secrecy,\u201d he said. \u201cThat is an oath to the Constitution. That is the oath that I kept that Keith Alexander and James Clapper did not.\u201d<\/p>\n<p>People who accuse him of disloyalty, he said, mistake his purpose.<\/p>\n<p>\u201cI am not trying to bring down the NSA, I am working to improve the NSA,\u201d he said. \u201cI am still working for the NSA right now. They are the only ones who don\u2019t realize it.\u201d<\/p>\n<p>What entitled Snowden, now 30, to take on that responsibility?<\/p>\n<p>\u201cThat whole question \u2014 who elected you? \u2014 inverts the model,\u201d he said. \u201cThey elected me. The overseers.\u201d<\/p>\n<p>He named the chairmen of the Senate and House intelligence committees.<\/p>\n<p>\u201c<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/politics\/dianne-feinstein-d-calif\/gIQAnrCyDP_topic.html\" >Dianne Feinstein<\/a> elected me when she asked softball questions\u201d in committee hearings, he said. \u201c<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/politics\/michael-j-rogers-r-mich\/gIQAF6liAP_topic.html\" >Mike Rogers<\/a> elected me when he kept these programs hidden. .\u2009.\u2009. The FISA court elected me when they decided to legislate from the bench on things that were far beyond the mandate of what that court was ever intended to do. The system failed comprehensively, and each level of oversight, each level of responsibility that should have addressed this, abdicated their responsibility.\u201d<\/p>\n<p>\u201cIt wasn\u2019t that they put it on me as an individual \u2014 that I\u2019m uniquely qualified, an angel descending from the heavens \u2014 as that they put it on someone, somewhere,\u201d he said. \u201cYou have the capability, and you realize every other [person] sitting around the table has the same capability but they don\u2019t do it. So somebody has to be the first.\u201d<\/p>\n<p><b>\u2018Front-page test\u2019<\/b><\/p>\n<p>Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people \u2014 deliberately, in the case of bulk records collection, and \u201cincidentally,\u201d when the content of American phone calls and e-mails are swept into NSA systems along with foreign targets.<\/p>\n<p>But Snowden also said acceptance of the agency\u2019s operations was not universal. He began to test that proposition more than a year ago, he said, in periodic conversations with co-workers and superiors that foreshadowed his emerging plan.<\/p>\n<p>Beginning in October 2012, he said, he brought his misgivings to two superiors in the NSA\u2019s Technology Directorate and two more in the NSA Threat Operations Center\u2019s regional base in Hawaii. For each of them, and 15 other co-workers, Snowden said he opened a data query tool called BOUNDLESSINFORMANT, which used color-coded \u201cheat maps\u201d to depict the volume of data ingested by NSA taps.<\/p>\n<p>His colleagues were often \u201castonished to learn we are collecting more in the United States on Americans than we are on Russians in Russia,\u201d he said. Many of them were troubled, he said, and several said they did not want to know any more.<\/p>\n<p>\u201cI asked these people, \u2018What do you think the public would do if this was on the front page?\u2019\u200a\u201d he said. He noted that critics have accused him of bypassing internal channels of dissent. \u201cHow is that not reporting it? How is that not raising it?\u201d he said.<\/p>\n<p>By last December, Snowden was contacting reporters, although he had not yet passed along any classified information. He continued to give his colleagues the \u201cfront-page test,\u201d he said, until April.<\/p>\n<p>Asked about those conversations, NSA spokeswoman Vanee Vines sent a prepared statement to The Post: \u201cAfter extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden\u2019s contention that he brought these matters to anyone\u2019s attention.\u201d<\/p>\n<p>Snowden recounted another set of conversations that he said took place three years earlier, when he was sent by the NSA\u2019s Technology Directorate to support operations at a listening post in Japan. As a system administrator, he had full access to security and auditing controls. He said he saw serious flaws with information security.<\/p>\n<p>\u201cI actually recommended they move to two-man control for administrative access back in 2009,\u201d he said, first to his supervisor in Japan and then to the directorate\u2019s chief of operations in the Pacific. \u201cSure, a whistleblower could use these things, but so could a spy.\u201d<\/p>\n<p>That precaution, which requires a second set of credentials to perform risky operations such as copying files onto a removable drive, has been among the principal security responses to the Snowden affair.<\/p>\n<p>Vines, the NSA spokeswoman, said there was no record of those conversations, either.<\/p>\n<p><b>U.S. \u2018would cease to exist\u2019<\/b><\/p>\n<p>Just before releasing the documents this spring, Snowden made a final review of the risks. He had overcome what he described at the time as a \u201cselfish fear\u201d of the consequences for himself.<\/p>\n<p>\u201cI said to you the only fear [left] is apathy \u2014 that people won\u2019t care, that they won\u2019t want change,\u201d he recalled this month.<\/p>\n<p>The documents leaked by Snowden compelled attention because they revealed to Americans a history they did not know they had.<\/p>\n<p>Internal briefing documents reveled in the \u201cGolden Age of Electronic Surveillance.\u201d Brawny cover names such as MUSCULAR, TUMULT and TURMOIL boasted of the agency\u2019s prowess.<\/p>\n<p>With <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-paying-us-companies-for-access-to-communications-networks\/2013\/08\/29\/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html\" >assistance from private communications firms<\/a>, the NSA had learned to capture enormous flows of data at the speed of light from fiber-optic cables that carried Internet and telephone traffic over continents and under seas. According to one document in Snowden\u2019s cache, the agency\u2019s Special Source Operations group, which as early as 2006 was said to be ingesting \u201cone Library of Congress every 14.4 seconds,\u201d had an official seal that might have been parody: an eagle with all the world\u2019s cables in its grasp.<\/p>\n<p>Each year, NSA systems collected hundreds of millions of <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-collects-millions-of-e-mail-address-books-globally\/2013\/10\/14\/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html\" >e-mail address books<\/a>, hundreds of billions of cellphone <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html\" >location records<\/a> and trillions of domestic call logs.<\/p>\n<p>Most of that data, by definition and intent, belonged to ordinary people suspected of nothing. But vast new storage capacity and processing tools enabled the NSA to use the information to map human relationships on a planetary scale. Only this way, its leadership believed, could the NSA reach beyond its universe of known intelligence targets.<\/p>\n<p>In the view of the NSA, signals intelligence, or electronic eavesdropping, was a matter of life and death, \u201cwithout which America would cease to exist as we know it,\u201d <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/r\/2010-2019\/WashingtonPost\/2013\/12\/23\/National-Security\/Images\/nsa1224slide1.png\" >according to an internal presentation<\/a> in the first week of October 2001 as the agency ramped up its response to the al-Qaeda attacks on the World Trade Center and the Pentagon.<\/p>\n<p>With stakes such as those, there was no capability the NSA believed it should leave on the table. The agency followed orders from President George W. Bush to begin domestic collection without authority from Congress and the courts. When the NSA won those authorities later, some of them under secret interpretations of laws passed by Congress between 2007 and 2012, the Obama administration went further still.<\/p>\n<p>Using <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html\" >PRISM<\/a>, the cover name for collection of user data from Google, Yahoo, Microsoft, Apple and five other U.S.-based companies, the NSA could obtain all communications to or from any specified target. The companies had no choice but to comply with the government&#8217;s request for data.<\/p>\n<p>But the NSA could not use PRISM, which was overseen once a year by the surveillance court, for the collection of virtually all data handled by those companies. To widen its access, it teamed up with its British counterpart, Government Communications Headquarters, or GCHQ, to <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\" >break into the private fiber-optic links<\/a> that connected Google and Yahoo data centers around the world.<\/p>\n<p>That operation, which used the cover name MUSCULAR, tapped into U.S. company data from outside U.S. territory. The NSA, therefore, believed it did not need permission from Congress or judicial oversight. Data from hundreds of millions of U.S. accounts flowed over those Google and Yahoo links, but classified rules allowed the NSA to presume that data ingested overseas belonged to foreigners.<\/p>\n<p><b>\u2018Persistent threat\u2019<\/b><\/p>\n<p>Disclosure of the MUSCULAR project enraged and galvanized U.S. technology executives. They believed the NSA had lawful access to their front doors \u2014 and had broken down the back doors anyway.<\/p>\n<p>Microsoft general counsel Brad Smith took to his company\u2019s blog and <a href=\"http:\/\/blogs.technet.com\/b\/microsoft_blog\/archive\/2013\/12\/04\/protecting-customer-data-from-government-snooping.aspx\"  target=\"_blank\">called the NSA an \u201cadvanced persistent threat<\/a>\u201d \u2014 the worst of all fighting words in U.S. cybersecurity circles, generally reserved for Chinese state-sponsored hackers and sophisticated criminal enterprises.<\/p>\n<p>\u201cFor the industry as a whole, it caused everyone to ask whether we knew as much as we thought,\u201d Smith recalled in an interview. \u201cIt underscored the fact that while people were confident that the U.S. government was complying with U.S. laws for activity within U.S. territory, perhaps there were things going on outside the United States .\u2009.\u2009. that made this bigger and more complicated and more disconcerting than we knew.\u201d<\/p>\n<p>They wondered, he said, whether the NSA was \u201ccollecting proprietary information from the companies themselves.\u201d<\/p>\n<p>Led by Google and then Yahoo, one company after another announced expensive plans to encrypt its data traffic over tens of thousands of miles of cable. It was a direct \u2014 in some cases, explicit \u2014 blow to NSA collection of user data in bulk. If the NSA wanted the information, it would have to request it or circumvent the encryption one target at a time.<\/p>\n<p>As these projects are completed, the Internet will become a less friendly place for the NSA to work. The agency can still collect data from virtually anyone, but collecting from everyone will be harder.<\/p>\n<p>The industry\u2019s response, Smith acknowledged, was driven by a business threat. U.S. companies could not afford to be seen as candy stores for U.S. intelligence. But the principle of the thing, Smith said, \u201cis fundamentally about ensuring that customer data is turned over to governments pursuant to valid legal orders and in accordance with constitutional principles.\u201d<\/p>\n<p><b>\u2018Warheads on foreheads\u2019<\/b><\/p>\n<p>Snowden has focused on much the same point from the beginning: Individual targeting would cure most of what he believes is wrong with the NSA.<\/p>\n<p>Six months ago, a reporter asked him by encrypted e-mail why Americans would want the NSA to give up bulk data collection if that would limit a useful intelligence tool.<\/p>\n<p>\u201cI believe the cost of frank public debate about the powers of our government is less than the danger posed by allowing these powers to continue growing in secret,\u201d he replied, calling them \u201ca direct threat to democratic governance.\u201d<\/p>\n<p>In the Moscow interview, Snowden said, \u201cWhat the government wants is something they never had before,\u201d adding: \u201cThey want total awareness. The question is, is that something we should be allowing?\u201d<\/p>\n<p>Snowden likened the NSA\u2019s powers to those used by British authorities in Colonial America, when \u201cgeneral warrants\u201d allowed for anyone to be searched. The FISA court, Snowden said, \u201cis authorizing general warrants for the entire country\u2019s metadata.\u201d<\/p>\n<p>\u201cThe last time that happened, we fought a war over it,\u201d he said.<\/p>\n<p>Technology, of course, has enabled a great deal of consumer surveillance by private companies, as well. The difference with the NSA\u2019s possession of the data, Snowden said, is that government has the power to take away life or freedom.<\/p>\n<p>At the NSA, he said, \u201cthere are people in the office who joke about, \u2018We put warheads on foreheads.\u2019 Twitter doesn\u2019t put warheads on foreheads.\u201d<\/p>\n<p>Privacy, as Snowden sees it, is a universal right, applicable to American and foreign surveillance alike.<\/p>\n<p>\u201cI don\u2019t care whether you\u2019re the pope or Osama bin Laden,\u201d he said. \u201cAs long as there\u2019s an individualized, articulable, probable cause for targeting these people as legitimate foreign intelligence, that\u2019s fine. I don\u2019t think it\u2019s imposing a ridiculous burden by asking for probable cause. Because, you have to understand, when you have access to the tools the NSA does, probable cause falls out of trees.\u201d<\/p>\n<p><b>\u2018Everybody knows\u2019<\/b><\/p>\n<p>On June 29, Gilles de Kerchove, the European Union\u2019s counter\u00adterrorism coordinator, awoke to a <a href=\"http:\/\/www.spiegel.de\/international\/europe\/nsa-spied-on-european-union-offices-a-908590.html\"  target=\"_blank\">report in Der Spiegel<\/a> that U.S. intelligence had broken into E.U. offices, including his, to implant surveillance devices.<\/p>\n<p>The 56-year-old Belgian, whose work is often classified, did not consider himself naive. But he took the news personally, and more so when he heard unofficial explanations from Washington.<\/p>\n<p>\u201c\u200a\u2018Everybody knows. Everybody does\u2019 \u2014 Keith Alexander said that,\u201d de Kerchove said in an interview. \u201cI don\u2019t like the idea that the NSA will put bugs in my office. No. I don\u2019t like it. No. Between allies? No. I\u2019m surprised that people find that noble.\u201d<\/p>\n<p>Comparable reactions, expressed less politely in private, accompanied revelations that the NSA had tapped the cellphones of <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/uproar-in-germany-continues-over-accusations-that-us-tapped-merkels-phone\/2013\/10\/24\/39e4c618-3c96-11e3-b0e7-716179a2c2c7_story.html\" >German Chancellor Angela Merkel<\/a> and <a href=\"http:\/\/www.theguardian.com\/world\/2013\/sep\/02\/nsa-spied-mexico-brazil-presidents\"  target=\"_blank\">Brazilian President Dilma Rousseff<\/a>. The blowback roiled relations with both allies, among others. Rousseff canceled a state dinner with Obama in September.<\/p>\n<p>When it comes to spying on allies, by Snowden\u2019s lights, the news is not always about the target.<\/p>\n<p>\u201cIt\u2019s the deception of the government that\u2019s revealed,\u201d Snowden said, noting that the Obama administration offered false public assurances after the initial reports about NSA surveillance in Germany \u201cThe U.S. government said: \u2018We follow German laws in Germany. We never target German citizens.\u2019 And then the story comes out and it\u2019s: \u2018What are you talking about? You\u2019re spying on the chancellor.\u2019 You just lied to the entire country, in front of Congress.\u201d<\/p>\n<p>In private, U.S. intelligence officials still maintain that spying among friends is routine for all concerned, but they are giving greater weight to the risk of getting caught.<\/p>\n<p>\u201cThere are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback,\u201d Clapper told a House panel in October.<\/p>\n<p><b>\u2018They will make mistakes\u2019<\/b><\/p>\n<p>U.S. officials say it is obvious that Snowden\u2019s disclosures will do grave harm to intelligence gathering, exposing methods that adversaries will learn to avoid.<\/p>\n<p>\u201cWe\u2019re seeing al-Qaeda and related groups start to look for ways to adjust how they communicate,\u201d said Matthew Olsen, director of the National Counterterrorism Center and a former general counsel at the NSA.<\/p>\n<p>Other officials, who declined to speak on the record about particulars, said they had watched some of their surveillance targets, in effect, changing channels. That evidence can be read another way, they acknowledged, given that the NSA managed to monitor the shift.<\/p>\n<p>Clapper has said repeatedly in public that the leaks did great damage, but in private he has taken a more nuanced stance. A review of early damage assessments in previous espionage cases, he said in one closed-door briefing this fall, found that dire forecasts of harm were seldom borne out.<\/p>\n<p>\u201cPeople must communicate,\u201d he said, according to one participant who described the confidential meeting on the condition of anonymity. \u201cThey will make mistakes, and we will exploit them.\u201d<\/p>\n<p>According to senior intelligence officials, two uncertainties feed their greatest concerns. One is whether Russia or China managed to take the Snowden archive from his computer, a worst-case assumption for which three officials acknowledged there is no evidence.<\/p>\n<p>In a previous assignment, Snowden taught U.S. intelligence personnel how to operate securely in a \u201chigh-threat digital environment,\u201d using a training scenario in which China was the designated threat. He declined to discuss the whereabouts of the files, but he said that he is confident he did not expose them to Chinese intelligence in Hong Kong. And he said he did not bring them to Russia.<\/p>\n<p>\u201cThere\u2019s nothing on it,\u201d he said, turning his laptop screen toward his visitor. \u201cMy hard drive is completely blank.\u201d<\/p>\n<p>The other big question is how many documents Snowden took. The NSA\u2019s incoming deputy director, <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-official-raises-possibility-of-amnesty-for-edward-snowden\/2013\/12\/16\/b6a83376-6674-11e3-ae56-22de072140a2_story.html\" >Rick Ledgett<\/a>, said on CBS\u2019s \u201c60 Minutes\u201d recently that the number may approach 1.7\u00a0million, a huge and unexplained spike over previous estimates. Ledgett said he would <a href=\"http:\/\/www.cbsnews.com\/news\/nsa-leaders-split-on-giving-amnesty-to-snowden\/\"  target=\"_blank\">favor trying to negotiate an amnesty with Snowden<\/a> in exchange for \u201cassurances that the remainder of the data could be secured.\u201d<\/p>\n<p>Obama\u2019s national security adviser, Susan E. Rice, later dismissed the possibility.<\/p>\n<p>\u201cThe government knows where to find us if they want to have a productive conversation about resolutions that don\u2019t involve Edward Snowden behind bars,\u201d said the American Civil Liberties Union\u2019s Ben Wizner, the central figure on Snowden\u2019s legal team.<\/p>\n<p>Some news accounts have quoted U.S. government officials as saying Snowden has arranged for the automated release of sensitive documents if he is arrested or harmed. There are strong reasons to doubt that, beginning with Snowden\u2019s insistence, to this reporter and others, that he does not want the documents published in bulk.<\/p>\n<p>If Snowden were fool enough to rig a \u201cdead man\u2019s switch,\u201d confidants said, he would be inviting anyone who wants the documents to kill him.<\/p>\n<p>Asked about such a mechanism in the Moscow interview, Snowden made a face and declined to reply. Later, he sent an encrypted message. \u201cThat sounds more like a suicide switch,\u201d he wrote. \u201cIt wouldn\u2019t make sense.\u201d<\/p>\n<p><b>\u2018It\u2019s not about me\u2019<\/b><\/p>\n<p>By temperament and circumstance, Snowden is a reticent man, reluctant to discuss details about his personal life.<\/p>\n<p>Over two days his guard never dropped, but he allowed a few fragments to emerge. He is an \u201cascetic,\u201d he said. He lives off ramen noodles and chips. He has visitors, and many of them bring books. The books pile up, unread. The Internet is an endless library and a window on the progress of his cause.<\/p>\n<p>\u201cIt has always been really difficult to get me to leave the house,\u201d he said. \u201cI just don\u2019t have a lot of needs. .\u2009.\u2009. Occasionally there\u2019s things to go do, things to go see, people to meet, tasks to accomplish. But it\u2019s really got to be goal-oriented, you know. Otherwise, as long as I can sit down and think and write and talk to somebody, that\u2019s more meaningful to me than going out and looking at landmarks.\u201d<\/p>\n<p>In hope of keeping focus on the NSA, Snowden has ignored attacks on himself.<\/p>\n<p>\u201cLet them say what they want,\u201d he said. \u201cIt\u2019s not about me.\u201d<\/p>\n<p>Former NSA and CIA director Michael V. Hayden predicted that Snowden will waste away in Moscow as an alcoholic, like other \u201cdefectors.\u201d To this, Snowden shrugged. He does not drink at all. Never has.<\/p>\n<p>But Snowden knows his presence here is easy ammunition for critics. He did not choose refuge in Moscow as a final destination. He said that once the U.S. government voided his passport as he tried to change planes en route to Latin America, he had no other choice.<\/p>\n<p>It would be odd if Russian authorities did not keep an eye on him, but no retinue accompanied Snowden and his visitor saw no one else nearby. Snowden neither tried to communicate furtively nor asked that his visitor do so. He has had continuous Internet access and has talked to his attorneys and to journalists daily, from his first day in the transit lounge at Sheremetyevo airport.<\/p>\n<p>\u201cThere is no evidence at all for the claim that I have loyalties to Russia or China or any country other than the United States,\u201d he said. \u201cI have no relationship with the Russian government. I have not entered into any agreements with them.\u201d<\/p>\n<p>\u201cIf I defected at all,\u201d Snowden said, \u201cI defected from the government to the public.\u201d<\/p>\n<p><i>Julie Tate contributed to this report.<\/i><\/p>\n<p><i>\u00a9 The Washington Post Company<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished\/2013\/12\/23\/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html?hpid=z1\" >Go to Original \u2013 washingtonpost.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>24 Dec 2013 &#8211; \u201cFor me, in terms of personal satisfaction, the mission\u2019s already accomplished,\u201d he said. \u201cI already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn\u2019t want to change society. I wanted to give society a chance to determine if it should change itself.\u201d<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-37870","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/37870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=37870"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/37870\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=37870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=37870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=37870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}