Snowden’s Leak

By Chandrashekar (Chandra) Tamirisa, (On Twitter) @c_tamirisa

Flattr this

A young man, Edward Joseph Snowden, not yet 30, intentionally made it his responsibility to inform his country of the scale and scope of post-9/11 American electronic surveillance in the United States and around the world (Verizon, Prism, Boundless Informant, Fairview and Blarney).

Barack Obama, US president, sought accommodation with the status quo surveillance state to keep the country secure. He said the program was within the law unless violations are uncovered.

At issue is not whether the law is being followed. It is justice which had compelled Snowden to leak to the news media detailed information about the extent of the government’s electronic spying directly abroad and indirectly on Americans under the aegis of the Patriot Act and the Foreign Intelligence Surveillance Act (FISA) with full cooperation from the country’s telephone and internet technology companies.

It is a false analogy to compare previous legal cases, as Charles Krauthammer has done in his Washington Post Op-Ed, to National Security Agency (NSA) activity. It is one thing to read metadata and entirely another to store it on a blanket basis for further intelligence use.

The Boston Marathon bombings have proven that Tamerlan Tsarnaev, a foreigner in the United States in contact with foreigners abroad, was self-radicalized to successfully carry out the bombings with his American brother Dzhokhar. His telephone and internet records may not have been under the scrutiny of US intelligence despite the costly FISA and Patriot Act NSA programs, notwithstanding Russian inquiries to the Federal Bureau of Investigation (FBI). Even if Tamerlan was targeted, information about him was not sufficiently shared between the federal government and local authorities in Boston to prevent Tamerlan and his brother from carrying out the attacks. The government failed once again as it did in Benghazi, Libya on 9/11/2012, and on 9/11/2001 and before, yet Americans are being asked by their president to accede to some encroachment into their 4th Amendment right in exchange for greater security.

Did the security industrial complex (SIC) buy more security after 9/11? Any data about marginal benefit from SIC?

In America we don’t look over our shoulders to see who is watching us. It is worrisome if in the exercise of our constitutional rights if those watching us is our government for lest the minor encroachment end up as an abusive and totalitarian Orwellian state in the name of security.

As the young Mohandas Gandhi tells his priest friend in Richard Attenborough’s film Gandhi while walking down a racially charged street in South Africa, there are unjust laws just as there are unjust men.

We do not make laws in America with full faith and trust in our government but in skepticism of it.

It is possible that Snowden’s leak is a white psychological operation (PSYOP) of US intelligence and Snowden is a clandestine Central Intelligence Agency (CIA) operative on US government payroll.

Edward Snowden, if not a white psyops intelligence operative, is a classic whistleblower and must be afforded protections under law.

Snowden began the public debate about the balance between privacy and security which Obama welcomes. It is a pity that that debate was not initiated by those whose job it is to do so: the political establishment. Instead of calling Snowden a traitor the whistleblower must be fully pardoned and welcomed home to testify before the United States Congress about America’s intelligence Vietnam, a war we cannot win without losing the character of our country.

Advertisements

About Chandrashekar (Chandra) Tamirisa

http://www.thecommonera.com/Common_Era/Me.html
This entry was posted in Constitutional Law, National Security and Defense, North America and Caribbean and tagged , . Bookmark the permalink.

One Response to Snowden’s Leak

  1. European leaders on US electronic surveillance:
    http://www.washingtonpost.com/world/merkel-other-european-leaders-raise-concerns-on-us-surveillance/2013/06/10/305eddda-d1da-11e2-a73e-826d299ff459_story.html?wpmk=MK0000205

    Peggy Noonan on the surveillance state in WSJ:
    http://online.wsj.com/article/SB10001424127887324188604578543721259199626

    Stephen Carter on privacy:
    http://mobile.bloomberg.com/news/2013-06-13/privacy-looks-different-through-google-glass.html?cmpid=

    The New Yorker on NSA surveillance programs:
    http://m.newyorker.com/online/blogs/elements/2013/06/nsa-prism-snowden-what-we-know.html

    The Washington Post on Blarney and NSA programs:
    http://m.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html

    http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html?wpmk=MK0000205

    Katrina Vanden Heuvel in The Washington Post:
    http://m.washingtonpost.com/opinions/katrina-vanden-heuvel-the-nsa-state-of-secrecy-must-end/2013/06/18/98240ea4-d77f-11e2-a016-92547bf094cc_story.html

    Electronic Frontier Foundation:
    https://www.eff.org/deeplinks/2013/06/confirmed-nsa-spying-private-briefings-will-begin-public-discussions-and-public

    ACLU v NSA
    http://m.washingtonpost.com/politics/aclu-sues-over-nsa-surveillance-program/2013/06/11/fef71e2e-d2ab-11e2-a73e-826d299ff459_story.html

    http://www.wired.com/threatlevel/2013/06/nsa-spygate-lawsuits-growing/

    http://www.aclu.org/national-security/nsa-unchained-infographic

    Phone metadata:
    http://m.india.wsj.com/articles/a/SB10001424127887324049504578545352803220058?mg=reno64-wsj

    Obama, the big data president:
    http://m.washingtonpost.com/opinions/obama-the-big-data-president/2013/06/14/1d71fe2e-d391-11e2-b05f-3ea3f0e7bb5a_story.html

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s