A Weekly Analysis Of Leaked NSA Documents

Many of the documents that Edward Snowden leaked have been in the public domain for quite some time yet a detailed analysis of the content within them has yet to occur. Sure, the affiliated newspapers have singled out what they believe are the most interesting parts of the story and folks like Bruce Schneier have done an excellent job dissecting some of the leaked slides on his blog over the last few months, but we haven’t seen the kind of intense interest that I personally expected. Perhaps this was a direct result of Greenwald and Co’s decision to slowly dribble out the information. Although this tactic was good for selling papers, it probably wasn’t optimal as far as Snowden was concerned if he was (and we must assume he was) primarily concerned with getting all of the information into the hands of the public, as these delays allowed authorities to severely curtail the ability of the news agencies involved to effectively continue leaking the documents, and thus actual informed discussion was replaced with editorials with speculation and inaccuracies. Clearly, this was mishandled – as was the decision to redact some of the most important information from the leaked material. Snowden gave up a well paying job in Hawaii to become persona non-grata; effectively he will need to watch his back for the remainder of his life, and his future safety is far from certain. Snowden was no Manning. He knew well in advance what the consequences of his actions would be, and he was forced to entrust members of the supposedly ‘free’ press to complete a task; that task being to spread the word about these unconstitutional programs, and in practical terms it was a success, but unfortunately due to the way the disclosures were conducted the small sample of documents released were far from edifying.

The redactions that were in many of the documents released were entirely un-necessary, and the explanations given as to their necessity were baffling. These were not names of secret agents who could be identified and killed abroad – no, these were names of VPN appliance vendors and software companies. The cynical observer would note that the redactions are likely due to the Guardian and friends aversion to process servers appearing in their offices. Unfortunately, this makes the leaked document pretty much useless when the vulnerable product is not identified. This is not an isolated example.

That said – I believe that in the case of a wholesale government document release like the Wikileaks/Manning disclosure before it, it is essential that we carefully go through each of the leaked documents with a fresh set of eyes to see if we can extract something ‘new’ out of material we have already seen. So I will be doing my best to examine the raw material that is available from both the Guardian’s website and, thankfully, a much more complete collection available for search and direct download from the ACLU. The most interesting documents I will devote a blog post to. Yes, I will apply experience and trade knowledge to editorialize on information not present to draw conclusions that may be inaccurate. Perhaps this makes me no better than those who I critized in the preceding paragraphs. Nonetheless, unlike the newspapers who had both access to raw material and the source himself to interview should any questions arise, I have none of the above and must try and understand what is going on – and in some of these documents – the lack of context and use of NSA codewords and jargon makes it quite difficult. In any case, I will try and make a weekly feature out of this – and we will examine known NSA operations and have a look at the source material, along with cooberating evidence already in the public domain.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s