Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Does Edward Snowden really have blood on his hands over Paris?

 “What Snowden disclosed was the astonishing extent to which the government’s surveillance power had been turned on ordinary citizens. The CIA director knows this"

Ellen Nakashima,Greg Miller
Thursday 19 November 2015 15:47 GMT
Comments
The level of restrictions that Snowden's revelations have apparently put in place would have had little bearing on the Paris attacks
The level of restrictions that Snowden's revelations have apparently put in place would have had little bearing on the Paris attacks (Getty)

In a pair of public appearances this week, CIA Director John Brennan made clear that he blames leaks by former intelligence contractor Edward Snowden for enabling terrorists to evade detection.

“Because of a number of unauthorized disclosures, and a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists,” Brennan said, the CIA and others agencies have lost use of critical tools needed “to find these terrorists.”

Brennan’s assertion has become a refrain in the two years since Snowden exposed details about a range of U.S. surveillance programs. And former CIA director R. James Woolsey went further, saying on Sunday, “I think Snowden has blood on his hands from these killings in France.”

CIA Director John Brennan (Reuters)

But drawing a line from Snowden to the Paris tragedy is problematic, according to some analysts, because even two years after the leaks it is difficult to isolate the extent to which they caused terrorist networks to change the way they communicate.

The revelations that were the source of greatest controversy involved programs that would likely have been of little value in disrupting the Paris plot, experts said. The National Security Agency’s collection of data about the times and durations of billions of domestic phones calls was not designed to pick up calls entirely outside the United States.

A second program that relied heavily on cooperation from companies including AOL, Microsoft and Google was aimed at intercepting e-mail and phone calls between foreign operatives and individuals in the United States. Nothing has changed since that revelation to restrict the NSA’s ability to sweep up communications exclusively among foreigners, as was apparently the case for the plot in France.

Other subsequent disclosures undoubtedly gave adversaries including terrorist groups a deeper understanding of the scale of U.S. surveillance capabilities, as well as specific programs that enabled, for example, the NSA and its counterpart in Britain to tap into Google and Yahoo data centers overseas.

But to conclude that those revelations caused enough damage to make the United States and its allies, including France, substantially more vulnerable assumes that terrorist cells would not otherwise have taken precautions that to some seem inevitable, some analysts said.

“Aspiring terrorists already knew the U.S. government was doing everything it could to track and monitor their communications,” said Jameel Jaffer, the deputy legal director of the American Civil Liberties Union. “What Snowden disclosed was the astonishing extent to which the government’s surveillance power had been turned on ordinary citizens. The CIA director knows this. He’d just rather we talk about Snowden’s disclosures than about the intelligence community’s failures.”

But others say that the tremendous publicity surround Snowden’s disclosures may well have caused militants to take even greater precautions in their communications than they already were.

“I think you can recognize that the leaks did damage to the United States’ ability to monitor some of their communications, while also acknowledging that the jihadists were pretty security-conscious anyway,” said William McCants, a Brookings Institution terrorism expert and author of “The ISIS Apocalypse.”

Investigators are still piecing together details on how the Paris plotters communicated with one another, including whether they were in touch with senior Isis operatives in Syria in the days or weeks leading up to the attacks.

U.S. officials have said it is likely that some of those involved in the plot used encrypted communications tools, but officials have stopped short of saying whether they have established that this was the case. Any attempt by the plotters to communicate with handlers in Syria would have raised the risk of exposure significantly, officials said, because of the surveillance assets that the United States and its allies have mobilized against Isis.

Officials and experts are in broad agreement that terrorist groups have ramped up their operational security measures in recent years. And some think Snowden’s disclosures accelerated both the development and adoption of encryption technology.

Terrorist groups “adapted to the disclosures by Snowden and have made it more difficult for us to track their whereabouts as well as their plotting and planning,” said Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee. “I do think the Snowden revelations have had an adverse security impact, because our enemies know far more about our capabilities and programs.”

Experts who monitor the communications and social media postings of terrorist groups said there are indications that Islamist militants studied the Snowden coverage.

Rita Katz of the SITE Intelligence Group, which tracks jihadist activity online, said Isis and al-Qaeda have studied documents leaked by Snowden and articles based on the documents. Militants have posted tips on how to avoid NSA surveillance, such as how to register on Twitter without phone verification, she said.

She pointed to a discussion in a jihadist forum in October 2013 — at the height of the Snowden revelations — calling attention to an “important article related to Tor. Good read.”

Tor is a system used by dissidents and militants alike to shield one’s identity online by moving encrypted traffic across a global network of servers. The forum moderator concluded that Tor itself “is not broken” and “could be a relative secure option after all.” But, he added that jihadists should “switch away” from a particular convenience feature that might have been tampered with and use the regular Tor program.

But concern about jihadist networks adopting sophisticated communications security long predates Snowden. The FBI’s then-director, Louis Freeh, was warning about terrorists using “uncrackable encryption” in February 2001. In 2010, the attackers behind the attempted Times Square bombing used encrypted e-mails to communicate, though the government was still able to read their messages.

McCants, of the Brookings Institution, said tradecraft was a major part of jihadist training in the al-Qaeda camps in Afghanistan. “In many ways, online discussion boards became a replacement for the camps,” he said.

Even fierce critics of Snowden have acknowledged that his disclosures — published in The Washington Post, the Guardian and other outlets — triggered an important, and possibly overdue, debate over U.S. surveillance practices in the years after the attacks of Sept. 11, 2001. Director of National Intelligence James R. Clapper Jr. has also suggested that the fallout from the revelations might have been easier to contain if spy agencies hadn’t been so determined to preempt public debate even in the broadest terms.

In Brennan’s appearance at a conference at the Center for Strategic and International Studies in Washington on Monday, the CIA director said that “some policy and legal” changes have made the spy agencies’ job more difficult.

He did not elaborate, but the most consequential piece of legislation passed after Snowden’s leaks, which calls for an end to the bulk collection of phone data, has not yet gone into effect.

Other changes included giving foreigners expanded privacy protections and requiring White House approval for spying on foreign heads of state.

“I don’t think any of the policy changes we have made have diminished our capability to combat terrorism,” Schiff said.

Nonetheless, intelligence officials have insisted that operational details disclosed by Snowden have led to a loss of intelligence. U.S. officials including NSA Director Michael S. Rogers have warned that intelligence agencies have lost the trail of terrorist targets they were tracking.

One former senior intelligence official said he had operators report to him that “it’s getting harder for me to do my job because we’re seeing more of our targets using encrypted communications. Targets would cycle through different services and then disappear. We saw that quite a bit.”

In September, Clapper said that one Snowden revelation prompted the shutdown of a key intelligence program in Afghanistan. Though he did not give details, he was alluding to an NSA program that recorded all cellphone calls in that country and provided tactical support to troops, for instance, by alerting them to roadside bombs.

FBI Director James B. Comey has warned that terrorists are increasingly turning to encrypted modes of communication, and last year he criticized companies such as Apple for building smartphones and applications whose data can be unlocked only by the user. Officials say that U.S. firms accelerated the development of encryption as a response to the Snowden leaks, in a bid to allay concerns that their platforms were too transparent to spy agencies.

But industry officials familiar with Apple’s product development say that the firm’s moves to encryption predated the Snowden disclosures and were not sped up by them. “Snowden had nothing to do with it,” said one industry official, who was not authorized to speak on the record. “It was the ethos to protect the customer — not to stymie governmental investigations.”

Washington Post

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in