Whistleblowers are always accused of helping Americaās enemies (top Nixon aides accused Daniel Ellsberg of being a Soviet spy and causing the deaths of Americans with his leak); itās just the tactical playbook thatās automatically used. So itās of course unsurprising thatĀ ever since Edward Snowdenās whistleblowing enabled newspapers around the world to report on secretly implemented programs of mass surveillance, he has been accused by āofficialsā and their various media alliesĀ of Helping The Terroristsā¢.
Still, I was a bit surprised just by how quickly and blatantly āĀ how shamelessly āĀ some of them jumpedĀ to exploitĀ the emotions prompted byĀ the carnage inĀ FranceĀ to blame Snowden: doing soĀ literallyĀ as the bodies still lay on the streets of Paris. At first, theĀ tawdry exploiters were the likes of crazed ex-intelligenceĀ officials (former CIA chief James Woolsey, whoĀ once saidĀ Snowden āshould be hanged by his neck until he is deadā and now has deep ties to private NSA contractors,Ā along withĀ IranāobsessedĀ Robert Baer);Ā former Bush/Cheney apparatchiks (ex-White House spokesperson and current Fox personality Dana Perino);Ā right-wing polemicists fired from BuzzFeed for plagiarism; andĀ obscure Fox NewsĀ comediansĀ (Perinoās co-host). So it was worth ignoring save for the occasional Twitter retort.
But now weāve entered the inevitable āU.S. Officials Sayā stage of the āreportingā on the Paris attack ā i.e. journalists mindlessly and uncritically repeatĀ whatever U.S. officials whisper in their ear about what happened. So now credible news sites are regurgitating the claim that the Paris Terrorists were enabled by Snowden leaks āĀ based on no evidence or specific proof of any kind, needless to say, but just the unverified, obviously self-serving assertions of government officials.Ā But much of the U.S. media loves to repeat rather than scrutinize what government officials tell them to say. So now this accusation has become widespread and is thus worth examiningĀ with just some of the actual evidence.
OneĀ key premise here seems to be that prior to theĀ Snowden reporting, The Terrorists helpfully and stupidly used telephones and unencrypted emails to plot, so western governments were able to track their plotting and disrupt at least large-scaleĀ attacks. That would come as a massive surprise to the victims of the attacks of 2002 in Bali, 2004 in Madrid, 2005 in London, 2008 in Mumbai, and April, 2013 at the Boston Marathon. How did the multiple perpetrators of those well-coordinated attacks āĀ all of which were carried out prior to Snowdenās June, 2013 revelations āĀ hide their communications from detection?
This is a glaring case where propagandists canāt keep their stories straight. The implicit premise of this accusation is that The Terrorists didnāt know to avoid telephones or how to use effective encryption until Snowden came along and told them. YetĀ weāve been warnedĀ for years and years before SnowdenĀ that The Terrorists are so diabolical and sophisticated that they engage in all sorts of complexĀ techniques to evade electronic surveillance.
By itself, the glorious mythology of How the U.S. Tracked Osama bin Laden should make anyone embarrassed to make these claims. After all, the central premiseĀ of that storyline is thatĀ bin LadenĀ only used trusted couriers to communicate because Al Qaeda knew for decades to avoid electronic means of communication because the U.S. and others could spy on those communications.Ā Remember all that? Zero Dark Thirty and the āharsh but effectiveā interrogation of bin Ladenās āofficial messengerā?
Any terroristĀ capable of tying his own shoe āĀ let alone carrying out a significant attack āĀ hasĀ known for decades that speaking on open telephone and internet lines was to be avoided due to U.S. surveillance. As one Twitter commentatorĀ put itĀ yesterday when mocking this new Itās-Snowdenās-Fault game: āDude, the drug dealers from the Wire knew not to use cell phones.ā
The Snowden revelations werenāt significant because they told The Terrorists their communications were being monitored; everyone āĀ especially The Terrorists ā has known that forever. The revelations were significant because they told the world that the NSA and its allies were collectingĀ everyone elseās internet communicationsĀ and activities.
The evidence proving this ā that The Terrorists have been successfully using sophisticated encryption and other surveillance-avoidance methods for many years prior to Snowden āĀ is so overwhelming that nobody should be willing to claim otherwise with a straight face. As but one of countless examples, hereās a USA Today article from February, 2001Ā āĀ more than 13 years before anyone knew the name āEdward Snowdenā āĀ warning that Al Qaeda was able to āoutfox law enforcementā by hiding its communications behind sophisticated internet encryption:
The Christian Science Monitor similarly reported on February 1, 2001, that āthe head of the US National Security Agency has publicly complained that Al Qaedaās sophisticated use of the Internet and encryption techniques have defied Western eavesdropping attempts.ā
After 9/11, we were constantly told about how wily and advanced The Terrorists were when it came to hiding their communications from us. One scary graphic from the November, 2001 issue ofĀ Network World laid it out this way:
All the way back in the mid-1990s, the Clinton administration exploited the fears prompted by Timothy McVeighās Oklahoma City attack to demand backdoor access to all internet communications. This is what then-FBI Director Louis Freeh told the Senate Judiciary Committee in July, 1997 āĀ almost 20 years ago:
The looming spectre of the widespread use of robust, virtually uncrackable encryption is one of the most difficult problems confronting law enforcement as the next century approaches. At stake are some of our most valuable and reliable investigative techniques, and the public safety of our citizens. We believe that unless a balanced approach to encryption is adopted that includes a viable key management infrastructure, the ability of law enforcement to investigate and sometimes prevent the most serious crimes and terrorism will be severely impaired. Our national security will also be jeopardized.Ā
How dumb do they think people are to count on them forgetting all of this, and to believe now that The Terrorists only learned to avoid telephones and use encryption once Snowden came along? Ironically, the Snowden archive itself is full of documents from NSA and its British counterpart, GCHQ, expressing deep concern that they cannot penetrate the communications of Terrorists because of how sophisticated their surveillance-avoidance methods are (obviously, those documents pre-date Snowdenās public disclosures).
As but one example, the GCHQ files contain what the agencyĀ calls a āJihadist Handbookā of security measures, dated 2003, that instructs terror operatives in the use of sophisticated surveillance-avoidance techniques that āĀ as we noted when we first reported itĀ ā are very similar to what GCHQ still tells its own operatives to use:
In light of all this, how can āofficialsā and their media stenographers persist in trying to convince people of such a blatant, easily disproven falsehood: namely, that Terrorists learned to hide their communications fromĀ Snowdenās revelations? They do it because of how many benefits there are from swindling people to believe this.
To begin with, U.S officials are eager here to demonize far more than just Snowden. They want to demonize encryption generally as well as any companies that offer it. Indeed, as these media accountsĀ show, theyāve been trying for two decades to equate the use of encryption ā anything that keeps them out of peopleās private online communications ā with aiding and abetting The Terrorists. Itās not just Snowden but also their own long-time Surveillance State partners āĀ particular Apple and Google āĀ who are now being depicted as Terrorist-Lovers for enabling people to have privacy on the internet through encryption products.
As I documented last November, the key tactic of American and British officials is to wage a P.R. war against Silicon Valley companies who offer encryption by accusing them of Helping The Terrorists. Last September, FBI Director James Comey actually said: āWhat concerns me about this is companies marketing something expressly to allow people to hold themselves beyond the law,ā whileĀ The New York Times gave anonymity in that article to a security official to link the new iPhone 6 to terrorism. The head of GCHQ called Apple and GoogleĀ āthe command-and-control networks of choice for terrorists and criminalsā as part of whatĀ The New York Times calledĀ āa campaign by intelligence services in Britain and the United States against pressure to rein in their digital surveillance after disclosures by the American former contractor Edward J. Snowden.ā

Then thereās the blame-shifting benefit. For most major terror attacks, the perpetrators were either known to western security agencies or they had ample reason to watch them. All three perpetrators of the Charlie Hebdo massacre āwere known to French authorities,ā as was the thwarted train attacker in JulyĀ and at least one of the Paris attackers. These agencies receive billions and billions of dollars every year and radical powers, all in the name of surveilling Bad People and stopping attacks.
So when they fail in their ostensible duty, and people die because of that failure, itās a natural instinct to blame others:Ā donāt look to us; itās Snowdenās fault, or the fault of Apple, or the fault of journalists, or the fault of encryption designers, or anyoneās fault other than ours.Ā If youāre a security agency after a successful Terror attack, you want everyone looking elsewhere, finding all sorts of culprits other than those responsible for stopping such attacks.
Above all,Ā thereās the desperation to prevent peopleĀ from asking how and why ISIS was able to spring up seemingly out of nowhere and be so powerful, able to blow up a Russian passenger plane, a market in Beirut, and the streets of Paris in a single week. Thatās the one question western officials are most desperate not to be asked, so directing peopleās ire to Edward Snowden and Apple is beneficial in the extreme.

The origins of ISIS are not even in dispute. The Washington Post put it simply: āalmost all of the leaders of the Islamic State are former Iraqi officers, including the members of its shadowy military and security committees, and the majority of its emirs and princes.ā Even Tony Blair ā Tony Blair āĀ admits that thereād be no ISIS without the invasion of Iraq:Ā āāI think there are elements of truth in that,ā he said when asked whether the Iraq invasion had been the āprincipal causeā of the rise of ISIS.ā AsĀ The New Yorkerās John Cassidy put it in August:
By destroying the Iraqi state and setting off reverberations across the region that, ultimately, led to a civil war in Syria, the 2003 invasion created the conditions in which a movement like ISIS could thrive. And, by turning public opinion in the United States and other Western countries against anything that even suggests a prolonged military involvement in the Middle East, the war effectively precluded the possibility of a large-scale multinational effort to smash the self-styled caliphate.
Then thereās the relatedĀ question of how ISIS has become so well-armed and powerful. There are many causes, but a leading one is the role played by the U.S. and its āallies in the regionā (i.e., Gulf tyrannies) in arming them, unwittingly or (in the case of its āallies in the regionā)Ā otherwise, by dumping weapons and money into the region with little regard to where they goĀ (even U.S. officials openly acknowledgeĀ that their own allies have funded ISIS). But the U.S.ās own once-secret documents strongly suggest U.S. complicity as well, albeit inadvertent, in the rise of ISIS, as powerfully demonstrated by this extraordinary 4-minute clip of Al Jazeeraās Mehdi Hasan with Gen. Michael Flynn, former head of the Defense Intelligence Agency:
Given all this, is there any mystery why āU.S. officialsā and the military-intelligence regime, let aloneĀ Iraq War-advocating hacks like Jim Woolsey and Dana Perino, are desperate to shift blame away from themselves for ISIS and terror attacks and onto Edward Snowden, journalism about surveillance, or encryption-providing tech companies? Wouldnāt you if you were them? Imagine simultaneously devoting all your efforts to depicting ISIS as the Greatest and Most Evil Threat Ever, while knowing the vital role you played in its genesis and growth.
The clear, overwhelming evidence ā compiled above ā demonstrates how much deceit theirĀ blame-shifting accusations require. But the more important point of inquiry is to ask why they are so eager to ensure that everyone but themselves receives scrutiny for what is happening. The answer to that question is equally clear,Ā andĀ disturbing in the extreme.
Additional research provided by Margot Williams
ZNetwork is funded solely through the generosity of its readers.
Donate




