- The Washington Times - Saturday, July 13, 2013

One twist in the fugitive hunt for asylum-seeking Edward Snowden is that the former contractor, who revealed the most secrets in history about the National Security Agency, now is undoubtedly one of the agency’s chief targets.

A subplot in this international thriller is a cat-and-mouse game: Will the NSA penetrate his communications or will the master leaker outwit all of the agency’s high-tech gadgets — since he, as well as anyone, knows how they work?

“NSA is probably doing what it does best, which is sweeping the ’electronicsphere’ for communications, voice and data, indicating his next chess move,” former CIA officer Bart Bechtel says. “They may also be looking at known and suspected collaborators.”

Meanwhile, the journalist who first exposed Mr. Snowden’s leaked documents for stories in Britain’s The Guardian newspaper says the information technician has “literally thousands of documents” that constitute “basically the instruction manual for how the NSA is built.”

Glenn Greenwald told The Associated Press that Mr. Snowden has insisted that the documents not be made public.

He said that the disclosure of their data could harm the U.S. government and “would allow somebody who read them to know exactly how the NSA does what it does, which would in turn allow them to evade that surveillance or replicate it.”


SEE ALSO: Russian official: No asylum application received from NSA leaker Snowden


An analyst who is a former intelligence operative, who requested anonymity in order to speak freely about security matters, says that the same methods Mr. Snowden already has disclosed in documents leaks to the press are now being turned on him.

The documents told of super-secret NSA programs to spy on social media such as Facebook and Twitter, bug computers, penetrate telephone cables and scoop up of billions of telephone call records.

As Mr. Snowden stays at Moscow’s international airport and works with the anti-secrecy group WikiLeaks, the Obama administration has at its disposal an array of intercept tools for emails, Internet postings and messaging, and cellphone and land-line calls.

And because Mr. Snowden is a fugitive, the Justice Department would have no problem getting a federal court to approve all sorts of wiretaps on him, and perhaps, family members, to try to learn his next move.

“Clearly, the courts would approve at this point, and we have a vested interest in finding out what he knows,” says the former operative, who worked with the NSA. “He may be smarter than that, though, and using couriers instead of phone and email. I think that’s what the Wiki clowns are helping with.”

In other words, as someone who understands the NSA’s computer networks and how it listens in, Mr. Snowden is in a good position to avoid being heard.


SEE ALSO: White House bashes Russia for giving Edward Snowden ‘propaganda platform’


Mr. Greenwald earlier wrote that the NSA leaker used an encrypted email computer program. Mr. Snowden insisted that Mr. Greenwald install the same technology before he would engage in providing some of the United States’ most sensitive, top-secret intelligence collection methods.

• Rowan Scarborough can be reached at rscarborough@washingtontimes.com.

Copyright © 2024 The Washington Times, LLC. Click here for reprint permission.

Please read our comment policy before commenting.

Click to Read More and View Comments

Click to Hide