RSN Fundraising Banner
FB Share
Email This Page
add comment
Politics
Planting Trees Won't Stop Climate Change Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=54463"><span class="small">Ted Williams, Slate</span></a>   
Monday, 25 May 2020 12:27

Williams writes: "Mass plantings are apt to do more harm than good. And it's nearly impossible to distinguish decent projects from bad ones."

Planting a tree. (photo: ?????? ???????/iStock/Getty Images Plus)
Planting a tree. (photo: ?????? ???????/iStock/Getty Images Plus)


Planting Trees Won't Stop Climate Change

By Ted Williams, Slate

25 May 20


Not only are planted trees not the carbon sinks you want, but tree planting frequently ends up doing more harm than good.

umans have long believed that planting trees, any kind of tree, anywhere, is good, something Mother Nature cries out for, something that might even solve our climate crisis. Tree-planting initiatives proliferate: the Bonn Challenge, Trees for the Future, Trees Forever, the 10 Billion Tree Tsunami, Plant a Billion Trees, 8 Billion Trees, the Trillion Tree Campaign, the One Trillion Trees Initiative, to mention just a few. 

The passion for planting trees comes partly from the fact that, in some places, they sequester carbon. This has been broadly interpreted to mean that festooning the Earth with trees will solve the problem of climate change, which is why tree-planting programs are so popular with carbon polluters seeking to avoid cleanup costs. President Donald Trump, for example, instantly embraced the One Trillion Tree Initiative launched in January by the World Economic Forum, pledged U.S. participation, and then gushed about it in his State of the Union address: “To protect the environment, days ago, I announced that the United States will join the One Trillion Tree Initiative, an ambitious effort to bring together government and the private sector to plant new trees in America and around the world.” 

Planting trees can be beneficial, especially in countries where predatory logging and other land abuse has destroyed soil stability and deprived people of shade, clean water, fish, and fruit. But such initiatives are the exception. Mass plantings are apt to do more harm than good. And it’s nearly impossible to distinguish decent projects from bad ones. 

First there is the problem of duplicity, not unusual among tree-planting outfits. Consider Plant for the Planet, the organization behind the Trillion Tree Campaign. In March 2019, the German newspaper Die Zeit revealed that the group’s website was rife with untruths. For example, one person—a “Valf F.” from France—was reported to have single-handedly planted 682 million trees. 

The other, larger problem is the ecological havoc tree planters can wreak if they are not careful. Few divulge what species they plant. Fewer still commit to planting only native species. Those who do commit are apt to plant monocultures, which are nearly worthless to wildlife and vulnerable to disease, insects, and wind. Forests are complex machines with millions of meshing parts. You can’t plant a forest; you can only plant a plantation. 

Trees planted in wrong places, particularly places that are naturally treeless, do more harm than good and trash native ecosystems. Prairies, for example, provide important habitat for all manner of wildlife. But ever since European settlement, Americans have been destroying them with trees. When J. Sterling Morton moved to Nebraska from Michigan in 1854, he decided that Mother Nature had gotten it all wrong. In due course he called forth “a grand army of husbandmen … to battle against the timberless prairies,” and on April 10, 1872, established the first Arbor Day. Twenty-four hours later, Nebraskan prairies had been degraded by roughly 1 million planted trees. 

Tree planting, especially on Arbor Day, became a national obsession. In celebration of the 100th anniversary of Arbor Day, the Nebraska-based Arbor Day Foundation was formed. It hasn’t deviated far from Morton’s mindset. Join and you can receive 10 free Colorado blue spruce seedlings with instructions on how to plant them. This would be fine if you live in the central or southern Rockies. But everywhere else, these trees are aliens. 

Illustrating the extent of our current tree-planting craze is the recent marketing of biodegradable coffee cups impregnated with tree seeds. Not only do they encourage littering, but they guarantee that wrong trees will be planted in wrong places. 

But such slapdash planting is an American tradition. In 1876, possibly inspired by Arbor Day, a man named Ellwood Cooper sought to improve his 2,000-acre, mostly treeless ranch near Santa Barbara, California, with 50,000 eucalyptus seedlings. They shot up 40 feet in just three years, an unheard-of growth rate for which they became known as “miracle trees.” Eucalyptus trees are not native to California. 

Shortly thereafter, the University of California and the state Department of Forestry distributed free eucs for everyone to plant. Prairies, chaparral, and cutover forestland were jammed full of these aliens. One hundred years after the first Arbor Day, 271,800 acres of eucalyptus had been planted in the U.S., 197,700 of them in California. 

When I inserted my arm into euc leaf and bark litter in Bolinas, California, I couldn’t touch the bottom. That’s because the microbes and insects that eat it are in Australia, not California. Native plant communities can’t survive in these plantations because eucs kill competition with their own herbicide, creating what botanists call “eucalyptus desolation.” Eucs evolved with fire and prosper from it. Their tops don’t just burn; they explode. Living near them is like living beside a gasoline refinery staffed by chain smokers. 

But eucs remain popular in California. They’re still being planted. And agencies seeking to protect the public and recover native ecosystems by razing eucs inevitably face the fury of eucalyptus lovers who have, for example, accused them of being “plant Nazis.” 

According to a mantra heard for more than three decades, trees are good, even if they disrupt native ecosystems, because they can serve as carbon sinks. In 1988, the then–113-year-old American Forestry Association (now American Forests) initiated its Global ReLeaf campaign under the shibboleth “Plant a tree, cool the globe.” Too bad it’s not that simple. A study led by the Lawrence Livermore National Laboratory concludes that any carbon sequestration benefit from trees planted much north of Florida is more than offset because solar heat absorbed and retained by the trees makes the climate warmer. 

The notion that any significant percent of the carbon humanity spews can be sucked up by planted trees is a pipe dream. But it got rocket boosters in July, when Zurich’s Crowther Lab published a paper, in Science, proclaiming that planting a trillion trees could store “25 percent of the current atmospheric carbon pool.” That assertion is ridiculous, because planting a trillion trees, one-third of all trees currently on earth, is impossible. Even a start would require the destruction of grasslands (prairies, rangelands, and savannas) that reflect rather than absorb solar heat and that, with current climate conditions, are better carbon sinks than natural forests, let alone plantations. Also, unlike trees, grasslands store most of their carbon underground, so it’s not released when they burn

The Crowther paper horrified climate scientists and ecologists, 46 of whom wrote a rebuttal, explaining that planting trees in the wrong places would exacerbate global warming, create fire hazards, and devastate wildlife. They rebuked the authors for “suggesting grasslands and savannas as potential sites for restoration using trees” and for overestimating by a factor of 5 “potential for new trees to capture carbon.” 

Tree plantations are already destroying natural areas that are far more efficient at storing carbon—wetlands, for example. When organic detritus is trapped underwater it can’t release carbon because there’s no oxygen for decomposition. Carbon sequestration efficiency of coastal wetlands (marshes, mangroves and seagrasses) actually increases with global warming because, as sea levels rise, more and more storage space for detritus becomes available

Ill-conceived tree plantings can dewater wetlands. Consider the yet-to-be-launched initiative to plant 2.4 billion trees in India’s Cauvery River basin, which is the brainchild of the Isha Foundation, based in Coimbatore, India. Leonardo DiCaprio, whose foundation is a major backer, received a letter in September from 95 of India’s environmental and public interest groups that cited litigation against the plan. It read in part: “Biodiversity, forests, grasslands and the massive deltaic region that this river nurtures would be devastated. … It appears to be a programme that presents, rather simplistically, that the river can be saved by planting trees on banks of her streams, rivulets, tributaries and the floodplains … a method that promotes a monoculturist paradigm of landscape restoration which people of India have rejected long ago.” The Isha Foundation dismissed the letter as an attempt “to gain publicity.” 

Similarly, in September Ireland committed to planting 440 million trees as part of its Climate Action Plan. Many of them will be commercially valuable Sitka spruce from North America’s Pacific Northwest. When they’re harvested, sequestered carbon will spew back into the atmosphere. Meanwhile, these aliens will be drying up wetlands, increasing global warming by absorbing and retaining solar heat, and, as the Irish Wildlife Trust warns, speeding extirpation of fish and wildlife (ongoing because of previous alien-tree plantings). 

The notion that tree planting is an elixir for what ails the earth is as popular with polluters as it is with nations, a fact that spawned the “carbon offset industry.” Polluters hire third parties—often unseen, uninterviewed, and in other countries—to plant any kind of trees, anywhere. For instance, in November, EasyJet announced that it will spend $33 million for tree planting and other carbon-reduction schemes, supposedly rendering itself the first airline to offset all its CO2 pollution. In February Delta Air Lines pledged to zero out its carbon emissions by spending $1 billion over the next decade. While it was vague on how this will be accomplished, tree planting is reportedly part of the strategy

Carbon offsetting has been likened to “indulgences,” the forgiveness notes hawked by the pre-Reformation Catholic Church—go and sin no more unless, of course, you pay us off again for future sins. Also, hired tree planters frequently charge for trees that would be planted anyway or pocket the money and plant nothing. 

According to Kevin Anderson, professor of energy and climate change at the U.K.’s University of Manchester, the entire carbon offset industry is a “scam.” In 2019, after two decades of carbon offsetting, CO2 levels peaked at the highest levels in recorded history. 

Carbon offsetting might work if polluters paid parties to protect existing forests and maybe also restore wetlands and grasslands by cutting planted and invading trees. On 400,000 acres in Montana, the American Prairie Reserve recovers native prairie by razing alien Russian olive and Chinese locust trees and reseeding bare, abandoned cropland with a native prairie mix. 

The same restoration is done by the U.S. Fish and Wildlife Service at national wildlife refuges such as Bowdoin and Medicine Lake, both in Montana. “I have old photos showing settlers out on the prairie, and there’s not a single tree in the background,” says Neil Shook, who manages these two refuges. “Now the same places are littered with trees. By cutting trees we’re seeing increases in prairie vegetation and grassland songbirds. But people are still planting Russian olives. Right outside our boundaries you can see what will happen if we don’t cut. That private land is just full of trees.” 

Thanks to aggressive tree removal by the USFWS at Union Slough National Wildlife Refuge in Iowa, prairie-dependent plants, birds, and mammals are surging back. For years, tree lovers have railed at Union Slough managers, accusing them of such malfeasance as “arboricide.” But as the refuge presses on the noise fades. 

Reform seems to take two steps back and three forward. “We’re pushing hard for San Francisco to plant native trees that will bring wildlife into the city and link it with our parks,” remarks Jacob Sigg of the California Native Plant Society. “But the old-boy network plants non-natives and is deaf to our arguments. Planting any trees anywhere sends chills down my spine. I do see progress, but then I hear some prominent person talking about planting a ‘trillion trees.’ ” 

Sigg brightened when I asked about Angel Island. It had been blighted by eucalyptus desolation when I’d seen it. Now, he reported, virtually all the eucs have been cut and chipped, and native grasslands and scrub oaks have recovered. The California Department of Parks and Recreation had not been deaf to the society’s arguments. In the face of savage bullying from groups like POET (Preserve Our Eucalyptus Trees), it stood tall. 

I think the great landscape photographer Ansel Adams put it best when he helped run tree-planting Boy Scouts off the prairie in what’s now the Golden Gate National Recreation Area: “I cannot think of a more tasteless undertaking than to plant trees in a naturally treeless area, and to impose an interpretation of natural beauty on a great landscape that is charged with beauty and wonder, and the excellence of eternity.” Treeless landscapes are not only natural, in many cases—they’re better for the Earth, too. 

e-max.it: your social media marketing partner
 
FOCUS: Trump Golfs While More Americans Die Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=49820"><span class="small">Peter Wade, Rolling Stone</span></a>   
Monday, 25 May 2020 12:03

Wade writes: "President Trump, who has faced mounting criticism for his administration's mishandling of the coronavirus crisis and his lack of empathy throughout, decided to leave the White House on Saturday to play golf."

President Trump on his golf course at the Trump Turnberry resort in South Ayrshire, Scotland July 15, 2018. (photo: Andrew Milligan/PA Images/Getty Images)
President Trump on his golf course at the Trump Turnberry resort in South Ayrshire, Scotland July 15, 2018. (photo: Andrew Milligan/PA Images/Getty Images)


Trump Golfs While More Americans Die

By Peter Wade, Rolling Stone

25 May 20


While the U.S. pandemic death toll approaches 100,000, the president left the White House for one of his personal golf courses

resident Trump, who has faced mounting criticism for his administration’s mishandling of the coronavirus crisis and his lack of empathy throughout, decided to leave the White House on Saturday to play golf.

According to several reports, today’s trip to the Trump National Golf Club in Sterling, Virginia, is likely his first outing to one of his private golf courses since early March. However, during the two “working weekends” the president spent at Camp David in May, it is unknown whether or not he played golf.

Trump going golfing is consistent with his reopen theme that he’s been pushing of late, but it still shows a tone-deafness and a lack of empathy. The U.S. pandemic death toll is approaching 100,000, and on top of that it’s Memorial Day weekend, a solemn occasion meant for tributes to Americans lost at war.

Trump’s work ethic hypocrisy is also on display here. Months before he would announce his candidacy for president of the United States, Trump was in full birther mode as he made several rounds on various cable news programs and talk shows attempting to delegitimize America’s first black president, Barack Obama. But when he took a pause from his factless racist attacks, he’d instead take issue with Obama’s penchant for hitting the links.

And of course, this wouldn’t be a Trump controversy without the “there’s always a tweet” meme because astonishingly, there always is.

In October of 2014, Trump tweeted that Obama was being derelict in his duties as a sitting president because he was golfing, writing, “Can you believe that, with all of the problems and difficulties facing the U.S., President Obama spent the day playing golf. Worse than Carter.”

And then again that same month Trump bashed Obama. But this time it wasn’t only about the former president golfing but golfing during a health crisis. You can’t make this stuff up.

“President Obama has a major meeting on the NYC Ebola outbreak, with people flying in from all over the country, but decided to play golf!” Trump tweeted.

Trump, as a phone-in guest on Fox News in 2014, spoke about Obama playing golf when, according to CNN’s Andrew Kaczynski, at the time there were two Ebola cases in the U.S.

“When you’re president, you sorta say, ‘I’m gonna give [golf] up for a couple of years and really focus on the job,’” Trump said. “It sends the wrong signal.”

And in 2016, then-candidate Trump said, “I’m going to be working for you. I’m not going to have time to go play golf.”

Well, so much for that.

e-max.it: your social media marketing partner
 
FOCUS: On Memorial Day: How the US Lost Its "Battle of Aqaba" to the Coronavirus Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=51519"><span class="small">Juan Cole, Informed Comment</span></a>   
Monday, 25 May 2020 11:06

Cole writes: "On Memorial Day, we have nearly 100,000 dead in the coronavirus pandemic and 38 million abruptly unemployed, we have entire US industries hanging on by a thread."

Konar Province, 2010. (Moises Saman/Magnum Photos)
Konar Province, 2010. (Moises Saman/Magnum Photos)


On Memorial Day: How the US Lost Its "Battle of Aqaba" to the Coronavirus

By Juan Cole, Informed Comment

25 May 20

 

n July 6, 1917, Auda Abu Tayy led his Howeitat tribesmen in a successful attack on the Ottoman port of Aqaba in what is now Jordan but was then the Ottoman Empire. The Arabs of the Hejaz or Western Arabia and the Transjordan had allied with the British to revolt against their Ottoman government in return for a promise from London to support them in achieving an independent Arab state after the war.

Britain went to war with the Ottomans because the latter allied with Austria and Germany against Russia (Istanbul was way more afraid of the Russians than any other Power, especially after the Russian drive on Istanbul in 1877-78). 

Auda was advised by a British intelligence officer and former archeologist, T. E. Lawrence, who later rather exaggerated the importance of his own role in the Arab uprising. At Aqaba, Lawrence did not distinguish himself when he accidentally shot his own camel in the back of the head and was nearly killed.

So why did the 300-man-strong Ottoman garrison at Aqaba fall so easily to Auda’s irregulars?

The Ottomans had set their artillery in concrete pylons and pointed them out to the Gulf of Aqaba, from which they feared a naval assault. They therefore could not wheel the big guns around and fire at the attacking Bedouin. They just couldn’t imagine that a threat to the garrison and the port would come from inside Ottoman territory.

It is sort of the way the US invested bigtime in the “Global War on Terror.”

In the meantime, a thin strip of RNA was gunning for us and would establish itself to the rear of our military front lines. Had we spent trillions on coronavirus vaccines, on a single-payer health care system and on the network of country health departments across the country, we would not be in our present straits.

As of last year this time, 6,967 U.S. servicemen and women had died during Global War on Terror and Overseas Contingency Operation actions. The Congressional Research Service writes, “Some 52,802 had been wounded. Approximately 62% (36,885) of all war-related incidents that resulted in U.S. military casualties have occurred during operations in Iraq.”

The rest of 2019 and the first five months of 2020 added to the grim totals. In 2019, 17 US soldiers and Marines were killed in Afghanistan and 180 were wounded. This, in a war that began in 2001 and is still going on with no signs of a US victory. 

There are now less than 10,000 US service personnel in Afghanistan, with the number expected to decline to 8,600 by July. This is down from as many as 13,000 on January 1. And, the Trump administration is now pledged to be out entirely by next year this time. Such plans have been made before and been reversed at the last minute. No president wants to preside over the return of the Taliban to power in Kabul, with all the memories of the September 11, 2001 attacks that would evoke. And it just is not clear that the joint government of Ashraf Ghani and Abdullah Abdullah could survive long with no US troops in theater. The Taliban control 10 percent of the country and have a presence in half the provinces. 

The Pushtun Taliban, however, did not carry out the 9/11 attacks; Arab al-Qaeda did, and it isn’t clear that Usama Bin Laden let his hosts know what he had planned. So an equation of the two would be a mistake. The Taliban, and many al-Qaeda, were furious with Bin Laden for bringing down on them the full wrath of the American superpower. Taliban rule would be horrible for the people of Afghanistan and especially the women and the Shiite Hazara (for the latter it might be close to genocidal). But Taliban rule would not necessarily equal a security threat to New York. The whole premise of the war in Afghanistan, America’s longest, that it was part of a Global War on Terror or absolutely necessary to US security was and is false. Afghanistan is weak country and one of the poorest in the world and does not pose a realistic threat to the US. 

Why did the US stay after overturning the Taliban in 2001-2002? Surely Bush wanted to extend the US sphere of influence into oil- and gas- rich Central Asia, and perhaps then secretary of defense Donald Rumsfeld wanted to encircle the Russian Federation to ensure it did not reemerge as a peer rival to the US. 

Those goals had nothing to do with the 9/11 attacks, and were merely imperial overstretch. Bush even pledged to rebuild and modernize Afghanistan, adding on one realistic object to another.

As for Iraq, another US serviceman died in 2019 after the Congressional report and then 7 so far in 2020.

Two of those killed in Iraq this year died at the hands of Iraqis who were furious that Trump had killed prominent Iraqi general Abu Mahdi al-Muhandis in a drone strike on Baghdad on January 3, when he assassinated Iranian general Qasem Soleimani. The Iraqi parliament in 2018 recognized the paramilitary al-Muhandis led as part of a National Guard, so he was an officer of the Iraqi state. Trump’s notion that he could make war on part of the Iraqi military while using US troops to train and support another part is the craziest policy anyone could have come up with. It is directly responsible for two US troop deaths this spring.

Contemplating these nearly 7,000 military deaths, I feel profound sorrow. The majority of them did not need to die. They were not defending the United States. Iraq in 2003 was a poor ramshackle country with no Air Force and not the slightest ability to harm the US. Figures in the Bush administration, including the now-sainted Colin Powell, hinted broadly that then Iraqi strongman Saddam Hussein had had a hand in 9/11. It was the Big Lie, worse than any of the 18,000 Donald J. Trump has told in office.

Worse of all, the United States committed all these trillions of dollars and thousands of servicemen’s lives (not to mention the hundreds of thousands of Iraqis, Afghans and others, including innocent noncombatants), to the wrong struggle. A small, lean, counter-terrorism operation could have dealt with the al-Qaeda threat. There would have been no ISIS had the US not waged an illegal war of aggression on Iraq.

On Memorial Day, we have nearly 100,000 dead in the coronavirus pandemic and 38 million abruptly unemployed, we have entire US industries hanging on by a thread. For the past 20 years Washington has been pointing its big guns out across the Atlantic toward the Middle East and Central Asia in the “Global War on Terror,” spending trillions of dollars and substantial blood countering a tiny network of seedy terrorists and glorying in the acquisition of new spheres of geopolitical interest. Those were our Aqaba artillery. The real threats lay inside the realm, threats of skyrocketing inequality, rising white supremacist extremism, and a Neoliberalism that dismantled public goods like health care for narrow private profit.

Ironically, some states, like Washington, are turning to their National Guard to do contact tracing and to urge individuals exposed to the virus to quarantine. This activity is not without risk. God bless them, and may they win this truly essential war.

e-max.it: your social media marketing partner
 
What Will It Take to Cool the Planet? Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=35861"><span class="small">Bill McKibben, The New Yorker</span></a>   
Sunday, 24 May 2020 12:50

McKibben writes: "Following the lead of Canada, state authorities in North Dakota said last week that they would use some of their covid-19 relief money to employ oil workers to plug abandoned oil wells. That's good and bad."

Thanks to pressure from the Gwich'in First Nation, five of the six biggest U.S. banks have agreed not to finance drilling in the Arctic National Wildlife Refuge. (photo: Christopher Miller/NYT)
Thanks to pressure from the Gwich'in First Nation, five of the six biggest U.S. banks have agreed not to finance drilling in the Arctic National Wildlife Refuge. (photo: Christopher Miller/NYT)


What Will It Take to Cool the Planet?

By Bill McKibben, The New Yorker

24 May 20

 

his week’s newsletter is a little different, in that I mainly want to encourage you to watch a video and then play with a Web site. Both come from the remarkable people at Climate Interactive, a project that grew out of M.I.T.’s Sloan School of Management. I’ve admired the group’s co-directors, Elizabeth Sawin and Andrew Jones, for many years, and watched their En-ROADS simulator grow from fairly crude beginnings into a truly sophisticated and useful model. It allows you to change different variables to see what it would take to reduce greenhouse-gas emissions enough to get us off our current impossible track (screeching toward a world something like four degrees Celsius hotter) and onto the merely miserable heading of 1.5 to two degrees Celsius envisioned in the Paris climate accords.

I pointed out last week that the COVID-19 pandemic has taught us something interesting: even locking down most of the planet didn’t cut emissions as much as we might have thought. (By early April, daily carbon-dioxide emissions decreased by seventeen per cent.) This suggests that a great percentage of the trouble is hardwired into our systems, and not solely a function of our habits and choices. Indeed, the simulator shows that, if you reduce the growth of both populations and economies to the lowest level the programmers considered possible, the planet still warms almost 3.5 degrees Celsius.

But now reset the variables and go into the submenus for coal, gas, and oil, and perform a little experiment: stop building any new infrastructure for these fossil fuels beginning in 2025 and, all of a sudden, you’re at a world that warms only 2.8 degrees Celsius by 2100. That’s why it is such good news, for instance, that New York State last week quashed plans for the Williams natural-gas pipeline across the New York City harbor: if you keep building stuff like this now, it locks in emissions for decades to come, busting our carbon budget. It’s why the climate movement has fought so hard against pipelines and fracking wells and L.N.G. terminals: with ever-cheaper renewable power, when you manage to stop such projects, sun and wind have a chance at filling the vacuum.

And, once you’ve made this basic course change, you can go back to work on other steps that the simulator can model. Stipulate an all-out effort at making buildings and transport more efficient, and cut way back on deforestation—and now you’re at about 2.5 degrees. Figure out some ways to “highly reduce” methane emissions from oil and gas wells, cows, and other sources, and suddenly you’re nearing the two-degree mark.

None of these things are easy, of course. In fact, all of them are very hard. But stopping new infrastructure is possible—it’s basically a battle with the fossil-fuel industry, which, as I’ve been pointing out, is losing financial muscle with each passing week. Last week, according to the Financial Times, in a fascinating interview with Bernard Looney, the C.E.O. of BP, “Looney noted that as crude prices have plunged, renewable energy projects had been able to attract funding, suggesting the pandemic has weakened the investment case for oil. ‘It’s the model that is increasingly respected and admired by investors as being resilient and having a different risk profile,’ he said.”

Passing the Mic

Bernadette Demientieff is the executive director of the Gwich’in Steering Committee, which has been coördinating that First Nation’s fight against plans for oil drilling in the Arctic National Wildlife Refuge. She’s spent much of the past few years visiting with representatives of major banks and asking them not to finance the project, because it would damage the calving grounds of the Porcupine caribou herd and, as a consequence, her community’s way of life. And she’s been successful: among the six biggest American banks, only Bank of America has not agreed to the Gwich’ins’ request.

Could you tell us what the Arctic Refuge is like this time of year—has spring begun to reach the far north?

I would be honored to share the true beauty of the calving grounds of the Porcupine caribou herd. This place right now would be melting and summer on the rise. Animals coming out and appearing all over. Creeks and lakes starting to form beautifully. It’s like nature slowly waking up.

Bank after bank has agreed not to fund drilling in the Arctic these past months. Do you think that will make a difference?

We have been visiting these banks for the past two years, and it was really heartfelt to see that many of them made a commitment to withdraw from going into the Arctic Refuge. Our human rights are being violated, and we will not sit by quietly and allow this to happen.

What do you think people don’t understand about this fight—what message would you most like to get across?

Many people are not aware that this is not just about protecting our polar bears but this is about the indigenous voices being ignored, this is about a whole identity, about a people’s entire way of life being destroyed for profit. We have a spiritual and cultural connection to the Porcupine caribou herd, and we will stand strong in unity for the protection of their calving grounds and the Gwich’in way of life. We are rich in our culture, we are rich in our way of life. Look out across this country and understand this is a prime example of why we continue to fight for protection of these places. These lands, these waters, these animals are our survival.

Many of us will be O.K., because we are survivors, but we don’t only think about ourselves or our people. We think about our human race and all the many American people who deserve a chance at survival. We stand up for our future generations, the ones that do not have a voice yet, and we carry on “in a good way” the love, kindness, and strength of our ancestors.

Climate School

The climate campaigner Jamie Henn—an old colleague—wrote a provocative piece for Common Dreams last week arguing that environmentalists need to do a better job of describing the future world they’d like to build. If Fox News says that the Green New Deal is all about taking away hamburgers, Green New Dealers should respond with a vision of a “cleaner, healthier, freer, fun-er new world. A world where we aren’t choking on smog and exhaust. Where you don’t have to worry about gas leaks or expensive water bills. Where there’s no oil to change, no gaskets to replace, maybe even no car to worry about, because you’ve got a sexy electric bike and free, all-electric transit is just a block or two away.”

For Future Tense (a partnership of Slate, New America, and Arizona State University), David Zipper argues persuasively that cities have a short window—perhaps measured in weeks—to break the reflexive habit of driving cars. The nightmare is that subway-leery commuters will soon be driving. “A recent Vanderbilt study found that Bay Area residents could soon spend an additional 20 to 80 minutes per day stuck in congestion due to a shift away from mass transit. Evidence from China, which is attempting to return to life as usual following extended coronavirus lockdowns, is ominous: In early April, cities like Shenzhen and Guangzhou already had higher levels of rush hour congestion than a year ago.” The dream looks like—well, like these survey results from the U.K., which found that six out of ten Brits want their government to prioritize health and well-being over economic growth even after the pandemic subsides. Doubtless that’s why London continues to amaze with its plans to turn the city center into a zone for bikes, buses, scooters, and pedestrians. In a sign of the times, the staid Financial Times offers a guide for first-time bike buyers.

With hurricane season about to start (and a gun-jumping storm, Arthur, making an appearance off the East Coast), it’s an apt moment for a report from the tech company Morning Consult on how the COVID-19 pandemic could affect coastal-climate resilience around the world. Bottom line: a global recession “will limit the ability of governments, financial institutions, and NGOs to invest in climate resilience solutions,” and, especially in poor regions, the fiscal pressure may be so high that it “threatens to overwhelm public services in many coastal cities.”

Obviously not important in the long run, but a fascinating glimpse into the vagaries of short-term climate forecasting: NASA’s climate chief, Gavin Schmidt, said last month that there is a sixty-per-cent chance that 2020 will be the hottest year on record. Last week, his predecessor, the legendary climate scientist James Hansen, said, “Don’t bet on it.” He forecasts a La Niña chilling of the Pacific, which might keep temperatures below record levels until 2022. Hansen’s excellent Web site also contains chapters from his forthcoming book, “Sophie’s Planet.”

The clean-energy advocate and investor Ramez Naam has been making forecasts of the price of solar power since 2011. Though he was more bullish than almost anyone else about the decline in costs, he now says that he wasn’t bullish enough. “Solar has plunged in price faster than anyone—including me—predicted. And modeling of that price decline leads me to forecast that solar will continue to drop in price faster than I’ve previously expected, and will ultimately reach prices lower than virtually anyone expects. Prices that are, by any stretch of the measure, insanely, world-changingly cheap.” In fact, he predicts that, per kilowatt-hour, “average prices in sunny parts of the world” will be “down to a penny or two by 2030 or 2035.” This would mean that “building new solar would routinely be cheaper than operating already built fossil fuel plants, even in the world of ultra-cheap natural gas we live in now.”

Scoreboard

An own goal: writing last week about the threat of a union leader to violate social-distancing rules in an effort to stop anti-gas ordinances, I managed to omit the link to the story in the Los Angeles Times that first detailed the nastiness. I’m kind of glad for the omission, though, because it allows me to point out the fine work of the reporter in question, Sammy Roth. You can read more of his thinking regularly in the L.A. Times newsletter “Boiling Point”; it’s especially valuable for keeping track of California, which has the world’s fifth-largest economy and is en route to being among its cleanest.

Following the lead of Canada, state authorities in North Dakota said last week that they would use some of their COVID-19 relief money to employ oil workers to plug abandoned oil wells. That’s good and bad: good that these people will get to do this necessary work; bad that the taxpayers are footing the bill, instead of the energy companies that made big profits doing the original damage.

The tiny Pacific island of Niue has been designated the world’s first “dark sky” country by astronomers. Niue’s willingness to replace outdoor lighting with low-glow L.E.D.s won’t just preserve the splendor of the Milky Way; it will also make life a lot easier for wildlife. “In areas brightly lit at night, turtles can’t find the ocean, birds become disoriented while flying, and clownfish don’t hatch,” an Australian researcher told the Web site Mongabay. “It can also affect the mass-spawning event of many reef-building corals.”

In a potentially huge breakthrough for energy storage, a Minnesota utility supplier has signed a contract for a pilot project with a Bill Gates-backed battery manufacturer, Form Energy, which says that its product can provide a hundred and fifty hours of full-power-capacity backup, a big improvement on the current standard of about four hours.

The University of California finished the job of divesting its hundred-and-twenty-six- billion-dollar portfolio from fossil fuels. As the L.A. Times reported, the chief investment officer said that “his team is convinced that investments in fossil fuels pose an ‘unacceptable financial risk,’ particularly with ‘geopolitical tensions and likely, a bumpy and slow global financial recovery in a post-pandemic world.’ ”

And at the JPMorgan Chase annual shareholder’s meeting, campaigners came breathtakingly close—49.6 per cent of the vote—to forcing the company, according to Reuters, to report on “whether and how it will align its business lending” with the temperature targets set in the Paris climate accords. As Reuters noted, “traditionally shareholder measures that receive more than 30% of support usually push companies to make at least some changes to assuage investor concerns.” Certainly the heat is on: two members of the Rockefeller family, which has historic ties to the bank, joined New York City comptroller Scott Stringer in writing an op-ed in the Daily News on the day of the vote, saying that the company “needs to move away from financing the dirty fossil fuels of the past and toward the big, strategic clean energy investments of the future.”

Warming Up

Blake Mills is a virtuoso guitarist and a producer who’s worked with, among others, Alabama Shakes. His new single, “Summer All Over,” was released in time for Earth Day. It’s a reminder that a “summer song” on an overheating planet doesn’t necessarily mean a good-times anthem.

e-max.it: your social media marketing partner
 
FOCUS: Since I Met Edward Snowden, I've Never Stopped Watching My Back Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=54451"><span class="small">Barton Gellman, The Atlantic</span></a>   
Sunday, 24 May 2020 11:38

Gellman writes: "What time exactly does your clock say?" asked the voice on the telephone, the first words Edward Snowden ever spoke to me aloud. (Our previous communications had all been via secure text chats over encrypted anonymous links on secret servers.)"

Whistleblower Edward Snowden. (photo: Platon)
Whistleblower Edward Snowden. (photo: Platon)


Since I Met Edward Snowden, I've Never Stopped Watching My Back

By Barton Gellman, The Atlantic

24 May 20


After receiving a trove of documents from the whistleblower, I found myself under surveillance and investigation by the U.S. government.

hat time exactly does your clock say?” asked the voice on the telephone, the first words Edward Snowden ever spoke to me aloud. (Our previous communications had all been via secure text chats over encrypted anonymous links on secret servers.) I glanced at my wrist—3:22 p.m. “Good. Meet me exactly at four. I’ll be wearing a backpack.” Of course he would; Snowden would never leave his laptop unattended.

The rendezvous point Snowden selected that day, December 5, 2013, was a gaudy casino hotel called the Korston Club, on Kosygina Street in Moscow. Enormous flashing whorls of color adorned the exterior in homage to Las Vegas. In the lobby, a full-size grand player piano tinkled with energetic pop. The promenade featured a “Girls Bar” with purple-neon decor, stainless-steel chairs and mirrors competing for attention with imitation wood paneling, knockoff Persian rugs, and pulsing strobe lights on plastic foliage. Also, feathers. The place looked like a trailer full of old Madonna stage sets that had been ravaged by a tornado.

As I battled sensory overload, a young man appeared near the player piano, his appearance subtly altered. A minder might be anywhere in this circus of a lobby, but I saw no government escort. We shook hands, and Snowden walked me wordlessly to a back elevator and up to his hotel room. For two days, throughout 14 hours of interviews, he did not once part the curtains or step outside. He remained a target of surpassing interest to the intelligence services of more than one nation.

He resisted questioning about his private life, but he allowed that he missed small things from home. Milkshakes, for one. Why not make your own? Snowden refused to confirm or deny possession of a blender. Like all appliances, blenders have an electrical signature when switched on. He believed that the U.S. government was trying to discover where he lived. He did not wish to offer clues, electromagnetic or otherwise. U.S. intelligence agencies had closely studied electrical emissions when scouting Osama bin Laden’s hideout in Pakistan. “Raising the shields and lowering the target surface” was one of Snowden’s security mantras.

On bathroom breaks, he took his laptop with him. “There’s a level of paranoia where you go, ‘You know what? This could be too much,’?” he said when I smiled at this. “But it costs nothing. It’s—you get used to it. You adjust your behavior. And if you’re reducing risk, why not?”

Over six hours that day and eight hours the next, Snowden loosened up a bit, telling me for the first time why he had reached out to me the previous spring. “It was important that this not be a radical project,” he said, an allusion to the politics of Glenn Greenwald and Laura Poitras, the other two journalists with whom he’d shared digital archives purloined from the National Security Agency a few months earlier. “I thought you’d be more serious but less reliable. I put you through a hell of a lot more vetting than everybody else. God, you did screw me, so I didn’t vet you enough.” He was referring to my profile of him in The Washington Post that June, in which I had inadvertently exposed an online handle that he had still been using. (After that he had disappeared on me for a while.)

When we broke for the night, I walked into a hotel stairwell and down two floors, where I found an armchair in a deserted hallway. I might or might not have been under surveillance then, but I had to assume I would be once back in my room, so this was my best chance to work unobserved.

I moved the audio files from the memory card of my voice recorder to an encrypted archive on my laptop, along with the notes I had typed. I locked the archive in such a way that I could not reopen it without a private electronic key that I’d left hidden back in New York. I uploaded the encrypted archive to an anonymous server, then another, then a third. Downloading it from the servers would require another private key, also stored in New York. I wiped the encrypted files from my laptop and cut the voice recorder’s unencrypted memory card into pieces. Russian authorities would find nothing on my machines. When I reached the U.S. border, where anyone can be searched for any reason and the warrant requirement of the Fourth Amendment does not apply, I would possess no evidence of this interview. Even under legal compulsion, I would be unable to retrieve the recordings and notes in transit. I hoped to God I could retrieve them when I got home.

Were my security measures excessive? I knew the spy agencies of multiple governments—most notably the United States’—were eager to glean anything they could from Edward Snowden. After all, he had stolen massive amounts of classified material from NSA servers and shared it with Poitras, Greenwald, and me, and we had collectively published only a fraction of it. The U.S. government wanted Snowden extradited for prosecution. But I’m not a thief or a spy myself. I’m a journalist. Was I just being paranoid?

Six months earlier, in June 2013, when the Snowden story was less than two weeks old, I went on Face the Nation to talk about it. Afterward, I wiped off the television makeup, unclipped my lapel microphone, and emerged into a pleasant pre-summer Sunday outside the CBS News studio in the Georgetown neighborhood of Washington, D.C. In the back of a cab I pulled out my iPad. The display powered on, then dissolved into static and guttered out. Huh? A few seconds passed and the screen lit up again. White text began to scroll across an all-black background. The text moved too fast for me to take it all in, but I caught a few fragments.

# root:xnu …

# dumping kernel …

# patching file system …

Wait, what? It looked like a Unix terminal window. The word root and the hashtag symbol meant that somehow the device had been placed in super-user mode. Someone had taken control of my iPad, blasting through Apple’s security restrictions and acquiring the power to rewrite anything that the operating system could touch. I dropped the tablet on the seat next to me as if it were contagious. I had an impulse to toss it out the window. I must have been mumbling exclamations out loud, because the driver asked me what was wrong. I ignored him and mashed the power button. Watching my iPad turn against me was remarkably unsettling. This sleek little slab of glass and aluminum featured a microphone, cameras on the front and back, and a whole array of internal sensors. An exemplary spy device.

I took a quick mental inventory: No, I had not used the iPad to log in to my online accounts. No, I didn’t keep sensitive notes on there. None of that protected me as much as I wished to believe. For one thing, this was not a novice hacking attempt. Breaking into an iPad remotely, without a wired connection, requires scarce and perishable tools. Apple closes holes in its software as fast as it finds them. New vulnerabilities are in high demand by sophisticated criminals and intelligence agencies. Shadowy private brokers pay millions in bounties for software exploits of the kind I had just seen in action. Someone had devoted resources to the project of breaking into my machine. I did not understand how my adversary had even found the iPad. If intruders had located this device, I had to assume that they could find my phone, too, as well as any computer I used to access the internet. I was not meant to see the iPad do what it had just done; I had just lucked into seeing it. If I hadn’t, I would have thought it was working normally. It would not have been working for me.

This was the first significant intrusion into my digital life—that I knew of. It was far from the last. In the first days of 2014, an NSA whistleblower, Tom Drake, told me he had received an invitation from one of my email addresses, asking him to join me for a chat in Google Hangouts. It looked exactly like an authentic notice from Google, but Drake had the presence of mind to check whether the invitation had really come from me. It had not. An impostor posing as me wanted to talk with Drake.

Shortly after that, Google started refusing my login credentials on two accounts. An error message popped up in my mail client: “Too many simultaneous connections.” I looked under the hood and found that most of the connections came from IP addresses I did not recognize. On the Gmail page, a pink alert bar appeared at the top, reading, “Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer. Protect yourself now.”

Which state sponsor? Per company policy, Google will not say, fearing that information could enable evasion of its security protocols. I did some further reporting and later learned from confidential sources that the would-be intruder in my accounts was Turkey’s national intelligence service, the Millî Istihbarat Te?kilat?. Even though I never send anything confidential over email, this was terrible news. A dozen foreign countries had to have greater motive and wherewithal to go after the NSA documents Snowden had shared with me—Russia, China, Israel, North Korea, and Iran, for starters. If Turkey was trying to hack me too, the threat landscape was more crowded than I’d feared. Some of the hackers were probably better than Turkey’s—maybe too good to be snared by Google’s defenses. Not encouraging.

The MacBook Air I used for everyday computing seemed another likely target. I sent a forensic image of its working memory to a leading expert on the security of the Macintosh operating system. He found unexpected daemons running on my machine, serving functions he could not ascertain. (A daemon is a background computing process, and most of them are benign, but the satanic flavor of the term seemed fitting here.) Some software exploits burrow in and make themselves very hard to remove, even if you wipe and reinstall the operating system, so I decided to abandon the laptop.

For my next laptop, I placed an anonymous order through the university where I held a fellowship. I used two cutouts for the purchase, with my name mentioned nowhere on the paperwork, and I took care not to discuss the transaction by email. I thought this would reduce the risk of tampering in transit—something the NSA, the FBI, and foreign intelligence services are all known to have done. (No need to hack into a machine if it comes pre-infected.) But my new laptop, a MacBook Pro, also began to experience cascading hardware failures, beginning with a keyboard that lagged behind my typing, even with a virgin operating system. The problems were highly unusual.

I brought the machine for repair to Tekserve, a New York City institution that at the time was the largest independent Apple service provider in the United States. I had been doing business there since at least the early 1990s, a couple of years after Tekserve set up shop in a Flatiron warehouse space. I liked the quirky vibe of the place, which had a porch swing indoors and an ancient Coke machine that once charged a nickel a bottle. But Tekserve’s most important feature was that its service manager allowed me to stand with a senior technician on the repair floor as he worked on my machine. I preferred not to let it out of my sight.

The technician tested and swapped out, seriatim, the keyboard, the logic board, the input/output board, and, finally, the power interface. After three visits, the problem remained unsolved. Keystrokes would produce nothing at first, then a burst of characters after a long delay. Tekserve consulted with supervisors at Apple. Nobody could explain it. I asked the technician whether he saw anything on the circuit boards that should not be there, but he said he was not equipped to detect spy gear like that. “All I know is I’ve replaced every single part in the machine,” he told me. “We’ve never seen this kind of behavior before.” I gave up and got another one.

When the Snowden story broke, I was using a BlackBerry smartphone. I began to receive blank text messages and emails that appeared to have no content and no reply address. Texts and emails without visible text are commonly used to transmit malicious payloads. I got rid of the BlackBerry and bought an iPhone, which experts told me was the most secure mobile device available to the general public. I do not do sensitive business on a smartphone, but I did not like the feeling of being watched.

In January 2014, I became an early adopter of SecureDrop, an anonymous, encrypted communications system for sources and journalists. It is still the safest way to reach me in confidence, and I have received valuable reporting tips this way. Having advertised a way to reach me anonymously, I’ve also gotten my share of submissions from internet trolls and conspiracy theorists, as well as run-of-the-mill malware. I never run executable files or scripts that arrive by email, so these were not a big concern. One day, however, a more interesting exploit showed up—a file disguised as a leaked presentation on surveillance. I asked Morgan Marquis-Boire, a security researcher then affiliated with the Toronto-based Citizen Lab, if he would care to have a look. “You’ve got a juicy one,” he wrote back.

Most hacking attempts are sent to thousands, or millions, of people at a time, as email attachments or links to infected websites. This one was customized for me. It was a class of malware known as a “remote access trojan,” or RAT, capable of monitoring keystrokes, capturing screenshots, recording audio and video, and exfiltrating any file from my computer. “Piss off any Russians lately?” Marquis-Boire asked. The RAT was designed to link my computer to a command-and-control server hosted by Corbina Telecom, in Moscow. If I had triggered the RAT, a hacker could have watched and interacted with my computer in real time from there. Other IP addresses the malware communicated with were in Kazakhstan. And internal evidence suggested that the coder was a native speaker of Azeri, the language of Azerbaijan and the Russian republic of Dagestan. But the moment Marquis-Boire tried to probe the RAT for more information, the command-and-control server disappeared from the internet.

Overtures of another kind came to my colleague Ashkan Soltani soon after his byline appeared alongside mine in The Washington Post. “Within the span of a week, three hot, really attractive women messaged me out of the blue” on OkCupid, he later told me over beers. Two of the women made their intentions known right away.

He pulled out screenshots of their messages. “Excuse my brazen demeanor but i find you incredibley cute and interesting,” one of them wrote. “Let’s meet up?”

Then, on the day they set, she proposed getting together at his place. “It’s gloomy out. makes me want to cuddle,” she wrote.

“The fact that two girls in a row were making themselves available on the first date, I was like, What the fuck?” he told me. “Am I being, what—there’s a word for that—”

“Honey trapped,” I said.

“Yeah, honey trapped. I do okay, but it usually involves going out on a couple dates or whatever,” he said. “I don’t think I’m a bad-looking guy, but I’m not the kind of guy women message out of the blue and invite me to cuddle.” He decided to cancel.

Soltani suspected an intelligence-agency setup—“the Chinese government trying to get up on me”—in an effort to elicit information about the NSA documents, or to steal digital files. A well-known information-security attack known as the “evil maid” relies on brief physical access to a computer to steal its encryption credentials. As it happened, the Snowden files were at that time locked in a Washington Post vault, and kept separate from the electronic keys that allowed access to them, but outsiders would not know that. And an attractive spy might assume that, with the right enticements, anything was possible.

When Soltani returned to OkCupid to document these interactions in more detail, he searched for the two women who had pursued him so aggressively. Their online profiles no longer existed.

Soltani did go out with the third woman who had reached out to him around the same time, “but for the longest time I would not bring her back to my house,” he said. “I wasn’t comfortable. I remember that feeling. I would never leave my phone when I went to the bathroom. It’s weird to have opsec when you’re dating.”

By the time we had this conversation, in the late fall of 2015, Soltani and I had stopped writing stories for the Post. I was working on a book. Soltani had moved on to other things. He had retired his old laptop, returned an encryption key fob to me, and shed his last connection to classified materials. “When we were wrapping up, it felt really good that I didn’t have to carry this burden anymore,” he told me. “I mean, from the perspective of the duty to protect this stuff—there’s still stuff in there that I think should absolutely never see light of day.”

“You still constantly have to be diligent,” he said to me. “You’ve been doing it for, like, three years. How do you do on vacation?”

Well, about that. Preoccupation with surveillance had distorted my professional and personal life. I had balked at the main gate of Disney World when I realized I would have to scan a fingerprint and wear a radio-tagged wristband everywhere in the park. My partner, Dafna, standing with our 7-year-old son, dared me with her eyes to refuse. I caved, of course. I brought my laptop almost everywhere I went, even on beach and hiking trips. I refused to leave my bag at coat checks at parties. The precautions I took to protect my electronics inconvenienced my friends and embarrassed my family. “You’re moving further and further into a world that I’m not a part of, and that I don’t understand and I don’t want to be a part of,” Dafna said one night. I had not come to terms, until that moment, with how abnormal my behavior had become. I never felt safe enough.

I built ever-thicker walls of electronic and physical self-defense. At one point in the spring of 2013, I requested a dedicated locked room at the Post for use by the reporters who worked with the Snowden documents. On a subsequent visit, a facilities staff member proudly showed me and Soltani the new space, in a place of honor beside the company president’s office. The room had one feature I had specifically asked to avoid: a wall full of windows. If you craned your neck you could see a beaux-arts mansion half a block to the west—the Russian ambassador’s residence in Washington. “You have to be kidding me,” Soltani said. Crestfallen, I asked for a windowless space. The Post found one, installed a high-security lock, put a video camera in the hall outside, and brought in a huge safe that must have weighed 400 pounds.

I acquired a heavy safe for my office in New York as well. I will not enumerate every step I took to keep my work secure, but they were many and varied and sometimes befuddled me. The computers we used for the NSA archive were specially locked down. Soltani and I used laptops from which we’d removed the Wi-Fi and Bluetooth hardware, and disconnected the batteries. If a stranger appeared at the door, we merely had to tug on the quick-release power cables to switch off and re-encrypt the machines instantly. We stored the laptops in the vault and kept encryption keys on hardware, itself encrypted, that we took away with us each time we left the room, even for bathroom breaks. We sealed the USB ports. I disconnected and locked up the internet-router switch in my New York office every night. I dabbed epoxy and glitter on the screws along the bottom of all my machines, to help detect tampering in my absence. (The glitter dries in unique, random patterns.) A security expert had told me that detection of compromise was as important as prevention, so I experimented with ultraviolet powder on the dial of my safe in New York. (Photographing dust patterns under a UV flashlight beam turns out to be messy.) I kept my digital notes in multiple encrypted volumes, arranging the files in such a way that I had to type five long passwords just to start work every day.

At a farewell party for Anne Kornblut, who oversaw the Post’s Snowden coverage, my colleagues put on a skit that purported to depict our story meetings. The reporter Carol Leonnig, playing the role of Anne, pulled out blindfolds for everyone in the pretend meeting. They had to cover their eyes, she explained, before Bart could speak. Funny and fair, I had to admit. I was a giant pain in the ass.

But I felt I had to be, and my fear was that any single barrier could be breached. A friend who runs a lock and safe company told me that an expert safecracker could break into just about any commercial vault in less than 20 minutes. Intelligence agencies have whole departments working on how to stealthily circumvent barriers and seals. Special antennae can read the emanations of a computer monitor through walls. Against adversaries like this, all I could do was make myself a less appealing target. I layered on so many defenses that navigating through them became a chronic drain on my time, mental energy, and emotional equilibrium.

Years later Richard Ledgett, who oversaw the NSA’s media-leaks task force and went on to become the agency’s deputy director, told me matter-of-factly to assume that my defenses had been breached. “My take is, whatever you guys had was pretty immediately in the hands of any foreign intelligence service that wanted it,” he said, “whether it was Russians, Chinese, French, the Israelis, the Brits. Between you, Poitras, and Greenwald, pretty sure you guys can’t stand up to a full-fledged nation-state attempt to exploit your IT. To include not just remote stuff, but hands-on, sneak-into-your-house-at-night kind of stuff. That’s my guess.” Because I’d been one of Snowden’s principal interlocutors, Ledgett told me he was sure there was “a nice dossier” on me in both Russia and China.

“If some of those services want you, they’re going to get you. As an individual person, you’re not going to be able to do much about that.”

On January 29, 2014, James Clapper, then the director of national intelligence, sat down at a Senate witness table to deliver his annual assessment of worldwide threats, covering the gravest dangers facing the United States. He did not open his remarks with terrorism or nuclear proliferation or Russia or China. He opened with Edward Snowden, and within a few words he was quoting one of my stories. “Snowden claims that he’s won and that his mission is accomplished,” Clapper said. “If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed, to prevent even more damage to U.S. security.”

I pretty much stopped listening after the word accomplices. This was not an off-the-cuff remark. It was prepared testimony on behalf of the Obama administration, vetted across multiple departments, including Justice. Accomplice has a meaning in criminal law.

“I had in mind Glenn Greenwald or Laura Poitras,” Clapper told me years later. “They conspired with him, they helped him in protecting his security and disseminating selectively what he had, so to me they are co-conspirators.”

“I wouldn’t distinguish myself categorically from them,” I said.

“Well, then maybe you are too. This is the whole business about one man’s whistleblower is another man’s spy.”

I asked Clapper whether I was a valid counterintelligence target.

“Theoretically you could be,” Clapper said. “Given how Snowden is viewed by the intelligence community, someone who’s in league with him, conspiring with him, that’s a valid counterintelligence—and for that matter law-enforcement—target.”

Twice in February 2014, George Ellard, then the NSA inspector general, referred to journalists on the story as Snowden’s “agents.” We had done more damage, he said at a Georgetown University conference, than the notorious FBI traitor Robert Hanssen, who’d helped Soviet security services hunt down and kill U.S. intelligence assets.

It became a running joke among U.S. officials that Bart Gellman should watch his back. In May 2014, I appeared on a panel alongside Robert Mueller, the former FBI director, to talk about Snowden. Mueller cross-examined me: Were the NSA documents not lawfully classified? Were they not stolen? Did I not publish them anyway? I held out my arms toward him, wrists together, as if for handcuffs. The audience laughed. Mueller did not.

I know perfectly well that government agencies prefer not to read their secrets on the front page. Sometimes they resent a story enough to investigate. How in the blazes did the reporter find that out? In serious cases maybe the Justice Department steps in. I knew all that—but despite years of reporting on government secrets, I had not often experienced it personally. So, in the summer of 2013, when I came across my own name in the NSA archive Snowden had shared with me, I gawped at the screen and bit back an impulse to swear.

The document with my name on it was part of an NSA memo for the attorney general of the United States about “unauthorized disclosures … of high-level concern to U.S. policy makers,” referring in part to three Washington Post stories of mine about an intelligence operation gone wrong in the aftermath of the Gulf War. Reading the Snowden files, I learned that my reporting had been referred to the Justice Department for criminal investigation in early 1999. The FBI had been put on the case. I’d had no inkling at the time. How much did the bureau find out about me and my confidential sources? The memo did not say. No harm, as far as I knew, had come to my sources, but I realized that for some I could not really say. It had been a long time.

The most intriguing part of the memo was the framing of the harm that the NSA ascribed to my stories. “Press leaks could result in our adversaries implementing Denial and Deception (D&D) practices,” the agency wrote. If adversaries know how the United States spies on them, in other words, they can do a better job of covering their tracks. That is a legitimate concern. But good journalism sometimes exposes deception by the U.S. government itself—not only in tradecraft but in matters of basic policy and principle.

One whole folder in the Snowden archive was devoted not to foreign spies but to journalists and the people who gave us information. The memos and slide decks laid out the grave dangers posed by news reporting. They also sketched the beginnings of a plan to do something about it: Every file in the folder mentioned a cryptonym that seemed to be the cover name for an effort to track and trace journalistic leaks.

The first time I heard the name firstfruits, years before the Snowden leak, a confidential source told me to search for it on the internet. All I turned up were ravings on blogs about spooky plots. The George W. Bush administration, according to these accounts, had an off-the-books spying program akin to the work of the East German Stasi. firstfruits allegedly listened in on journalists, political dissenters, members of Congress, and other threats to the globalist order. In some versions of the story, the program marked its victims for arrest or assassination. As best I could tell, these stories all traced back to a series of posts by a man named Wayne Madsen, who has aptly been described as “a paranoid conspiracy theorist in the tradition of Alex Jones.” I did a little bit of reading in these fever swamps and concluded that firstfruits was a crank’s dark fantasy.

Then came the day I found my name in the Snowden archive. Sixteen documents, including the one that talked about me, named firstfruits as a counterintelligence database that tracked unauthorized disclosures in the news media. According to top-secret briefing materials prepared by Joseph J. Brand, a senior NSA official who was also among the leading advocates of a crackdown on leaks, firstfruits got its name from the phrase the fruits of our labor. “Adversaries know more about SIGINT sources & methods today than ever before,” Brand wrote. Some damaging disclosures came from the U.S. government’s own official communications, he noted; other secrets were acquired by foreign spies. But “most often,” Brand wrote, “these disclosures occur through the media.” He listed four “flagrant media leakers”: the Post, The New York Times, The New Yorker, and The Washington Times. The firstfruits project aimed to “drastically reduce significant losses of collection capability” at journalists’ hands.

In NSA parlance, exposure of a source or method of surveillance is a “cryptologic insecurity.” If exposure leads to loss of intelligence collection, that is “impairment.” I was fully prepared to believe that some leaks cause impairment, but Brand’s accounting—like many of the government’s public assertions—left something to be desired.

By far the most frequent accusation invoked in debates about whether journalists cause “impairment” to the U.S. government is that it was journalists’ fault that the U.S. lost access to Osama bin Laden’s satellite-phone communications in the late 1990s. It is hard to overstate the centrality of this episode to the intelligence community’s lore about the news media. The accusation, as best as I can ascertain, was first made publicly in 2002 by then–White House Press Secretary Ari Fleischer. After a newspaper reported that the NSA could listen to Osama bin Laden on his satellite phone, as Fleischer put it, the al?Qaeda leader abandoned the device. President Bush and a long line of other officials reprised this assertion in the years to come.

But the tale of the busted satellite-phone surveillance is almost certainly untrue. The story in question said nothing about U.S. eavesdropping. And one day before it was published, the United States launched barrages of cruise missiles against al?Qaeda training camps in Afghanistan and a factory in Sudan, including a facility that bin Laden had recently visited. After this, bin Laden went deep underground, forswearing electronic communications that might give his location away. Blaming a news story for this development, rather than a close miss on bin Laden’s life, strained all logic. Yet somehow it became an article of faith in the intelligence community.

In 2001, according to Brand’s NSA documents, the agency “stood up” a staff of leak trackers, and the CIA director hired a contractor “to build [a] foreign knowledge database”—firstfruits. One of its major purposes was to feed information about harmful news stories to the “Attorney General task force to investigate media leaks.”

The firstfruits project produced 49 “crime reports to DOJ,” three of them involving me. The FBI, in turn, was left with a conundrum. What crime, exactly, was it being asked to investigate? Congress has never passed a law that squarely addresses unauthorized disclosures to reporters by public officials. The United States has no counterpart to the United Kingdom’s Official Secrets Act. Government employees sign a pledge to protect classified information; if they break that pledge, they can lose their security clearance or their job. Those are civil penalties. When it comes to criminal law, they may be subject to charges of theft or unlawful possession of government property. The nearest analogy in the law, however, and the charge most commonly prosecuted in such cases, is espionage.

Some people will see a kind of sense in that. A secret has been spilled, and damage potentially done. From the NSA’s point of view, a loss is a loss, regardless of whether a foreign adversary learns the secret from a spy or a published news report. Before the disclosure, the NSA had a valuable source or method. Afterward, it does not.

But in other ways, espionage is a terrible fit for a news-media leak. Talking to a journalist is hardly tantamount to spying. Spies steal American secrets on behalf of some other country. They hope our government, and the general public, never learn of the breach. They intend, as the Espionage Act defines the crime, for the information “to be used to the injury of the United States or to the advantage of [a] foreign nation.” News sources, on the other hand, give information to reporters for the purpose of exposure to the public at large. They want everyone to know. They may have self-interested motives, but they commonly believe, rightly or wrongly, that their fellow citizens will benefit from the leak.

Yes, news sources have on occasion been tried and convicted of espionage—but in general forcing a whistleblower into the mold of a spy is disfiguring. If news is espionage, then George Ellard is right to call me an “agent” of the adversary, and James Clapper is right to call me an “accomplice.” From that basis, deploying the government’s most intrusive counterintelligence powers against a journalist is but a short step.

I’ve thought a lot over the years about what the public’s “right to know” is in the context of national security. Clearly there are circumstances in which the careful journalistic disclosure of certain classified facts is the right thing to do.

What if the U.S. government deliberately exposed American troops to nuclear radiation in order to learn more about the medical effects? That really happened after World War II, and the public didn’t learn about it until 1994. If reporters had known the truth in the ’40s and ’50s, should they have suppressed it?

What about if the U.S. government deliberately infected sex workers in Guatemala with gonorrhea and syphilis? That happened too, in wildly unethical experiments from 1946 to 1948, which the government did not fully acknowledge until 2010.

What if a classified military investigation found “numerous incidents of sadistic, blatant, and wanton criminal abuses” against foreign detainees, in violation of the Geneva Conventions and the Uniform Code of Military Justice? That happened at the Abu Ghraib prison in 2003. Much the same sequence of events, with classification stamps employed to conceal information that public officials could not or did not wish to justify, took place after the government tortured al?Qaeda suspects in secret prisons, authorized warrantless surveillance of U.S. citizens, and lied about intelligence on weapons of mass destruction in Iraq. These were history-making events, full of political and legal repercussions, but they were hidden from public scrutiny until news stories broke through barriers of classification.

At heart, national-security secrecy presents a conflict of core values: self-government and self-defense. If we do not know what our government is doing, we cannot hold it accountable. If we do know, our enemies know too. That can be dangerous. This is our predicament. Wartime heightens the case for secrecy because the value of security is at its peak. But secrecy is never more damaging to self-government than in wartime, because making war is the very paradigm of a political choice.

But our government clearly doesn’t see it that way. Here are some facts I’ve learned, through Freedom of Information Act requests and a lawsuit I filed to enforce them, about various government actions that involve me. The Office of the Director of National Intelligence said it had completely withheld 435 documents about me, but its explanation was classified and my lawyers at the Reporters Committee for Freedom of the Press were not allowed to read it. Homeland Security personnel, I learned from one document, had produced a 76-page report of every international flight I’d taken since 1983. Customs inspectors had secretly searched my checked baggage when I returned from more than one overseas reporting trip. The reasons for and results of those searches were redacted. Hundreds of emails recorded behind-the-scenes reactions and internal debates about how to respond to my questions or stories. The government asked the court to withhold all of those on grounds of deliberative privilege.

I learned something else by way of FOIA. It turned out, according to internal government correspondence I received in the course of my lawsuit, that government spokesmen were forwarding my emails to the FBI. The NSA public-affairs shop subsumed its work entirely to law enforcement. The spokesmen did not even have to be asked. They volunteered. “Below please find correspondence between reporter Bart Gellman and NSA & ODNI public affairs,” a senior intelligence official, whose name is redacted in the FOIA release, wrote on December 21, 2013, to a manager in the Office of the National Counterintelligence Executive, or NCIX. “In the email, Gellman references conversations he has with Edward Snowden … Are these emails useful for NCIX?”

The manager replied, “Yes, these types of correspondence are useful. We will ensure they get to the FBI investigations team.”

According to an affidavit from David M. Hardy, the section chief in the FBI’s Information Management Division, my name appears in files relating to “investigations of alleged federal criminal violations and counterterrorism, counterintelligence investigations of third party subjects.” Not only the Snowden case, that is—investigations and third-party subjects, plural. Some of those files, Hardy said, may appear in an electronic-surveillance database that includes “all persons whose voices have been monitored.” Turns out I wasn’t being paranoid.

Equally unsettling were the redactions themselves and the reasons given for them. Even the names of the FBI files, Hardy told the court, would give too much away. The file names specify “non-public investigative techniques” and “non-public details about techniques and procedures that are otherwise known to the public.” The FBI is especially concerned about protecting one unspecified intelligence-gathering method. “Its use in the specific context of this investigative case is not a publically known fact,” Hardy wrote. The bureau wants to protect “the nature of the information gleaned by its use.”

Those are not comforting words.

e-max.it: your social media marketing partner
 
<< Start < Prev 471 472 473 474 475 476 477 478 479 480 Next > End >>

Page 476 of 3432

THE NEW STREAMLINED RSN LOGIN PROCESS: Register once, then login and you are ready to comment. All you need is a Username and a Password of your choosing and you are free to comment whenever you like! Welcome to the Reader Supported News community.

RSNRSN