Walter Pincus: That made Kim’s the second guilty plea (Sachtleben the first guilty plea) in leak cases in which Justice obtained journalists’ telephone records and e-mails to win indictments.






●Last week, intelligence officials tried to explain during a House hearing Snowden’s damage to national security, while acknowledging that they still don’t know all of what he took and distributed to documentary producer Laura Poitras, journalists Glenn Greenwald and Barton Gellman, and possibly others.

●On Friday, former State Department contractor Stephen J. Kim pleaded guilty to providing information to a Fox News reporter in 2009 from an intelligence report about North Korea marked “Top Secret/
Sensitive Compartmented Information” — meaning it contained electronic intercept intelligence.

●In September, former FBI bomb technician Donald Sachtleben agreed to plead guilty to providing classified information to the Associated Press about what turned out to be an April 2012 CIA effort to infiltrate a Yemen-based terrorist bomb operation. Justice’s seizure of AP phone records last year provided key evidence that Sachtleben was the source of the news agency’s May 7, 2012, article on the operation.

That made Kim’s the second guilty plea in leak cases in which Justice obtained journalists’ telephone records and e-mails to win indictments.

News coverage of Kim’s plea mentioned the classified nature of the leak but focused more on new Justice Department rules to protect journalists’ records rather than the key role those records played in solving the case.

Meanwhile, the Snowden drama continues to unfold.

Despite news media claims that the Obama administration’s subpoenas would chill leaks, Snowden’s most massive distribution of classified documents was already in motion and became public in June.

Snowden continues to talk expansively about NSA operations, as he did Jan. 26 during an interview from Russia carried by German public broadcaster ARD TV.

His German audience was already outraged by the disclosure that the NSA had collected data from Chancellor Angela Merkel’s phone.

In the interview, regarding data that the NSA collects, Snowden said: “Every time you pick up the phone, dial a number, write an e-mail, make a purchase, travel on the bus carrying a cellphone, swipe a card somewhere, you leave a trace and the government has decided that it’s a good idea to collect it all, everything, even if you’ve never been suspected of any crime.”

His broad charge — which goes far beyond the NSA’s activities — feeds into paranoia.

Asked whether the NSA spies on German corporations such as Siemens, Snowden first replied, “I don’t want to preempt the editorial decisions of journalists,” implying that some of the material he distributed deals with that subject.

Then he said: “There’s no question that the U.S. is engaged in economic spying. If there’s information at Siemens that they think would be beneficial to the national interest, not national security of the United States, they’ll go after that information and they’ll take it.”


Snowden claims that he disclosed the information because of his concern about the NSA’s domestic surveillance, but Clapper speculated that “probably less than 10 percent [of what he is believed to have downloaded] has to do with domestic surveillance.”

The bulk had to do with Defense Department tactical and strategic operations, such as dealing with improvised explosive devices in places such as Afghanistan, Flynn said.

The Snowden story is far from over, and intelligence capabilities that cost billions of dollars are at risk, along with the potential for new stories exposing the vulnerabilities of the U.S. military and intelligence community — which ultimately means the American people.

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.