Who is taking a leak on whom?


Well, once again Ed Morrissey over at Hot Air has put his Marxist version of Thomas Magnum’s Tigers ball cap on and set himself upon the sleuthing trail. With all of the skills and determination of a 1950’s Pravda reported Ed has obviously sworn to exposing whomever was responsible for leaking the FISA Warrant that told America’s citizens that the NSA was illegally monitoring all of their cell phone traffic and email traffic.

Is there a leak at the FISA court?

posted at 9:41 am on June 18, 2013 by Ed Morrissey

No one knows for sure, but the appearance of what had been a highly-classified court decision has some wondering if the FISA court has sprung its first significant leak. The Daily Beast’s Eli Lake reports that the FBI has begun to wonder that, too — although the list of suspects in this case is long and distinguished:

The FBI is investigating whether the highly protected and segregated computer systems that store the secret court warrants authorizing electronic surveillance inside the United States have been breached, according to current and former U.S. intelligence officials. Thirteen days after the Guardian published a top-secret court order from the top-secret Foreign Intelligence Surveillance Court disclosing the National Security Agency’s collection of all phone records from Verizon’s business customers over a three-month period, the U.S. intelligence community has yet to determine how the warrant, one of the most highly classified documents inside the U.S. government, was leaked.

Those who receive the warrant—the first of its kind to be publicly disclosed—are not allowed “to disclose to any other person” except to carry out its terms or receive legal advice about it, and any person seeing it for those reasons is also legally bound not to disclose the order. The officials say phone companies like Verizon are not allowed to store a digital copy of the warrant, and that the documents are not accessible on most NSA internal classified computer networks or on the Joint Worldwide Intelligence Communications System, the top-secret internet used by the U.S. intelligence community.

The warrants reside on two computer systems affiliated with the Foreign Intelligence Surveillance Court and the National Security Division of the Department of Justice. Both systems are physically separated from other government-wide computer networks and employ sophisticated encryption technology, the officials said. Even lawmakers and staff lawyers on the House and Senate intelligence committees can only view the warrants in the presence of Justice Department attorneys, and are prohibited from taking notes on the documents.

There had been some speculation that Snowden might not be the only source for the scoops by the Guardian and Washington Post. It’s not even clear that Snowden had access to the FISA warrant. Capitol Hill says it wasn’t them:

Regardless of how many far wiser and more intelligent people have told him that who leaked the warrant information is not as important as what they leaked, Ed doggedly insists on jumping into his Magnum P.I red Ferrari and chasing down the traitorous villain and making damned sure that the story remains who and not what.

In act 3 scene 2 of Julies Caesar William Shakespeare showed the world one of the most brutal methods of implementing propaganda. Mark Antony deliver a stinging monolog in which he condemns Brutus with faint praise.

ANTONY

Friends, Romans, countrymen, lend me your ears;
I come to bury Caesar, not to praise him.
The evil that men do lives after them;
The good is oft interred with their bones;
So let it be with Caesar. The noble Brutus
Hath told you Caesar was ambitious:
If it were so, it was a grievous fault,
And grievously hath Caesar answer’d it.
Here, under leave of Brutus and the rest–
For Brutus is an honourable man;
So are they all, all honourable men–
Come I to speak in Caesar’s funeral.
He was my friend, faithful and just to me:
But Brutus says he was ambitious;
And Brutus is an honourable man.
He hath brought many captives home to Rome
Whose ransoms did the general coffers fill:
Did this in Caesar seem ambitious?
When that the poor have cried, Caesar hath wept:
Ambition should be made of sterner stuff:
Yet Brutus says he was ambitious;
And Brutus is an honourable man.
You all did see that on the Lupercal
I thrice presented him a kingly crown,
Which he did thrice refuse: was this ambition?
Yet Brutus says he was ambitious;
And, sure, he is an honourable man.
I speak not to disprove what Brutus spoke,
But here I am to speak what I do know.
You all did love him once, not without cause:
What cause withholds you then, to mourn for him?
O judgment! thou art fled to brutish beasts,
And men have lost their reason. Bear with me;
My heart is in the coffin there with Caesar,
And I must pause till it come back to me.

This is the same tactic Ed is employing with regard first to Edward Snowden, and now in his frantic search to discover whom it was that provided Snowden with the documents damning to the US Federal Government that Ed appears so determined to protect.

Once more, for purely rhetorical sake I say to Ed and all the other Fifth Column Treasonous Media talking heads and Professional Blogging class lackeys. The story here is not who leaked on whom, it is what was leaked. The story is not Edward Snowden or whomever inside the FISA Court provided Snowden with the damning FISA warrant, but the content of that warrant and what it exposed the Federal Government doing.

Oh, and no, screw the notion that Snowden or whomever could have taken that warrant to Darrell Issa or followed the official approved procedure for whistle blowing, one needs look no further than “Operation Fast and Furious” or Benghazi, or even the more recent IRS revelations (let’s not even bother to remember the Department of Injustices response to the New Black Panther’s voter intimidation trial) to know that had Snowden or whomever might have provided him with the information he made public, taken that route, the American people would never have learned about the NSA’s illegal data gathering program.

The one constant here is, that individuals or organizations engaging in criminal activity never willingly expose their criminal activity. Wen their criminal activity is exposed, they always attempt to misdirect, confuse or obfuscate the nature of that criminal activity. The only difference in when the government behaves in this manner, is the resources they have to prevent the principal players involved from being prosecuted. Which of course explains why nobody has gone to prison over Fast and Furious, or Benghazi or the IRS scandals.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s