Release ALL the datas!
Former National Security Agency contractor Edward Snowden stole vastly more information than previously speculated, and is holding it at ransom for his own protection.“What’s floating is so dangerous, we’d be behind for twenty years in terms of access (if it were to be leaked),” a ranking Department of Defense official told the Daily Caller.
“He stole everything — literally everything,” the official said.
Last month British and U.S. intelligence officials speculated Snowden had in his possession a “doomsday cache” of intelligence information, including the names of undercover intelligence personnel stationed around the world.
“Sources briefed on the matter” told Reuters that such a cache could be used as an insurance policy in the event Snowden was captured, and that, “the worst was yet to come.”
The officials cited no hard evidence of such a cache, but indicated it was a possible worst-case-scenario. Some version of that scenario appears to have come true.
“It’s only accessible for a few hours a day, and is triple encrypted to the point where no one can break it,” the official said of the data cloud where Snowden has likely hidden the information.
According to the official, there are at least two others in possession of the code to access the information, and, “if we nail him — he’ll release the data.”
“Everything you don’t want the enemy to know, he has,” the official said. “Who we’re listening to, what we’re after — they’d shut us down.”
The damage would be “of biblical proportions,” the official said.
Yet, turning to the efficacy prong, the Government does not cite a single instance in which analysis of the NSA's bulk metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving an objective that was time-sensitive in nature. In fact, none of the three "recent episodes" cited by the Government that supposedly "illustrate the role that telephony metadata can play in preventing and protecting against terrorist attack" involved any apparent urgency... In the first example, the FBI learned of a terrorist plot "still in its early stages" and investigated that plot before turning to the metadata "to ensure that all potential connections were identified"... In the second example, it appears that metadata analysis was used only after the terrorist was arrested "to establish [his] foreign ties and put them in context with his U.S. based planning efforts."... And in the third, metadata analysis "revealed a previously unknown number for [a] co-conspirator... and corroborated his connection [to the target of the investigation] as well as other U.S.-based extremists." Again, there is no indication that these revelations were immediately useful or that they prevented an impending attack.