Archive for May, 2020

The most in-demand side hustles you can do from home, according to Fiverr and Upwork – CNBC

In April, the unemployment rate rose by more than 10%, with at least 26 million Americans out of work due to the Covid-19 pandemic.

With more time spent at home to stop the spread of the virus, many people are turning to side hustles as a way to make more money in trying times.

Curious how you can earn some cash? Here are some areas where you can find lucrative work that you can do from home, according to experts from freelancer platforms Fiverr and Upwork.

These companies examined their database to see trends and popular gigs that are getting traction while people stay home amid Covid-19.Some of these jobs require special skills or expertise, while others can be done remotely with just a computer and internet connection.

When considering a side hustle, "think about your competitive strategy,"Nancy Van Brunt, director of freelancer and agency success at Upwork, tells CNBC Make It. In other words: What skills do you already have that could be marketable? "Really think about your services as a business," she says.

As more businesses transition online, they're looking to hire people who know how to build an online presence for a brand, a representative for Fiverr tells CNBC Make It.

The side hustles

There are lots of ways you can do this, for example, you can earn anywhere from $75 to $1,045 writing an online article, or $135 to $995 optimizing existing content for SEO, according to Fiverr, which looked at a sampling of what users are earning now in their more than 300 categories.

(Pricing depends how long the project will take to complete and level of expertise, and both Fiverr and Upwork take a percentage of earnings.)

Building a website, which entails writing code for WordPress, can earn you $395 to $4,095, according to Fiverr.

Video editors can charge between $100 and $3,200 to edit everything from social media videos to event footage.

And managing social media accounts for a brand,which includes strategizing, writing and creating posts for platforms like Twitter and YouTube,can earn you $25 an hour on average, according to Upwork.

The Covid-19 pandemic has led to a 50% increase in registration volume across many categories on Upwork, including technology-related jobs, according to data from the end of March and April.Specifically, there's a demand for web, mobile and software development,says Upwork's Van Brunt.

The side hustles

Mobile app development is one of the highest-paying side hustles on Fiverr, withprojects costing between $300 and $3,000, but this requires knowledge of software engineering and coding.

Graphic designers who focus on UI, or user interface (which basically means designing the way users interact with a product like an app or website via the buttons they click or the text entry fields that use, etc.), can earn $185 to $6,300 on app projects.

Quality assurance testing, which is essentially testing that a piece ofsoftwareor an application does what it says, can earn you $36 an hour on average, per ZipRecruiter. (QA testers typically have a computer science background and knowledge of testing software likeSelenium.)

More consumers are looking for productive ways to spend their time in lockdown, according to Fiverr. If you have internet connection and a computer, you can earn money teaching a variety of skills you already have.

The side hustles

Fiverr introduced new service categories between March 20 and April 3 to cater to people stuck at home during the pandemic, such as crafting, cooking, music, language and fitness lessons. People charge from $5 a class to $100 depending upon how involved the lesson is, and their own experience.

For example, home chefs sell recipes and remote cooking tutorials starting at $5, and as high as $100.

Personal trainers offer virtual training sessions or classes from $15 to $75.

While the pandemic crisis has put many people out of work, clients and freelancers on Upworkare seeing a demand for projects that are specifically related to Covid-19, according to Van Brunt. "There's opportunity to really make an impact by helping companies looking for help on these immediate and urgent needs," she says.

The side hustles

Van Brunt has seen job listings on Upwork for graphic designers who can create new signage for hospitals, software developers who can build apps that track Covid-19 cases,for example.

Graphic design projects like this creating displays, logos or marketing materials cansell for $100 to $3,000 on Fiverr.

To find work that relates to Covid-19, Upwork has added a "Covid-19 Job Feed" for users who are registered with the site and looking for Covid-19 jobs.You may alsowant to search for keywords like, "healthcare industry" or "online educational services," according to Upwork.

Check out: The best credit cards of 2020 could earn you over $1,000 in 5 years

Don't miss:

Go here to see the original:
The most in-demand side hustles you can do from home, according to Fiverr and Upwork - CNBC

Former NSA Chief: Values Must Not be Compromised in the Name of Security, Not Even During a Pandemic – CTech

If theres one thing thats beyond question, it is that Mike Rogers, former head of the National Security Agency (NSA) loves his country. In an interview with Calcalist, he repeated the word values no fewer than 27 times. But even a patriot like Rogers believes the use of technology to track down citizens during the Coronavirus (Covid-19) crisis is one step too far.

The first thing we need to do is step back, he asserts. We need to ask what type of information needs to be collected to generate insights that would be instrumental to better understand the pandemic. This is a legitimate question to ask. The knowledge and insights generated need to reflect the values of our society. Public health does not render privacy irrelevant or marginal. I dont buy it. In the same way, I dont think privacy should be held up is above all else. Its not a black and white issue.

Rogers, 60, served in the U.S. Navy for 37 years. He started his career as a ship driver, as he likes to call it. In 2018, he retired from his position as head of the countrys top intelligence unit, after serving under two presidents, Barack Obama, and Donald Trump. Shortly afterward, he joined Israeli cyber group Team8 as an advisor. Team8 was founded by brigadier general (Ret.) Nadav Zafrir, a former commander of the Israel Defense Forces Military intelligence Unit 8200, which is often referred to as Israels NSA. This interview was conducted on Zoom, which Rogers joined via his private Gmail address, evidence of the challenges posed to privacy even for a veteran spook like himself during Covid-19 era.

Rogers assumed office as head of the NSA at a particularly complicated time; a short while after Edward Snowden, an NSA sub-contractor, leaked a massive trove of documents exposing how the U.S. government implemented methodical surveillance on millions of people across the globe, both American citizens and foreigners. The saga ended with both Snowden and NSA remaining controversial entities. However, while the young man found himself in exile in Russia, the NSA was legally acquitted and politically pardoned, a problem that Rogers acknowledges.

Look, Im not an idiot. It was clear to me that our society and the world at large were trying to figure out what had happened, he says of the aftermath of the Snowden affair. I tried to determine whether I should be worried, whether the law was being abided by. The people at the NSA were also shocked by the public reaction because they knew they had followed the law. And if their actions were meant to protect the citizens, why were they perceived as the bad guys?

Despite siding with the intelligence forces, Rogers too admits that the government sometimes abuses its power. This is not a new phenomenon, he conceded. The basic principle on which the U.S. was founded is that individual rights are primary and that the state must not be allowed to trample on them. This is the cornerstone of the society.

However, he said, Some degree of distrust has always existed between the state and its citizens. We must acknowledge the cases in which the government exceeded its authority, for example, during the Vietnam War, when we used intelligence capabilities to find out what citizens think about the war and to what extent they support the government. These were exceptional actions. As a result of that period in our history, we have the foundations that guide us to this day closer oversight of intelligence work, by congressional committees, and an external approval mechanism, which also led to the establishment of the Foreign Intelligence Surveillance Courts (FISA).

Still, when pressed, Rogers admits that when a civil society loses its trust in its elected officials and the courts, once they no longer reflect their values, the country has a problem. Peoples trust in the checks and balances is on a decline. Following the Snowden affair, some congress committees stated clearly that the NSA was in full compliance with the law and overseen by elected officials. They told the citizens not to worry because We supervise the work. But it was not enough. People were saying that the politicians do not reflect their concerns and values. The current oversight mechanism failed to give the public the confidence we thought it would. The FISA courts too were criticized in a similar vein, arguing that unlike in ordinary courts, the government stands trial with no one presenting counter arguments.

The public distrust of the NSA posed Rogers with a significant challenge: explaining how the agency works. We needed to acknowledge that the trust of the citizens we serve is one of the most important factors for us. We need to carry out our missions effectively, efficiently, in full compliance with the law, and do so while reflecting societys values. To ensure we meet these criteria, we needed to modify the way we work. I wanted people to know ours is an honest organization that recognizes its mistakes and learns from them, and that if required, we will be able to modify our mode of operations.

But the narrative regarding the Snowden affair still divides the American public, which is strongly concerned with matters of privacy. The US government regards Snowden as a fugitive criminal whose actions have harmed intelligence assets. Large parts of the public, however, regard Snowden as a heroic whistleblower. I dont consider it in terms of victory or defeat, says Rogers when asked if NSA was victorious in changing the narrative. The important thing is that we did our job lawfully and in a manner that reflects our society. I was happy that when the public debate finally ended, we were able to retain most of the authorities and legal frameworks that we had.

Was there a chance this would not materialize?

Absolutely.

How can you tell whether something has changed if everything takes place away from public scrutiny?

Every exposure of our activity has the potential to prevent us from doing our job. Hence, democratic society created a legal framework and an oversight mechanism that allows elected public officials to supervise our work directly. The courts give us no blank checks. Whenever they felt we had not justified our requests, they did not grant them. I never took the freedom of action for granted. It was always important for me to work in a manner that reflects our society and never knowingly violate the law. Never. I believe it is important for society as a wholeand it is evident today with the pandemic that the solutions reflect social values. We do not want to compromise on who we are in the name of security. When you do that, the other side wins.

While Rogers talks passionately about the importance of checks and balances in democratic countries, in Israel the debate over the breach of citizens privacy is subdued, even though both the police and the Internal Security Agency have managed to obtain free access to track citizens mobile phones. Checks and balances are a foundation of democracy, argues Rogers. When we resort to searching for solutions that involve knowledge about private people, for example, during this Covid-19 pandemic, we must ensure the solutions are equipped with checks and balances and instill confidence and trust among the public. I do not like absolute solutions. I prefer to develop ones that have external oversight and regulation.

When Rogers is pressed with questions on the gloomy trade-off between citizens rights and public health, or even national security, he takes us back 70 years. Perhaps because being critical about real-time events is difficult. In December 1941, following the Japanese attack on Pearl Harbor, we deemed it reasonable to force American citizens of Japanese origin out of their jobs or schools, and place them in detention camps. When we look back at this practice today, it is beyond us how we could have done such a thing. It runs contrary to all of our values! You dont treat civilians in this way! Stepping back during a crisis is one of the most difficult things to do, but it allows you to understand not only what you cannot do, but also what is wrong to do. The fact that you can do something does not mean you need to do it.

The delicate balancing of civil rights and privacy becomes even more intricate because of the momentous leaps achieved by the information revolutions. Technological developments in the private sector sent governments and their various branches on an incessant pursuit for control. Take, for example, governments attempts to obtain remote access to smartphones or computer systems in a manner that bypasses the end-to-end encryption of Facebook or WhatsApp chats. Encryptions are vital in the world we live in, says Rogers. Finding information security solutions without encryption is hard. I do not like the idea of neutralizing the encryption, but I am not fond of the expression back door either (referring to the Administrations demand for built-in access to private computer systems, V.A.) Its an expression that reflects stealthy activities. I want the front door, with many locks on it, and I want control over who has access to the keys and the terms under which the door can be opened.

President Obama a constitutional lawyer by training once told us we must acknowledge that one of the guiding principles of the U.S. judicial system is that no information is beyond the reach of the government, as long as it abides by the legal framework. But the reality is that technology has passed the legal and constitutional frameworks, making encryption their poster child. Im not saying its bad. Thats just the way it is.

So there is no privacy at all?

No, there is no privacy. The law stipulates that phone companies must have the means to monitor calls in case the court orders them to do so. I keep reminding people that this capability is part of a legal framework. The federal administration cannot tap a persons phone just because it wants to. Telephone companies will not do that unless they receive a court order, which can also be appealed before an external authority. The system of checks and balances allows a range of worldviews to be heard.

The legal frameworks were also designed to save time and resources. If it is designed by a human, then a human can compromise it, explains Rogers. The question is how long it would take and what resources need to be allocated. So we are looking for new technologies that would overcome the limitations. This is life. You develop capabilities and then the counter-capabilities. Ive spent 37 years of my life doing that.

Today, Rogers is an advisor to Team8, a cybersecurity group that develops defensive capabilities. Discussing the work offensive cyber organizations, which suffer from a terrible public image, sometimes justifiably, Rogers says they stand to profit from the Covid-19 pandemic, not just because the number of people connecting to the network is pushing the existing security infrastructure to the limit, but also because of humans tendency to try to make sense of the new reality. Users are receiving huge amounts of files about coronavirus, creating an excellent opportunity for a country that uses focused cyberattacks, such as phishing.

But Rogers is optimistic about the resourcefulness and resilience of the virtual world, The infrastructure responded well to the challenge. We can maintain communication in a world where physical presence has become dangerous. Within a short time, we have established new normalcy with the means necessary to continue communicating, doing business or keeping in touch with friends and family. Now is the time to see how we make the new structure resilient, the risks it faces and its future. What will the world look like after coronavirus? What lessons do we take from this situation? Which skills do we need to build? There are many questions to ponder.

The former commander of Unit 8200: It doesnt have to be either-or. Some solutions can keep you healthy while protecting your privacy.

"My view of the current crisis is more romantic than Mikes, says Nadav Zafrir, co-founder of Team8 and a consulting client of former NSA Head Mike Rogers. I see a dramatically-positive side to the crisis. If Covid-19 were to have taken place in the 1990s, the world would be falling apart. The things we are doing today are fantastic. Just sending everyone home overnight is an amazing accomplishment.

Everyone talks about the need to track the population, restart the economy and maintain health as running contrary to privacy. I do not think this is an either-or situation. Take cryptography, for example. You can take encrypted information and still run computing operations on it. The crisis has shown us you cannot privatize everything. The State must retain some responsibility, but this does not mean we have no responsibility. We need to provide enabling technologies. We know how to take the healthcare information of confirmed cases and run queries on data received from telecoms. The company that provides the information does not know what information we are looking for and on whom, and those who know what we look for cannot see all of the information. All this can be ensured by an enabling technology called homomorphic encryption. We started the project with open code for a purpose. This approach allowed us to create solutions that address both sides of the equation because until a vaccine is available, we will not be able to resume our normal life.

Read more from the original source:
Former NSA Chief: Values Must Not be Compromised in the Name of Security, Not Even During a Pandemic - CTech

Myanmar hands over 22 Northeast insurgents to India, operation monitored by NSA Ajit Doval – ThePrint

Text Size:A- A+

New Delhi: The Myanmar army on Friday handed over to India 22 insurgents from the Northeast, including self-styled home secretary of NDFB (S) Rajen Daimary, in a clandestine operation monitored by National Security Advisor Ajit Doval, officials said.

The insurgents were brought to India on a special aircraft and handed over to police forces in Manipur and Assam where they are wanted, they said.

This is considered an unprecedented diplomatic success led by Doval who was carrying out deliberations with the Myanmar military resulting in the first such handover of insurgents by Indias eastern neighbour, they said.

It is also a sign of deepening diplomatic and military ties between the two countries, they said.

Ten of these insurgents are wanted in Manipur while the rest are wanted in Assam, they said.

Also read: Why Modi decided to send Ajit Doval to enforce the law, bring peace to Northeast Delhi

ThePrint is now on Telegram. For the best reports & opinion on politics, governance and more, subscribe to ThePrint on Telegram.

Subscribe to our YouTube channel.

Read more from the original source:
Myanmar hands over 22 Northeast insurgents to India, operation monitored by NSA Ajit Doval - ThePrint

NSA Scotsheep postponed until 2021 – Press and Journal

The NSA Scotsheep event has been postponed until next year due to Covid-19 restrictions.

The event, organised by the Scottish branch of the National Sheep Association (NSA), was scheduled to take place next month.

Organisers previously announced a new date for July. However the event at Over Finlarg Farm at Tealing, near Dundee, will now take place on May 27 2021.

Our hosts Robert and Hazel McNee have put a considerable amount of time and money into getting the farm looking right for this year and have kindly agreed to the new date which is very much appreciated, said NSA Scotland chairman, Jennifer Craig.

Postponing the event will have a severe impact on NSA Scotland financially. However through the support of our many sponsors and trade exhibitors, we will get through this and look forward to delivering this crucial event for the sheep industry in Scotland and further afield.

See the original post here:
NSA Scotsheep postponed until 2021 - Press and Journal

Anticipating Phase Two of the Trumped Up Obamagate – Just Security

President Donald Trump insists, against all evidence, that there is something called Obamagate: some crime, or perhaps series of crimes, that the preceding administration committed against him, or against his adviser Michael Flynn, or maybe against even more of the Trump team. Yet the president fails to say what the crime(s) might be. Instead, he seizes on the language, alludes to improprieties, andincreasinglywields it all to tar his rival for the presidency, Joe Biden. Countering Trumpian disinformation campaigns like this one demands disentangling the threads that Trump has weaved into Obamagate, debunking the falsehoods that Trump is propagatingand, at the same time, acknowledging where there may in fact have been serious missteps during the previous administration.

That means acknowledging that there may well be a lurking truth to a serious allegation against former government officials in how they handled the counterintelligence file involving Michael Flynn. However, there is no evidence that those actions implicate President Barack Obama or Vice President Biden personally, or discredit the legitimacy of the investigations of Russias 2016 election interference, the investigation of Trump campaign associates support for the Kremlins effort, officials requests to unmask a U.S. person appearing in intelligence reports who turned out to be Flynn, the FBIs decision to interview Flynn, or the Justice Departments charging Flynn for lying to the FBI.

That said, there has been a rush by many to say that no crime has been credibly alleged, and that no serious wrongdoing by former administration officials has been identified. Thats an oversight, and fails to grapple with a potential outcome: the prospect of well-founded criminal indictments against one or more former officials who leaked the content of the classified intercept of the Dec. 29, 2016 phone call between Flynn and Russian Ambassador Sergey Kislyak and Flynns identity in that communication.

As Ill explain, the issue here is not limited to the initial leak by a senior government official to the journalist David Ignatius who revealed the Flynn-Kislyak phone call in the pages of the Washington Post on the evening of Jan. 12, 2017.

Independent observers and analysts should understand the strength of the allegations of misconduct, which could trigger criminal liability. Indeed, it is valuable to identify any credible complaints of official wrongdoing, and separate those from Trumps deceptive and deliberately false accusations.

As for practitioners who are engaged in countering disinformation, they should consider how this foreseeable outcome of one or more criminal indictments will be used by Trump, his Attorney General Bill Barr, and the Director of National Intelligence (whether Rick Grenell or John Ratcliffe) to conflate truth and falsehoods. Indeed, the failure to have appreciated the seriousness of the allegations will bolster Trump and his surrogates disinformation campaign. It will be used to discredit analysts. They will be accused of dishonesty and bias, not just of an analytic oversight. More Americans will be encouraged to think of Trump and his political loyalists as validated sources of information. And the public will be left with even less ability to sort fact from fiction.

Indeed, a well-orchestrated disinformation tactic, pioneered by Soviet intelligence, would involve the following steps:

Phase One: Make grossly unfounded claims of misconduct by former and current US officials (such as a Deep State conspiracy to undercut the Trump 2016 campaign and the Trump presidency), anticipating a reaction among experts and partisans to challenge those claims;

Phase Two: Reveal true official misconduct that has some, even if limited, connection to the original conspiracy theory, with experts and partisans failing to adequately anticipate or recognize the true misconduct, and some even quick to dismiss it.

Phase One of this disinformation campaign is well underway.

How likely is a key step in Phase Two, namely, the genuine revelation of official misconduct? Barrs handpicked federal prosecutor John Durham reportedly has in the crosshairs of his ongoing criminal investigation the leaks to the media. Attorney General Bill Barr has signaled confidence that Durham will find criminal wrongdoing (in gross defiance of long-standing Justice Department policy to refrain from any acknowledgement, let alone comments on the prospective outcome, of an ongoing investigation). Whats more, several former senior officials told Congress, under penalty of law, that they were not the source of the leak, either in closed testimony that the House Committee on Intelligence released last week or in prior public hearings. That may create another layer of legal vulnerability if a source of the leak denied it to Congress.

Phase Two: The Leak Investigation

The groundwork for phase two has been long in the making. A March 20, 2017 public hearing of the House Intelligence Committee with two witnesses then-FBI Director James Comey and then-NSA Director Mike Rogers raised concerns about the leaks of Flynns phone calls with Kislyak. Lawmakers directly and indirectly identified three news reports during the hearing. Here are the three reports including some passages added for context:

1. David Ignatius, Washington Post, Jan. 12, 2017:

According to a senior U.S. government official, Flynn phoned Russian Ambassador Sergey Kislyak several times on Dec. 29, the day the Obama administration announced the expulsion of 35 Russian officials as wellas other measures in retaliation for the hacking. What did Flynn say, and did it undercut the U.S. sanctions?The Logan Act (though never enforced) bars U.S. citizens from correspondence intending toinfluence a foreign government about disputes with the United States. Was its spirit violated? The Trump campaign didnt immediately respond to a request for comment.

2. Greg Miller, Adam Entous and Ellen Nakashima, Washington Post, Feb. 9, 2017:

Neither of those assertions is consistent with the fuller account of Flynns contacts with Kislyak provided by officials who had access to reports from U.S. intelligence and law enforcement agencies that routinely monitor the communications of Russian diplomats. Nine current and former officials, who were in senior positions at multiple agencies at the time of the calls, spoke on the condition of anonymity to discuss intelligence matters.

3. Maggie Haberman, Matthew Rosenberg, Matt Apuzzo and Glenn Thrush, New York Times, Feb. 13, 2017

But the conversation,according to officials who saw the transcript of the wiretap, also included a discussion about sanctions imposed on Russia after intelligence agencies determined that President Vladimir V. Putins government tried to interfere with the 2016 election on Mr. Trumps behalf. Still, current and former administration officials familiar with the call said the transcript was ambiguous enough that Mr. Trump could have justified either firing or retaining Mr. Flynn.

It is important to stress what these news stories dont saynot even closethat all these officials actually revealed to the reporters any new classified information. Some of them might have discussed the information that the reporters told the officials they had, in order to provide context, etc., without disclosing anything new, or even without confirming the substance of the callssomething that happens routinely. Others might not have said anything at all about the substance of the calls. It is also important to note that the February news stories came after White House officials spoke on the record confirming the existence of the calls and discussing the content of the calls as well (including Vice President Mike Pence, Reince Priebus, and Sean Spicer).

To the extent there was an unauthorized disclosure of classified information to Ignatius or other reporters, thats something none of us as former government officials entrusted with protection of classified information can defend. Indeed, several of the former senior officials testifying before the House Intelligence Committee referred to such leaks as outrageous, illegal, and a serious crime. And Senator Dianne Feinstein joined Senator Chuck Grassley in a bipartisan letter to Attorney General Jeff Sessions and FBI Director Comey on Feb. 15, 2017, in which the Chair and Ranking Member of the Senate Judiciary Committee wrote that these reports raise substantial questions about the content and context of Mr. Flynns discussions with Russian officials as well as possible leaks of classified information by current and former government employees.

That said, the timing of all this coming to the fore with the Durham investigation is more than suspicious. Even if there were criminal misconduct involving the leak to the media over three years ago, ask yourself why the investigation just so happens to be heating up now as we enter the general election. And Trump and his surrogates have only now launched an effort to introduce Bidens name into the unmasking narrative blurring both the possible leaker with Biden and the legitimate practice of unmasking with the illegitimate practice of leaking. Whats more, now that the Trump campaign has explicitly asserted that this scandal directly implicates Biden, it should be more difficult for Barr and Durham to convince career Justice Department officials to go along with, and the public to accept, a violation of another long-standing Justice Department policy, which holds that the Justice Department should refrain from taking public action that could affect the outcome of an election. Durham, for one, should hesitate before going down this treacherous path.

Phase Two: The Unmasking Ruse

In laying the groundwork for phase two, some Republican lawmakers such as then-Rep. Trey Gowdy tied the leaks to unmasking from the start.

By way of background: The request to know the identity of a U.S. person appearing in multiple intelligence reports who turned out, upon unmasking, to be Flynn shows no evidence of wrongdoing by U.S. officials. The way in which some public figures such as Senator Rand Paul have spun the idea of unmasking as though it involves warrantless wrongdoing is extremely misleading and reckless. On the contrary, the variety of officials who were concerned enough about the intelligence they were reading to request the identity of the U.S. person likely indicates how much Flynns behavior alarmed an array of officials across different agencies.

That said, theres at least a superficially plausible connection between unmasking of Flynn and the allegedly unlawful leaks. Those who obtained an unmasked transcript of the intercepted phone call might have had access to the very information leaked to the press. Along those lines, Rep. Trey Gowdy engaged in the following exchange with Comey during the March 2017 hearing:

GOWDY: So how would you begin your investigation, assuming for the sake of argument that a U.S. citizens name appeared in the Washington Post and the New York Times unlawfully. Where would you begin that investigation?COMEY: You would start by figuring out, so who are the suspects? Who touched the information that youve concluded ended up unlawfully in the newspaper and start with that universe and then use investigative tools and techniques to see if you can eliminate people, or include people as more serious suspects.

GOWDY: Do you know whether Director Clapper knew the name of the U.S. citizen that appeared in the New York Times and Washington Post?

GOWDY: Would he have access to an unmasked name?

COMEY: In in some circumstances, sure, he was the director of national intelligence. But Im not talking about the particular.

Gowdy then proceeded to walk through a series of other former senior officials, asking whether each one would have access to an unmasked U.S. citizens name. Comey answered each in a similar fashion.

The official list of officials involved in unmasking Flynn, however, is not a reliable proxy for identifying suspects who may be responsible for the leak.

A threshold question first: There is good reason to think the declassified NSA list of officials who requested unmasking is completely disconnected from the intercepted call between Kislyak and Flynn on Dec. 29. As Marcy Wheeler and Ben Wittes have explained, the intercepted call appears to be an FBInot an NSAproduct. That would stand to reason if Kislyak (the actual target of the surveillance) was in the United States at the time (thanks to Asha Rangappa for raising this important point). [Update: The Washington Post confirms the summary of the Dec. 29 call was an FBI, not an NSA, product which openly included Flynns name and thus there would be no reason for officials to request an unmasking from the NSA.]

There is good reason to think the declassified NSA list of officials who requested unmasking is completely disconnected from the intercepted call between Kislyak and Flynn on Dec. 29.

Even if the declassified NSA list somehow includes the Flynn-Kislyak calls, the list is both under-inclusive and over-inclusive. It is under-inclusive because a much larger group of officials in addition to the ones on the NSA list knew the details of the phone calls and that Flynn was the American on the call. That larger group includes lower-level and senior officials who participated in the FBIs debriefing Justice Department officials about the Flynn phone call on Feb. 4 and Feb. 6. Several of those officials have been named in declassified congressional hearings and declassified FBI 302 interviews yet they do not appear on the NSA list. Whats more, Yates and McCabe each told Congress that when either a transcript or summary of the call was circulated, Flynns name was already identifieditself understandable, given that the FBI operates under different guidelines in such circumstances from those that apply generally to the intelligence community.

YATES: When this information was provided to me, nobody was ever asking for his name to be unmasked. I was provided with the name in it.

MCCABE: I do not believe that that summary was ever masked. Im also not familiar with any requests that we received to unmask anything. Im not Im not aware that if we got one, it would strike me as unnecessary if nothing was masked.

The list is also over-inclusive because many of the unmasking requests were made before Flynn and Kislyaks Dec. 29 phone call occurred, and its not known whether requests after that date would be for different intercepted communications.

Finally, the unmasking is not well-connected to the leak taking as our example Biden himself. Following the public release of the NSA list, multiple articles in the National Review and the opinion piece by the Wall Street Journal Editorial Board were quick to say that Bidens office requested or received an unmasking of Flynns call on the same day that Ignatius story ran in the Washington Post (Jan. 12). But that was the date the request was received by the NSA, not when it was granted or obtained, according to the cover note by the head of the National Security Agency, General Paul M. Nakasone. Biden might have received the unmasked information only after the Post story published (indeed, the Post story might have inspired his office to initiate the request). We also dont know whether Biden actually saw the unmasked name. While the principals are identified below, we cannot confirm they saw the unmasked information, the declassified NSA document states. Relatedly, as former acting C.I.A. director Michael Morell explained to the New York Times, an officer briefing a senior official may make the unmasking request, but that would be logged as a request from the senior official. We also dont know whether the request from Bidens office was even for the Dec. 29 call between Kislyak and Flynn. Finally none of this really matters when it comes to the leak. It has been known for years that Biden was informed about Flynns phone call with Kislyak on Jan. 5, 2017 when the issue was discussed in a pull-aside meeting in the Oval Office with Obama, Biden, Comey, Yates, and Susan Rice. That might cut against Biden in some fever dream of a conspiracy hatched against the Trump administration. It also shows that the quest for the list of unmaskers is a ruse. Biden, like many, many, many other officials at the time did not need to request unmasking Flynn to leak to the media. In fact, the smartest move for a leaker might have been not to submit a request. At bottom, the most plausible explanation of Trump, Barr, and now Sen. Lindsey Grahams focus on unmasking is its service in the aid of a disinformation campaign to further Trumps political ambitions.

* * *

At bottom, the key point here is not allowing anyone, especially including the President of the United States and his attorney general, to convince the American public that there is any scandal beyond what may have happened with the leak. Trump and Barr can be counted on to run the same playbook as they have before a kernel of actual misconduct will be distorted by the Trump team and their congressional and media allies to make it look like an array of other activities that were actually legitimate appear illegitimate. Most memorably, when the DOJ Inspector General found wrongdoing in the Carter Page FISA surveillance applications, Trump and Barr distorted the IGs findings to try to attack the legitimacy of the Mueller investigation. For now, Trump and Barrs effort to rewrite the history of Flynns lying to the FBI looks like it may hit a brick wall in Judge Emmet G. Sullivans courtroom. The question is whether their deception may yet succeed in the court of public opinion.

In the final analysis, Obamagate should be best understood as the scandal in which a president manufactured false accusations against former government officials, including his political rival, using the full power of the Justice Department and Kremlin-style information warfare tactics to orchestrate it.

Read the original post:
Anticipating Phase Two of the Trumped Up Obamagate - Just Security