The Invasion Of Privacy And The NSA

Disaster Recovery Plan.png
Recovery Experts.png
Hair Loss.png
Disaster Recovery Plan.png
The Sticky Note.png

Invasion Of Privacy

Recently, the US Justice Department has told a federal magistrate judge that two government agencies are investigating allegations of misconduct during the Thomas Drake – National Security Agency (NSA) leak investigation in 2010. They are the Office of Special Counsel, a federal agency that is responsible for investigating complaints by whistleblowers, and a Justice Department committee that investigates allegations of malpractice by offices of inspectors general.

Drake was indicted on April 14, 2010 for the willful retention of classified national defense information; obstruction of justice; and for making a false statement. A former employee of the NSA who “held a Top Secret security clearance,” Drake accepted a plea deal from the Obama government just days prior to the start of his espionage trial in June 2011. Instead of facing a total of 10 counts of felony and the possibility of 35 years in jail, he was required to plead guilty to what was described as “a mere misdemeanor.” In terms of the plea bargain, no fines or jail time would be imposed on him.

Thomas_drake_1783

The new investigation launched this year is a result of accusations by Drake that the Pentagon’s inspector general’s office might have destroyed possible evidence in the form of secret documents. These accusations were made in April, and US magistrate judge Stephanie Gallagher was appointed to evaluate them. On May 13 she asked the Department of Justice to investigate further and make recommendations in terms of whether or not to take legal action.

In written correspondence last week, dated June 11, the chief of the Justice Department’s Public Integrity Section, Raymond Hulser confirmed that the inquiry was “ongoing,” and being handled by the Office of Special Counsel (OSC). He also stated that if the OSC found “evidence of criminal conduct,” it would refer the evidence to the Justice Department for “appropriate action.

The destruction of any form of evidence that might be used in a criminal court case could violate the evidence retention rules that federal agents and prosecutors are expected to follow. However, it is not known what possible action Gallagher could order if it was found that evidence held in the Pentagon inspector general’s office had in fact been destroyed.

Drake is currently being represented by Jesselyn Radack, national security director of a whistleblower advocacy group, the Government Accountability Project, who also represented Edward Snowden. She strongly believes that the documents were destroyed “outside of normal policy,” but has not gone so far as to accuse the Pentagon or prosecutors of misconduct.

Radack was not part of the original criminal defense team that represented Drake during 2010 and 2011, and she has said that she found out about the alleged destruction of records relating to Drake’s case via the OSC. The information she has comes from secret complaints that were filed by officials from the Pentagon inspector general’s office, some of whom still work there. It is not known who they are as they formally requested the OSC respect their anonymity for fear of retaliation.

It is understood that the Justice Department claimed prior to Drake’s impending 2011 trial that some documents had been destroyed, but that this has been done according to “a standard document destruction policy.” Radack maintains that there is no such policy, and that rather the inspector general’s office has a Records Management Program that demands documents are kept on file.

Drake has been quoted as saying these allegations are his last chance to hold the NSA accountable for “illegal retaliation” against whistleblowers.

(Image Source: Thomas Drake / Wikipedia)

By Penny Swift

EV Sales

Growth of Electric Vehicles – Heading In The Right Direction

Growth of Electric Vehicles The global electric vehicle market is projected to reach $802.81 billion by 2027, registering a CAGR of 22.6%.1 The highest revenue contributor was Asia-Pacific, which is estimated to reach $357.81 billion ...
Ronald van Loon

The Secrets to a Successful Desktop-as-a-Service Approach

The Secrets to a Successful Desktop-as-a-Service Approach Organizations are under pressure to reinvent their business models and adopt new technologies and digital capabilities to manage challenging conditions and adapt to new remote work scenarios. By ...
Patrick Joggerst

Living on the Edge: The New Real-Time Communications Security Risks

Real-time communications Security Risks As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed ...
Texture Cloud

Building a Cloud Roadmap

Cloud Roadmapping Why is it important to have a cloud roadmap? What's the best way to begin building a cloud roadmap? What points should a cloud roadmap include? Who should be included in the roadmap ...
Dr. Mike Lloyd

How to Mitigate Security Risks in the Cloud

How to Mitigate Security Risks in the Cloud Enterprises continue to spend billions annually on security technology, yet cyber breaches continue to come fast and furious. So what exactly is going on here? Why are ...

TECH ELEARNING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.