NSA Should Thank Edward Snowden

Edward Snowden’s decision in 2013 to leak secret documents about America’s mass surveillance programs did not end them completely. But the reforms adopted in the wake of his disclosures have strengthened not only Americans’ privacy, but the National Security Agency’s (NSA) ability to collect intelligence.

Make no mistake, these reforms would not have happened without a whistleblower like Snowden. Obama’s aides showed little interest in reforming mass surveillance until the Snowden leaks forced their hands.

It was Snowden who forced the NSA to be more transparent, accountable, and protective of privacy. The NSA took painful steps to open up. It released thousands of pages of previously top-secret documents in a transparency drive intended to put the Snowden leaks in context. The head of the intelligence community now publishes an annual transparency report. Congress ended bulk collection of Americans’ telephone records after an outside review found it to be of marginal value.

More fundamentally, Snowden enlarged the way the US government thinks about privacy. The Snowden documents outraged friendly governments and embarrassed US technology companies in the global marketplace.

In response, Obama issued new rules requiring the NSA to consider the privacy not only of Americans, but of everyone in the world. Despite President Donald Trump’s nationalist rhetoric, the new administration is sticking with these rules. Director of National Intelligence Dan Coats agrees that the rules protecting foreigners’ privacy in intelligence collection have helped to reassure European allies.

In fact, one of the biggest beneficiaries of the post-Snowden reforms has been the NSA itself.

The system that Congress created to end the NSA’s bulk collection of telephone records from American companies has actually given the agency’s analysts access to data from more companies than before.

The old bulk collection program was limited for reasons of secrecy, trust, and logistics to a few large providers. According the NSA’s top lawyer, this has given the agency access to “a greater volume of call records” than it had before, without the responsibility of storing the billions of irrelevant records it used to collect each day under the old program.

It turns out that transparency and privacy protection go hand in hand with good intelligence.

Last year, former Attorney General Eric Holder offered qualified praise for Snowden. “We can certainly argue about the way in which Snowden did what he did, but I think he actually performed a public service by raising the debate that we engaged in and by the changes that we made,” he said. (He said in the same interview that what Snowden did was “inappropriate and illegal.”) Despite the dislike my old colleagues in the intelligence community have for Snowden, I have heard many of them privately express similar views.

Trump has inherited the most powerful apparatus for mass surveillance the world has ever seen. While the post-Snowden reforms are a good first step, we delude ourselves if we think they have made the NSA tyrant-proof.

In Snowden’s first interview from Hong Kong, he warned against “turnkey tyranny.” One day, he said, “a new leader will be elected” and “they’ll flip the switch.”

It is important that this warning not be proved prophetic. This year, Congress will review the Foreign Intelligence Surveillance Act (FISA), in which Section 702 allows warrantless NSA surveillance of foreign targets who may be in contact with Americans.

While the law has produced valuable intelligence, it requires additional reforms to protect privacy. Now more than ever, protecting civil liberties is a cause worth fighting for, not only for the surveillance state’s discontents but for the surveillance state itself.

Fortune

You Might Also Read:

Snowden: NSA Should Have Prevented WannaCry Attacks:

US Intelligence Agencies Fear Insiders As Much As Spies:

 

« N.Korea Will Target UK Financial Services
Russian Cyber Campaign Aims To Splinter US Voters »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.