US Needed Snowden to Open the Door on NSA’s Spying

25537snowden_678x320_front.jpg

With Congress now poised to review the NSA’s bulk metadata program, it’s worth thinking about where we would be now if a twenty-nine-year-old contractor for Booz Allen Hamilton hadn’t left Hawaii for Hong Kong, and a new life as an outlaw ombudsman.

Were it not for Edward Snowden the NSA would likely still be collecting the records of almost every phone call made in the United States, and no one outside of government would know it. A handful of civil-liberties-minded representatives and senators might drop hints in hearings and ask more pointed questions in classified settings. Members of the public would continue making phone calls, unaware that they were contributing to a massive government database that was supposedly intended to make their lives safer but had not prevented a single terrorist attack. And, recently, the government’s Section 215 powers, used to acquire records from hundred of billions of phone calls, among other “tangible things,” would be quietly renewed.

Snowden shouldn’t have been necessary. The Foreign Intelligence Surveillance Court (or FISA Court), which evaluates Section 215 requests, is supposed to be interpreting the law to make sure that government surveillance doesn’t go outside of it. Congressional intelligence committees, which review the activities of the NSA, are supposed to be providing some oversight. The NSA itself reports to the Department of Defense, which reports to the White House, all of which have dozens of lawyers, who are all supposed to apply the law. 

The government, in other words, is supposed to be watching itself, especially in matters of national security, which are, by necessity, shielded from daylight. The fact that it took thirteen years, and one whistle-blower, to expose a program that is conclusively ineffective and, according to one federal appeals court, illegal, points to a problem much larger than any one program. It suggests that claims about what is necessary to prevent the next terrorist attack are too sacrosanct to require evidence. As the debate over Section 215 has played out over the past two years, it has become clear that the punishments for exaggerating the efficacy of surveillance programs and downplaying their privacy implications are just about nonexistent.

New Yorker:  

« "Torus" Reveals an Expansion in 5 Eyes Surveillance.
Edward Snowden Answers Some Questions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

National Cybersecurity Consortium (NCC)

National Cybersecurity Consortium (NCC)

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Gibbs Consulting

Gibbs Consulting

Gibbs Consulting provides innovative, flexible, on-demand IT Services and IT Consulting that delivers value and successful outcomes for our clients.