USA 2016: How Will Snowden Vote?

Although Edward Snowden had his passport revoked, he is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. But judging from the recent Republican canidates debate, his choices are severely limited.

Snowden and privacy campaigners can find satisfaction that surveillance was one of the dominant issues of the times. When he leaked tens of thousands of NSA documents in 2013, he said he did so to provoke debate about mass surveillance. 

But privacy campaigners will be alarmed at Republican attempts to push back against even the modest legislative changes, which resulted from the Snowden disclosures.

Republican candidate Marco Rubio called for an end to new protections against bulk phone data collection, and most of his fellow presidential candidates were on his side

The charge was led by Marco Rubio, who said the Freedom Act, passed in the summer, to end bulk collection of phone data, had given away a valuable tool of the security agencies in the fight against terrorism. The Florida senator said: “I promise you, the next time there is an attack on this country, the first thing people are going to want to know is why didn’t we know about it and why didn’t we stop it.

“The answer better not be ‘because we didn’t have access to records or information that would have allowed us to identify those killers before they attack’.”

His comments were aimed at rivals Ted Cruz and Rand Paul, who had both backed the Freedom Act.

It was an easy hit for Rubio. Since the attacks in Paris and San Bernardino, terrorism has jumped to top of voters’ concerns. It is harder to champion civil liberties at a time when many are worried about security.

Rubio is helped by the fact that his views chime with the heads of the intelligence services, who have been vocal in recent weeks in the aftermath of the Paris and San Bernardino attacks. They have been pressing for more surveillance powers, especially pushing internet service providers to allow easier access to encrypted messages.

Surveillance must increase after terror attacks, say all 2016 candidates

Rubio wants restoration of the powers removed in the Freedom Act. But the Freedom Act introduced only modest reforms. While it ended the bulk data collection of phone records, it allowed the intelligence agencies to continue to scoop up other communications.

The intelligence agencies have so far failed to make the case for bulk data collection – access to communications of every citizen as opposed to targeted surveillance and the monitoring of persons of concern. In every attack since 9/11, bulk data collection, whether in the US or Europe, has failed to stop a single incident. The killers in the Boston attack were already known to the security agencies, as were those responsible for the Paris attacks.

Snowden, in a series of tweets in December wrote: “The gov. itself admits the kind of universal surveillance the FBI Director wants has never stopped a single attack.”

Snowden also addressed the broader issue of attempts to exploit concerns over security. “Abandoning open society for fear of terrorism is the only way to be defeated by it,” Snowden tweeted.

Lining up with Rubio were Jeb Bush, a strong ally of the NSA, Donald Trump, and Chris Christie. Cruz retaliated against Rubio by saying the Freedom Act strengthened the NSA. It was left to Paul to make the libertarian case in favour of privacy.

So where does that leave Snowden when it comes to voting? As a libertarian, who believes in strong adherence to the constitution and to small government, he backed Rand Paul’s father Ron in the 2008 White House race but harbored hopes that Barack Obama might help redress the balance in favour of privacy.

Apart from Rand Paul on the Republican side and Bernie Sanders on the Democratic side, Snowden has no public sympathizers in the race. And even Paul has said that while he welcomes the debate Snowden started, he thinks he should be jailed.

Guardian: http://bit.ly/1k43OOo

 

« Britain's Nuclear Subs In Cyber War
Islamic State Launches A Cyber War Magazine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

SecureDNE

SecureDNE

SecureDNE are a leading provider of cutting-edge Fractional CISO, Managed Cybersecurity Services, and Cybersecurity Engineering Solutions.