USA 2016: How Will Snowden Vote?

Although Edward Snowden had his passport revoked, he is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. But judging from the recent Republican canidates debate, his choices are severely limited.

Snowden and privacy campaigners can find satisfaction that surveillance was one of the dominant issues of the times. When he leaked tens of thousands of NSA documents in 2013, he said he did so to provoke debate about mass surveillance. 

But privacy campaigners will be alarmed at Republican attempts to push back against even the modest legislative changes, which resulted from the Snowden disclosures.

Republican candidate Marco Rubio called for an end to new protections against bulk phone data collection, and most of his fellow presidential candidates were on his side

The charge was led by Marco Rubio, who said the Freedom Act, passed in the summer, to end bulk collection of phone data, had given away a valuable tool of the security agencies in the fight against terrorism. The Florida senator said: “I promise you, the next time there is an attack on this country, the first thing people are going to want to know is why didn’t we know about it and why didn’t we stop it.

“The answer better not be ‘because we didn’t have access to records or information that would have allowed us to identify those killers before they attack’.”

His comments were aimed at rivals Ted Cruz and Rand Paul, who had both backed the Freedom Act.

It was an easy hit for Rubio. Since the attacks in Paris and San Bernardino, terrorism has jumped to top of voters’ concerns. It is harder to champion civil liberties at a time when many are worried about security.

Rubio is helped by the fact that his views chime with the heads of the intelligence services, who have been vocal in recent weeks in the aftermath of the Paris and San Bernardino attacks. They have been pressing for more surveillance powers, especially pushing internet service providers to allow easier access to encrypted messages.

Surveillance must increase after terror attacks, say all 2016 candidates

Rubio wants restoration of the powers removed in the Freedom Act. But the Freedom Act introduced only modest reforms. While it ended the bulk data collection of phone records, it allowed the intelligence agencies to continue to scoop up other communications.

The intelligence agencies have so far failed to make the case for bulk data collection – access to communications of every citizen as opposed to targeted surveillance and the monitoring of persons of concern. In every attack since 9/11, bulk data collection, whether in the US or Europe, has failed to stop a single incident. The killers in the Boston attack were already known to the security agencies, as were those responsible for the Paris attacks.

Snowden, in a series of tweets in December wrote: “The gov. itself admits the kind of universal surveillance the FBI Director wants has never stopped a single attack.”

Snowden also addressed the broader issue of attempts to exploit concerns over security. “Abandoning open society for fear of terrorism is the only way to be defeated by it,” Snowden tweeted.

Lining up with Rubio were Jeb Bush, a strong ally of the NSA, Donald Trump, and Chris Christie. Cruz retaliated against Rubio by saying the Freedom Act strengthened the NSA. It was left to Paul to make the libertarian case in favour of privacy.

So where does that leave Snowden when it comes to voting? As a libertarian, who believes in strong adherence to the constitution and to small government, he backed Rand Paul’s father Ron in the 2008 White House race but harbored hopes that Barack Obama might help redress the balance in favour of privacy.

Apart from Rand Paul on the Republican side and Bernie Sanders on the Democratic side, Snowden has no public sympathizers in the race. And even Paul has said that while he welcomes the debate Snowden started, he thinks he should be jailed.

Guardian: http://bit.ly/1k43OOo

 

« Britain's Nuclear Subs In Cyber War
Islamic State Launches A Cyber War Magazine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.