US Needed Snowden to Open the Door on NSA’s Spying

25537snowden_678x320_front.jpg

With Congress now poised to review the NSA’s bulk metadata program, it’s worth thinking about where we would be now if a twenty-nine-year-old contractor for Booz Allen Hamilton hadn’t left Hawaii for Hong Kong, and a new life as an outlaw ombudsman.

Were it not for Edward Snowden the NSA would likely still be collecting the records of almost every phone call made in the United States, and no one outside of government would know it. A handful of civil-liberties-minded representatives and senators might drop hints in hearings and ask more pointed questions in classified settings. Members of the public would continue making phone calls, unaware that they were contributing to a massive government database that was supposedly intended to make their lives safer but had not prevented a single terrorist attack. And, recently, the government’s Section 215 powers, used to acquire records from hundred of billions of phone calls, among other “tangible things,” would be quietly renewed.

Snowden shouldn’t have been necessary. The Foreign Intelligence Surveillance Court (or FISA Court), which evaluates Section 215 requests, is supposed to be interpreting the law to make sure that government surveillance doesn’t go outside of it. Congressional intelligence committees, which review the activities of the NSA, are supposed to be providing some oversight. The NSA itself reports to the Department of Defense, which reports to the White House, all of which have dozens of lawyers, who are all supposed to apply the law. 

The government, in other words, is supposed to be watching itself, especially in matters of national security, which are, by necessity, shielded from daylight. The fact that it took thirteen years, and one whistle-blower, to expose a program that is conclusively ineffective and, according to one federal appeals court, illegal, points to a problem much larger than any one program. It suggests that claims about what is necessary to prevent the next terrorist attack are too sacrosanct to require evidence. As the debate over Section 215 has played out over the past two years, it has become clear that the punishments for exaggerating the efficacy of surveillance programs and downplaying their privacy implications are just about nonexistent.

New Yorker:  

« "Torus" Reveals an Expansion in 5 Eyes Surveillance.
Edward Snowden Answers Some Questions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Riddle&Code

Riddle&Code

Riddle&Code is a product-led services company specializing in onboarding industries to Web3. The team's mission is to provide a trusted connection between the digital and physical worlds.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Winslow Technology Group (WTG)

Winslow Technology Group (WTG)

Winslow Technology Group is a leading provider of IT Solutions, Managed Services, and Cybersecurity Services dedicated to providing exceptional business outcomes for our customers since 2003.