Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity

Electronica Artist Jean Michel Jarre's In-concert Lightshow

To see music and politics mix isn’t much of a rare occurrence. Taking a theme about cybersecurity is.

Musicians, visible, culturally influential, armed with the power of both a literal and metaphorical megaphone, often take to the recording studio to champion certain political views or activist movements. Sometimes, it resonates. “Imagine,” the Beatles front-man crooning socialist anthem, is a recognizable example.

Yet when political figures worm their way into music, things don’t always click. Take the thinly veiled piece of propaganda that is China’s “official rap song,” released by the Communist Party last year. Or the not-really rock album dropped by Pope Francis a few months ago, in which His Holiness “sings” about climate change and charity. Not to mention the blatant ways in which candidates in this year’s US presidential rate have cleverly maneuvered their campaigns with music that appeals to certain audiences.

Joining them this week in the trend of political faux-music is none other than Edward Snowden. Call it “whistleblower electronica.” 

Snowden collaborated with French electronic music composer Jean-Michel Jarre to produce “Exit,” a hectic medley of speedy techno and musings on cybersecurity. It includes so-called lyrics, spoken by Snowden. 

"The question is, why are our private details that are transmitted online, or why are private details that are stored on our personal devices, any different than the details and the private record of our lives that are stored in our private journals?"

"Saying that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about freedom of speech because you have nothing to say. It’s a deeply antisocial principle, because rights are not just individual. They’re collective. What may not have value to you today may have value to an entire population. If you don’t stand up for it, then who will?"

Interspersed with Snowden’s words is the steady thump of a beat and a few notes. It’s not a song, really; it’s a monologue.

“Music, as with all art, is one of the only ways that we can create bonds and bridges between human hearts that are beyond semantic understanding,” Snowden said to Rolling Stone about the song.

QZ: http://bit.ly/1XIPyeq

« How ISIS Uses The Internet
Pentagon Testing Small Robot To Hunt Naval Mines »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.