NSA Should Thank Edward Snowden

Edward Snowden’s decision in 2013 to leak secret documents about America’s mass surveillance programs did not end them completely. But the reforms adopted in the wake of his disclosures have strengthened not only Americans’ privacy, but the National Security Agency’s (NSA) ability to collect intelligence.

Make no mistake, these reforms would not have happened without a whistleblower like Snowden. Obama’s aides showed little interest in reforming mass surveillance until the Snowden leaks forced their hands.

It was Snowden who forced the NSA to be more transparent, accountable, and protective of privacy. The NSA took painful steps to open up. It released thousands of pages of previously top-secret documents in a transparency drive intended to put the Snowden leaks in context. The head of the intelligence community now publishes an annual transparency report. Congress ended bulk collection of Americans’ telephone records after an outside review found it to be of marginal value.

More fundamentally, Snowden enlarged the way the US government thinks about privacy. The Snowden documents outraged friendly governments and embarrassed US technology companies in the global marketplace.

In response, Obama issued new rules requiring the NSA to consider the privacy not only of Americans, but of everyone in the world. Despite President Donald Trump’s nationalist rhetoric, the new administration is sticking with these rules. Director of National Intelligence Dan Coats agrees that the rules protecting foreigners’ privacy in intelligence collection have helped to reassure European allies.

In fact, one of the biggest beneficiaries of the post-Snowden reforms has been the NSA itself.

The system that Congress created to end the NSA’s bulk collection of telephone records from American companies has actually given the agency’s analysts access to data from more companies than before.

The old bulk collection program was limited for reasons of secrecy, trust, and logistics to a few large providers. According the NSA’s top lawyer, this has given the agency access to “a greater volume of call records” than it had before, without the responsibility of storing the billions of irrelevant records it used to collect each day under the old program.

It turns out that transparency and privacy protection go hand in hand with good intelligence.

Last year, former Attorney General Eric Holder offered qualified praise for Snowden. “We can certainly argue about the way in which Snowden did what he did, but I think he actually performed a public service by raising the debate that we engaged in and by the changes that we made,” he said. (He said in the same interview that what Snowden did was “inappropriate and illegal.”) Despite the dislike my old colleagues in the intelligence community have for Snowden, I have heard many of them privately express similar views.

Trump has inherited the most powerful apparatus for mass surveillance the world has ever seen. While the post-Snowden reforms are a good first step, we delude ourselves if we think they have made the NSA tyrant-proof.

In Snowden’s first interview from Hong Kong, he warned against “turnkey tyranny.” One day, he said, “a new leader will be elected” and “they’ll flip the switch.”

It is important that this warning not be proved prophetic. This year, Congress will review the Foreign Intelligence Surveillance Act (FISA), in which Section 702 allows warrantless NSA surveillance of foreign targets who may be in contact with Americans.

While the law has produced valuable intelligence, it requires additional reforms to protect privacy. Now more than ever, protecting civil liberties is a cause worth fighting for, not only for the surveillance state’s discontents but for the surveillance state itself.

Fortune

You Might Also Read:

Snowden: NSA Should Have Prevented WannaCry Attacks:

US Intelligence Agencies Fear Insiders As Much As Spies:

 

« N.Korea Will Target UK Financial Services
Russian Cyber Campaign Aims To Splinter US Voters »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Universal Technical Resource Services (UTRS)

Universal Technical Resource Services (UTRS)

UTRS is a technology firm that delivers a wide range of engineering, technical, strategic, and digital services to the public and private sectors.