Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Meta may launch AI-powered smartwatch in 2026

      Meta may launch AI-powered smartwatch in 2026

      19 February 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
      Vibe coding is transforming development - but at what cost to open source? - Julian Gericke

      Vibe coding is transforming development – but at what cost to open source?

      18 February 2026
      SA film industry to get funding boost and digital overhaul after outcry

      SA film industry to get funding boost and digital overhaul after outcry

      18 February 2026
    • World
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
      Russia bans WhatsApp

      Russia bans WhatsApp

      12 February 2026
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      A million reasons monopolies don't work - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Snowden is a picture of the cybersecurity state

    Snowden is a picture of the cybersecurity state

    By The Conversation30 September 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    snowden-640
    Joseph Gordon-Levitt plays Edward Snowden in Oliver Stone’s Snowden

    With the release of a new film about Edward Snowden, the man who revealed secret documents detailing a massive US government spying programme, the debate about his character continues. That includes a renewed effort to encourage US President Barack Obama to pardon him. But, as Snowden himself might point out, what should give us pause is government intelligence agencies’ power.

    The extent and scope of their ability to intercept communications and collect information is mind-boggling. Oliver Stone’s new movie Snowden lays bare National Security Agency surveillance programmes that show little regard for citizen privacy, and the duplicitous statements the NSA makes about its activities.

    The movie’s narrative tells the story of Snowden himself (fictionalised and dramatised somewhat), including his military training, his medical discharge and his work in the intelligence community. It provides a new vehicle for the layman to learn about how the government uses modern communications technology.

    The movie doesn’t take a nuanced view of why intelligence agencies do what they do. Nor does it provide sufficient context about the NSA’s practices in relation to those of agencies in other countries. Its portrayal of the technology involved (and of US government efforts to apprehend and prosecute whistleblowers) is, however, mostly accurate.

    The film discusses three distinct aspects of the NSA’s efforts: data collection, analysis and the legal basis for surveillance. The movie accurately shows the agency’s systems for collecting bulk data from across the US — through direct connections to the networks of major telephone and Internet companies, including AT&T, Verizon, Google, Microsoft and Facebook.

    The suggestion, though, is that not only is data collected on all citizens, but — misleadingly — that all citizens are being investigated continuously.

    Given the volume of communications, and the constantly changing threat landscape, intelligence agencies can’t respond to every lead they get in real time. Under its Prism programme, the NSA collects data on every citizen, including e-mails, Web-browsing histories, social media activity records, voice and video chat records, phone calls, text documents, images and videos.

    Rather than monitor that immense stream as information flows through it, the agency archives it so as to be able to search it later, as new leads arise and investigations begin. The movie does not make clear this important distinction
    between having the ability to spy on every citizen and actually doing so.

    Simplifying data mining

    The film also depicts the NSA’s XKeyScore system, which can tap into all the data being collected. The information revealed by Snowden includes details on how XKeyScore can analyse the massive data trove, finding connections between people and matching voice patterns, among other abilities.

    In the movie, scenes where analysts use XKeyScore suggest that just by typing very basic data about individuals (such as a name or e-mail address) into an on-screen form, analysts can easily find exactly what they are looking for. This is a bit misleading. Data mining is a very challenging problem, especially in a set so large as to contain every communication in the US. Lots of innocent data surround a very small amount of what might be called useful intelligence.

    Data mining can help narrow down a large batch of information to a more manageable amount, but human analysts — not a computer search screen — are the key to discerning actionable intelligence. Rules and constraints govern who has access to the information. What analysts actually do is also closely supervised. A further limit on the abilities of technology and human analysts alike is that truly dangerous people are very careful to cover their tracks, using temporary e-mail accounts and strong encryption on their transmissions.

    The movie also strongly suggests that all of the NSA programmes are illegal. While they are controversial, their legality is an unclear, and even moving, target. The 1978 US Foreign Intelligence Surveillance Act provides legal procedures for physical and electronic surveillance and collection of communications between foreign powers and their agents in the US.

    It also allows surveillance of American citizens and permanent residents suspected of espionage or terrorism. While the law was designed to collect data from specific individuals, the NSA has used its powers to justify mass data collection and analysis.

    Some federal laws have been changed in the wake of Snowden’s revelations, in some cases retroactively legalising practices that might have been illegal. The NSA itself has also made changes to some of its programmes, due more to the public — and congressional — outcry against them than their legality.

    As a result of Snowden’s disclosures, the NSA has stopped its bulk collection of phone records and limited surveillance of leaders of foreign allies. It has also offered more transparency to the US congress on some of its efforts, and reduced the length of time it stores information on individuals.

    The international context

    Snowden reveals details of the NSA’s cooperation with other intelligence agencies, and shows its surveillance of international leaders — including Germany’s Angela Merkel and Brazil’s Dilma Rousseff. The reality is that every country is trying to gather intelligence information to get leverage in international diplomacy, whether with friends or foes.

    Snowden’s revelations will make it harder for US intelligence agencies to conduct this sort of diplomatic surveillance, but does not similarly affect other countries’ practices. The world’s awareness of the level of spying conducted by the US has also provided legitimacy to citizen-monitoring efforts in less democratic countries such as China and Russia.

    Is there any real privacy?

    The impact of all this information has been enormous, both for the US government and Snowden’s own personal life. Since releasing the information to the world, he has been holed up in Russia, with only temporary permission to stay. His American passport has been revoked. He cannot move around freely or communicate easily, for fear of US covert agents seeking to apprehend him — or worse.

    The movie doesn’t depict much of his Russian life, a decision that tends to reinforce the film’s message that there is no privacy anymore. If it showed more about how Snowden communicates now, it might provide useful insights into how Americans — and others around the world — could potentially use encrypted software to communicate without being subject to government surveillance.

    The real-life Edward Snowden
    The real Edward Snowden

    What it does show of secure communications is a good start, though. Not surprisingly, Snowden suggests using software that prevents tracking of user activities such as browsing, shopping and communicating. He also recommends using the Tor network, which anonymises data by sending it through a series of encrypted computer links. He suggests whistleblowers use tools like SecureDrop to communicate with journalists anonymously.

    Snowden the movie shows the long reach of the government in collecting intelligence on its citizens, and the fight of one disillusioned citizen against that unrestricted and unacknowledged governmental power. It highlights some of the complexities of the intelligence world, and the challenges of collecting information in the Internet-dominated world.

    Finally, it portrays the challenges in the personal life of a highly driven individual who followed his convictions in pursuit of social justice. Whether he is a patriot or a pariah depends on the lens you use — but he has certainly brought to the fore important discussions of privacy and cybersecurity for ordinary citizens, as well as free speech and government surveillance power.The Conversation

    • Sanjay Goel is professor of IT management, University at Albany, State University of New York
    • This article was originally published on The Conversation


    Edward Snowden NSA Oliver Stone
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSA universities threatened with ruin
    Next Article Icasa ordered to stop spectrum auction

    Related Posts

    Edward Snowden warns of AI ‘werewolves’

    5 June 2024

    NSA chief accuses China of ‘very aggressive’ hacking strategy

    31 May 2024
    China accuses US of hacking Huawei servers

    China accuses US of hacking Huawei servers

    20 September 2023
    Company News
    The quiet infrastructure powering AI: why long-life IOT networks matter more than ever - Sigfox South Africa

    The quiet infrastructure powering AI: why long-life IoT networks matter more than ever

    18 February 2026
    Scaling modern, data-driven farming across Africa - Chris Duvenage

    Scaling modern, data-driven farming across Africa

    17 February 2026
    Why getting your small business online costs less than you think

    Why getting your small business online costs less than you think

    17 February 2026
    Opinion
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Meta may launch AI-powered smartwatch in 2026

    Meta may launch AI-powered smartwatch in 2026

    19 February 2026
    The last generation of coders

    The last generation of coders

    18 February 2026
    The AI fraud crisis your bank is not ready for - Andries Maritz

    The AI fraud crisis your bank is not ready for

    18 February 2026
    Vibe coding is transforming development - but at what cost to open source? - Julian Gericke

    Vibe coding is transforming development – but at what cost to open source?

    18 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}