Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Blue Label Telecoms to change its name as restructuring gathers pace

      11 July 2025

      Get your ID delivered like pizza – home affairs’ latest digital shake-up

      11 July 2025

      EFF vows to stop Starlink from launching in South Africa

      11 July 2025

      Apple plans product blitz to reignite growth

      11 July 2025

      Nissan doubles down on South Africa despite plant uncertainty

      11 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Snowden is a picture of the cybersecurity state

    Snowden is a picture of the cybersecurity state

    By The Conversation30 September 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    snowden-640
    Joseph Gordon-Levitt plays Edward Snowden in Oliver Stone’s Snowden

    With the release of a new film about Edward Snowden, the man who revealed secret documents detailing a massive US government spying programme, the debate about his character continues. That includes a renewed effort to encourage US President Barack Obama to pardon him. But, as Snowden himself might point out, what should give us pause is government intelligence agencies’ power.

    The extent and scope of their ability to intercept communications and collect information is mind-boggling. Oliver Stone’s new movie Snowden lays bare National Security Agency surveillance programmes that show little regard for citizen privacy, and the duplicitous statements the NSA makes about its activities.

    The movie’s narrative tells the story of Snowden himself (fictionalised and dramatised somewhat), including his military training, his medical discharge and his work in the intelligence community. It provides a new vehicle for the layman to learn about how the government uses modern communications technology.

    The movie doesn’t take a nuanced view of why intelligence agencies do what they do. Nor does it provide sufficient context about the NSA’s practices in relation to those of agencies in other countries. Its portrayal of the technology involved (and of US government efforts to apprehend and prosecute whistleblowers) is, however, mostly accurate.

    The film discusses three distinct aspects of the NSA’s efforts: data collection, analysis and the legal basis for surveillance. The movie accurately shows the agency’s systems for collecting bulk data from across the US — through direct connections to the networks of major telephone and Internet companies, including AT&T, Verizon, Google, Microsoft and Facebook.

    The suggestion, though, is that not only is data collected on all citizens, but — misleadingly — that all citizens are being investigated continuously.

    Given the volume of communications, and the constantly changing threat landscape, intelligence agencies can’t respond to every lead they get in real time. Under its Prism programme, the NSA collects data on every citizen, including e-mails, Web-browsing histories, social media activity records, voice and video chat records, phone calls, text documents, images and videos.

    Rather than monitor that immense stream as information flows through it, the agency archives it so as to be able to search it later, as new leads arise and investigations begin. The movie does not make clear this important distinction
    between having the ability to spy on every citizen and actually doing so.

    Simplifying data mining

    The film also depicts the NSA’s XKeyScore system, which can tap into all the data being collected. The information revealed by Snowden includes details on how XKeyScore can analyse the massive data trove, finding connections between people and matching voice patterns, among other abilities.

    In the movie, scenes where analysts use XKeyScore suggest that just by typing very basic data about individuals (such as a name or e-mail address) into an on-screen form, analysts can easily find exactly what they are looking for. This is a bit misleading. Data mining is a very challenging problem, especially in a set so large as to contain every communication in the US. Lots of innocent data surround a very small amount of what might be called useful intelligence.

    Data mining can help narrow down a large batch of information to a more manageable amount, but human analysts — not a computer search screen — are the key to discerning actionable intelligence. Rules and constraints govern who has access to the information. What analysts actually do is also closely supervised. A further limit on the abilities of technology and human analysts alike is that truly dangerous people are very careful to cover their tracks, using temporary e-mail accounts and strong encryption on their transmissions.

    The movie also strongly suggests that all of the NSA programmes are illegal. While they are controversial, their legality is an unclear, and even moving, target. The 1978 US Foreign Intelligence Surveillance Act provides legal procedures for physical and electronic surveillance and collection of communications between foreign powers and their agents in the US.

    It also allows surveillance of American citizens and permanent residents suspected of espionage or terrorism. While the law was designed to collect data from specific individuals, the NSA has used its powers to justify mass data collection and analysis.

    Some federal laws have been changed in the wake of Snowden’s revelations, in some cases retroactively legalising practices that might have been illegal. The NSA itself has also made changes to some of its programmes, due more to the public — and congressional — outcry against them than their legality.

    As a result of Snowden’s disclosures, the NSA has stopped its bulk collection of phone records and limited surveillance of leaders of foreign allies. It has also offered more transparency to the US congress on some of its efforts, and reduced the length of time it stores information on individuals.

    The international context

    Snowden reveals details of the NSA’s cooperation with other intelligence agencies, and shows its surveillance of international leaders — including Germany’s Angela Merkel and Brazil’s Dilma Rousseff. The reality is that every country is trying to gather intelligence information to get leverage in international diplomacy, whether with friends or foes.

    Snowden’s revelations will make it harder for US intelligence agencies to conduct this sort of diplomatic surveillance, but does not similarly affect other countries’ practices. The world’s awareness of the level of spying conducted by the US has also provided legitimacy to citizen-monitoring efforts in less democratic countries such as China and Russia.

    Is there any real privacy?

    The impact of all this information has been enormous, both for the US government and Snowden’s own personal life. Since releasing the information to the world, he has been holed up in Russia, with only temporary permission to stay. His American passport has been revoked. He cannot move around freely or communicate easily, for fear of US covert agents seeking to apprehend him — or worse.

    The movie doesn’t depict much of his Russian life, a decision that tends to reinforce the film’s message that there is no privacy anymore. If it showed more about how Snowden communicates now, it might provide useful insights into how Americans — and others around the world — could potentially use encrypted software to communicate without being subject to government surveillance.

    The real-life Edward Snowden
    The real Edward Snowden

    What it does show of secure communications is a good start, though. Not surprisingly, Snowden suggests using software that prevents tracking of user activities such as browsing, shopping and communicating. He also recommends using the Tor network, which anonymises data by sending it through a series of encrypted computer links. He suggests whistleblowers use tools like SecureDrop to communicate with journalists anonymously.

    Snowden the movie shows the long reach of the government in collecting intelligence on its citizens, and the fight of one disillusioned citizen against that unrestricted and unacknowledged governmental power. It highlights some of the complexities of the intelligence world, and the challenges of collecting information in the Internet-dominated world.

    Finally, it portrays the challenges in the personal life of a highly driven individual who followed his convictions in pursuit of social justice. Whether he is a patriot or a pariah depends on the lens you use — but he has certainly brought to the fore important discussions of privacy and cybersecurity for ordinary citizens, as well as free speech and government surveillance power.The Conversation

    • Sanjay Goel is professor of IT management, University at Albany, State University of New York
    • This article was originally published on The Conversation


    Edward Snowden NSA Oliver Stone
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSA universities threatened with ruin
    Next Article Icasa ordered to stop spectrum auction

    Related Posts

    Edward Snowden warns of AI ‘werewolves’

    5 June 2024

    NSA chief accuses China of ‘very aggressive’ hacking strategy

    31 May 2024

    China accuses US of hacking Huawei servers

    20 September 2023
    Company News

    $125-trillion traded: Binance redefines global finance in just eight years

    11 July 2025

    NEC XON welcomes HPE acquisition of Juniper Networks

    11 July 2025

    LTE Cat 1 vs Cat 1 bis – what’s the difference?

    11 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.