recommended reading

Edward Snowden's Other Motive for Leaking: Better Encryption

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil.

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil. // Andre Penner/AP

A few pages into Glenn Greenwald's newly released book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, there is a fascinating passage that transforms my understanding of why the contractor leaked NSA secrets.

The familiar rationale still applies. Edward Snowden wanted to inform Americans about the actions of our government and to spark a debate about mass surveillance. "My sole motive is to inform the public as to that which is done in their name," he reportedly wrote in a note to his collaborators, "and that which is done against them."

Actually, though, he had a second motive. Thomas Jefferson once wrote: "In questions of power then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution." Snowden wrote:

While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. 

Even if most people had ignored Snowden, he might not have judged his own actions a total waste. After all, they might have inspired a single cryptographer to innovate. That could be hugely significant.

The quote above isn't the only one that supports this analysis. Greenwald reproduces another paragraph that Snowden wrote to reporter and documentary filmmaker Laura Poitras early in their correspondence, characterizing it as "the crux of what he viewed as his mission." Snowden wrote:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man. 

I may be forgetting about a statement or series of statements that Snowden made over the last year. But as best I can remember, these are the clearest passages that we have indicating a second primary motive. Snowden was trying to reach the masses to inform us and spark a debate that somehow reined in the NSA. 

He was also trying to reach elites. In leaking, he hoped to inform and influence a small subculture of tech influencers. Regardless of how Americans reacted to his leaks, he hoped they'd awaken to the ideology and reach of the surveillance state, and that at least some programmers would be inspired to thwart it with technology.

This is in keeping with statements Snowden has made about the importance of encryption. It also casts additional doubt on the theory that he's been a Russian spy all along. If that were true, why would he fabricate this other rationale in private correspondence with Poitras? With that, I'm going to delve back into Greenwald's text. I'm guessing there will be more of interest in future posts, and I'll update this one if I come across another relevant passage, or if anyone sends me an old Snowden quote that is relevant to this second motive for leaking.

Threatwatch Alert

Stolen credentials

14M University Email Accounts for Sale on Dark Web

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.