recommended reading

Edward Snowden's Other Motive for Leaking: Better Encryption

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil.

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil. // Andre Penner/AP

A few pages into Glenn Greenwald's newly released book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, there is a fascinating passage that transforms my understanding of why the contractor leaked NSA secrets.

The familiar rationale still applies. Edward Snowden wanted to inform Americans about the actions of our government and to spark a debate about mass surveillance. "My sole motive is to inform the public as to that which is done in their name," he reportedly wrote in a note to his collaborators, "and that which is done against them."

Actually, though, he had a second motive. Thomas Jefferson once wrote: "In questions of power then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution." Snowden wrote:

While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. 

Even if most people had ignored Snowden, he might not have judged his own actions a total waste. After all, they might have inspired a single cryptographer to innovate. That could be hugely significant.

The quote above isn't the only one that supports this analysis. Greenwald reproduces another paragraph that Snowden wrote to reporter and documentary filmmaker Laura Poitras early in their correspondence, characterizing it as "the crux of what he viewed as his mission." Snowden wrote:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man. 

I may be forgetting about a statement or series of statements that Snowden made over the last year. But as best I can remember, these are the clearest passages that we have indicating a second primary motive. Snowden was trying to reach the masses to inform us and spark a debate that somehow reined in the NSA. 

He was also trying to reach elites. In leaking, he hoped to inform and influence a small subculture of tech influencers. Regardless of how Americans reacted to his leaks, he hoped they'd awaken to the ideology and reach of the surveillance state, and that at least some programmers would be inspired to thwart it with technology.

This is in keeping with statements Snowden has made about the importance of encryption. It also casts additional doubt on the theory that he's been a Russian spy all along. If that were true, why would he fabricate this other rationale in private correspondence with Poitras? With that, I'm going to delve back into Greenwald's text. I'm guessing there will be more of interest in future posts, and I'll update this one if I come across another relevant passage, or if anyone sends me an old Snowden quote that is relevant to this second motive for leaking.

Threatwatch Alert

Social Media Takeover

Qatar News Agency Says Hackers Published Fake Stories

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.