recommended reading

Edward Snowden's Other Motive for Leaking: Better Encryption

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil.

Participants hold up images of former NSA analyst Edward Snowden during the opening ceremony of NETmundial, a major conference on the future of Internet governance in Sao Paulo, Brazil. // Andre Penner/AP

A few pages into Glenn Greenwald's newly released book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, there is a fascinating passage that transforms my understanding of why the contractor leaked NSA secrets.

The familiar rationale still applies. Edward Snowden wanted to inform Americans about the actions of our government and to spark a debate about mass surveillance. "My sole motive is to inform the public as to that which is done in their name," he reportedly wrote in a note to his collaborators, "and that which is done against them."

Actually, though, he had a second motive. Thomas Jefferson once wrote: "In questions of power then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution." Snowden wrote:

While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. 

Even if most people had ignored Snowden, he might not have judged his own actions a total waste. After all, they might have inspired a single cryptographer to innovate. That could be hugely significant.

The quote above isn't the only one that supports this analysis. Greenwald reproduces another paragraph that Snowden wrote to reporter and documentary filmmaker Laura Poitras early in their correspondence, characterizing it as "the crux of what he viewed as his mission." Snowden wrote:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man. 

I may be forgetting about a statement or series of statements that Snowden made over the last year. But as best I can remember, these are the clearest passages that we have indicating a second primary motive. Snowden was trying to reach the masses to inform us and spark a debate that somehow reined in the NSA. 

He was also trying to reach elites. In leaking, he hoped to inform and influence a small subculture of tech influencers. Regardless of how Americans reacted to his leaks, he hoped they'd awaken to the ideology and reach of the surveillance state, and that at least some programmers would be inspired to thwart it with technology.

This is in keeping with statements Snowden has made about the importance of encryption. It also casts additional doubt on the theory that he's been a Russian spy all along. If that were true, why would he fabricate this other rationale in private correspondence with Poitras? With that, I'm going to delve back into Greenwald's text. I'm guessing there will be more of interest in future posts, and I'll update this one if I come across another relevant passage, or if anyone sends me an old Snowden quote that is relevant to this second motive for leaking.

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.