Snowden effect

The Snowden effect is part of the reactions to global surveillance disclosures made by Edward Snowden. His disclosures have fueled debates over mass surveillance, government secrecy, and the balance between national security and information privacy, and have resulted in notable impacts on society and the tech industry, and served as the impetus for new products that address privacy concerns such as encryption services. Collectively, these impacts been referred to by media and others as the "Snowden effect".

Edward Snowden
Snowden in Moscow, October 9, 2013

On society

In July 2013, media critic Jay Rosen defined the Snowden effect as "Direct and indirect gains in public knowledge from the cascade of events and further reporting that followed Edward Snowden's leaks of classified information about the surveillance state in the U.S."[1] In December 2013, The Nation wrote that Snowden had sparked an overdue debate about national security and individual privacy.[2] At the 2014 World Economic Forum, Internet experts saw news that Microsoft would let foreign customers store their personal data on servers outside America as a sign that Snowden's leaks were leading countries and companies to erect borders in cyberspace.[3] In Forbes, the effect was seen to have nearly united the U.S. Congress in opposition to the massive post-9/11 domestic intelligence gathering system.[4] In its Spring 2014 Global Attitudes Survey, the Pew Research Center found that Snowden's disclosures had tarnished the image of the United States, especially in Europe and Latin America.[5]

In May 2014, the Obama administration appointed William Evanina, a former FBI special agent with a counter-terrorism specialty, as the new government-wide National Counterintelligence Executive. "Instead of getting carried away with the concept of leakers as heroes," Evanina said in August, "we need to get back to the basics of what it means to be loyal. Undifferentiated, unauthorized leaking is a criminal act." While dealing with insider threats had been an intelligence community priority since WikiLeaks published Chelsea Manning's disclosures in 2010, Evanina said that in the aftermath of Snowden's June 2013 revelations, the process "sped up from a regional railway to the Acela train." A year later, 100,000 fewer people had security clearances.[6]

In September 2014, Director of National Intelligence James Clapper said Snowden's leaks created a perfect storm, degrading the intelligence community's capabilities. Snowden's leaks, said Clapper, damaged relationships with foreign and corporate stakeholders, restrained budget resources, and caused the U.S. to discontinue collecting intelligence on certain targets, putting the United States at greater risk.[7]

In October 2014, former Director of the National Counterterrorism Center Matthew G. Olsen told CNN that Snowden's disclosures had made it easier for terrorist groups to evade U.S. surveillance by changing their encryption methods. Olsen said intelligence collection against some individuals of concern had been lost, preventing insight into their activities.[8] By July 2015 ISIL had studied Snowden's disclosures and, said U.S. officials, its leaders were using couriers or encrypted communications that Western analysts could not crack.[9]

In February 2015, National Counterterrorism Center director Nicholas Rasmussen told Congress that Snowden's disclosures had damaged U.S. intelligence capabilities. Rasmussen said the government knew of specific terrorists who, after learning from Snowden's leaks how the U.S. collected intelligence, had increased their security measures by using new types of encryption, changing email addresses, or abandoning prior methods of communicating.[10]

Reflecting on the effect of his leaks, Snowden himself wrote in February 2015 that "the biggest change has been in awareness. Before 2013, if you said the NSA was making records of everybody's phone calls and the GCHQ was monitoring lawyers and journalists, people raised eyebrows and called you a conspiracy theorist. Those days are over."[11]

In March 2015, USA Today reported that the Snowden effect had hit The Guardian. Journalist Michael Wolff, who wrote for The Guardian for many years, asserted that the recent selection of Katharine Viner as editor-in-chief "can be read as, in part, a deeply equivocal response on the part of the paper's staff, with its unusual power in the process of selecting a new editor, to the Snowden story." According to Wolff, there had developed "a sense of journalistic queasiness around Snowden, difficult to express at the party-line Guardian. Questioning Snowden's retreat to Russia and his protection by Vladimir Putin was internally verboten."[12]

Technology industry

In the technology industry, the Snowden effect had a profound impact after it was revealed that the NSA was tapping into the information held by some U.S. cloud-based services. Google, Cisco, and AT&T lost business internationally due to the public outcry over their roles in NSA spying. A study by the Information Technology and Innovation Foundation published in August 2013 estimated that the cloud-based computing industry could have lost up to $35 billion by 2016.[13] The Wall Street Journal named "the Snowden effect" as 2013's top tech story, saying Snowden's leaks "taught businesses that the convenience of the cloud cuts both ways." The Journal predicted the effect would top 2014 news as well, given the number of documents yet to be revealed.[14] In China, the most profitable country for U.S. tech companies, all are "under suspicion as either witting or unwitting collaborators" in the NSA spying, according to the director of the Research Center for Chinese Politics and Business at Indiana University.[15] The effect was also seen in changes to investment in the industry, with security "back on the map" according to Hussein Kanji, Venture Capitalist at Hoxton Ventures.[16]

On August 8, 2013, Lavabit, a secure email provider that Snowden used, discontinued service after being asked for encryption keys that would have exposed to U.S. government prosecutors the emails of all 410,000 Lavabit users.[17] The next day, a similar provider called Silent Circle announced that it too would shut down because it was not possible to sufficiently secure email.[18] In October 2013, the two companies joined forces and announced a new email service, Dark Mail Alliance,[19] designed to withstand government surveillance.[20][21]

After revelations that German Chancellor Angela Merkel's mobile was being tapped, the tech industry rushed to create a secure cell phone.[16] According to TechRepublic, revelations from the NSA leaks "rocked the IT world" and had a "chilling effect". The three biggest impacts were seen as increased interest in encryption, business leaving U.S. companies, and a reconsideration of the safety of cloud technology.[22] The Blackphone, which The New Yorker called "a phone for the age of Snowden"—described as "a smartphone explicitly designed for security and privacy", created by the makers of GeeksPhone, Silent Circle, and PGP, provided encryption for phone calls, emails, texts, and Internet browsing.[23][24]

Since Snowden's disclosures, Americans used the Internet less for things like email, online shopping and banking, according to an April 2014 poll.[25][26] Also in April 2014, former NSA deputy director Col. Cedric Leighton told the Bloomberg Enterprise Technology Summit in New York City that Snowden's leaks had performed a significant disservice to the worldwide health of the Internet by leading Brazil and other countries to reconsider the Internet's decentralized nature. Leighton suggested that nation-states' efforts to create their own versions of the Internet were the beginning of the end for the Internet as we know it. "When you have a situation where all of a sudden, everyone goes into 'tribal' mode—a German cloud, a Swiss cloud, or any other separate Internet—they are significant nationalistic attempts," said Leighton. "What happened with Snowden, it's more of an excuse than a policy, it's more of an excuse to re-nationalize the Internet."[27]

In March 2014, The New York Times reported that economic fallout from Snowden's leaks had been a boon for foreign companies, to the detriment of U.S. firms. Daniel Castro, a senior analyst at the Information Technology and Innovation Foundation, predicted that the United States cloud computing industry could lose $35 billion by 2016. Matthias Kunisch, a German software executive who switched from U.S. cloud computing providers to Deutsche Telekom, said that due to Snowden his customers thought American companies had connections to the NSA. Security analysts estimated that U.S. tech companies had since Snowden collectively spent millions and possibly billions of dollars adding state-of-the-art encryption features to consumer services and to the cables that link data centres.[28]

In July 2014, the nonpartisan New America Foundation summarized the impact of Snowden's revelations on U.S. businesses.[29] The erosion of trust, said the report, has had serious consequences for U.S. tech firms. IT executives in France, Hong Kong, Germany, the UK, and the U.S. confirmed that Snowden's leaks directly impacted how companies around the world think about information and communication technologies, particularly cloud computing. A quarter of British and Canadian multinational companies surveyed were moving their data outside the U.S. Among U.S. companies attributing drops in revenue to, in part, the fallout from Snowden's leaks was Cisco Systems, Qualcomm, IBM, Microsoft, and Hewlett-Packard. Proposed laws in more than a dozen foreign countries, including Germany, Brazil, and India, would make it harder for U.S. firms to do business there. The European Union is considering stricter domestic privacy legislation that could result in fines and penalties costing U.S. firms billions of dollars.[30]

In August 2014, Massachusetts-based web intelligence firm Recorded Future announced it had found a direct connection between Snowden's leaks and dramatic changes in how Islamist terrorists interacted online.[31][32] (In 2010, the privately held Recorded Future received an investment from In-Q-Tel,[33] a nonprofit venture capital firm whose primary partner is the CIA.[34]) Just months after Snowden's 2013 leaks, said Recorded Future, operatives of al-Qaeda and associated groups completely overhauled their 7-year-old encryption methods, which included "homebrewed" algorithms, adopting instead more sophisticated open-source software and newly available downloads that enabled encryption on cellphones, Android products, and Macs, to help disguise their communications.[32]

In September 2014, Seattle-based Deep Web and Dark web monitoring firm Flashpoint Global Partners published a report that found "very little open-source information available via jihadi online social media" indicating that Snowden's leaks impelled al-Qaeda to develop more secure digital communications. "The underlying public encryption methods employed by online jihadists," the report concluded, "do not appear to have significantly changed since the emergence of Edward Snowden. Major recent technological advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums."[35]

In May 2015, The Nation reported, "The fallout from the Edward Snowden fiasco wasn't just political—it was largely economic. Soon after the extent of the NSA's data collection became public, overseas customers (including the Brazilian government) started abandoning U.S.-based tech companies in droves over privacy concerns. The dust hasn't settled yet, but tech-research firm Forrester estimated the losses may total 'as high as $180 billion,' or 25 percent of industry revenue."[36]

Consumer products

In September 2014, The New York Times credited Apple Inc.'s update of iOS 8, which encrypts all data inside it, as demonstrating how Snowden's impact had begun to work its way into consumer products. His revelations said The Times, "not only killed recent efforts to expand the law, but also made nations around the world suspicious that every piece of American hardware and software—from phones to servers made by Cisco Systems—have 'back doors' for American intelligence and law enforcement." The Times situated this development within a "Post Snowden Era" in which Apple would no longer comply with NSA and law enforcement requests for user data, instead maintaining that Apple doesn't possess the key to unlocking data on the iPhone. However, since the new security protects information stored on the device itself, but not data stored on Apple's iCloud service, Apple will still be able to obtain some customer information stored on iCloud in response to government requests. The Times added that Google's Android would have encryption enabled by default in upcoming versions.[37]

References

  1. Rosen, Jay. "The Snowden Effect: definition and examples". Jay Rosen's PressThink. Retrieved February 18, 2015.
  2. Alterman, Eric. "What the Press Should Learn From the 'Snowden Effect'". The Nation. Retrieved March 2, 2014.
  3. Davos, L.S. (January 24, 2014). "The Snowden effect". The Economist. Retrieved March 2, 2014.
  4. Watson, Tom. "The Snowden Effect Hits Congress: Will Effective Crowdsourced Lobbying Follow?". Forbes. Retrieved March 2, 2014.
  5. "Global Opposition to U.S. Surveillance and Drones, but Limited Harm to America's Image". Pew Research Center. July 14, 2014. Cite journal requires |journal= (help)
  6. Clark, Charles S. (August 15, 2014). "Meet the Man Who's Gauging the Damage From Snowden". Government Executive. Retrieved April 11, 2015.
  7. Sink, Justin (September 18, 2014). "Intelligence chief says Snowden leaks created 'perfect storm'". The Hill. Retrieved April 11, 2015.
  8. Liptak, Kevin (October 21, 2014). "Ex-counterterror chief: U.S. lost track of terrorists after Snowden". CNN. Retrieved April 11, 2015.
  9. Eric P. Schmitt and Ben Hubbard (July 20, 2015) ISIS Leader Takes Steps to Ensure Group's Survival The New York Times
  10. Aftergood, Steven (February 17, 2015). "Leaks Damaged U.S. Intelligence, Official Says". Federation of American Scientists.
  11. "We are Edward Snowden, Laura Poitras and Glenn Greenwald from the Oscar-winning documentary CITIZENFOUR". Reddit. Retrieved February 25, 2015.
  12. Wolff, Michael (March 20, 2015). "Snowden effect hits 'Guardian'". USA Today. Retrieved March 26, 2015.
  13. Smith, Gerry (January 24, 2014). "' Snowden Effect' Threatens U.S. Tech Industry's Global Ambitions". Huffington Post. Retrieved February 1, 2014.
  14. Boulton, Clint (December 26, 2013). "Snowden Effect Dominates 2013 Tech Industry News". The Wall Street Journal. Retrieved February 1, 2014.
  15. Miller, Matthew (January 21, 2014). "In China, U.S. tech firms weigh 'Snowden Effect'". Reuters. Retrieved February 1, 2014.
  16. Kanji, Hussein. The Snowden Effect: Impact on the Tech Sector. Bloomberg TV. Archived from the original on January 5, 2015.
  17. Perlroth, Nicole; Shane, Scott (October 1, 2013). "As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm". The New York Times. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  18. Tsukayama, Hayley (August 9, 2013). "Lavabit, Silent Circle shut down e-mail: What alternatives are left?". The Washington Post. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  19. Hern, Alex (December 31, 2013). "Email is broken – but Dark Mail Alliance is aiming to fix it". The Guardian. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  20. Franceschi-Bicchieraioct, Lorenzo (October 30, 2013). "Silent Circle and Lavabit Team Up to Protect Your Email From the NSA". Mashable. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  21. Green, Matthew (November 9, 2013). "The Daunting Challenge of Secure E-mail". The New Yorker. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  22. Hiner, Jason. "Understanding Snowden's impact on IT... in 2 minutes". TechRepublic. Retrieved February 1, 2014.
  23. "Das Blackphone soll die totale Überwachung stoppen". heise online. January 15, 2014. Retrieved April 11, 2015.
  24. Kopfstein, Janus. "A Phone for the Age of Snowden". The New Yorker. Retrieved March 2, 2014.
  25. "Harris Poll: People Cutting Back Internet Use After Snowden". Retrieved April 6, 2014.
  26. "Post Snowden, Some Internet Usage Is Contracting, Study Finds". The Wall Street Journal. April 3, 2014. Retrieved April 6, 2014.
  27. "Former NSA deputy director: Snowden leaks caused 'significant disservice' to the Internet". ZDNet. April 24, 2014. Retrieved April 25, 2014.
  28. Miller, Claire Cain (March 21, 2014). "Revelations of N.S.A. Spying Cost U.S. Tech Companies". The New York Times. Retrieved April 11, 2015.
  29. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity" (PDF). newamerica.net. New America Foundation. Summer 2014. Archived from the original (PDF) on September 12, 2014. Retrieved September 30, 2014.
  30. Dwoskin, Elizabeth (July 30, 2014). "New Report: Snowden Revelations Hurt U.S. Companies". The Wall Street Journal.
  31. "How Al-Qaeda Uses Encryption Post-Snowden (Part 2)". Recorded Future. August 1, 2014. Retrieved December 5, 2017.
  32. Temple-Raston, Dina (August 1, 2014). "Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior". NPR.
  33. "IQT Portfolio". In-Q-Tel. Retrieved February 10, 2015.
  34. "About IQT". In-Q-Tel. Retrieved February 10, 2015.
  35. "Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists". Flashpoint Partners. September 16, 2014.
  36. Cappello, Lawrence (May 4, 2015). "Privacy and the Profit Motive". The Nation. Retrieved May 4, 2015.
  37. Sanger, David E.; Chen, Brian X. (September 26, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A." The New York Times. Retrieved April 11, 2015.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.