IAPP-GDPR Web Banners-300x250-FINAL
DPI16_Banner_300x250 WITH COPY

A sorites paradox begs the question of whether, if one grain of sand is not a heap, do two make a heap? And, if not two grains, do three? In The Snowden Files, Luke Harding, a journalist for The Guardian, arrives at similar questions of how much surveillance serves the need for security and when the term “whistleblower” yields to “traitor.”

Snowden’s heap of disclosures provides strong evidentiary support for the falsity of the choice between privacy and security, because most of this material has nothing to do with protecting the public. Instead, the programs reveal a specific goal of the U.S. and UK to “control the Internet”, as well as other communications. As to the distinction between whistleblower and traitor, Harding leaves the question open for readers to answer for themselves.

Harding begins with a positive portrait of Edward Snowden as the son of a Coast Guard officer who, disillusioned by his parents’ divorce, failed to finish high school. His early interest in computers allows him to develop independently, both intellectually and politically. Harding digs into Snowden’s online history to detail the evolution of Snowden’s passionately libertarian concept of patriotism. Harding quotes e-mails in which Snowden decries the disingenuousness of George Bush, Leon Panetta and Barack Obama with equal fervor and expresses loathing for government surveillance even before he began his intelligence career.

Prompted by the Iraq war, Snowden enlisted in the Army but washed out after breaking both legs during infantry training. Having completed a GED at a community college, Snowden then grew into the prototypical self-taught overachieving hacker.

Snowden’s meteoric rise in the U.S. intelligence community began shortly after leaving the military. He began as a security technician at a covert NSA facility in Maryland and quickly found that his experience and ability could carry him farther than formal credentials. He landed a job with the CIA, which sent him to Geneva in 2007. In 2009 he left the CIA and joined the NSA to work in Japan, where between 2009 and 2012 he learned of the scope of NSA surveillance activities.

In 2012, Snowden left Japan to work in Hawaii at the NSA’s regional cryptological center on Oahu. Harding describes this as an idyllic existence, in which Snowden received a high salary, lived in a comfortable home with a beautiful dancer girlfriend and was given access to the NSA’s most sensitive information, specifically on U.S. spying on China. Snowden’s political passions nevertheless endured. Harding notes that Snowden contributed $250 to Ron Paul’s presidential campaign and soon after began to develop his plan to acquire information stored on NSA networks.

Harding does not dwell on Snowden’s data collection methods, except to intimate that Snowden made extensive use of his authorization to use a thumb drive, a privilege granted to only a few high-level network administrators. This presents a sad irony that Harding only puts forth rather than analyzes: that the U.S. and British governments, while going to unprecedented lengths to enable themselves to intercept information transfers, never addressed the most basic security step—access control and audit capabilities—within their own organizations. There are numerous ways to prevent such access, or to at least establish a trail of what information was acquired. Nevertheless, it appears neither government can assess with certainty what Snowden obtained and in what form he may still have it.

The assembled catalogue of programs, in contrast with the drips and drabs of media revelations that elicit shock that yields to resignation within the same daily news cycle, gives real value to this book. Consider a few that come through the story in rapid fire succession: PRISM, in which telecoms and Internet corporations collaborated with the NSA; STELLAR WIND, the first known NSA attempt to intercept telephone conversations, metadata and Internet communications including e-mails and web searches; BOUNDLESS INFORMANT, a map of NSA collections of worldwide metadata; TEMPORA, a cooperative effort by the U.S. and UK to intercept wholesale the transmissions across transatlantic fiber-optic cables; numerous programs with the FBI that intercept U.S. voice, video, call records and cable transmissions, and the list goes on.

This makes even more striking the single most sadly comic event, as hapless British government officials go to The Guardian offices and physically destroy computer hardware to prevent further disclosures, even after being told of the electronic distribution of the information.

The story of how journalist Glenn Greenwald and documentary filmmaker Laura Poitras meticulously protect Snowden and the information he provides carries enough drama to be read as entertaining but implausible fiction. As they disseminate the materials for publication and navigate the legal and ethical issues they face, Harding is able to sustain suspense that rivals any spy thriller.

Eric Jones is an attorney for a California state agency. He has been handling privacy matters for most of the past five years.

Written By

Eric Jones, CIPT


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»