If you want to protect your data, encrypt it [Examiner, The (Washington, DC)]
(Examiner, The (Washington, DC) Via Acquire Media NewsEdge) The continuing scandal regarding National Security Agency monitoring of domestic electronic communications makes one thing perfectly clear: If anyone is going to protect the public from unwanted snooping, it won't be the government.
On June 5, 2013, a trove of documents from the NSA was released by NSA contractor Edward Snowden to Glenn Greenwald, Laura Poitras and Bart Gellman and later published in part by The Guardian and the Washington Post.
The response was immediate. Many people were shocked but appreciated the information. Others were shocked but felt Snowden was a traitor and must be prosecuted for treason.
Among the punishment camp are the White House and the Department of Justice. In addition, the NSA itself is worried about the files not yet released by Snowden. Rick Ledgett, who heads the NSA's task force on the Snowden leaks, recently told the CBS show "60 Minutes" he would consider amnesty for Snowden if he would stop any additional leaks. An editorial by the New York Times endorsed the idea.
Also among those endorsing clemency was Sen. Rand Paul, R-Ky.
An interesting implication of this difference of opinion is that the political gain from threatening prosecution of Snowden outweighs any potential damage resulting from the publication of the yet unleaked NSA documents. But Snowden no longer has the documents. They are in the hands of the reporters and under their exclusive control. So there is nothing for him to yield in exchange for clemency.
There is a basic question of how effective the NSA program has been in terms of improving national security.
One need go no further for the answer than security and cryptography expert Bruce Schneier: "We have no evidence that any of this surveillance makes us safer. NSA Director Gen. Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to 'one or two.' At this point, the only 'plot' prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings -- even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool."
When President Obama finally addressed the issue of Snowden's disclosures, there's one important thing he didn't say in his speech or the accompanying executive order, according to the Washington Post: "The NSA has not been ordered, as many had wanted, to avoid building 'backdoors' into software, a practice that critics say weakens encryption standards, or to stop exploiting flaws in software to conduct cyberattacks."
Thus we have an environment where the NSA has discovered or created backdoors to the data of many large businesses and institutions. The mere existence of this program tells foreign and domestic hackers it might be easy for them to make their own assaults on private businesses.
Where will protection come from, then? The government? I doubt it.
Schneier suggests a partial answer: Encrypt everything!
(c) 2014 ProQuest Information and Learning Company; All Rights Reserved.
[ Back To Technology News's Homepage ]