Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:00 PM
Will Ackerly
Will Ackerly
Connect Directly
E-Mail vvv

Snowden: Hollywood Highlights 2 Persistent Privacy Threats

Oliver Stone's movie shows us that while most of us have nothing to hide, we all have information worth protecting - both technically and constitutionally.

Much has already been written about the new Snowden movie directed by Oliver Stone and its inaccuracies and exaggerations. However, the hype does underscore two persistent vulnerabilities, technical and constitutional, which represent serious threats to our privacy. Since we can still take action on both, I’d like to examine them here.

For some of us, like Edward Snowden’s girlfriend in the movie, vulnerability of our data can seem vague and generalized. In Snowden, the technical vulnerabilities are acutely personalized. With a click of a button and entry of someone (else’s) email address, live webcam video and intimate personal messages are seemingly available on-demand. The reality is actually scarier than the movie makes it out to be. Our information is exposed to a massive spectrum of threats, and vulnerable to malicious actors, security holes, and incompetence. An email, for instance, could be compromised by your email provider, your recipient’s email provider, your Internet provider, your cloud provider, your government, foreign governments, or hackers.

Given the spectrum of threats, the only reliable response is to stop depending on the myriad devices and services that store our data and start making our data self-protecting. This is not a totally new concept; it can be achieved with existing technology like end-to-end encryption. End-to-end encryption ensures only you and your authorized recipients may have access to your content so that you do not need to trust devices and service providers in between. It is a technical means of embedding the kind of principle we have written in law to protect the US Mail (no snooping!) and into the DNA of our data online. While traditionally difficult to use, new approaches to self-protecting, data-centric security are becoming it easier to add to existing apps.

Stone’s movie also hit on the biggest legal vulnerability threatening our constitutional rights: secret laws being written that avoid the critical checks and balances of the American system of balance of powers.

One key source of these secret threats is the Foreign Intelligence Surveillance Act (FISA) court system, which issues secret rulings that can function as secret law. While Congress may have rightly understood that many aspects of intelligence gathering and judicial oversight must be kept secret –  including warrants that can reveal sources, methods, and targets –  there was an unintended consequence.  Under this framework, the FISA court can grant new authorities via secret court opinion, constituting new law not subject to public scrutiny.

As we now know, without public scrutiny and an adversarial judicial process, these rulings have been demonstrated to violate common assumptions about Constitutional protections provided by the Fourth Amendment. For instance, a 2013 New York Times article revealed that the FISA court determined that collections of data on any American, regardless of connection to foreign enemies, did not violate the Fourth Amendment search and seizure protections.

This legal threat persists today. Some laws have changed, but our information remains exposed. This may seem like an intractable problem: trying to ensure transparency of law while maintaining operational security of our national defense. But there is a solution.

The solution will require an act of Congress mandating that secret rulings made by courts or agencies must include a public, unclassified summary of any legal interpretations made in granting a warrant or issuing a ruling. This can be done without revealing sensitive sources, methods, or targets.

Perhaps the most chilling theme in the movie revolves around potential misuse of surveillance powers by future leaders. In January, we will have a new administration, and our new president will drive his or her agenda on surveillance. Without legal reform and transparency, we will not know how our privacy rights have changed – for the better or the worse.  In the meantime, let us make sure our data carries its own protection, end to end, so it is protected regardless of what others do.

As Stone’s movie makes clear, while most of us have “nothing to hide,” we all have information worth protecting.

Edward Snowden will be speaking via video link at the SecTor security conference in Toronto at 9 a.m. ET on Tuesday October 18, and will be taking questions from Dark Reading readers. If you have relevant questions you would like to ask, let the SecTor team know by posting them in the comments section at the bottom of this article. SecTor will be selecting the best to be addressed at the event.

Related Content:


Will Ackerly is the chief technology officer and cofounder of Virtru. Prior to founding Virtru in 2012, Will spent eight years at the National Security Agency (NSA) where he specialized in cloud analytic and security architecture - specifically protecting the agency's ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Ninja
9/24/2016 | 10:18:29 AM
Secret law
Technically, there is no such thing, but in Common Law jurisdictions like the USA, judicial precedents have something akin to the force of law, so they must be taken into consideration.  I think there are some things Congress can do to help matters:

1.  Strip FISC of its status as a court of record (meaning that its decisions could not be cited as precedent).  This would mean that FISC decisions would be guided entirely by publicly available statute law and appellate court rulings, not by its own precedents.

2.  Abolish the appellate court established by FISA (which has AFAIK, has only considered a handful of cases since it was established in 1979) and transfer appellate jurisdiction over FISC to the Federal Circuit, which would publish digests of its opinions dealing with cases appealed from FISC in the manner suggested in the article (opinions would be completely declassified when secrecy is no longer required; perhaps after 10 years by default, with the President having authority to extend the period up to five years at a time for a given case).  Cases could be further appealed to the Supreme Court in the usual manner.

A third item could probably only be done by order of the President, but I think it would help enormously:

3.  Make all legal opinions issued by the Justice Department for the general guidance of federal employees public record.  Advice on specific cases would continue to be confidential.  This would help to allay the suspicion that the Federal government is operating on the basis of secret rules, rather than publicly available statute and judicial precedents.

A fourth item could probably be done by act of Congress:

4.  Require any settlements of civil cases in which the US government or its civil officers (in their official capacities) are defendants to be made public record.  This would eliminate a category of "secret law" in the form of confidential consent decrees, which are sometimes alleged to govern federal policy in a number of areas, such as environmental protection.  Settlements of cases in which the federal government is the plaintiff and one or more private citizens are defendants could be partly or completely sealed by a court if it decides that such is necessary to protect privacy.

I suspect that others have other ideas.
User Rank: Apprentice
9/23/2016 | 11:14:50 AM
A good read on Snowden case !
I hope this film will be providing a real opportunity for Snwoden to be pardoned and more comprehension of what he has done !

Anyway, this article is a good point to explain that we can't sacrifce our own privacy in the name of whatever reason !. In addition, I think this kind of intelligence practice will very likely continue to exist...
<<   <   Page 2 / 2
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-26
A vulnerability in the application programming interface (API) of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to change user account information which can prevent users from logging in, resulting in a denial of service (DoS) condition of the web interface. Th...
PUBLISHED: 2020-01-26
A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerabi...
PUBLISHED: 2020-01-26
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplie...
PUBLISHED: 2020-01-26
A vulnerability in the web-based management interface of Cisco Unity Connection Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker c...
PUBLISHED: 2020-01-26
[CVE-2020-3131_su] A vulnerability in the Cisco Webex Teams client for Windows could allow an authenticated, remote attacker to cause the client to crash, resulting in a denial of service (DoS) condition. The attacker needs a valid developer account to exploit this vulnerability. The vulnerability i...