Skip to main content

Snowden accused of accelerating adoption of encryption

snowden sidtoday batches edward pose
Image used with permission by copyright holder
In 2013, Edward Snowden released thousands of classified NSA documents sourced during his time working for Booz Allen Hamilton, becoming an international newsmaker in the process. This week, Snowden stands accused of accelerating the rate at which encryption techniques were developed and distributed by a number of years.

The Director of National Intelligence, James Clapper, leveled the charge against Snowden while speaking at a function hosted by the Christian Science Monitor on Monday. Clapper stated that “as a result of the Snowden revelations, the onset of commercial encryption has accelerated,” according to a report from The Intercept.

Clapper asserted that, “The projected growth maturation and installation of commercially available encryption — what they had forecasted for seven years ahead, three years ago, was accelerated to now, because of the revelation of the leaks.”

Clapper was essentially saying that current encryption usage reflects the kind of install base and advances in methodology that analysts, in 2013, were forecasting for 2020 — in short, the public appetite for encryption has far outpaced expectations.

While this might seem like a boon for the public, innocent people aren’t the only ones using encryption methods to cover their tracks. Clapper went on to suggest that these advances have had a “profound effect” on efforts to collect information pertaining to terrorist activity.

Of course, it would be misleading to attribute this shift to Snowden alone. Our ever-expanding usage of technology, and the steadily increasing pace of security breaches in the news — not to mention the ongoing efforts of security researchers — all contribute to the changing public perception of encryption.

However, Snowden certainly did bring the issue of governmental surveillance to light at a crucial time. While many would thank him for that, Clapper wouldn’t. Asked whether increased public access to encryption was a good thing, the director replied that from his organization’s standpoint, it was not.

Editors' Recommendations

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
Zoom launches end-to-end encryption, but with a catch
zoom privacy feature freeze active users meeting office

Not before time, Zoom has finally gotten around to adding end-to-end encryption to its online videoconferencing service.

The security feature, announced by the company on Monday, October 26, is available now for free and paid accounts globally.

Read more
Seven VPN apps accused of exposing more than a terabyte of private data
Man holding phone running VPN to browse anonymously.

A group of free VPN apps reportedly exposed a treasure trove of private data of millions of users. Discovered by vpnMentor, a total of seven VPN providers, all of which explicitly claimed they didn’t record their users' activities, left more than a terabyte of browsing logs out in the open for anyone to access.

The leaked data silo housed a wide range of sensitive data, some of which was personally identifiable too. VpnMentor claims it included records of the websites users visited, plain-text passwords, PayPal payment information, device specifications, email addresses, and more.

Read more
The FBI broke Apple’s iPhone encryption. Here’s why you shouldn’t panic
iPhone 11 Pro feature image

If you’re worried about your iPhone’s security after the Justice Department announced it had broken into yet another terrorist’s cell phone, don’t panic. The FBI and its hacking prowess probably aren’t any concern of yours, as long as you're not a terrorist.

The Justice Department announced on Monday that it had found a link between the terrorist group Al Qaeda and the man who killed three U.S. sailors in a terrorist attack at a military base in Pensacola, Florida, in December, CNN reported. The bigger deal was that the department was able to make this connection because it broke through the encryption on the shooter’s iPhone after a very public back-and-forth with Apple, wherein the company refused to decrypt the phone.

Read more