Snowden effect

Last updated

Edward Snowden in Moscow, October 9, 2013 Edward Snowden 2013-10-9 (2) (cropped).jpg
Edward Snowden in Moscow, October 9, 2013

In 2013, Edward Snowden, a former NSA contractor, leaked NSA documents that revealed the agency was collecting data from the electronic communications of United States citizens and foreign telecommunications agencies. Other disclosures included information about PRISM, the agency's data collection program, a surveillance metadata collection, and XKeyscore, which supplies federated search capabilities for all NSA databases. Since that time, there have been perceptible increases in the general public's knowledge about the U.S. government's cybersecurity initiatives and awareness of how those initiatives have impacted the privacy of individuals, businesses, and foreign governments.

Contents

On September 2, 2020, a US federal court ruled that the US intelligence's mass surveillance program, exposed by Edward Snowden, was illegal and possibly unconstitutional. They also stated that the US intelligence leaders, who publicly defended it, were not telling the truth. [1] Snowden's disclosures have fueled debates over mass surveillance, government secrecy, and the balance between national security and information privacy, and have resulted in notable impacts on society and the tech industry, and served as the impetus for new products that address privacy concerns such as encryption services. Collectively, these impacts have been referred to by media and others as the "Snowden effect".

Impact on global society

In July 2013, media critic Jay Rosen defined the Snowden effect as "Direct and indirect gains in public knowledge from the cascade of events and further reporting that followed Edward Snowden's leaks of classified information about the surveillance state in the U.S." [2] In December 2013, The Nation wrote that Snowden had sparked an overdue debate about national security and individual privacy. [3] At the 2014 World Economic Forum, Internet experts saw news that Microsoft would let foreign customers store their data on servers outside America as a sign that Snowden's leaks were leading countries and companies to erect borders in cyberspace. [4] In Forbes , the effect was seen to have nearly united the U.S. Congress in opposition to the massive post-9/11 domestic intelligence gathering system. [5] In its Spring 2014 Global Attitudes Survey, the Pew Research Center found that Snowden's disclosures had tarnished the image of the United States, especially in Europe and Latin America. [6]

In May 2014, the Obama administration appointed William Evanina, a former FBI special agent with a counter-terrorism specialty, as the new government-wide National Counterintelligence Executive. "Instead of getting carried away with the concept of leakers as heroes," Evanina said in August, "we need to get back to the basics of what it means to be loyal. Undifferentiated, unauthorized leaking is a criminal act." While dealing with insider threats had been an intelligence community priority since WikiLeaks published Chelsea Manning's disclosures in 2010, Evanina said that in the aftermath of Snowden's June 2013 revelations, the process "sped up from a regional railway to the Acela train." A year later, 100,000 fewer people had security clearances. [7] In September 2014, Director of National Intelligence James Clapper said Snowden's leaks created a perfect storm, degrading the intelligence community's capabilities. Snowden's leaks, said Clapper, damaged relationships with foreign and corporate stakeholders, restrained budget resources, and caused the U.S. to discontinue collecting intelligence on certain targets, putting the United States at greater risk. [8]

In October 2014, former Director of the National Counterterrorism Center Matthew G. Olsen told CNN that Snowden's disclosures had made it easier for terrorist groups to evade U.S. surveillance by changing their encryption methods. Olsen said intelligence collection against some individuals of concern had been lost, preventing insight into their activities. [9] By July 2015, ISIL had studied Snowden's disclosures and, said U.S. officials, its leaders were using couriers or encrypted communications that Western analysts could not crack. [10]

In February 2015, National Counterterrorism Center director Nicholas Rasmussen told Congress that Snowden's disclosures had damaged U.S. intelligence capabilities. Rasmussen said the government knew of specific terrorists who, after learning from Snowden's leaks how the U.S. collected intelligence, had increased their security measures by using new types of encryption, changing email addresses, or abandoning prior methods of communicating. [11] Reflecting on the effect of his leaks, Snowden himself wrote in February 2015 that "the biggest change has been in awareness. Before 2013, if you said the NSA was making records of everybody's phone calls and the GCHQ was monitoring lawyers and journalists, people raised eyebrows and called you a conspiracy theorist. Those days are over." [12]

In March 2015, USA Today reported that the Snowden effect had hit The Guardian . Journalist Michael Wolff, who wrote for The Guardian for many years, asserted that the recent selection of Katharine Viner as editor-in-chief "can be read as, in part, a deeply equivocal response on the part of the paper's staff, with its unusual power in the process of selecting a new editor, to the Snowden story." According to Wolff, there had developed "a sense of journalistic queasiness around Snowden, difficult to express at the party-line Guardian. Questioning Snowden's retreat to Russia and his protection by Vladimir Putin was internally verboten." [13]

Tech industry

In the technology industry, the Snowden effect had a profound impact after it was revealed that the NSA was tapping into the information held by some U.S. cloud-based services. Google, Cisco, and AT&T lost business internationally due to the public outcry over their roles in NSA spying. A study by the Information Technology and Innovation Foundation published in August 2013 estimated that the cloud-based computing industry could have lost up to $35 billion by 2016. [14] The Wall Street Journal named "the Snowden effect" as 2013's top tech story, saying Snowden's leaks "taught businesses that the convenience of the cloud cuts both ways." The Journal predicted the effect would top 2014 news as well, given the number of documents yet to be revealed. [15] In China, the most profitable country for U.S. tech companies, all are "under suspicion as either witting or unwitting collaborators" in the NSA spying, according to the director of the Research Center for Chinese Politics and Business at Indiana University. [16] The effect was also seen in changes to investment in the industry, with security "back on the map" according to Hussein Kanji, Venture Capitalist at Hoxton Ventures. [17]

On August 8, 2013, Lavabit, a secure email provider that Snowden used, discontinued service after being asked for encryption keys that would have exposed to U.S. government prosecutors the emails of all 410,000 Lavabit users. [18] The next day, a similar provider called Silent Circle announced that it too would shut down because it was not possible to sufficiently secure email. [19] In October 2013, the two companies joined forces and announced a new email service, Dark Mail Alliance, [20] designed to withstand government surveillance. [21] [22]

After revelations that German Chancellor Angela Merkel's mobile was being tapped, the tech industry rushed to create a secure cell phone. [17] According to TechRepublic , revelations from the NSA leaks "rocked the IT world" and had a "chilling effect." The three biggest impacts were seen as increased interest in encryption, business leaving U.S. companies, and a reconsideration of the safety of cloud technology. [23] The Blackphone, which The New Yorker called "a phone for the age of Snowden"—described as "a smartphone explicitly designed for security and privacy," created by the makers of GeeksPhone, Silent Circle, and PGP, provided encryption for phone calls, emails, texts, and Internet browsing. [24] [25]

Since Snowden's disclosures, Americans used the Internet less for things like email, online shopping, and banking, according to an April 2014 poll. [26] Also in April 2014, former NSA deputy director Col. Cedric Leighton told the Bloomberg Enterprise Technology Summit in New York City that Snowden's leaks had performed a significant disservice to the worldwide health of the Internet by leading Brazil and other countries to reconsider the Internet's decentralized nature. Leighton suggested that nation-states' efforts to create their versions of the Internet were the beginning of the end for the Internet as we know it. "When you have a situation where all of a sudden, everyone goes into 'tribal' mode—a German cloud, a Swiss cloud, or any other separate Internet—they are significant nationalistic attempts," said Leighton. "What happened with Snowden, it's more of an excuse than a policy, it's more of an excuse to re-nationalize the Internet." [27]

In March 2014, The New York Times reported that the economic fallout from Snowden's leaks had been a boon for foreign companies, to the detriment of U.S. firms. Daniel Castro, a senior analyst at the Information Technology and Innovation Foundation, predicted that the United States cloud computing industry could lose $35 billion by 2016. Matthias Kunisch, a German software executive who switched from U.S. cloud computing providers to Deutsche Telekom, said that due to Snowden his customers thought American companies had connections to the NSA. Security analysts estimated that U.S. tech companies had since Snowden collectively spent millions and possibly billions of dollars adding state-of-the-art encryption features to consumer services and to the cables that link data centers. [28] In July 2014, the nonpartisan New America Foundation summarized the impact of Snowden's revelations on U.S. businesses. [29] The erosion of trust, said the report, has had serious consequences for U.S. tech firms. IT executives in France, Hong Kong, Germany, the UK, and the U.S. confirmed that Snowden's leaks directly impacted how companies around the world think about information and communication technologies, particularly cloud computing. A quarter of British and Canadian multinational companies surveyed were moving their data outside the U.S. Among U.S. companies attributing drops in revenue to, in part, the fallout from Snowden's leaks were Cisco Systems, Qualcomm, IBM, Microsoft, and Hewlett-Packard. Proposed laws in more than a dozen foreign countries, including Germany, Brazil, and India, would make it harder for U.S. firms to do business there. The European Union is considering stricter domestic privacy legislation that could result in fines and penalties costing U.S. firms billions of dollars. [30]

In August 2014, Massachusetts-based web intelligence firm Recorded Future announced it had found a direct connection between Snowden's leaks and dramatic changes in how Islamist terrorists interacted online. [31] [32] (In 2010, the privately held Recorded Future received an investment from In-Q-Tel, [33] a nonprofit venture capital firm whose primary partner is the CIA. [34] ) Just months after Snowden's 2013 leaks, said Recorded Future, operatives of al-Qaeda and associated groups completely overhauled their 7-year-old encryption methods, which included "homebrewed" algorithms, adopting instead more sophisticated open-source software and newly available downloads that enabled encryption on cellphones, Android products, and Macs, to help disguise their communications. [32]

In September 2014, Seattle-based Deep Web and Dark web monitoring firm Flashpoint Global Partners published a report that found "very little open-source information available via jihadi online social media" indicating that Snowden's leaks impelled al-Qaeda to develop more secure digital communications. "The underlying public encryption methods employed by online jihadists," the report concluded, "do not appear to have significantly changed since the emergence of Edward Snowden. Major recent technological advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums." [35] In May 2015, The Nation reported, "The fallout from the Edward Snowden fiasco wasn't just political—it was largely economic. Soon after the extent of the NSA's data collection became public, overseas customers (including the Brazilian government) started abandoning U.S.-based tech companies in droves over privacy concerns. The dust hasn't settled yet, but tech-research firm Forrester estimated the losses may total 'as high as $180 billion,' or 25 percent of industry revenue." [36]

Consumer products

In September 2014, The New York Times credited Apple Inc.'s update of iOS 8, which encrypts all data inside it, as demonstrating how Snowden's impact had begun to work its way into consumer products. His revelations said The Times, "not only killed recent efforts to expand the law but also made nations around the world suspicious that every piece of American hardware and software—from phones to servers made by Cisco Systems—have 'back doors' for American intelligence and law enforcement." The Times situated this development within a "Post Snowden Era" in which Apple would no longer comply with NSA and law enforcement requests for user data, instead maintaining that Apple doesn't possess the key to unlocking data on the iPhone. However, since the new security protects information stored on the device itself, but not data stored on Apple's iCloud service, Apple will still be able to obtain some customer information stored on iCloud in response to government requests. The Times added that Google's Android would have encryption enabled by default in upcoming versions. [37]

Related Research Articles

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.

<span class="mw-page-title-main">Pinwale</span>

Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail. It is searchable by monitored NSA analysts.

<span class="mw-page-title-main">Utah Data Center</span> NSA data storage facility

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden, born June 21, 1983 is a Russian former American NSA intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. He became a naturalized Russian citizen in 2022.

<span class="mw-page-title-main">Tempora</span> GCHQ-operated Internet and telephone surveillance system

Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested from 2008 and became operational in late 2011.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">Kolab Now</span>

Kolab Now is a web-based email and groupware service, based completely on free and open-source software. It is owned and operated by Kolab Systems AG and was formerly known as MyKolab.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Reactions to global surveillance disclosures</span>

The global surveillance disclosure released to media by Edward Snowden has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. In August 2013, U.S. President Barack Obama announced the creation of "a review group on intelligence and communications technologies" that would brief and later report to him. In December, the task force issued 46 recommendations that, if adopted, would subject the National Security Agency (NSA) to additional scrutiny by the courts, Congress, and the president, and would strip the NSA of the authority to infiltrate American computer systems using "backdoors" in hardware or software. Geoffrey R. Stone, a White House panel member, said there was no evidence that the bulk collection of phone data had stopped any terror attacks.

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">FISA Improvements Act</span>

The FISA Improvements Act is a proposed act by Senator Dianne Feinstein, Chair of the Senate Intelligence Committee. Prompted by the disclosure of NSA surveillance by Edward Snowden, it would establish the surveillance program as legal, but impose some limitations on availability of the data. Opponents say the bill would codify warrantless access to many communications of American citizens for use by domestic law enforcement.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support violated acceptable privacy rights, while others dispute or attempt to provide justification for the expansion of surveillance initiatives under his administration.

The Privacy and Civil Liberties Oversight Board report on mass surveillance was issued in January 2014 in light of the global surveillance disclosures of 2013, recommending the US end bulk data collection.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<i>Citizenfour</i> 2014 film

Citizenfour is a 2014 documentary film directed by Laura Poitras, concerning Edward Snowden and the NSA spying scandal. The film had its US premiere on October 10, 2014, at the New York Film Festival and its UK premiere on October 17, 2014, at the BFI London Film Festival. The film features Snowden and Glenn Greenwald, and was co-produced by Poitras, Mathilde Bonnefoy, and Dirk Wilutzky, with Steven Soderbergh and others serving as executive producers. Citizenfour received critical acclaim upon release, and was the recipient of numerous accolades, including Best Documentary Feature at the 87th Academy Awards. This film is the third part to a 9/11 trilogy following My Country, My Country (2006) and The Oath (2010).

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

References

  1. "U.S. court: Mass surveillance program exposed by Snowden was illegal". Reuters. September 2, 2020. Archived from the original on November 1, 2020. Retrieved September 2, 2020.
  2. Rosen, Jay (July 5, 2013). "The Snowden Effect: definition and examples". Jay Rosen's PressThink. Archived from the original on February 28, 2015. Retrieved February 18, 2015.
  3. Alterman, Eric (December 20, 2013). "What the Press Should Learn From the 'Snowden Effect'". The Nation. Archived from the original on February 26, 2014. Retrieved March 2, 2014.
  4. Davos, L.S. (January 24, 2014). "The Snowden effect". The Economist. Archived from the original on March 2, 2014. Retrieved March 2, 2014.
  5. Watson, Tom. "The Snowden Effect Hits Congress: Will Effective Crowdsourced Lobbying Follow?". Forbes. Archived from the original on January 30, 2014. Retrieved March 2, 2014.
  6. "Global Opposition to U.S. Surveillance and Drones, but Limited Harm to America's Image". Pew Research Center. July 14, 2014. Archived from the original on April 22, 2016. Retrieved October 29, 2017.{{cite journal}}: Cite journal requires |journal= (help)
  7. Clark, Charles S. (August 15, 2014). "Meet the Man Who's Gauging the Damage From Snowden". Government Executive. Archived from the original on May 5, 2016. Retrieved April 11, 2015.
  8. Sink, Justin (September 18, 2014). "Intelligence chief says Snowden leaks created 'perfect storm'". The Hill. Archived from the original on April 11, 2015. Retrieved April 11, 2015.
  9. Liptak, Kevin (October 21, 2014). "Ex-counterterror chief: U.S. lost track of terrorists after Snowden". CNN. Archived from the original on April 12, 2019. Retrieved April 11, 2015.
  10. Eric P. Schmitt and Ben Hubbard (July 20, 2015) ISIS Leader Takes Steps to Ensure Group's Survival Archived October 8, 2017, at the Wayback Machine The New York Times
  11. Aftergood, Steven (February 17, 2015). "Leaks Damaged U.S. Intelligence, Official Says". Federation of American Scientists. Archived from the original on April 20, 2017. Retrieved October 29, 2017.
  12. "We are Edward Snowden, Laura Poitras, and Glenn Greenwald from the Oscar-winning documentary CITIZENFOUR". Reddit. February 23, 2015. Archived from the original on January 22, 2020. Retrieved February 25, 2015.
  13. Wolff, Michael (March 20, 2015). "Snowden effect hits 'Guardian'". USA Today. Archived from the original on March 23, 2015. Retrieved March 26, 2015.
  14. Smith, Gerry (January 24, 2014). "' Snowden Effect' Threatens U.S. Tech Industry's Global Ambitions". Huffington Post. Archived from the original on February 3, 2014. Retrieved February 1, 2014.
  15. Boulton, Clint (December 26, 2013). "Snowden Effect Dominates 2013 Tech Industry News". The Wall Street Journal. Retrieved February 1, 2014.{{cite news}}: |archive-date= requires |archive-url= (help); External link in |archive url= (help); Unknown parameter |archive url= ignored (|archive-url= suggested) (help)CS1 maint: url-status (link)
  16. Miller, Matthew (January 21, 2014). "In China, U.S. tech firms weigh 'Snowden Effect'". Reuters. Archived from the original on March 6, 2016. Retrieved February 1, 2014.
  17. 1 2 Kanji, Hussein. The Snowden Effect: Impact on the Tech Sector. Bloomberg TV. Archived from the original on January 5, 2015.
  18. Perlroth, Nicole; Shane, Scott (October 1, 2013). "As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm". The New York Times. Archived from the original on June 6, 2022. Retrieved March 16, 2014.
  19. Tsukayama, Hayley (August 9, 2013). "Lavabit, Silent Circle shut down e-mail: What alternatives are left?". The Washington Post. Archived from the original on January 25, 2014. Retrieved March 16, 2014.
  20. Hern, Alex (December 31, 2013). "Email is broken – but Dark Mail Alliance is aiming to fix it". The Guardian. Archived from the original on March 23, 2014. Retrieved March 16, 2014.
  21. Franceschi-Bicchieraioct, Lorenzo (October 30, 2013). "Silent Circle and Lavabit Team Up to Protect Your Email From the NSA". Mashable. Archived from the original on March 6, 2014. Retrieved March 16, 2014.
  22. Green, Matthew (November 9, 2013). "The Daunting Challenge of Secure E-mail". The New Yorker. Archived from the original on March 28, 2014. Retrieved March 16, 2014.
  23. Hiner, Jason (November 26, 2013). "Understanding Snowden's impact on IT... in 2 minutes". TechRepublic. Archived from the original on January 30, 2014. Retrieved February 1, 2014.
  24. "Das Blackphone soll die totale Überwachung stopped". heise online. January 15, 2014. Archived from the original on August 1, 2015. Retrieved April 11, 2015.
  25. Kopfstein, Janus. "A Phone for the Age of Snowden". The New Yorker. Archived from the original on March 1, 2014. Retrieved March 2, 2014.
  26. "Post Snowden, Some Internet Usage Is Contracting, Study Finds". The Wall Street Journal. April 3, 2014. Archived from the original on April 6, 2014. Retrieved April 6, 2014.
  27. "Former NSA deputy director: Snowden leaks caused 'significant disservice' to the Internet". ZDNet. April 24, 2014. Archived from the original on April 25, 2014. Retrieved April 25, 2014.
  28. Miller, Claire Cain (March 21, 2014). "Revelations of N.S.A. Spying Cost U.S. Tech Companies". The New York Times . Archived from the original on March 17, 2015. Retrieved April 11, 2015.
  29. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity" (PDF). newamerica.net. New America Foundation. Summer 2014. Archived from the original (PDF) on September 12, 2014. Retrieved September 30, 2014.
  30. Dwoskin, Elizabeth (July 30, 2014). "New Report: Snowden Revelations Hurt U.S. Companies". The Wall Street Journal . Archived from the original on October 23, 2017. Retrieved October 29, 2017.
  31. "How Al-Qaeda Uses Encryption Post-Snowden (Part 2)". Recorded Future. August 1, 2014. Archived from the original on December 7, 2017. Retrieved December 5, 2017.
  32. 1 2 Temple-Raston, Dina (August 1, 2014). "Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior". NPR. Archived from the original on April 25, 2015. Retrieved April 5, 2018.
  33. "IQT Portfolio". In-Q-Tel. Archived from the original on February 10, 2015. Retrieved February 10, 2015.
  34. "About IQT". In-Q-Tel. Archived from the original on February 8, 2015. Retrieved February 10, 2015.
  35. "Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists". Flashpoint Partners. September 16, 2014. Archived from the original on March 7, 2018. Retrieved October 29, 2017.
  36. Cappello, Lawrence (May 4, 2015). "Privacy and the Profit Motive". The Nation. Archived from the original on May 5, 2015. Retrieved May 4, 2015.
  37. Sanger, David E.; Chen, Brian X. (September 26, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A." The New York Times. Archived from the original on February 10, 2021. Retrieved April 11, 2015.