Feeds

Meet your new martyr: Edward Snowden

PRISM whistleblower's not the new Assange, not even a very naughty boy

The Power of One eBook: Top reasons to choose HP BladeSystem

So, we have a name for the PRISM leaker: Edward Snowden. Now his name is public, the US government and the military-infosec complex are going to work really hard at blowing smoke around the whole thing.

In that, I think Snowden made a tactical error – not because of the danger he's in (his name would have been found out by his former masters before many days had passed). Rather, he has put his name at the centre of the story, which will help the spinners re-frame the story as Snowden rather than PRISM.

The spin-masters are already at work, and they're going to spend a lot of effort discrediting Snowden's actions, character and information – along the way, blurring the issues and giving us black painted as white.

  • “Junior employee” – The implication of the Booz Allen Hamilton announcement that he'd only been with the company for three months is that Snowden didn't really know what's going on. The proper response to that is that neither do we, and we should.
  • Expect attacks on his character and motives. We know that he's breached his employer's trust – that's what a whistleblower does. When media starts looking for “the man behind the story”, we give the spinners an angle to work, because you can be sure that the spinners are looking for ways to tell us we're mistaken about his motives.
  • Attack his facts – Minor corrections of what Snowden claims don't invalidate the underlying outrage that comprises mass-scale spying on the communications of innocent individuals.
  • Retreat behind the secrecy of national security – “This program has saved lives, but we can't tell you how.”

The underlying strategy of the spin machine will be to keep the spotlight on Snowden, and draw attention away from the things he's revealed.

It's a strategy that's worked in the past, partly because people so willingly co-operate with it. We've been here before, with Julian Assange. The creation of “Saint Julian” suited his opponents perfectly: it allows them to publicly identify the value of Wikileaks with the character of its founder.

Snowden looks personable enough, sounds intelligent and sincere to the point of earnestness, and he's now in serious trouble, all of which pulls the vox humana stop all the way out. The human interest is irresistible – and all of which plays into Snowden's opponents, who want the story to be playing the man rather than the ball.

I realise that as an activist, I make a passable journalist, but if any of the activists are listening, here is my advice.

Don't draw the halo of secular sainthood around Snowden's head. There is practically no human who would survive the scrutiny (and whisper campaign) that's about to commence. He will have imperfections and they'll be played to discredit him.

Don't become disillusioned if and when something damaging is revealed about Snowden.

Don't let your attention be distracted by the shiny bauble of a personable front-man. The story is about government surveillance. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.