The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western…
Abstract
Purpose
The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.
Design/methodology/approach
This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.
Findings
The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.
Originality/value
To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.
Details
Keywords
This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing…
Abstract
This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing citizen’s activity in cyberspace. The emphasis in the discussion is placed on the constitutionality of state actions and the shifting boundaries in which the state can act in the name of security to protect its people from the nation’s enemies. A second piece of this discussion is which state actors and agencies can control the mechanisms by which this sensitive cyber information is collected, stored, and if needed, acted upon. The most salient case with regard to this debate is that of Edward Snowden. It reveals the US government’s abuses of this surveillance machinery prompting major debates around the topics of privacy, national security, and mass digital surveillance. When observing the response to Snowden’s disclosures one can ask what point of view is being ignored, or what questions are not being answered. By considering the silence as a part of our everyday language we can improve our understanding of mediated discourses. Recommendations on cyber-intelligence reforms in response to Snowden’s revelations – and whether these are in fact practical in modern, high-technology societies such as the US – follow.