{"id":27985,"date":"2014-12-11T16:42:56","date_gmt":"2014-12-11T21:42:56","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27985"},"modified":"2014-12-11T16:42:56","modified_gmt":"2014-12-11T21:42:56","slug":"to-see-the-changes-edward-snowden-wrought-just-look-at-your-smartphone","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/to-see-the-changes-edward-snowden-wrought-just-look-at-your-smartphone.php","title":{"rendered":"To see the changes Edward Snowden wrought, just look at your smartphone"},"content":{"rendered":"<p><p>    AfterEdward Snowdenleaked information about a wide    range ofgovernment surveillance programs, many    peopleexpected a majorlegal shift in the world of    Internet security. But calls for stricter laws may be missing    the point.  <\/p>\n<p>    Most people want to see statutory change or policy change as    evidence that theres been some real impact from the Snowden    leaks,\" explains Bobby Chesney, a law professor at the    University of Texas. \"But, in a way, I think thats turning out    to be the wrong place to look,  <\/p>\n<p>    Chesney says the real changeis in the private sector     specifically, in the changing relationship between the private    telecommunications and internet companies and the US    government.  <\/p>\n<p>    Thanks to the way that the Snowden story has catalysed    interest in privacy, [there's] pressure on companies to be more    privacy-protective,\" he says. \"Theres something of a sea    change underway.  <\/p>\n<p>    Just look at your smartphone: Apple and Google have made    encryption a default setting on their devices to ensure the    privacy of the user  so much so that even the providers, let    alone the government, can'taccess the devices    information.  <\/p>\n<p>    The default encryption model, in theory, makes it hard  if    not impossible for the company themselves to unlock data    on, say, a suspects or targets cell phone or iPad, Chesney    says.  <\/p>\n<p>    That hascaused an obvious rift between intelligence    agencies and private technology companies. The claim    isits not that [the FBI] is seeking new authorities, but    that their existing authorities dont mean what they used to    because of this technological change,\" Chesney explains.  <\/p>\n<p>    The new Congress will also have to tackle the issue of whether    government agencies cancontinuebulk metadata    collection  the practice that allows them to vacuum up    information about phone calls regardless of whether they've    been identified with crimes or terrorism.  <\/p>\n<p>    All theyre really talking about is whether the government    will hold that haystack of data itself, or if, instead, it will    all be held in a disaggregated way in the hands of all the    telecommunication companies that are involved, Chesney says.  <\/p>\n<p>    With legal change on the horizon and private change well    underway, the legacy of Snowden is hard to ignore  especially    for Chesney. In his basic course on national security law, he    used to coverinternet securityin just four or five    days. Last year, he says, we had to more than double that, and    it wasnt nearly enough.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.msn.com\/en-us\/news\/other\/to-see-the-changes-edward-snowden-wrought-just-look-at-your-smartphone\/ar-BBgChtf?srcref=rss\/RK=0\/RS=oUCpyz6mPU59UVmY.k1CROsZ50g-\" title=\"To see the changes Edward Snowden wrought, just look at your smartphone\">To see the changes Edward Snowden wrought, just look at your smartphone<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> AfterEdward Snowdenleaked information about a wide range ofgovernment surveillance programs, many peopleexpected a majorlegal shift in the world of Internet security. But calls for stricter laws may be missing the point. Most people want to see statutory change or policy change as evidence that theres been some real impact from the Snowden leaks,\" explains Bobby Chesney, a law professor at the University of Texas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-27985","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27985"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27985"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27985\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}