Opinion: Snowden's leaked PowerPoints provide flawed view of American spy agencies
Loading...
PowerPoint slides are pretty much the worst possible source of good, reliable information when it comes to really understanding what's going on inside the US intelligence community.
But thanks to the document dump courtesy of Edward Snowden, the Web is now flush with slides from intelligence presentations dating back nearly a decade.听Some of those听have been examined in context with other sources, analyzed by experts, and used alongside historical information to provide a well-researched picture of activities within US spy agencies.
But unfortunately that hasn't been the case for the vast majority of classified slides听that have been spilling across the Internet for the past 18 months. That's especially the case when considering the most recent leaks that were in Der Spiegel on Dec. 28.
Some leaked听documents have been used by Der Spiegel听in an attempt to identify organizational intents on creating an all-powerful and massive surveillance state. In this case, some of the leading voices in the global privacy debate have cherry-picked documents to听assert that specific agencies are fearful of and angry about听encryption. That's simply not the case, at least not for the entirety of the collective intelligence agencies.
One crucial thing to remember when looking at PowerPoint slides 鈥 no matter who prepared them 鈥 is that they are hardly ever听bastions of human knowledge. In the tech world, PowerPoints are more often used to听keep audience attention or display cute cat pictures.
Rarely are they used to convey complex material. In fact, the听vast majority of government PowerPoints are made by people in management positions in an attempt to convey material to higher headquarters.
While this may seem apparent, what is often lost in the discussion is the amount of bureaucratic tinkering and massaging that happens in the typical PowerPoint life cycle.听They are created in a rush, often filled with mistakes or technical overstatements. Sometimes they are skewed, and created to impress bosses and win more funding for projects.听
The flaws within PowerPoint slides is something I recently wrote on with Thomas Rid, a professor of security studies at听King's College London,听in the based on my experiences as a cyber operator in the Air Force and in the intelligence community.
And the job of creating PowerPoint presentations often falls to the newest members of a team, freeing up the highly trained people to focus on more complex work. I know this because it's exactly what I used to ask new analysts to do.
What's also missing when a PowerPoint slide shows up in the wild is the additional context and discussion that accompanied the presentation.听PowerPoints are meant as talking aids, not as sole source documents. I can remember many meetings in which slides were听fiercely debated. We would dismiss or ignore or altogether reject many slides and presentations due to听inaccuracies. Still, they were left on the听internal network since we never听delete documents or e-mails in case they were ever needed; no matter how wrong or pointless they were.听
Still, leaked documents have been portrayed as representing accepted polices and practices. This just isn't the case.
I have seen first-hand on multiple occasions groups present projects only to be told to stop what they are doing and work on other missions. I have also seen, on multiple occasions, groups present entirely competing views and objectives on securing and breaking systems.
This kind of mindset is often championed in the hacker community. The idea is to dedicate resources to breaking a system while also trying to secure it. This is not always the case 鈥斕齭urely an intelligence agency is going to attempt to counter adversary information systems. It's what they do. If they didn't, they would be worthless and undeserving of taxpayer funding.
That said, much of the public debate that has arisen around the Snowden leaks is听incredibly important.听As someone who has worked in intelligence before and after Snowden,听I can never condone the leaks of classified documents.听However, as someone who actively and openly advocates for more privacy, encryption, and public security methods, I would be lying to say I have not seen silver linings in some of the debate.
The call for more universal encryption and a more technically informed public is a huge win for everyone. And whether or not those of us who have worked in intelligence like it or not, there is information to be gathered from leaked documents when they are put into context, analyzed by subject matter experts, and used in conjunction with other sources of information.
However, when this information is used as the sole source of discussion to claim various types of encryption standards are useless because a PowerPoint document referenced intent to break it or apparent metrics supporting these claims 鈥 the result is dangerous.
Journalists or activists who recommend against using privacy methods such as virtual private networks or accessible encrypted Web communications are taking aim at听some of the most useful sources of encryption and privacy that exists today. The privacy community sometimes falls into the same pitfalls that network defenders do 鈥 when there's a hint of a听vulnerability, the entire thing is thrown out.
Instead, good practices and methods should be viewed as just that 鈥 a good practice and not a silver bullet. Pretending that certain methods that one intelligence agency may be able to defeat 鈥 according to sometimes shoddy information 鈥 are no longer valid to anyone is irresponsible. That method may have been one of the few that people were able or willing to use and could have protected the privacy of individuals against groups far worse than American spy agencies.
A critical look is largely and sadly missing from the debates being generated on leaked documents 鈥 especially PowerPoints.
Robert M. Lee is a PhD candidate at Kings College London. He is also a US Air Force Cyber Warfare Operations Officer and has served in the Intelligence Community. He may be found on Twitter @RobertMLee.听The views and opinions in this piece do not represent or constitute opinions by the US government, Department of Defense, Intelligence Community, United States Air Force, or anyone or any organization other than the author鈥檚 views. They are his alone. This piece should also not be thought to validate or confirm any leaked information. It is intended as a critical look at sole sourcing documents for use in debates.听
听