When we look back at 2013 a decade from now, the one technology story that's likely to have the biggest long-term impact is the Edward Snowden revelations.
While there were major password breaches at Adobe, Evernote, and Twitter as well as the Healthcare.gov debacle, nothing rocked the IT world more than the 200,000 classified documents that Snowden leaked to the press, uncovering the NSA's startling digital surveillance programs that reach more broadly across the internet than even many of the most extreme conspiracy theorists would have feared.
While the U.S. government defends the program as court-supervised and a powerful tool that has thwarted terrorist attacks and protected citizens, there's no doubt that the Snowden revelations have had a chilling effect on the technology world.
Here are the three biggest impacts:
- Organizations are re-thinking how to effectively encrypt their most sensitive data
- International organizations are looking at ways to do less business with U.S. companies, since the NSA has direct backdoors into many of them.
- The brakes are being put on cloud computing by some organizations, as they consider whether they want their data so easily accessible to surveillance agencies.
As one IT architect said, "The USA's global surveillance efforts have done more to damage cloud deployments than any amount of FUD."
To dig deeper on this topic, see the links below. Then, join the discussion in the comments.
ZDNet's Monday Morning Opener
ZDNet's Monday Morning Opener is our opening salvo for the week in tech. As a global site, this editorial publishes on Monday at 8am AEST in Sydney, Australia, which is 6pm Eastern Time on Sunday in the US. It is written by a member of ZDNet's global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and the United States.
More from ZDNet
- NSA mass surveillance leaks: Timeline of events to date
- NSA malware infected over 50,000 computer networks worldwide
- Reform the NSA to stop future Snowdens
- NSA spy program ignored rules designed to protect privacy
- Will censorship vanish within a decade? Google chairman Eric Schmidt says so
- Microsoft to encrypt network traffic amid NSA datacenter link tapping claims
- Yahoo bolsters encryption after NSA datacenter link tapping
- Realizing it's the underdog post-PRISM, EU lays out new BFF pact with the U.S.
More from TechRepublic
- Five takeaways from the NSA and Internet surveillance disclosures
- Escaping the dragnet of surveillance: What the experts say about encryption
- What can IT do in the fight against government surveillance tactics?
- What NSA spying on Google means for your business
- Encryption for the paranoid: Verifying TrueCrypt source code and binaries
- Does using encryption make you a bigger target for the NSA?
- How to trust your insiders
- [Infographic] Wiretapping: Privacy vs. security
Resources from Tech Pro Research
Tech Pro Research is a joint venture between ZDNet and TechRepublic that includes exclusive in-depth features, original research, ebooks, and IT policy templates, all aimed at helping technology decision makers.
- Research: 41% increasing IT security budget in 2014
- Template: Encryption Policy
- Template: Outsource Provider Security Policy
- Template: New Employee Checklist and Default Access Policy
- Template: Secure Equipment Repair Policy
- Template: Media Disposal Policy
- Ebook: Physical Security: Human Intrusion Defense
This article was originally published on TechRepublic as Understanding Snowden's impact on IT... in 2 minutes.