Hero or Traitor?

KyleEberly

These last few weeks have been full of revelations due to the information released by Edward Snowden about the NSA’s capabilities to spy on essentially everyone, everywhere, whenever they want, and without a warrant.  Since he leaked this information the Federal government has charged Snowden with three counts of espionage: theft of government property, giving national defense information to someone without security clearance, and revealing classified information about “communications intelligence.”

Emotions are high and opinions are flying left and right over this issue. Some people call him a hero, some a traitor; most mainstream media outlets, in an effort to stay unbiased and not alienate anyone, are calling him “the leaker.” This is by no means a simple issue, the government has claimed that the information Snowden released has compromised intelligence sources and methods which could lead to agents being killed and future intelligence collection (for the sake of national security) damaged.

The question then arises, is the information that was leaked important enough to risk the consequences? If you aren’t clear on exactly that information was I’ll give you the basics. It is essentially this, the NSA (and who knows what other agencies) through their PRISM program have the ability to (and do) collect nearly any type of data they want from your computer, phone, tablet, and anything else that uses the internet. They can see who you’ve talked to, where you are/have been, what you type into your search engine, who and what you text, and much more. On top of this the NSA is currently constructing a facility in Utah that will have 5 zettabytes of storage, 5 zettabytes is equivalent to 5 billion terabytes.  That is a lot of storage space to fill with data on our personal lives.

I have little interest in being “politically correct” so I am going to just come out and say it. I believe he did the right thing in leaking this information.  [Please note:  This opinion is that of the author, not necessarily that of Eberly Systems.] The idea of our government collecting and using this data, and on top of that blatantly lying to congress about it, is deeply unsettling to me. Benjamin Franklin put it the best when he said “Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.” There is a thin line between the reality of needing to protect ones citizen’s and invading their privacy, this is well over that line.

Snowden is now on the run, he was in China for a little and then moved on to Russia. The government attempted to have him extradited from there but thankfully Russia said no. He has now left there and is rumored to be somewhere in Ecuador, possibly seeking asylum. Well you now know my opinion, so what do you think? Hero or traitor? Is the government within their rights to gather and use this information for “national security” or is this a gross breakdown of our rights to freedom and privacy? We’d love to know your thoughts, leave a comment explaining your opinion.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers