// THE REBEL BLOG

Thoughts on free software, privacy, and taking back control

2026-02-28 • 8 min read • FOSS

The Need for FOSS Is More Important Than Ever

In 2013, Edward Snowden shocked the world. The former NSA contractor revealed what many had suspected but few could prove: that governments—particularly the United States—were engaged in mass, indiscriminate surveillance of citizens worldwide. Programs like PRISM, XKeyscore, and Tempora laid bare the terrifying scope of modern surveillance state.

But here's what the mainstream conversation often misses: Snowden's revelations weren't the beginning of the problem. They were merely the confirmation of a trajectory that started decades earlier—one that accelerated dramatically after September 11, 2001.

The Post-9/11 Surveillance Expansion

In the aftermath of 9/11, something changed. Almost overnight, the US government enacted a series of laws and programs that fundamentally reshaped the landscape of civil liberties in the name of national security.

The USA PATRIOT Act (2001)

Rushed through Congress just 45 days after 9/11, the PATRIOT Act dramatically expanded law enforcement and surveillance powers. Key provisions included:

  • Section 215 - Allowed the FBI to obtain "any tangible things" relevant to terrorism investigations, including library records, book purchases, and medical records, with rubber-stamp approval from the Foreign Intelligence Surveillance Court (FISA Court).
  • Section 702 - Enabled warrantless surveillance of foreign targets abroad, which was later interpreted to allow mass collection of Americans' communications.
  • National Security Letters (NSLs) - Gave the FBI power to demand records from businesses without judicial approval, with gag orders prohibiting recipients from disclosing the request.

The FISA Amendments Act (2008)

This legislation provided retroactive immunity to telecommunications companies that had participated in warrantless wiretapping programs. It also created a legal framework for the PRISM program, allowing mass collection of internet communications under vague "foreign intelligence" justifications.

Executive Orders and Secret Programs

Beyond legislation, the Bush administration initiated classified programs like:

  • Stellarwind - The NSA's warrantless wiretapping program initiated in 2002, later confirmed by former NSA director Michael Hayden.
  • XKeyscore - A program revealed by Snowden that allowed analysts to search through vast amounts of internet data in real-time.
  • PRISM - Direct access to data from Google, Facebook, Apple, Microsoft, and other tech giants.

The public was told this was necessary. That if you had nothing to hide, you had nothing to fear. That the trade-off was worth it. We were promised oversight, safeguards, and accountability. We got secret courts, rubber-stamped warrants, and a surveillance apparatus that grew beyond any reasonable definition of "targeted."

"The NSA has built a system that has the capability to record every single phone call in the United States—and store them for later retrieval." — James Bamford, 2006

By the time Snowden blew the whistle in 2013, the surveillance infrastructure was already vast. What Snowden showed us was that it was even worse than the most cynical observers had imagined. Not only were they collecting metadata (who called whom, when, for how long), they were recording content. They were tapping undersea fiber optic cables. They were hacking into foreign embassies, allied governments, and ordinary citizens' computers.

Why FOSS Matters More Than Ever

This is where Free and Open Source Software becomes not just preferable, but essential.

1. Transparency Means Verification

When you use proprietary software, you're trusting corporations and governments that have repeatedly demonstrated they're willing to lie to you. The NSA's involvement in RSA's crypto algorithms, the backdoors found in Cisco equipment, the "prism" integration with Microsoft, Google, Yahoo—these aren't conspiracy theories. They're documented facts.

With FOSS, the code is open. Security researchers, journalists, activists, and curious citizens can verify what the software actually does. Bugs and backdoors get discovered. Trust is replaced by verifiability.

2. You Can't Audit What You Can't See

Proprietary software is a black box. Even if you wanted to check for surveillance features, you legally can't. The EULA forbids reverse engineering. The DMCA criminalizes it. You're expected to simply trust.

FOSS flips this model. Linux, GnuPG, Tor, Signal, KeePassXC—these tools can be audited, modified, and improved by anyone. They're also peer-reviewed by thousands of developers and security experts worldwide.

3. Vendor Lock-In Is Intentional

Proprietary software companies have a financial incentive to keep you dependent. Cloud services that store your data in formats only they can read. Operating systems that make it deliberately difficult to switch. Updates that break compatibility with anything other than their ecosystem.

FOSS has no such incentive. The code exists to serve users, not to extract value from them. You can run it, modify it, fork it, or host it yourself. You're not the product—you're the customer.

4. Surveillance Capitalism Is the Business Model

Free isn't always free. When the product is free, you are the product. Google, Facebook, Apple, Microsoft—they all operate on surveillance capitalism. Your data is their most valuable asset. Every click, every search, every location ping is harvested, analyzed, and monetized.

FOSS projects have no such business model. Many are funded by donations, grants, or organizations with a mission to protect privacy rather than exploit it.

The Path Forward

After 9/11, we were told to sacrifice privacy for security. After Snowden, we learned that sacrifice was one-sided—our privacy was gone, our security was illusionary, and the only ones who gained power were the surveillance state and the corporations that fed it.

The answer isn't to wait for governments to regulate themselves, or to hope corporations suddenly develop ethics. The answer is to take control. Use Linux. Use encryption. Self-host your email, your files, your communications. Support FOSS projects. Teach others.

"The revolution will not be proprietary."

The tools exist. The knowledge is available. The only thing missing is the will to use them.

Don't wait for the next Snowden to tell you what's already obvious. The surveillance state didn't start with PRISM—it started with the acceptance that privacy is a luxury we can't afford. Prove them wrong. Take back your digital life.

Use FOSS. Encrypt everything. Self-host. Choose freedom.

// Comments

Leave a Comment