Feeds

PRISM snitch claims NSA hacked Chinese targets since 2009

Snowden suddenly looks safer in Hong Kong after revelations

Securing Web Applications Made Simple and Scalable

PRISM snitch Edward Snowden now claims to have data which proves the NSA has been hacking hundreds of civilian targets in China and Hong Kong since 2009.

Public officials, businesses and students as well as the Chinese University of Hong Kong were among the targets in the former British colony, Snowden told the South China Morning Post.

The former information security engineer at defence contractor Booz Allen Hamilton (the firm just fired him) showed the paper unverified documents purporting to reveal attacks on Hong Kong and mainland targets.

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he told the paper.

However, Chinese military targets apparently weren’t among those shown in the data and there’s no additional info in the story about exactly what level of access these attacks gave the NSA.

Snowden claimed his new revelations were designed to expose “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries”.

However, it should come as no great surprise that US security forces are actively monitoring and gathering intelligence on targets in China and around the world, although it comes at an awkward moment for the Obama administration as it tries to persuade the PRC to tone down its prolific government-sponsored IP theft.

Snowden's allegations should play well locally inasmuch as he wants to resist extradition to the US, despite a long-standing bilateral agreement between Washington and Hong Kong meaning barriers to his deportation are low.

Whether he is now an attractive enough asset for Beijing to want to keep hold of remains to be seen, but there is growing support for him on both sides of the Pacific.

Over 65,000 Americans have signed a White House petition calling for Snowden to be pardoned, while in Hong Kong a rally will be held in support of him in Chater Garden this Saturday.

If the locals rally around Snowden in big enough numbers as a kind of cause celebre of free speech then it may become even trickier for Washington to displace him. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.