Feeds

PRISM snitch claims NSA hacked Chinese targets since 2009

Snowden suddenly looks safer in Hong Kong after revelations

Protecting users from Firesheep and other Sidejacking attacks with SSL

PRISM snitch Edward Snowden now claims to have data which proves the NSA has been hacking hundreds of civilian targets in China and Hong Kong since 2009.

Public officials, businesses and students as well as the Chinese University of Hong Kong were among the targets in the former British colony, Snowden told the South China Morning Post.

The former information security engineer at defence contractor Booz Allen Hamilton (the firm just fired him) showed the paper unverified documents purporting to reveal attacks on Hong Kong and mainland targets.

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he told the paper.

However, Chinese military targets apparently weren’t among those shown in the data and there’s no additional info in the story about exactly what level of access these attacks gave the NSA.

Snowden claimed his new revelations were designed to expose “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries”.

However, it should come as no great surprise that US security forces are actively monitoring and gathering intelligence on targets in China and around the world, although it comes at an awkward moment for the Obama administration as it tries to persuade the PRC to tone down its prolific government-sponsored IP theft.

Snowden's allegations should play well locally inasmuch as he wants to resist extradition to the US, despite a long-standing bilateral agreement between Washington and Hong Kong meaning barriers to his deportation are low.

Whether he is now an attractive enough asset for Beijing to want to keep hold of remains to be seen, but there is growing support for him on both sides of the Pacific.

Over 65,000 Americans have signed a White House petition calling for Snowden to be pardoned, while in Hong Kong a rally will be held in support of him in Chater Garden this Saturday.

If the locals rally around Snowden in big enough numbers as a kind of cause celebre of free speech then it may become even trickier for Washington to displace him. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.