Feeds

Snowden: 'I have data on EVERY NSA operation against China'

New York Times interview sure to interest Beijing

Beginner's guide to SSL certificates

NSA whistleblower Edward Snowden has claimed he taught a course in “cyber-counterintelligence” against China and has access to data on every active operation mounted against the People’s Republic by the US spy agency.

In a lengthy interview with the New York Times, Snowden revealed more about his time at the National Security Agency and addressed US government concerns that Russian or Chinese spies may have compromised the classified documents he pilfered before fleeing to Hong Kong.

The docs never even made it to Russia – instead Snowden left them with journalists he met in Hong Kong before flying to Moscow, he said.

Snowden told the paper, apparently using encrypted online comms, that there was a “zero per cent chance” any of the documents had found their way into China’s hands because he was effectively able to second guess Chinese intelligence.

This is because his last role as an NSA contractor was working on Chinese targets, he said.

As a result, Snowden has a treasure trove of information which will certainly have sparked Beijing’s interest – “access to every target, every active operation” by the NSA against China.

The PRISM-poppper also declared that despite public criticism of him, NSA officials know very well that the information he stole has not been compromised by Chinese or Russian spies.

“If that was compromised, NSA would have set the table on fire from slamming it so many times in denouncing the damage it had caused. Yet NSA has not offered a single example of damage from the leaks,” he told the NYT.

“They haven’t said boo about it except ‘we think’, ‘maybe’, ‘have to assume’ from anonymous and former officials. Not ‘China is going dark’. Not ‘the Chinese military has shut us out’. ”

Snowden's not saying if he plans a release of the “full lists” of info he claims to have on those China operations.

The mere mention of the list's existence adds weight to Beijing’s argument that the People's Republic has always been a target, not a perpetrator, of state-sponsored cyber crime. ®

Internet Security Threat Report 2014

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.