Feeds

Snowden: 'I have data on EVERY NSA operation against China'

New York Times interview sure to interest Beijing

Securing Web Applications Made Simple and Scalable

NSA whistleblower Edward Snowden has claimed he taught a course in “cyber-counterintelligence” against China and has access to data on every active operation mounted against the People’s Republic by the US spy agency.

In a lengthy interview with the New York Times, Snowden revealed more about his time at the National Security Agency and addressed US government concerns that Russian or Chinese spies may have compromised the classified documents he pilfered before fleeing to Hong Kong.

The docs never even made it to Russia – instead Snowden left them with journalists he met in Hong Kong before flying to Moscow, he said.

Snowden told the paper, apparently using encrypted online comms, that there was a “zero per cent chance” any of the documents had found their way into China’s hands because he was effectively able to second guess Chinese intelligence.

This is because his last role as an NSA contractor was working on Chinese targets, he said.

As a result, Snowden has a treasure trove of information which will certainly have sparked Beijing’s interest – “access to every target, every active operation” by the NSA against China.

The PRISM-poppper also declared that despite public criticism of him, NSA officials know very well that the information he stole has not been compromised by Chinese or Russian spies.

“If that was compromised, NSA would have set the table on fire from slamming it so many times in denouncing the damage it had caused. Yet NSA has not offered a single example of damage from the leaks,” he told the NYT.

“They haven’t said boo about it except ‘we think’, ‘maybe’, ‘have to assume’ from anonymous and former officials. Not ‘China is going dark’. Not ‘the Chinese military has shut us out’. ”

Snowden's not saying if he plans a release of the “full lists” of info he claims to have on those China operations.

The mere mention of the list's existence adds weight to Beijing’s argument that the People's Republic has always been a target, not a perpetrator, of state-sponsored cyber crime. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.