Feeds

Snowden: 'I have data on EVERY NSA operation against China'

New York Times interview sure to interest Beijing

Choosing a cloud hosting partner with confidence

NSA whistleblower Edward Snowden has claimed he taught a course in “cyber-counterintelligence” against China and has access to data on every active operation mounted against the People’s Republic by the US spy agency.

In a lengthy interview with the New York Times, Snowden revealed more about his time at the National Security Agency and addressed US government concerns that Russian or Chinese spies may have compromised the classified documents he pilfered before fleeing to Hong Kong.

The docs never even made it to Russia – instead Snowden left them with journalists he met in Hong Kong before flying to Moscow, he said.

Snowden told the paper, apparently using encrypted online comms, that there was a “zero per cent chance” any of the documents had found their way into China’s hands because he was effectively able to second guess Chinese intelligence.

This is because his last role as an NSA contractor was working on Chinese targets, he said.

As a result, Snowden has a treasure trove of information which will certainly have sparked Beijing’s interest – “access to every target, every active operation” by the NSA against China.

The PRISM-poppper also declared that despite public criticism of him, NSA officials know very well that the information he stole has not been compromised by Chinese or Russian spies.

“If that was compromised, NSA would have set the table on fire from slamming it so many times in denouncing the damage it had caused. Yet NSA has not offered a single example of damage from the leaks,” he told the NYT.

“They haven’t said boo about it except ‘we think’, ‘maybe’, ‘have to assume’ from anonymous and former officials. Not ‘China is going dark’. Not ‘the Chinese military has shut us out’. ”

Snowden's not saying if he plans a release of the “full lists” of info he claims to have on those China operations.

The mere mention of the list's existence adds weight to Beijing’s argument that the People's Republic has always been a target, not a perpetrator, of state-sponsored cyber crime. ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.