Feeds

Security guru: You can't blame EDWARD SNOWDEN for making US clouds LOOK leaky

And anyway, people AREN'T switching away

Choosing a cloud hosting partner with confidence

Infosec 2014 Accusations that the revelations from rogue National Security Agency sysadmin whistleblower Edward Snowden have damaged the US technology industry are misplaced, according to influential security guru Mikko Hypponen.

Hypponen, chief research officer at security firm F-Secure, said that the disclosure that US tech was either "booby-trapped or monitored" may have had a damaging effect on the US cloud industry. But blaming this on Snowden was misplaced and akin to "blaming Al Gore for global warming".

Snowden's action represented the single largest leak of top secret information in history. "Top secret information almost never leaks and that's why the Snowden leak was extraordinary", according to Hypponen. All the information leaked by Private Manning, by contrast, was classified either secret or below.

During a keynote speech on whistle-blowing, Hypponen told delegates to the Infosec conference that while wanting to believe that Snowden was a selfless hero, some of the circumstances of the case troubled him. For example the initial leaks were on 5 June 2013, two days before US president Barack Obama was due to meet face to face with his Chinese counterpart to discuss cyber-espionage. The timing might have been a coincidence but it couldn't have come at a good time for the US side, according to Hypponen.

The security guru, a vocal critic of the NSA, added: "The whole timeline of the leaks bothers me."

At any rate, it appears that the outcry in Europe and further afield over privacy has not had much effect. Europe continues to use US tech services from the likes of Microsoft and Google even after revelations about the NSA's dragnet surveillance programmes, and this is because it has no choice, the security expert told the crowd at Infosec in London.

The European tech industry has failed to produce viable alternatives, he claimed. Even in cases where a tech firm makes it big - such as Skype - these firms get bought by Microsoft or other US tech giants, Hypponen concluded. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.