Feeds

NSA leaker Thomas Drake says Oz security reforms are 'scary'

Australians urged to oppose NatSec laws before they silence whistleblowers

Choosing a cloud hosting partner with confidence

Thomas Drake and Jesselyn Radack

Thomas Drake and Jesselyn Radack

National Security Agency whistleblower Thomas Drake says Australia's looming national security reforms makes him 'shudder', labelling them ambiguous and a plot to stamp out legitimate public-interest whistleblowing.

Drake, who Edward Snowden said was his inspiration for leaking the NSA spy documents, blew the lid in 2006 on the NSA's massively inefficient Trailblazer Project while at the agency that wasted billions of US dollars in spy operations post 9/11.

He along with NSA colleagues had built ThinThread what he said was a much more efficient intelligence program that cost a fraction of the Trailblazer Project and had more checks and balances in place to prevent wholesale collection of private data.

Youtube Video

Podcast: Listen to Drake's talk at the Ruxmon security event last week.

"A secret is what the Government says is a secret, and what is a special intelligence operation," Drake told a small gathering of security and privacy pundits in Melbourne on Friday.

"I think it is really designed to deal with people like myself and others who would dare to bring to light those activities that are behind the shield of national security.

"It will send an extraordinarily stark message; 'even if you see something bad, just shut up'."

George Brandis

George Brandis

The Australian security reforms, spearheaded by Federal Attorney General George Brandis, would criminalise journalists and activists who would help whistleblowers leak information to the public.

The laws would introduce enhanced abilities for clandestine targeted malware implantation to combat whistleblowing terrorism and impose strict penalties for those who leak sensitive state information.

Drake said the laws will criminalise attempts to reveal corruption and invasions of privacy and urged Australia's press to rally against the laws to prevent them from coming into effect.

Drake was prosecuted under the Espionage Act in 2010 for leaking information to The Baltimore Sun, but the case collapsed and he plead guilty only to inappropriate computer access.

He criticised the NSA's zealous internet data-hoovering and said the agency did not "need to suck the ocean dry to find out things about the ocean".

He was widely credited with whistleblowing in the public interest and now works at an Apple store in San Francisco.

Drake and US national human rights attorney Jesselyn Radack, who counts Drake and Edward Snowden as clients, spoke at the free monthly Ruxmon security meet up in Melbourne. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.