Feeds

Edward Snowden's not a one-off: US.gov hunts new secret doc leaker

Poor old Julian Assange – whistleblower went straight to Glenn Greenwald

Internet Security Threat Report 2014

It appears former NSA contractor Edward Snowden is not the only leaker of secret US documents around, as the US government searches for another whistleblower in the aftermath of another leak of classified information.

CNN reports that leaked documents related to a terrorist watch list and published by The Intercept (a site founded by Snowden confidante journalist Glenn Greenwald) didn't even exist before Snowden quit his job as a NSA contractor in Hawaii and high-tailed it from the US.

That means the former sysadmin couldn't have siphoned off this particular piece of secret information and that some other unknown source must be behind the leak.

US authorities are said to be hunting the new whistleblower.

The Intercept's article, published on Tuesday, covers the growth in US government's Terrorist Screening Database, a watchlist of “known or suspected terrorists” that lists 680,000 people, many of whom have no known affiliation with a terrorist group. The article cites documents compiled by the National Counterterrorism Center in August 2013 – three months after Snowden left the US in May 2013.

The leaked database is shared with local law enforcement agencies, private contractors, and foreign governments. These are secret documents and less sensitive than the "top secret" files spirited away by Snowden.

Eric Chiu, president & co-founder of cloud control company HyTrust, said the latest leak underlined the wider problem of insider threats.

"Insider threats can cause the most damage to any organisation - government agencies, corporations and others," Chiu commented. "The issue is that once an attacker or malicious employee (or frankly, someone that doesn't have the same philosophical beliefs) is on the network, it is impossible to tell a good guy from a bad guy; that person can take their time to siphon off large amounts of data without being detected."

He added: "Organizations need to put a higher urgency around securing against insider threats, especially when customer data, intellectual property and top security information is at stake.

This requires that organisations take an "inside-out" approach to security and assume the bad guy is already on the network. Chiu said: "Access controls including the two-man rule, role-based monitoring and data encryption are key requirements to make this happen, especially in highly concentrated environments like virtualisation and cloud," he added.

Greenwald has previously said other potential whistleblower might be inspired by Snowden's example, even hinting at times that others might already be in play.

In a February interview with CNN, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved."

"I have no doubt there will be other sources inside the government who see extreme wrongdoing who are inspired by Edward Snowden," he said. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.