CIA Say Edward Snowden 'taught ISIS to avoid detection'

Ex US secretary of Defense Leon E. Panetta stands with Michael Morell, CIA deputy director at the time.

NSA whistleblower Edward Snowden has been blamed by the CIA for making it easier for the ISIS masterminds behind the Paris terror strikes to plan their atrocities that killed at least 132 people under the radar.

John Brennan, CIA director, claimed "unauthorised disclosures" on how the US security services operated, such as Snowden's infamous leaks have led to their snooping techniques being hampered.

He said it was now "much more difficult" to track down terrorists and work out what they are planning and when and where because of curbs introduced on surveillance in the wake of Snowden's exposures.

Mr Brennan said the Paris attacks would have needed weeks or months of planning, but none of this had been picked up by French or other allied spies.
He said: "ISIS has clearly gone to school on what they need to do in order to keep their activities concealed from the authorities."

The intelligence chief stopped short of naming Snowden, but has previously been heavily critical of his "outrageous" actions.

He said previously: "He has hurt this country and has helped our enemies". 

But former CIA deputy director Michael Morell goes one step further by directly implicating Snowden in the rapid expansion of ISIS in the months after the first leaks in 2013.

Morell, who makes the claims in a new book, says the most damaging revelation was the existence of a spying program that collects foreigners' e-mails as they move through equipment in America.

He said the jihadists subsequently switched their messaging systems to more 'secure' platforms, encrypted them or 'avoided electronic communications altogether'.

This is not a consensus view within the US intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. 

And last year, a US intelligence official with access to information about ISIS’s current tactics have said that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the US from their time in AQI, and they have adapted well to avoiding detection.”

Express: http://bit.ly/1PS62OU
Daily Beast: http://thebea.st/1EhKD6K

 

« Did China Authorize Major High Level Hack on US & It’s Allies?
Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

STAKE Soft

STAKE Soft

STAKE Soft is a pioneering technology company dedicated to developing advanced cybersecurity solutions that empower businesses to thrive in an increasingly complex digital world.