CIA Say Edward Snowden 'taught ISIS to avoid detection'

Ex US secretary of Defense Leon E. Panetta stands with Michael Morell, CIA deputy director at the time.

NSA whistleblower Edward Snowden has been blamed by the CIA for making it easier for the ISIS masterminds behind the Paris terror strikes to plan their atrocities that killed at least 132 people under the radar.

John Brennan, CIA director, claimed "unauthorised disclosures" on how the US security services operated, such as Snowden's infamous leaks have led to their snooping techniques being hampered.

He said it was now "much more difficult" to track down terrorists and work out what they are planning and when and where because of curbs introduced on surveillance in the wake of Snowden's exposures.

Mr Brennan said the Paris attacks would have needed weeks or months of planning, but none of this had been picked up by French or other allied spies.
He said: "ISIS has clearly gone to school on what they need to do in order to keep their activities concealed from the authorities."

The intelligence chief stopped short of naming Snowden, but has previously been heavily critical of his "outrageous" actions.

He said previously: "He has hurt this country and has helped our enemies". 

But former CIA deputy director Michael Morell goes one step further by directly implicating Snowden in the rapid expansion of ISIS in the months after the first leaks in 2013.

Morell, who makes the claims in a new book, says the most damaging revelation was the existence of a spying program that collects foreigners' e-mails as they move through equipment in America.

He said the jihadists subsequently switched their messaging systems to more 'secure' platforms, encrypted them or 'avoided electronic communications altogether'.

This is not a consensus view within the US intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. 

And last year, a US intelligence official with access to information about ISIS’s current tactics have said that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the US from their time in AQI, and they have adapted well to avoiding detection.”

Express: http://bit.ly/1PS62OU
Daily Beast: http://thebea.st/1EhKD6K

 

« Did China Authorize Major High Level Hack on US & It’s Allies?
Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

INTfinity Consulting

INTfinity Consulting

The INTfinity team brings together decades of professional experience in cybersecurity. We're here to apply that same experience and proficiency in defending your networks.

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.