Snowden Accuses CIA Of 'A PR Fix'

Edward Snowden, once a CIA and National Security Agency contractor, says that the CIA’s new Dark site is the latest attempt by the CIA to fix its image after he leaked a trove of damning top-secret documents in 2013 revealing mass surveillance abuses by the US government.

The intelligence agency is enthusiatically promoting its new Onion site on the dark web: "Our onion site is one of several ways individuals can contact the CIA."

On the heels of the CIA announcing its brand new Instagram account, replete with amateur artwork of some of its operatives and stories featuring Director Gina Haspel’s first ID card, the American spy agency is going to the dark web.

The CIA has recentky announced the launch of its very own onion site, or as the agency puts it, its “Latest Layer” online.

According to the agency, a transition to the Tor network (known for its anonymity services) was a natural move since its onion site is “secure, anonymous, untraceable, traits ever-present in CIA’s intelligence collection mission.” The site will be an exact replica of its regular website, CIA.gov, featuring things like CIA World Factbook and its online Library of declassified materials.

The CIA’s Director of Public Affairs, Brittany Bramell, said in a press release the move to Tor reflects the agency’s interest in keeping pace with modern internet habits, going so far as to offer instructions on how to download Tor to use the site.

“Our global mission demands that individuals can access us securely from anywhere. Creating an onion site is just one of many ways we’re going where people are,” she said.

While it’s not immediately clear why the notoriously clandestine and historically impenetrable spy service is now deciding to expand its online offerings to the dark web, a close reading of the release reveals an interest in classic spook pursuits: recruitment and intelligence. The release claims the site is a place for “applying for a job” and, most importantly, a place to more securely tip them intelligence.

“Our onion site is one of several ways individuals can contact the CIA,” it reads. “For more details, refer to the Report Information tab on either our website or onion site.”

The Tor Project, which created the Tor browser and administers it to this day, says it isn’t surprised or takes issue with the CIA using its software.

Ironically, Tor sites have been used by criminals and terrorists alike, while some still point out how the Tor browser was originally the recipient of US government funding and connections to the intelligence community. Intelligence agencies are notoriously against encryption and fans of backdoors. For example, former CIA Director John Brennan was publicly against encryption and secure communications as an impediment to combatting terrorism. But like its social media blitz of the last few years, in which the agency has tweeted puppies and wombat animations, the CIA is clearly making a concerted effort to refurbish its public image to appeal to younger generations.

Edward Snowden said the recent spate of online activities by western intelligence agencies is pure public relations.

“They get Twitter accounts. Instagram accounts with puppies and everything like that, because they want to be friendly. They want to be on your side,” he said, only weeks before the CIA added the Tor site to its online repertoire.

“What's happened here is the intelligence agencies have drawn the wrong conclusions, at least from the public's perspective, from the backlash of 2013,” he said in a current episode of Motherboard podcast CYBER.

Snowden thinks while the revelations of bulk data collection turned public sentiment against American intelligence activities, the agencies themselves took away the wrong lesson. In other words, like a Burger King ad, the CIA is trying to be cool with the kids to ensure a future for its next generation of spies.

Vice 1:            Vice 2

You Might Also Read: 

Snowden Explains Why The CIA Is On Instagram:


 

« British Hackers Convicted For Stealing £10m
Facebook Deserves To Be Broken-Up »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.