CIA Say Edward Snowden 'taught ISIS to avoid detection'

Ex US secretary of Defense Leon E. Panetta stands with Michael Morell, CIA deputy director at the time.

NSA whistleblower Edward Snowden has been blamed by the CIA for making it easier for the ISIS masterminds behind the Paris terror strikes to plan their atrocities that killed at least 132 people under the radar.

John Brennan, CIA director, claimed "unauthorised disclosures" on how the US security services operated, such as Snowden's infamous leaks have led to their snooping techniques being hampered.

He said it was now "much more difficult" to track down terrorists and work out what they are planning and when and where because of curbs introduced on surveillance in the wake of Snowden's exposures.

Mr Brennan said the Paris attacks would have needed weeks or months of planning, but none of this had been picked up by French or other allied spies.
He said: "ISIS has clearly gone to school on what they need to do in order to keep their activities concealed from the authorities."

The intelligence chief stopped short of naming Snowden, but has previously been heavily critical of his "outrageous" actions.

He said previously: "He has hurt this country and has helped our enemies". 

But former CIA deputy director Michael Morell goes one step further by directly implicating Snowden in the rapid expansion of ISIS in the months after the first leaks in 2013.

Morell, who makes the claims in a new book, says the most damaging revelation was the existence of a spying program that collects foreigners' e-mails as they move through equipment in America.

He said the jihadists subsequently switched their messaging systems to more 'secure' platforms, encrypted them or 'avoided electronic communications altogether'.

This is not a consensus view within the US intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. 

And last year, a US intelligence official with access to information about ISIS’s current tactics have said that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the US from their time in AQI, and they have adapted well to avoiding detection.”

Express: http://bit.ly/1PS62OU
Daily Beast: http://thebea.st/1EhKD6K

 

« Did China Authorize Major High Level Hack on US & It’s Allies?
Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

National Information and Cybersecurity Council (NICC) - India

National Information and Cybersecurity Council (NICC) - India

National Information and Cybersecurity Council is a leading collaborative effort between Government of India and Industry to raise Cybersecurity awareness nationally.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Dev Information Technology (Dev IT)

Dev Information Technology (Dev IT)

Dev IT delivers digital transformation and end-to-end information technology services.