CIA Say Edward Snowden 'taught ISIS to avoid detection'

Ex US secretary of Defense Leon E. Panetta stands with Michael Morell, CIA deputy director at the time.

NSA whistleblower Edward Snowden has been blamed by the CIA for making it easier for the ISIS masterminds behind the Paris terror strikes to plan their atrocities that killed at least 132 people under the radar.

John Brennan, CIA director, claimed "unauthorised disclosures" on how the US security services operated, such as Snowden's infamous leaks have led to their snooping techniques being hampered.

He said it was now "much more difficult" to track down terrorists and work out what they are planning and when and where because of curbs introduced on surveillance in the wake of Snowden's exposures.

Mr Brennan said the Paris attacks would have needed weeks or months of planning, but none of this had been picked up by French or other allied spies.
He said: "ISIS has clearly gone to school on what they need to do in order to keep their activities concealed from the authorities."

The intelligence chief stopped short of naming Snowden, but has previously been heavily critical of his "outrageous" actions.

He said previously: "He has hurt this country and has helped our enemies". 

But former CIA deputy director Michael Morell goes one step further by directly implicating Snowden in the rapid expansion of ISIS in the months after the first leaks in 2013.

Morell, who makes the claims in a new book, says the most damaging revelation was the existence of a spying program that collects foreigners' e-mails as they move through equipment in America.

He said the jihadists subsequently switched their messaging systems to more 'secure' platforms, encrypted them or 'avoided electronic communications altogether'.

This is not a consensus view within the US intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. 

And last year, a US intelligence official with access to information about ISIS’s current tactics have said that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the US from their time in AQI, and they have adapted well to avoiding detection.”

Express: http://bit.ly/1PS62OU
Daily Beast: http://thebea.st/1EhKD6K

 

« Did China Authorize Major High Level Hack on US & It’s Allies?
Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.