Edward Snowden To Address Israeli Spies

American surveillance whistle-blower Edward Snowden is to address an Israeli audience for the first time next month at an invite-only event.

Snowden is currently a fugitive who worked at both the Central Intelligence Agency (CIA) and National Security Agency (NSA) before leaving for Hong Kong then Russia in 2013 in order to spill the beans on US eavesdropping.

He will speak to the audience via a secure video-link on 6 November, with the former deputy chief of Mossad, Ram Ben Barak, responding to his comments. Barak was in charge of the ‘Keshet’ signals intelligence unit of the famed spy service.

Snowden made off with millions of classified electronic documents detailing covert US action around the world, but released only those pertaining to the widespread interception and collection of personal communications, revelations which led Western governments to revisit policies in the field.

Most analysts assume he has information relating to US spying in relation to Israel and Israelis abroad, and he has in the past said: “There definitely remain stories relating to the Middle East and Israel.”

The event was engineered by the ‘OH! Orenstein Hoshen’ media consultancy, founded by Hedan Orenstein and Itamar Hoshen, who described “a process lasting several months,” and they said their clients’ work often touches on technology and the law, “exactly the fields in which Snowden is involved”.

Snowden revealed how the US and the UK – through the government’s GCHQ listening centre – were scooping up data about the phone and internet activity of citizens around the world, for instance by tapping sea-floor internet cables. He has since become a campaigner for privacy rights.

“His actions have aroused intense arguments on the matter of whether the NSA’s ultra-advanced surveillance programs are an illegal invasion of the privacy of tens of millions of US citizens, in contravention of the US constitution, or a legitimate tool in the struggle against terror and homeland security,” the pair said.

“As we are currently concerned about difficult questions regarding privacy and security of our personal data, we do not know of many such important public debates or talks about the high price paid so far on the stand being taken.”

Times Of Israel:

You Might Also Read:

Edward Snowden Reconsidered

« Blockchain - The Netherlands Is Blazing A Trail
US Police Will Use Smart Patrolling »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.