Snowden Accuses CIA Of 'A PR Fix'

Edward Snowden, once a CIA and National Security Agency contractor, says that the CIA’s new Dark site is the latest attempt by the CIA to fix its image after he leaked a trove of damning top-secret documents in 2013 revealing mass surveillance abuses by the US government.

The intelligence agency is enthusiatically promoting its new Onion site on the dark web: "Our onion site is one of several ways individuals can contact the CIA."

On the heels of the CIA announcing its brand new Instagram account, replete with amateur artwork of some of its operatives and stories featuring Director Gina Haspel’s first ID card, the American spy agency is going to the dark web.

The CIA has recentky announced the launch of its very own onion site, or as the agency puts it, its “Latest Layer” online.

According to the agency, a transition to the Tor network (known for its anonymity services) was a natural move since its onion site is “secure, anonymous, untraceable, traits ever-present in CIA’s intelligence collection mission.” The site will be an exact replica of its regular website, CIA.gov, featuring things like CIA World Factbook and its online Library of declassified materials.

The CIA’s Director of Public Affairs, Brittany Bramell, said in a press release the move to Tor reflects the agency’s interest in keeping pace with modern internet habits, going so far as to offer instructions on how to download Tor to use the site.

“Our global mission demands that individuals can access us securely from anywhere. Creating an onion site is just one of many ways we’re going where people are,” she said.

While it’s not immediately clear why the notoriously clandestine and historically impenetrable spy service is now deciding to expand its online offerings to the dark web, a close reading of the release reveals an interest in classic spook pursuits: recruitment and intelligence. The release claims the site is a place for “applying for a job” and, most importantly, a place to more securely tip them intelligence.

“Our onion site is one of several ways individuals can contact the CIA,” it reads. “For more details, refer to the Report Information tab on either our website or onion site.”

The Tor Project, which created the Tor browser and administers it to this day, says it isn’t surprised or takes issue with the CIA using its software.

Ironically, Tor sites have been used by criminals and terrorists alike, while some still point out how the Tor browser was originally the recipient of US government funding and connections to the intelligence community. Intelligence agencies are notoriously against encryption and fans of backdoors. For example, former CIA Director John Brennan was publicly against encryption and secure communications as an impediment to combatting terrorism. But like its social media blitz of the last few years, in which the agency has tweeted puppies and wombat animations, the CIA is clearly making a concerted effort to refurbish its public image to appeal to younger generations.

Edward Snowden said the recent spate of online activities by western intelligence agencies is pure public relations.

“They get Twitter accounts. Instagram accounts with puppies and everything like that, because they want to be friendly. They want to be on your side,” he said, only weeks before the CIA added the Tor site to its online repertoire.

“What's happened here is the intelligence agencies have drawn the wrong conclusions, at least from the public's perspective, from the backlash of 2013,” he said in a current episode of Motherboard podcast CYBER.

Snowden thinks while the revelations of bulk data collection turned public sentiment against American intelligence activities, the agencies themselves took away the wrong lesson. In other words, like a Burger King ad, the CIA is trying to be cool with the kids to ensure a future for its next generation of spies.

Vice 1:            Vice 2

You Might Also Read: 

Snowden Explains Why The CIA Is On Instagram:


 

« British Hackers Convicted For Stealing £10m
Facebook Deserves To Be Broken-Up »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.