Snowden Helping To Protect Journalists

Whistleblower Edward Snowden is working to develop tools for journalists that he says will help protect them and their sources from government surveillance and state-sponsored hackers.

It comes as the UK government has been forced to down play fears that proposals to amend the Official Secrets Act would turn journalists and whistleblowers into criminals.

Former US intelligence officer Snowden was forced into exile after sharing confidential US intelligence documents with the press revealing the extent of mass government surveillance.

Since last year, he has been serving as president of the US-based Freedom of the Press Foundation (FPF), having joining its board in 2014. The non-profit group, which has a team of 10 staff, claims to be “dedicated to helping support and defend public-interest journalism”.

Speaking to Wired magazine from Moscow, Snowden said the team were “trying to provide a few niche tools [for journalists] to make the game a little more fair”.

He added: “Newsrooms don’t have the bud­get, the sophistication, or the skills to defend them­selves in the current environment.”

When in 2013 Snowden set about leaking secret government files to journalists, among them Guardian columnist Glenn Greenwald, who is a co-founder of the FPF, he evaded detection by using anonymity software Tor and teaching reporters how to use encryption tool GPG by creating an online video tutorial that disguised his voice.

He told Wired his current focus was to on developing security and encryption tools that would “make this all paint-by-numbers [for journalists] instead of teaching yourself to be Picasso”.

Those in development include a hardware modification for the iPhone to detect malware on the device that is secretly transmitting a reporter’s data, such as their location.

Another, called Sunder, would act as a treasure chest of digital information that can only be opened when several passwords are combined – something journalists could use to protect a bulk of data.

The foundation is also working on an easy-to-use version of encrypted video-chat software Jitsi, used by Snowden to speak to the magazine via secure video link. “We can’t fix the surveil­lance problem overnight,” Snowden said. “But maybe we can build a shield that will protect anyone who’s standing behind it.”

In November the UK government passed the Investigatory Powers Bill that enables the state to use electronic snooping tactics to fight crime, including widespread collection of electronic data.

Police requests to view journalists’ call records in order to identify their sources have to be signed off by judges. But concerns remain that the applications are made in secret and so cannot be argued by news organisations in a court of law.

UK Press Gazette:

Surprise: Snowden Knows Some Russian Spies:  

Snowden iPhone Case Alerts Users To Surveillance:

 

« DDoS Protection: 14 Unique Ways to Protect Your Organisation
Cyber Skills Gap Grows Along With Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.