Snowden Helping To Protect Journalists

Whistleblower Edward Snowden is working to develop tools for journalists that he says will help protect them and their sources from government surveillance and state-sponsored hackers.

It comes as the UK government has been forced to down play fears that proposals to amend the Official Secrets Act would turn journalists and whistleblowers into criminals.

Former US intelligence officer Snowden was forced into exile after sharing confidential US intelligence documents with the press revealing the extent of mass government surveillance.

Since last year, he has been serving as president of the US-based Freedom of the Press Foundation (FPF), having joining its board in 2014. The non-profit group, which has a team of 10 staff, claims to be “dedicated to helping support and defend public-interest journalism”.

Speaking to Wired magazine from Moscow, Snowden said the team were “trying to provide a few niche tools [for journalists] to make the game a little more fair”.

He added: “Newsrooms don’t have the bud­get, the sophistication, or the skills to defend them­selves in the current environment.”

When in 2013 Snowden set about leaking secret government files to journalists, among them Guardian columnist Glenn Greenwald, who is a co-founder of the FPF, he evaded detection by using anonymity software Tor and teaching reporters how to use encryption tool GPG by creating an online video tutorial that disguised his voice.

He told Wired his current focus was to on developing security and encryption tools that would “make this all paint-by-numbers [for journalists] instead of teaching yourself to be Picasso”.

Those in development include a hardware modification for the iPhone to detect malware on the device that is secretly transmitting a reporter’s data, such as their location.

Another, called Sunder, would act as a treasure chest of digital information that can only be opened when several passwords are combined – something journalists could use to protect a bulk of data.

The foundation is also working on an easy-to-use version of encrypted video-chat software Jitsi, used by Snowden to speak to the magazine via secure video link. “We can’t fix the surveil­lance problem overnight,” Snowden said. “But maybe we can build a shield that will protect anyone who’s standing behind it.”

In November the UK government passed the Investigatory Powers Bill that enables the state to use electronic snooping tactics to fight crime, including widespread collection of electronic data.

Police requests to view journalists’ call records in order to identify their sources have to be signed off by judges. But concerns remain that the applications are made in secret and so cannot be argued by news organisations in a court of law.

UK Press Gazette:

Surprise: Snowden Knows Some Russian Spies:  

Snowden iPhone Case Alerts Users To Surveillance:

 

« DDoS Protection: 14 Unique Ways to Protect Your Organisation
Cyber Skills Gap Grows Along With Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.