The US National Security Agency Is On The Ropes

"Serial leaks of the agency's cyber-weapons have damaged morale, slowed intelligence operations & resulted in attacks on businesses worldwide"

A special investigation by New York Times reporters published this month concludes: "The flood of digital secrets ... is raising profound questions. Have hackers and leakers made secrecy obsolete? Has Russian intelligence simply outplayed the United States, penetrating the most closely guarded corners of its government?"

The hackers, calling themselves the Shadow Brokers, are a "mysterious group that ... somehow obtained many of the hacking tools the United States used to spy on other countries": "There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward Snowden, the former NSA contractor who fled with four laptops of classified material in 2013…Snowden released code words, while the Shadow Brokers have released the actual code."

Ghost Snowden 
Now a Russian investigative journalist has claimed that whistleblower Edward Snowden is 'a sort of ghost'. “Nobody can talk to him, nobody has seen him,” Andrei Soldatov, an author and expert on post-Soviet security services said on a recent Lawfare podcast. “He is a sort of ghost.”Snowden has been living in exile in Russia since summer 2013 after fleeing the US, and spending weeks in the transit zone of Moscow's Sheremetyevo airport.

In his attempts to escape 'persecution' by the US authorities, Snowden asked more than 20 countries for asylum but was unable to leave Russia after the US revoked his passport. Since then he's a lived a relatively quiet life aside from a few interviews with Western media and some video chat gigs on the speaking circuit.

But he has been careful not to give too much away about his personal life, and takes intense security measures amid fears that he could be kidnapped by US agents. He has also tried to distance himself from his new home. While America's most wanted has been told he can stay in Moscow until 2020, he is evidently worried this does not give him enough protection.
In a move that would infuriate Washington, his attorney Wolfgang Kaleck recently asked the European Parliament to consider granting him asylum.

Berlin-based attorney Mr Kaleck claimed EU countries were indebted to the whistleblower for exposing US snooping on 'friendly' European governments.Kucherena has also said that he could apply for full Russian citizenship after being resident in the country for five years, which would prevent him from ever being extradited to the US.

One of the criminals being considered for the controversial exchange was said to be convicted arms dealer Viktor Bout, nicknamed the 'Merchant of Death'. Bout, a former russian air force officer, was kidnapped by US authorities in Thailand in 2011 and convicted of conspiracy to kill US citizens and provide material for terrorists.

In Moscow respected journalist and political analyst Sergey Parkhomenko claimed an exchange of Snowden for Bout had already been agreed by Putin and Trump. But this was stopped because of the political climate in the US over Trump's alleged links to Russia. 

Axios:      Mail Online

You Might Also Read: 

NSA Should Thank Edward Snowden:

NSA Has Done Little To Prevent The Next Edward Snowden:

Snowden: NSA Should Have Prevented WannaCry Attacks:

 

« Who's Responsible For Cloud Security?
Russia Is Building Killer Robots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

National Forensic Sciences University (NFSU)

National Forensic Sciences University (NFSU)

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.