Risk
6/11/2013
11:31 AM
Connect Directly
RSS
E-Mail
50%
50%

9 Facts About NSA Prism Whistleblower

Here's what we know about Edward J. Snowden, the NSA contractor last seen in Hong Kong -- and why the Bradley Manning case could affect Snowden's fate.

4. Snowden Carefully Selected Secrets.

Snowden told reporters that the information he leaked was designed to trigger a debate on the "scope of surveillance in America," but also to avoid the types of mistakes allegedly made by Pfc. Bradley Manning, who's accused of leaking documents that put the lives of confidential U.S. sources abroad at risk.

"I understand that I will be made to suffer for my actions," said Snowden. "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."

5. Into Hiding In Hong Kong.

But Snowden didn't sit around waiting to be arrested. About three weeks ago, according to The Guardian, Snowden finished copying the last of the documents he planned to leak, then told his NSA supervisor that he required a two-week medical leave related to epilepsy, for which he was diagnosed last year. Then he flew to Hong Kong, registered at a nice hotel just down the street from the CIA station based in the local consulate, and rarely left, saying it was possible he would be rendered by U.S. agents, detained by Chinese officials, or extradited.

Snowden said he chose Hong Kong, a Chinese territory that enjoys its own economic and political system, for its "spirited commitment to free speech and the right of political dissent." In the short term, he hoped the government wouldn't deport him. Longer term, "my predisposition is to seek asylum in a country with shared values," he said. "The nation that most encompasses this is Iceland. They stood up for people over Internet freedom. I have no idea what my future is going to be."

6. Charges Filed Against Snowden.

Charges have now been filed against Snowden by the Department of Justice, The New York Times reported Tuesday. The charges pave the way for his extradition, since foreign courts typically require criminal charges to be filed before they'll hear an extradition request.

Multiple investigations are also underway into the leaks. The FBI's Washington field office will lead one investigation. The NSA, meanwhile, launched its own investigation following revelations first published Wednesday by The Guardian, and is trying to ascertain the full extent of the information that was taken and released by Snowden.

7. Hong Kong Extraditions Subject To Delays.

Could Snowden successfully avoid being extradited from Hong Kong? Regina Ip, a former secretary of security who serves in the Hong Kong legislature, said that the territory has a history of working with U.S. law enforcement officials. "He won't find Hong Kong a safe harbor," Ip told the Times.

But Hong Kong university professor Simon Young told The Guardian that China would likely leave it to the Hong Kong courts to decide whether Snowden would be extradited.

In fact, according to GlobalPost, Snowden's choice of Hong Kong looks astute, because the high court of Hong Kong government has charged the government with putting a new extradition system in place, which could take some time. Until it does so, Hong Kong's extradition process is stuck in legal limbo, and no cases will likely be decided, according to Nicholas Bequelin, a senior researcher for Human Rights Watch.

8. U.S. Government Treatment Of Manning Might Safeguard Snowden.

In December, furthermore, a Hong Kong court ruled that no one can be extradited to a country where they might face cruel or unusual punishment, Patricia Ho, a lawyer at Daly & Associates, told GlobalPost. "The reason I think this is relevant," Ho said, "is because if you look at the case of Bradley Manning, during his detention period, he was found to have suffered cruel and degrading treatment. It was found by the UN special rapporteur on torture."

"I would imagine given the similarity in the cases that Snowden could easily say, 'Well, I fear that the same would happen to me,' and use that as a basis to claim protection in Hong Kong," she said. "If he does that I would say his chances of protection would be fair."

9. Snowden Missing As Of Monday.

As of Monday, however, Snowden reportedly checked out of the Hong Kong hotel where he was staying -- perhaps after being located by multiple news outlets -- and his whereabouts were unknown. It's not clear if he'd been interviewed by American officials, as they were seeking to do, or if he might have been detained by Hong Kong authorities.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.