Risk
6/11/2013
11:31 AM
Connect Directly
RSS
E-Mail
50%
50%

9 Facts About NSA Prism Whistleblower

Here's what we know about Edward J. Snowden, the NSA contractor last seen in Hong Kong -- and why the Bradley Manning case could affect Snowden's fate.

4. Snowden Carefully Selected Secrets.

Snowden told reporters that the information he leaked was designed to trigger a debate on the "scope of surveillance in America," but also to avoid the types of mistakes allegedly made by Pfc. Bradley Manning, who's accused of leaking documents that put the lives of confidential U.S. sources abroad at risk.

"I understand that I will be made to suffer for my actions," said Snowden. "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."

5. Into Hiding In Hong Kong.

But Snowden didn't sit around waiting to be arrested. About three weeks ago, according to The Guardian, Snowden finished copying the last of the documents he planned to leak, then told his NSA supervisor that he required a two-week medical leave related to epilepsy, for which he was diagnosed last year. Then he flew to Hong Kong, registered at a nice hotel just down the street from the CIA station based in the local consulate, and rarely left, saying it was possible he would be rendered by U.S. agents, detained by Chinese officials, or extradited.

Snowden said he chose Hong Kong, a Chinese territory that enjoys its own economic and political system, for its "spirited commitment to free speech and the right of political dissent." In the short term, he hoped the government wouldn't deport him. Longer term, "my predisposition is to seek asylum in a country with shared values," he said. "The nation that most encompasses this is Iceland. They stood up for people over Internet freedom. I have no idea what my future is going to be."

6. Charges Filed Against Snowden.

Charges have now been filed against Snowden by the Department of Justice, The New York Times reported Tuesday. The charges pave the way for his extradition, since foreign courts typically require criminal charges to be filed before they'll hear an extradition request.

Multiple investigations are also underway into the leaks. The FBI's Washington field office will lead one investigation. The NSA, meanwhile, launched its own investigation following revelations first published Wednesday by The Guardian, and is trying to ascertain the full extent of the information that was taken and released by Snowden.

7. Hong Kong Extraditions Subject To Delays.

Could Snowden successfully avoid being extradited from Hong Kong? Regina Ip, a former secretary of security who serves in the Hong Kong legislature, said that the territory has a history of working with U.S. law enforcement officials. "He won't find Hong Kong a safe harbor," Ip told the Times.

But Hong Kong university professor Simon Young told The Guardian that China would likely leave it to the Hong Kong courts to decide whether Snowden would be extradited.

In fact, according to GlobalPost, Snowden's choice of Hong Kong looks astute, because the high court of Hong Kong government has charged the government with putting a new extradition system in place, which could take some time. Until it does so, Hong Kong's extradition process is stuck in legal limbo, and no cases will likely be decided, according to Nicholas Bequelin, a senior researcher for Human Rights Watch.

8. U.S. Government Treatment Of Manning Might Safeguard Snowden.

In December, furthermore, a Hong Kong court ruled that no one can be extradited to a country where they might face cruel or unusual punishment, Patricia Ho, a lawyer at Daly & Associates, told GlobalPost. "The reason I think this is relevant," Ho said, "is because if you look at the case of Bradley Manning, during his detention period, he was found to have suffered cruel and degrading treatment. It was found by the UN special rapporteur on torture."

"I would imagine given the similarity in the cases that Snowden could easily say, 'Well, I fear that the same would happen to me,' and use that as a basis to claim protection in Hong Kong," she said. "If he does that I would say his chances of protection would be fair."

9. Snowden Missing As Of Monday.

As of Monday, however, Snowden reportedly checked out of the Hong Kong hotel where he was staying -- perhaps after being located by multiple news outlets -- and his whereabouts were unknown. It's not clear if he'd been interviewed by American officials, as they were seeking to do, or if he might have been detained by Hong Kong authorities.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.