Risk
6/24/2013
11:07 AM
50%
50%

NSA Leaker Snowden On The Run

U.S. files charges against former National Security Agency contractor Edward Snowden, who is seeking asylum in Ecuador. To date, Hong Kong and Moscow have declined to detain him.

Snowden's Sunday travel from Hong Kong to Moscow followed the State Department issuing a request to "Western Hemisphere" countries through which Snowden might travel, the BBC reported. "The U.S. is advising these governments that Snowden is wanted on felony charges, and as such should not be allowed to proceed in any further international travel, other than is necessary to return him to the United States," a U.S. state department official reportedly said.

Why wasn't Snowden detained in Hong Kong? Notably, the territory of China has a "surrender" agreement with the United States, which is different than extradition, which involves agreements between sovereign states. Furthermore, Hong Kong was informed that on June 15 the U.S issued a provisional arrest warrant for Snowden. On June 17, the government of Hong Kong acknowledged receipt of the U.S. government's request to detain Snowden, and two days later said the matter was under review.

Sunday, however, Hong Kong officials said Snowden departed "on his own accord for a third country through a lawful and normal channel." They declined to prevent him from traveling, saying that Washington's request to detain him was incomplete, and that there was no legal basis for doing so. According to the U.S. State Department, Snowden's U.S. passport was revoked Saturday, although authorities in Hong Kong may have been unaware of that revocation.

U.S. officials reacted with incredulity that Snowden hadn't been detained by Hong Kong authorities. "I had actually thought that China would see this as an opportunity to improve relations and extradite him to the United States," said Senate Intelligence committee chairwoman Dianne Feinstein on CBS television. "China clearly had a role in this, in my view. I don't think this was just Hong Kong without Chinese acquiescence."

Then again, China may have been making a political statement: Snowden Sunday revealed that the NSA had been hacking into Chinese telecommunications carriers to intercept millions of subscribers' text messages.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.