Risk
6/24/2013
11:07 AM
50%
50%

NSA Leaker Snowden On The Run

U.S. files charges against former National Security Agency contractor Edward Snowden, who is seeking asylum in Ecuador. To date, Hong Kong and Moscow have declined to detain him.

Snowden's Sunday travel from Hong Kong to Moscow followed the State Department issuing a request to "Western Hemisphere" countries through which Snowden might travel, the BBC reported. "The U.S. is advising these governments that Snowden is wanted on felony charges, and as such should not be allowed to proceed in any further international travel, other than is necessary to return him to the United States," a U.S. state department official reportedly said.

Why wasn't Snowden detained in Hong Kong? Notably, the territory of China has a "surrender" agreement with the United States, which is different than extradition, which involves agreements between sovereign states. Furthermore, Hong Kong was informed that on June 15 the U.S issued a provisional arrest warrant for Snowden. On June 17, the government of Hong Kong acknowledged receipt of the U.S. government's request to detain Snowden, and two days later said the matter was under review.

Sunday, however, Hong Kong officials said Snowden departed "on his own accord for a third country through a lawful and normal channel." They declined to prevent him from traveling, saying that Washington's request to detain him was incomplete, and that there was no legal basis for doing so. According to the U.S. State Department, Snowden's U.S. passport was revoked Saturday, although authorities in Hong Kong may have been unaware of that revocation.

U.S. officials reacted with incredulity that Snowden hadn't been detained by Hong Kong authorities. "I had actually thought that China would see this as an opportunity to improve relations and extradite him to the United States," said Senate Intelligence committee chairwoman Dianne Feinstein on CBS television. "China clearly had a role in this, in my view. I don't think this was just Hong Kong without Chinese acquiescence."

Then again, China may have been making a political statement: Snowden Sunday revealed that the NSA had been hacking into Chinese telecommunications carriers to intercept millions of subscribers' text messages.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.