Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Snowden has details of China, Hong Kong hacking targets
by Staff Writers
Hong Kong, Hong Kong (AFP) June 14, 2013


Former spy Edward Snowden has classified US documents which show the specific machines targeted by the National Security Agency in China and Hong Kong, according to a report Friday.

The South China Morning Post said a small sample of records had been shown to the newspaper during an interview with Snowden which detailed the Internet Protocol (IP) addresses of targets and dates of cyber attacks.

IP addresses are unique numbers assigned to individual computers and other devices attached to the Internet. The SCMP did not publish the addresses themselves or identify individuals who might have been targeted.

The latest report came after the FBI said Thursday that the United States had launched a criminal investigation and is taking "all necessary steps" to prosecute Snowden for exposing state secrets.

The documents seen by the SCMP, but which could not be verified, also showed details of whether a cyber attack was ongoing, the paper said, and appeared to suggest a hacking success rate of 75 percent.

"I don't know what specific information they were looking for on these machines, only that using technical exploits to gain unauthorised access to civilian machines is a violation of law. It's ethically dubious," 29-year-old Snowden told the newspaper.

The revelation that Snowden possesses specific details of individuals targeted will pile extra pressure on the US to stem the leaks.

Snowden, who worked as a subcontractor handling computer networks, is in hiding in Hong Kong after arriving in the city on May 20 and leaking details of a global eavesdropping operation by the NSA.

On Wednesday he vowed to remain in the city and fight in court any efforts by the US to extradite him.

FBI chief Robert Mueller has defended the Internet and phone sweeps as a vital tool in the US fight against terror and said they were implemented legally in accordance with the Constitution.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Surveillance program thwarted attacks, US spy chief says
Washington (AFP) June 13, 2013
"Dozens" of terror attacks had been thwarted by a program to gather and analyze massive amounts of Internet and phone data, the National Security Agency chief told US lawmakers Wednesday. Facing skeptical questions from lawmakers after a rogue technician leaked the secret operation, NSA chief General Keith Alexander, who also heads the US Cyber Command, insisted that the program is legal and ... read more


CYBER WARS
Israel fast-tracks Arrow 3 over Iran nuclear fears

US Missile Shield Threatens Balance in Asia-Pacific Region

US to send Patriot missiles, F-16s to Jordan for drill

Russia developing counter-measures for European anti-missile shield

CYBER WARS
PAC-3 MSE Missile Flight Tested At White Sands

Putin holds back on Syria missile delivery

Taiwan deploys new powerful rocket system: report

Lockheed Martin Completes Anti Ship Missile Tests

CYBER WARS
US drone kills 7, first since Pakistan PM Sharif sworn in

Pakistan families of victims demand halt to US drone strikes

End drone strikes, new Pakistan PM tells US

Incoming Pakistan PM Sharif condemns drone attack

CYBER WARS
Northrop Grumman Delivers Second Hosted Payload for Enhanced Polar System

Lockheed Martin Supports Realtime Battlespace View For USAF Aerial War Games

Mutualink Platform to be Deployed by US DoD during JUICE 2013

General Dynamics to Deliver U.S. Army's Newest Tactical Ground Station Intelligence System

CYBER WARS
Cyprus assesses security, safety threats of submerged ammo dumps

Northrop Grumman Begins Sampling New Gallium Nitride Packaged Power Amplifier

Lockheed Martin Delivers Modernized Laser Range Finder For Apache Helicopter

Chile to buy surplus U.S. armored amphibious vehicles

CYBER WARS
Merkel ally resists fresh pressure to resign

Pressures grow on global defense spending: report

India promises to clean up military corruption

Thales delivers final Hawkei test vehicles

CYBER WARS
Outside View: The third Russian Revolution

Japan, US stage joint island retaking drill

Obama, Xi forge rapport in debut summit

Outside View: Trapped in the cul de sac of no good choices

CYBER WARS
Carbon nanotubes for molecular magnetic resonances

New microfluidic method expands toolbox for nanoparticle manipulation

Stretchable, transparent graphene-metal nanowire electrode

Shape-shifting nanoparticles flip from sphere to net in response to tumor signal




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement