Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
Snowden has details of China, Hong Kong hacking targets
by Staff Writers
Hong Kong, Hong Kong (AFP) June 14, 2013


Former spy Edward Snowden has classified US documents which show the specific machines targeted by the National Security Agency in China and Hong Kong, according to a report Friday.

The South China Morning Post said a small sample of records had been shown to the newspaper during an interview with Snowden which detailed the Internet Protocol (IP) addresses of targets and dates of cyber attacks.

IP addresses are unique numbers assigned to individual computers and other devices attached to the Internet. The SCMP did not publish the addresses themselves or identify individuals who might have been targeted.

The latest report came after the FBI said Thursday that the United States had launched a criminal investigation and is taking "all necessary steps" to prosecute Snowden for exposing state secrets.

The documents seen by the SCMP, but which could not be verified, also showed details of whether a cyber attack was ongoing, the paper said, and appeared to suggest a hacking success rate of 75 percent.

"I don't know what specific information they were looking for on these machines, only that using technical exploits to gain unauthorised access to civilian machines is a violation of law. It's ethically dubious," 29-year-old Snowden told the newspaper.

The revelation that Snowden possesses specific details of individuals targeted will pile extra pressure on the US to stem the leaks.

Snowden, who worked as a subcontractor handling computer networks, is in hiding in Hong Kong after arriving in the city on May 20 and leaking details of a global eavesdropping operation by the NSA.

On Wednesday he vowed to remain in the city and fight in court any efforts by the US to extradite him.

FBI chief Robert Mueller has defended the Internet and phone sweeps as a vital tool in the US fight against terror and said they were implemented legally in accordance with the Constitution.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Surveillance program thwarted attacks, US spy chief says
Washington (AFP) June 13, 2013
"Dozens" of terror attacks had been thwarted by a program to gather and analyze massive amounts of Internet and phone data, the National Security Agency chief told US lawmakers Wednesday. Facing skeptical questions from lawmakers after a rogue technician leaked the secret operation, NSA chief General Keith Alexander, who also heads the US Cyber Command, insisted that the program is legal and ... read more


CYBER WARS
Chilean, U.S. firms join effort to expand e-waste recycling

Space Debris - One Solution

Moon Radiation Findings May Reduce Health Risks to Astronauts

Sony eyes long game despite console launch triumph

CYBER WARS
Northrop Grumman Delivers Second Hosted Payload for Enhanced Polar System

Lockheed Martin Supports Realtime Battlespace View For USAF Aerial War Games

Mutualink Platform to be Deployed by US DoD during JUICE 2013

General Dynamics to Deliver U.S. Army's Newest Tactical Ground Station Intelligence System

CYBER WARS
Mitsubishi Heavy and Arianespace conclude MOU on commercial launches

Sea Launch IS-27 FROB Report Complete

Europe launches record cargo for space station

New chief urges Ariane 5 modification for big satellites

CYBER WARS
Carnegie Mellon Method Uses Network of Cameras to Track People in Complex Indoor Settings

Orbcomm Offers Dual-Mode Telematics Solution For Heavy Equipment Industry

Lockheed Martin Completes Functional Testing of First GPS III Satellite Bus Electronic Systems

Google to buy Israeli GPS app Waze for $1 bln: reports

CYBER WARS
Boeing aviation forecast sets scene for crowded skies

Lockheed Martin Receives JASSM Contract for Additional Integration onto Finish Air Force F-18

F-35 Supplier in Israel Delivers First Advanced Composite Component

China's MA60 planes in spotlight after safety incidents

CYBER WARS
First large-scale production of III-V semiconductor nanowire

2-D electronics take a step forward

Study suggests second life for possible spintronic materials

Spintronics approach enables new quantum technologies

CYBER WARS
NASA Builds Sophisticated Earth-Observing Microwave Radiometer

Big data from space: Imagery of Rome delivered in near real time

New maps show how shipping noise spans the globe

Magnetospheric Multiscale Mission Team Assemble Flight Observatory

CYBER WARS
Potentially 'catastrophic' changes underway in Canada's northern Mackenzie River Basin

China's heartland delivers pollution punch: study

MBARI research shows where trash accumulates in the deep sea

Urban Indians grow concerned about pollution: survey




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement