Even in the U.S. intelligence agencies and their partners worldwide monitoring program to assess the potential harm from disclosure Edward Snowden, militants have begun to change the way of communication, changes may make it harder to thwart attacks, U.S. officials said in response.
Intelligence testing, targeted armed groups, including Sunni and Shiite Islamist groups, members have begun to change the communication mode, is considered to be undertaken by former U.S. spy agencies, two U.S. eavesdropping leaked details of the direct response to the National security sources said.
The official said it was too early to whether recent changes in communication methods has resulted in the loss of critical intelligence, if there is now a greater risk of missing warning signs of future attacks. "" You do not know what you are missing until you've lost it one of the sources said.
Leak causing enormous damage to U.S. national security interests of a dire warning has proved exaggerated. In 2010, hundreds of thousands of leaked U.S. diplomatic cables WikiLeaks, Washington seems to have been far below than the initial impact of a warning.
Militants to change their way of communication, may actually hinder the plot, because they take a different approach, in order to avoid detection.
Snowdon charge leakage caused by damage from unnamed official said the Obama administration mounted a campaign to force Russia to extradite him. Russian President Vladimir Putin in Moscow on Tuesday confirmed Snowdon transit area of ??an airport, but ruled out and handed him to Washington.
The official declined to specify what was found between militant groups kind of change, fear that providing more details about their behavior more likely, this will be their adaptation.
A U.S. telecommunications experts said privately that militants latest adjustment may include reducing electronic transmission and switching phones more frequently, and they seek new encryption method.
Flashpoint global partners, monitor Islamic militant Web site, has noticed an increase in NSA leak discussion.
"The simple rule is' Do not be a fool, do not give you real information on the Internet through e-mail u use jihad activities just using false names and TOR browser must be" one person posted, referring to the Internet browser can help users to remain anonymous, escaped monitoring.
How serious damage may be difficult to measure intelligence agencies do not know how much more sensitive material Snowden has yet to be announced.
Militants trying to cover their electronic tracks has a long history.
The main use of written messages and trust the messenger, "base" organization leader Osama bin Laden hid for years, until he was killed by U.S. forces in 2011. He reminded the militants in the electronic communications exercise caution. Information used for thumb drives and SIM card use, should be destroyed, he told them.
Damage assessment
Intelligence analysts worldwide exposure Snowdon use by the U.S. National Security Agency and the British Government Communications Headquarters institutions to enter the telephone and Internet traffic method to determine the operational impact.
Potential damage which Western intelligence, Russia and China and other foreign governments may have found the technical details of how to intercept communications and Western institutions to monitor specific areas or march.
U.S. officials fear that if Snowdon and anti-secrecy organization WikiLeaks, join now, release more classified information that he believes has a large cache, there may be further limited by Western counter-terrorism operations.
Some informed sources said that the U.S. government agency has been running in the "worst case" assumption that all classified material Snowden has somehow made its way to one or more of the rival intelligence services.
Snowden's actions have long-term effects in the home How likely largely depend on whether the final rally at the U.S. National Security Agency limits how you can use its tools.
Western former intelligence official said: "The problem is a public trust, and now the product in a very short supply."
U.S. and British officials insist that a large number of telephone and Internet surveillance N SA and GCHQ, including the United States and GCHQ eavesdrop on telephone fiber optic trunk cables carrying Internet traffic has stopped attacking the raw data collection and public safety is essential.
National Counterintelligence Executive's office, Snowdon is still in the early stages of spill damage assessment, it is not known when it will issue its findings, U.S. intelligence officials said.
Disclosure of Snowdon U.S. electronic surveillance points target China, Washington could face charges of double standards, it has a network security talks with Beijing next month.
"How can you continue to stand in the United States after the moral high ground, demonize China, and accused us of hacking?" An informed source told Reuters reporters to the Chinese leaders in Beijing.
This position is considered by some American experts also Snowdon legend as a logical result.
Who is now a Washington Center for Strategic and International Studies senior fellow, former State Department official James Lewis said: "This will allow us to be more difficult than you appear holy."
Other News:
The 'Snowden Effect': U.S. spies say militants change tactics
Japan business mood seen turning positive: BOJ tankan
Kodak restructuring framework OK'd by court, will go to creditors
Portuguese trade unions strike over austerity
Oil pipe defect caused 2010 Qantas engine blowout
House Republican says IRS awarded 'inappropriate' contracts
Hospitals seek high-tech help for hand hygiene
SKorea raises growth forecast after stimulus