- Beretta leaves Maryland over gun laws, heads for Tennessee
- Neal Boortz defends Hillary Clinton for representing child rapist
- House task force to recommend National Guard on border, faster deportations
- Top federal judge uses pizza to explain complex Obamacare situation
- Obama, Biden overhaul job training programs
- Drought-plagued Californians turn to paint to keep lawns green
- ISIL now forcing Iraqi shopkeepers to veil mannequins in Mosul
- 11 parents of Nigeria’s abducted girls die
- Genetic mapping triggers new hope on schizophrenia
- Turkish P.M. Erdogan won’t speak to Obama, but he’ll take calls from Biden
NSA leaker Ed Snowden used banned thumb-drive, exceeded access
Question of the Day
Questions were raised Friday about security procedures at the ultra-secret National Security Agency, after it emerged that Edward Snowden, the contract employee who leaked details of the agency’s broad-scale data gathering on Americans, exceeded his authorized access to computer systems and smuggled out Top Secret documents on a USB drive — a thumb-sized data storage device banned from use on secret military networks.
“He should not have been able to do either of those things” without setting off alarm bells, said one private sector IT security specialist who has worked on U.S. government classified networks. He spoke on condition of anonymity because of the sensitivities of his current employer.
The NSA, which is still trying to ascertain the full extent of the breach, did not respond to a request for comment.
The Los Angeles Times first reported that Mr. Snowden used a USB thumb drive to smuggle electronic copies of an unknown number of classified documents out of the NSA facility in Hawaii where he worked. A U.S. official confirmed to The Washington Times “that’s one avenue” investigators are following.
The use of thumb drives on classified military systems — including those at NSA — has been effectively banned since malicious software, thought to be of Russian origin, infected the secret computer networks of U.S. Central Command five years ago.
A number of commercially available programs can switch off the USB port of every computer on the network.
“There is easily available software to do that,” said the security specialist, noting that there were also low-tech, more permanent means available.
“I have seen places where they used a hot glue gun to block it,” he said of the USB port.
Lawmakers briefed by NSA Director Gen. Keith Alexander have not commented on the thumb-drive, but have said that Snowden was able to do something else he should not have been able to — exceed his authorized access to the NSA’s computer systems.
“It’s clear that he attempted to go places that he was not authorized to go, which should raise questions for everyone,” said House Permanent Select Committee on Intelligence Chairman Michael Rogers, Michigan Republican, on Thursday.
He said investigators were trying to “determine exactly what information [Mr. Snowden] may have gotten” from the NSA, following claims by Glen Greenwald, the Guardian journalist who first broke the story, that he had “dozens” more documents from the self-proclaimed whistleblower.
“Candidly, nobody really knows” how much he might have gotten away with, added Mr. Rogers. “I think we will know the answer to that shortly.”
The specialist said Mr. Snowden’s ability to access highly classified documents he should not have been able to was unsurprising, depending on his clearance level.
He noted that admitted Wikileaks leaker Pfc. Bradley Manning, even though a low level intelligence analyst had “very broad access,” to the Secret-level classified US network called SIPRNet.
Historically, the U.S. intelligence community operated on a “need to know” basis — even personnel with a security clearance were only allowed to see intelligence they had a need to know.
After U.S. agencies failed to share intelligence about some of the Sept. 11 suicide hijackers; and with the huge leaps in computer network technologies and the growth of the World Wide Web as an indispensable communications tool, need to know is being edged out by “need to share.”
“SIPRNet is basically a parallel Internet at the Secret level,” said the specialist. “The different agencies have Web sites, FBI, DEA … Even at the Top Secret level [it’s] the same …You can surf around … there are lots of Top Secret documents routinely posted there without any additional access controls” beyond the fact that are on a highly classified network to which only cleared personnel have access.
“Its beginning to look like the NSA may have had the same kind of issues,” he concluded.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- NSA monitored 'World of Warcraft' players
Latest Blog Entries
TWT Video Picks
The president could pay the full price for ignoring Congress
- David Perdue defeats Jack Kingston in Georgia Republican Senate primary runoff
- IRS seeks help destroying another 3,200 computer hard drives
- D.C. appeals panel deals big blow to Obamacare subsidies
- 'Straight White Guy Festival' supposedly set for Ohio park
- Beretta moving to Tennessee over Maryland gun laws
- Gen. James Amos, Marine Corps commandant, slams Obama's handling of Iraq
- Pentagon team dispatched to Ukraine amid crisis with Russia
- BERMAN & MADYOON: An Iranian-Turkish reset
- MAY: Barbarians at Jordan's gate
- CARSON: Costco and the perils of mixing politics and business
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq