{"id":32297,"date":"2017-06-25T02:44:30","date_gmt":"2017-06-25T06:44:30","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/prior-to-snowden-nsa-had-no-clue-how-many-were-approved-to-washington-free-beacon.php"},"modified":"2017-06-25T02:44:30","modified_gmt":"2017-06-25T06:44:30","slug":"prior-to-snowden-nsa-had-no-clue-how-many-were-approved-to-washington-free-beacon","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/prior-to-snowden-nsa-had-no-clue-how-many-were-approved-to-washington-free-beacon.php","title":{"rendered":"Prior to Snowden, NSA Had No Clue How Many Were Approved to &#8230; &#8211; Washington Free Beacon"},"content":{"rendered":"<p><p>        Edward Snowden \/ Getty Images      <\/p>\n<p>    BY: Natalie    Johnson    June 24, 2017 5:00 am  <\/p>\n<p>    The National Security Agency did not know how    manyofficials were authorized to download and transfer    top secret data from its servers prior tothe high-profile    leaks by former contractor Edward Snowden, according to a    recently declassified government    report.  <\/p>\n<p>    The NSA was also unsuccessful in attempts to meaningfully cut    the number of officials with \"privileged\" access to its most    sensitive databases, the Department of Defense's inspector    general determined in the 2016 investigation. The heavily    redacted report was obtained by the    New York Times through a Freedom of Information Act    lawsuit.  <\/p>\n<p>    The agency struggled to achieve the mandated reductions because    it had no idea how many employees or contractors were    designated data transfer agents or privileged access users    prior to the leaks.  <\/p>\n<p>    NSA officials told the inspector general they lost a \"manually    kept spreadsheet\" that tracked the number of privileged users    after receiving multiple requests from the inspector general to    provide documents identifying the initial number. The lapse    made it impossible for the agency to determine its baseline of    privileged users from which reductions would be made.  <\/p>\n<p>    The report said the NSA then \"arbitrarily removed\" privileged    access from users, who were told to reapply for the    authorization. While this enabled the agency to determine how    many personnel were granted special access, the NSA still had    no way of measuring how many privileged users had lost the    clearance.  <\/p>\n<p>    The inspector general said the NSA should have used this new    baseline as a \"starting point\" to reduce privileged users    instead of using the number to declare a reduction in those    personnel.  <\/p>\n<p>    In the case of data transfer agents, the NSA's \"manually kept    list\" tracking the number of officials authorized to use    removable devices, such as thumb drives, to transfer data to    and from the agency's servers was \"corrupted\" in the months    leading up to the Snowden leaks, the report said.  <\/p>\n<p>    Without a baseline to measure potential reductions, the NSA    then mandated data transfer agents to reapply for the    authorization. Again, though this allowed the agency to    determine how many personnel were given the authority, the NSA    still had no way of gauging how many reductions were made, if    any.  <\/p>\n<p>    The threat proved ongoing earlier this month when former    contractor Reality Winner was charged with    removing classified information from NSA facilities regarding    the Russian election hacks and leaking it to the press.  <\/p>\n<p>    The initiatives to cut the number of people with access to    classified data were part of a broader post-Snowden measure,    called \"Secure the Net,\" to strengthen protections of its    sensitive surveillance and hacking methods.  <\/p>\n<p>    The report determined that while the NSA made some progress in    achieving reform, the agency \"did not fully meet the intent of    decreasing the risk of insider threats to its operations and    the ability of insiders to exfiltrate data.\"  <\/p>\n<p>    NSA spokeswoman Vanee Vines acknowledged the report's    conclusions in a statement issued to the New York    Times last week.  <\/p>\n<p>    \"We welcome the observations and opportunities for improvement    offered by the U.S. Defense Department's Inspector General,\"    she said. \"NSA has never stopped seeking and implementing ways    to strengthen both security policies and internal controls.\"  <\/p>\n<p>    It is unclear what steps the NSA has taken since the report was    finalized in August 2016 to reduce the number of employees and    contractors with access to its top-secret databases.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/freebeacon.com\/national-security\/prior-snowden-nsa-no-clue-many-approved-download-top-secret-info\/\" title=\"Prior to Snowden, NSA Had No Clue How Many Were Approved to ... - Washington Free Beacon\">Prior to Snowden, NSA Had No Clue How Many Were Approved to ... - Washington Free Beacon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Edward Snowden \/ Getty Images BY: Natalie Johnson June 24, 2017 5:00 am The National Security Agency did not know how manyofficials were authorized to download and transfer top secret data from its servers prior tothe high-profile leaks by former contractor Edward Snowden, according to a recently declassified government report. The NSA was also unsuccessful in attempts to meaningfully cut the number of officials with \"privileged\" access to its most sensitive databases, the Department of Defense's inspector general determined in the 2016 investigation. The heavily redacted report was obtained by the New York Times through a Freedom of Information Act lawsuit<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-32297","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32297"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32297"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32297\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}