{"id":3841,"date":"2014-02-09T21:44:46","date_gmt":"2014-02-10T02:44:46","guid":{"rendered":"http:\/\/www.opensource.im\/?p=3841"},"modified":"2014-02-09T21:44:46","modified_gmt":"2014-02-10T02:44:46","slug":"snowden-used-simple-technology-to-mine-nsa-computer-networks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/snowden-used-simple-technology-to-mine-nsa-computer-networks.php","title":{"rendered":"Snowden used simple technology to mine NSA computer networks"},"content":{"rendered":"<p><p>      Former National Security Agency systems analyst Edward      Snowden speaks during a presentation . (AP)    <\/p>\n<p>    The National Security Agency whistleblower Edward Snowden used    inexpensive and widely available software to plunder the    agency's networks, it has been reported, raising further    questions about why he was not detected.  <\/p>\n<p>    Intelligence officials investigating the former contractor, who    leaked thousands of documents to media outlets including the    Guardian last year, determined that he used web crawler    software designed to search, index and back up websites to    scrape highly classified files,     the New York Times reported on Sunday.  <\/p>\n<p>    The unusual activity triggered a brief challenge from agency    officials but Snowden persuaded them it was legitimate and    continued mining data.  <\/p>\n<p>    We do not believe this was an individual sitting at a machine    and downloading this much material in sequence, an unnamed    official told the Times. The process, the official said, was    quite automated.  <\/p>\n<p>    Web crawlers, also known as spiders, move from website to    website, following links embedded in each document, and can    copy everything they encounter. Snowden is believed to have    accessed about 1.7 million documents.  <\/p>\n<p>    The NSA has a mandate to deter and rebuff cyber attacks against    US computer systems but Snowden's insider attack was    relatively unsophisticated and should have been detected,    investigators said, especially since it came three years after    Chelsea    Manning used a similar technique to access State Department and    military data which was then passed to Wikileaks.  <\/p>\n<p>    Snowden was a technology contractor working at an agency    outpost in Hawaii that had yet to be equipped with modern    monitors which might have sounded the alarm. The NSA's    headquarters in Ford Meade, Maryland, had such monitors,    raising the question whether Snowden was either very lucky or    very strategic, said one intelligence official.  <\/p>\n<p>    According to     The Snowden Files, a new book by Guardian journalist Luke    Harding, Snowden moved to a job in Honolulu with security    company Booz Allen Hamilton because it afforded even greater    privileges.  <\/p>\n<p>    Some members of Congress     have accused Snowden of being a spy for Russia, where he    has been granted asylum.     He has denied the allegation.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.denverpost.com\/nationworld\/ci_25099617\/snowden-used-simple-technology-mine-nsa-computer-networks?source=rss\" title=\"Snowden used simple technology to mine NSA computer networks\">Snowden used simple technology to mine NSA computer networks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Former National Security Agency systems analyst Edward Snowden speaks during a presentation . (AP) The National Security Agency whistleblower Edward Snowden used inexpensive and widely available software to plunder the agency's networks, it has been reported, raising further questions about why he was not detected. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-3841","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3841"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=3841"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3841\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=3841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=3841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=3841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}