{"id":6113,"date":"2014-02-22T16:44:57","date_gmt":"2014-02-22T21:44:57","guid":{"rendered":"http:\/\/www.opensource.im\/?p=6113"},"modified":"2014-02-22T16:44:57","modified_gmt":"2014-02-22T21:44:57","slug":"nsa-official-warned-about-threat-17-years-before-snowden","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/nsa-official-warned-about-threat-17-years-before-snowden.php","title":{"rendered":"NSA Official Warned About Threat 17 Years Before Snowden"},"content":{"rendered":"<p><p>    Seventeen years before Edward Snowden began releasing secret    documents on U.S. electronic spying, an analyst with the    National Security Agency foresaw just such a threat.  <\/p>\n<p>    In their quest to benefit from the great advantages of    networked computer systems, the U.S. military and intelligence    communities have put almost all of their classified information    eggs into one very precarious basket: computer system    administrators, the unidentified analyst wrote in a 1996    special edition of Cryptologic    Quarterly, an NSA magazine.  <\/p>\n<p>    Despite the warning, the NSA remained vulnerable. When    Snowdens first disclosures became public last year, some of    the agencies computers were still equipped with USB ports    where thumb drives could be used to copy files, according to a    National Public Radio report    in September.  <\/p>\n<p>    Snowden was a systems analyst working as a contractor with    Booz Allen    Hamilton Holding Corp. (BAH) at an NSA regional signals    intelligence facility in Hawaii    when he exploited his administrative access to copy thousands    of top-secret documents before fleeing to Hong    Kong and then Moscow.  <\/p>\n<p>    A relatively small number of system administrators are able to    read, copy, move, alter, and destroy almost every piece of    classified information handled by a given agency or    organization, the analyst wrote in the 1996 article. An    insider-gone-bad with enough hacking skills to gain root    privileges might acquire similar capabilities. It seems amazing    that so few are allowed to control so much -- apparently with    little or no supervision or security audits.  <\/p>\n<p>    The authors name remains classified. It was redacted in a    declassified version of the article that was released in 2012.  <\/p>\n<p>    One thing we have done post-media leaks is lock those down    hard, so those are all in two-person control areas, Lonny    Anderson, the head of the NSAs Technology Directorate, told    NPR.  <\/p>\n<p>    In a speech at Fordham University in New    York last year, General Keith Alexander, the NSAs    director, said the agency also has taken steps to reduce the    number of systems administrators and those with privileged    access.  <\/p>\n<p>    Snowdens security breach wasnt unprecedented, according to    the 1996 article, titled Out of Control.  <\/p>\n<p>    In 1994, for example, a contractor employed at a Regional    SIGINT Operations Center (RSOC) was caught accessing restricted    files on a classified system, according to the article. It    also cited another incident at the same RSOC, the details of    which were redacted when the article was declassified.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.bloomberg.com\/news\/2014-02-21\/nsa-official-warned-about-threat-17-years-before-snowden.html\" title=\"NSA Official Warned About Threat 17 Years Before Snowden\">NSA Official Warned About Threat 17 Years Before Snowden<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Seventeen years before Edward Snowden began releasing secret documents on U.S. electronic spying, an analyst with the National Security Agency foresaw just such a threat<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-6113","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6113"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=6113"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6113\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=6113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=6113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=6113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}