Back to Results

HOUSE_OVERSIGHT_019533.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
View Original Image

Extracted Text (OCR)

Crossing the Rubicon | 45 which was done at NSA headquarters in Fort Meade and most of the NSA’s regional facilities, had not yet been installed at the Hawaii base, because a lack of bandwidth prevented the safe upgrading of the software. This auditing software was scheduled to be installed after the backup system was completed in 2013. The Kunia base was one of the last NSA bases that did not monitor suspicious transfers of files on a real-time basis. Snowden was aware of this deficiency; he later pointed out in his interview in Wired that the NSA base where he worked did not have an “audit” mechanism. This security gap allowed Snowden, using his system administrator’s credentials, to copy classified data to a thumb drive without anyone's being able to trace the copied data back to him. According to the NSA’s subse- quent damage assessment, he stole many thousands of pages while working for Dell in 2012 before he contacted journalists. Ledgett subsequently reported that the NSA analysis of the fifty-eight thou- sand documents that were given by Snowden to journalists in June 2013 showed that most of them were taken while he was still work- ing at Dell. ) This theft was made even more serious by the interconnection © of NSA computers with those of other intelligence agencies. Prior to the 9/11 attacks in 2001, “stovepiping” had protected NSA data on its computers from networks used by other intelligence services. After the 9/11 Commission concluded that part of the reason U.S. intelligence agencies were unable to “connect the dots” in advance of the attack was related to this practice, the NSA stripped away a large part of its stovepiping. As a result, the NSANet, which Snowden had access to at Dell in 2012, became a shared network with “com- mon access points,” as the former NSA director Michael Hayden described them to me, which made them the equivalent of “reading rooms” in a library. They served as a means for NSA workers to exchange ideas about the problems they were encountering on vari- ous projects for the intelligence community. In maintaining them, system administrators, or “system admins,” like Snowden, acted as the “librarians.” If a system administrator copied data from this net- work, no one knew. For Snowden, the NSANet, which included CIA and Defense Department documents, provided a rich hunting ground in the fall | | Epst_9780451494566_2p_all_r1.z.indd 45 ® 9/29/16 5:51 Pa | | HOUSE_OVERSIGHT_019533

Document Preview

HOUSE_OVERSIGHT_019533.jpg

Click to view full size

Extracted Information

Dates

Document Details

Filename HOUSE_OVERSIGHT_019533.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 2,465 characters
Indexed 2026-02-04T16:38:34.456037