HOUSE_OVERSIGHT_019533.jpg
Extracted Text (OCR)
Crossing the Rubicon | 45
which was done at NSA headquarters in Fort Meade and most of the
NSA’s regional facilities, had not yet been installed at the Hawaii
base, because a lack of bandwidth prevented the safe upgrading of
the software. This auditing software was scheduled to be installed
after the backup system was completed in 2013. The Kunia base was
one of the last NSA bases that did not monitor suspicious transfers
of files on a real-time basis. Snowden was aware of this deficiency;
he later pointed out in his interview in Wired that the NSA base
where he worked did not have an “audit” mechanism. This security
gap allowed Snowden, using his system administrator’s credentials,
to copy classified data to a thumb drive without anyone's being able
to trace the copied data back to him. According to the NSA’s subse-
quent damage assessment, he stole many thousands of pages while
working for Dell in 2012 before he contacted journalists. Ledgett
subsequently reported that the NSA analysis of the fifty-eight thou-
sand documents that were given by Snowden to journalists in June
2013 showed that most of them were taken while he was still work-
ing at Dell.
) This theft was made even more serious by the interconnection ©
of NSA computers with those of other intelligence agencies. Prior
to the 9/11 attacks in 2001, “stovepiping” had protected NSA data
on its computers from networks used by other intelligence services.
After the 9/11 Commission concluded that part of the reason U.S.
intelligence agencies were unable to “connect the dots” in advance of
the attack was related to this practice, the NSA stripped away a large
part of its stovepiping. As a result, the NSANet, which Snowden
had access to at Dell in 2012, became a shared network with “com-
mon access points,” as the former NSA director Michael Hayden
described them to me, which made them the equivalent of “reading
rooms” in a library. They served as a means for NSA workers to
exchange ideas about the problems they were encountering on vari-
ous projects for the intelligence community. In maintaining them,
system administrators, or “system admins,” like Snowden, acted as
the “librarians.” If a system administrator copied data from this net-
work, no one knew.
For Snowden, the NSANet, which included CIA and Defense
Department documents, provided a rich hunting ground in the fall
| | Epst_9780451494566_2p_all_r1.z.indd 45 ® 9/29/16 5:51 Pa | |
HOUSE_OVERSIGHT_019533
Extracted Information
Dates
Document Details
| Filename | HOUSE_OVERSIGHT_019533.jpg |
| File Size | 0.0 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 2,465 characters |
| Indexed | 2026-02-04T16:38:34.456037 |