Back to Results

HOUSE_OVERSIGHT_019695.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

The Rise of the NSA | 207 to know about the data they contained. These compartments were the final line of defense against an inside intruder. In 2009, Snowden, as we know, found his way into the NSA through a temporary job with an outside contractor that was work- ing for the NSA’s Technology Directorate to repair and update its backup system. Four years later, by maneuvering to get hired by another outside contractor with access to the NSA’s sources and methods, he was able to steal secrets stored in isolated computers bearing directly on the ongoing intelligence war. Snowden also copied from these compartments in a matter of weeks, as has been previously mentioned, the NSA’s Level 3 sources and methods used against Russia, Iran, and China. The Snowden breach demonstrated that the NSA’s envelope of secrecy was at best illusory. After this immense loss, the NSA’s sources inside these adversary countries were largely compromised, even if they were not closed down. Once these adversaries were in a position to know what chan- nels the NSA was intercepting, they could use these same channels to mislead U.S. intelligence. A former top intelligence official told ) me, “The queen on our chessboard had been taken.” © The NSA moved to mitigate the damage and find new ways of obtaining unexpected intelligence. In June 2014, the new NSA direc- tor, Rogers, had to confront flagging morale that, according to Gen- eral Hayden, was near paralyzing the intelligence service. Rogers recognized that as a direct result of the Snowden breach, “the nation has lost capabilities against adversaries right now who are attempt- ing to actively undermine us.” But even with that loss, he observed, “the sky has not fallen.” As in the Chicken Little fable he cited, the world had not ended for the NSA. Nor had it ended for the multibillion-dollar outsoure- ing enterprise it superintended. The NSA might have lost many of its sources, or “capabilities,” but Rogers held out hope that new sources could eventually be found to replace them. Compromised codes, after all, could be changed. New technological methods could be devised. New vulnerabilities could also be targeted in enemy ter- ritories. Although repairing the damage might take many “decades,” according to Michael McConnell, the vice-chairman of Booz Allen, the new director had to get on with that task. McConnell, a for- | | Epst_9780451494566_2p_all_r1.indd 207 ® 9/3016 8:13AM | | HOUSE_OVERSIGHT_019695

Document Preview

HOUSE_OVERSIGHT_019695.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_019695.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 2,479 characters
Indexed 2026-02-04T16:39:06.114011

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files