Back to Results

HOUSE_OVERSIGHT_020219.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
View Original Image

Extracted Text (OCR)

67 This 2012 theft was made even more serious by the interconnection of NSA computers with those of other intelligence agencies. It will be recalled that prior to the 9/11 attack in 2001, NSA data had been protected by “stove-piping” that separated NSA’ computers from networks used by other intelligence services. After the 9/11 Commission concluded that part of the reason why US intelligence agencies were unable to “connect the dots” in advance of the attack was because this “stove-piping, the NSA stripped away a large part of its “stove-piping.” One result was that the NSANet, which Snowden had access to at Dell in 2012, became a shared network. It had common access points. General Hayden described them to me as the equivalent of “reading rooms” in a library. They served as a means for NSA workers to exchange ideas about the problems they were encountering on various projects for the intelligence community. In maintaining them, system administrators, or “system admins,” like Snowden acted as the “librarians.” If a stem administrator copied data from this network, no one knew. For Snowden, the NSANet, which included CIA and Defense Department documents, provided a rich hunting ground for Snowden in the fall and winter of 2012. Many of the documents he took off the NSANet revealed not only operations of the NSA but also those of the CIA and Pentagon. By taking them he had come to a Rubicon from which there would be no return. He later explained in an email to Vanity Fair from Moscow, “I crossed that line.” As far as is known, he was not sharing them with any other party prior to May 2013. He was not even yet in contact with Poitras, Greenwald or any other journalists. Presumably, Snowden was collecting them drives, despite the risks that possessing such a collection of secrets might entail, for some future use. But why would Snowden jeopardize his career and, if caught, his freedom, by undertaking this illicit enterprise? He may have had by now strong ideological objections the NSA’s global surveillance. As he said later in Moscow, “we’re subverting our security standards for the sake of surveillance.” But ordinarily even ideologically-opposed employees don’t steal state secrets and risk imprisonment. If they are disgruntled, they seek employment elsewhere. Certainly, Snowden, with his three years experience working for Dell, would have little problem finding a job as an IT worker in the booming civilian sector of computer technology. Instead of resigning, he sought to widen his access to NSA documents. This behavior suggests to me that he had another agenda. One possible clue to it is the first document he took; the NSA exam. The secret in that document, the answers to the questions, were a form of power to him: power to burrow deeper into the executive structure of the NSA. It would unlock the door to door to even the more powerful documents containing the NSA’s sources stored in Level 3 compartments. His later actions demonstrated that he equated the possession of such secrets with personal power. For example, after he arrived in Moscow in 2013, he bragged to James Risen of the New York Times that he had access to secrets that gave him great leverage over the NSA. He told him specifically his access to “full lists” of NSA’s agents and operation in adversary countries could, if revealed, closed down the NSA’s capabilities to gather information in them. HOUSE_OVERSIGHT_020219

Document Preview

HOUSE_OVERSIGHT_020219.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_020219.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,444 characters
Indexed 2026-02-04T16:40:57.097834