HOUSE_OVERSIGHT_020273.jpg
Extracted Text (OCR)
(21
possible that Snowden smuggled in a key logger in his backpack, it could not be operated
wirelessly inside the Center because, like all other NSA facilities, the computers had been
insulated to lock-out wireless transmission. This precaution was taken to guard against an EMP,
or Electro-Magnetic Pulse, attack by an enemy. If so, the only way Snowden could intercept key
strokes was to attach a cable from his key logger to each of his fellow workers’ computers. In
this scenario, he would have to surreptitiously build his own wired network connecting his hidden
key logger to 24 separated computers. Moreover, he would have to do this wiring in an open-plan
office where he could not count on these additional wires, even if rigged one by one, not being
noticed by either other analysts on the room or the geek squad of system administrators who
regularly checked connections. Making the task even more risky, according to my Booz Allen
source, there were closed-circuit cameras. The only way he could mitigate the risk of detection
was by having someone help him build this network.
There was a further security barrier he had to get by. Even after he managed to obtain all the
necessary passwords from colleagues, he had to transfer the files to an external storage device.
This was not a matter of simply using a thumb drive because, unlike in caper movies such as
Mission Impossible, the ports on the computers at the NSA were ordinarily sealed shut. This
measure was done specifically to prevent any unauthorized downloading by NSA workers. The
only people at the Center who had the authorization, and the means, to open these ports and
transfer data were system administrators, according to the former Booz Allen executive. System
administrators needed to have this privilege to deal with glitches in the computers. So they were
allowed to open up the sealed ports. But Snowden was no longer a system administrator and did
not have these privileges. So again, he needed some help. He either would need to borrow
another system administrator’s credential or forge his own. The credential he would need is
called a public key infrastructure card with its authentication code embedded in a magnetic stripe.
When I asked the former Booz Allen executive if Snowden possessed the skill set to forge such a
card, he said that he strongly doubted any NSA employee would be capable of such a forgery
without special equipment. He could have, however, borrowed this credential from a system
administrator who was willing to help him. But just asking such a favor could “set off alarms.”
The unwitting accomplice scenario had another stumbling block: time. We know from Poitras
that Snowden told her in early April 2013 that he planned to deliver documents to her in six to
eight weeks (which he in fact did.) But he had not yet started working for Booz Allen at the
Center until that same month. It does not seem plausible (to me) that in making such a
commitment he was merely counting on the kindness of strangers to fulfill it The only way he
could have known for certain that he would be able to borrow a public key infrastructure card and
obtain the passwords, whether by trickery or by a key router, before he had begun working at the
Center was that he already knew someone at the Center who would help him. But such a contact
leads to a witting accomplice scenario.
The Witting Accomplice Possibility
HOUSE_OVERSIGHT_020273
Related Documents
Documents connected by shared names, same document type, or nearby in the archive.