Back to Results

HOUSE_OVERSIGHT_020273.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

(21 possible that Snowden smuggled in a key logger in his backpack, it could not be operated wirelessly inside the Center because, like all other NSA facilities, the computers had been insulated to lock-out wireless transmission. This precaution was taken to guard against an EMP, or Electro-Magnetic Pulse, attack by an enemy. If so, the only way Snowden could intercept key strokes was to attach a cable from his key logger to each of his fellow workers’ computers. In this scenario, he would have to surreptitiously build his own wired network connecting his hidden key logger to 24 separated computers. Moreover, he would have to do this wiring in an open-plan office where he could not count on these additional wires, even if rigged one by one, not being noticed by either other analysts on the room or the geek squad of system administrators who regularly checked connections. Making the task even more risky, according to my Booz Allen source, there were closed-circuit cameras. The only way he could mitigate the risk of detection was by having someone help him build this network. There was a further security barrier he had to get by. Even after he managed to obtain all the necessary passwords from colleagues, he had to transfer the files to an external storage device. This was not a matter of simply using a thumb drive because, unlike in caper movies such as Mission Impossible, the ports on the computers at the NSA were ordinarily sealed shut. This measure was done specifically to prevent any unauthorized downloading by NSA workers. The only people at the Center who had the authorization, and the means, to open these ports and transfer data were system administrators, according to the former Booz Allen executive. System administrators needed to have this privilege to deal with glitches in the computers. So they were allowed to open up the sealed ports. But Snowden was no longer a system administrator and did not have these privileges. So again, he needed some help. He either would need to borrow another system administrator’s credential or forge his own. The credential he would need is called a public key infrastructure card with its authentication code embedded in a magnetic stripe. When I asked the former Booz Allen executive if Snowden possessed the skill set to forge such a card, he said that he strongly doubted any NSA employee would be capable of such a forgery without special equipment. He could have, however, borrowed this credential from a system administrator who was willing to help him. But just asking such a favor could “set off alarms.” The unwitting accomplice scenario had another stumbling block: time. We know from Poitras that Snowden told her in early April 2013 that he planned to deliver documents to her in six to eight weeks (which he in fact did.) But he had not yet started working for Booz Allen at the Center until that same month. It does not seem plausible (to me) that in making such a commitment he was merely counting on the kindness of strangers to fulfill it The only way he could have known for certain that he would be able to borrow a public key infrastructure card and obtain the passwords, whether by trickery or by a key router, before he had begun working at the Center was that he already knew someone at the Center who would help him. But such a contact leads to a witting accomplice scenario. The Witting Accomplice Possibility HOUSE_OVERSIGHT_020273

Document Preview

HOUSE_OVERSIGHT_020273.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_020273.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,440 characters
Indexed 2026-02-04T16:41:10.480217

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files