A still frame grab recorded on June 6 and released to AFP on June 10 shows Edward Snowden speaking during an interview with The Guardian newspaper at an undisclosed location in Hong Kong. The Guardian via AFP-Getty Images file
How Snowden Did It -- NBC
When Edward Snowden stole the crown jewels of the National Security Agency, he didn’t need to use any sophisticated devices or software or go around any computer firewall.
All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping hole in an antiquated security system to rummage at will through the NSA’s servers and take 20,000 documents without leaving a trace.
“It’s 2013 and the NSA is stuck in 2003 technology,” said an intelligence official.
Jason Healey, a former cyber-security official in the Bush Administration, said the Defense Department and the NSA have “frittered away years” trying to catch up to the security technology and practices used in private industry. “The DoD and especially NSA are known for awesome cyber security, but this seems somewhat misplaced,” said Healey, now a cyber expert at the Atlantic Council. “They are great at some sophisticated tasks but oddly bad at many of the simplest.”
Read more ....
My Comment: This is an excellent (and believable) summary on how Edward Snowden was able to access and download many key NSA files. The only thing that surprises me in this report is why did it take so long for someone to finally do it.
No comments:
Post a Comment