{"id":200118,"date":"2017-06-21T03:56:10","date_gmt":"2017-06-21T07:56:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-nsa-has-done-little-to-prevent-the-next-edward-snowden-motherboard\/"},"modified":"2017-06-21T03:56:10","modified_gmt":"2017-06-21T07:56:10","slug":"the-nsa-has-done-little-to-prevent-the-next-edward-snowden-motherboard","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-nsa-has-done-little-to-prevent-the-next-edward-snowden-motherboard\/","title":{"rendered":"The NSA Has Done Little to Prevent the Next Edward Snowden &#8230; &#8211; Motherboard"},"content":{"rendered":"<p><p>    When Edward Snowden walked out of the NSA in 2013 with thumb    drives full of its most secret files, the agency didn't have a    reliable list of peoplelike Snowdenwho had privileged access    to its networks. Nor did it have a reliable list of those who    were authorized to use removable media to transfer data to or    from an NSA system.  <\/p>\n<p>    That's one of the alarming revelations in a Department of    Defense Inspector General report from last year.    The report, which was ordered by Congress, reviewed whether the    NSA had completed some of the most important initiatives it has    started in response to the Snowden leak to make its data more    secure. The New York Times obtained the DOD IG    report via FOIA.  <\/p>\n<p>    The most shocking detail in the report is that even at the new    National Security Agency data center in Utah, \"NSA did not    consistently secure server racks and other sensitive equipment\"    in data centers and machine rooms. At the Utah Data Center and    two other facilities, the report stated, \"we observed unlocked    server racks and sensitive equipment.\" The finding that the NSA    wasn't locking down all its server racks was first disclosed    and reported in a House Intelligence Committee    Report on Edward Snowden's leaks released    in December.  <\/p>\n<p>    But the more fundamental problem revealed in the report is that    the NSA has done little to limit the number of people who have    access to what are supposed to be the most protected hardware    the NSA has.  <\/p>\n<p>    The IG report examined seven of the most important out of 40    \"Secure the Net\" initiatives rolled out since Snowden began    leaking classified information. Two of the initiatives aspired    to reduce the number of people who had the kind of access    Snowden did: those who have privileged access to maintain,    configure, and operate the NSA's computer systems (what the    report calls PRIVACs), and those who are authorized to use    removable media to transfer data to or from an NSA system (what    the report calls DTAs).  <\/p>\n<p>    The government's apparent lack of curiosity is fairly alarming  <\/p>\n<p>    But when DOD's inspectors went to assess whether NSA had    succeeded in doing this, they found something disturbing. In    both cases, the NSA did not have solid documentation about how    many such users existed at the time of the Snowden leak. With    respect to PRIVACs, in June 2013 (the start of the Snowden    leak), \"NSA officials stated that they used a manually kept    spreadsheet, which they no longer had, to identify the initial    number of privileged users.\" The report offered no explanation    for how NSA came to no longer have that spreadsheet just as an    investigation into the biggest breach thus far at NSA started.    With respect to DTAs, \"NSA did not know how many DTAs it had    because the manually kept list was corrupted during the months    leading up to the security breach.\"  <\/p>\n<p>    There seem to be two possible explanations for the fact that    the NSA couldn't track who had the same kind of access that    Snowden exploited to steal so many documents. Either the dog    ate their homework: Someone at NSA made the documents    unavailable (or they never really existed). Or someone fed the    dog their homework: Some adversary made these lists unusable.    The former would suggest the NSA had something to hide as it    prepared to explain why Snowden had been able to walk away with    NSA's crown jewels. The latter would suggest that someone    deliberately obscured who else in the building might    walk away with the crown jewels. Obscuring that list would be    of particular value if you were a foreign adversary planning on    walking away with a bunch of files, such    as the set of hacking tools the Shadow Brokers have since    released, which are believed to have originated at NSA.  <\/p>\n<p>      NSA headquarters in Maryland. Image: MJB\/Flickr    <\/p>\n<p>    The government's apparent lack of curiosityat least in this    reportabout which of these was the case is fairly alarming,    because it is a critically important question in assessing why    NSA continues to have serious data breaches. For example, it    would be important to know if Hal Martin, the Booz Allen    Hamilton contractor accused of stealing terabytes of NSA data    in both hard copy and digital form, showed up on these lists or    if he simply downloaded data for decades without authorization    to do so.  <\/p>\n<p>    Even given the real concern that Russia or someone else might    have reason to want to make the names of PRIVACs and DTAs    inaccessible at precisely the time the NSA reviewed the Snowden    breach, the NSA's subsequent action does provide support for    the likelihood the agency itself was hiding how widespread    PRIVAC and DTA access was. For both categories, DOD's Inspector    General found NSA did not succeed in limiting the number of    people who might, in the future, walk away with classified    documents and software.  <\/p>\n<p>    With PRIVACs, the NSA simply \"arbitrarily\" removed privileged    access from some number of users, then had them reapply for    privileged access over the next 3 months. The NSA couldn't    provide DOD's IG with \"the number of privileged users before    and after the purge or the actual number of users purged.\"    After that partial purge, though, NSA had \"a continued and    consistent increase in the number of privileged users.\"  <\/p>\n<p>    As with PRIVACs, the NSA \"could not provide supporting    documentation for the total number of DTAs before and after the    purge\" and so was working from an \"unsubstantiated\" estimate.    After the Snowden leak, the NSA purged all DTAs and made them    reapply, which they did in 2014. The NSA pointed to the new    number of DTAs and declared it a reduction from its original    \"unsupported\" estimate. When asked how it justified its claim    that it had reduced the number of people who could use thumb    drives with NSA's networks when it didn't know how many such    people it had to begin with, the NSA explained, \"although the    initiat[iv]e focused on reducing the number of DTA, the actions    taken by NSA were not designed to reduce the number of DTAs;    rather they were taken to overhaul the DTA process to identify    and vet all DTAs.\" The IG Report notes that the NSA \"continued    to consistently increase the number of DTAs throughout the next    12 months.\"  <\/p>\n<p>    When, in 2008, someone introduced a worm into DOD's networks via a thumb    drive, it decreed that it would no longer use removable media.    Then, after Chelsea Manning exfiltrated a bunch of documents on    a Lady Gaga CD, the government again renewed its commitment to limiting the use    of removable media. This report reveals that only in the wake    of the Snowden leaks did the NSA get around to developing a    vetted list of those who could use thumb drives in NSA's    networks. Yet as recently as last year, Reality Winner (who, as    an Air Force translator, was presumably not a privileged access    user at all) stuck some kind of removable media into a    Top Secret computer, yet the government claims not to know what    she downloaded or whether she downloaded anything at all (it's    unclear whether that Air Force computer came within NSA's    review).  <\/p>\n<p>    When contacted with specific questions about its inability to    track privileged users, the NSA pointed to its official    statement on the DOD IG Report. \"The National Security Agency    operates in one of the most complicated IT environments in the    world. Over the past several years, we have continued to build    on internal security improvements while carrying out the    mission to defend the nation and our allies around the clock.\"    The Office of Director of National Intelligence did not    immediately respond with comment to my questions.  <\/p>\n<p>    Yet this issue pertains not just to the recent spate of    enormous data breaches, which led last month to the worldwide    WannaCry ransomware attack using NSA's stolen tools. It also    pertains to the privacy of whatever data on Americans the NSA    might have in its repositories. If, three years after Snowden,    the NSA still hasn't succeeded in limiting the number of people    with the technical capability to do what he did, how can NSA    ensure it keeps Americans' data safe?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/the-nsa-has-done-little-to-prevent-the-next-edward-snowden\" title=\"The NSA Has Done Little to Prevent the Next Edward Snowden ... - Motherboard\">The NSA Has Done Little to Prevent the Next Edward Snowden ... - Motherboard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When Edward Snowden walked out of the NSA in 2013 with thumb drives full of its most secret files, the agency didn't have a reliable list of peoplelike Snowdenwho had privileged access to its networks. Nor did it have a reliable list of those who were authorized to use removable media to transfer data to or from an NSA system <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-nsa-has-done-little-to-prevent-the-next-edward-snowden-motherboard\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-200118","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200118"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200118"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200118\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}