General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsThe NSA Chief Just Breached Military Protocol & Interviewed W/Trump
TRUMP ONLY SEES LOYALISTS.
What the hell did the head of the NSA know about hacking the DNC/Podesta/Voter Data Bases and when did he know it? What did he do about it? What did he do to prevent further damage on Election Day?
....................................
The heads of the Pentagon and the nations intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed.
The news comes as Rogers is being considered by President-elect Donald Trump to be his nominee for director of national intelligence to replace Clapper as the official who oversees all 17 U.S. intelligence agencies. In a move apparently unprecedented for a military officer, Rogers, without notifying superiors, traveled to New York to meet with Trump on Thursday at Trump Tower. That caused consternation at senior levels of the administration, according to the officials, who spoke on the condition of anonymity to discuss internal personnel matters.
snip
Rogers, 57, took the helm of the NSA and Cyber Command in April 2014 in the wake of revelations by a former intelligence contractor (Snowden) of broad surveillance activities that shook public confidence in the agency....Rogers was charged with making sure another insider breach never happened again.
Instead, in the past year and a half, officials have discovered two major compromises of sensitive hacking tools by personnel working at the NSAs premier hacking unit: the Tailored Access Operations.
One involved a Booz Allen Hamilton contractor, Harold T. Martin III, who is accused of carrying out the largest theft of classified government material. Although some of his activity took place before Rogers arrived and at other agencies, some of it including the breach of some of the most sensitive tools continued on Rogerss watch, the officials said.
Martins alleged theft was discovered when some of the tools he is accused of stealing were mysteriously released online in August. They included computer code based on obscure software flaws that could be used to take control of firewalls and networks what one former TAO operator called the keys to the kingdom.
Martin, who moved from the NSA to a job in a Defense Department acquisitions agency last year, was arrested in August. The news broke last month.
But there was a second, previously undisclosed breach of cybertools, discovered in the summer of 2015, which was also carried out by a TAO employee, one official said. That individual also has been arrested, but his case has not been made public. The individual is not believed to have shared the material with another country, the official said.
Rogers was put on notice by his two bosses Clapper and Carter that he had to get control of internal security and improve his leadership style. There have been persistent complaints from NSA personnel that Rogers is aloof, frequently absent and does not listen to staff input.
snip
FBI agents investigating the Martin breach were appalled at how lax security was at the TAO, officials said. [Rogers] is a guy who has been at the helm of the NSA at the time of some of the most egregious security breaches, most recently Hal Martin, a senior administration official said. Clearly its a sprawling bureaucracy . . . but I think theres a compelling case that can be made that some of the safeguards that should have been put in place were either not fully put in place or not implemented properly.
The morale is horrible, one former senior official said. Especially during a period of change, a leader needs to be present, the official said. Any leader knows that when you institute change, you have to be there. You have to help heal the wounds, be very active. He was not.
snip
Nonetheless, Rogers has seen other embarrassing network breaches on his watch. In 2013, Iranian hackers managed to penetrate the Navys unclassified network when Rogers was head of the 10th Fleet/Navy Cyber Command, the unit responsible for protecting the Navys networks. It took months to expel the attackers.
snip