Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Economy
In reply to the discussion: Weekend Economists Get Syri-ous August 30-September 2, 2013 [View all]Demeter
(85,373 posts)80. AND EDWARD SNOWDEN GETS HIS OWN SUBTHREAD
Snowden impersonated NSA officials, sources say By Richard Esposito, Matthew Cole and Robert Windrem
NBC News
http://investigations.nbcnews.com/_news/2013/08/29/20234171-snowden-impersonated-nsa-officials-sources-say?lite
Edward Snowden accessed some secret national security documents by assuming the electronic identities of top NSA officials, said intelligence sources.
Every day, they are learning how brilliant Snowden was, said a former U.S. official with knowledge of the case. This is why you dont hire brilliant people for jobs like this. You hire smart people. Brilliant people get you in trouble.
..The NSA still doesnt know exactly what Snowden took. But its forensic investigation has included trying to figure out which higher level officials Snowden impersonated online to access the most sensitive documents. The NSA has as many as 40,000 employees. According to one intelligence official, the NSA is restricting its research to a much smaller group of individuals with access to sensitive documents. Investigators are looking for discrepancies between the real world actions of an NSA employee and the online activities linked to that persons computer user profile. For example, if an employee was on vacation while the on-line version of the employee was downloading a classified document, it might indicate that someone assumed the employees identity.
The NSA has already identified several instances where Snowden borrowed someone elses user profile to access documents, said the official. Each user profile on NSAnet includes a level of security clearance that determines what files the user can access. Like most NSA employees and contractors, Snowden had a top secret security clearance, meaning that under his own user profile he could access many classified documents. But some higher level NSA officials have higher levels of clearance that give them access to the most sensitive documents. As a system administrator, according to intelligence officials, Snowden had the ability to create and modify user profiles for employees and contractors. He also had the ability to access NSAnet using those user profiles, meaning he could impersonate other users in order to access files. He borrowed the identities of users with higher level security clearances to grab sensitive documents.
Once Snowden had collected documents, his job description also gave him a right forbidden to other NSA employees the right to download files from his computer to an external storage device. Snowden downloaded a reported 20,000 documents onto thumb drives before leaving Hawaii for Hong Kong on May 20.
...Snowden has been charged with theft and violations of the Espionage Act. He is now in Russia, where he has been granted temporary asylum.
Richard Esposito is the Senior Executive Producer for Investigations at NBC News. Matthew Cole is an investigative reporter at NBC News. He can be reached at matthew.cole@nbcuni.com. Robert Windrem is an investigative reporter at NBC News. He can be reached at robert.windrem@nbcuni.com.
NBC News
http://investigations.nbcnews.com/_news/2013/08/29/20234171-snowden-impersonated-nsa-officials-sources-say?lite
Edward Snowden accessed some secret national security documents by assuming the electronic identities of top NSA officials, said intelligence sources.
Every day, they are learning how brilliant Snowden was, said a former U.S. official with knowledge of the case. This is why you dont hire brilliant people for jobs like this. You hire smart people. Brilliant people get you in trouble.
..The NSA still doesnt know exactly what Snowden took. But its forensic investigation has included trying to figure out which higher level officials Snowden impersonated online to access the most sensitive documents. The NSA has as many as 40,000 employees. According to one intelligence official, the NSA is restricting its research to a much smaller group of individuals with access to sensitive documents. Investigators are looking for discrepancies between the real world actions of an NSA employee and the online activities linked to that persons computer user profile. For example, if an employee was on vacation while the on-line version of the employee was downloading a classified document, it might indicate that someone assumed the employees identity.
The NSA has already identified several instances where Snowden borrowed someone elses user profile to access documents, said the official. Each user profile on NSAnet includes a level of security clearance that determines what files the user can access. Like most NSA employees and contractors, Snowden had a top secret security clearance, meaning that under his own user profile he could access many classified documents. But some higher level NSA officials have higher levels of clearance that give them access to the most sensitive documents. As a system administrator, according to intelligence officials, Snowden had the ability to create and modify user profiles for employees and contractors. He also had the ability to access NSAnet using those user profiles, meaning he could impersonate other users in order to access files. He borrowed the identities of users with higher level security clearances to grab sensitive documents.
Once Snowden had collected documents, his job description also gave him a right forbidden to other NSA employees the right to download files from his computer to an external storage device. Snowden downloaded a reported 20,000 documents onto thumb drives before leaving Hawaii for Hong Kong on May 20.
The damage, on a scale of 1 to 10, is a 12, said a former intelligence official.
...Snowden has been charged with theft and violations of the Espionage Act. He is now in Russia, where he has been granted temporary asylum.
Richard Esposito is the Senior Executive Producer for Investigations at NBC News. Matthew Cole is an investigative reporter at NBC News. He can be reached at matthew.cole@nbcuni.com. Robert Windrem is an investigative reporter at NBC News. He can be reached at robert.windrem@nbcuni.com.
AND EVEN SO, HE DID THIS COUNTRY A GREAT SERVICE, REVEALING THE ABUSES OF THIS UNCONSTITUTIONAL SHADOW GOVERNMENT....
New Snowden Leak Reports Groundbreaking NSA Crypto-Cracking
http://www.wired.com/threatlevel/2013/08/black-budget/
The latest published leak from NSA whistleblower Edward Snowden lays bare classified details of the U.S. governments $52.6 billion intelligence budget, and makes the first reference in any of the Snowden documents to a groundbreaking U.S. encryption-breaking effort targeted squarely at internet traffic. Snowden, currently living in Russia under a one-year grant of asylum, passed The Washington Post the 178-page intelligence community budget request for fiscal year 2013. Among the surprises reported by Post writers Barton Gellman and Greg Miller is that the CIA receives more money than the NSA: $14.7 billion for the CIA, versus $10.8 billion for the NSA. Until this morning its generally been believed that the geeky NSA, with its basements full of supercomputers, dwarfed its human-oriented counterparts.
The Post published only 43 pages from the document, consisting of charts, tables and a 5-page summary written by Director of National Intelligence James Clapper. The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods. One of those methods, though, is hinted at in the Clapper summary and its interesting. Clapper briefly notes some programs the intelligence agencies are closing or scaling back, as well as those theyre pouring additional funds into. Overhead imagery captured by spy satellites was slated for reduction, for example, while SIGINT, the electronic spying thats been the focus of the Snowden leaks, got a fresh infusion.
Also, Clapper writes in a line marked top secret, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.
The Posts article doesnt detail the groundbreaking cryptanalytic capabilities Clapper mentions, and theres no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget around $11 billion is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces. In a WIRED story in March of last year the pre-Snowden era of NSA reporting James Bamford reported that the NSA secretly made some sort of enormous breakthrough in cryptanalysis several years earlier. Previous Snowden leaks have documented the NSA and British intelligences sniffing of raw internet traffic. But information on the NSAs efforts to crack the encrypted portion of that traffic which would include much of the email transiting the net has remained absent; conspicuously so, given the NSAs history as world-class codebreakers. The leaked budget document is the first published Snowden leak to touch upon the question of how safe routinely encrypted traffic is from cutting-edge nation-state spying. The Post is silent on when Snowden leaked the black budget. As a condition of his asylum, Snowden agreed not to release any more U.S. documents while in Russia. But he may well have passed the budget to the paper in May at the same time that he turned over documents on the NSAs PRISM program.
Kevin Poulsen is the investigations editor at Wired and author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Crown, 2011). His PGP fingerprint is A4BB A435 2FE1 B4A8 46E1 7AF6 DA4B 5DFA FF09 4870
http://www.wired.com/threatlevel/2013/08/black-budget/
The latest published leak from NSA whistleblower Edward Snowden lays bare classified details of the U.S. governments $52.6 billion intelligence budget, and makes the first reference in any of the Snowden documents to a groundbreaking U.S. encryption-breaking effort targeted squarely at internet traffic. Snowden, currently living in Russia under a one-year grant of asylum, passed The Washington Post the 178-page intelligence community budget request for fiscal year 2013. Among the surprises reported by Post writers Barton Gellman and Greg Miller is that the CIA receives more money than the NSA: $14.7 billion for the CIA, versus $10.8 billion for the NSA. Until this morning its generally been believed that the geeky NSA, with its basements full of supercomputers, dwarfed its human-oriented counterparts.
The Post published only 43 pages from the document, consisting of charts, tables and a 5-page summary written by Director of National Intelligence James Clapper. The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods. One of those methods, though, is hinted at in the Clapper summary and its interesting. Clapper briefly notes some programs the intelligence agencies are closing or scaling back, as well as those theyre pouring additional funds into. Overhead imagery captured by spy satellites was slated for reduction, for example, while SIGINT, the electronic spying thats been the focus of the Snowden leaks, got a fresh infusion.
Also, Clapper writes in a line marked top secret, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.
The Posts article doesnt detail the groundbreaking cryptanalytic capabilities Clapper mentions, and theres no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget around $11 billion is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces. In a WIRED story in March of last year the pre-Snowden era of NSA reporting James Bamford reported that the NSA secretly made some sort of enormous breakthrough in cryptanalysis several years earlier. Previous Snowden leaks have documented the NSA and British intelligences sniffing of raw internet traffic. But information on the NSAs efforts to crack the encrypted portion of that traffic which would include much of the email transiting the net has remained absent; conspicuously so, given the NSAs history as world-class codebreakers. The leaked budget document is the first published Snowden leak to touch upon the question of how safe routinely encrypted traffic is from cutting-edge nation-state spying. The Post is silent on when Snowden leaked the black budget. As a condition of his asylum, Snowden agreed not to release any more U.S. documents while in Russia. But he may well have passed the budget to the paper in May at the same time that he turned over documents on the NSAs PRISM program.
Kevin Poulsen is the investigations editor at Wired and author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Crown, 2011). His PGP fingerprint is A4BB A435 2FE1 B4A8 46E1 7AF6 DA4B 5DFA FF09 4870
LINK TO LEAKED BUDGET AT OP
Edward Snowden leaks again: five takeaways from the 'black budget'
http://www.csmonitor.com/USA/DC-Decoder/2013/0829/Edward-Snowden-leaks-again-five-takeaways-from-the-black-budget
...The former National Security Agency data professional leaked a secret-filled 178-page summary of the US intelligence community budget to Post reporters Barton Gellman and Greg Miller, who published online a lengthy story about the document, illustrated with great charts and graphics, on Thursday....Heres our quick take on significant things in the story:
The CIA is still first among equals. The nations human-oriented intelligence agency got $14.7 billion for 2013. The eavesdropping NSA, despite its need for expensive electronics, got less: $10.8 billion. The National Reconnaissance Office, which builds and maintains signal and photo intelligence satellites, received almost as much as the NSA, at $10.3 billion. That means those secret eyes and ears in the sky are really, really expensive.
Predicting the future: priceless. OK, maybe priceless isnt quite the right word. There is a price tag here, a big one. The biggest single item in the breakdown of the budget by mission objective is Provide Strategic Intelligence and Warning, which gets 39 percent of intelligence communitys $52 billion. That means they are putting a lot of effort into the predictions that go into the presidents morning security briefings. Combat Violent Extremism is the second-biggest function, with 33 percent of the budget. Counter Weapons Proliferation is third, with 13 percent.
Will Israel be insulted? The budget summary included discussion of the intelligence communitys priorities, successes, and failures, as well as numbers. For instance, it noted that the US takes an interest in countries that are allies, as well as countries that arent. Among the nations listed as counterintelligence priority targets are China, Russia, Iran, Cuba, and ... Israel. Pakistan, a nominal ally, is also listed as an intractable target." Thats not too surprising, is it, given thats where Osama bin Laden was hiding in plain sight...Why so many Spanish-speaking spies? Intelligence agencies pay bonuses to employees who maintain proficiency in foreign languages. The No. 1 bonus language is Spanish, with 2,725 bonuses dispersed. Thats more than twice as many as were paid out to the second-ranking language, Arabic. Arabic speakers got 1,191 bonuses. Chinese speakers got 903, and Russian speakers got 736.
Did Manning make Snowden possible? Near the end, the Post story notes that the intelligence community had budgeted for a major counterintelligence initiative in 2012 that would have tried to guard against insider threats by reinvestigating the activities of thousands of high-risk, high-gain applicants and contractors. Mr. Snowden himself might well have fallen into that category. But the initiative never got carried out, the Post notes, because those resources were diverted to an all-hands-on-deck response to the leak of thousands of documents by WikiLeaks. Those documents were provided by Bradley Manning (who has recently asked to be known as a transgender woman named Chelsea).
The government panicked so strongly about the threat caused by leaking documents classified at a lower level than this budget] document that it diverted resources from the very program that possibly would have exposed Edward Snowden before he could have leaked, notes national security journalist Joshua Foust on his blog.
Edit history
Please sign in to view edit histories.
97 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
Summers’ Lending Club makes money by bypassing the Equal Credit Opportunity Act
Demeter
Sep 2013
#85
The Obama Administration Isn't Answering The Most Important Question About Attacking Syria
xchrom
Aug 2013
#8
Developer Says $100 Million Sculpture At Hudson Yards Will Be 'New York's Eiffel Tower'
xchrom
Aug 2013
#9
But, Will TRUTH make any difference in Real Time in this case? Must we always wait for History?
Demeter
Aug 2013
#34
Meet The Saudi Prince Who Finances the Murderous Egyptian Military, and Crushes Democracy in the Mid
Demeter
Aug 2013
#40
Under $652 million project code-named ‘GENIE’ U.S. conducted 231 ‘offensive cyberoperations’:
xchrom
Sep 2013
#55
City of the Lost In the world’s second-largest refugee camp, Syrians find that it’s not easy to flee
Demeter
Sep 2013
#57
Syria Intervention Plan Fueled by Oil Interests, Not Concern About Chemical Weapons
Demeter
Sep 2013
#58
AMERICAN LABOR DAY SUBTHREAD--OH, YEAH, GUESS IT SHOULD BE MENTIONED IN PASSING...
Demeter
Sep 2013
#60
Longshore union pulls out of national AFL-CIO, citing attacks at Northwest grain terminals
Demeter
Sep 2013
#66
WIKILEAKS RELEASE Syria: 84,067 sensitive emails from US intelligence contractor Stratfor
Demeter
Sep 2013
#64
Scary Thought on Labor Day Weekend: Obama's Economic Team Think They Are Doing a Good Job
Demeter
Sep 2013
#67