Article Image
News Link • Whistleblowers

How Snowden did it

• By Richard Esposito and Matthew Cole
 All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping hole in an antiquated security system to rummage at will through the NSA’s servers and take 20,000 documents without leaving a trace.
It’s 2013 and the NSA is stuck in 2003 technology,” said an intelligence official.
Jason Healey, a former cyber-security official in the Bush Administration, said the Defense Department and the NSA have “frittered away years” trying to catch up to the security technology and practices used in private industry. “The DoD and especially NSA are known for awesome cyber security, but this seems somewhat misplaced,” said Healey, now a cyber expert at the Atlantic Council. “They are great at some sophisticated tasks but oddly bad at many of the simplest.”

Join us on our Social Networks:


Share this page with your friends on your favorite social network:

Free Talk Live