TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Did the Intercept bungle the NSA leak?

199 pointsby utternerdabout 8 years ago

19 comments

fnordfnordfnordabout 8 years ago
* Our leaker is a person with a Twitter timeline that makes you wonder how she maintained her Secret clearance. She retweets @Snowden, yet was hired at Pluribus in Feb. of this year, days after doing so.<p>* The story is a huge black eye for the Intercept, makes it look like they are very inept.<p>* The leak is not really substantial, mostly analyst notes about an ongoing thing that&#x27;s been talked up in the press quite a bit.<p>* The DocuColor thing is ancient as well: <a href="https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2005&#x2F;10&#x2F;20&#x2F;outlaw_printer_dots&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2005&#x2F;10&#x2F;20&#x2F;outlaw_printer_dots...</a><p>Maybe my tinfoil hat is on too tight, but this just has a funny odor to it. One might speculate that this is a calculated leak intended to discredit The Intercept, sow fear in the minds of potential leakers?.<p>If the comments on other forums are anything to judge by, there are at least two groups of paid astroturfers battling it out today.
评论 #14501130 未加载
评论 #14503267 未加载
评论 #14501535 未加载
评论 #14503800 未加载
评论 #14503808 未加载
chakalakaspabout 8 years ago
Any article that ends with a yes&#x2F;no question is always answered with &quot;no&quot;. This one is no exception. Print classified info out at work on work printers from a monitored work computer you are logged into and said info ends up with reporters days later? Reporters you communicated with over <i>gmail</i>?! This person isn&#x27;t exactly an infosec genius. Which, I mean, isn&#x27;t a sin or anything, but when you know the organization you are directly burning is the <i>NSA</i> and the president of the United States, that&#x27;s almost an insane level of ignorance.
评论 #14500772 未加载
评论 #14498947 未加载
评论 #14501122 未加载
throwaway-1209about 8 years ago
Nah. Only 6 people have printed the doc and of those only one could be found in phone call metadata making a call to a press related contact. I don&#x27;t know what the leaker was thinking.<p>And in the end even this leak doesn&#x27;t contain any evidence of anything that would even tie it to Russia, let alone GRU. On the internet no one knows you&#x27;re a dog. So she will get 10 years in the slammer for nothing.
评论 #14499016 未加载
评论 #14499572 未加载
评论 #14500631 未加载
评论 #14499457 未加载
评论 #14501543 未加载
rndgermandudeabout 8 years ago
Yes, TheIntercept did compromise their source, although she did compromise herself as well due to poor opsec.<p>- TheIntercept failed to sanitize the documents before posting<p>- They provided the govt (or rather a govt contractor) with further information, at least that the mail was posted in Augusta, Georgia.<p>The former can be attributed to simple mistakes, but at least the latter is gross negligence of the highest order.<p>Given these two things alone, even if she had her own opsec in order, she&#x27;d likely been found out.
评论 #14501766 未加载
apeaceabout 8 years ago
The yellow dots thing was certainly a mistake on their part. But there&#x27;s a much bigger issue I haven&#x27;t seen anyone point out yet.<p>One thing that the Intercept--and Glenn Greenwald in particular--have been very critical of is news organizations that blindly publish leaks as verified facts. Here[0] is just one example where Greenwald writes:<p>&gt; THE WASHINGTON POST late Friday night published an explosive story that, in many ways, is classic American journalism of the worst sort: The key claims are based exclusively on the unverified assertions of anonymous officials, who in turn are disseminating their own claims about what the CIA purportedly believes, all based on evidence that remains completely secret.<p>Now, in this case they at least have a document, which they verified was a real document created at the NSA. But even the Intercept&#x27;s own article[1] admits:<p>&gt; A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.<p>So, are they living up to their own standard here? I don&#x27;t think the answer is black and white. But I am certainly tired of hearing all this talk without seeing the technical details.<p>If the U.S. election system was hacked--even just one voter registration company--the American public deserves to get the details. Period.<p>What were the IP addresses used, and what ties them to Russia? What does the malware actually look like, and has it been seen before? How was this whole thing discovered?<p>For now, all we have to go off of is what the NSA says may have happened. That it was a leaked document doesn&#x27;t make it any more revealing than if it was a phone conversation with another unnamed official.<p>[0] <a href="https:&#x2F;&#x2F;theintercept.com&#x2F;2016&#x2F;12&#x2F;10&#x2F;anonymous-leaks-to-the-washpost-about-the-cias-russia-beliefs-are-no-substitute-for-evidence&#x2F;" rel="nofollow">https:&#x2F;&#x2F;theintercept.com&#x2F;2016&#x2F;12&#x2F;10&#x2F;anonymous-leaks-to-the-w...</a><p>[1] <a href="https:&#x2F;&#x2F;theintercept.com&#x2F;2017&#x2F;06&#x2F;05&#x2F;top-secret-nsa-report-details-russian-hacking-effort-days-before-2016-election&#x2F;" rel="nofollow">https:&#x2F;&#x2F;theintercept.com&#x2F;2017&#x2F;06&#x2F;05&#x2F;top-secret-nsa-report-de...</a>
评论 #14498747 未加载
评论 #14498856 未加载
cproctorabout 8 years ago
I wonder whether NSA uses syntactic watermarking[1], imperceptible changes to word order or sentence form, keyed to the user accessing a document. This, or other techniques of embedding a fingerprint in the text itself, would allow a leaker to be identified from just a transcription of the document.<p>What is the right amount of fuzzing for a news organization to perform on leaked documents, to protect a source while providing credible evidence to support a claim?<p>Meral, H. M., Sevinc, E., Ünkar, E., Sankur, B., Özsoy, A. S., &amp; Güngör, T. (2007, February). Syntactic tools for text watermarking. In Electronic Imaging 2007 (pp. 65050X-65050X). International Society for Optics and Photonics.
评论 #14501869 未加载
评论 #14499800 未加载
评论 #14500014 未加载
评论 #14501354 未加载
tanderson92about 8 years ago
Have we learned nothing about the NSA&#x27;s tactics? The Intercept publishes reporting that they would rather not have been printed, and the very day the DOJ unseals charges where they try to say they learned about the leak from a paper crease from what can be reasonably inferred to be The Intercept. Meanwhile the alleged leaker allegedly used her work computer to contact The Intercept (in contradiction with their recommended best practices).<p>It has all the appearances of the government trying to smear a news outlet and ensure no one leaks to them again.<p>Do we still really trust the NSA? It was disappointing yet expected from the WaPo that they took as fact everything the DOJ alleged about how the case proceeded.
评论 #14498680 未加载
评论 #14498997 未加载
评论 #14500098 未加载
评论 #14499834 未加载
评论 #14500381 未加载
评论 #14499438 未加载
评论 #14499760 未加载
评论 #14499362 未加载
评论 #14500950 未加载
评论 #14499440 未加载
评论 #14499965 未加载
mmjaaabout 8 years ago
Yes, or maybe no. It doesn&#x27;t really matter, because this is just one of many battles being waged in the current cyber-war gripping our lives.<p>I mean, we have to just see it in the larger context: there is very definitely a war going on among various, nefarious, otherwise, or indeterminate, hostile parties.<p>It seems that if we must dismantle the military-industrial state, it is going to be through info-wars. The key targets are all secrets. (Curious that both sides seem to want the same thing though, i.e. &quot;the info wants to be free&quot;, isn&#x27;t it?)
评论 #14498729 未加载
评论 #14498672 未加载
definedabout 8 years ago
&gt; The methods presented in this paper have many applications in law enforcement such as tracking, counterfeiting, and child pornography. The downside is that they provide a mechanism for a simple device, a printer or a digital camera, to spy on its user. A typical user cannot turn off these signatures, particularly the intrinsic signature, without very detailed knowledge of how the device operates. This could have dire consequences for many important uses of these devices in our society. For example a whistleblower who would like to share documents with a regulatory agency could be in danger in that their printer could be identified as the one that produced the documents. [1]<p>Prophetic words from a 2008 paper (PDF) [1].<p>This paper may be duplicate information, but reading this paper impressed upon me how many more ways there may be to spy on people than I could imagine (and I know about some existing things like side-channel attacks... how do I spy on thee? Let me count the ways.)<p>So don&#x27;t register your printer with the manufacturer, folks; the serial number may be on every page it prints. Ditto for digital cameras.<p>Then again, is fighting for digital privacy a losing battle when at every turn, there are deliberately hidden bits of PII? Pun intended.<p>[1]: <a href="https:&#x2F;&#x2F;engineering.purdue.edu&#x2F;~prints&#x2F;public&#x2F;papers&#x2F;sp_article_09_chiang.pdf" rel="nofollow">https:&#x2F;&#x2F;engineering.purdue.edu&#x2F;~prints&#x2F;public&#x2F;papers&#x2F;sp_arti...</a>
lubesGordiabout 8 years ago
I&#x27;m not clear on what the motivation for this &#x27;leak&#x27; would be. Is it morally reprehensible for the NSA to withhold this information from the public? Was the NSA doing something illegal by withholding this info? If the only actionable information leaked is politically charged or simply falling within the established&#x2F;mass media narrative, is it wrong to suspect this &#x27;leak&#x27; is disinformation?
评论 #14499935 未加载
andy_pppabout 8 years ago
In other news, if you are leaking set up a hidden camera in someone&#x27;s room, steal their password and do everything from their account.<p>Or if you are really moral just set up the camera above your desk.<p>A bit of plausible deniability is much better than life in a supermax I promise...
linkregisterabout 8 years ago
What I find interesting is that the email from the Gmail account on the work computer was able to be intercepted and logged. What mechanism might they have used, an SSL proxy with a pre-loaded root certificate? How long is this data logged?
评论 #14500503 未加载
评论 #14500768 未加载
kharmsabout 8 years ago
I think the real fuckup is including in the article the method for IDing a Russian agent - registering with a personal phone number. That&#x27;s the kind of mistake that could have been made again, but now probably won&#x27;t be.<p>On the whole I think this information needed to get out. There were reports of people all over the US being dropped from voter registration rolls, and now proof that the Russian military targeted voter registration companies.
_Codemonkeyismabout 8 years ago
Both fumbled with opsec. But the Intercept considers themselves the pros.
paralelogramabout 8 years ago
Why are almost all official documents about Russian government-sponsored hackers &quot;secret&quot; or &quot;top secret&quot;?
评论 #14498967 未加载
评论 #14499266 未加载
21about 8 years ago
Off topic, her name is &quot;Reality (Leigh) Winner&quot;?<p>Is this a new trend? Can you name your child with any surname you wish? For example &quot;Tower John Trump&quot;.
评论 #14499056 未加载
interrupt13about 8 years ago
I can&#x27;t help but feel a Zen-like sense of balance and bliss over this. An NSA contractor violated her employment agreement and the law in providing Top Secret info to The Intercept, who then published it.<p>The Intercept got a story published and is enjoying great attention (and ad revenue), and the guilty party was caught. Everyone can be happy.<p>&quot;God’s in His heaven — All’s right with the world!&quot; [R. Browning]
评论 #14499972 未加载
mowenzabout 8 years ago
&gt;The leaks contain no &quot;raw&quot; evidence<p>Something stinks here. Both WaPo and the NSA, who Greenwald has picked fights with, get to smear The Intercept, while we are supposed to bekieve the leaker has extreme incompetence (flagrantly incriminating herself while using a pseudonym), and meanwhile the public still has no evidence of the election tampering.<p>It&#x27;s not like the Deep State didn&#x27;t lie to the country to wage a war in Iraq not long ago.<p>The public deserves to see proof.
ahoyabout 8 years ago
As with every headline that poses a yes&#x2F;no question, the answer is usually &quot;no&quot;.<p>EDIT: I&#x27;m also unsure what the point of shifting the focus onto The Intercept&#x27;s alleged &quot;mishandling&quot; of the leaker&#x27;s identity is. It seems like a smear job meant to discredit a publication that the natsec community and mainstream media like WaPo dislike. It also removes the focus from the substance of the leaks and puts it on the &quot;character&quot; of the publication.
评论 #14498534 未加载
评论 #14498583 未加载
评论 #14498686 未加载
评论 #14498573 未加载