A pretty good article on the response of the NSA.<p>"We've changed the passwords." Excellent job boys, you deserve a raise. And two-person requirements to access the data? Yeah, that will take 5 years to develop, cost $2 billion, and never really work.<p>There must be thousands of people who knew this system existed. You can't keep that secret forever, Top Secret clearance or not.<p>What if the next "national traitor" uses his Top Secret clearance to use that data stream to his own financial benefit? Blackmailing senators on their affairs, or exacting revenge on targets given to him by outside crime bosses.<p>Maybe I watch too many movies... But for every good guy like Snowden, is a bad guy.
Briefly interned (two weeks) for Booz Allen this Summer. While the people I met and interacted with for that short amount of time were excellent and of good spirit, the general opinion I got was that people did not enjoy their day. Much like a traitor of a country is usually disgruntled with their homeland, I can't imagine more leaks aren't right around the corner. Tech consulting firms do not share in the amazing atmosphere of tech consumer-facing companies, and as such may be the last place for loyalty.
How do we know that they haven't been?<p>His supervisors, by the way, are at Booz Allen, not the NSA. Although certainly the NSA has to take responsibility for the contractors it does business with.
Other BAH personnel and BAH corporate liability are dependent on whether there was either process negligence (e.g., Snowden's team members didn't enforce policy) or inadequate measures. One man acting alone, even within a corporate structure, doesn't implicate his co-workers or the company as a whole. (Of course, this isn't always the case in court. See also: Arthur Anderson.)
Note that the host never asks the general if anyone was fired. Perhaps someone was fired, and it didn't come up.<p>After all, if somebody asks why this couldn't happen again, you don't say, "We fired the guy who designed this system." You say, "We changed this, this, and this."<p>He talks about implementing a two-man rule, which is an excellent idea. I'm not sure how that's going to work in practice, though. Is there a way to make the linux root password composed of two passwords?