TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Employee Shared Password, Key, Classified Data with Snowden [pdf]

44 pointsby thezachover 11 years ago

6 comments

EthanHeilmanover 11 years ago
Don&#x27;t worry though they have a fool-proofing auditing systems in place to prevent abuse of the intelligence they have intercepted on US &quot;persons&quot;.<p>I am always amazed at the double claim the NSA makes:<p>1. That they have a great auditing system that catches abuses.<p>2. That the auditing system shows that most NSA employees are honest because they have caught very few abuses.<p>The two claims do not support each other. These two alternatives would be more convincing:<p>1. That the auditing system is great and thus we have caught millions of abuses.<p>2. That the auditing system is easy to bypass and therefore we have caught very few abuses.<p>The very fact that Snowden could take what he did, in the way in which he did, and that they still don&#x27;t know the extent of data copied shows that their auditing systems are easy to bypass.
评论 #7239408 未加载
minimaxover 11 years ago
Seems like it would chip away at Snowden&#x27;s &quot;whistleblower&quot; claim if he was actively trying to subvert the NSA&#x27;s compartmentation scheme to access documents he wasn&#x27;t cleared for.
评论 #7239045 未加载
评论 #7239134 未加载
评论 #7239437 未加载
lognover 11 years ago
And why would we believe the NSA at this point?
评论 #7239111 未加载
colinbartlettover 11 years ago
All the security tech in the world can&#x27;t stop people from writing their passwords on sticky notes and pasting them on their monitors. Or in this case, giving them to a coworker.<p>Well, actually two-factor can. I wonder why a two-factor auth was not required? That would have rendered Snowden&#x27;s keylogger useless.
评论 #7238913 未加载
评论 #7239802 未加载
fredgrottover 11 years ago
Remember, folks we do not know NSA&#x27;s internal infrastructure..<p>Things we do know: 1 Hawaii is a listening post and Snowden was at a listening post yet did not have access to RAW data as systemadmin. This bodes well for claim on access abuse of RAW data only but not abuse on implementing the collection system for RAW data. In other words NSA can abuse through implementation without being audited..that includes Congress as it has been proven that NSA can lie to congress without being any move to punish NSA for such lies and also the lack of technical backgrounds or even military backgrounds of most congress people.<p>NSA is relying upon everyone forgetting that collection of raw data implementation is the number one place for auditing of abuses.
wil421over 11 years ago
Who shares their key with someone and enters their password?<p>If I worked somewhere that is as sensitive as the NSA I would never share my key. I wouldnt allow someone to use my login at my work to do anything, period.<p>Now its sounds like Snowden was being a spook of his own in order to gain access to data. Hopefully these people wont be indicted.