CIA dismissed Snowden four years before NSA leaks
Agency's report on suspicious behavior never reached the NSA or its contractors, according to report in the New York Times
Computerworld - Edward Snowden got a job with top-level clearance at National Security Agency contractor after he had been dismissed by a previous employer -- the CIA -- on suspicion of breaking into computers without authorized access.
Several unnamed sources told the New York Times this week that in 2009, Snowden was released from a job as a technician at the Central Intelligence Agency's Geneva office after a supervisor reported suspicious behavior.
The CIA's report on Snowden, apparently unseen by the NSA, noted changes in Snowden's personality and work habits and cited apparent attempts he made to illegally access classified computer files, the Times said.
The CIA's assessment of Snowden, and its suspicions, were not forwarded to the NSA or its contractors. The CIA supervisor's derogatory note surfaced only after federal investigators began probing Snowden's leaks of classified materials earlier this year, the Times story said.
After the CIA released Snowden in 2009, he worked for Dell as an NSA contractor in Japan, He later worked in Hawai as a Booz-Allen Hamilton NSA contract employee.
According to the Times, the CIA supervisor's report may have slipped through the cracks because the electronic systems used to manage the security clearances for full-time and contract employees at the NSA only tracked "major rule-based infractions."
Less serious complaints, such as those pertaining to personal behavior, were apparently not tracked by the system. As a result, Booz-Allen, Dell and the NSA didn't get reports, the Times noted.
The background vetting process has since been tightened, the report added. The Snowden incident has also prompted a sweeping review of the processes used by the government for vetting employees and granting them security clearances.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
- Target attack shows danger of remotely accessible HVAC systems
- U.S. is investigating Target data breach, AG Holder says
- Russian man pleads guilty in SpyEye malware case
- Suspected email hackers for hire charged in four countries
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts