NSA debates amnesty for Snowden
U.S. spy agency worries about as-yet unknown information Snowden may have stolen as a NSA contractor
IDG News Service - The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about."
The NSA may be willing to do a deal with Snowden as reports suggest that the agency is not clear yet as to how much information its former contractor was able to collect from classified government computers.
But the director of the NSA, General Keith Alexander, told CBS TV news show 60 Minutes that people have to be held accountable for their actions.
Snowden, who has been granted temporary asylum by Russia, has disclosed through newspapers since June that the NSA was collecting bulk telephone records from Verizon besides having access in real-time to content on the servers of Internet companies, which the Internet companies have denied. The NSA is also said to be tapping into communications links between Yahoo and Google data centers, besides spying on a number of leaders of countries.
The NSA is worried that Snowden still has some 31,000 documents that could give intelligence adversaries a roadmap on what the U.S. knows and doesn't and could implicitly provide them a way to protect their information from U.S. intelligence, Rick Ledgett, who heads the NSA task force, told the 60 Minutes program.
"So, my personal view is, yes, it's worth having a conversation about," Ledgett said. "I would need assurances that the remainder of the data could be secured and my bar for those assurances would be very high. It would be more than just an assertion on his part."
Ledgett said the view was not unanimous. Alexander, for example, told the interviewer that "this is analogous to a hostage taker taking 50 people hostage, shooting 10 and then say, 'If you give me full amnesty I'll let the other 40 go.'" He added that "what we don't want is the next person to do the same thing, race off to Hong Kong and to Moscow with another set of data knowing they can strike the same deal."
The New York Times quoted an administration official as stating that investigators have spent "hundreds and hundreds of man-hours" trying to reconstruct everything Snowden extracted from government computers, but still don't know all of what he took. Snowden logged into classified systems using the passwords of other security agency employees and by hacking firewalls to gain access to certain parts of the system, according to the newspaper report.
Fearing Snowden had left behind a computer bug or virus, NSA removed the computers Snowden had access to on the NSA's classified and unclassified networks, including the actual cables that connected them, Ledgett said. The operation cost in the tens of millions of dollars, he added.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts