NSA debates amnesty for Snowden
U.S. spy agency worries about as-yet unknown information Snowden may have stolen as a NSA contractor
IDG News Service - The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about."
The NSA may be willing to do a deal with Snowden as reports suggest that the agency is not clear yet as to how much information its former contractor was able to collect from classified government computers.
But the director of the NSA, General Keith Alexander, told CBS TV news show 60 Minutes that people have to be held accountable for their actions.
Snowden, who has been granted temporary asylum by Russia, has disclosed through newspapers since June that the NSA was collecting bulk telephone records from Verizon besides having access in real-time to content on the servers of Internet companies, which the Internet companies have denied. The NSA is also said to be tapping into communications links between Yahoo and Google data centers, besides spying on a number of leaders of countries.
The NSA is worried that Snowden still has some 31,000 documents that could give intelligence adversaries a roadmap on what the U.S. knows and doesn't and could implicitly provide them a way to protect their information from U.S. intelligence, Rick Ledgett, who heads the NSA task force, told the 60 Minutes program.
"So, my personal view is, yes, it's worth having a conversation about," Ledgett said. "I would need assurances that the remainder of the data could be secured and my bar for those assurances would be very high. It would be more than just an assertion on his part."
Ledgett said the view was not unanimous. Alexander, for example, told the interviewer that "this is analogous to a hostage taker taking 50 people hostage, shooting 10 and then say, 'If you give me full amnesty I'll let the other 40 go.'" He added that "what we don't want is the next person to do the same thing, race off to Hong Kong and to Moscow with another set of data knowing they can strike the same deal."
The New York Times quoted an administration official as stating that investigators have spent "hundreds and hundreds of man-hours" trying to reconstruct everything Snowden extracted from government computers, but still don't know all of what he took. Snowden logged into classified systems using the passwords of other security agency employees and by hacking firewalls to gain access to certain parts of the system, according to the newspaper report.
Fearing Snowden had left behind a computer bug or virus, NSA removed the computers Snowden had access to on the NSA's classified and unclassified networks, including the actual cables that connected them, Ledgett said. The operation cost in the tens of millions of dollars, he added.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts