Snowden Persuaded Other NSA Workers to Give up Passwords

To access some top-secret information, Edward Snowden used logins and passwords of his colleagues.

The famous whistleblower persuaded his NSA colleagues to give him their login data and passports, to reach specified information. Photo: NIKOLAOS CHATZIS/Flickr

According to sources close to the investigation of stolen by Snowden secret information, those employees who gave data to the whistleblower were identified, thoroughly questioned and removed from their assignments.

If reports are true to live, the most wanted by all countries person have talked between 20 and 25 fellow workers at the NSA regional operations center in Hawaii into providing to him their logins and passwords, citing that it was necessary for him as a computer systems administrator.

It still unknown why NSA employees agreed to provide the information that allowed the former National Security Agency contractor access to data that he was not authorized to see.

The famous revelator used to work for the organisation in its headquaters in Hawaii for about a month last spring, during which he got access to and downloaded tens of thousands of secret NSA documents that was later revealed to public.

“In the classified world, there is a sharp distinction between insiders and outsiders. If you’ve been cleared and especially if you’ve been polygraphed, you’re an insider and you are presumed to be trustworthy,” suggested Steven Aftergood, a secrecy expert with the Federation of American Scientists.

“What agencies are having a hard time grappling with is the insider threat, the idea that the guy in the next cubicle may not be reliable,” he added.

The news comes a week after citing data, unveiled by famous wistleblower and interviews with knowledgeable sources, The Washington Post reported that the NSA has hacked the cables two Internet searching giants use to shuttle information between their cloud databases.

A secret data from Jan. 9, 2013, shows that the agency reseives millions of records every day from Yahoo and Google internal networks and later sends it to data warehouses at the agency’s Fort Meade, Md., headquarters.

According to media reports, in the last month field collectors had examinated and sent back more about 200 million new records — ranging from “metadata,” which show adressees and senders of email letters and when, to content such as text, audio and video.

This revelation was condemned by Google’s employees, who said in their statements that they are accusing the NSA of breaking the law by intercepting communications on cables linking Google’s various data centers.

Nobody at the U.S. National Security Agency or the British intelligence agency “will ever stand before a judge and answer for this industrial-scale subversion of the judicial process,” said Mike Hearn, an engineer at Google.

Hearn, who has worked at the Internet searching giant since 2006, claims on his Google plus page that he had worked on an “anti-hacking system” at the company for two years.

“We designed this system to keep criminals out. There’s no ambiguity here,” Hearn wrote. “Bypassing that system is illegal for a good reason,” he said, adding that the judicial system of warrants and rules of evidence provided an effective and time-honored way to prevent crime while limiting excessive intrusions into privacy.

The comments come after Brandon Downey’s ones, who identified himself as a network security engineer on his personal Google+ Web page.

“Fuck these guys,” he wrote. “I’ve spent the last ten years of my life trying to keep Google’s users safe and secure from the many diverse threats Google faces.”

In a statement, Google’s chief legal officer, David Drummond, said the company was “outraged” by the latest revelations.

“We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide,” he said.

Share this article

We welcome comments that advance the story directly or with relevant tangential information. We try to block comments that use offensive language, all capital letters or appear to be spam, and we review comments frequently to ensure they meet our standards. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Coinspeaker Ltd.