Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Arrest in NSA News Leak Fuels Debate on Source Protection

It was a major scoop for The Intercept —  documents suggesting a concerted Russian effort to hack US election systems — but the online news site is drawing fire in media circles following the arrest of the alleged source of the leak.

It was a major scoop for The Intercept —  documents suggesting a concerted Russian effort to hack US election systems — but the online news site is drawing fire in media circles following the arrest of the alleged source of the leak.

The Intercept, the investigative arm of the First Look Media organization created by eBay founder Pierre Omidyar, is being criticized for sharing information which may have led to the arrest this week of National Security Agency contractor Reality Leigh Winner

Winner, 25, was arrested and accused of mailing classified NSA documents to “a news outlet,” according to the US Justice Department, which said an investigation showed she had printed and shared the investigative report.

Did the news organization unwittingly provide clues to the government that led authorities to Winner? Some media analysts say the journalists were careless at best.

Some of the harshest criticism came from Washington Post reporter Barton Gellman, who called the case a “catastrophic failure of source protection” and argued that The Intercept “made egregious mistakes that doomed its source.”

“It handed USG (US government) a color copy of original doc & told a clearance-holding contractor the doc was mailed from Augusta. Where source lived,” tweeted Gellman, a two-time Pulitzer Prize winner who was part of a team reporting from documents leaked by former NSA contractor Edward Snowden.

Jake Swearingen, a technology writer for New York Magazine, said Winner made her own missteps by printing the documents in a way that could be tracked and mailing them to The Intercept.

But Swearingen added that The Intercept may have sealed Winner’s fate by showing the document to a government official as part of an effort to verify its authenticity.

Advertisement. Scroll to continue reading.

“It’s quite reasonable for The Intercept to seek confirmation,” Swearingen wrote. “But revealing the Augusta, Georgia, postmark to the third-party source clearly helped the government build its case.”

The Intercept said in a statement the NSA document “was provided to us completely anonymously” and added that “we have no knowledge of the identity of the person who provided us with the document.”

The news organization, which is headed by investigative reporter Glenn Greenwald, who was part of the team that first published the Snowden documents, cautioned against drawing any conclusions from FBI assertions on how it tracked Winner.

“Winner faces allegations that have not been proven. The same is true of the FBI’s claims about how it came to arrest Winner,” the statement said.

– Connecting the dots –

Robert Graham of Errata Security said Winner may have been tracked by nearly invisible dots from the printer used that can determine who used the machine.

“Because the NSA logs all printing jobs on its printers, it can use this to match up precisely who printed the document,” Graham said in a blog post.

“When they print things out, they includes these invisible dots, so documents can be tracked,” Graham wrote, calling it “a violation of our (constitutional) rights.”

Dan Gillmor, an Arizona State University journalism professor who blogs about media, said the case calls for more scrutiny.

“Hoping @theintercept will do a thorough self-examination of its source protection, or lack of it — and make results loudly public.”

Some were less charitable.

John Kiriakou, a former CIA analyst who went to jail after leaking information on US torture and waterboarding, tweeted “@theintercept should be ashamed of itself. (Reporter) Matthew Cole burns yet another source. It makes your entire organization untrustworthy.”

WikiLeaks, the organization which is a conduit for secret documents, said it was offering a $10,000 reward “for information leading to the public exposure & termination of this ‘reporter.’”

Others said the focusing on the role of the news organization distracts from the more question of whether the leak related to an important public issue.

Snowden, who has been given asylum in Russia and is also facing prosecution for divulging secret documents, said it is inappropriate to use the Espionage Act to prosecute “whistleblowers” who reveal important news to media.

“The prosecution of any journalistic source without due consideration by the jury as to the harm or benefit of the journalistic activity is a fundamental threat to the free press,” Snowden said in a blog post.

Dan Kennedy, a Northeastern University journalism professor, said most sources of leaked information understand they will eventually face consequences.

Winner “does have an argument to make that what she did was in the public interest, but I don’t know if she can convince a jury of that,” Kennedy said.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...