Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

NSA Whistleblower: More Details on NSA Surveillance Programs Coming

NSA whistleblower Edward Snowden remained defiant in an online question and answer session hosted today by the Guardian newspaper.

NSA whistleblower Edward Snowden remained defiant in an online question and answer session hosted today by the Guardian newspaper.

“More detail on how direct NSA’s accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want,” Snowden wrote. “Phone number, email, user id, cell phone handset id (IMEI), and so on – it’s all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5 percent of those performed.”

Snowden has been at the center of a battleground between privacy rights and the intelligence community’s secret data gathering efforts for the past month. Snowden leaked details of a NSA electronic surveillance program known as PRISM, as well as an initiative called ‘Boundless Informant’ and a court order requesting a business division of Verizon Communications give up metadata about its customers’ phone calls on an ongoing basis.

Snowden left his job working at Booz Allen Hamilton as a NSA contractor and fled to Hong Kong, where he began leaking information about NSA surveillance programs in what he described as a crisis of conscious caused by the growing surveillance capabilities of the U.S. government.

“It was seeing a continuing litany of lies from senior officials to Congress – and therefore the American people – and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act,” he wrote.

The Gang of Eight is a colloquial term for a group of members of Congress who are briefed on intelligence matters.

“Seeing someone in the position of James Clapper – the Director of National Intelligence – baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.”

His disclosures triggered a wave of denials by technology giants such as Facebook and Google. The companies denied giving the NSA direct access to its servers, and stated they only responded to legal government requests to share information. In the days since then, a handful of companies, including Microsoft and Apple, have released limited information about government requests for user data.  

Advertisement. Scroll to continue reading.

“Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies,” Snowden wrote. “As a result of these disclosures and the clout of these companies, we’re finally beginning to see more transparency and better details about these programs for the first time since their inception.”

In response to a reader’s question about his fleeing to Hong Kong, Snowden accused the U.S. government of destroying any chance for him to get a fair trial in the United States. He added that he did not reveal any U.S. operations against “legitimate military targets,” only pointing out where the NSA had hacked civil infrastructure such as universities and hospitals.

“These nakedly, aggressively criminal acts are wrong no matter the target,” he wrote.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...

Cybercrime

On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their impact.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...