Risk
7/1/2013
11:31 AM
50%
50%

Snowden's Real Job: Government Hacker

NSA whistleblower's bland job title -- infrastructure analyst -- disguised actual responsibilities: Finding new ways to hack into foreign networks and telecommunications systems.

How did the apparently low-level IT-administrator-turned-whistleblower Edward Snowden, 30, manage to gain access to details of numerous top secret National Security Agency (NSA) surveillance programs?

Simple: He wasn't actually an IT or system administrator. Intelligence officials had repeatedly suggested this while also noting that the agency employs numerous contractors to help maintain its systems. Or as Gen. Keith Alexander, the director of the NSA, told ABC News last month about post-Snowden changes at the agency: "We're now putting in place actions that would give us the ability to track our system administrators, what they're doing and what they're taking, a two-man rule, we've changed the passwords."

In fact, Snowden himself stated in a video that his most recent job title wasn't that of system administrator. "My name is Ed Snowden, I'm 29 years old. I worked for Booz Allen Hamilton as an infrastructure analyst for NSA in Hawaii," he told Guardian journalist Glenn Greenwald in a video recorded in Hong Kong and broadcast after he'd asked to be identified as the source of the leaks involving Prism and other surveillance programs. Prior to that job, Snowden said, "I've been a systems engineer, systems administrator, senior adviser for the Central Intelligence Agency, solutions consultant, and a telecommunications information system officer."

[ Proposed legislation would curb NSA surveillance powers. Read Senate Bill Seeks Greater NSA Surveillance Oversight. ]

Many commentators read "infrastructure analyst" as NSA-speak for a system administrator role, and many news reports of Snowden's leaks actually labeled him as being a sysadmin. But according to intelligence officials, the infrastructure analyst role refers to a position tasked with finding new ways to hack into foreign networks, to keep the NSA abreast of the signals intelligence it's charged with gathering.

Why hasn't Snowden's real role been highlighted to date? Principally because government officials haven't wanted to highlight the online espionage equivalent of breaking and entering into other countries' networks and telecommunications equipment, according to a Sunday report in The New York Times that cited no sources.

That revelation finally explains how 30-year-old Snowden came to possess official documents relating to some of the country's most sensitive surveillance programs, including intercepts of online audio, emails and video (Prism), traffic analysis of cell phone calls (Mainway), Internet metadata collection (Marina), and telephone content interception (Nucleon), not to mention secret court orders authorizing the surveillance programs.

Snowden said he took a job in March as a contractor at Booz Allen Hamilton -- reportedly taking a pay cut -- to gain access to the documents that he's since leaked.

"My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked," Snowden told The South China Morning Post prior to leaving Hong Kong for Moscow last week. "That is why I accepted that position about three months ago."

Snowden now remains in limbo -- his U.S. passport has been revoked -- in the transit area of Moscow's Sheremetyevo airport.

Regardless, expect the leaks to keep on coming. Greenwald has said that Snowden leaked thousands of documents, of which at least dozens are newsworthy.

Most recently, the Guardian Sunday released documents that it said detailed NSA operations against 38 embassies and missions, which were labeled as targets. That target list included not just Middle Eastern countries, but also U.S. allies such as France, Greece, Italy, Mexico, Japan and South Korea. Detailed interception methods included bugs planted in fax machines used to transmit official cables between the European Union embassy in Washington and EU headquarters in Brussels, as well as antenna intercepts and taps in networking cables.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?