More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor's disclosures. But they already know how the leaks happened.

"We have an extremely good idea of exactly what data he got access to and how exactly he got access to it," says the NSA's chief technology officer, Lonny Anderson.

In interviews with NPR, two government officials shared that part of the Snowden story in one of the most detailed discussions of the episode to date.

According to the officials, the documents Snowden leaked — the memoranda, PowerPoint slides, agency reports, court orders and opinions — had all been stored in a file-sharing location on the NSA's intranet site. The documents were put there so NSA analysts and officials could read them online and discuss them.

"Unfortunately for us," one official said, "if you had a top secret SCI [sensitive compartmented information] clearance, you got access to that."

The importance of such information-sharing procedures was one of the lessons of the Sept. 11, 2001, attacks. Law enforcement and intelligence agencies were unable to "connect the dots" before the attacks because they were not always aware of what other agencies knew.

As a systems administrator, Snowden actually had the responsibility to go to the NSA intranet site and move especially sensitive documents to a more secure location. The assignment was the perfect cover for someone who wanted to leak documents.

"It's kind of brilliant, if you're him," an official said. "His job was to do what he did. He wasn't a ghost. He wasn't that clever. He did his job. He was observed [moving documents], but it was his job."

Snowden's supervisors, however, did not realize that he was making digital copies of the secret documents. The officials interviewed by NPR would not say how Snowden managed to take the files out of his workplace, citing the ongoing investigation.

As of June, when Snowden's disclosures became public, some NSA computers were equipped with USB ports where thumb drives could be used. As the NSA's chief technologist and information officer, Anderson is responsible for implementing security reforms to guard against future data leaks. NSA security officers have now limited the options employees have for storing data on their own, thumb drives included.

"One thing we have done post-media leaks," Anderson says, "is lock those down hard, so those are [now] all in two-person control areas."

With new security reforms in place, it should be impossible for people like Snowden to work completely on their own. "We're going to remove anonymity from our network," Anderson says. "If you've got privileged access to our network, like a systems administrator [has], if you're being given a privilege that very few people have, you're not going to do anything alone."

The NSA will now be "tagging" sensitive documents and data with identifiers that will limit access to those individuals who have a need to see the documents and who are authorized by NSA leadership to view them. The tagging will also allow supervisors to see what individuals do with the data they see and handle.

"Someone today could [still] get access to that intranet [location]," Anderson says, "because it still exists. Could someone today do what [Snowden] did? No."

Among the questions raised by the NSA's security reforms, however, is whether the changes will inhibit the kind of information-sharing the agency wanted to promote in the first place.

"You can't make good policy if you can't keep more than one idea in your head at the same time," warns Joel Brenner, a former NSA inspector general. "One of those important ideas is that we have to do a really good job of sharing information and disseminating it to people who really need to know it and doing it fast. The other really important idea is that a lot of this information, if it gets into the hands of people who ought not have it, hurts us badly. So that information has to be protected. You can't separate those ideas."

Copyright 2015 NPR. To see more, visit http://www.npr.org/.

Transcript

STEVE INSKEEP, HOST:

Okay. Let's learn some more here. Officials tell NPR they understand how Edward Snowden got his hands on the documents he subsequently leaked. Here's NPR's Tom Gjelten.

TOM GJELTEN, BYLINE: The Snowden disclosures just keep coming. Almost every week some newspaper publishes some new detail about the NSA's surveillance programs or the agency's relations with the court that oversees its activities. It may seem no one knows where this will end, but the NSA's chief information officer, Lonny Anderson, says investigators have Snowden's leaks mostly figured out.

LONNY ANDERSON: We have an extremely good idea of exactly what data he got access to and how exactly he got access to it.

GJELTEN: In interviews with NPR, two government officials share that part of the Snowden story in one of the most detailed discussions of the case to date. They say the documents that Snowden leaked, the memoranda, the PowerPoint slides, the reports, were all stored on a part of the NSA's internal website. The documents were put there so NSA analysts could read them online and discuss them. Anyone with the right top secret clearance could visit that page and read the documents.

One lesson of 9/11 was that when secret information is shared, analysts are better able to connect the dots. As a systems administrator, Snowden actually had the responsibility to go to that intranet page and move especially sensitive documents to a more secure location. It was the perfect cover for someone who wanted to leak the documents. Because of Snowden's leaks, says the NSA's Lonny Anderson, that document sharing site has changed.

ANDERSON: Someone today could get access to that intranet because it still exists. Could someone today do what he did? No.

GJELTEN: Officials tell NPR Snowden was actually observed accessing secret documents, but the assumption was he was just doing his job. We now know he was taking the documents for his own purposes, even a top secret surveillance court opinion. Lonny Anderson.

ANDERSON: Then you go back to who put the opinion there. He didn't put the opinion there. He just took advantage of the fact the opinion was there.

GJELTEN: The officials interviewed by NPR won't say how Snowden was able to take the NSA documents out of his workplace. That question is part of an ongoing investigation. As of last June, when Snowden's leaks came out, some NSA computers were equipped with USB ports where thumb drives could be used.

As the agency's chief technologist, Lonny Anderson says NSA security officers have now limited the options employees have for storing data on their own, thumb drives included.

ANDERSON: One thing we have done post-media leaks, if you will, is lock those down hard so that those are all in two-person control areas.

GJELTEN: Anderson says the NSA now intends to make it impossible for people like Snowden to work completely on their own. Going forward, Anderson says, the ability to move anonymously on NSA networks will be gone.

ANDERSON: If you've got privileged access to our network like a systems administrator, if you're being given a privilege that very few people have, you're not going to do anything alone.

GJELTEN: The NSA will now be tagging data with identifiers. This means people the agency leadership decide don't need to see a document won't be able to see it. And those who do see it will have their handling of that document monitored and recorded. Joel Brenner, a former NSA inspector general, says one lesson of the Snowden episode is that the agency apparently had trouble keeping two important ideas in mind at the same time.

JOEL BRENNER: One of those important ideas was, and is, that we've to do a really good job at sharing information, at disseminating it to people who really need to know it, and doing it fast. The other really important idea is that a lot of this information, if it gets in the hands of people who ought not have it, hurts us very, very badly. So that information has to be protected.

GJELTEN: With the NSA's new determination to protect information, there should be more security. The danger is that there may be less information sharing. Tom Gjelten, NPR News, Washington.

INSKEEP: You hear Tom's reporting right here on MORNING EDITION from NPR News. Transcript provided by NPR, Copyright NPR.

300x250 Ad

Support quality journalism, like the story above, with your gift right now.

Donate