Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

More than a year after ex-National Security Agency contractor Edward Snowden began leaking details of the agency’s electronic surveillance programs, questions remain about how he accessed so many documents, and about the technology they described. At the Black Hat computer security conference in Las Vegas last week, Rachel Marsden put some of those questions to John C. Inglis, who retired as deputy director of the NSA in January. Since June, Inglis has been a strategic advisor to Securonix, a Los Angeles company that sells software to help companies detect unauthorized actions by their employees.

Edward Snowden has been described by NSA officials as an administrative employee, working for an outside contractor. Yet he was able to access to all kinds of top-secret classified information. How did this happen?

Snowden was a system administrator, so by design he had more privileges. Does that expose a weakness in the system? In hindsight, Snowden went far beyond where we would have expected him to go. The challenge is how do you extend trust to individuals that you’ve gone to great time and trouble to find, vet, and develop confidence in, and allow them to exercise ingenuity, innovation, and creativity? We need to up our game without crushing the 99.9 percent of people who have operated faithfully. We need to focus on behaviors—on the access to data in real time, instead of on defending perimeters, operating systems, or artifacts. You’re looking for a change in behavior that is an anomaly and warrants close examination.

Given what you know about the technological capabilities of other intelligence services, what is the possibility they accessed the full, unredacted collection of documents Snowden had without his knowledge?

I’d say it’s high. He’s a smart fellow. He knows something about security and encryption. But what we have determined over 70 years of cryptologic history is that single minds never prevail against a diverse set of minds. The idea that a single person could secure information against the dedicated efforts of intelligence services that are quite capable is asking a lot. There’s some amount of hubris in that.

How do you respond to Snowden saying that there is no provision for an NSA contractor to whistleblow?

There is law and policy that allows contractors to exercise whistleblower provisions. The record shows he didn’t attempt to do any of that. He could have privately sent a letter to congressional representatives, senators, the press. He said he complained around April 2013 in writing. It wasn’t a complaint, it was a straightforward question about something he had learned in a course. He received an answer that day from an NSA lawyer. This was four months after, by his own admission, he was already sharing information with reporters. I don’t see how that constitutes an attempt to be a whistleblower.

How does the NSA reconcile its dual missions of signals intelligence (finding ways to gather private data) and information assurance (finding ways to protect U.S data)? For example, the agency has been accused of pushing the flawed Dual_EC_DRBG encryption standard (see “NSA Leak Leaves Crypto-Math Intact but Highlights Known Workarounds”).

The bias must be defense. And if we were to pull the information assurance mission away from the signals intelligence mission, I’m confident that you will find a dumbing down of the insights that the information assurance guys had about the true nature of the vulnerabilities in cyberspace. They would be cut off from those who discover those vulnerabilities. The vast preponderance of things that NSA discovers are pushed for purposes of defense to those who defend these systems.

Could technology be used to make mass surveillance programs more respectful of privacy? Former NSA cryptographer William Binney says that he helped build a system with such safeguards but that it was rejected by the agency’s leaders.

It would be foolhardy for NSA to reject technology that would at once help us pursue national security and defend privacy and civil liberties. I know it ultimately didn’t pass muster. There is incidental collection, as there are two sides to every communication in the world, but you’re bound by law and policy to treat innocents as innocent until you have compelling information to treat them otherwise. If you asked [NSA employees] how they compromise between privacy and national security, they would say that the question is flawed because they’re expected to do both.

6 comments. Share your thoughts »

Credit: Photo courtesy of Securonix

Tagged: Computing, Communications, Web, Mobile, privacy, surveillance, NSA, Edward Snowden

Reprints and Permissions | Send feedback to the editor

Rachel Marsden Guest Contributor

View Profile »

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me