Q&A: Former NSA Deputy Director John C. Inglis
More than a year after ex-National Security Agency contractor Edward Snowden began leaking details of the agency’s electronic surveillance programs, questions remain about how he accessed so many documents, and about the technology they described. At the Black Hat computer security conference in Las Vegas last week, Rachel Marsden put some of those questions to John C. Inglis, who retired as deputy director of the NSA in January. Since June, Inglis has been a strategic advisor to Securonix, a Los Angeles company that sells software to help companies detect unauthorized actions by their employees.
Edward Snowden has been described by NSA officials as an administrative employee, working for an outside contractor. Yet he was able to access to all kinds of top-secret classified information. How did this happen?
Snowden was a system administrator, so by design he had more privileges. Does that expose a weakness in the system? In hindsight, Snowden went far beyond where we would have expected him to go. The challenge is how do you extend trust to individuals that you’ve gone to great time and trouble to find, vet, and develop confidence in, and allow them to exercise ingenuity, innovation, and creativity? We need to up our game without crushing the 99.9 percent of people who have operated faithfully. We need to focus on behaviors—on the access to data in real time, instead of on defending perimeters, operating systems, or artifacts. You’re looking for a change in behavior that is an anomaly and warrants close examination.
Given what you know about the technological capabilities of other intelligence services, what is the possibility they accessed the full, unredacted collection of documents Snowden had without his knowledge?
I’d say it’s high. He’s a smart fellow. He knows something about security and encryption. But what we have determined over 70 years of cryptologic history is that single minds never prevail against a diverse set of minds. The idea that a single person could secure information against the dedicated efforts of intelligence services that are quite capable is asking a lot. There’s some amount of hubris in that.
How do you respond to Snowden saying that there is no provision for an NSA contractor to whistleblow?
There is law and policy that allows contractors to exercise whistleblower provisions. The record shows he didn’t attempt to do any of that. He could have privately sent a letter to congressional representatives, senators, the press. He said he complained around April 2013 in writing. It wasn’t a complaint, it was a straightforward question about something he had learned in a course. He received an answer that day from an NSA lawyer. This was four months after, by his own admission, he was already sharing information with reporters. I don’t see how that constitutes an attempt to be a whistleblower.
How does the NSA reconcile its dual missions of signals intelligence (finding ways to gather private data) and information assurance (finding ways to protect U.S data)? For example, the agency has been accused of pushing the flawed Dual_EC_DRBG encryption standard (see “NSA Leak Leaves Crypto-Math Intact but Highlights Known Workarounds”).
The bias must be defense. And if we were to pull the information assurance mission away from the signals intelligence mission, I’m confident that you will find a dumbing down of the insights that the information assurance guys had about the true nature of the vulnerabilities in cyberspace. They would be cut off from those who discover those vulnerabilities. The vast preponderance of things that NSA discovers are pushed for purposes of defense to those who defend these systems.
Could technology be used to make mass surveillance programs more respectful of privacy? Former NSA cryptographer William Binney says that he helped build a system with such safeguards but that it was rejected by the agency’s leaders.
It would be foolhardy for NSA to reject technology that would at once help us pursue national security and defend privacy and civil liberties. I know it ultimately didn’t pass muster. There is incidental collection, as there are two sides to every communication in the world, but you’re bound by law and policy to treat innocents as innocent until you have compelling information to treat them otherwise. If you asked [NSA employees] how they compromise between privacy and national security, they would say that the question is flawed because they’re expected to do both.
Geoffrey Hinton tells us why he’s now scared of the tech he helped build
“I have suddenly switched my views on whether these things are going to be more intelligent than us.”
ChatGPT is going to change education, not destroy it
The narrative around cheating students doesn’t tell the whole story. Meet the teachers who think generative AI could actually make learning better.
Meet the people who use Notion to plan their whole lives
The workplace tool’s appeal extends far beyond organizing work projects. Many users find it’s just as useful for managing their free time.
Learning to code isn’t enough
Historically, learn-to-code efforts have provided opportunities for the few, but new efforts are aiming to be inclusive.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.