- ‘Due to personal reasons’ meme enables questionable behavior 6 Years Ago
- Why do white rappers write lyrics about being good hypothetical dads? 6 Years Ago
- Roger Stone posts, then deletes, Instagram of his judge with small crosshairs next to her Today 2:32 PM
- People are Googling Rihanna and their birthday in a Twitter challenge Today 2:13 PM
- Here are all of the Fortnite earthquake cracks thus far Today 1:21 PM
- New Apex Legends characters leaked by data miners Today 12:36 PM
- Ken Jeong falls back on crude humor and lazy stereotypes in ‘You Complete Me, Ho’ Today 12:24 PM
- 14 artsy cartoon mugs that’ll help make your days more creative Today 12:15 PM
- Netflix cancels ‘Jessica Jones’ and ‘The Punisher’ Today 11:26 AM
- YouTube is fueling the rise in flat earth believers Today 11:04 AM
- Review: Crackdown 3 is not a world worth saving Today 11:00 AM
- Scathing privacy report calls Facebook a ‘digital gangster’ Today 10:50 AM
- 21 Savage goes deep on 21 Savage memes Today 10:49 AM
- Everyone is debating the number of towels you should own Today 10:47 AM
- How to unlock the Fortnite Prisoner stage 4 skin Today 10:45 AM
The agency is implementing a “2-person rule” for copying data to portable devices.
While continuing to monitor the online secrets of countless Americans, the National Security Agency has announced plans to keep its own secrets more secure.
While testifying before the House Intelligence Committee Tuesday, NSA Director Keith Alexander told members of Congress that his agency would be implementing a “two-person” security system similar to the one adopted by the military in the aftermath of WikiLeaks. The new protocol is a direct response to the information leak by Edward Snowden, who exposed details of the NSA’s top secret PRISM program for monitoring online communications.
The “two-person rule” would require anyone copying data from a secure NSA network onto removable storage devices to do so with a second person on hand. In theory, this person ensures that whoever is making the copies is not collecting data for unauthorized purposes.
“Working with the director of national intelligence what we’re doing is working to come up with a two-person rule and oversight for those and ensure we have a way of blocking people from taking information out of our system,” Alexander said according to Forbes.
The agency director told the committee that this new security system is still a work in progress. But several members of the committee were surprised this kind of protocol didn’t already exist, given the number of private contractors outside the agency, like Snowden, who have access to sensitive material.
Snowden, 29, was a system administrator with the firm Booz Allen Hamilton. He copied thousands of key documents detailing the extent of the PRISM program, including a PowerPoint presentation and a contract between the NSA and Verizon and leaked them to the press before absconding to Hong Kong. Though he is gone, the NSA has nearly a thousand other systems administrators who, like Snowden, mostly work outside of the actual agency.
Snowden’s story is in many ways similar to the tale of Army Private Bradley Manning, who copied hundreds of thousands of top secret files onto CDs in order to leak them to WikiLeaks. So it should come as no surprise that the government is responding in a similar way. The two-person rule was adopted by the military after Manning’s information dumps.
Even though it would take just a conspiracy of two to circumvent this system, security experts say that implementation of the two-person rule should help protect government information. But according to John Pescatore, director of emerging security trends at the SANS Institute and a former NSA agent, government agencies have been slow to adopt the two-person rule because of how cumbersome it is to implement.
Alexander’s comments on improving his agency’s leak security came amid a broader legislative discussion about the NSA’s justification for the heavy-handed campaign of surveillance carried out under PRISM. The NSA chief claimed that more than 50 attacks have been foiled with information gathered from NSA surveillance programs. But when asked by Representative Jim Himes (D-Conn.) if this information was essential to upending these plots, Alexander did not respond.
Illustration by Jason Reed
Tim Sampson is a reporter who focused on the technology, business, and politics beats. He's also an established comedy writer, with work on Comedy Central and in The Onion and ClickHole.