Snowden 2.0: Its Déjà Vu All Over Again At The NSA

After the humiliation in 2013 when the Snowden affair first came out, the NSA has just announced that another one of its subcontractors is charged with having stolen confidential data. 

Beginning of October, the US Ministry of Justice informed the public that an individual was arrested as a suspect in committing espionage against the NSA.

Harold Thomas Martin III, or Snowden 2.0 as he is now called, was an employee of Booz Allen Hamilton, a private organisation in charge of providing subcontractors for US agencies particularly specialized in espionage. 

This second Snowden was accused of having stolen ultra-secret codes belonging to the NSA and of having taken them outside the agency’s perimeter.

If, until now, the question of whether or not a human error was at stake, it was recently revealed that Harold Thomas Martin copied an impressive amount of confidential information (50,000 Gb, to be exact). His purpose? Unknown until this date, which is why we risk hearing about this matter time and time again.

According to the New York Times, the FBI is currently trying to establish whether or not this supposed data extraction is linked to the recent NSA hack conducted by the Shadow Brokers or to the not-so-recent public revelation by Edward Snowden. This second lead turned out false, as it appears that Harold Martin was active way before the famous whistleblower.

In retrospect, perhaps the title “Snowden: The Origins” would have been more suitable for this article. The suspect had apparently been copying secret source codes developed by the intelligence agency in order to infiltrate the IS of other states for almost two decades. With all that, he is now facing 10 years of imprisonment for government hacking.

Insider threats are ringing at the door…will cybersecurity answer?

The news is not only embarrassing for the NSA, which, for the second time in the past three years, has seen one of its subcontractors engage in a game of “who spies who?”, but also raised questions where the Booz Allen Hamilton group is concerned. After all, Edward Snowden was one of their employees as well. We think one simple meme can be used to summarize this whole affair:
Shame NSA

If, until now, malware was the main worry for cybersecurity experts, recent events have changed this reality. According to a study conducted by HfSResearch, insider threats have now joined the top of major cyber-fears. Whether intended to cause damage or just accidental, the insider threat is something that over 69% of respondents said they’ve already been confronted with.

In the world of spying, being able to trust one’s agents is a must. In the event one of them turns out to be a double-agent, roles are reversed and the spying agency becomes the spied. This can also be applied to companies, when talking about the relationship between management and its employees. How do we make sure that this trust is well placed? And how can we surpass a failure? In the blink of an eye, we’re caught in an endless vicious cycle of paranoia. Which is exactly the ongoing situation in the United States.

Without a doubt, we owe our gratitude to the NSA for the numerous debates it has stimulated within the cybersecurity public forum debate. The imminent premiere on the big screen of Oliver Stone’s movie comes just in time for another wave of appeals directed at President Obama in order to pardon Edward Snowden. The Harold T. M. incident only adds insult to injury. Should we or should we not clear of all charges the now Moscow-based whistleblower? Public opinion is divided in two. The final decision is even more awaited, as it may set a precedent for similar cases to come.

In response, The Washington Post published an editorial in which it underlines, again, the fact that Snowden violated the law, as well as broke his contractual obligations by copying 1,5 million confidential documents and then leaking them to the press. The journal made it clear that it places national security above all and reproaches to the fugitive that, by revealing top-secret information with concern to the Prism surveillance project, it has gravely endangered the United States.

Aside from the very obvious downside, Antoine Lefebure, French Media Historian, specialised in Communications Technologies and author of “The Snowden affair: how the United States is spying on the world”, considers that the ex-subcontractor working for the NSA actually did a huge favor for his country.

Before the Snowden affair, there was no debate whatsoever at a parliamentary level or even at a public level with concern to the dangers of cyber-surveillance … Snowden had a very positive influence on the matter, even though, in doing so, he had broken the confidentiality pledge”.source: Sputnik News.

If knowledge is power, then knowing the NSA’s secrets is a huge gain for the enemy, whoever that enemy might be. At the same time, knowing all that the agency still has to hide, this is a huge step forward for the American people.

Having chosen privacy over security, the NSA is now standing bare before the very citizens it is trying to protect. It remains to be seen if the Harold T. M. affair is a prequel to the original Snowden? Or is he just your ordinary double agent?

Information- Management:  Secret Arrest Of A National Security Agency Contractor:  

Second Snowden Has Leaked Drone Docs:

 

« Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020
Internet of Things – For Smart and Secure Cities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.