Mobile version Today: 04.10.2015 Last update 12:01 | Select date
home sitemap write a letter facebook twitter
Add to favourites RSS

About us
    London Gold Fix Closed – Sign of Drastic Changes the World Financial System...  
    Nuland attempts Kiev Version 2.0 in Skopje  
    Mission Imperative: Why the West and Kiev Regime Must Kill the Truth  
Obama Accuses Russia of Going After America’s “Good Guy Terrorists”
Should US Ally with Al Qaeda in Syria?
all articles
Afghan conflict: US investigates Kunduz hospital bombing...

Chinese navy warships make 1st visits to Scandinavian ports...

Tens of thousands hold pro-refugee rally in Vienna...

Russia to intensify Syria airstrikes against IS...

Pope Francis to open Church synod amid gay row...

East Jerusalem attack a clear message to Israel: Hamas...

Turkey journalists protest against media suppression...

News Analysis: Chinese president's initiatives at UN "generous opportunity" for developing countries...

France floods: Several dead on Riviera after storms...

Russia says to step up air strikes in Syria...

Putin promised to use influence in Donbass for progress on Minsk deal: Kremlin...

Taliban hold out in northern Afghan city, district in northeast falls...

36,000 troops to take part in biggest NATO "war games" in 13 years...

Afghan hospital attack in Kunduz possibly criminal - UN...

Syrian crisis: Russia vows to intensify air strikes...

all news


back print

​Snowden used common web crawler tool to collect NSA files

News | 09.02.2014 | 18:22

Whistleblower Edward Snowden used “inexpensive” and “widely available” software to gain access to at least 1.7 million secret files, The New York Times reported, quoting senior intelligence officials investigating the breach.

The collection process was “quite automated,” a senior intelligence official revealed. Snowden used “web crawler” software to “search, index and back up” files. The program just kept running, as Snowden went about his daily routine.

“We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said.

Investigators concluded that Snowden’s attack was not highly sophisticated and should have been easily detected by special monitors. The web crawler can be programmed to go from website to website, via embedded links in each document, copying everything it comes across.

The whistleblower managed to set the right algorithm for the web crawler, indicating subjects and how far to follow the links, according to the report. At the end of the day, Snowden was able to access 1.7 million files including documents on internal NSA networks and internal “wiki" materials, used by analysts to share information across the world.

Reportedly, Snowden had full access to the NSA’s files, as part of his job as the technology contractor in Hawaii, managing computer systems in a faraway outpost that focused on China and North Korea.

Officials added that the files were accessible because the Hawaii outpost was not upgraded with the latest security measures.

The web crawler used by Snowden was similar to, but not as advanced as the Googlebot crawler, used by Google and its search engine to access billions of websites and download their contents for fast search results.

The whistleblower did raise some flags while working in Hawaii, prompting questions about his work, but he was able to ward off criticism successfully.

“In at least one instance when he was questioned, Mr. Snowden provided what were later described to investigators as legitimate-sounding explanations for his activities: As a systems administrator he was responsible for conducting routine network maintenance. That could include backing up the computer systems and moving information to local servers, investigators were told,” according to the report.

Snowden admitted in June to taking an undisclosed number of documents, which in the last half-year have been regularly relied on by the international media for a number of high-profile reports about the US National Security Agency and its British counterpart, GCHQ. He was then granted political asylum by Russia and now resides in Moscow.

The leaks have unveiled a number of previously unreported NSA operations, including those involving dragnet surveillance programs that put the digital lives of millions, if not billions, of individuals across the world into the possession of the US government.


Tags: National Security Agency US Snowden

Rating: 4.7 (3)      Your rating: 1 2 3 4 5     
Send by e-mail

To add a comment, Login or Register

Slave Descendant? Don’t Call Me Dave!

British Prime Minister David Cameron had some stiff upper-lip advice for Jamaicans while on an official visit this week to the Caribbean state. He was urged to make a formal apology for Britain’s historic role in the transatlantic slave trade and to consider monetary reparations for the descendants of African slaves, who account for the vast majority of Jamaica’s population...

Aeroflot AFISMA African Union Africom AIIB AIPAC Al Qaeda Al Shabaab Al-Jazeera ALBA Amnesty International Anonymous Ansar Allah APEC Arab League ASEAN ATAKA Atomstroyexport Bank for International Settlements Bank of America Barclays Basel Committee BBC Bilderberg Club Black Bloc BlackRock Blackwater Boco Haram BP BRICS CARICOM CELAC Center for Responsive Politics CEPAL Chatham House Chevron CIA CICA CIS Citigroup CNN Committee of 147 Committee of 300 Council of Europe Council on Foreign Relations Crescent Crescent Petroleum CSTO Customs Union CyberBerkut DARPA Davos DEA Defense Intelligence Agency DIA Dragon Family E.ON Eager Lion ECOWAS EDA ELNET Enbridge Pipelines ETA EU EULEX EurAsEc Eurasian Union European Commission European Court of Human Rights European Union Exxon Mobil Facebook FAO FARC FATAH FBI FDA Federal Reserve FIFA Financial Action Task Force Financial Stability Board Fitch FIVE EYES Franklin Templeton Freedom House FRS FSB FTA FUEN G-4 G20 G7 G8 GATA Gazprom GCHQ GECF Gladio Glonass Goldman Sachs Google Green Group Greenpeace GUAM Guardian Gulf Cooperation Council Hague Tribunal HAMAS Heritage Foundation Hezbollah Hizb ut-Tahrir Hollywood HSBC Human Rights Watch IAEA IEA IHRC IMF International Criminal Court Interpol IOC ISAF Islamic jihad Islamic Revolution Guards Corps ITERA Jamestown Jobbik JP Morgan Jundullah KFOR KLA Ku Klux Klan Liberation Tigers of Tamil Eelam Lukoil Massachusetts Institute of Technology Mercosur Microsoft Missile defense Missile Defense Agency Monsanto Moody's Morgan Stanley Mossad Most-Favoured Nation Mujahedin-e Khalq Muslim Brotherhood Nabucco NAFTA Naftogaz NASA Nation of Islam National Security Agency NATO NDAA NDI NED Non-aligned Movement NORAD Nord Stream NORTHCOM Northern Distribution Network NSA OECD Oerlikon OIC OPCW OPEC Open Government Partnership Organization of American States OSCE OTW movement OUN / UPA PACE PACOM Pan-Europa movement Pegida Pentagon PJAK PKK Podemos PRISM PYD Red Cross Renova Republican Party Rosatom Roscosmos Rosneft Rosoboronexport Ruhrgas RusAl RWE SABSA Scientology Shanghai Cooperation Organization Shell Siemens South Stream Southern Command Standard & Poor's Statoil Strategic Nuclear Forces Stratfor SWF SWIFT Syrian National Council SYRIZA Taliban Tamarod TAPI TeleSur TNK-BP Total Transneft TTIP TTP Turkish Stream Twitter UN UN International Court UNASUR UNESCO UNICEF USAID Valdai Club Visegrad Group Wall Street Westinghouse WHO Wikileaks World Bank WTO Yukos “Mass Atrocity Response Operations”

Republishing is welcomed with reference to Strategic Culture Foundation on-line journal



© Strategic Culture Foundation


Main Politics History&Culture Archive Authors Popular
  Economics Columns About Contact