Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Dispute over report about secret NSA budget
Friday - 8/30/2013, 9:38am EDT
WASHINGTON (AP) -- The National Security Agency on Thursday disputed a published report that secret intelligence budget files provided by agency leaker Edward Snowden show that the surveillance agency warned in 2012 that it planned to investigate up to 4,000 cases of possible internal security breaches.
The Washington Post, citing documents it said were provided by Snowden, said the NSA's concerns about insider threats were aimed at "anomalous behavior" of agency employees with access to top secret data. The account cited NSA concerns about "trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests."
The NSA concerns were outlined in top-secret documents provided to the Senate and House intelligence committees in February 2012, well before Snowden emerged this summer as the sole source of massive new disclosures about the agency's surveillance operations. The Post released only 17 pages of the entire 178-page budget document, along with additional charts and graphs, citing conversations with Obama administration officials who voiced alarms about disclosures that could compromise intelligence sources and methods.
An NSA spokesman disputed the Post's description of the agency's planned investigation of 4,000 possible security breaches, saying the effort actually amounted to a broad investigation of personnel to lessen the possibility of security risks.
"NSA planned to initiate 4,000 reinvestigations on civilian employees to reduce the potential of an insider compromise of sensitive information and missions," agency spokesman Vanee M. Vines said late Thursday. "Periodic reinvestigations are conducted as one due-diligence component of our multifaceted insider threat program."
Vines said such reinvestigations are required under a 2008 federal directive governing high-security clearances for intelligence workers.
As of Thursday night, the Post had not amended its reporting.
It was not clear from the Post's reporting how many of the 4,000 cases ultimately were investigated or how many posed serious breaches of security. Steven Aftergood, head of a project on government secrecy at the Federation of American Scientists in Washington, questioned whether many of the reported 4,000 cases were credible.
Referring to previous reports that the NSA's classified work force totals nearly 40,000, Aftergood said, "It would be hard to believe that one in every 10 NSA employees is a possible threat." He suggested that many cases might be caused by internal warnings arising from minor internal protocol errors or mistakenly accessed documents.
But aggressive high-profile Justice Department prosecutions in recent years of several former NSA staffers have shown the agency taking a toughened stance in cracking down on possible leaks. "In any case, a number that large is striking," Aftergood said.
The latest revelations also disclosed limited details about the highly classified 2013 intelligence "black budget," which previously only provided a topline of nearly $53 billion. The $52.6 billion intelligence budget described by the Post discloses that the NSA's portion was $10.5 billion in 2013 -- outstripped only by the CIA's $14.7 billion.
Aftergood said the CIA's budget growth from $3 billion in the 1990s to nearly $15 billion likely reflects its post-9/11 push into drone warfare and paramilitary operations overseas.
The Post's story also said the NSA and CIA were engaged deeply in offensive cyber operations and had conducted counterintelligence operations against the governments of Israel and Pakistan as well as traditional targets such as Iran, Russia, China and Cuba. The Post also reported that the NSA considers North Korea the hardest intelligence target to crack and said U.S. officials know almost nothing about the plans of North Korean leader Kim Jong Un.
Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.