草莓传媒

Exclusive: Years after jolting Snowden leaks, NSA battles to regain edge

WASHINGTON 鈥斅燬everal years after contractor Edward Snowden abruptly left the U.S. in 2013 with a trove of highly classified secrets, the National Security Agency and its counterparts in the U.S. intelligence community continue to struggle under the crushing impact of his actions.

鈥淚t should be pretty obvious to everyone that what Snowden did was a jolt to our system. Not only did he endanger what we’ve spent years developing, but he endangered the lives of the people we try to protect,鈥 NSA Deputy Director George C. Barnes told 草莓传媒 in an exclusive interview.

Although Snowden revealed specific sources and methods, which may now be obsolete, the principal damage is that he provided global insight into the NSA鈥檚 thought process, Barnes said.聽More egregiously, Barnes added, Snowden made the agency鈥檚 secrets the stuff of dangerous global gossip.

鈥淭he things he did have now become more commonplace in international dialogue; things that were never discussed in the past seem to be routine now. So, it heightens awareness, not just of those that he directed his activities toward, but for the global populace,鈥 Barnes said.

The enemy makes adjustments

After Snowden鈥檚 leaks, U.S. adversaries and enemies alike have made clever changes that turned what was already an uphill battle for the intelligence community against sometimes treacherous, partially exposed targets, into a fight against those same targets that now know how to hide completely from the NSA.

In February 2016, then-NSA Deputy Director Rick Ledgett told 草莓传媒 how the agency became aware of the situation.

HONG KONG – 2013: In this handout photo provided by The Guardian, Edward Snowden speaks during an interview in Hong Kong. Snowden, then a 29-year-old former technical assistant for the CIA, revealed details of top-secret surveillance conducted by the NSA regarding telecom data. (Photo by The Guardian via Getty Images)

鈥淲e track, through our intelligence sources, legitimate foreign intelligence targets of the United States who are saying to each other, 鈥業鈥檝e seen this stuff published about what NSA does, and I鈥檓 concerned about it because now I鈥檓 vulnerable,鈥欌 Ledgett said.

Because U.S. adversaries and enemies now know about the NSA鈥檚 highly evolved methods of tracking, listening and using modern tools such as algorithms to search though communications, many of them have simply slipped off the grid.

鈥淭hey have said, 鈥業 need to change the way that I communicate in order to avoid being detected by the NSA.鈥 And a lot of them have actually done that. And that includes at least one terrorist group that was actively engaged in operational plans directed against the United States,鈥 Ledgett said.

Barnes, saying he was not aware which terrorist group Ledgett was referring to, concluded the group鈥檚 members, after learning how they were being pursued, likely initiated efforts to cover their tracks.

U.S. intelligence officials, including former FBI Director James Comey, confirmed U.S. adversaries鈥 tool kit included publicly available, encrypted instant messaging applications.

鈥淣efarious actors 鈥 terrorists being a primary, but not the only example 鈥 try to be fluid in their use of applications. Most actors don’t just use one application to communicate; they use multiples,鈥 Barnes said.

In early 2016, Joshua Skule, now FBI assistant director in charge of intelligence, told 草莓传媒 that encryption had created a sanctuary for bad actors that even a warrant would not solve. 鈥淒espite the fact that we abide by the legal process and we go to get a warrant to intercept, we still would not be able to see the communications going on between two bad guys, two terrorists, two spies.鈥

鈥淲e鈥檙e missing pieces to that puzzle only because we don鈥檛 have the capability to see it,鈥 because, he added, 鈥渃ompanies have created the ability for two people to communicate, and only two people.鈥

An aerial view of the NSA campus on Dec. 1, 2016 in Fort Meade, Maryland. (Photo by Patrick Smith/Getty Images)

Brig Barker, a former FBI supervisory special agent until 2016 who led a counterterrorism team and worked as an interrogator in the Middle East and Africa, told 草莓传媒 that Snowden鈥檚 leaks dealt a 鈥渃rushing blow鈥 to authorities trying to track terrorists.

鈥淭errorists have created an impenetrable chamber or an unreachable island where they can conduct their communications on attack planning, network building, surveillance and new tactics that cannot be penetrated by counterterrorism authorities at this point,鈥 Barker said.

Hardened terrorists, hackers, spies and others with long intelligence dossiers have begun engaging on the same simple communications apps that ordinary people use.

Barker said, 鈥淭hey use mobile applications like WhatsApp, which employs 256-bit encryption that cannot be penetrated and cannot be monitored at this point. They can send photos. They can communicate by phone or text or whatever, and we don’t have access to that communication.鈥

In addition to only using apps with ironclad security, U.S. intelligence targets, especially terrorists, have gone beyond the open internet.

鈥淭errorists, like those involved with ISIS, meet and recruit individuals in an open forum like Twitter, and then, they’ll immediately drop down to the dark web where the critical planning and communications take place,鈥 Barker said.

That poses a difficult problem for the NSA, which tentatively has to contend with blind spots.

鈥淲e have to identify, find and follow bad entities across the continuum of different applications,” Barnes said.

Considering today鈥檚 sophisticated mobile communications devices, he said, 鈥淭he sky’s the limit as far as the number of apps that are out there. Our job is much more complicated because we have to identify and piece together fragments of information, across multiple applications, to try to thread together one theme, one intent and one communication.鈥

Working to regain its edge

Snowden鈥檚 gifts to U.S. adversaries, however, have a shelf life.

鈥淎ll advantage in electronic surveillance, all advantage and signals intelligence, is transient. You never have permanent capture of a target,鈥 former NSA Director Michael Hayden told 草莓传媒.

鈥淭he catastrophe in this case,鈥 said Hayden, 鈥渋s that you lost so many targets in such a compressed period of time. You lose targets, but you generally lose them over time.鈥

Hayden said what the NSA has to do is 鈥渢o continue the hunt, which it always does. It will recover, but it will take years and lots of money, but in the meantime, valuable intelligence will be lost.鈥

WhatsApp appears on a smartphone, Friday, March 10, 2017, in New York. In the past, spy agencies such as the CIA could have simply tapped servers at WhatsApp or similar services to see what people were saying. End-to-end encryption used now by services such as iMessage and WhatsApp makes that prohibitively difficult. (AP Photo/Patrick Sison)

Barnes is confident the NSA will eventually regain its undisputed superiority in the intelligence world.

鈥淚 think it will. Timing was not always on our side. We had the losses from Edward Snowden at a time when we were realizing, as a nation, that we were extremely fragile from a cybersecurity standpoint.鈥

To address its own losses and fragility at the time, the agency instituted the NSA 21 program, which, according to its website, 鈥渨ill position the agency to meet tomorrow’s challenges by staying ahead of threats while effectively leveraging our current missions 鈥 thwarting terrorists, protecting the warfighter, enhancing cybersecurity, protecting national security systems and strategic weapons 鈥 which are all critical elements in keeping our nation safe.鈥

The program comprises four key elements: people, integration, innovation and a new mission model.

NSA 21 is working, said Barnes, but 鈥渋t was a big change, and so, it takes a while for it to be changed, to settle in.聽 The last time we had a change in structure of that magnitude was in 2001, and it took really two to three years for everything to settle into the new structure.”

A hallmark of the change is the fusion of operational personnel that work two different mission authorities: foreign intelligence and information assurance.

鈥淲hen we’re looking at cybersecurity,” said Barnes, 鈥渨e need both sides to influence and inform each other so that we’re stronger. The intelligence side informs the defensive side as to what other nation and non-nation states’ cyberactors are doing, hopefully in advance of when they actually apply their techniques against us.鈥

Clearheaded about the challenges that lay ahead, Barnes acknowledges the NSA and the entire intelligence community, by default, suffered a serious setback and believes recognition is the first step to addressing it.

鈥淲e had to dynamically respond. It was inconvenient, and it made it even harder because the workforce was dealing with losses and structural adjustments. But we dove in and did it, and we’re working through it.鈥

J.J. Green

JJ Green is 草莓传媒's National Security Correspondent. He reports daily on security, intelligence, foreign policy, terrorism and cyber developments, and provides regular on-air and online analysis. He is also the host of two podcasts: Target USA and Colors: A Dialogue on Race in America.

Federal 草莓传媒 Network Logo
Log in to your 草莓传媒 account for notifications and alerts customized for you.