Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Recent NSA Leak Arrest: A Few Observations and a Lesson
Lawfare ^ | June 7, 2017 | Nicholas Weaver

Posted on 06/07/2017 8:45:11 PM PDT by 2ndDivisionVet

Reality Leigh Winner, a recently separated Air Force linguist and a new hire by Pluribus International Corporation as a support contractor with a Top Secret clearance, allegedly searched for and printed out a Top Secret government report, folded it up, and dropped it in the mail to an online news outlet. Yesterday, the U.S. Attorney’s office revealed her arrest in an unsealed indictment. The arrest warrant and independent reporting indicate that the classified material was almost certainly a report published by the Intercept just two hours before the indictment became public.

Winter apparently searched for this report within classified systems on May 9th and at some later point mailed the document to The Intercept. The Intercept attempted to verify the authenticity of the document (marked TS//SI//OC//REL USA,FVEY) through both official and unofficial channels. Upon being contacted for confirmation, both official and unofficial channels reported the apparent breach and the FBI became involved on June 1st. When the FBI interviewed Winner on June 3rd, she confessed to being responsible for disclosing the material and was subsequently arrested. Below are a few brief thoughts, both on the arrest and the leaked document itself.

This isn’t the beginning of a “war on leaks.”

The FBI received information regarding a stolen classified document. The document was clearly printed, folded, and physically mailed. Internal records showed only six individuals had printed the document, Winner was the only person who printed the document and also had email communication with the receiving news outlet. The document was mailed from the town where Winner lives. Winner herself confessed her involvement. No reasonable agency would decline to investigate the breach and no reasonable prosecutor would decline to seek charges on the basis of such clear-cut criminality.

Insider controls (sort of) worked.

Insider threat controls clearly didn’t prevent the breach from occurring, but they do seem to have worked after the fact. It is not clear why a linguist specializing in Pashto, Farsi, and Dari would need to access a report on Russian hacking. But the FBI was easily able to identify the possible source of the leak.

The Intercept messed up, but only somewhat.

There has been considerable commentary on whether the Intercept burned its own source. It is clear that inquiries to verify the documents authenticity triggered the leak investigation that lead to Winner. The Intercept journalists conduct may have shifted the arrest a few days earlier, but it was probably inevitable. Between the identifying microdots in the document itself, the presumably limited distribution and printing records would have lead to Winner once the report was published.

For those who cheer the protection of these kinds of sources, the bigger problem, as highlighted by Matthew Garrett, is the incompleteness of The Intercept’s instructions to potential sources. This source did almost everything right on the guide: the only correspondence known with The Intercept was innocuous, unrelated, and significantly older, from a private account that just happened to be accessible from her work computer. The source used U.S. mail, dropped in a mailbox, with no return address. But the instructions never mention that modern computers, especially those involving sensitive matters, are often configured to log access. Or that color printers place a hidden serial number on everything they print. Or that even the city of origin might convey significant information. Media outlets that are representing themselves as secure to would-be leakers, do so without communicating the necessary understanding the risk.

The Intercept’s response plays poorly.

It took 20 hours for The Intercept to respond to Winner’s arrest with a rather formal and legalistic statement. The middle paragraph seems intended to be simultaneously honest and deceptive:

While the FBI’s allegations against Winner have been made public through the release of an affidavit and search warrant, which were unsealed at the government’s request, it is important to keep in mind that these documents contain unproven assertions and speculation designed to serve the government’s agenda and as such warrant skepticism. Winner faces allegations that have not been proven. The same is true of the FBI’s claims about how it came to arrest Winner.

In the response they note that the government requested the unsealing, apparently to imply this is not standard procedure. In noting these are still mere allegations, The Intercept also seems to imply there is some reason to doubt the FBI’s version of how they discovered Winner’s identity.

The value of the story is minimal—certainly not worth the cost to the source.

Despite it’s length, The Intercept’s story conveys essentially no new substantive knowledge. We already knew that the Russians were targeting voting systems in multiple states using a variety of methods. The only thing The Intercept’s reporting adds, beyond the publication finally acknowledging the severity of Russian hacking, is a somewhat more detailed analysis of a single incident, which does demonstrate that the Russians simply ignored Obama’s diplomatic missives to “cut it out.”

The actual attack depicted in the document was not a particularly enthusiastic campaign. The Russians appeared to phish a voting support system vendor and used this information to then phish various county voting offices with malicious (presumably macro-enhanced) Word documents. Nothing about zero days or other ninja-level hacking, just the boring persistent stuff used by any halfway competent Annoyingly Petulant Teenager. It also doesn’t include whether this was intended to tamper with voter rolls (to feed into a “stolen election” narrative if Trump lost) or simply preparing the ground for subsequent elections.

Lesson: Buy yourself a U2F security key and use it.

It is well understood in the security community that most two-factor authentication systems, including SMS or authenticator applications, do not actually protect against phishing. In order to defeat those systems, the phisher need only have their system immediately attempt to log in using the phished credentials and then, if faced with a two-factor request, present that request to the victim as well. The only commonly-available safeguard against this is Universal Two Factor (U2F) security keys.

With U2F, the security key itself generates a unique key for each web site and, since it communicates with the browser, it knows that the phishing site is not the real thing and thus will not authenticate. If just ten Lawfare readers buy and set-up a U2F security key, my time in writing this will be well spent.


TOPICS: Computers/Internet; Government; Military/Veterans; Politics
KEYWORDS: realitywinner; russia

1 posted on 06/07/2017 8:45:11 PM PDT by 2ndDivisionVet
[ Post Reply | Private Reply | View Replies]

To: 2ndDivisionVet

Number one takeaway. Someone with all of that America and Trump hating crap in her social media was given a clearance. It was all there BEFORE she was hired.


2 posted on 06/07/2017 8:58:07 PM PDT by DesertRhino (Dog is man's best friend, and moslems hate dogs. Add that up.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

If anyone should be shot for treason in our time, it is this b!tch.


3 posted on 06/07/2017 9:07:29 PM PDT by Bon mots (Laughing at liberal tears!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet
Despite it’s length, The Intercept’s story conveys essentially no new substantive knowledge.

Really, Lawfare?!

Regards,

4 posted on 06/07/2017 9:08:02 PM PDT by alexander_busek (Extraordinary claims require extraordinary evidence.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Comey leaked like a sive.


5 posted on 06/07/2017 9:21:42 PM PDT by Paladin2 (No spelchk nor wrong word auto substition on mobile dev. Please be intelligent and deal with it....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

The article claims that The Intercept was vague in its instructions to potential sources, but the bottom line is that someone who has had security clearance for classified information, should be smart enough to know the pitfalls of sharing classified material in the way she did. The article makes it sound like it’s The Intercept’s fault she got caught, and not the traitor’s. And even though The Intercept issued a statement saying that “Winner faces allegations that have not been proven,” the fact is that she has admitted her guilt. What’s to be proven?


6 posted on 06/07/2017 9:36:06 PM PDT by mass55th (Courage is being scared to death - but saddling up anyway...John Wayne)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

sieve


7 posted on 06/07/2017 9:53:37 PM PDT by Paladin2 (No spelchk nor wrong word auto substition on mobile dev. Please be intelligent and deal with it....)
[ Post Reply | Private Reply | To 5 | View Replies]

To: 2ndDivisionVet

We already knew that the Russians were targeting voting systems in multiple states using a variety of methods. The only thing The Intercept’s reporting adds, beyond the publication finally acknowledging the severity of Russian hacking, is a somewhat more detailed analysis of a single incident, which does demonstrate that the Russians simply ignored Obama’s diplomatic missives to “cut it out.” >>> from the article this is #fakenews. we only know that phishing expeditions and various pings looked like russian pinging and phishing. we also know the CIA and probably every hacker can make their footprints look like the stupid russians did it. I think this directly points to CIA and FBI spooks setting up a way to disable Trump. and altho i’m not sure how this will eventually play out. i’m hoping that the truth will out. because the truth is still not being reported yet.


8 posted on 06/07/2017 10:30:50 PM PDT by kvanbrunt2 (снова сделаем Ам)
[ Post Reply | Private Reply | To 1 | View Replies]

To: alexander_busek

It revealed nothing new


9 posted on 06/08/2017 12:20:46 AM PDT by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 4 | View Replies]

To: kvanbrunt2

That was my first question as well. How does one know the report wasn’t a false report blaming the Russians rather than the suite of hacking systems released prior to this event?

Such a pertinent omission indicates the information is not veritable.


10 posted on 06/08/2017 12:59:06 AM PDT by Cvengr ( Adversity in life & death is inevitable; Stress is optional through faith in Christ.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: 2ndDivisionVet

I have been asking right along what kind of net catches only the small fish. Now we know the details. So what?


11 posted on 06/08/2017 1:16:59 AM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mass55th

This article says she is pleading not guilty - http://www.nbcnews.com/news/us-news/reality-winner-alleged-nsa-leaker-will-plead-not-guilty-lawyer-n769526

Seems stupid as I understand the case against her is rock solid.


12 posted on 06/08/2017 4:55:36 AM PDT by Krosan
[ Post Reply | Private Reply | To 6 | View Replies]

To: 2ndDivisionVet

A just punishment would be a firing squad for her, and a life sentence for her supervisor.

Snowden and manning should also face firing squad.


13 posted on 06/08/2017 5:19:00 AM PDT by 2CAVTrooper (Democrats... BETRAYING America since 1828.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Krosan
She pleads not guilty because her lawyer told her.

It is step one of a plea bargain negotiation.

14 posted on 06/08/2017 6:52:56 AM PDT by Salman (I don't do Facebook, and neither should you.)
[ Post Reply | Private Reply | To 12 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson