WASHINGTON – In the span of three years, the United States has developed two gaping holes in its national security hull, punctures caused by leakers who worked at the lowest levels of the nation’s intelligence ranks but gained access to large caches of classified material.
The parallels between Edward Snowden, who has declared himself the source of leaks about National Security Agency surveillance programs, and Bradley Manning, a U.S. Army private on trial for sending hundreds of thousands of secret files to the WikiLeaks whistle-blower website, go beyond generational ties.
Both had enlisted in the army at the outset of the war in Iraq only to later say they were disillusioned by that conflict. Neither has a college degree or extensive academic training in computer science. And yet both were technically savvy, able to navigate sensitive computer networks and smuggle classified files.
The back-to-back breaches — seen by many as the most significant in decades — have forced U.S. intelligence officials to examine whether the cases are isolated in scope or part of a new category of exposure emerging at the edges of classified U.S. networks.
U.S. officials said counterintelligence teams are already looking beyond the details of the Snowden case at any vulnerabilities it has exposed.
“At this point, we’re still looking at this as an anomaly,” a senior U.S. intelligence official said. But he said a damage assessment ordered by Director of National Intelligence James Clapper is broad in scope, focused largely on the implications of a case in which highly sensitive materials were somehow within the grasp of a contractor who moved through a series of low-ranking jobs for the CIA and NSA.
Snowden and Manning both took advantage of access to computer systems that expanded exponentially in the aftermath of the attacks of Sept. 11, 2001, partly in an effort to make critical information available across agencies.
In an email to a Washington Post reporter in May, Snowden said he wanted “to embolden others to step forward,” suggesting that he hoped his leak would trigger follow-up disclosures.
Among the files he obtained were a secret order issued by the Foreign Intelligence Surveillance Court and 41 briefing slides on a highly classified program, called PRISM, in which mainstream technology firms including Microsoft, Google and Facebook have given the NSA extensive access to emails, videos and other content.
The records released by Snowden are fewer in number but more sensitive and of higher levels of classification than the U.S. diplomatic cables and military reports Manning sent to WikiLeaks after he downloaded them while serving in Iraq.
Snowden has praised Manning but also sought to differentiate himself from his predecessor. In particular, Snowden has indicated that he sought to be more responsible, withholding records he had that might put U.S. intelligence operatives in jeopardy, unlike Manning, who is accused of turning over thousands of pages, some of which contained the names of informants.
But their motivations and backgrounds have extensive overlaps. Both entered the military or government jobs during an era of massive hiring binges, controversial wars and repeated disclosures of alleged abuses by the U.S. military, CIA and NSA.
Both have said they wanted to call attention to abuses by the U.S. government, although critics have called them traitors who acted out of an exaggerated sense of self-importance.
Manning was gifted with computers and had begun learning the C++ programming language by the time he was 8. He never found a path to college and instead enlisted in the army, where he was groomed for a career as an intelligence analyst.
Snowden’s plans to pursue a career in U.S. Special Forces was derailed, he said, by leg injuries he sustained during training that ended his military stint after just three months.
It is less clear how Snowden came by his computer skills. But, like Manning, his technology savvy appears to have helped him obtain a string of jobs that enabled him to snoop on and eventually steal sensitive files.
Their actions and motivations bear little resemblance to high-profile security breaches of the 1980s and ’90s. The best-known cases involved midcareer officials such as the CIA’s Aldrich Ames and the FBI’s Robert Hanssen, who were convicted of selling secrets to the Soviet and Russian governments for financial gain.
The closest parallel for Snowden and Manning may be Daniel Ellsberg, who in 1971 was several news organizations’ source for the Pentagon Papers, a secret assessment of the Vietnam War that eroded the credibility of U.S. government claims. Ellsberg in recent days has praised Snowden and described the material Snowden disclosed as more significant than the papers he leaked four decades ago.
There are differences, however. Ellsberg was a senior military analyst working at the Pentagon who had a direct role in drafting the Pentagon Papers. The document was largely a record of U.S. decision-making rather than a blueprint of ongoing operations. Drafts were undoubtedly stored in safes, not on networks where they might be read by low-level employees at distant military or intelligence outposts.
A former top NSA official recalled procedures in the ’70s that were archaic but secure. “When hot documents would go around they’d be in a double-sealed envelope, and some person would wait while you read it, re-envelope it and leave,” the ex-official said. “By contrast, now you bring it up on your computer screen.”
Some U.S. officials question whether there is a generational gap in views on privacy and government transparency. Manning and Snowden, who are both in their 20s, grew up with technology and the Internet as fixtures in their lives.
“They are recruiting Americans from a culture that has a deeper desire for absolute transparency than any previous cohort of people entering the service,” said Michael Hayden, the former director of the CIA and NSA. “We’re coming from a culture in which, for many, transparency is an absolute good, and it appears that in these two cases it influenced these people.”
Snowden appears to have left fewer online footprints than many of his generation, with no evidence of Facebook or Twitter accounts. In his comments to The Post, he indicated that was in part because of what he had learned.
The Internet “is a TV that watches you,” he said, a technology “governments are abusing . . . to extend their powers beyond what is necessary and appropriate.”