U.S. counterterror agency lacks "Google-like" search

toomuchtime_

Gold Member
Dec 29, 2008
20,572
5,365
280
A senior counterterrorism official said on Wednesday his agency lacks "Google-like" search capability that could have identified the suspect in the attempted Christmas Day airline bombing.

The National Counterterrorism Center, the agency charged with reviewing disparate data to protect against attacks, does not have a computer search engine that could have checked for various spellings of the alleged bomber's name and his birthplace in Nigeria, the center's chief told a Senate hearing on security reform.

"We do not have that exact capacity," said Michael Leiter, adding that the agency is working on solutions that could be in place within weeks.

The State Department has acknowledged it misspelling attacker's name, Umar Farouk Abdulmutallab, when sending an advisory out about him after his father warned the U.S. embassy in Nigeria his son had been attracted by militant ideology.

Google and other common Internet search engines routinely offer alternative spellings for searches, particularly with names. Abdulmutallab had been flagged beforehand by U.S. embassy staff in Nigeria, but not under his full name.

National Intelligence Director Dennis Blair acknowledged that current search tools used by U.S. spy and counterterror agencies have "blind spots that don't allow the sort of Google-like" searches civilians can do on their personal computers.

Patrick Kennedy, Undersecretary of State for management, told a second hearing that because of the spelling mistake in his name, the State Department did not add information about Abdulmutallab's latest U.S. visa to his file.

Senator Patrick Leahy asked why the State Department lacked the ability found in consumer search engines that automatically ask about different spellings of a name.

Kennedy said that kind of search software had not been installed on its database before the attempted attack, and would only have looked into visa applications, not visas that had already been granted.
U.S. counterterror agency lacks Google-like search | Reuters
 
IT Tech Stole Massive Load of Counterterror Intel...
:eusa_eh:
Swiss spy agency warns U.S., Britain about huge data leak
Tue Dec 4, 2012 (Reuters) - Secret information on counter-terrorism shared by foreign governments may have been compromised by a massive data theft by a senior IT technician for the NDB, Switzerland's intelligence service, European national security sources said.
Intelligence agencies in the United States and Britain are among those who were warned by Swiss authorities that their data could have been put in jeopardy, said one of the sources, who asked for anonymity when discussing sensitive information. Swiss authorities arrested the technician suspected in the data theft last summer amid signs he was acting suspiciously. He later was released from prison while a criminal investigation by the office of Switzerland's Federal Attorney General continues, according to two sources familiar with the case. The suspect's name was not made public. Swiss authorities believe he intended to sell the stolen data to foreign officials or commercial buyers.

A European security source said investigators now believe the suspect became disgruntled because he felt he was being ignored and his advice on operating the data systems was not being taken seriously. Swiss news reports and the sources close to the investigation said that investigators believe the technician downloaded terrabytes, running into hundreds of thousands or even millions of printed pages, of classified material from the Swiss intelligence service's servers onto portable hard drives. He then carried them out of government buildings in a backpack. One of the sources familiar with the investigation said that intelligence services like the U.S. Central Intelligence Agency and Britain's Secret Intelligence Service, also known as MI6, routinely shared data on counter-terrorism and other issues with the NDB. Swiss authorities informed U.S. and British agencies that such data could have been compromised, the source said.

News of the theft of intelligence data surfaced with Switzerland's reputation for secrecy and discretion in government and financial affairs already under assault. Swiss authorities have been investigating, and in some cases have charged, whistleblowers and some European government officials for using criminal methods to acquire confidential financial data about suspected tax evaders from Switzerland's traditionally secretive banks. The suspect in the spy data theft worked for the NDB, or Federal Intelligence Service, which is part of Switzerland's Defense Ministry, for about eight years. He was described by a source close to the investigation as a "very talented" technician and senior enough to have "administrator rights," giving him unrestricted access to most or all of the NDB's networks, including those holding vast caches of secret data.

Swiss investigators seized portable storage devices containing the stolen data after they arrested the suspect, according to the sources. At this point, they said, Swiss authorities believe that the suspect was arrested and the stolen data was impounded before he had an opportunity to sell it. However, one source said that Swiss investigators could not be positive the suspect did not sell or pass on any of the information before his arrest, which is why Swiss authorities felt obliged to notify foreign intelligence partners their information may have been compromised. Representatives of U.S. and British intelligence agencies had no immediate response to detailed queries about the case submitted by Reuters, although one U.S. official said he was unaware of the case.

SECURITY PROCEDURES QUESTIONED
 

Forum List

Back
Top