How the NSA was Infiltrated and Why Your Business May Be Next
“Given Snowden’s valid access to certain cryptographic keys and certificates for system administration, he was able to discover information to steal, gain access to, and “fabricate” new keys and certificates to gain trusted status. Then with this trusted status, he was able to exfilitrate data without being detected using encryption. Just like nation-state cyber espionage organizations, Snowden methodically probed and stole data with trusted status, and always flew under the radar—all of this thanks to cryptographic and authentication capabilities that the NSA itself uses to execute its mission everyday.”