HOUSE_OVERSIGHT_020311.jpg

View Original

Extraction Summary

4
People
14
Organizations
5
Locations
3
Events
3
Relationships
3
Quotes

Document Information

Type: Government report / legal document page
File Size:
Summary

This document outlines the administrative challenges faced by the NSA regarding compliance reporting and discusses the establishment and mission of the U.S. Cyber Command to defend against cyber threats. It details the difficulties in attributing cyber attacks to state actors versus civilians, citing the Sony attack, and describes strategies like planting sentinel viruses and retaliation capabilities. Additionally, it reaffirms the NSA's primary role in foreign intelligence gathering despite its new cyber defense responsibilities.

People (4)

Timeline (3 events)

Creation of Cyber Command (2009)
Sony cyber attack (December 2014)
Snowden leaks

Locations (5)

Location Context

Relationships (3)

to
to

Key Quotes (3)

"“The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid,”"
Source
HOUSE_OVERSIGHT_020311.jpg
Quote #1
"“If that is determined to be an organized attack, I would want to go and take down the source of those attacks.”"
Source
HOUSE_OVERSIGHT_020311.jpg
Quote #2
"So private computers became a new battleground in the cyber was."
Source
HOUSE_OVERSIGHT_020311.jpg
Quote #3

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document