HOUSE_OVERSIGHT_020311.jpg
Extraction Summary
4
People
14
Organizations
5
Locations
3
Events
3
Relationships
3
Quotes
Document Information
Type:
Government report / legal document page
File Size:
Summary
This document outlines the administrative challenges faced by the NSA regarding compliance reporting and discusses the establishment and mission of the U.S. Cyber Command to defend against cyber threats. It details the difficulties in attributing cyber attacks to state actors versus civilians, citing the Sony attack, and describes strategies like planting sentinel viruses and retaliation capabilities. Additionally, it reaffirms the NSA's primary role in foreign intelligence gathering despite its new cyber defense responsibilities.
People (4)
| Name | Role | Context |
|---|---|---|
| Rajesh De | ||
| Snowden | ||
| Keith Alexander | ||
| James Clapper, Jr. |
Organizations (14)
Timeline (3 events)
Creation of Cyber Command (2009)
Sony cyber attack (December 2014)
Snowden leaks
Locations (5)
| Location | Context |
|---|---|
Relationships (3)
→
→
to
→
→
to
→
→
Key Quotes (3)
"“The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid,”"Source
HOUSE_OVERSIGHT_020311.jpg
Quote #1
"“If that is determined to be an organized attack, I would want to go and take down the source of those attacks.”"Source
HOUSE_OVERSIGHT_020311.jpg
Quote #2
"So private computers became a new battleground in the cyber was."Source
HOUSE_OVERSIGHT_020311.jpg
Quote #3
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document