HOUSE_OVERSIGHT_020316.jpg

View Original

Extraction Summary

3
People
15
Organizations
1
Locations
3
Events
3
Relationships
3
Quotes

Document Information

Type: Government report / congressional record / narrative report
File Size:
Summary

This document appears to be a page (164) from a narrative report or book included in House Oversight records. It details the history of cybersecurity vulnerabilities within US intelligence, specifically the NSA's reliance on civilian contractors and system administrators. It draws parallels between the KGB's recruitment of hackers in the 1980s and the NSA's hiring of 'hacktivist' culture technicians post-9/11 to compete with tech giants. It specifically mentions that by 2013, sensitive NSA work was outsourced to firms like Booz Allen Hamilton and Microsoft.

People (3)

Name Role Context
Whitworth Spy/Espionage Agent
Arrested by FBI in 1985, convicted of espionage, sentenced to 365 years.
Michael Hayden Former Head of NSA
Quoted regarding the NSA's shift to electronic storage and the associated vulnerabilities.
Unnamed Threat Officer Intelligence/Security Analyst
Pointed out vulnerabilities regarding system administrators in 1996.

Timeline (3 events)

1985
Arrest and conviction of Whitworth for espionage.
USA
2013
Majority of NSA classified computer management handed over to five private companies.
USA
Late 1980s
KGB surreptitiously recruits members of the German Hanover Hackers using false flags.
Unknown (Likely Germany/International)

Relationships (3)

NSA Contractor Booz Allen Hamilton
By 2013, much of the job of managing the NSA's classified computers had been handed over to five private companies: Booz Allen Hamilton...
Michael Hayden Leadership NSA
Michael Hayden, who headed the NSA at the time...
KGB Espionage/Recruitment German Hanover Hackers
KGB had used false flags in the late 1980s to surreptitiously recruit members of the 'German Hanover Hackers'

Key Quotes (3)

"All of us just fell in love with the ease and convenience and scale [of electronic storage]"
Source
HOUSE_OVERSIGHT_020316.jpg
Quote #1
"So we decided to take things we used to keep if not in a safe, at least in our desk drawer, and put it up here [in a computer network], where it’s by definition more vulnerable."
Source
HOUSE_OVERSIGHT_020316.jpg
Quote #2
"The precise vulnerability that this threat officer pointed out in 1996 was system administrators."
Source
HOUSE_OVERSIGHT_020316.jpg
Quote #3

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document