HOUSE_OVERSIGHT_020316.jpg
Extraction Summary
3
People
15
Organizations
1
Locations
3
Events
3
Relationships
3
Quotes
Document Information
Type:
Government report / congressional record / narrative report
File Size:
Summary
This document appears to be a page (164) from a narrative report or book included in House Oversight records. It details the history of cybersecurity vulnerabilities within US intelligence, specifically the NSA's reliance on civilian contractors and system administrators. It draws parallels between the KGB's recruitment of hackers in the 1980s and the NSA's hiring of 'hacktivist' culture technicians post-9/11 to compete with tech giants. It specifically mentions that by 2013, sensitive NSA work was outsourced to firms like Booz Allen Hamilton and Microsoft.
People (3)
| Name | Role | Context |
|---|---|---|
| Whitworth | Spy/Espionage Agent |
Arrested by FBI in 1985, convicted of espionage, sentenced to 365 years.
|
| Michael Hayden | Former Head of NSA |
Quoted regarding the NSA's shift to electronic storage and the associated vulnerabilities.
|
| Unnamed Threat Officer | Intelligence/Security Analyst |
Pointed out vulnerabilities regarding system administrators in 1996.
|
Timeline (3 events)
2013
Majority of NSA classified computer management handed over to five private companies.
USA
Late 1980s
KGB surreptitiously recruits members of the German Hanover Hackers using false flags.
Unknown (Likely Germany/International)
Locations (1)
| Location | Context |
|---|---|
Relationships (3)
By 2013, much of the job of managing the NSA's classified computers had been handed over to five private companies: Booz Allen Hamilton...
Michael Hayden, who headed the NSA at the time...
KGB had used false flags in the late 1980s to surreptitiously recruit members of the 'German Hanover Hackers'
Key Quotes (3)
"All of us just fell in love with the ease and convenience and scale [of electronic storage]"Source
HOUSE_OVERSIGHT_020316.jpg
Quote #1
"So we decided to take things we used to keep if not in a safe, at least in our desk drawer, and put it up here [in a computer network], where it’s by definition more vulnerable."Source
HOUSE_OVERSIGHT_020316.jpg
Quote #2
"The precise vulnerability that this threat officer pointed out in 1996 was system administrators."Source
HOUSE_OVERSIGHT_020316.jpg
Quote #3
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document