HOUSE_OVERSIGHT_019724.jpg
1.72 MB
Extraction Summary
1
People
8
Organizations
3
Locations
2
Events
1
Relationships
3
Quotes
Document Information
Type:
Book page / evidence production
File Size:
1.72 MB
Summary
This document is page 236 from the book 'How America Lost Its Secrets' (authored by Edward Jay Epstein). It details Chinese cyber espionage tactics, contrasting them with Russian methods. The text describes the use of 'sleeper' bugs and 'zombie' programs to infiltrate U.S. networks, specifically mentioning a 2007 report by Paul Strassmann about 700,000 infected computers. It highlights successful hacks against U.S. contractors like Booz Allen and tech companies (Google, Yahoo!, etc.) to access NSA and CIA personnel dossiers. The page bears a 'HOUSE_OVERSIGHT_019724' stamp, indicating it was part of a document production for a congressional investigation.
People (1)
| Name | Role | Context |
|---|---|---|
| Paul Strassmann | Top U.S. defense expert on cyber espionage |
Reported in 2007 that China had inserted zombie programs in 700,000 US computers.
|
Organizations (8)
| Name | Type | Context |
|---|---|---|
| Booz Allen |
Hacked by Chinese cyber specialists.
|
|
| NSA |
Technologists supplied by Booz Allen; dossiers of employees obtained by Chinese hackers.
|
|
| CIA |
Dossiers of employees obtained by Chinese hackers.
|
|
|
Penetrated by Chinese service to track emails.
|
||
| Yahoo! |
Penetrated by Chinese service to track emails.
|
|
| Symantec |
Penetrated by Chinese service.
|
|
| Adobe |
Penetrated by Chinese service.
|
|
| House Oversight Committee |
Producer of the document (indicated by stamp).
|
Timeline (2 events)
2007
Report by Paul Strassmann regarding 700,000 zombie programs inserted into US computers.
United States
Locations (3)
| Location | Context |
|---|---|
|
Target of espionage; location of compromised computers.
|
|
|
Origin of espionage activities.
|
|
|
Mentioned for comparison regarding espionage tactics.
|
Relationships (1)
Chinese cyber specialists used this capability to hack into the computers of outside contractors, including Booz Allen
Key Quotes (3)
"Chinese controllers can often retrieve e-mails and documents and can turn on the cameras and microphones of personal computers, tablets, and smart phones."Source
HOUSE_OVERSIGHT_019724.jpg
Quote #1
"China had inserted 'zombie' programs in some 700,000 computers in the United States"Source
HOUSE_OVERSIGHT_019724.jpg
Quote #2
"Chinese cyber specialists used this capability to hack into the computers of outside contractors, including Booz Allen"Source
HOUSE_OVERSIGHT_019724.jpg
Quote #3
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document