HOUSE_OVERSIGHT_020329.jpg
Extraction Summary
3
People
11
Organizations
0
Locations
2
Events
2
Relationships
4
Quotes
Document Information
Type:
Narrative report / book excerpt (likely from a congressional oversight file regarding intelligence/snowden)
File Size:
Summary
This document appears to be page 177 of a report or book (potentially by Edward Jay Epstein regarding Edward Snowden) submitted to House Oversight. It details the vulnerabilities of the NSA to 'insider threats' and Russian intelligence (SVR/KGB) recruitment tactics, specifically targeting system administrators. It discusses the 2011 OPM hack as a method for identifying potential recruits via Standard Form 86 data and links Edward Snowden to various anti-surveillance groups like Wikileaks and the TOR project in 2012-2013.
People (3)
| Name | Role | Context |
|---|---|---|
| Snowden | Intelligence Leaker / Target |
Mentioned as having been in touch with anti-surveillance groups in 2012 and 2013.
|
| Laura Poitras | Journalist / Activist |
Discussed regarding her defensive tactics against surveillance (PGP, TOR, air-gapped computers).
|
| NSA threat officer | Intelligence Official |
Cited for a 1996 report on NSA vulnerability and predictions on Russian tactics.
|
Organizations (11)
| Name | Type | Context |
|---|---|---|
| NSA |
National Security Agency; target of espionage and hacking.
|
|
| KGB |
Russian intelligence agency (historical context).
|
|
| Russian Intelligence Services / SVR |
Current Russian intelligence agency; discussed regarding recruitment of insiders.
|
|
| US Office of Personnel Management (OPM) |
Government agency whose networks were hacked.
|
|
| USIS |
US Investigations Services; mentioned regarding security holes.
|
|
| TOR project |
Anti-surveillance group.
|
|
| Wikileaks |
Anti-surveillance / Leaking organization.
|
|
| Noisebridge |
Activist group.
|
|
| Crypto Parties |
Activist movement.
|
|
| Freedom of the Press Foundation |
Activist organization.
|
|
| Electronic Freedom Foundation |
Activist organization.
|
Timeline (2 events)
2011
Hacking of US Office of Personnel Management and USIS networks, making background checks available to adversaries.
US Office of Personnel Management
Chinese hackers
Adversary intelligence services
Relationships (2)
Snowden, for example, had been in touch with members all these groups in 2012 and 2013.
Discussed in context of sources and secrets.
Key Quotes (4)
"He predicted that its next logical move would be to 'target insider computer personnel.'"Source
HOUSE_OVERSIGHT_020329.jpg
Quote #1
"Finding the one who met its espionage requisites was the equivalent of seeking the sharpest needle in the proverbial giant haystack."Source
HOUSE_OVERSIGHT_020329.jpg
Quote #2
"From the 127-page standard form 86 each applicant for a security clearance submits, the SVR could filter out intelligence workers employed by the NSA..."Source
HOUSE_OVERSIGHT_020329.jpg
Quote #3
"Snowden, for example, had been in touch with members all these groups in 2012 and 2013."Source
HOUSE_OVERSIGHT_020329.jpg
Quote #4
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document