HOUSE_OVERSIGHT_019639.jpg

1.69 MB

Extraction Summary

4
People
4
Organizations
1
Locations
0
Events
2
Relationships
3
Quotes

Document Information

Type: Book manuscript / proof page (house oversight committee evidence)
File Size: 1.69 MB
Summary

This document is page 151 from a book proof, likely 'How America Lost Its Secrets' by Edward Jay Epstein (indicated by ISBN in footer), stamped by the House Oversight Committee. The text analyzes the technical and social feasibility of Edward Snowden stealing NSA passwords, discussing theories involving social engineering versus hardware key loggers. A former Booz Allen executive argues it is 'inconceivable' that co-workers shared passwords and notes the technical difficulty of using a key logger in an EMP-hardened facility. Note: The 'Epst' in the filename refers to author Edward Jay Epstein, not Jeffrey Epstein.

People (4)

Name Role Context
Edward Snowden Subject
Former NSA contractor discussed regarding security breaches and password theft.
Former Booz Allen Executive Source/Interviewee
Unnamed source who worked at DIA and Booz Allen, providing expert opinion on security protocols.
Edward Jay Epstein Author/Narrator
Implicit author of the text (indicated by filename 'Epst' and ISBN 9780451494566), interviewing the source.
System Administrators NSA Staff
Referred to as the 'geek squad' who check connections.

Organizations (4)

Name Type Context
Booz Allen Hamilton
Former employer of the source and Snowden.
Defense Intelligence Agency
Previous workplace of the source.
NSA
National Security Agency, the location of the security breach.
House Oversight Committee
Congressional body possessing this document (indicated by Bates stamp).

Locations (1)

Location Context
NSA facility where Snowden worked.

Relationships (2)

Edward Snowden Colleagues NSA Co-workers
Text discusses interactions and potential password theft between them.
Author Interviewer/Source Former Booz Allen Executive
Author asks questions and quotes the executive.

Key Quotes (3)

"It is inconceivable to me that his co-workers would divulge their passwords to him"
Source
HOUSE_OVERSIGHT_019639.jpg
Quote #1
"In my opinion, near zero"
Source
HOUSE_OVERSIGHT_019639.jpg
Quote #2
"had no plausible reason for requesting passwords to compartments he had not been read into"
Source
HOUSE_OVERSIGHT_019639.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (2,521 characters)

Did Snowden Act Alone? | 151
other analysts there. "It is inconceivable to me that his co-workers would divulge their passwords to him," a former Booz Allen executive, who had also worked at the Defense Intelligence Agency, told me. "If he was a system administrator, he might trick a threat analyst into entering his password into his computer under the pretext that he needed it to deal with an urgent hardware issue." But, it will be recalled, Snowden was not a system administrator at the center. Snowden therefore "had no plausible reason for requesting passwords to compartments he had not been read into," the former executive said. He said that NSA executives might have been read into all twenty-four of the compartments, but he deemed it inconceivable they would illicitly share their passwords with Snowden. I asked him what the chance was of his voluntarily obtaining some twenty-four passwords from co-workers in five weeks. "In my opinion, near zero," he said.
It is possible of course that Snowden could have simply observed others typing in their passwords, one by one, but that would take time and possibly attract attention. I asked the former Booz Allen contractor whether it was possible that Snowden could have used a device for intercepting another computer's electronic signals, called by hackers a "key logger." Such a device, which is obtainable over the Internet, could be used to steal the passwords of the analysts who had been read into the compartments. My source said that while it was possible that Snowden smuggled in a key logger in his backpack, it could not be operated unless it was hardwired to a computer inside the center, because, like those at all other NSA facilities, the computers had been insulated to block any form of wireless transmission. This precaution was taken to guard against an EMP, or electromagnetic pulse, attack by an enemy. The only way Snowden could intercept keystrokes was to attach a cable from his key logger to each of his fellow workers' computers. In this scenario, he would have had to surreptitiously build his own wired network connecting his hidden key logger to twenty-four separate computers. Moreover, he would have to do this wiring in an open-plan office where he could not count on these additional wires, even if rigged one by one, not being noticed by either other analysts in the room or the "geek squad" of system administrators who regularly checked con-
Epst_9780451494566_2p_all_r1.z.indd 151
9/29/16 5:51 PM
HOUSE_OVERSIGHT_019639

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document