This document appears to be page 79 of a book (likely by Edward Jay Epstein, given the filename code) detailing Edward Snowden's theft of NSA data. It describes his methods, including social engineering to get passwords, using 'spider' software to crawl networks, and exploiting unsealed USB ports on service computers at the Hawaii base. The page bears a House Oversight Committee stamp, indicating it was used as evidence or reference material in congressional proceedings.
| Name | Role | Context |
|---|---|---|
| Snowden | Subject / Analyst in training |
Described as carrying out a 'heist' of NSA documents, using spiders to crawl data, and social engineering colleagues.
|
| Intelligence professionals | NSA Staff |
Colleagues whom Snowden persuaded to disclose their passwords against rules.
|
| System administrators | IT Staff |
Staff who used service computers with unsealed ports for backups.
|
| Name | Type | Context |
|---|---|---|
| National Threat Operations Center |
Facility where Snowden accessed compartments he was not read into.
|
|
| NSA |
National Security Agency; the organization Snowden stole data from.
|
|
| House Oversight Committee |
Implied by the Bates stamp 'HOUSE_OVERSIGHT'.
|
| Location | Context |
|---|---|
|
Destination Snowden departed to with stolen documents.
|
|
|
Location of the NSA facility where the theft occurred; noted as lacking real-time auditing.
|
"Snowden carried out the heist with precision reminiscent of a Mission: Impossible movie caper."Source
"He gained access to twenty-four compartments containing the NSA’s most closely guarded secrets in a matter of a few weeks."Source
"According to the subsequent NSA damage assessment, Snowden’s spiders indexed well over one million documents."Source
"Many of those that he copied and moved were from Level 3 sensitive compartmented information..."Source
Complete text extracted from the document (2,462 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document