HOUSE_OVERSIGHT_019567.jpg

1.67 MB

Extraction Summary

3
People
3
Organizations
2
Locations
2
Events
1
Relationships
4
Quotes

Document Information

Type: Book excerpt / congressional exhibit
File Size: 1.67 MB
Summary

This document appears to be page 79 of a book (likely by Edward Jay Epstein, given the filename code) detailing Edward Snowden's theft of NSA data. It describes his methods, including social engineering to get passwords, using 'spider' software to crawl networks, and exploiting unsealed USB ports on service computers at the Hawaii base. The page bears a House Oversight Committee stamp, indicating it was used as evidence or reference material in congressional proceedings.

People (3)

Name Role Context
Snowden Subject / Analyst in training
Described as carrying out a 'heist' of NSA documents, using spiders to crawl data, and social engineering colleagues.
Intelligence professionals NSA Staff
Colleagues whom Snowden persuaded to disclose their passwords against rules.
System administrators IT Staff
Staff who used service computers with unsealed ports for backups.

Organizations (3)

Name Type Context
National Threat Operations Center
Facility where Snowden accessed compartments he was not read into.
NSA
National Security Agency; the organization Snowden stole data from.
House Oversight Committee
Implied by the Bates stamp 'HOUSE_OVERSIGHT'.

Timeline (2 events)

May 18
Snowden departed for Hong Kong with stolen documents.
Hong Kong
Prior to May 18
Snowden obtained passwords to 24 compartments and deployed spiders to index over one million documents.
National Threat Operations Center, Hawaii

Locations (2)

Location Context
Destination Snowden departed to with stolen documents.
Location of the NSA facility where the theft occurred; noted as lacking real-time auditing.

Relationships (1)

Snowden Colleagues / Manipulated Intelligence professionals
He asked them to break strict NSA rules to disclose passwords.

Key Quotes (4)

"Snowden carried out the heist with precision reminiscent of a Mission: Impossible movie caper."
Source
HOUSE_OVERSIGHT_019567.jpg
Quote #1
"He gained access to twenty-four compartments containing the NSA’s most closely guarded secrets in a matter of a few weeks."
Source
HOUSE_OVERSIGHT_019567.jpg
Quote #2
"According to the subsequent NSA damage assessment, Snowden’s spiders indexed well over one million documents."
Source
HOUSE_OVERSIGHT_019567.jpg
Quote #3
"Many of those that he copied and moved were from Level 3 sensitive compartmented information..."
Source
HOUSE_OVERSIGHT_019567.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (2,462 characters)

Raider of the Inner Sanctum | 79
required a minimum of one month's notice for foreign travel. By making the request, he lessened the likelihood that it would arouse undue suspicion when he departed for Hong Kong with stolen documents on May 18. This brief window left him some four weeks to take the lists that he coveted.
Snowden carried out the heist with precision reminiscent of a Mission: Impossible movie caper. First, he needed to get passwords to up to twenty-four compartments at the National Threat Operations Center that he had not been read into. Even in the “open culture” of the NSA, this was not an easy challenge. He would be asking one or more intelligence professionals to break strict NSA rules that not only prohibited them from disclosing their passwords to an unauthorized party such as himself but required them to report any unauthorized person who asked to use their passwords. Remarkably, he accomplished this incredible feat. He gained access to twenty-four compartments containing the NSA’s most closely guarded secrets in a matter of a few weeks.
Next, he had to find the lists he was seeking in a vast ocean of data. For this task, he used software applications called spiders to crawl through the data and find the files he was after. He deployed these robotic spiders, which presumably had been programmed in advance, soon after he began working at the center. According to the subsequent NSA damage assessment, Snowden’s spiders indexed well over one million documents. Many of those that he copied and moved were from Level 3 sensitive compartmented information, according to the NSA analysis. The spiders also made his penetration relatively safe. As previously mentioned, the Hawaii base did not have a real-time auditing system. So alarm bells did not go off in the security office when he indexed documents.
Finally, Snowden had to find a way to transfer this data to a computer with an opened USB port. This task was complicated by a security precaution. Most of the computers at the center had had their ports sealed shut to prevent unauthorized downloads. Making the transfer even more difficult, he was working as an analyst in training in an open-plan office with closed-circuit security cameras. But it was not impossible. System administrators sometimes used service computers that had unsealed ports to back up data before they did
Epst_9780451494566_2p_all_r1.z.indd 79 9/29/16 5:51 PM
HOUSE_OVERSIGHT_019567

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document