HOUSE_OVERSIGHT_020312.jpg

Extraction Summary

3
People
5
Organizations
5
Locations
2
Events
2
Relationships
3
Quotes

Document Information

Type: Government report / investigative narrative
File Size:
Summary

This document is a narrative report detailing the operational security and history of the NSA at Fort Meade, specifically focusing on the tenure and breach of Edward Snowden. It describes the NSA's SIGINT capabilities, internal network structures (NSANet), and the specific methodology Snowden used to access and compromise Level 3 intelligence regarding Russia, Iran, and China starting from his hiring in 2009. While the footer suggests it is part of a House Oversight production, this specific page contains no direct references to Jeffrey Epstein.

People (3)

Name Role Context
Edward Snowden NSA Contractor / Whistleblower
Found his way into the NSA in 2009 through a temporary job; stole secrets four years later.
The President US President
Recipient of continuous insights provided by the NSA.
National Intelligence Intelligence Leadership
Justified the secret intelligence budget in an open session of Congress.

Organizations (5)

Name Type Context
NSA
National Security Agency; main subject of the document.
Congress
Received justification for the secret intelligence budget.
NSANet
Internal 'Wiki-style' network used by NSA technicians.
NSA Technology Directorate
Department that contracted the outside firm Snowden worked for.
House Oversight Committee
Implied by the footer 'HOUSE_OVERSIGHT'.

Timeline (2 events)

2009
Edward Snowden hired for a temporary job with an outside contractor for the NSA.
NSA
Edward Snowden NSA Contractor
Four years later (approx 2013)
Snowden stole secrets stored in isolated computers regarding Level 3 sources and methods.
NSA

Locations (5)

Location Context
Fort George G. Meade, Maryland
5,000 acre base, the heart of the NSA's activity.
Target of NSA surveillance compromised by Snowden.
Target of NSA surveillance compromised by Snowden.
Target of NSA surveillance compromised by Snowden.
US
United States.

Relationships (2)

Edward Snowden Contractor/Adversary NSA
Snowden found his way into the NSA through a temporary job... he was able to steal secrets.
NSA Advisor The President
NSA had the capability to provide the President and his advisers with continuous insights.

Key Quotes (3)

"We are bolstering our support for clandestine SIGINT [signal intelligence] capabilities to collect against high priority targets, including foreign leadership targets"
Source
HOUSE_OVERSIGHT_020312.jpg
Quote #1
"groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic."
Source
HOUSE_OVERSIGHT_020312.jpg
Quote #2
"The Snowden breach demonstrated that the NSA’s envelope of secrecy was at best illusory."
Source
HOUSE_OVERSIGHT_020312.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (3,353 characters)

160
National Intelligence justified the secret intelligence budget by saying in an open session of
Congress, “We are bolstering our support for clandestine SIGINT [signal intelligence]
capabilities to collect against high priority targets, including foreign leadership targets,” and to
develop “groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit
Internet traffic.” It was no secret, even before Snowden, that the NSA was engaged with
monitoring the Internet.
Through all this tumult the heart of the NSA’s activity remained its 5,000 acre base at Fort
George G. Meade, Maryland. It commanded the most powerful mechanism for intercepting
communications that the world had ever seen. No other country came close to its technology for
intercepting information. The NSA was not only able to intercept secret information from these
potential adversaries, but it also, at least not until the Snowden breach, managed to conceal these
means from them. As long as these adversaries remained blind to the ways in which its
communications were being intercepted, deciphered and read by the NSA, they could not take
effective countermeasures. Consequently, the NSA had the capability to provide the President
and his advisers with continuous insights into the thinking and planning of potential enemies.
Keeping its sources and methods secrets was no easy task. The NSA’s technicians had to deal
with continuous technical challenges to provide a seamless harvesting of data from a wide range
of communication devices, including telephones, computers and the Internet. It required
continuous intra-agency communications between the NSA’s own intelligence officers and a
growing number of civilian technicians. It even had its own “Wiki-style” network through which
they could discuss problems, called the NSANet. As it could not tightly control access to this
technical network, it expunged any mention of the sources and methods from the material
circulated on the classified NSA network. Instead, it stored them in discrete computers, called
compartments that were disconnected from other computers at the NSA. These compartments
could only be accessed by a limited number of analysts and NSA executives who had a need to
know about the data they contained. These compartments were the final line of defense against
an inside intruder.
In 2009, Snowden found his way into the NSA through a temporary job with an outside
contractor that had a contract with the NSA’s Technology Directorate to repair and update it
back-up system. Four years later, by maneuvering to get hired by another outside contractor with
access to the NSA’s sources and methods, he was able to steal secrets stored in isolated
computers bearing directly on the ongoing intelligence war. Snowden also copied from these
compartments in a matter of weeks, as has been previously mentioned, the NSA’s Level 3 sources
and methods used against Russia, Iran and China. The Snowden breach demonstrated that the
NSA’s envelope of secrecy was at best illusory.
After this immense loss, the NSA’s sources inside these adversary countries were largely
compromised even if they were not closed down. Once these adversaries were in a position to
know what channels the NSA was intercepting, they could use these same channels to mislead US
HOUSE_OVERSIGHT_020312

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document