This document is page 205 from a book (indicated by the ISBN in the filename, likely 'How America Lost Its Secrets' by Edward Jay Epstein) included in a House Oversight production. The text details the establishment of the U.S. Cyber Command in 2009 under General Keith Alexander, the difficulties in attributing cyber attacks (citing the 2014 Sony hack), and the NSA's mandate to dominate cyberspace and intercept information from adversaries like Russia, China, and North Korea. It mentions the NSA's annual budget of $12.3 billion and workforce size.
| Name | Role | Context |
|---|---|---|
| Keith Alexander | General / NSA Director |
First director of the U.S. Cyber Command; quoted regarding cyber warfare strategy.
|
| James Clap- | Official (likely James Clapper) |
Mentioned at the very end of the page in the context of 2013 (text cuts off).
|
| Name | Type | Context |
|---|---|---|
| U.S. Cyber Command |
Created in 2009, merging cyber-defense units.
|
|
| NSA |
National Security Agency; parent organization for Cyber Command.
|
|
| Army |
Cyber-defense unit merged into Cyber Command.
|
|
| Navy |
Cyber-defense unit merged into Cyber Command.
|
|
| Marines |
Cyber-defense unit merged into Cyber Command.
|
|
| Air Force |
Cyber-defense unit merged into Cyber Command.
|
|
| Sony |
Victim of a cyber attack in December 2014.
|
|
| House Oversight Committee |
Producer of the document (indicated by Bates stamp).
|
| Location | Context |
|---|---|
|
Identified as principal actor behind Sony attack; target of NSA interception.
|
|
|
Viewed as source of attacks on western infrastructure; target of NSA interception.
|
|
|
Potential target for retaliation; target of NSA interception.
|
|
|
Potential target for retaliation; target of NSA interception.
|
|
|
Location of electrical grid and infrastructure mentioned.
|
"The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid"Source
"If that is determined to be an organized attack, I would want to go and take down the source of those attacks."Source
Complete text extracted from the document (2,511 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document