HOUSE_OVERSIGHT_019700.jpg

1.68 MB

Extraction Summary

2
People
9
Organizations
2
Locations
3
Events
2
Relationships
2
Quotes

Document Information

Type: Book page / congressional oversight evidence
File Size: 1.68 MB
Summary

This document is page 212 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein), produced as evidence with the Bates stamp HOUSE_OVERSIGHT_019700. The text discusses historical espionage, specifically the arrest of Jerry Whitworth, KGB 'false flag' recruitment of the German Hanover Hackers in the 1980s, and the NSA's increasing reliance on private contractors like Booz Allen Hamilton for IT talent due to competition with tech giants like Google and Apple. The filename 'Epst_' refers to the author Edward Jay Epstein, not Jeffrey Epstein.

People (2)

Name Role Context
Whitworth Spy
Arrested by FBI in 1985, convicted of espionage, sentenced to 365 years.
Threat Officer Intelligence Official
Warned about KGB false flag tactics and system administrator vulnerabilities.

Organizations (9)

Name Type Context
FBI
Arresting agency for Whitworth.
KGB
Soviet intelligence agency using false flags to recruit hackers.
German Hanover Hackers
Group of anarchistic hackers recruited by KGB in the late 1980s.
NSA
National Security Agency; discussed regarding its reliance on civilian contractors.
Google
Tech competitor for IT talent.
Apple
Tech competitor for IT talent.
Facebook
Tech competitor for IT talent.
Booz Allen
Government contractor providing specialists to the government since the 1940s.
House Oversight Committee
Implied by the Bates stamp 'HOUSE_OVERSIGHT'.

Timeline (3 events)

1985
Arrest of Whitworth by the FBI.
USA
2001
9/11 attacks (referenced as a catalyst for increased intelligence demand).
USA
Late 1980s
KGB recruitment of German Hanover Hackers.
Hanover, Germany

Locations (2)

Location Context
Germany; location of the hacker group.
Government networks targeted.

Relationships (2)

NSA Contractor/Client Booz Allen
Booz Allen had been providing technically trained specialists to the government...
KGB Handler/Asset German Hanover Hackers
KGB succeeded in getting the Hanover hackers to steal log-in account identifications...

Key Quotes (2)

"The Internet provided an almost ideal environment for false flags because its users commonly adopt aliases, screen names, and other avatars."
Source
HOUSE_OVERSIGHT_019700.jpg
Quote #1
"The NSA became more and more reliant on these outsiders as it reorganized to meet its new mandates for surveillance of the Internet in the war on terrorism."
Source
HOUSE_OVERSIGHT_019700.jpg
Quote #2

Full Extracted Text

Complete text extracted from the document (2,482 characters)

212 | HOW AMERICA LOST ITS SECRETS
he was too deeply compromised to quit. He continued his espionage work for another eight years. (Whitworth, who was arrested by the FBI in 1985, was convicted of espionage and sentenced to 365 years in prison.)
The Internet provided an almost ideal environment for false flags because its users commonly adopt aliases, screen names, and other avatars. The threat officer explained how easy it would be for the KGB to adapt such a false flag when dealing with a dissident system administrator working for U.S. intelligence. As the threat officer pointed out in his report, the KGB had used false flags in the late 1980s to surreptitiously recruit members of the “German Hanover Hackers,” a community of anarchistic hackers who breached computer networks for fun and profit. Until then, these hacktivists stole corporate and private passwords, credit card information, and other privileged documents as a form of freelance espionage. Because of their fervent anti-authority ideology, the KGB disguised its recruiters as fellow hacktivists. The KGB succeeded in getting the Hanover hackers to steal log-in account identifications, source codes, and other information from U.S. government computer networks.
The weak link of system administrators became increasingly relevant as the NSA moved further into the digital age. By the beginning of this century, its growing networks of computers were largely operated by civilian technicians, including system administrators, infrastructure analysts, and information technologists, who were needed to keep the system running. Despite the warning by the threat officer, the NSA became more and more reliant on these outsiders as it reorganized to meet its new mandates for surveillance of the Internet in the war on terrorism.
The NSA had to compete with technology companies, such as Google, Apple, and Facebook, for the services of experienced IT workers. Though Booz Allen had been providing technically trained specialists to the government since the 1940s and ’50s, congressionally imposed salary caps put the NSA at a disadvantage to private firms in its recruitment efforts. As a result, it increasingly contracted with private firms to find talent, especially in the rush for data-based intelligence following 9/11. Booz Allen, to meet increased demand, recruited civilian technicians from many unconventional areas,
Epst_9780451494566_2p_all_r1.indd 212
9/30/16 8:13 AM
HOUSE_OVERSIGHT_019700

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document