This document is page 217 of a book (identified by the filename ISBN as 'Epstein: Dead Men Tell No Tales') included as an exhibit in a House Oversight Committee investigation (Bates stamped). The text details systemic cybersecurity failures within the U.S. intelligence community's vetting process, specifically focusing on contractors USIS and Booz Allen Hamilton, and the OPM's e-QIP system. It highlights how these vulnerabilities allowed foreign actors (China and Russia) and hacker groups (Anonymous) to access sensitive personnel data, noting that Edward Snowden used these compromised systems to update his clearance in 2011.
| Name | Role | Context |
|---|---|---|
| Snowden | Intelligence Employee / Whistleblower |
Mentioned as an example of someone who updated his security clearance in 2011 using the vulnerable e-QIP system.
|
| Name | Type | Context |
|---|---|---|
| NSA |
National Security Agency; subject of data breaches via contractors.
|
|
| USIS |
U.S. Investigations Services; sued for vetting failures and suffered massive data breaches.
|
|
| Department of Homeland Security |
Counterintelligence unit discovered the breach in USIS in 2014.
|
|
| Chinese intelligence service |
Attributed to the intrusion into USIS records.
|
|
| Anonymous |
Took credit for the 2011 attack on Booz Allen Hamilton servers.
|
|
| Booz Allen Hamilton |
NSA's largest contractor; servers hacked by Anonymous in 2011.
|
|
| Office of Personnel Management |
OPM; cited for security failures regarding the e-QIP system.
|
|
| Congress |
Informed by the U.S. government in 2015 regarding China's responsibility for hacks.
|
|
| House Oversight Committee |
Inferred from the Bates stamp 'HOUSE_OVERSIGHT_019705'.
|
"On August 20, 2015, USIS agreed to forfeit $30 million in fees to settle the lawsuit."Source
"USIS’s lack of security in its website left a gaping hole through which outside parties, including Chinese and Russian hackers, could learn both the identity and the background information of specialists applying for jobs at the NSA."Source
"If amateur hackers such as Anonymous could break into the computers of the NSA’s largest contractor, so could adversaries’ state espionage services with far more advanced hacking tools."Source
"It has repeatedly been hacked by unknown parties since 2010."Source
Complete text extracted from the document (2,478 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document