HOUSE_OVERSIGHT_020273.jpg

Extraction Summary

4
People
3
Organizations
1
Locations
1
Events
2
Relationships
3
Quotes

Document Information

Type: Investigative report / book excerpt (house oversight committee document)
File Size:
Summary

This document appears to be a page from an investigative report or book regarding the Edward Snowden NSA leaks, bearing a House Oversight Committee stamp. It details the technical security measures at the NSA (EMP shielding, sealed USB ports) and argues that Snowden would have required assistance—potentially a 'witting accomplice'—to bypass these measures and steal data, as he lacked the necessary system administrator privileges and equipment. Note: While the prompt requested an analysis of an 'Epstein-related' document, this specific page refers exclusively to Edward Snowden and NSA security protocols.

People (4)

Name Role Context
Edward Snowden Subject
Former NSA contractor/analyst accused of stealing data.
Poitras Journalist/Contact
Laura Poitras; received communication from Snowden regarding document delivery.
Booz Allen source/executive Informant/Source
Provided technical details about NSA security and Snowden's capabilities to the author.
System Administrators NSA Staff
The only employees with privileges to open sealed USB ports.

Organizations (3)

Name Type Context
NSA
National Security Agency; target of the data breach.
Booz Allen
Booz Allen Hamilton; Snowden's employer at the time.
House Oversight Committee
Source of the document (indicated by footer stamp).

Timeline (1 events)

April 2013
Snowden starts working for Booz Allen at 'the Center'.
The Center (NSA)

Locations (1)

Location Context
Specific NSA facility where Snowden worked and the breach occurred.

Relationships (2)

Edward Snowden Source/Journalist Poitras
Snowden told her in early April 2013 that he planned to deliver documents...
Edward Snowden Employment Booz Allen
started working for Booz Allen at the Center

Key Quotes (3)

"But just asking such a favor could “set off alarms.”"
Source
HOUSE_OVERSIGHT_020273.jpg
Quote #1
"It does not seem plausible (to me) that in making such a commitment he was merely counting on the kindness of strangers to fulfill it"
Source
HOUSE_OVERSIGHT_020273.jpg
Quote #2
"But such a contact leads to a witting accomplice scenario."
Source
HOUSE_OVERSIGHT_020273.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (3,439 characters)

121
possible that Snowden smuggled in a key logger in his backpack, it could not be operated wirelessly inside the Center because, like all other NSA facilities, the computers had been insulated to lock-out wireless transmission. This precaution was taken to guard against an EMP, or Electro-Magnetic Pulse, attack by an enemy. If so, the only way Snowden could intercept key strokes was to attach a cable from his key logger to each of his fellow workers’ computers. In this scenario, he would have to surreptitiously build his own wired network connecting his hidden key logger to 24 separated computers. Moreover, he would have to do this wiring in an open-plan office where he could not count on these additional wires, even if rigged one by one, not being noticed by either other analysts on the room or the geek squad of system administrators who regularly checked connections. Making the task even more risky, according to my Booz Allen source, there were closed-circuit cameras. The only way he could mitigate the risk of detection was by having someone help him build this network.
There was a further security barrier he had to get by. Even after he managed to obtain all the necessary passwords from colleagues, he had to transfer the files to an external storage device. This was not a matter of simply using a thumb drive because, unlike in caper movies such as Mission Impossible, the ports on the computers at the NSA were ordinarily sealed shut. This measure was done specifically to prevent any unauthorized downloading by NSA workers. The only people at the Center who had the authorization, and the means, to open these ports and transfer data were system administrators, according to the former Booz Allen executive. System administrators needed to have this privilege to deal with glitches in the computers. So they were allowed to open up the sealed ports. But Snowden was no longer a system administrator and did not have these privileges. So again, he needed some help. He either would need to borrow another system administrator’s credential or forge his own. The credential he would need is called a public key infrastructure card with its authentication code embedded in a magnetic stripe. When I asked the former Booz Allen executive if Snowden possessed the skill set to forge such a card, he said that he strongly doubted any NSA employee would be capable of such a forgery without special equipment. He could have, however, borrowed this credential from a system administrator who was willing to help him. But just asking such a favor could “set off alarms.”
The unwitting accomplice scenario had another stumbling block: time. We know from Poitras that Snowden told her in early April 2013 that he planned to deliver documents to her in six to eight weeks (which he in fact did.) But he had not yet started working for Booz Allen at the Center until that same month. It does not seem plausible (to me) that in making such a commitment he was merely counting on the kindness of strangers to fulfill it The only way he could have known for certain that he would be able to borrow a public key infrastructure card and obtain the passwords, whether by trickery or by a key router, before he had begun working at the Center was that he already knew someone at the Center who would help him. But such a contact leads to a witting accomplice scenario.
The Witting Accomplice Possibility
HOUSE_OVERSIGHT_020273

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document