This document is page 230 from the book 'How America Lost Its Secrets' (authored by Edward Jay Epstein, likely confusing the keyword search for 'Epstein'). The text discusses the strategies of Russian intelligence agencies (SVR and KGB) to recruit hacktivists and target NSA insider personnel. It references Edward Snowden as a donor to Ron Paul and cites a 1996 NSA report predicting that foreign intelligence would eventually target system administrators and engineers rather than relying solely on external hacking. The page bears a 'HOUSE_OVERSIGHT' stamp, indicating it was submitted as evidence to Congress.
| Name | Role | Context |
|---|---|---|
| Edward Snowden | Subject of book/Donor |
Mentioned as a donor to Ron Paul's campaign and context for intelligence discussion.
|
| Ron Paul | Politician |
Ran a libertarian election campaign supported by hacktivists/Snowden.
|
| NSA Threat Officer | Intelligence Official |
Cited failures in a 1996 report on NSA vulnerability.
|
| Edward Jay Epstein | Author (Implied) |
Author of the book 'How America Lost Its Secrets' (inferred from title and file metadata 'Epst').
|
| Name | Type | Context |
|---|---|---|
| NSA |
National Security Agency; target of hacktivists and Russian intelligence.
|
|
| SVR |
Russian Foreign Intelligence Service; seeking to recruit hacktivists.
|
|
| KGB |
Committee for State Security (Russia); historical reference regarding earlier espionage efforts.
|
|
| House Oversight Committee |
Government body; document bears the stamp 'HOUSE_OVERSIGHT'.
|
| Location | Context |
|---|---|
|
Location of earlier KGB efforts to use hacktivist groups.
|
|
|
Described as more authoritarian than the US regarding the Internet.
|
|
|
Comparison country regarding authoritarianism.
|
"The donors to Ron Paul’s libertarian election campaign (including Snowden) were a matter of public record."Source
"One viable alternative for the SVR was custom-tailoring false flags to appeal to hacktivists."Source
"The KGB had learned that hacking by itself could not breach the NSA’s protective stovepiping."Source
"He predicted that its next logical move would be to 'target insider computer personnel.'"Source
Complete text extracted from the document (2,556 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document