HOUSE_OVERSIGHT_019718.jpg

1.7 MB

Extraction Summary

4
People
4
Organizations
3
Locations
2
Events
1
Relationships
4
Quotes

Document Information

Type: Book excerpt / congressional evidence
File Size: 1.7 MB
Summary

This document is page 230 from the book 'How America Lost Its Secrets' (authored by Edward Jay Epstein, likely confusing the keyword search for 'Epstein'). The text discusses the strategies of Russian intelligence agencies (SVR and KGB) to recruit hacktivists and target NSA insider personnel. It references Edward Snowden as a donor to Ron Paul and cites a 1996 NSA report predicting that foreign intelligence would eventually target system administrators and engineers rather than relying solely on external hacking. The page bears a 'HOUSE_OVERSIGHT' stamp, indicating it was submitted as evidence to Congress.

People (4)

Name Role Context
Edward Snowden Subject of book/Donor
Mentioned as a donor to Ron Paul's campaign and context for intelligence discussion.
Ron Paul Politician
Ran a libertarian election campaign supported by hacktivists/Snowden.
NSA Threat Officer Intelligence Official
Cited failures in a 1996 report on NSA vulnerability.
Edward Jay Epstein Author (Implied)
Author of the book 'How America Lost Its Secrets' (inferred from title and file metadata 'Epst').

Organizations (4)

Name Type Context
NSA
National Security Agency; target of hacktivists and Russian intelligence.
SVR
Russian Foreign Intelligence Service; seeking to recruit hacktivists.
KGB
Committee for State Security (Russia); historical reference regarding earlier espionage efforts.
House Oversight Committee
Government body; document bears the stamp 'HOUSE_OVERSIGHT'.

Timeline (2 events)

1996
NSA threat officer releases report on NSA vulnerability regarding Russian recruitment efforts.
USA
NSA threat officer
2016-09-30
Document processing/printing date per footer.
Unknown

Locations (3)

Location Context
Location of earlier KGB efforts to use hacktivist groups.
Described as more authoritarian than the US regarding the Internet.
Comparison country regarding authoritarianism.

Relationships (1)

Edward Snowden Donor/Candidate Ron Paul
The donors to Ron Paul’s libertarian election campaign (including Snowden) were a matter of public record.

Key Quotes (4)

"The donors to Ron Paul’s libertarian election campaign (including Snowden) were a matter of public record."
Source
HOUSE_OVERSIGHT_019718.jpg
Quote #1
"One viable alternative for the SVR was custom-tailoring false flags to appeal to hacktivists."
Source
HOUSE_OVERSIGHT_019718.jpg
Quote #2
"The KGB had learned that hacking by itself could not breach the NSA’s protective stovepiping."
Source
HOUSE_OVERSIGHT_019718.jpg
Quote #3
"He predicted that its next logical move would be to 'target insider computer personnel.'"
Source
HOUSE_OVERSIGHT_019718.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (2,556 characters)

230 | HOW AMERICA LOST ITS SECRETS
and software on the Internet, all of which fell under the rubric of
“freedom of the Internet.” They also vocally objected to the NSA’s
using built-in back doors in its software to read their encrypted
messages. Such people were not difficult to find on the Internet.
The donors to Ron Paul’s libertarian election campaign (including
Snowden) were a matter of public record.
Even if there was no shortage of hacktivists who believed the sur-
veillance of the Internet by the NSA was an evil worth fighting, the
SVR still had to find a plausible way of approaching members of
this counterculture without offending them. Clearly, the SVR could
no longer use out-of-date Communist and anti-capitalist ideology
as a lure. Russia was far more authoritarian than the United States
when it came to the Internet. One viable alternative for the SVR was
custom-tailoring false flags to appeal to hacktivists.
For this purpose, the Internet provided a near-perfect realm.
Because it is a place where true identities cannot easily be veri-
fied, intelligence services could employ a protean kit of disguises to
assume false identities to entice potential dissidents into communi-
cating with them. The KGB’s earlier efforts to use hacktivist groups
in Germany had produced little if any intelligence about the NSA
because of the stovepiping it used to isolate its computers from net-
works that could be hacked into from the outside. It will be recalled
that the NSA threat officer had cited these failures in his 1996 report
on NSA vulnerability. He also said that efforts of the Russian intel-
ligence services to use false flag recruitments provided the KGB with
“a learning experience.” The KGB had learned that hacking by itself
could not breach the NSA’s protective stovepiping. He predicted that
its next logical move would be to “target insider computer person-
nel.” This false flag recruitment would aim at, in his view, system
administrators, computer engineers, and cyber-service workers who
either were already inside the NSA or had a security clearance that
would facilitate getting jobs with NSA contractors.
Even with an appropriate false flag, the task of finding such a
“Prometheus” required obtaining a database of those working at
the NSA. There were some five thousand civilian technicians at the
NSA of all political stripes. Hacking into the personnel records of
the intelligence workers seeking to renew their security clearance
Epst_9780451494566_2p_all_r1.indd 230
9/30/16 8:13 AM
HOUSE_OVERSIGHT_019718

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document