HOUSE_OVERSIGHT_020228.jpg

Extraction Summary

8
People
10
Organizations
2
Locations
2
Events
4
Relationships
4
Quotes

Document Information

Type: Government report / book excerpt
File Size:
Summary

The document discusses the security vulnerabilities within the NSA created by a "culture of transparency" and reliance on civilian contractors like Edward Snowden, who worked for Dell. It highlights how Snowden was able to openly organize crypto parties and communicate with anti-NSA activists while working as a contractor, as legal constraints prevented the NSA from monitoring his private activities without a FISA warrant.

Organizations (10)

Name Type Context
Dell
NSA
TOR project
CIA
NSA Review Committee
NSANet
Oahu Crypto Party
Q counterespionage unit
FBI
FISA court

Timeline (2 events)

Oahu Crypto Parties
2014 NSA Review

Locations (2)

Location Context

Relationships (4)

to
to

Key Quotes (4)

"“loose lips sink ships”"
Source
HOUSE_OVERSIGHT_020228.jpg
Quote #1
"“culture of transparency.”"
Source
HOUSE_OVERSIGHT_020228.jpg
Quote #2
"“Snowden was not a NSA employee.”"
Source
HOUSE_OVERSIGHT_020228.jpg
Quote #3
"“The idea was to spread knowledge and learn from the successes of others,” Morell wrote, “but it created an enormous security vulnerability...”"
Source
HOUSE_OVERSIGHT_020228.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (2,769 characters)

76
Even while he used his position as a system administrator at Dell for the NSA to download
secret documents, Snowden remained in touch with some of the leading figures in the TOR
project under his various aliases. He also continued to invite activists to his crypto parties and he
openly advertised the Oahu Crypto Parties on the Internet until 2013. It certainly was not the
“loose lips sink ships” mind set of the NSA’s Cold War days. It better reflected on what CIA
Deputy Director Morell, who reviewed the situation in 2014 as a member of President Obama’s
NSA Review Committee, described as the NSA’s new “culture of transparency.” Even though the
NSA’s activities were largely walled off to the outside world, he found that the NSA in the post-
Cold War age had encouraged its technical workers to freely discuss challenges that arose in its
computer operations. ‘The idea was to spread knowledge and learn from the successes of others,”
Morell wrote, “but it created an enormous security vulnerability, given the always-existent risk of
an insider committed to stealing secrets.” According to a former intelligence executive, this new
“open culture,” exemplified by largely unrestricted entry to the NSANet by civilian contractors,”
fit the culture of the young civilians on the “geek squads” who now ran the NSA’s computer
networks.
It was remarkable that even in such “open culture “Snowden’s crypto party, TOR station, and
other anti-NSA activities could go unnoticed. After all, ten or so NSA workers attended the first
party it is not unlikely that many of them recognized him as their co-worker. If so, they knew (as
did Sandvik and Mills) that the TOR advocate “Cincinnatus” was Snowden. He had also not been
shy in contacting via email notable enemies of the NSA, such as Jacob Appelbaum, Parker
Higgins and Asher Wolf on behalf of the “Oahu Crypto Party.” If anyone, including the security
staff of the NSA, had been on the lookout for dissident intelligence workers, this well-advertised
gathering, and its organizer, might have been of interest. In 2014, I asked a former top NSA
executive whether such activities on behalf of TOR by a NSA employee would arouse the
attention of the NSA’s own “Q” counterespionage unit. He answered, “Snowden was not a NSA
employee.” As a contract employee of Dell residing in the United States, the NSA could not
legally monitor his private activities or intercept his communication. To do so, would require a
FBI request approved by the FISA court. So Snowden/Cincinnatus was free to operate openly in
recruiting NSA workers, hacktavists and computer buffs for his events. Ironically, adversary
intelligence services searching for disgruntled intelligence workers had no such constraints.
HOUSE_OVERSIGHT_020228

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document