HOUSE_OVERSIGHT_020329.jpg

Extraction Summary

3
People
11
Organizations
0
Locations
2
Events
2
Relationships
4
Quotes

Document Information

Type: Narrative report / book excerpt (likely from a congressional oversight file regarding intelligence/snowden)
File Size:
Summary

This document appears to be page 177 of a report or book (potentially by Edward Jay Epstein regarding Edward Snowden) submitted to House Oversight. It details the vulnerabilities of the NSA to 'insider threats' and Russian intelligence (SVR/KGB) recruitment tactics, specifically targeting system administrators. It discusses the 2011 OPM hack as a method for identifying potential recruits via Standard Form 86 data and links Edward Snowden to various anti-surveillance groups like Wikileaks and the TOR project in 2012-2013.

People (3)

Name Role Context
Snowden Intelligence Leaker / Target
Mentioned as having been in touch with anti-surveillance groups in 2012 and 2013.
Laura Poitras Journalist / Activist
Discussed regarding her defensive tactics against surveillance (PGP, TOR, air-gapped computers).
NSA threat officer Intelligence Official
Cited for a 1996 report on NSA vulnerability and predictions on Russian tactics.

Organizations (11)

Name Type Context
NSA
National Security Agency; target of espionage and hacking.
KGB
Russian intelligence agency (historical context).
Russian Intelligence Services / SVR
Current Russian intelligence agency; discussed regarding recruitment of insiders.
US Office of Personnel Management (OPM)
Government agency whose networks were hacked.
USIS
US Investigations Services; mentioned regarding security holes.
TOR project
Anti-surveillance group.
Wikileaks
Anti-surveillance / Leaking organization.
Noisebridge
Activist group.
Crypto Parties
Activist movement.
Freedom of the Press Foundation
Activist organization.
Electronic Freedom Foundation
Activist organization.

Timeline (2 events)

1996
NSA threat officer report on NSA vulnerability.
NSA
2011
Hacking of US Office of Personnel Management and USIS networks, making background checks available to adversaries.
US Office of Personnel Management
Chinese hackers Adversary intelligence services

Relationships (2)

Snowden Communication Anti-surveillance activists
Snowden, for example, had been in touch with members all these groups in 2012 and 2013.
Laura Poitras Journalistic Source (Implied) Snowden
Discussed in context of sources and secrets.

Key Quotes (4)

"He predicted that its next logical move would be to 'target insider computer personnel.'"
Source
HOUSE_OVERSIGHT_020329.jpg
Quote #1
"Finding the one who met its espionage requisites was the equivalent of seeking the sharpest needle in the proverbial giant haystack."
Source
HOUSE_OVERSIGHT_020329.jpg
Quote #2
"From the 127-page standard form 86 each applicant for a security clearance submits, the SVR could filter out intelligence workers employed by the NSA..."
Source
HOUSE_OVERSIGHT_020329.jpg
Quote #3
"Snowden, for example, had been in touch with members all these groups in 2012 and 2013."
Source
HOUSE_OVERSIGHT_020329.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (3,462 characters)

177
that could be hacked into from the outside. It will be recalled that the NSA threat officer had cited these failures in his 1996 report on NSA vulnerability. He also said that efforts of the Russian Intelligence Services to use false flag recruitments provided the KGB with “a learning experience.” The KGB had learned that hacking by itself could not breech the NSA’s protective stove-piping. He predicted that its next logical move would be to “target insider computer personnel.” These false flag recruitment would aim at, in his view, system administrators, computer engineers and cyber service workers who were either already inside the NSA or who had a secrecy clearance that would facilitate getting jobs with NSA contractors.
Even with an appropriate false flag, the task of finding such a “Prometheus” was daunting. There were some five thousand civilian technicians at the NSA of all political stripes. Finding the one who met its espionage requisites was the equivalent of seeking the sharpest needle in the proverbial giant haystack. For espionage purposes, however, recruiters did not have to find the sharpest needle, or any particular one; they just needed to find any needle in a position to cooperate. They could hone a willing recruit over time to do the job at hand.
The size of the haystack could also be reduced to more manageable proportions by hacking into the personnel records of the intelligence workers seeking to renew their security clearance. The Internet provided the SVR with just this opportunity. As discussed in the previous chapter, holes in the security of the computer networks of the US Office of the Office of Personal Management, USIS and the websites of the companies supplying the NSA with independent contractors had made the background checks on American intelligence workers available to the Chinese and presumably other adversary intelligence service hackers since 2011. If the SVR had access to this personnel data, the research for a candidate would be greatly facilitated. From the 127-page standard form 86 each applicant for a security clearance submits, the SVR could filter out intelligence workers employed by the NSA by their educational background, employment history, affiliations and foreign contacts. It could then search this data for candidates with a possible hacktivist profile,
This data could next be crossed with a list of individuals SVR in contact with high-profile activists who are part of the anti-surveillance movements. This would include core participants in the TOR project, Wikileaks, Noisebridge, Crypto Parties, and the Freedom of the Press Foundation and the Electronic Freedom Foundation. (Snowden, for example, had been in touch with members all these groups in 2012 and 2013.)
The SVR would have little problem monitoring even encrypted communications with leading figures in the Anti-surveillance world. These activists, despite secrecy rituals such as putting their cell phones in refrigerators, remain visible to a sophisticated intelligence service such as the SVR. Consider, for example, the defensive tactics of Laura Poitras, including PGP encryption, TOR software, and air-gapped computers which are computers that have never been connected to the Internet. She also famously changes her tables at restaurants to evade surveillance. With all these precautions, she did not keep secrets about her sources entirely to herself. Snowden, at a
HOUSE_OVERSIGHT_020329

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document