HOUSE_OVERSIGHT_020333.jpg

Extraction Summary

2
People
11
Organizations
6
Locations
3
Events
0
Relationships
3
Quotes

Document Information

Type: Report / book excerpt (house oversight document)
File Size:
Summary

This document appears to be page 181 of a larger report or book, stamped with a House Oversight footer, detailing the history and tactics of Chinese cyber-espionage against the United States. It discusses the organizational structure of Chinese intelligence, specific hacking campaigns against US contractors like Booz Allen and tech companies like Google and Adobe, and the massive data breach at the Office of Personnel Management (OPM) that exposed millions of federal employee records. The text mentions Paul Strassmann and Edward Snowden but does not contain any specific references to Jeffrey Epstein or his associates.

People (2)

Name Role Context
Paul Strassmann Top US defense expert on cyber-espionage
Reported in 2007 that China had inserted 'zombie' programs in 700,000 US computers.
Snowden Intelligence worker (Reference)
Mentioned as an example of someone with SCI clearance.

Timeline (3 events)

2007
Paul Strassmann reports China inserted 'zombie' programs in 700,000 US computers.
US
2009
Intrusions into computer network at the Office of Personnel Management begin.
US
2015
Cyber attack harvested over twenty million personnel files of Federal employees.
US

Locations (6)

Key Quotes (3)

"China shared (or exchanged) the fruits of its espionage on nuclear warhead design with North Korea, Pakistan, Iran and Russia."
Source
HOUSE_OVERSIGHT_020333.jpg
Quote #1
"By 2007, Paul Strassmann, a top US defense expert on cyber-espionage, reported that China had inserted “zombie” programs in some 700,000 computers in the US"
Source
HOUSE_OVERSIGHT_020333.jpg
Quote #2
"Eventually, by 2015, according to US estimates, the cyber attack had harvested over twenty million personnel files of past and present Federal government employees."
Source
HOUSE_OVERSIGHT_020333.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (3,708 characters)

181
weapons laboratories.” The Chinese intelligence service further obtained from private US defense contractors through cyber espionage important elements of the stealth technology used in both advanced planes and submarines. China shared (or exchanged) the fruits of its espionage on nuclear warhead design with North Korea, Pakistan, Iran and Russia.
Despite its formidable intelligence coups in the US, the Chinese intelligence service managed to remain among the most elusive of America’s intelligence adversaries. Its espionage organizations are hidden behind layers of bureaucracy in the Ministry of State Security, Chinese Communist party structures, and the second, third and fourth department of the General Staff of the People’s Liberation Army. Much of its cyber espionage units are concealed on the campuses of its universities. Its hierarchy, or order of battle, is also obscure. Few traces have been uncovered of any conventional espionage networks in the United States and no major Chinese spy has ever been arrested. Part of the reason that Chinese espionage has proved so elusive to the eyes of western counter-intelligence, was that, unlike Russia, it did not ordinarily rely on intelligence officers in its embassies to recruit penetration agents to steal secrets. It did not even have an embassy in the United States during most of the Cold War. Instead, its services specialize it assembly mosaics of intelligence assembled from a wide variety of sources including non-classified documents, returning graduate students, scientific conferences, exchanges with allies, and a vast operation of hacking into computers, or cyber- espionage.
Cyber-espionage is indeed a vast enterprise in China. Graduating over 150,000 computer science engineers, it had no shortage of personnel. It also had developed the cyber tool kit to gain access to the computer networks of US government contractors and consultants in the private sector and government agencies, planting “sleeper” bugs in net-worked computers. Like human “sleeper” agents, these hidden programs can be activated when needed for operational purposes. Chinese controllers can retrieve emails, documents and turn on the cameras and microphones of personal computers, tablets and smart phones. By 2007, Paul Strassmann, a top US defense expert on cyber-espionage, reported that China had inserted “zombie” programs in some 700,000 computers in the US which could be used to mount cyber attack to retrieve emails from other computers. The Chinese service also reportedly penetrated companies that provide Internet services, including Google Yahoo, Symantec, and Adobe, which allowed it to track emails and enclosures of individuals. With such an invisible army of zombie computers, it is not entirely surprising that China finds little need to employ human: sleeper” agents.
Chinese cyber-specialists used this capability to hack into computers of outside contractors, including Booz Allen and other companies that supplied technologists to the NSA. It also had notable successes in obtaining the dossiers of US employees and independent contractors at the NSA, CIA and other intelligence services. Its intrusions, as previously noted, into computer network at the Office of Personnel Management traced back to 2009. Eventually, by 2015, according to US estimates, the cyber attack had harvested over twenty million personnel files of past and present Federal government employees. In addition, it reaped in over 14 million background checks of intelligence workers done by the Federal Investigative Service. All the intelligence workers with a SCI clearance, such as Snowden, were required to provide in these
HOUSE_OVERSIGHT_020333

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document