HOUSE_OVERSIGHT_019694.jpg

1.72 MB

Extraction Summary

3
People
3
Organizations
1
Locations
2
Events
2
Relationships
4
Quotes

Document Information

Type: Book page / published literature (likely evidentiary submission)
File Size: 1.72 MB
Summary

This document appears to be page 206 from the book 'How America Lost Its Secrets' by Edward Jay Epstein (indicated by the file name 'Epst_' and the book title header). It discusses the NSA's operations at Fort Meade, the impact of the Edward Snowden leaks, and the agency's specific capability developed in 2007 to intercept internet traffic before encryption. It also details internal NSA security protocols, including the use of 'compartments' and the 'NSANet' to manage classified information.

People (3)

Name Role Context
Director of National Intelligence Government Official
Justified the secret intelligence budget in an open session of Congress (Likely James Clapper based on historical con...
Snowden Whistleblower / Former Contractor
Mentioned regarding the breach that revealed NSA capabilities and the 2007 interception methods.
The President US President
Recipient of intelligence insights provided by the NSA.

Organizations (3)

Name Type Context
NSA
Primary subject of the text; described regarding its capabilities at Fort Meade and internal networks.
Congress
Body to whom the DNI justified the intelligence budget.
NSANet
A 'Wiki-style' network used by NSA officers and technicians.

Timeline (2 events)

2007
NSA found a way to intercept Internet traffic before it was encrypted.
NSA / Internet
NSA
2013 (Implied by Snowden references)
The Snowden breach which revealed NSA secrets.
Global

Locations (1)

Location Context
The heart of the NSA's activity, a five-thousand-acre base.

Relationships (2)

NSA Intelligence Provider The President
NSA had the capability to provide the president and his advisers with continuous insights
Snowden Adversarial/Leaker NSA
Snowden revealed it... the Snowden breach

Key Quotes (4)

"We are bolstering our support for clandestine SIGINT [signals intelligence] capabilities to collect against high priority targets, including foreign leadership targets"
Source
HOUSE_OVERSIGHT_019694.jpg
Quote #1
"groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic."
Source
HOUSE_OVERSIGHT_019694.jpg
Quote #2
"What was a closely held secret before Snowden revealed it was that the NSA had found a way in 2007 to intercept Internet traffic before it was encrypted."
Source
HOUSE_OVERSIGHT_019694.jpg
Quote #3
"Consequently, the NSA had the capability to provide the president and his advisers with continuous insights into the thinking and planning of potential enemies."
Source
HOUSE_OVERSIGHT_019694.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (2,537 characters)

206 | HOW AMERICA LOST ITS SECRETS
per, director of national intelligence, justified the secret intelligence budget by saying in an open session of Congress, "We are bolstering our support for clandestine SIGINT [signals intelligence] capabilities to collect against high priority targets, including foreign leadership targets," and to develop "groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic." It was no secret to Congress, even before Snowden, that the NSA was attempting to monitor the Internet. What was a closely held secret before Snowden revealed it was that the NSA had found a way in 2007 to intercept Internet traffic before it was encrypted.
Through all this tumult, the heart of the NSA's activity remained its five-thousand-acre base at Fort Meade, Maryland. It commanded the most powerful mechanism for intercepting communications that the world had ever seen. No other country came close to its technology for intercepting information. The NSA not only was able to intercept secret information from potential adversaries but also—at least until the Snowden breach—managed to conceal these means from them. As long as these adversaries remained blind to the ways in which their communications were being intercepted, deciphered, and read by the NSA, they could not take effective countermeasures. Consequently, the NSA had the capability to provide the president and his advisers with continuous insights into the thinking and planning of potential enemies.
Keeping its sources and methods secret was no easy task. The NSA's technicians had to deal with continuous technical challenges to provide a seamless harvesting of data from a wide range of communication devices, including telephones, computers, and the Internet. It required continuous intra-agency communications between the NSA's own intelligence officers and a growing number of civilian technicians. It even had its own "Wiki-style" network through which they could discuss problems, called the NSANet. Because it could not tightly control access to this technical network, it expunged any mention of the sources and methods from the material circulated on the classified NSA network. Instead, it stored them in discrete computers, called compartments, which were disconnected from other computers at the NSA. These compartments could only be accessed by a limited number of analysts and NSA executives who had a need
Epst_9780451494566_2p_all_r1.indd 206 9/30/16 8:13 AM
HOUSE_OVERSIGHT_019694

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document