| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
person
NSA/CIA
|
Former leadership |
5
|
1 | |
|
person
NSA
|
Leadership |
5
|
1 | |
|
organization
Wall Street Journal
|
Interview subject |
5
|
1 | |
|
person
Rob Rogers
|
Professional |
5
|
1 | |
|
person
Author
|
Source interviewer |
5
|
1 |
| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| 2015-06-01 | N/A | Author interviews General Hayden. | Unknown | View |
| 2015-01-01 | N/A | Interview with General Hayden regarding cyber warfare. | Unknown | View |
This document is page 218 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein), stamped as evidence by the House Oversight Committee. It details the security risks inherent in the NSA's outsourcing of intelligence work to private contractors like Booz Allen Hamilton and Dell, highlighting a 'revolving door' of high-level executives moving to private firms. The text specifically cites Edward Snowden's ability to move between contractors (Dell to Booz Allen) as a realization of security vulnerabilities warned about in NSA memos dating back to 2005.
This is page 213 of a book (likely by Edward Jay Epstein, based on the filename 'Epst' and ISBN) marked as evidence for the House Oversight Committee. The text details the NSA's reliance on private contractors/ex-hackers for system administration and the security vulnerabilities created by moving sensitive data to networks to avoid 'stove-piping,' citing General Hayden and FBI Director Mueller. It lists major contractors including Booz Allen Hamilton and Microsoft who managed classified systems by 2013.
This document is page 207 from a book (likely by Edward Jay Epstein based on the filename 'Epst' and context) discussing the impact of Edward Snowden's intelligence breach on the NSA. It details how Snowden gained access in 2009 and 2013, the compromise of intelligence regarding Russia, Iran, and China, and the subsequent efforts by NSA Director Rogers to manage the fallout and morale issues in 2014. The page bears a House Oversight Bates stamp, indicating it was part of a congressional production.
This document is page 193 of a book (likely 'How America Lost Its Secrets' by Edward Jay Epstein, based on the ISBN in the footer) included in House Oversight Committee records. The text discusses the NSA's offensive intelligence strategy, the 2010 CIA penetration of the Russian SVR, and the catastrophic failure caused by Edward Snowden's theft of secret source lists. It details how Snowden fled to China and Russia, potentially upending U.S. intelligence capabilities, and references subsequent cyber breaches of U.S. networks in 2014 and 2015.
This document is page 192 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein, given the filename 'Epst...'), stamped with 'HOUSE_OVERSIGHT_019680'. The text discusses intelligence failures involving the CIA, KGB, and NSA, specifically detailing how Russian disinformation was unwittingly passed to Presidents Reagan, Bush, and Clinton via 'blue-striped' reports. It also mentions the Snowden breach and quotes General Hayden on the nature of cyber warfare.
This document page, stamped HOUSE_OVERSIGHT_020334, details the intelligence and cyber warfare capabilities of China and its cooperation with Russia. It discusses the hacking of Anthem to gain leverage over US government employees, quotes General Hayden on the legitimacy of such intelligence targets, and outlines a 1992 intelligence-sharing treaty between Russia and China. The text also highlights the geopolitical alignment of Putin and Xi Jinping in 2014 against US global dominance.
This document discusses the likelihood of Edward Snowden's cooperation with Russian security services (FSB) following his arrival in Russia. It cites experts like Andrei Soldatov and General Oleg Kalugin, who argue that the FSB would inevitably control and exploit Snowden, and details how lawyer Anatoly Kucherena facilitated Snowden's stay in Moscow under Kremlin-dictated terms.
Hayden stated he saw no possibility other than Snowden cooperating with Russian services.
I would lose all respect for the Russian and Chinese security services if they haven’t fully exploited everything Snowden had to give.
Author asked if successes in breaking U.S. defenses were made easier by documents compromised by Snowden.
Hayden admitted they fell in love with the ease of electronic storage despite vulnerabilities.
Discussion on the lack of defensive advantages in cyber warfare.
Warned that reliance on outsiders opened a back door into the NSA
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity