Skip to main content
Skip to content
Case File
kaggle-ho-020311House Oversight

NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare

NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare The passage outlines alleged internal NSA practices—mandatory error reporting, planting viruses on private computers, and broad cyber retaliation authority—linking high‑level officials (NSA Director Keith Alexander, former Director of National Intelligence James Clapper) and the Pentagon's Cyber Command. While it provides specific organizational details and suggests possible illegal surveillance and cyber operations, it lacks concrete dates, transaction data, or direct evidence, limiting its immediacy but still offering actionable leads for further FOIA or whistleblower inquiries. Key insights: NSA required exhaustive error reporting every 90 days, creating administrative burden.; NSA Director Keith Alexander also headed the newly created Cyber Command in 2009.; Alleged deployment of sentinel viruses on “hundreds of thousands” of private computers.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020311
Pages
1
Persons
4
Integrity
No Hash Available

Summary

NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare The passage outlines alleged internal NSA practices—mandatory error reporting, planting viruses on private computers, and broad cyber retaliation authority—linking high‑level officials (NSA Director Keith Alexander, former Director of National Intelligence James Clapper) and the Pentagon's Cyber Command. While it provides specific organizational details and suggests possible illegal surveillance and cyber operations, it lacks concrete dates, transaction data, or direct evidence, limiting its immediacy but still offering actionable leads for further FOIA or whistleblower inquiries. Key insights: NSA required exhaustive error reporting every 90 days, creating administrative burden.; NSA Director Keith Alexander also headed the newly created Cyber Command in 2009.; Alleged deployment of sentinel viruses on “hundreds of thousands” of private computers.

Tags

kagglehouse-oversighthigh-importancensacyber-commandsurveillancecyber-warfarefisa-court

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
159 single tasking decision” approved by the FISA court. According to Rajesh De, just assembling these reports involved thousands of hours of manpower. In addition, the President’s Oversight Board required that NSA’s Office of the General Counsel and Inspector General supply it every 90 days with a list of every single error made by every NSA employee anywhere in the world deviating from procedures, including even minor typing errors. These requirements, according to De, inundated a large part of the NSA legal and executive staff in a sea of red tape. Yet, this regulation could not undo surveillance programs such as the one Snowden revealed of Verizon turning over the billing records of its custumers to the NSA, because the NSA was in compliance with the FISA court order (even though, as it turned out in 2015, the FISA court may have erred in interpreting the law.) The NSA’s focus on surveillance may have led to the neglect of its second mission: protecting the integrity of the channels through which the White House, government agencies and military units send information. This task had been made vastly more difficult by the proliferation of computer networks, texting and emails in the 21* century. To protect against cyber attacks against government networks, the Pentagon belatedly created the Cyber Command in 2009. In it, the cyber defense units of the Army, Navy, Marines, and Air Force cyber forces, were merged together in this new command put under the command of the NSA director. NSA director Keith Alexander became the first director of this new command. One problem for the Cyber command was separating attacks by civilians, including criminals, hacktavists and anarchists, from cyber warfare sponsored and supported by adversary states. Since foreign intelligence services often closely imitated the tools of civilian hackers, and were even known to provide them with hacking tools. Even for the Cyber Command, it was not easy challenge to unambiguously determine if the ultimate perpetrator of a cyber attacks was state-sponsored. For example, the identification of North Korea as the principal actor behind the attack on Sony in December 2014 appeared to be a rare success, but many cyber-security experts believed that it might be a false trail used to hide the real attacker. The problem here was that clues can be fabricated in cyber space to point to the wrong party. The job of the Cyber command was to prevent such an attack. To this end, it planted viruses on hundreds of thousands of computers in private hands to act as sentinels to spot other suspicious viruses that could mount such an attack. So private computers became a new battleground in the cyber was. It also built a capability to retaliate. The problem was that, unlike incoming missiles, cyber attacks which were launched through layers of other country’s computers could not be unambiguously traced back to the true perpetrator. This escalation by the Cyber Command set the stage for expanded forms of warfare in Cyber space. “The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid,” General Alexander said in explaining the need for this consolidation. “If that is determined to be an organized attack, I would want to go and take down the source of those attacks.” The same retaliation would presumably be used against Russia, Iran or any other adversary. Dominance of cyber space itself now became part of the NSA’s mandate. Even so, the most important job of the NSA remained intercepting secret information from Russia, China, Iran, and North Korea. To this end, it had an annual budget of $12.3 billion and some 35,000 military and civilian employees. In 2012, James Clapper, Jr., the Director of

Related Documents (6)

House OversightNov 16, 2015

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts”

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts” The passage only provides a title and metadata for a 287‑page draft about the Snowden affair. It contains no specific names, dates, transactions, or allegations that could be pursued as an investigative lead. Consequently, it offers no actionable information and is likely already covered in public discourse. Key insights: Document appears to be a draft manuscript by Edward Jay Epstein.; Length indicated as 287 pages, suggesting extensive coverage.; Associated with a House Oversight file identifier (HOUSE_OVERSIGHT_020153).

1p
House OversightUnknown

Sparse House Oversight Document Lacks Substantive Content

Sparse House Oversight Document Lacks Substantive Content The document contains only a header and no substantive information linking any influential actors, financial flows, or misconduct. It provides no actionable leads for investigation. Key insights: Document appears to be a placeholder or file identifier only; No names, dates, transactions, or allegations present

1p
House OversightUnknown

Empty House Oversight Document Lacks Substantive Content

Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.

1p
House OversightJan 5, 2018

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details

1p
Dept. of JusticeAug 22, 2017

15 July 7 2016 - July 17 2016 working progress_Redacted.pdf

Kristen M. Simkins From: Sent: To: Cc: Subject: Irons, Janet < Tuesday, July 12, 2016 10:47 AM Richard C. Smith     Hello Warden Smith,     mother is anxious to hear the results of your inquiry into her daughter's health.   I'd be grateful if you could  email or call me at your earliest convenience.  I'm free today after 2 p.m.  Alternatively, we could meet after the Prison  Board of Inspectors Meeting this coming Thursday.    Best wishes,    Janet Irons    1 Kristen M. Simkins From: Sent:

1196p
House OversightFinancial RecordNov 11, 2025

Prosecutor’s Home Torched in Suspected Arson; Senator Alvin Williams Jr. Charged with $1.1 M Bribery Scheme

The passage contains two distinct leads involving high‑ranking officials in the U.S. Virgin Islands. The suspected arson of Assistant Attorney General Kip Roberson’s home could be linked to ongoing co Assistant Attorney General Kip Roberson’s residence was destroyed by fire; surveillance cameras were Fire and police investigators suspect the arson may be connected to cases Roberson was handling fo

36p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.