Skip to main content
Skip to content
Case File
kaggle-ho-020314House Oversight

NSA Oversight Risks Highlighted by Historical Mole Cases and Snowden’s Role

NSA Oversight Risks Highlighted by Historical Mole Cases and Snowden’s Role The passage draws parallels between past intelligence breaches (Aldrich Ames) and potential vulnerabilities in NSA network administration, citing Snowden’s former sysadmin position. It suggests a systemic oversight issue but provides no specific names, transactions, or actionable evidence, limiting its investigative value. Key insights: NSA internal reports from 1996 warned of a possible 'Aldrich Ames' type insider within system administration.; Edward Snowden’s background as a system administrator is highlighted as a potential risk factor.; The passage underscores a lack of oversight on private contractors performing governmental espionage functions.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020314
Pages
1
Persons
1
Integrity
No Hash Available

Summary

NSA Oversight Risks Highlighted by Historical Mole Cases and Snowden’s Role The passage draws parallels between past intelligence breaches (Aldrich Ames) and potential vulnerabilities in NSA network administration, citing Snowden’s former sysadmin position. It suggests a systemic oversight issue but provides no specific names, transactions, or actionable evidence, limiting its investigative value. Key insights: NSA internal reports from 1996 warned of a possible 'Aldrich Ames' type insider within system administration.; Edward Snowden’s background as a system administrator is highlighted as a potential risk factor.; The passage underscores a lack of oversight on private contractors performing governmental espionage functions.

Tags

kagglehouse-oversightmedium-importancensaoversightintelligence-securityedward-snowdenaldrich-ames

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
162 CHAPTER TWENTY The NSA’s Back Door “You have private for-profit companies doing inherently governmental work like targeted espionage, surveillance, compromising foreign systems. And there’s very little oversight, there’s very little review.” - Edward Snowden, explaining his access to the NSA in Moscow, 2014 Prior to Snowden’s theft of NSA documents, the single most shattering blow to the confidence of the US intelligence community was the exposure of Aldrich Ames as a long-serving Russian mole in the CIA in 1994. Ames, it will be recalled, had been a high-ranking CIA officer. He had even worked at the CIA’s Counterintelligence Center Analysis Group before he was arrested by the FBI. He had also worked as a mole for Russian intelligence. (His recruitment by the KGB will be further discussed in Chapter twenty-seven.) In a plea bargain to avoid the death sentence, he admitted that he had successfully burrowed into the CIA for over nine years on behalf of the KGB. His description of his sub rosa activities as a mole was part of the plea bargain. He was sentenced to life imprisonment. This stunning revelation shook the CIA leadership to its core. Up until then, as mentioned earlier, CIA executives steadfastly denied that it was possible that the KGB could sustain a mole in American intelligence. The Ames arrest also led the NSA to reassess its own vulnerability to penetration. Could there be an Ames inside the NSA? The question was considered by the NSA’s National Threats Operations Center, the same unit from which Edward Snowden later stole a huge trove of secret documents. According to a report in 1996 entitled “Out of Control” (later released by the NSA), the danger of an Ames-type penetration could not be excluded. Even though the “threat officer” who wrote this report was not identified by name, his analysis proved incredibly prescient. He said that the NSA’s drive to enhance its performance by networking its computers would result in the intelligence services, putting “all their classified information ‘eggs’ into one very precarious basket.” The basket was the computer networks run by technicians called: system administrators.” He pointed out that the NSA was becoming increasingly dependent on such networked computer systems, and he predicted that the NSA’s “Aldrich Ames.” As he put it, would be a “system administrator’ —which was the position that Edward Snowden held nearly two decades later at Dell when he began stealing secrets.

Related Documents (6)

House OversightUnknown

Sparse House Oversight Document Lacks Substantive Content

Sparse House Oversight Document Lacks Substantive Content The document contains only a header and no substantive information linking any influential actors, financial flows, or misconduct. It provides no actionable leads for investigation. Key insights: Document appears to be a placeholder or file identifier only; No names, dates, transactions, or allegations present

1p
House OversightNov 16, 2015

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts”

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts” The passage only provides a title and metadata for a 287‑page draft about the Snowden affair. It contains no specific names, dates, transactions, or allegations that could be pursued as an investigative lead. Consequently, it offers no actionable information and is likely already covered in public discourse. Key insights: Document appears to be a draft manuscript by Edward Jay Epstein.; Length indicated as 287 pages, suggesting extensive coverage.; Associated with a House Oversight file identifier (HOUSE_OVERSIGHT_020153).

1p
House OversightUnknown

Snowden’s 2009 NSA backup contract at Dell and alleged rogue admin vulnerability

Snowden’s 2009 NSA backup contract at Dell and alleged rogue admin vulnerability The passage provides specific details about Snowden’s employment with Dell on an NSA backup system (EPICSHELTER) in 2009, his system‑admin privileges, and a claimed security flaw that could allow a rogue administrator in Japan to exfiltrate data. While it names high‑profile actors (NSA, Dell, Snowden) and suggests a possible internal vulnerability, the claims are largely anecdotal, lack corroborating evidence, and repeat known narratives about Snowden’s background. Nonetheless, the concrete job description, contract name, and alleged flaw give a moderate investigative lead worth verifying. Key insights: Snowden was hired by Dell in Oct 2009 as a system administrator for NSA backup project ‘EPICSHELTER’.; The contract involved transferring encrypted NSA data to backup drives in Japan.; Snowden allegedly discovered a flaw allowing a rogue admin in Japan to steal unencrypted data.

1p
House OversightUnknown

Snowden’s early NSA contractor onboarding details and subterfuge at Booz Allen

Snowden’s early NSA contractor onboarding details and subterfuge at Booz Allen The passage recounts already‑public information about Edward Snowden’s application fraud, hiring by Booz Allen, and his orientation at the NSA. It offers no new actors, transactions, or undisclosed evidence, limiting investigative usefulness. While it touches on NSA procedures, the content is well‑known and provides little actionable lead. Key insights: Snowden falsified a degree claim on his Booz Allen application.; He was hired as a trainee‑analyst but never worked at the Honolulu office.; Assigned to NSA’s National Operations Threat Center at Kunia base.

1p
House OversightUnknown

NSA internal report from 1996 warned that outsourced system administrators could become insider threats like Snowden

NSA internal report from 1996 warned that outsourced system administrators could become insider threats like Snowden The passage cites a declassified 1996 NSA threat assessment that predicted insider risk from civilian system administrators – a lead that links NSA contracting practices to later leaks. It provides a concrete document title and timeframe, but lacks specific names of individuals or transactions, limiting immediate investigative steps. The claim is moderately novel and sensitive, implicating a major intelligence agency and its outsourcing model. Key insights: 1996 NSA report titled “Out of Control” warned of an “Ames‑type” penetration via system administrators.; The report identified civilian, contractor‑hired system administrators as a weak security link.; Privileges such as password bypass and external storage transfers were highlighted as breach risks.

1p
House OversightUnknown

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services The passage suggests Snowden stole a highly classified Congressional Budget Justification (the 2013 black budget) that details intelligence priorities and funding across multiple agencies. It claims the document would be valuable to adversary nations such as Russia’s SVR, implying a possible financial or strategic motive beyond whistleblowing. This provides a concrete lead (specific document, fiscal year, agencies) and ties to high‑level actors (NSA, CIA, President, Congress) and foreign intelligence services, making it a strong investigative angle, though the claim is unverified and relies on secondary commentary. Key insights: Snowden allegedly took the 2013 Congressional Budget Justification (black budget) while at Booz Allen.; The document lists funding and priorities for NSA, CIA, DIA, NRO, and other agencies.; Former CIA deputy director Michael Morell is quoted saying the SVR would pay millions for such a document.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.