Skip to main content
Skip to content

Duplicate Document

This document appears to be a copy. The original version is:

NSA Outsourced System Administrators Pose High Insider Threat, Potentially Targeted by Foreign Intelligence Services
Case File
kaggle-ho-020315House Oversight

NSA Outsourced System Administrators Pose High Insider Threat, Potentially Targeted by Foreign Intelligence Services

NSA Outsourced System Administrators Pose High Insider Threat, Potentially Targeted by Foreign Intelligence Services The passage highlights a concrete vulnerability in the NSA’s reliance on civilian, contractor‑staffed system administrators who have privileged access and can bypass security controls. It suggests a specific intelligence‑gathering risk—foreign services targeting these admins via false‑flag recruitment—providing a clear investigative angle (identify contractors, audit privileged accounts, trace any foreign recruitment attempts). While the claim is not yet substantiated with specific incidents, it links a powerful agency (NSA) to a systemic security weakness that could have major fallout if exploited. Key insights: NSA system administrators are largely civilian contractors, not directly hired by the agency.; Admins possess privileged abilities: password bypass and data exfiltration to external devices.; Threat officer predicts foreign intelligence services will focus recruitment on these admins.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020315
Pages
1
Persons
2
Integrity
No Hash Available

Summary

NSA Outsourced System Administrators Pose High Insider Threat, Potentially Targeted by Foreign Intelligence Services The passage highlights a concrete vulnerability in the NSA’s reliance on civilian, contractor‑staffed system administrators who have privileged access and can bypass security controls. It suggests a specific intelligence‑gathering risk—foreign services targeting these admins via false‑flag recruitment—providing a clear investigative angle (identify contractors, audit privileged accounts, trace any foreign recruitment attempts). While the claim is not yet substantiated with specific incidents, it links a powerful agency (NSA) to a systemic security weakness that could have major fallout if exploited. Key insights: NSA system administrators are largely civilian contractors, not directly hired by the agency.; Admins possess privileged abilities: password bypass and data exfiltration to external devices.; Threat officer predicts foreign intelligence services will focus recruitment on these admins.

Tags

kagglehouse-oversighthigh-importancensainsider-threatcontractorsforeign-intelligencecybersecurity

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
163 The NSA’s system administrators were, as the threat officer pointed out, very different from the traditional military employees at the NSA. They were usually civilians, who effectively served as repair-men for complex computer systems at the NSA. Moreover, many of them had not been directly hired by the NSA. Instead, their recruitment had been privatized to outside contractors. This outsourcing had deep roots tracing back to the Second World War Ed Booz, the founder of Booz Allen Hamilton, obtained contracts to help manage ship construction from the US Navy. After the war ended he sought contracts for his firm in classified work. These contracts grew in size as the NSA needed more and more system administrators and other information technologists to manage the computer networks. These system administrators needed to be given special privileges to do their service job. One such privilege allowed them to bypass password protection. Another privilege allowed then to temporarily transfer data to an external storage device while they repaired computers. These two privileges greatly increased the risk of a massive breach. Seeing them as the weak link if the chain, the threat officer wrote in the report that “system administrators are likely to be increasingly targeted by foreign intelligence services because of their special access to information.” Before the computerization of the NSA, the threat officer noted that code clerks and other low- level NSA communicators had been the target of adversary intelligence services. But the increasing reliance on computer technicians presented foreign intelligence services with much richer targets. He predicted that they would adapt their recruiting to this new reality. Specifically, he argued that adversary intelligence services would now focus their attention on system administrators. “With system administrators,” he said, “the situation is potentially much worse than it has ever been with communicators.” The reason: “System administrators can so easily, and quickly, steal vast quantities of information.” He further suggested that since system administrators are often drawn from counterculture of hacking, they are more likely to be vulnerable to an adversary service using a fake identity for its approach, or a “false flag.” A “false flag” was a term originally applied to pirate ship that temporarily hoisted any flag that would allow it to gain close proximity to its intended prey but it modern times describes a technique employed by espionage service to surreptitiously lure a prospect. As will be more fully discussed in the next chapter, false flags were a staple used by the KGB in espionage recruitments during the Cold War. They were usually employed when a target for recruitment was not ideologically disposed to assisting the intelligence service. To overcome that problem, recruiters hide their true identities and adopt a more sympathetic bogus one. In 1973, for example, the KGB, working through one of its agents in the US Navy, used the false flag of Israel, to recruit Jerry Alfred Whitworth, who served as a communications officer with a top secret clearance for the Navy. Like many other KGB recruits, Whitworth came from a broken family, dropped out of a high school, took technical courses and got a job asa communications officer. He was not disposed to working for Russia. But he was willing to steal enciphered and plain text cables to help in the defense of Israel. After he was thoroughly compromised by his espionage work, he was told by the KGB recruiter that he was actually working for Russia, but, by this time, he was too deeply compromised to quit. He continued his

Related Documents (6)

House OversightUnknown

President Trump discusses Bob Woodward interview on phone, claims staff ignorance

President Trump discusses Bob Woodward interview on phone, claims staff ignorance The passage provides a brief anecdote of Trump’s phone call with journalist Bob Woodward, noting a claim that White House staff failed to inform him of the interview request. While it mentions a high‑profile figure (President Trump) and a senior aide (Kellyanne Conway), it lacks concrete details about wrongdoing, financial flows, or actionable leads. The information is already publicly reported and offers little novel investigative value. Key insights: Trump claims his staff did not tell him Woodward wanted an interview.; Kellyanne Conway is referenced as having asked Trump about a call.; Trump characterizes Woodward as "always been fair" but later calls the book inaccurate.

1p
House OversightUnknown

Internal Labor Party Power Struggle Over Peres’ Role as Party President

Internal Labor Party Power Struggle Over Peres’ Role as Party President The passage describes internal dynamics within Israel's Labor Party, focusing on Shimon Peres and internal votes for a ceremonial party presidency. While it provides vivid detail of personal tensions, it lacks concrete allegations, financial flows, or links to high‑level officials beyond party figures, offering limited investigative value. Key insights: Shimon Peres considered a ceremonial party president role amid leadership transition.; Party secretary‑general Nissim Zvili proposed the motion.; Peres faced vocal opposition from delegates questioning his motives.

1p
House OversightOtherNov 11, 2025

Bill Siegel email chain discussing 'The Control Factor' and anti‑Islamic conspiracy narrative

The passage is an internal email and interview transcript promoting a conspiratorial worldview about 'Islamic Enemy' and 'Civilization Jihad.' It mentions Jeffrey Epstein as a sender but provides no c Email originates from Jeffrey Epstein's address, but only contains a casual invitation and a link to Bill Siegel outlines a theory called the 'Control Factor' that frames Islam as a coordinated threa

20p
House OversightOtherNov 11, 2025

Personal recollections of economic discussions with Nobel laureates

The passage is a memoir-style narrative about academic conversations on monetary theory and ETFs, lacking any concrete leads, names of officials, financial transactions, or allegations of misconduct. Mentions Nobel laureates Franco Modigliani and Milton Friedman discussing monetary ideas. Describes a proposal to treat ETFs and mutual funds as money-like assets. Speculates on banking structural ch

1p
House OversightUnknown

Local sports roundup with Scott Boras comments on Dodgers and Mets valuations

Local sports roundup with Scott Boras comments on Dodgers and Mets valuations The passage is a mixed local sports article with no concrete allegations, financial transaction details, or actionable leads involving powerful officials. It mentions Scott Boras' remarks on MLB team sales and a vague reference to the Mets' payment to a Madoff trustee, but provides no names, dates, or evidence of wrongdoing. The content is largely routine sports reporting, offering minimal investigative value. Key insights: Scott Boras likens Dodgers and Mets financial situations to supermarket categories.; Dodgers reportedly sold for $2 billion; Mets owners to pay up to $162 million to a Madoff trustee.; Mentions of high‑profile MLB figures (Mark Walter, Stan Kasten, Magic Johnson) in Dodgers ownership group.

1p
Dept. of JusticeAug 22, 2017

15 July 7 2016 - July 17 2016 working progress_Redacted.pdf

Kristen M. Simkins From: Sent: To: Cc: Subject: Irons, Janet < Tuesday, July 12, 2016 10:47 AM Richard C. Smith     Hello Warden Smith,     mother is anxious to hear the results of your inquiry into her daughter's health.   I'd be grateful if you could  email or call me at your earliest convenience.  I'm free today after 2 p.m.  Alternatively, we could meet after the Prison  Board of Inspectors Meeting this coming Thursday.    Best wishes,    Janet Irons    1 Kristen M. Simkins From: Sent:

1196p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.