Skip to main content
Skip to content
Case File
kaggle-ho-020333House Oversight

Chinese intelligence cyber‑espionage harvests millions of U.S. government personnel files and defense contractor data

Chinese intelligence cyber‑espionage harvests millions of U.S. government personnel files and defense contractor data The passage provides concrete, though unverified, claims that China’s Ministry of State Security inserted malware into up to 700,000 U.S. computers, penetrated major tech firms, and stole 20 million federal employee records and 14 million background checks. These specifics (numbers, targets, dates) give a clear investigative trail (e.g., request OPM breach logs, examine contracts with Booz Allen, trace malware signatures). The allegations involve high‑level U.S. agencies (NSA, CIA, OPM) and a foreign power, making it moderately controversial and potentially actionable, but the claims are broadly known in the cyber‑espionage discourse, limiting novelty. Key insights: Chinese MSS allegedly inserted “zombie” programs into ~700,000 U.S. computers by 2007.; Hackers accessed contractors such as Booz Allen Hamilton, Google, Yahoo, Symantec, Adobe.; Estimated theft of 20 million federal employee files and 14 million intelligence background checks by 2015.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020333
Pages
1
Persons
4
Integrity
No Hash Available

Summary

Chinese intelligence cyber‑espionage harvests millions of U.S. government personnel files and defense contractor data The passage provides concrete, though unverified, claims that China’s Ministry of State Security inserted malware into up to 700,000 U.S. computers, penetrated major tech firms, and stole 20 million federal employee records and 14 million background checks. These specifics (numbers, targets, dates) give a clear investigative trail (e.g., request OPM breach logs, examine contracts with Booz Allen, trace malware signatures). The allegations involve high‑level U.S. agencies (NSA, CIA, OPM) and a foreign power, making it moderately controversial and potentially actionable, but the claims are broadly known in the cyber‑espionage discourse, limiting novelty. Key insights: Chinese MSS allegedly inserted “zombie” programs into ~700,000 U.S. computers by 2007.; Hackers accessed contractors such as Booz Allen Hamilton, Google, Yahoo, Symantec, Adobe.; Estimated theft of 20 million federal employee files and 14 million intelligence background checks by 2015.

Tags

kagglehouse-oversighthigh-importancecyber-espionagechinau.s.-governmentpersonnel-data-breachdefense-contractors

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
181 weapons laboratories.” The Chinese intelligence service further obtained from private US defense contractors through cyber espionage important elements of the stealth technology used in both advanced planes and submarines. China shared (or exchanged) the fruits of its espionage on nuclear warhead design with North Korea, Pakistan, Iran and Russia. Despite its formidable intelligence coups in the US, the Chinese intelligence service managed to remain among the most elusive of America’s intelligence adversaries. Its espionage organizations are hidden behind layers of bureaucracy in the Ministry of State Security, Chinese Communist party structures, and the second, third and fourth department of the General Staff of the People’s Liberation Army. Much of its cyber espionage units are concealed on the campuses of its universities. Its hierarchy, or order of battle, is also obscure. Few traces have been uncovered of any conventional espionage networks in the United States and no major Chinese spy has ever been arrested. Part of the reason that Chinese espionage has proved so elusive to the eyes of western counter-intelligence, was that, unlike Russia, it did not ordinarily rely on intelligence officers in its embassies to recruit penetration agents to steal secrets. It did not even have an embassy in the United States during most of the Cold War. Instead, its services specialize it assembly mosaics of intelligence assembled from a wide variety of sources including non-classified documents, returning graduate students, scientific conferences, exchanges with allies, and a vast operation of hacking into computers, or cyber- espionage. Cyber-espionage is indeed a vast enterprise in China. Graduating over 150,000 computer science engineers, it had no shortage of personnel. It also had developed the cyber tool kit to gain access to the computer networks of US government contractors and consultants in the private sector and government agencies, planting “sleeper” bugs in net-worked computers. Like human “sleeper” agents, these hidden programs can be activated when needed for operational purposes. Chinese controllers can retrieve emails, documents and turn on the cameras and microphones of personal computers, tablets and smart phones. By 2007, Paul Strassmann, a top US defense expert on cyber-espionage, reported that China had inserted “zombie” programs in some 700,000 computers in the US which could be used to mount cyber attack to retrieve emails from other computers. The Chinese service also reportedly penetrated companies that provide Internet services, including Google Yahoo, Symantec, and Adobe, which allowed it to track emails and enclosures of individuals. With such an invisible army of zombie computers, it is not entirely surprising that China finds little need to employ human: sleeper” agents. Chinese cyber-specialists used this capability to hack into computers of outside contractors, including Booz Allen and other companies that supplied technologists to the NSA. It also had notable successes in obtaining the dossiers of US employees and independent contractors at the NSA, CIA and other intelligence services. Its intrusions, as previously noted, into computer network at the Office of Personnel Management traced back to 2009. Eventually, by 2015, according to US estimates, the cyber attack had harvested over twenty million personnel files of past and present Federal government employees. In addition, it reaped in over 14 million background checks of intelligence workers done by the Federal Investigative Service. All the intelligence workers with a SCI clearance, such as Snowden, were required to provide in these

Related Documents (6)

House OversightNov 17, 2018

Chinese Influence & American Interests – Hoover Institution Publication

Chinese Influence & American Interests – Hoover Institution Publication The document contains only a title and publication note with no substantive details, names, transactions, or actionable leads linking powerful actors to any controversy. Key insights: Title suggests a focus on Chinese influence and U.S. interests; Published by the Hoover Institution; No specific individuals, dates, or financial information provided

1p
House OversightUnknown

Snowden allegedly used documentary filmmaker Laura Poitras as a conduit for classified NSA documents

Snowden allegedly used documentary filmmaker Laura Poitras as a conduit for classified NSA documents The passage describes a known relationship between Edward Snowden, Laura Poitras, and Glenn Greenwald, suggesting Poitras was recruited to pass stolen NSA material. While it provides some detail on surveillance concerns and operational security, the claim is already public knowledge and offers limited new investigative angles. Key insights: Snowden contacted Poitras after reading about her surveillance experiences in Greenwald's blog.; Poitras was allegedly selected by Snowden as a secure channel to transmit classified documents.; The narrative links NSA surveillance practices to the targeting of journalists and documentary filmmakers.

1p
Dept. of JusticeAug 22, 2017

15 July 7 2016 - July 17 2016 working progress_Redacted.pdf

Kristen M. Simkins From: Sent: To: Cc: Subject: Irons, Janet < Tuesday, July 12, 2016 10:47 AM Richard C. Smith     Hello Warden Smith,     mother is anxious to hear the results of your inquiry into her daughter's health.   I'd be grateful if you could  email or call me at your earliest convenience.  I'm free today after 2 p.m.  Alternatively, we could meet after the Prison  Board of Inspectors Meeting this coming Thursday.    Best wishes,    Janet Irons    1 Kristen M. Simkins From: Sent:

1196p
House OversightUnknown

Snowden's employment at Dell and alleged complaints to NSA officials

Snowden's employment at Dell and alleged complaints to NSA officials The passage repeats widely reported background on Edward Snowden’s work for Dell and his grievances about US intelligence agencies. It offers no new concrete evidence, dates, or financial details, and only restates known public statements, limiting investigative usefulness and novelty. Key insights: Snowden worked for Dell on projects for NSA, CIA, and DIA.; He allegedly voiced complaints to ten NSA officials about surveillance practices.; His girlfriend, Mills, posted about their cohabitation on Instagram.

1p
House OversightUnknown

WSJ article claims Edward Snowden lied about whistleblower motive and details his 2013 escape to Hong Kong

WSJ article claims Edward Snowden lied about whistleblower motive and details his 2013 escape to Hong Kong The passage repeats widely known facts about Snowden’s 2013 leak and his travel to Hong Kong, offering no new names, transactions, or evidence. It suggests possible deception but provides no concrete leads for investigation, making it low‑value despite involving a high‑profile figure. Key insights: Alleges Snowden fabricated the story that he was a whistleblower rather than an espionage operative.; Claims Snowden left Hawaii on May 20, 2013, while falsely telling his supervisor he was in a hospital.; States Snowden met with Laura Poitras and Glenn Greenwald in Hong Kong to provide key documents.

1p
Dept. of JusticeAug 22, 2017

1 May 1 1255-May 6 237_Redacted.pdf

Kristen M. Simkins me: Sent Tn: Subject: Atladimem: LT. THOMAS E. ALLEN JR Thomas S. Allen. Jr. Sunday. May BIL EDIE 12:55 AM Allyson FL Dwell; Brenda McKin1e?c C. Kay Wandring: Caitlyn D. Neff: Daniel?le Minarch?lck: JeFFrey' T. Hite; Jon D. Fisher. Jonathan M. Mfl?n-der. Joseph 5. Kolenorluan Mendez: Kevin T. Jeirles; [any Lidgett Lee R. Shea??er: Lorinda L. Brown.- Matti-new T. Fishet: Melanie Gordan; Michael S. Woods Richard C. 5mm; Shephanie D. Calander?mtus Report SMDIE 20150501004

493p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.