NSA Cyber Command allegedly planted viruses on private computers as cyber sentinels
Summary
The passage claims the NSA‑led Cyber Command covertly installed malware on hundreds of thousands of civilian machines to monitor threats, suggesting a large‑scale, potentially illegal surveillance ope Cyber Command created in 2009 under NSA director Keith Alexander. Alleged deployment of viruses on private computers to act as sentinels. Difficulty distinguishing state‑sponsored attacks from civili
This document is from the House Oversight Committee Releases.
View Source CollectionTags
Related Documents (6)
NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare
The passage outlines alleged internal NSA practices—mandatory error reporting, planting viruses on private computers, and broad cyber retaliation authority—linking high‑level officials (NSA Director K NSA required exhaustive error reporting every 90 days, creating administrative burden. NSA Director Keith Alexander also headed the newly created Cyber Command in 2009. Alleged deployment of sentinel
Jeffrey Epstein email discusses complex tax‑saving schemes, offshore accounts and alleged mismanagement by trusted advisors
The passage provides concrete details about large‑scale tax‑saving transactions (claimed $600 M), specific individuals (Eileen Alexandersson, Brad Wechsler), and instructions to open accounts at Deuts Epstein allegedly saved $600 M in taxes through a transaction the sender claims was under‑compensate The email references setting up over 100 bank accounts for Epstein, suggesting extensive offshore
Document outlines Snowden disclosures of NSA programs (215, PRISM/702, XKeyscore) and claims about U.S. and UK surveillance capabilities
The passage provides concrete references to specific NSA surveillance programs, dates, and a claim of 45 thwarted attacks, offering actionable leads for investigators to verify program scopes, inter‑a Snowden exposed NSA's Section 215 bulk phone‑metadata collection program. PRISM (Section 702) allegedly intercepted 91% of global internet traffic via U.S. fiber routes. General Alexander testified t
Fragmented chat logs mention Tom Barrack, Benton Lebow, and Alexander Dugin
The passage contains a handful of names—Tom Barrack (Trump‑associated billionaire), Benton Lebow (political consultant), and Russian ideologue Alexander Dugin—but provides no concrete details about re Tom Barrack’s name appears twice in a short, unstructured message. Benton Lebow is listed among other names, suggesting possible involvement. Reference to Alexander Dugin as “the only Russian” may im
Spurious proposal for drug testing of chess players cited by General McCaffrey
The passage contains no concrete allegations, names, transactions, or actionable leads involving influential actors. It appears to be a satirical or irrelevant commentary about drug testing for chess General McCaffrey allegedly suggested drug testing for chess players. Reference to historical chess champion Alexander Alekhine as an anecdotal example. Commentary from NORML executive Allen St. Pier
Snowden allegedly coordinated a Tor CryptoParty in Hawaii with NSA colleague Sandvik
The passage provides a detailed account of an alleged NSA employee (Sandvik) meeting Edward Snowden at a public Tor event in Honolulu, suggesting possible insider collaboration. It names specific date Snowden reportedly recruited NSA technical staff to set up fast servers for Tor. Sandvik, identified as an NSA employee, co‑presented the CryptoParty on Dec 6‑11 2012 in Honolulu. Event logistics wer
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.