Skip to main content
Skip to content
Case File
d-24057House OversightOther

Citation-heavy excerpt on NSA history and oversight

The passage consists mainly of bibliographic references and generic statements about the NSA without specific allegations, names, dates, transactions, or actionable leads. It offers minimal investigat References to historical NSA activities and publications Mentions of former NSA officials and interviews (anonymous) Citations of media reports on NSA surveillance and cyber incidents

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #019811
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The passage consists mainly of bibliographic references and generic statements about the NSA without specific allegations, names, dates, transactions, or actionable leads. It offers minimal investigat References to historical NSA activities and publications Mentions of former NSA officials and interviews (anonymous) Citations of media reports on NSA surveillance and cyber incidents

Tags

historical-referencesmedia-citationshouse-oversightnsasurveillance

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
195 196 198 198 198 198 199 199 200 200 201 202 203 204 204 205 205 205 Notes to pages 199-214 | 323 CHAPTER 19 The Rise of the NSA “There are many things”: Gellman, “Edward Snowden, After Months of NSA Revelations, Says His Mission’s Accomplished.” By 1914, the U.S. Army: National Security Agency, Pearl Harbor Review: The Black Chamber, NSA, 2009, https://www.nsa.gov/about/cryptologic_heritage /center_cryptologic_history/pearl_harbor_review/black_chamber.shtml. “Its far-seeking eyes”: Kahn, Codebreakers, 358. The NSA also organized: Woodward, Veil, 471-75. In 1980, President Ronald Reagan: David R. Shedd, “How Obama Unilaterally Chilled Surveillance,” Wall Street Journal, Nov. 30, 2015. “We are approaching”: Turner, Secrecy and Democracy, 92. “vastness”: Woodward, Veil, 202. James Bond provision: lan Cobain, “How Secret Renditions Shed Light on MI6’s Licence to Kill and Torture,” Guardian, Feb. 13, 2012. The NSA had assiduously: Kevin Poulsen, “New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-cracking,” Wired, Aug. 29, 2013. “Yes, my continental European friends”: Woolsey, “Why We Spy on Our Allies.” “very foundation of U.S. intelligence”: John McLaughlin, “We Need NSA to Do What It Does—It Makes Us Safer,” Press of Atlantic City, Jan. 8, 2014. It made leading hacktivists: Charlie Savage et al., “Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border,” New York Times, Jane 4, 2015. “one of the most regulated”: De, “Former NSA Lawyer on ‘Harm’ of Edward Snowden’s Revelations.” the attack on Sony: Rob Lever, “Some Experts Still Aren’t Convinced That North Korea Hacked Sony,” Business Insider, Dec. 30, 2014. “The Chinese are viewed”: Alexander quoted in Kelley Vlahos, “America’s Already-Failed Cyber War,” American Conservative, July 23, 2015. “We are bolstering our support”: “Black Budget: Congressional Budget Justifica- tion Excerpt,” Washington Post, Aug. 30, 2013. These compartments were: Former NSA officer who requested anonymity, inter- view with author. “The queen on our chessboard”: Former NSA officer who requested anonymity, interview with author. to confront flagging morale: Hayden, interview with author. 205-206 “the nation has lost”: Mulvaney, “NSA Director Adm. Michael Rogers Dis- cusses Freedom, Privacy, and Security Issues at Princeton University.” 206 Although repairing the damage: King, “Ex-NSA Chief Details Snowden’s Hiring at Agency, Booz Allen.” CHAPTER 20 The NSA’s Back Door 207 “You have private for-profit”: Bamford and De Chant, “Edward Snowden on Cyber Warfare.” 208 According to a report: “Out of Control,” NSA, http://nsarchive.gwu.edu /NSAEBB/NSAEBB424/docs/Cyber-009.pdf. 211 “All of us just fell”: Baker, “Michael Hayden Says U.S. Is Easy Prey for Hackers.” | | Epst_9780451494566_2p_all_rt.indd 323 ® 9/30/16 e13.am | |

Technical Artifacts (2)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

URLhttp://nsarchive.gwu.edu
URLhttps://www.nsa.gov/about/cryptologic_heritage

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.