Skip to main content
Skip to content

Duplicate Document

This document appears to be a copy. The original version is:

SVR tactics to infiltrate NSA via civilian contractors and hacktivist recruitment
Case File
kaggle-ho-020328House Oversight

SVR tactics to infiltrate NSA via civilian contractors and hacktivist recruitment

SVR tactics to infiltrate NSA via civilian contractors and hacktivist recruitment The passage outlines a plausible Russian intelligence (SVR) operation to recruit NSA civilian technologists and hacktivists, mentioning use of ‘access agents’ and false‑flag online personas. It provides concrete details about recruitment methods, target groups, and historical context, which could guide further investigation into current SVR activities and potential compromised NSA personnel. While no specific individuals or transactions are named, the operational blueprint is actionable and ties directly to a major U.S. intelligence agency, making it a strong investigative lead. Key insights: SVR required ‘access agents’ to approach NSA officers, a role allegedly unknown to the FBI.; Recruitment focus shifted to civilian contractors and hacktivist communities in the 1990s.; SVR allegedly used false‑flag online identities to appeal to libertarian and anti‑NSA hacktivists.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020328
Pages
1
Persons
3
Integrity
No Hash Available

Summary

SVR tactics to infiltrate NSA via civilian contractors and hacktivist recruitment The passage outlines a plausible Russian intelligence (SVR) operation to recruit NSA civilian technologists and hacktivists, mentioning use of ‘access agents’ and false‑flag online personas. It provides concrete details about recruitment methods, target groups, and historical context, which could guide further investigation into current SVR activities and potential compromised NSA personnel. While no specific individuals or transactions are named, the operational blueprint is actionable and ties directly to a major U.S. intelligence agency, making it a strong investigative lead. Key insights: SVR required ‘access agents’ to approach NSA officers, a role allegedly unknown to the FBI.; Recruitment focus shifted to civilian contractors and hacktivist communities in the 1990s.; SVR allegedly used false‑flag online identities to appeal to libertarian and anti‑NSA hacktivists.

Tags

kagglehouse-oversighthigh-importancerussian-intelligencesvrnsacyber-espionagehacktivists

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
176 Penetrating the NSA and getting access to files from its stove-piped computers was a far more difficult challenge for the SVR. Approaching CIA officers, such as Nicholson, was relatively easy because it was part of the CIA officer’s job to meet with their adversaries. NSA officers, on the other hand, did not engage in “dangles” or even attend diplomatic receptions. They had not reason, other than a sinister one, to meet with a member of the Russian intelligence service. Furthermore, unlike CIA officers who, like Nicholson, are often posted in neutral countries where they can be approached in a social context, NSA officers worked at well-guarded regional bases and are not part of the diplomatic life. Since a known employee of a foreign diplomatic mission could not even approach a NSA officer without arousing suspicion, the SVR would need to use an intermediary, called an “access agent,” whose affiliations with it were not known to the FBI. Such an operation would require establishing a network of illegals in the America, as the SVR did after Putin became President. Even them, the intermediary would have to find a plausible pretext to approach the target with revealing his actual interest. The emergence of computer networks in the 1990s greatly expanded the SVR’s recruiting horizon. It offered an opportunity to penetrate a new layer at the NSA employees: civilian technologists working under contract for the US government. Many of these civilians at the NSA, especially the younger ones, had been drawn from the hacking and game-playing culture. Some had even taken courses abroad on hacking techniques. They presented the SVR was inviting targets for recruitment. As was previously mentioned, Russian intelligence had considerable experience in Germany with hacktavists who tended to be anarchists. There were also supporters of the Libertarian movement. The common denominator was often their resentment expressed in their postings s of the United States and its allies attempting to limit the downloading of copy-righted music, movies and software on the Internet, all of which went under the rubric of “freedom of the Internet.” They also vocally objected to the NSA using built-in backdoors in their software to read their encrypted messages. They were not difficult to find on the Internet. The donors to Ron Paul’s Libertarian election campaign (including Snowden) were a matter of public record, for example. Even if there was no shortage of hacktavists who believed the surveillance of the Internet by the NSA was an evil worth fighting, the SVR still had to find a plausible way of approaching members of this counterculture without offending them. Clearly, the SVR could no longer use out- of-date Communist and anti-capitalist ideology as a lure. Russia was far more authoritarian than the U.S, when it came to the Internet. One viable alternative for the SVR was custom- tailoring false flags to appeal to hacktavists. For this purpose the Internet provided a near perfect realm for false flags. Since it is a place where true identities cannot easily be verified, intelligence services could employ a protean kit of disguises to assume false identities to entice potential dissidents into communicating with them. The KGB’s earlier efforts to use hacktavist groups in Germany had produced little, if any, intelligence because of the “stove-piping” the NSA used to isolate its computers from networks

Related Documents (6)

Dept. of JusticeOtherUnknown

EFTA Document EFTA01384069

KYC Print Page 4 of 12 One sheet must be established for EACH INDIVIDUAL PARTY in Section 2. Account Ownership Summary 3A. Individual Details (for all parties) Individual's Name: Jeffrey Epstein - 00000483289 Date of Birth: 1/20/1953 Country of Residence: USVI Country of Citizenship: USA Address of primary residence: Litte Saint lames Saint Thomas 00802 US Virgin Islands Profession/Occupation: Self Empolyed Tax ID / 5514: 090-443348 Current Employer: Southern Financial LLC P

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
Dept. of JusticeOtherUnknown

EFTA Document EFTA01299130

KYC Print Page 1 of' 19 DB PWM GLOBAL KYC/NCA: PART A Int KYC Case # : 01141308 One sheet must be established per relationship - list all accounts included in the relationship 1. Relationship Details Relationship Name: EPSTEIN, JEFFREY RELATIONSHIP:00000483290 Booking Center: New York Relationship Manager: Paul Moms Relationship to PWM: 17 New PWM Relationship F Existing PWM Relationship If existing, please indicate since when the relationship exists, provide reason for new profi

19p
Dept. of JusticeAug 22, 2017

15 July 7 2016 - July 17 2016 working progress_Redacted.pdf

Kristen M. Simkins From: Sent: To: Cc: Subject: Irons, Janet < Tuesday, July 12, 2016 10:47 AM Richard C. Smith     Hello Warden Smith,     mother is anxious to hear the results of your inquiry into her daughter's health.   I'd be grateful if you could  email or call me at your earliest convenience.  I'm free today after 2 p.m.  Alternatively, we could meet after the Prison  Board of Inspectors Meeting this coming Thursday.    Best wishes,    Janet Irons    1 Kristen M. Simkins From: Sent:

1196p
OtherUnknown

KYC Print

DOJ EFTA Data Set 10 document EFTA01294896

12p
Dept. of JusticeOtherUnknown

EFTA Document EFTA01417448

7/15/2019 KYC Print DB PWM GLOBAL KYC/NCA: PART A KYC Case # : 01344537 One sheet must be established per relationship - list all accounts included in the relationship 1. Relationship Details Relationship Name: Relationship Manager: EPSTEIN, JEFFREY RELATIONSHIP:00000483290 Paul Morris New PWM Relationship Relationship to PWM: If existing, please indicate since when the relationship exists, provide reason for new profile and attach old profile: Update of KYC #01133113. Trustees ha

44p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.