HOUSE_OVERSIGHT_020315.jpg
house-oversight-gdrive Image 2.8 MB • Feb 13, 2026
The image displays a page from a book or document about the NSA's system administrators. The page is numbered 163 and has a header that reads "HOUSE_OVERSIGHT_020315" in the bottom-right corner.
Here is the text on the page:
**The text:**
The NSA's system administrators were, as the threat officer pointed out, very different from the traditional military employees at the NSA. They were usually civilians, who effectively served as repair-men for complex computer systems at the NSA. Moreover, many of them had not been directly hired by the NSA. Instead, their recruitment had been privatized to outside contractors.
This outsourcing had deep roots tracing back to the Second World War Ed Booz, the founder of Booz Allen Hamilton, obtained contracts to help manage ship construction from the US Navy. After the war ended he sought contracts for his firm in classified work. These contracts grew in size as the NSA needed more and more system administrators and other information technologists to manage the computer networks. These system administrators needed to be given special privileges to do their service job. One such privilege allowed them to bypass password protection. Another privilege allowed then to temporarily transfer data to an external storage device while they repaired computers. These two privileges greatly increased the risk of a massive breach. Seeing them as the weak link if the chain, the threat officer wrote in the report that "system administrators are likely to be increasingly targeted by foreign intelligence services because of their special access to information."
Before the computerization of the NSA, the threat officer noted that code clerks and other low-level NSA communicators had been the target of adversary intelligence services. But the increasing reliance on computer technicians presented foreign intelligence services with much richer targets. He predicted that they would adapt their recruiting to this new reality. Specifically, he argued that adversary intelligence services would now focus their attention on system administrators. "With system administrators," he said, "the situation is potentially much worse than it has ever been with communicators." The reason: "System administrators can so easily, and quickly, steal vast quantities of information."
He further suggested that since system administrators are often drawn from counterculture of hacking, they are more likely to be vulnerable to an adversary service using a fake identity for its approach, or a "false flag." A "false flag" was a term originally applied to pirate ship that temporarily hoisted any flag that would allow it to gain close proximity to its intended prey but it modern times describes a technique employed by espionage service to surreptitiously lure a prospect. As will be more fully discussed in the next chapter, false flags were a staple used by the KGB in espionage recruitments during the Cold War. They were usually employed when a target for recruitment was not ideologically disposed to assisting the intelligence service. To overcome that problem, recruiters hide their true identities and adopt a more sympathetic bogus one. In 1973, for example, the KGB, working through one of its agents in the US Navy, used the false flag of Israel, to recruit Jerry Alfred Whitworth, who served as a communications officer with a top secret clearance for the Navy. Like many other KGB recruits, Whitworth came from a broken family, dropped out of a high school, took technical courses and got a job as a communications officer. He was not disposed to working for Russia. But he was willing to steal enciphered and plain text cables to help in the defense of Israel. After he was thoroughly compromised by his espionage work, he was told by the KGB recruiter that he was actually working for Russia, but, by this time, he was too deeply compromised to quit. He continued his espionage work for Russia.
**Answer:** The text on the page describes the NSA's system administrators and their role in the agency, as well as the threat of foreign intelligence services targeting them. It also mentions the use of "false flags" by the KGB to recruit spies and the vulnerability of system administrators to being targeted by adversaries.
Entities
0 total entities mentioned
No entities found in this document
Document Metadata
- Document ID
- ed932aad-19ec-433c-9e32-6b50a3cc5be9
- Storage Key
- house-oversight/gdrive/images/HOUSE_OVERSIGHT_020315.jpg
- Content Hash
- 12f0d6f24c4d2ccbf7c2f735dcb944e2
- Created
- Feb 13, 2026