Back to Results

HOUSE_OVERSIGHT_019813.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
View Original Image

Extracted Text (OCR)

Notes to pages 232-252 | 325 228 127-page Standard Form 86: David Larter and Andrew Tilghman, “Mili- tary Clearance OPM Data Breach ‘Absolute Calamity,’” Navy Times, June 18, 2015. 229 Under Putin: Nicole Perlroth, “Online Security Experts Link More Breaches to Russian Government,” New York Times, Oct. 28, 2014. 229 “It is next to impossible”: Schneier quoted in Jenkins, “Anti-hero of Silk Road.” 230 The Silk Road founder: Jenkins, “Anti-hero of Silk Road.” Also, former Justice Department official who requested anonymity, interview with author. 230 “better cyber security”: Morell, Great War of Our Time, 291. CHAPTER 22 The Chinese Puzzle 231 “The first [false assumption]”: Snowden video in Hong Kong. 231 “China its first credible”: 2014 Annual Report to Congress by the U.S.-China Economic and Security Review Commission, quoted in David Tweed, “China Takes Nuclear Weapons Undersea Away from Prying Eyes,” Bloomberg Busi- ness, Dec. 8, 2014. 232 “results of decades”: Select Committee, U.S. Congress, Report, 1999, http:// www-.house.gov/coxreport/chapfs/overhtml. 233 avast enterprise in China: Nir Kshetri, The Rapidly Transforming Chinese High- Technology Industry and Market (London: Chandos, 2008), 92. 233. By 2007, Paul Strassmann: “China Has .75M ‘Zombie Computers’ in U.S.,” UPI, Sept. 17, 2007. ® 234 cyber attack had harvested: David E. Sanger and Julie Hirschfeld Davis, “Hackers ® May Have Obtained Names,” New York Times, June 11, 2015. 234 “Those records are”: Baker, “Michael Hayden Says U.S. Is Easy Prey for Hackers.” 235 any attempt to “monopolize”: Patrick Goodenough, “Chinese President in Veiled Warning to the US: Don’t Try to ‘Monopolize Regional Affairs,/” CNS News, May 22, 2014. 236 Chinese intelligence maintains: Former U.S. intelligence officer stationed in Hong Kong who requested anonymity, interview with author. 236 “hostile territory”: Drumheller, interview with author. CHAPTER 23 A Single Point of Failure 238 “the single point of failure”: Gellman, “Code Name ‘Verax.’” 239 “Snowden thinks he is smart”: Morell, Great War of Our Time, 285. 239 “The purpose of my [Hong Kong]”: Rusbridger and MacAskill, “I, Spy.” 240 “This guy”: Ibid. 240-241 “It was a nervous period”: Ibid. 242 “I’m not going to”: Dave Boyer, “Obama on Snowden: ‘I’m Not Going to Be Scrambling Jets to Get a 29-Year-Old Hacker’” Washington Times, June 27, 2013. 243 “huge strategic setback”: Harper, Kerbaj, and Shipman, “British Spies Betrayed to Russians and Chinese.” 243 Adding insult to injury: Vanden Heuvel and Cohen, “Snowden Speaks.” | | Epst_9780451494566_2p_all_r.indd 325 ® 9/3016 8:13AM | | HOUSE_OVERSIGHT_019813

Document Preview

HOUSE_OVERSIGHT_019813.jpg

Click to view full size

Extracted Information

Dates

Document Details

Filename HOUSE_OVERSIGHT_019813.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 2,663 characters
Indexed 2026-02-04T16:39:30.936174