Maj. Eric Kleinsmith
๐ค SpeakerAppearances Over Time
Podcast Appearances
2005, I believe. This is September 2005, the first testimony in front of the Senate Judiciary Committee.
2005, I believe. This is September 2005, the first testimony in front of the Senate Judiciary Committee.
Right.
Right.
It was, well, yes and no. Because before the destruction, we were giving a cease and desist order down through DOD to stop what you're doing because you're violating intelligence oversight rules on how you collected that information.
It was, well, yes and no. Because before the destruction, we were giving a cease and desist order down through DOD to stop what you're doing because you're violating intelligence oversight rules on how you collected that information.
Right, right. One of the problems that... Yeah, that was a much younger me. Nice time. But what we learned, again, we were running several different operations. This was a very young organization. It was only, I think, two years old by the time this started up. I was the first military chief of the intelligence branch.
Right, right. One of the problems that... Yeah, that was a much younger me. Nice time. But what we learned, again, we were running several different operations. This was a very young organization. It was only, I think, two years old by the time this started up. I was the first military chief of the intelligence branch.
So it was an operational unit designed to help the Army or support the Army in fighting information warfare, information operations, psychological deception, operational security, that kind of thing. So we had operational teams, but I had a 24-person intel branch within that group.
So it was an operational unit designed to help the Army or support the Army in fighting information warfare, information operations, psychological deception, operational security, that kind of thing. So we had operational teams, but I had a 24-person intel branch within that group.
And we were getting, because of the power that we were given with these new data mining tools, and I'm telling you, they were bleeding edge. We were doing a lot of things that we were making mistakes along the way. I got called in one morning because apparently I had conducted a denial of service attack against DIA, and then now NGA, their proxy server, shut the whole thing down.
And we were getting, because of the power that we were given with these new data mining tools, and I'm telling you, they were bleeding edge. We were doing a lot of things that we were making mistakes along the way. I got called in one morning because apparently I had conducted a denial of service attack against DIA, and then now NGA, their proxy server, shut the whole thing down.
Only because we were training a harvesting tool to pick up different information, and it hit DIA on a classified network and started harvesting the entire agency. And so, you know, denial of service, they shut the whole thing down. So I got blamed, you know, I got called out on the carpet for that one morning.
Only because we were training a harvesting tool to pick up different information, and it hit DIA on a classified network and started harvesting the entire agency. And so, you know, denial of service, they shut the whole thing down. So I got blamed, you know, I got called out on the carpet for that one morning.
That's what I mean, like the types of technology we were trying to wrestle with and figure out. Once we had gotten those down, and it was a great combination of the data that we were bringing in, the tools that we were using, but also, more importantly, the people and the processes that we had put in place and the folks that I had assigned to different tasks.
That's what I mean, like the types of technology we were trying to wrestle with and figure out. Once we had gotten those down, and it was a great combination of the data that we were bringing in, the tools that we were using, but also, more importantly, the people and the processes that we had put in place and the folks that I had assigned to different tasks.
We had first done an operation using data mining to show Department of Defense how our technology was being stolen. specifically by China and some other countries. And we were able to map it out by using a single technology as a sample. That became a firestorm because it had gotten leaked that we were doing this work.
We had first done an operation using data mining to show Department of Defense how our technology was being stolen. specifically by China and some other countries. And we were able to map it out by using a single technology as a sample. That became a firestorm because it had gotten leaked that we were doing this work.
We received a subpoena from Congressman Dan Burton that he wanted all that information. So we spent a weekend making 30,000 copies to deliver it by a data set on paper to do that. But that got us on the map, and that's why Tony came to see us.
We received a subpoena from Congressman Dan Burton that he wanted all that information. So we spent a weekend making 30,000 copies to deliver it by a data set on paper to do that. But that got us on the map, and that's why Tony came to see us.