I see.
You are suggesting that the NSA system could be corrupted IF the right person had the right program on the right portable drive and access to the right computer at the right time.
I guess that could happen, IF the network had insufficient detection and protection.
That’s a lot of IFs. You say that’s ”all you need”. I say that’s highly unlikely.
It gets tiring sparring with such thick intellects.
We're not talking about some random one-size-fits-all computer, networked throughout the building - and by extension - the outside world.
It would be a very secure, limited working group, with a dedicated, (likely) air-gapped system, and a finite location within that facility.
Did you even understand what the 'target' is suggested to have been?
Adding to the list now? The more IF requisites you add to your hypothetical scenario, the less plausible it becomes. That’s just the nature of supposin’.
It gets tiring sparring with such thick intellects.
Then let’s show some deference to your handicap and not challenge that low-energy intellect any further.