HOUSE_OVERSIGHT_020330.jpg
Extraction Summary
13
People
8
Organizations
5
Locations
3
Events
3
Relationships
3
Quotes
Document Information
Type:
Government investigative report (house oversight committee)
File Size:
Summary
This document appears to be page 178 of a House Oversight Committee report focused on the Edward Snowden leaks. It details operational security failures by Snowden and his journalist contacts (Poitras, Greenwald) in 2013, noting that Poitras shared information with multiple people and Greenwald shared details with his partner, David Miranda. The text also analyzes Russian cyber espionage capabilities, noting their focus on breaking TOR networks and their advanced tools capable of bypassing US government security.
People (13)
| Name | Role | Context |
|---|---|---|
| Edward Snowden | NSA Leaker/Source |
Subject of the report; described as lacking discretion and stealing secrets in Feb 2013.
|
| Laura Poitras | Journalist/Filmmaker |
Contact for Snowden; described as a 'lightning rod' for ex-NSA employees.
|
| Micah Lee | Technology Operative |
Freedom of the Press Foundation; told about the source by Poitras.
|
| Jacob Appelbaum | TOR Proselytizer |
Told about the source by Poitras; associate of Runa Sandvik.
|
| Ben Wizner | ACLU Lawyer |
Told about the source by Poitras.
|
| Barton Gellman | Journalist |
Told about the source by Poitras; raised the matter with a Justice Department official.
|
| Glenn Greenwald | Journalist |
Told about the source by Poitras; told his lover David Miranda.
|
| David Miranda | Greenwald's Lover |
Told about the source by Greenwald and asked to evaluate bona fides.
|
| William Binney | Ex-NSA Employee/Insider |
Filmed by Poitras in 2012.
|
| Thomas Drake | Ex-NSA Employee/Insider |
Filmed by Poitras in 2012.
|
| Runa Sandvik | TOR Associate |
Given Snowden's true name and address in Hawaii.
|
| Vladimir Putin | Russian Leader |
Mentioned regarding Russia's cyber espionage capabilities.
|
| Bruce Schneier | Cryptographer/Security Specialist |
Quoted regarding difficulty of maintaining privacy against government adversaries.
|
Organizations (8)
| Name | Type | Context |
|---|---|---|
| NSA |
National Security Agency; target of leaks and surveillance analysis.
|
|
| Freedom of the Press Foundation |
Employer of Micah Lee.
|
|
| ACLU |
Employer of Ben Wizner.
|
|
| Justice Department |
Former official contacted by Gellman.
|
|
| TOR |
The Onion Router; anonymity network used by Snowden and targeted by Russia.
|
|
| New York Times |
Obtained 2009 NSA analysis in 2013.
|
|
| FireEye |
Silicon Valley security firm that analyzed Russian hacking.
|
|
| House Oversight Committee |
Implied author of the document (footer).
|
Timeline (3 events)
2007
Russian hackers developed a sophisticated virus bypassing US security.
Cyberspace
Russian Hackers
FireEye (investigators)
Locations (5)
| Location | Context |
|---|---|
|
Snowden's residence and location of NSA regional base.
|
|
|
Described as having leading cyber espionage services.
|
|
|
Location of FireEye.
|
|
|
Compared to Russia regarding cyber capabilities.
|
|
|
Government servers targeted by Russian virus.
|
Relationships (3)
Text refers to Miranda as Greenwald's "lover".
Poitras protecting her source; Snowden impressing operational security on her.
Text states Sandvik "worked with Appelbaum".
Key Quotes (3)
"“It is not me that can’t keep a secret, “Abraham Lincoln joked. “It’s the people I tell it that can’t.”"Source
HOUSE_OVERSIGHT_020330.jpg
Quote #1
"“It is next to impossible to maintain privacy and anonymity against a well-funded government adversary.” - Bruce Schneier"Source
HOUSE_OVERSIGHT_020330.jpg
Quote #2
"sitting ducks"Source
HOUSE_OVERSIGHT_020330.jpg
Quote #3
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document