HOUSE_OVERSIGHT_019783.jpg

1.67 MB

Extraction Summary

5
People
4
Organizations
2
Locations
2
Events
2
Relationships
4
Quotes

Document Information

Type: Book page / congressional exhibit
File Size: 1.67 MB
Summary

This document appears to be page 295 from a book (likely by Edward Jay Epstein given the footer filename and ISBN) included in House Oversight records. It details Edward Snowden's revelations regarding NSA and GCHQ surveillance programs, specifically XKeyscore and PRISM, and includes reactions from officials like Dianne Feinstein and Mike Rogers. The text explains how XKeyscore creates digital fingerprints for suspects and recounts Snowden's advice on evading surveillance by avoiding UK routing and U.S. internet companies.

People (5)

Name Role Context
Edward Snowden Whistleblower / Subject
Revealed NSA programs XKeyscore and PRISM; gave tips on evading surveillance.
Dianne Feinstein Chair of the Senate Select Committee
Defended NSA programs citing they saved lives.
Mike Rogers Representative
Spoke in defense of the 702 program regarding the Zazi case.
Najibullah Zazi Terrorist Suspect
Referenced in the 'Zazi case' in New York.
The Queen Monarch (UK)
Mentioned rhetorically by Snowden regarding GCHQ surveillance scope.

Organizations (4)

Name Type Context
NSA
National Security Agency; subject of the surveillance revelations.
Senate Select Committee
Chaired by Dianne Feinstein.
GCHQ
British intelligence agency; deployed 'full-take' internet interceptor.
House Oversight Committee
Implied by Bates stamp 'HOUSE_OVERSIGHT'.

Timeline (2 events)

2009
Briefing regarding NSA programs (implied context).
Unknown
June 9, 2013
Mike Rogers speaks about the 702 program and Zazi case.
Unknown

Locations (2)

Location Context
Location of the Zazi case.
Location of GCHQ and internet wiring to be avoided.

Relationships (2)

NSA Intelligence Partners GCHQ
Snowden discusses methods used by both NSA and British GCHQ.
NSA Secret Collaboration U.S.-based Internet companies
Snowden warned about trusting encryption due to 'secret relationships' with the NSA.

Key Quotes (4)

"subway cars stuffed to the gunwales with people"
Source
HOUSE_OVERSIGHT_019783.jpg
Quote #1
"I can tell you in the Zazi case in New York, it's exactly the program that was used."
Source
HOUSE_OVERSIGHT_019783.jpg
Quote #2
"You should never route through or peer with the UK under any circumstances. Their fibers are radioactive, and even the Queen's selfies to the pool boy get logged."
Source
HOUSE_OVERSIGHT_019783.jpg
Quote #3
"telecom collaborators to be the jewels in their crown of omniscience."
Source
HOUSE_OVERSIGHT_019783.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (2,481 characters)

The "War on Terror" After Snowden | 295
secretly briefed on in 2009. Dianne Feinstein, the chair of the Senate Select Committee, pointed out with privileged knowledge that it saved "subway cars stuffed to the gunwales with people"; Representative Mike Rogers also spoke with privileged knowledge when he said on June 9, 2013, referring to the 702 program, "I can tell you in the Zazi case in New York, it's exactly the program that was used."
The third NSA program of interest to terrorists that Snowden revealed was called XKeyscore. Using Internet data from PRISM, the NSA had created the equivalent of digital fingerprints for suspected foreign terrorists on watch lists. The "fingerprint" for each suspect was based on his or her search pattern on the Internet. These algorithms made it difficult for suspects to hide on the Internet by using aliases. Once a suspect was "fingerprinted," any attempt to evade surveillance by using a different computer and another user name would be detected by the XKeyscore algorithms. The "fingerprints" only worked so long as XKeyscore remained secret from those on the watch list. After Snowden exposed it, suspects could evade surveillance by changing their search patterns when they changed their aliases.
Further enabling furtive Internet users to evade the surveillance of the government, Snowden offered specific tips about the secret sources and methods used by both the NSA and the British GCHQ. He revealed in a public interview, for example, that the GCHQ had deployed the first "full-take" Internet interceptor that "snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit." When asked how to circumvent it, he replied, "You should never route through or peer with the UK under any circumstances. Their fibers are radioactive, and even the Queen's selfies to the pool boy get logged." Aside from this warning about using Internet providers whose wiring passes through Britain, he also warned Internet users about trusting the encryption of any U.S.-based Internet company because of their secret relationships with the NSA. He added that the NSA considered "telecom collaborators to be the jewels in their crown of omniscience." He also gave a warning about the attention the NSA was paying to "jihadi forums." He said that to avoid being automatically "targeted" by the NSA, one needed to avoid them.
Epst_9780451494566_2p_all_r1.indd 295
9/30/16 8:13 AM
HOUSE_OVERSIGHT_019783

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document