HOUSE_OVERSIGHT_020330.jpg

Extraction Summary

13
People
8
Organizations
5
Locations
3
Events
3
Relationships
3
Quotes

Document Information

Type: Government investigative report (house oversight committee)
File Size:
Summary

This document appears to be page 178 of a House Oversight Committee report focused on the Edward Snowden leaks. It details operational security failures by Snowden and his journalist contacts (Poitras, Greenwald) in 2013, noting that Poitras shared information with multiple people and Greenwald shared details with his partner, David Miranda. The text also analyzes Russian cyber espionage capabilities, noting their focus on breaking TOR networks and their advanced tools capable of bypassing US government security.

People (13)

Name Role Context
Edward Snowden NSA Leaker/Source
Subject of the report; described as lacking discretion and stealing secrets in Feb 2013.
Laura Poitras Journalist/Filmmaker
Contact for Snowden; described as a 'lightning rod' for ex-NSA employees.
Micah Lee Technology Operative
Freedom of the Press Foundation; told about the source by Poitras.
Jacob Appelbaum TOR Proselytizer
Told about the source by Poitras; associate of Runa Sandvik.
Ben Wizner ACLU Lawyer
Told about the source by Poitras.
Barton Gellman Journalist
Told about the source by Poitras; raised the matter with a Justice Department official.
Glenn Greenwald Journalist
Told about the source by Poitras; told his lover David Miranda.
David Miranda Greenwald's Lover
Told about the source by Greenwald and asked to evaluate bona fides.
William Binney Ex-NSA Employee/Insider
Filmed by Poitras in 2012.
Thomas Drake Ex-NSA Employee/Insider
Filmed by Poitras in 2012.
Runa Sandvik TOR Associate
Given Snowden's true name and address in Hawaii.
Vladimir Putin Russian Leader
Mentioned regarding Russia's cyber espionage capabilities.
Bruce Schneier Cryptographer/Security Specialist
Quoted regarding difficulty of maintaining privacy against government adversaries.

Organizations (8)

Name Type Context
NSA
National Security Agency; target of leaks and surveillance analysis.
Freedom of the Press Foundation
Employer of Micah Lee.
ACLU
Employer of Ben Wizner.
Justice Department
Former official contacted by Gellman.
TOR
The Onion Router; anonymity network used by Snowden and targeted by Russia.
New York Times
Obtained 2009 NSA analysis in 2013.
FireEye
Silicon Valley security firm that analyzed Russian hacking.
House Oversight Committee
Implied author of the document (footer).

Timeline (3 events)

2007
Russian hackers developed a sophisticated virus bypassing US security.
Cyberspace
Russian Hackers FireEye (investigators)
2012
Laura Poitras filming NSA insiders.
Unknown
February 2013
Edward Snowden stealing NSA secrets.
Hawaii (implied)

Locations (5)

Location Context
Snowden's residence and location of NSA regional base.
Described as having leading cyber espionage services.
Location of FireEye.
Compared to Russia regarding cyber capabilities.
Government servers targeted by Russian virus.

Relationships (3)

Glenn Greenwald Romantic/Confidant David Miranda
Text refers to Miranda as Greenwald's "lover".
Laura Poitras Journalist/Source Edward Snowden
Poitras protecting her source; Snowden impressing operational security on her.
Runa Sandvik Professional/Colleague Jacob Appelbaum
Text states Sandvik "worked with Appelbaum".

Key Quotes (3)

"“It is not me that can’t keep a secret, “Abraham Lincoln joked. “It’s the people I tell it that can’t.”"
Source
HOUSE_OVERSIGHT_020330.jpg
Quote #1
"“It is next to impossible to maintain privacy and anonymity against a well-funded government adversary.” - Bruce Schneier"
Source
HOUSE_OVERSIGHT_020330.jpg
Quote #2
"sitting ducks"
Source
HOUSE_OVERSIGHT_020330.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (3,549 characters)

178
time when he was stealing NSA secrets in February 2013, went to great lengths to impress on Poitras the need for operational security about his contacts with her, but that injunction did not prevent her from telling at least five people about her source, including Micah Lee, the Berkeley-based technology operative for the Freedom of the Press Foundation; Jacob Appelbaum, the TOR proselytizer; Ben Wizner, the ACLU lawyer; Barton Gellman; and Glenn Greenwald. “It is not me that can’t keep a secret, “Abraham Lincoln joked. “It’s the people I tell it that can’t.” In the same vein, Poitras could hardly rely on these five confidants not to tell her (and Snowden’s) to others. Hours after he was told, Greenwald told his lover David Miranda about the source in great detail. He even asked him to evaluate the source’s bona fides for him. Gellman, for his part, raised the matter with a former high official at the Justice Department.
Moreover, as the intelligence world knew, Poitras was herself a veritable lightning rod for attracting ex-NSA employees who objected to some of its surveillance programs. In 2012, her filming of NSA insiders, including Binney and Drake, would make her communications of interest to any intelligence services that wanted to keep tabs on possible NSA dissidents.
Nor was Snowden himself overly discreet. It will be recalled that he had also advertised his TOR-sponsored crypto party activities over the Internet, and supplied Runa Sandvik, who worked with Appelbaum, his true name and address in Hawaii. Sandvik had no reason not to share the identity of her co-presenter with others in the TOR movement. Snowden also had his girl friend make a video of his presentation, as will be recalled. He also bragged about operating the largest TOR outlets in Hawaii. Even if his TOR software provided him a measure of anonymity, it was not beyond the ability of the world-class cyber services to crack it.
Under Putin, Russia had built one of the leading cyber espionage services in the world. According to a 2009 NSA analysis of Russian capabilities, which was obtained by the New York Times in 2013, Russia’s highly-sophisticated tools for cyber-espionage were superior to those of China or any other adversary nation. For example, investigators from FireEye, a well-regarded Silicon Valley security firm, found that in 2007, Russian hackers had developed a highly-sophisticated virus that could bypass the security measures of the servers of both the US government and its private contractors. According to one computer security expert, the virus had made protected Internet websites “sitting ducks” for these Russian sophisticated hackers. The cryptographer Bruce Schneier, a leading specialist in computer security, explained, “It is next to impossible to maintain privacy and anonymity against a well-funded government adversary.”
Nor has the Russian cyber service has made a secret out of the fact that it targets TOR software. It even offered a cash prize to anyone in the hacking community who could break TOR. Prior to 2013, according to cyber security experts, it spent over a decade building cyber tools aimed at unraveling the TOR networks used by hacktavists, criminal enterprises, political dissidents and rival intelligence operatives. To this end, it reportedly attempted to map out computers that served as major TOR exit nodes (such as the one Snowden operated in 2012 near a NSA regional base in Hawaii.) It also reportedly attached the equivalent of “electronic ink” to
HOUSE_OVERSIGHT_020330

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document