HOUSE_OVERSIGHT_019546.jpg

1.02 MB

Extraction Summary

8
People
6
Organizations
1
Locations
2
Events
3
Relationships
3
Quotes

Document Information

Type: Book proof / manuscript page
File Size: 1.02 MB
Summary

This document appears to be a proof page (p. 58) from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein, indicated by the filename). It discusses Edward Snowden's activities under the alias 'Cincinnatus' while working as a Dell contractor, noting that his non-NSA employee status legally prevented the NSA's 'Q' unit from monitoring his interactions with activists and Tor advocates without an FBI warrant. The page bears a House Oversight Committee Bates stamp.

People (8)

Name Role Context
Edward Snowden Subject / Dell Contract Employee
Referenced as 'Snowden' and alias 'Cincinnatus'; organized CryptoParty events while working for Dell.
Sandvik Associate
Knew that 'Cincinnatus' was Snowden.
Mills Associate
Knew that 'Cincinnatus' was Snowden.
Jacob Appelbaum Activist
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
Parker Higgins Activist
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
Asher Wolf Activist
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
Unnamed Former Top NSA Executive Interviewee
Interviewed by the author in 2014 regarding counterespionage protocols.
The Author Narrator
Refers to themselves as 'I' when asking the NSA executive a question. (Context suggests Edward Jay Epstein based on f...

Organizations (6)

Name Type Context
NSA
National Security Agency; employer of attendees at the party.
Tor
Network/Project advocated for by Snowden.
Dell
Company employing Snowden as a contract employee.
Q
Counterespionage unit of the NSA.
FBI
Agency required for court-approved requests to monitor US residents.
CryptoParty
Event/Organization for anti-NSA activities.

Timeline (2 events)

2014
Interview with NSA Executive
Unknown
The Author Former top NSA executive
Unknown (Pre-2014)
First CryptoParty
Unknown
Edward Snowden Ten or so NSA workers Sandvik Mills

Locations (1)

Location Context
Location where Snowden was residing as a Dell employee.

Relationships (3)

Edward Snowden Employment Dell
Snowden was a contract employee of Dell's
Sandvik Knowledge of Identity Edward Snowden
they knew (as did Sandvik and Mills) that the Tor advocate 'Cincinnatus' was Snowden
Edward Snowden Communication Jacob Appelbaum
contacting notable enemies of the NSA via e-mail, such as Jacob Appelbaum

Key Quotes (3)

"Snowden was not an NSA employee."
Source
HOUSE_OVERSIGHT_019546.jpg
Quote #1
"Because Snowden was a contract employee of Dell's residing in the United States, the NSA could not legally monitor his private activities or intercept his communication."
Source
HOUSE_OVERSIGHT_019546.jpg
Quote #2
"Ironically, adversary intelligence services searching for disgruntled intelligence workers had no such constraints."
Source
HOUSE_OVERSIGHT_019546.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (1,436 characters)

58 | HOW AMERICA LOST ITS SECRETS
CryptoParty, Tor station, and other anti-NSA activities could go unremarked upon. After all, ten or so NSA workers attended the first party, and it is not unlikely that many of them recognized him as their co-worker. If so, they knew (as did Sandvik and Mills) that the Tor advocate "Cincinnatus" was Snowden. He had also not been shy in contacting notable enemies of the NSA via e-mail, such as Jacob Appelbaum, Parker Higgins, and Asher Wolf. If anyone, including the security staff of the NSA, had been on the lookout for dissident intelligence workers, this well-advertised gathering and its organizer might have been of interest.
In 2014, I asked a former top NSA executive whether such activities on behalf of Tor by an NSA employee would arouse the attention of the NSA's own "Q" counterespionage unit. He answered, "Snowden was not an NSA employee." Because Snowden was a contract employee of Dell's residing in the United States, the NSA could not legally monitor his private activities or intercept his communication. To do so would require a court-approved FBI request. So Snowden/Cincinnatus was free to operate openly in recruiting NSA workers, hacktivists, and computer buffs for his events. Ironically, adversary intelligence services searching for disgruntled intelligence workers had no such constraints.
Epst_9780451494566_2p_all_r1.z.indd 58
9/29/16 5:51 PM
HOUSE_OVERSIGHT_019546

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document