This document appears to be a proof page (p. 58) from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein, indicated by the filename). It discusses Edward Snowden's activities under the alias 'Cincinnatus' while working as a Dell contractor, noting that his non-NSA employee status legally prevented the NSA's 'Q' unit from monitoring his interactions with activists and Tor advocates without an FBI warrant. The page bears a House Oversight Committee Bates stamp.
| Name | Role | Context |
|---|---|---|
| Edward Snowden | Subject / Dell Contract Employee |
Referenced as 'Snowden' and alias 'Cincinnatus'; organized CryptoParty events while working for Dell.
|
| Sandvik | Associate |
Knew that 'Cincinnatus' was Snowden.
|
| Mills | Associate |
Knew that 'Cincinnatus' was Snowden.
|
| Jacob Appelbaum | Activist |
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
|
| Parker Higgins | Activist |
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
|
| Asher Wolf | Activist |
Described as a 'notable enemy of the NSA' contacted by Snowden via email.
|
| Unnamed Former Top NSA Executive | Interviewee |
Interviewed by the author in 2014 regarding counterespionage protocols.
|
| The Author | Narrator |
Refers to themselves as 'I' when asking the NSA executive a question. (Context suggests Edward Jay Epstein based on f...
|
| Name | Type | Context |
|---|---|---|
| NSA |
National Security Agency; employer of attendees at the party.
|
|
| Tor |
Network/Project advocated for by Snowden.
|
|
| Dell |
Company employing Snowden as a contract employee.
|
|
| Q |
Counterespionage unit of the NSA.
|
|
| FBI |
Agency required for court-approved requests to monitor US residents.
|
|
| CryptoParty |
Event/Organization for anti-NSA activities.
|
| Location | Context |
|---|---|
|
Location where Snowden was residing as a Dell employee.
|
"Snowden was not an NSA employee."Source
"Because Snowden was a contract employee of Dell's residing in the United States, the NSA could not legally monitor his private activities or intercept his communication."Source
"Ironically, adversary intelligence services searching for disgruntled intelligence workers had no such constraints."Source
Complete text extracted from the document (1,436 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document