This document page (stamped House Oversight) details the timeline in early 2013 when Edward Snowden (alias 'Citizen 4') successfully convinced journalists Glenn Greenwald and Laura Poitras of his legitimacy. It describes Snowden's anonymous communications, his misleading description of his role at the NSA (while working for Dell), and the journalists' agreement to publish the leaks in The Guardian. The text also notes that while the journalists believed they were exposing domestic spying, Snowden was simultaneously stealing documents regarding foreign operations from the National Threat Operations Center.
| Name | Role | Context |
|---|---|---|
| Edward Snowden | Source / Whistleblower |
Referred to as 'Snowden' and 'Citizen 4'; employed by Dell; communicating anonymously with journalists.
|
| Glenn Greenwald | Journalist |
Privacy advocate; recipient of Snowden's emails; agreed to break the story.
|
| Laura Poitras | Journalist / Filmmaker |
Collaborator with Greenwald; communicated timeline of document delivery.
|
| Citizen 4 | Alias |
The alias used by Edward Snowden in communications.
|
| Name | Type | Context |
|---|---|---|
| The Guardian |
Newspaper where Greenwald agreed to break the story.
|
|
| Dell |
Snowden's employer at the time.
|
|
| NSA |
National Security Agency; Snowden's workplace location.
|
|
| CIA |
Central Intelligence Agency; Greenwald speculated the source was a station chief.
|
|
| National Threat Operations Center |
Division of NSA from which documents were stolen.
|
|
| House Oversight Committee |
Indicated by the footer stamp 'HOUSE_OVERSIGHT'.
|
| Location | Context |
|---|---|
|
Snowden's work location while employed by Dell.
|
"the 'shock' of the documents he would give Greenwald would result in the public’s learning about the secret 'mechanisms through which our privacy is violated.'"Source
"We can guarantee for all people equal protection against unreasonable search,"Source
"He’s real,"Source
"senior government employee in the intelligence community"Source
"he was in the process of stealing a large number of documents from the NSA’s National Threat Operations Center that concerned the NSA’s sources and methods in foreign countries."Source
Complete text extracted from the document (3,104 characters)
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document