NSA

Person
Mentions
2
Relationships
81
Events
84
Documents
1
Also known as:
NSA Office of the General Counsel counterintelligence officer at the NSA NSA Officials Former NSA official NSA 215 program Unnamed NSA Director

Relationship Network

Loading... nodes
Interactive Network: Click nodes or edges to highlight connections and view details with action buttons. Drag nodes to reposition. Node size indicates connection count. Line color shows relationship strength: red (8-10), orange (6-7), yellow (4-5), gray (weak). Use legend and help buttons in the graph for more guidance.

Event Timeline

Interactive Timeline: Hover over events to see details. Events are arranged chronologically and alternate between top and bottom for better visibility.
81 total relationships
Connected Entity Relationship Type
Strength (mentions)
Documents Actions
person Edward Snowden
Employee
10 Very Strong
10
View
organization Booz Allen
Contractor
10 Very Strong
5
View
person Edward Snowden
Employment adversarial
9 Strong
4
View
organization FBI
Business associate
9 Strong
3
View
person Edward Snowden
Adversarial leaker
8 Strong
4
View
organization GCHQ
Business associate
8 Strong
2
View
person CIA
Intelligence sharing
8 Strong
2
View
person Edward Snowden
Adversarial breach
7
3
View
person The President
Intelligence provider
7
2
View
person Edward Snowden
Adversarial
7
3
View
organization GCHQ
Intelligence alliance
7
1
View
person Rajesh De
Employment
7
2
View
person Edward Snowden
Adversarial employment
6
2
View
person Edward Snowden
Unknown
6
2
View
person Edward Snowden
Contractor insider threat
6
1
View
person Richard Ledgett
Employee
6
1
View
organization Booz Allen
Client
6
2
View
person Russian intelligence
Espionage target
6
1
View
person Edward Snowden
Adversarial former contractor
6
1
View
person Edward Snowden
Adversarial former employment
6
1
View
person Private Contractors
Operational reliance
6
1
View
person Tor Software
Adversarial
6
1
View
person Edward Snowden
Contractor adversary
6
2
View
organization Department of Defense
Organizational subordination
5
1
View
person Edward Snowden
Adversarial former contractor
5
1
View
Date Event Type Description Location Actions
2011-01-01 N/A Establishment of Cyber Command by NSA and military services. USA View
2010-01-01 N/A NSA investigation into a potential mole at Fort Meade; no mole found. Fort Meade View
2010-01-01 N/A NSA security investigation into a leak at Fort Meade Fort Meade View
2010-01-01 N/A NSA initiated a counterespionage probe at Fort Meade headquarters. Fort Meade, Maryland View
2010-01-01 N/A NSA security investigation regarding a leak at Fort Meade. Fort Meade View
2010-01-01 N/A Investigation for a mole at NSA Fort Meade (none found). Fort Meade View
2010-01-01 N/A NSA security investigation at Fort Meade. Fort Meade View
2010-01-01 N/A NSA 'Q' division initiates counter-espionage probe at Fort Meade. Fort Meade, Maryland View
2010-01-01 N/A NSA mole hunt found no mole; Snowden was working in Japan. Japan/Fort Meade View
2009-01-01 N/A Edward Snowden finds his way into the NSA through a temporary job with an outside contractor. NSA View
2009-01-01 N/A Snowden obtains temporary job with outside contractor for the NSA. NSA/Fort Meade View
2009-01-01 N/A Creation of the U.S. Cyber Command. USA View
2008-01-01 N/A NSA devised technology for tapping into air-gapped computers. Abroad View
2008-01-01 N/A NSA outsourced the task of reorganizing backup systems at regional bases to Dell. Regional bases View
2008-01-01 N/A New York Times expose revealing NSA surveillance extended to domestic telephone use. United States View
2007-01-01 N/A Presidential directive imposing rules on NSA regarding data collection on Americans. USA View
2007-01-01 N/A NSA found a way to intercept Internet traffic before it was encrypted. NSA / Internet View
2001-10-01 N/A Congress passes the USA Patriot Act, expanding NSA mandate. Washington D.C. View
2001-10-01 N/A Congress passes the USA Patriot Act Washington D.C. View
1996-01-01 N/A Background investigations for the NSA began to be outsourced to private companies. USA View
1996-01-01 N/A Release of internal NSA report 'Out of Control'. NSA View
1990-01-01 N/A Emergence of computer networks expanding SVR's recruiting horizon. Global View
1990-01-01 N/A Emergence of computer networks expanding SVR recruiting horizons. Global / US View
1980-01-01 N/A Issuance of Executive Order 12333 by President Reagan. USA View
1980-01-01 N/A President Reagan issued Executive Order 12333 expanding NSA interception mandates. USA View

HOUSE_OVERSIGHT_019696.jpg

This document appears to be page 208 from a book titled 'How America Lost Its Secrets' (likely by Edward Jay Epstein, indicated by the filename 'Epst_...'), produced as part of a House Oversight investigation. The text discusses the NSA security breach committed by Edward Snowden ('mere analyst in training') in Oahu and references his subsequent presence in Moscow. It analyzes how reliance on outside contractors created a 'back door' for the breach.

Book page / manuscript proof (house oversight committee production)
2025-11-19
Total Received
$12,300,000,000.00
4 transactions
Total Paid
$0.00
0 transactions
Net Flow
$12,300,000,000.00
4 total transactions
Date Type From To Amount Description Actions
N/A Received PRC / US Government NSA $12,300,000,000.00 Annual budget of $12.3 billion mentioned. View
N/A Received PRC / US Government NSA $0.00 Reference to a 'multibillion-dollar black budge... View
1960-01-01 Received PRC / US Government NSA $0.00 Multi-billion dollar 'black budget' hidden from... View
1960-01-01 Received PRC / US Government NSA $0.00 Multi-billion dollar 'black budget' hidden from... View
As Sender
22
As Recipient
14
Total
36

Secret Budget Report

From: NSA
To: Congress

Noted requirements for 4,000 periodic investigations to guard against insider threats.

Report
2010-01-01

Vulnerability of outsourcing

From: NSA
To: General Hayden

Warned that reliance on outsiders opened a back door into the NSA

Memorandum
2005-01-01

Domestic telephone billing records

From: NSA
To: FBI

Billing records of persons called by known foreign jihadists, supplied to the FBI.

Surveillance/data collection
2001-10-01

NSA vulnerability

From: NSA threat officer
To: NSA

Report citing failures of Russian intelligence and predicting future targeting of insider computer personnel.

Report
1996-01-01

Out of Control

From: Unnamed Threat Officer
To: NSA

Report warning about the security risks posed by system administrators and networked computers.

Report
1996-01-01

Out of Control

From: Unnamed Threat Officer
To: NSA

Analysis of NSA vulnerability suggesting networking computers created a 'precarious basket' and predicting a system administrator could become a mole.

Report
1996-01-01

Out of Control

From: Unnamed Threat Officer
To: NSA

Report assessing NSA vulnerability to penetration, predicting system administrators as a risk.

Report
1996-01-01

Out of Control

From: Unnamed Threat Officer
To: NSA

Report warning that networking computers created a vulnerability where a 'system administrator' could become an insider threat.

Report
1996-01-01

Executive Order 12333

From: Ronald Reagan
To: NSA

Mandate to expand interception of foreign communications.

Executive order
1980-01-01

Executive Order 12333

From: Ronald Reagan
To: NSA

Mandate to use all means consistent with federal law to obtain reliable intelligence information.

Executive order
1980-01-01

Snowden Breach

From: NSA
To: John Owen Brennan, Mic...

Briefing regarding the extent of data Snowden had taken.

Briefing
0010-06-01

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein entity