| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
location
United States
|
Unknown |
10
Very Strong
|
4 | |
|
organization
Congress
|
Unknown |
9
Strong
|
2 | |
|
location
United States
|
Geopolitical rivals |
9
Strong
|
2 | |
|
location
Russia
|
Technology licensing |
7
|
1 | |
|
person
Chinese-language media outlets
|
Unknown |
7
|
1 | |
|
person
President Trump
|
Political economic adversary |
7
|
1 | |
|
person
American federal and state politics
|
Unknown |
7
|
1 | |
|
person
its companies
|
Unknown |
7
|
1 | |
|
person
American scholars and researchers
|
Unknown |
7
|
1 | |
|
organization
Google
|
Business associate |
6
|
1 | |
|
person
Working Group
|
Unknown |
6
|
1 | |
|
person
Donald Trump Administration
|
Unknown |
6
|
1 | |
|
location
the west
|
Geopolitical cooperation |
6
|
1 | |
|
person
Mr. Trump
|
Adversarial economic |
6
|
1 | |
|
location
United States
|
Adversarial competitive |
6
|
1 | |
|
organization
EDF
|
Unknown |
6
|
1 | |
|
person
North Korea/Pakistan/Iran/Russia
|
Intelligence sharing |
6
|
1 | |
|
person
Russia
|
Intelligence ally |
6
|
1 | |
|
person
Russia
|
Intelligence alliance |
6
|
1 | |
|
person
Russia
|
Strategic emulation |
6
|
1 | |
|
person
Russia
|
Political alliance |
6
|
2 | |
|
location
Russia
|
Alliance treaty |
6
|
1 | |
|
location
United States
|
Espionage target |
5
|
1 | |
|
organization
Iran
|
Diplomatic political |
5
|
1 | |
|
location
North America
|
Geopolitical rivals |
5
|
1 |
| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| N/A | N/A | UN Vetoes (implied context) | UN (implied) | View |
| N/A | N/A | China arranges for a $46 billion investment in pipelines in Pakistan | Pakistan | View |
| N/A | N/A | The document discusses general and ongoing 'coercive and covert activities by China' and 'efforts... | United States | View |
| N/A | N/A | Syrian Crisis | Syria | View |
| N/A | N/A | China's unexpected RMB devaluation. | China | View |
| N/A | N/A | Discussion of the Syrian situation, including the legitimacy of Mr. Assad, international response... | Global political context, U... | View |
| N/A | N/A | Scheduled trade talks | Unknown | View |
| N/A | N/A | China projecting friendliness toward Malaysia. | Malaysia | View |
| N/A | N/A | Intensification of the trade war between the United States and China. | N/A | View |
| N/A | N/A | Implementation of U.S. Tariffs on China on various goods (food, electronics, materials) | Global/International Trade | View |
| N/A | N/A | Peacekeeping dispatches and naval port visits | The Gulf / Region | View |
| 2025-12-23 | N/A | China hit U.S. with $60 bn worth of tariffs | Global/Trade | View |
| 2025-11-21 | N/A | U.S. and China agree to pause trade war | Unknown | View |
| 2025-11-19 | N/A | Opium Wars | China | View |
| 2025-11-17 | N/A | Russian and Chinese veto of a Franco-British resolution on Syria at the UN Security Council. | UN Security Council | View |
| 2025-11-17 | N/A | U.S. slapped $200 bn worth of tariffs on China | Global/Economic | View |
| 2025-11-01 | N/A | Establishment of the East China Sea ADIZ by China | East China Sea | View |
| 2018-09-24 | N/A | US imposes 10% tariffs on $200bn, China retaliates | US/China | View |
| 2018-07-06 | N/A | US implements $34bn sanctions on China, which retaliates | US/China | View |
| 2018-06-18 | N/A | Tariffs on additional $200bn of Chinese goods announced | US | View |
| 2018-03-23 | N/A | US implements metal tariffs on China, which retaliates | US/China | View |
| 2018-03-22 | N/A | Tariffs on $50bn of Chinese goods announced | US | View |
| 2017-06-27 | N/A | US Dept of State releases annual Trafficking in Persons Report putting China at Tier 3. | United States | View |
| 2017-01-01 | N/A | Release of the seized APCs. | China | View |
| 2016-12-19 | N/A | Potential trilateral summit (Tentative) | Not specified | View |
This document is page 325 of a book containing endnotes for Chapters 22 ('The Chinese Puzzle') and 23 ('A Single Point of Failure'). It lists citations for information regarding Edward Snowden, cyber security breaches (OPM), Chinese intelligence, and Russian relations, referencing various news articles and reports from 1999 to 2015. The footer indicates the file was part of a House Oversight Committee production ('HOUSE_OVERSIGHT_019813') and includes a filename starting with 'Epst_', suggesting it was included in the Epstein investigation discovery materials, though the text itself does not explicitly mention Jeffrey Epstein.
This document appears to be page 322 from the notes section of a book, likely 'How America Lost Its Secrets' by Edward Jay Epstein (indicated by the ISBN in the footer). It contains endnotes for Chapter 18, citing various news articles and interviews regarding intelligence agencies (NSA, CIA), Russian espionage, and Edward Snowden. The document has a 'HOUSE_OVERSIGHT' stamp, suggesting it was part of a larger document production for a congressional committee. Despite the filename containing 'Epst', the content relates to the author Edward Jay Epstein, not Jeffrey Epstein.
This document is page 321 from the endnotes of a book (likely by Edward Jay Epstein given the file name and context) regarding Edward Snowden. It lists sources for pages 169-182 of the main text, citing interviews with anonymous NSA and Senate Intelligence Committee officials, as well as articles from the Guardian, RT, NYT, and The Intercept between 2013 and 2016. The notes cover Snowden's legal representation, his time in Russia and Hong Kong, and media coverage by Glenn Greenwald and Laura Poitras. The document bears a House Oversight Committee Bates stamp.
This document is page 320 from a book (identified by ISBN as 'How America Lost Its Secrets' by Edward Jay Epstein), containing endnotes for pages 159-171. The text consists of citations for sources regarding Edward Snowden, espionage, the NSA, and Russian intelligence, dating primarily between 2012 and 2015. The document bears a 'HOUSE_OVERSIGHT' stamp, indicating it was produced as part of a congressional investigation, likely due to the author's surname matching Jeffrey Epstein or relevance to intelligence oversight.
This document is a page of endnotes (page 315) from the book 'How America Lost Its Secrets' by Edward Jay Epstein (ISBN 9780451494566), produced as part of a House Oversight Committee investigation. The text provides citations for Chapters 11 and 12, detailing sources for events surrounding Edward Snowden's flight from Hong Kong, his time in the Moscow airport, and his interactions with Julian Assange and Sarah Harrison. It includes references to media articles from The Guardian, Newsweek, and Vanity Fair, and notes a $20,000 speaking fee paid to Snowden by the University of Arizona.
This document is page 283 from a book (indicated by the filename 'Epst_...' likely referring to author Edward Jay Epstein) titled 'Snowden's Choices,' bearing a House Oversight Committee Bates stamp. The text analyzes Edward Snowden's motivations, characterizing him as a calculating defector who used stolen NSA secrets on thumb drives as 'bait' or currency to secure protection from Chinese and Russian intelligence services. It details his CIA training at Fort Peary and argues that his choice of Russia contradicts a desire for civil liberties, suggesting his primary goal was escaping American retribution.
This document is page 282 from the book 'How America Lost Its Secrets', stamped as evidence by the House Oversight Committee (file 019770). It details Edward Snowden's departure from Hong Kong to Moscow on June 23rd, following the unsealing of a U.S. criminal complaint. The text analyzes the geopolitical tensions involving the U.S., China, and Russia, noting that China likely allowed Snowden to leave to avoid complications during a scheduled meeting between Presidents Xi and Obama.
This document is page 279 from a book proof, stamped 'HOUSE_OVERSIGHT_019767'. The text details Edward Snowden's strategic decisions regarding his theft of NSA and GCHQ documents, his awareness of the risks (prison/assassination), and his decision to flee to Hong Kong rather than Brazil or remaining in the US. While the filename includes 'Epst' and the ISBN corresponds to the book 'How America Lost Its Secrets' by Edward Jay Epstein, the text content concerns Edward Snowden, not Jeffrey Epstein. It appears this document may be part of a larger discovery production where the author's name triggered an 'Epstein' keyword association.
This document page discusses Edward Snowden's calculated move from Dell to Booz Allen Hamilton, arguing that the transition was motivated by a desire to access specific intelligence documents unavailable at Dell, such as the 2013 "black budget." The text suggests that Snowden's actions went beyond whistleblowing and provided significant value to foreign adversaries like Russia and China by exposing sensitive information and intelligence sources.
This document is page 246 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein), stamped as evidence by the House Oversight Committee. The text details the aftermath of the Edward Snowden intelligence breach in 2013, describing it as a massive strategic setback for Western intelligence agencies (NSA, CIA, GCHQ). It discusses the strategic implications of the leak regarding Russia and China, and describes the massive damage control efforts undertaken by U.S. and British intelligence officers in Washington, Fort Meade, and Cheltenham.
This document appears to be page 245 from a book titled 'A Single Point of Failure', seemingly included in a House Oversight production related to an Epstein investigation (indicated by the 'Epst' filename prefix). The text details the geopolitical maneuvering surrounding Edward Snowden's flight from Hong Kong to Russia in June 2013, including tracking by the NSA, comments by President Obama, and intelligence strategies regarding 'false flag' operations and obscuring success. It discusses the involvement of US, Chinese, and Russian intelligence services.
This document appears to be a page from a book (likely by Edward Jay Epstein given the filename) included in a House Oversight investigation. The text details the pervasive surveillance capabilities of Chinese intelligence in Hong Kong around 2013, noting that the U.S. State Department required personnel to use altered phones to avoid data theft. It argues that Edward Snowden, having arrived in May 2013 with NSA secrets, would have been aware of these capabilities and relied on the Chinese presence to protect him from the CIA.
This document appears to be page 238 from the book 'How America Lost Its Secrets,' produced as evidence (Bates: HOUSE_OVERSIGHT_019726). The text details the intelligence and military relationship between Russia and China, focusing on their shared goal of countering US global dominance, specifically mentioning Putin and Xi Jinping. It also discusses the implications of Edward Snowden's 2013 stay in Hong Kong and the value of leaked NSA secrets.
This document is page 236 from the book 'How America Lost Its Secrets' (authored by Edward Jay Epstein). It details Chinese cyber espionage tactics, contrasting them with Russian methods. The text describes the use of 'sleeper' bugs and 'zombie' programs to infiltrate U.S. networks, specifically mentioning a 2007 report by Paul Strassmann about 700,000 infected computers. It highlights successful hacks against U.S. contractors like Booz Allen and tech companies (Google, Yahoo!, etc.) to access NSA and CIA personnel dossiers. The page bears a 'HOUSE_OVERSIGHT_019724' stamp, indicating it was part of a document production for a congressional investigation.
This document is page 235 from a book (likely by Edward Jay Epstein, based on the file name 'Epst') discussing Chinese espionage against the United States. It details how China acquired nuclear warhead and stealth technology through theft rather than investment, leading to a 1998 House Select Committee investigation. The page bears a Bates stamp 'HOUSE_OVERSIGHT_019723', indicating it was part of a document production for a congressional oversight committee.
This document is page 222 from the book 'How America Lost Its Secrets' (ISBN implied in footer), stamped with 'HOUSE_OVERSIGHT_019710'. The text discusses the history of espionage between Russian intelligence (SVR/KGB) and the US NSA, specifically focusing on Putin's strategy in 2013 and the historical defection of NSA mathematicians William Martin and Bernon Mitchell in 1960. While the content is historical non-fiction, the file naming convention ('Epst_...') suggests it was included in a document production related to the Jeffrey Epstein investigation.
This document appears to be a scanned page (p. 221) from a book, likely by Edward Jay Epstein (indicated by filename 'Epst'), titled 'The Russians Are Coming' (chapter title). The text analyzes Russian geopolitical strategy following the year 2000, specifically focusing on the leadership's view of the Soviet collapse as a disaster and efforts to counter US hegemony through alliances with China and military upgrades. It contrasts the legal constraints of the US NSA with the broad domestic surveillance powers of Russian intelligence (FSB) via the SORM system. The document bears a House Oversight Committee Bates stamp, suggesting it was used as evidence in a congressional investigation.
This document is page 217 of a book (identified by the filename ISBN as 'Epstein: Dead Men Tell No Tales') included as an exhibit in a House Oversight Committee investigation (Bates stamped). The text details systemic cybersecurity failures within the U.S. intelligence community's vetting process, specifically focusing on contractors USIS and Booz Allen Hamilton, and the OPM's e-QIP system. It highlights how these vulnerabilities allowed foreign actors (China and Russia) and hacker groups (Anonymous) to access sensitive personnel data, noting that Edward Snowden used these compromised systems to update his clearance in 2011.
This document is page 207 from a book (likely by Edward Jay Epstein based on the filename 'Epst' and context) discussing the impact of Edward Snowden's intelligence breach on the NSA. It details how Snowden gained access in 2009 and 2013, the compromise of intelligence regarding Russia, Iran, and China, and the subsequent efforts by NSA Director Rogers to manage the fallout and morale issues in 2014. The page bears a House Oversight Bates stamp, indicating it was part of a congressional production.
This document is page 205 from a book (indicated by the ISBN in the filename, likely 'How America Lost Its Secrets' by Edward Jay Epstein) included in a House Oversight production. The text details the establishment of the U.S. Cyber Command in 2009 under General Keith Alexander, the difficulties in attributing cyber attacks (citing the 2014 Sony hack), and the NSA's mandate to dominate cyberspace and intercept information from adversaries like Russia, China, and North Korea. It mentions the NSA's annual budget of $12.3 billion and workforce size.
This document is page 198 from the book 'How America Lost Its Secrets' (ISBN 9780451494566). It details the history of U.S. cryptology and espionage, specifically focusing on the 'Black Chamber' led by Herbert O. Yardley after WWI and its eventual closure by Secretary of State Henry Stimson in 1929. While the content is historical, the document bears a 'HOUSE_OVERSIGHT' Bates stamp, indicating it was included as part of a document production to Congress, likely related to the Epstein investigation given the file context.
This document is page 193 of a book (likely 'How America Lost Its Secrets' by Edward Jay Epstein, based on the ISBN in the footer) included in House Oversight Committee records. The text discusses the NSA's offensive intelligence strategy, the 2010 CIA penetration of the Russian SVR, and the catastrophic failure caused by Edward Snowden's theft of secret source lists. It details how Snowden fled to China and Russia, potentially upending U.S. intelligence capabilities, and references subsequent cyber breaches of U.S. networks in 2014 and 2015.
This document is page 186 from the book 'How America Lost Its Secrets' (authored by Edward Jay Epstein, indicated by the file name 'Epst'), produced as part of a House Oversight investigation. The text details the intelligence fallout from Edward Snowden's 2013 data theft, including the compromise of British GCHQ operations and the inability of the U.S. to track Russian troop movements in Crimea. It discusses the transition from General Alexander to Admiral Michael Rogers at the NSA and the long-term damage assessment regarding U.S. electronic intelligence capabilities.
This document discusses the aftermath of the Snowden leaks, focusing on documents released after Snowden left Hong Kong, particularly regarding the alleged surveillance of German Chancellor Angela Merkel. It details the intelligence community's suspicion that hostile parties like Russia or China may have gained access to sensitive NSA "Level 3" documents, potentially compromising U.S. espionage capabilities.
This page discusses the critical nature of missing NSA documents copied by Edward Snowden, specifically "Level 3" lists regarding China and Russia that were not provided to journalists. It questions whether Snowden took these highly sensitive files with him to Russia, noting his communications about protecting secrets and an interview with his Russian lawyer.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity