| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
organization
Department of Justice (DOJ)
|
Advisory lobbying |
9
Strong
|
1 | |
|
location
China
|
Unknown |
9
Strong
|
2 | |
|
person
President Johnson
|
Political opposition |
8
Strong
|
1 | |
|
person
President Grant
|
Separation of powers |
8
Strong
|
1 | |
|
organization
Chinese government
|
Target of influence operation |
7
|
1 | |
|
location
Taiwan
|
Unknown |
7
|
1 | |
|
organization
Department of Justice (DOJ)
|
Advisory legislative commentary |
7
|
1 | |
|
person
US congressional delegations
|
Visitor host |
7
|
1 | |
|
organization
MIT
|
Lobbying |
7
|
1 | |
|
person
Jimmy Carter
|
Governmental executive legislative communication |
7
|
1 | |
|
person
National Labor Relations Board (NLRB)
|
Delegation of authority |
6
|
1 | |
|
person
President Obama
|
Political adversarial |
6
|
1 | |
|
organization
Department of Justice (DOJ)
|
Adversarial collaborative |
6
|
1 | |
|
organization
Administration
|
Political alignment on china policy |
6
|
1 | |
|
organization
Chinese government
|
Target of influence |
5
|
1 | |
|
person
Senator Orrin G. Hatch
|
Correspondence |
5
|
1 | |
|
person
John D. Rockefeller IV
|
Correspondence |
5
|
1 | |
|
organization
Department of Justice (DOJ)
|
Unknown |
5
|
1 | |
|
person
Christine C. Quin
|
Guest of honor |
5
|
1 | |
|
person
President Carter
|
Executive legislative conflict |
5
|
1 | |
|
person
President Wilson
|
Executive legislative conflict |
5
|
1 | |
|
person
President Eisenhower
|
Executive legislative conflict |
5
|
1 | |
|
person
The President
|
Institutional conflict |
5
|
1 | |
|
person
President Grant
|
Constitutional opposition |
5
|
1 | |
|
person
President (Executive Branch)
|
Constitutional separation of powers |
5
|
1 |
| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| 2006-01-01 | N/A | Dubai bought US port operations and faced political backlash. | USA | View |
| 2006-01-01 | N/A | Dubai bought US port operations and faced political backlash in US Congress | USA | View |
| 1999-01-01 | N/A | Publication of a report by the Select Committee, U.S. Congress (Cox Report). | U.S. | View |
| 1998-01-01 | N/A | Establishment of the Select Committee on National Security and Military and Commercial Concerns w... | Washington D.C. | View |
| 1998-01-01 | N/A | US Congress set up the Select Committee on National Security and Military and Commercial Concerns... | United States | View |
| 1998-01-01 | N/A | US Congress set up a special bipartisan investigative unit regarding Chinese technology theft. | Washington D.C. | View |
| 1989-01-01 | N/A | A period of turmoil in US-China relations where Beijing relied more heavily on lobbying the US bu... | United States, China | View |
| 1989-01-01 | N/A | The Chinese crackdown around Tiananmen Square, which prompted active resistance from the US Congr... | Tiananmen Square, China | View |
| 1984-01-01 | N/A | Assassination of Indira Gandhi and subsequent election victory for the Congress party. | India | View |
| 1979-01-01 | N/A | Passage of the Taiwan Relations Act by the US Congress. | United States | View |
| 1955-07-13 | N/A | President Eisenhower sent a special message to Congress upon signing the Department of Defense Ap... | N/A | View |
| 1946-01-01 | N/A | Supreme Court case United States v. Lovett, where the President enforced a law he believed was un... | United States | View |
| 1946-01-01 | N/A | Supreme Court case *United States v. Lovett*, where the President enforced a statute he believed ... | United States | View |
| 1946-01-01 | N/A | Supreme Court case: United States v. Lovett. The President enforced a statute to withhold compens... | United States | View |
| 1938-01-01 | N/A | Enactment of the Fair Labor Standards Act (FLSA). | United States | View |
| 1935-01-01 | N/A | Enactment of the National Labor Relations Act (NLRA). | United States | View |
This document is a page from a legal filing that presents a legislative history and analysis to argue for a broad interpretation of the phrase "any offense involving sexual or physical abuse." The author cites the 1986 Sexual Abuse Act (SAA) and related congressional hearings to counter what they describe as a narrower definition previously used by courts. The central argument is that the SAA was intended to comprehensively define sexual abuse for federal offenses.
This handwritten legal document argues that Congress intentionally excluded specific child abuse definitions found in § 3509(a) when making technical corrections in 1994, suggesting these definitions apply to civil reporting rather than criminal statutes. The text cites legal precedents such as *Ibarra v. Holder*, *Jama v. Immigration & Customs Enforcement*, and *Brown v. Gardner* to support principles of statutory interpretation regarding congressional intent and context.
This document is a page of handwritten legal notes filed on October 12, 2021, as part of Case 1:20-cr-00330-PAE (USA v. Ghislaine Maxwell). The text presents a legal argument focusing on 'Plain Language' statutory interpretation, specifically distinguishing between 'exploitation' and 'sexual or physical abuse.' The author cites several legal precedents (Patterson v. Schriro, US v. Pharis, US v. Dodge) and criticizes the Fifth Circuit for ignoring guidance regarding statutory construction and the misfiling of statute of limitation language in 1990.
This document is a handwritten page from a legal filing in the case USA v. Ghislaine Maxwell (Case 1:20-cr-00330-PAE), filed in October 2021. The text contains legal arguments regarding statutory interpretation, specifically concerning definitions of 'sexual abuse' and 'exploitation,' and argues for the application of 'repose' (statute of limitations) based on Supreme Court precedents like *Lockhart*, *Toussie*, and *McElvain*. It criticizes the Fifth Circuit's interpretation of these statutes.
This document is a handwritten legal motion filed on October 12, 2021, by federal inmate David A. Diehl (Reg. No. 53214018) from USP Coleman II. Diehl argues legal points regarding statutes of limitations, citing 'Stogner v. California' and 18 USC § 3299, to request 'intervenor status' in the criminal case against Ghislaine Maxwell (Case 1:20-cr-00330-PAE). The document serves as a cover letter for an enclosed brief he wishes to file in her case.
This document is a handwritten legal argument filed in court on October 12, 2021, challenging a court's interpretation of statute §3283. The author argues that the statute's legislative history, originating from the 1986 Sexual Abuse Act, demonstrates its narrow purpose is for sexual assault and related offenses, not a broader application. The argument cites several legal cases (Davis, Pledges, Bridges) to contend that the court's findings are 'patently wrong'.
This document is page 241 of a DOJ report discussing the legal interpretation of the Crime Victims' Rights Act (CVRA) between 2010 and 2011. It details the Office of Legal Counsel's (OLC) determination that victim rights do not 'vest' until formal criminal charges are filed, a stance maintained in the 2011 Guidelines revision despite Senator Jon Kyl's argument that this conflicted with the Act's plain language. The text highlights the friction between internal DOJ policy regarding pre-indictment plea negotiations and the legislative intent of the CVRA.
This document is page 19 of 83 from a court filing (Document 565) in Case 1:20-cr-00330-PAE (United States v. Ghislaine Maxwell), filed on December 19, 2021. It contains Instruction No. 12 regarding 'Conspiracy and Substantive Counts,' explaining the legal distinction between agreeing to commit a crime (conspiracy) and actually committing the crime (substantive). The text outlines that the jury will be instructed on substantive Counts Two, Four, and Six before conspiracy Counts One, Three, and Five.
This document is page 41 of a court filing from July 22, 2022, discussing legal arguments related to a defendant's sentencing. It focuses on the application of sentencing guidelines 4B1.5(b) concerning public danger and 3B1.1(a) regarding leadership roles in criminal activity, particularly in cases involving sexual abuse or exploitation of minors. The document cites congressional intent and the defendant's objections to these enhancements.
This document is page 40 of a court transcript (Case 1:20-cr-00330) filed on July 22, 2022, related to the sentencing of Ghislaine Maxwell (the defendant). The judge overrules a defense objection regarding sentencing enhancements, affirming that the defendant engaged in a pattern of prohibited sexual conduct with a minor and rejecting the argument that a finding of 'continuing danger to the public' is required by the Guidelines. The judge cites legal precedents (United States v. Sash, NLRB v. SW General) to prioritize the clear text of the Guidelines over background commentary or legislative history.
A page from a court transcript filed on July 22, 2022, in Case 1:20-cr-00330-PAE (United States v. Ghislaine Maxwell). Defense attorney Mr. Everdell argues that sentencing guidelines regarding 'repeat and dangerous sex offenders' should not apply to his client, noting she has not been accused of a crime in over 18 years. The prosecutor, Ms. Moe, declines to respond verbally, resting on previous written briefings.
This document is page 317 of a book (likely 'How America Lost Its Secrets' by Edward Jay Epstein, based on the filename and content), containing endnotes for pages 121-129. The text lists bibliographic citations for various articles and reports primarily concerning Edward Snowden, the NSA surveillance leaks, Dominique Strauss-Kahn, and government intelligence activities between 2011 and 2016. The document is stamped 'HOUSE_OVERSIGHT_019805', indicating it was part of a production to the House Oversight Committee.
This document appears to be page 302 from the book 'How America Lost Its Secrets' (likely by author Edward Jay Epstein, indicated by the filename prefix 'Epst'), stamped with 'HOUSE_OVERSIGHT'. The text analyzes the damage caused by Edward Snowden's 2013 intelligence leaks, specifically regarding the NSA's PRISM program and Department of Defense operations. It features quotes from Booz Allen Hamilton Vice-Chairman Michael McConnell stating that Snowden compromised more capability than any spy in U.S. history.
This document is a scanned page (301) from the Epilogue of a book, likely 'How America Lost Its Secrets' by Edward Jay Epstein, stamped as evidence by the House Oversight Committee. The text analyzes the impact of Edward Snowden's leaks, crediting him with prompting Congress to modify the Patriot Act regarding domestic privacy while simultaneously criticizing him for damaging long-standing US intelligence methods used against foreign adversaries. It details the mechanics of NSA call chaining and the shift in how billing records are stored.
This document page discusses Edward Snowden's calculated move from Dell to Booz Allen Hamilton, arguing that the transition was motivated by a desire to access specific intelligence documents unavailable at Dell, such as the 2013 "black budget." The text suggests that Snowden's actions went beyond whistleblowing and provided significant value to foreign adversaries like Russia and China by exposing sensitive information and intelligence sources.
This document appears to be a scanned page (p. 221) from a book, likely by Edward Jay Epstein (indicated by filename 'Epst'), titled 'The Russians Are Coming' (chapter title). The text analyzes Russian geopolitical strategy following the year 2000, specifically focusing on the leadership's view of the Soviet collapse as a disaster and efforts to counter US hegemony through alliances with China and military upgrades. It contrasts the legal constraints of the US NSA with the broad domestic surveillance powers of Russian intelligence (FSB) via the SORM system. The document bears a House Oversight Committee Bates stamp, suggesting it was used as evidence in a congressional investigation.
This document is page 218 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein), stamped as evidence by the House Oversight Committee. It details the security risks inherent in the NSA's outsourcing of intelligence work to private contractors like Booz Allen Hamilton and Dell, highlighting a 'revolving door' of high-level executives moving to private firms. The text specifically cites Edward Snowden's ability to move between contractors (Dell to Booz Allen) as a realization of security vulnerabilities warned about in NSA memos dating back to 2005.
This document is page 217 of a book (identified by the filename ISBN as 'Epstein: Dead Men Tell No Tales') included as an exhibit in a House Oversight Committee investigation (Bates stamped). The text details systemic cybersecurity failures within the U.S. intelligence community's vetting process, specifically focusing on contractors USIS and Booz Allen Hamilton, and the OPM's e-QIP system. It highlights how these vulnerabilities allowed foreign actors (China and Russia) and hacker groups (Anonymous) to access sensitive personnel data, noting that Edward Snowden used these compromised systems to update his clearance in 2011.
This document appears to be page 206 from the book 'How America Lost Its Secrets' by Edward Jay Epstein (indicated by the file name 'Epst_' and the book title header). It discusses the NSA's operations at Fort Meade, the impact of the Edward Snowden leaks, and the agency's specific capability developed in 2007 to intercept internet traffic before encryption. It also details internal NSA security protocols, including the use of 'compartments' and the 'NSANet' to manage classified information.
This document is page 203 of a book (indicated by the header 'The Rise of the NSA'), likely produced during a House Oversight investigation given the Bates stamp 'HOUSE_OVERSIGHT_019691'. The text discusses the history of the NSA and CIA relations, the conflict between the NSA and hacktivists using Tor/encryption, and the expansion of NSA surveillance powers following the 9/11 attacks via the USA Patriot Act and Section 215. The footer indicates a print date of September 30, 2016.
This document is page 202 from the book 'How America Lost Its Secrets' (ISBN matches Edward Jay Epstein's book), bearing a House Oversight Bates stamp. The text details the history and operational scope of the NSA, its relationship with the 'Five Eyes' allies, and its expansion into regional bases to monitor internet communications. It includes quotes from former CIA officials James Woolsey and John E. McLaughlin regarding the necessity and extent of U.S. surveillance operations.
This document is page 190 from the book 'How America Lost Its Secrets' (likely by Edward Jay Epstein), stamped with a House Oversight Committee label. It details a 2010 NSA counterespionage probe at Fort Meade aimed at identifying Russian spies and the June 2010 FBI arrest and deportation of twelve Russian sleeper agents identified by an individual named Poteyev. The text discusses the logistical challenges of internal NSA investigations and the strategic implications of deporting the agents.
This document is page 177 from a book (likely 'Epstein: Dead Men Tell No Tales' based on the ISBN in the footer file name) included in House Oversight Committee evidence. The text details the legal complexities facing Edward Snowden, specifically the challenges his lawyer Ben Wizner (ACLU) faced in securing amnesty or a plea deal with the DOJ. It discusses the Whistleblower Protection Act of 1989, the strategic damage caused by Snowden fleeing to Russia, and Wizner's role as a gatekeeper for media access to Snowden.
This document is page 171 from a book, likely 'How America Lost Its Secrets' by Edward Jay Epstein (indicated by ISBN in footer '9780451494566' and file prefix 'Epst'). The text discusses the dispute over the number of documents Edward Snowden stole from the NSA, referencing interviews with James Bamford and claims by Glenn Greenwald. It mentions a Defense Intelligence Agency report regarding 900,000 compromised Pentagon documents revealed via a Vice FOIA request. While the file bears a 'HOUSE_OVERSIGHT' stamp, the content relates to the Edward Snowden leaks, not Jeffrey Epstein.
This document is page 150 from the book 'How America Lost Its Secrets' by Edward Jay Epstein, stamped with 'HOUSE_OVERSIGHT'. It discusses theories on how Edward Snowden obtained passwords to secure NSA vaults, specifically 'Level 3 documents.' The text details his employment transition from Dell to Booz Allen and explores the possibility that he unwittingly or deceptively used co-workers to gain access, noting that the NSA informed Congress in 2014 that three colleagues spoke to the FBI about potential deception.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity