Citation 4 mentions 'His initial job for Dell...'
Snowden described as system administrator at Dell.
Text mentions his position as a system administrator at Dell.
Text mentions 'his day job at Dell'.
during his previous employment at Dell
during his previous employment at Dell
Listed as previous employer.
working at the NSA for Dell
Snowden worked for Dell on secret intelligence projects; Dell paid relocation expenses.
HOUSE_OVERSIGHT_020390.jpg
This document is page 238 of a larger work, containing the endnotes for "Chapter Five: Contractor." It lists thirteen sources for information about Edward Snowden, including articles from publications like The Guardian and Vanity Fair, author interviews with individuals like Tyler Drumheller and anonymous sources, and social media posts from Lindsay Mills.
HOUSE_OVERSIGHT_020235.jpg
This document appears to be a page from a narrative report or book regarding the Edward Snowden leaks. It details the initial anonymous communications between Snowden (using the handle 'Citizen 4') and filmmaker Laura Poitras. The text describes Snowden's offer to provide evidence of illegal NSA surveillance and Presidential Policy 20 (signed by Obama in Oct 2012), his operational security concerns, and his specific request to be publicly identified ('nailed to the cross') to prevent suspicion from falling on his colleagues or loved ones.
HOUSE_OVERSIGHT_020272.jpg
This document appears to be a page from a book or investigative report (possibly by Edward Jay Epstein regarding Edward Snowden) submitted as evidence to the House Oversight Committee. It analyzes how Edward Snowden obtained passwords to secure NSA vaults, ruling out his time at Dell or his system admin privileges at Booz Allen. The text explores the 'Unwitting Accomplice Possibility,' featuring an interview with a former Booz Allen executive who deems it highly unlikely that co-workers would voluntarily share passwords with Snowden, leading to a discussion of potential technical methods like 'key loggers.'
HOUSE_OVERSIGHT_019547.jpg
This document appears to be a page (p. 59) from a book manuscript, likely authored by Edward Jay Epstein (indicated by the filename 'Epst_9780451494566'), titled 'Chapter 7: String Puller'. It details Edward Snowden's activities in 2012, specifically his initial anonymous contact with journalist Glenn Greenwald using the alias 'Cincinnatus' while working for Dell at the NSA. The text also provides background on Greenwald, mentioning his past as a lawyer at Wachtell, Lipton, Rosen & Katz and his involvement in a business dispute regarding a pornographic website named 'HJ' in 2004. The document bears a House Oversight Committee Bates stamp.
HOUSE_OVERSIGHT_020279.jpg
This document is page 127 of a House Oversight report analyzing intelligence failures and defectors. It contrasts the rejected asylum request of Chinese official Wang Lijun with the case of Edward Snowden, detailing concerns that Snowden may have been recruited by Russian intelligence as early as 2009 or during his financial troubles in Geneva. The text outlines three possible scenarios for when Snowden came under Russian control and cites assessments by CIA Deputy Director Michael Morell and NSA Director General Keith Alexander.
HOUSE_OVERSIGHT_020238.jpg
This document page (stamped House Oversight) details the timeline in early 2013 when Edward Snowden (alias 'Citizen 4') successfully convinced journalists Glenn Greenwald and Laura Poitras of his legitimacy. It describes Snowden's anonymous communications, his misleading description of his role at the NSA (while working for Dell), and the journalists' agreement to publish the leaks in The Guardian. The text also notes that while the journalists believed they were exposing domestic spying, Snowden was simultaneously stealing documents regarding foreign operations from the National Threat Operations Center.
HOUSE_OVERSIGHT_019524.jpg
This document is Page 36 from the book 'How America Lost Its Secrets' by Edward Jay Epstein (hence the file prefix 'Epst'). It details Edward Snowden's background check failures by USIS, his girlfriend Lindsay Mills' blog activities, and his 2012 transfer by Dell to the NSA's Kunia base in Hawaii. The text highlights security lapses that allowed Snowden to maintain clearance and access sensitive systems alone. While the file metadata suggests a connection to 'Epstein,' the content refers to the author Edward Jay Epstein and his subject Edward Snowden, not Jeffrey Epstein.
Entities connected to both Edward Snowden and Dell
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein relationship