Document outlines Snowden disclosures of NSA programs (215, PRISM/702, XKeyscore) and claims about U.S. and UK surveillance capabilities
Summary
The passage provides concrete references to specific NSA surveillance programs, dates, and a claim of 45 thwarted attacks, offering actionable leads for investigators to verify program scopes, inter‑a Snowden exposed NSA's Section 215 bulk phone‑metadata collection program. PRISM (Section 702) allegedly intercepted 91% of global internet traffic via U.S. fiber routes. General Alexander testified t
This document is from the House Oversight Committee Releases.
View Source CollectionPersons Referenced (1)
Tags
Related Documents (6)
NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare
The passage outlines alleged internal NSA practices—mandatory error reporting, planting viruses on private computers, and broad cyber retaliation authority—linking high‑level officials (NSA Director K NSA required exhaustive error reporting every 90 days, creating administrative burden. NSA Director Keith Alexander also headed the newly created Cyber Command in 2009. Alleged deployment of sentinel
CIA mole Alexander Poteyev warns of Russian SVR sleeper‑agent program targeting U.S. intelligence agencies
The passage identifies a specific SVR colonel (Alexander Poteyev) who allegedly acted as a CIA source in 2010 and describes a planned Russian ‘illegal’ sleeper‑agent network aimed at U.S. agencies. It Poteyev, a colonel in Russia’s SVR, is described as a CIA‑paid mole in 2010. He allegedly reported a Russian plan to build an ‘illegal’ sleeper‑agent network in the United State The network would pla
NSA Cyber Command allegedly planted viruses on private computers as cyber sentinels
The passage claims the NSA‑led Cyber Command covertly installed malware on hundreds of thousands of civilian machines to monitor threats, suggesting a large‑scale, potentially illegal surveillance ope Cyber Command created in 2009 under NSA director Keith Alexander. Alleged deployment of viruses on private computers to act as sentinels. Difficulty distinguishing state‑sponsored attacks from civili
NSA Bulk Telephone Records Collection Under Section 215 and Keith Alexander's Role
The passage outlines how the NSA leveraged Section 215 of the Patriot Act to amass a massive database of telephone billing records, describing the legal interpretation that enabled this bulk collectio Section 215 was interpreted by the Bush and Obama administrations to allow bulk collection of all U. The FISA court could issue warrants to telecom companies for these records deemed "relevant" to te
Speculative timeline of Edward Snowden’s alleged recruitment by Russian intelligence and CIA/NSA internal decisions
The passage outlines unverified scenarios linking Snowden to Russian intelligence and mentions high‑level officials (Michael Morell, Gen. Keith Alexander) discussing counter‑measures. It provides date Three possible periods when Snowden may have been under Russian control (pre‑NSA, post‑Hong Kong, po Reference to CIA’s aborted 2009 investigation of Snowden and his resignation. Allegation that Snow
Jeffrey Epstein email discusses complex tax‑saving schemes, offshore accounts and alleged mismanagement by trusted advisors
The passage provides concrete details about large‑scale tax‑saving transactions (claimed $600 M), specific individuals (Eileen Alexandersson, Brad Wechsler), and instructions to open accounts at Deuts Epstein allegedly saved $600 M in taxes through a transaction the sender claims was under‑compensate The email references setting up over 100 bank accounts for Epstein, suggesting extensive offshore
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.