Historical overview of espionage moles and walk‑ins, citing Cold War examples
Summary
The passage provides a general narrative about past intelligence moles and walk‑ins with no new, actionable leads, specific transactions, or contemporary allegations involving current high‑level offic References to known Cold War moles (Heinz Felfe, Alexander Poteyev, Robert Hanssen). Mentions a 1990 PFIEB review on self‑generated spies. Quotes Snowden on NSA priorities, but without supporting evi
This document is from the House Oversight Committee Releases.
View Source CollectionPersons Referenced (1)
Tags
Related Documents (6)
Historical overview of CIA walk‑ins and moles, citing Poteyev, Hanssen and Golitsyn
The passage recaps well‑known espionage cases and a 1990 PFIAB review. It contains no new names, transactions, dates, or actionable leads beyond publicly documented events, so its investigative useful Walk‑ins (self‑generated spies) were a significant source of Cold War intelligence, per a 1990 PFIAB Alexander Poteyev supplied the CIA with secrets for over a decade after infiltrating Russian intel
Compilation of citations and interview references related to Russian espionage and U.S. intelligence oversight
The document is a collection of source citations and vague interview mentions without specific names, dates, transactions, or actionable details. It offers minimal investigative leads beyond confirmin References to NSA, CIA, FBI, and Russian intelligence figures such as Alexander Poteyev and Pavel Su Mentions of interviews with unnamed sources (e.g., "Source B", former NSA executive) and journalis
Document outlines Snowden disclosures of NSA programs (215, PRISM/702, XKeyscore) and claims about U.S. and UK surveillance capabilities
The passage provides concrete references to specific NSA surveillance programs, dates, and a claim of 45 thwarted attacks, offering actionable leads for investigators to verify program scopes, inter‑a Snowden exposed NSA's Section 215 bulk phone‑metadata collection program. PRISM (Section 702) allegedly intercepted 91% of global internet traffic via U.S. fiber routes. General Alexander testified t
NSA Oversight, Cyber Command, and Potential Misuse of Private Computers for Cyber Warfare
The passage outlines alleged internal NSA practices—mandatory error reporting, planting viruses on private computers, and broad cyber retaliation authority—linking high‑level officials (NSA Director K NSA required exhaustive error reporting every 90 days, creating administrative burden. NSA Director Keith Alexander also headed the newly created Cyber Command in 2009. Alleged deployment of sentinel
CIA mole Alexander Poteyev warns of Russian SVR sleeper‑agent program targeting U.S. intelligence agencies
The passage identifies a specific SVR colonel (Alexander Poteyev) who allegedly acted as a CIA source in 2010 and describes a planned Russian ‘illegal’ sleeper‑agent network aimed at U.S. agencies. It Poteyev, a colonel in Russia’s SVR, is described as a CIA‑paid mole in 2010. He allegedly reported a Russian plan to build an ‘illegal’ sleeper‑agent network in the United State The network would pla
Speculative timeline of Edward Snowden’s alleged recruitment by Russian intelligence and CIA/NSA internal decisions
The passage outlines unverified scenarios linking Snowden to Russian intelligence and mentions high‑level officials (Michael Morell, Gen. Keith Alexander) discussing counter‑measures. It provides date Three possible periods when Snowden may have been under Russian control (pre‑NSA, post‑Hong Kong, po Reference to CIA’s aborted 2009 investigation of Snowden and his resignation. Allegation that Snow
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.