Skip to main content
Skip to content
Case File
kaggle-ho-020225House Oversight

Appelbaum, Sandvik, and Snowden’s Links to WikiLeaks, TOR, and NSA Surveillance

Appelbaum, Sandvik, and Snowden’s Links to WikiLeaks, TOR, and NSA Surveillance The passage outlines connections among WikiLeaks operatives, TOR developers, and Edward Snowden, suggesting possible coordination to evade U.S. surveillance. While it names high‑profile actors, it lacks concrete evidence of wrongdoing, specific transactions, or actionable leads, limiting its investigative utility but still offering moderate value for further probing of surveillance‑evasion networks. Key insights: Jake Appelbaum served as North American representative for WikiLeaks and managed its cybersecurity during 2010 releases.; Appelbaum was a keynote speaker replacement for Julian Assange at the HOPE convention in NYC.; Appelbaum allegedly took extreme measures to avoid U.S. surveillance while in Berlin.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020225
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Appelbaum, Sandvik, and Snowden’s Links to WikiLeaks, TOR, and NSA Surveillance The passage outlines connections among WikiLeaks operatives, TOR developers, and Edward Snowden, suggesting possible coordination to evade U.S. surveillance. While it names high‑profile actors, it lacks concrete evidence of wrongdoing, specific transactions, or actionable leads, limiting its investigative utility but still offering moderate value for further probing of surveillance‑evasion networks. Key insights: Jake Appelbaum served as North American representative for WikiLeaks and managed its cybersecurity during 2010 releases.; Appelbaum was a keynote speaker replacement for Julian Assange at the HOPE convention in NYC.; Appelbaum allegedly took extreme measures to avoid U.S. surveillance while in Berlin.

Persons Referenced (1)

Tags

kagglehouse-oversightmedium-importancewikileakstornsa-surveillanceedward-snowdencybersecurity

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
73 Appelbaum was also well connected in this culture. He was the North American representative for Wikileaks before he moved to Berlin in 2013. He also managed Wikileaks’ cyber security when it released classified documents in Iceland in 2010. He was so well-regarded among hacktavists that Assange chose him as his keynote speaker replacement at the “Hackers of the Planet Earth” (HOPE) convention in New York City. Assange also sung his praises, telling Rolling Stone “Jake [Appelbaum] has been a tireless promoter behind the scenes of our cause.” For its part, Ro//ing Stone entitled its profile of Appelbaum, “Meet the most dangerous man on the Internet.” The reason that Assange needed a replacement for this particular event was that he feared he would be arrested if he came to New York because he had released the Manning files on Wikileaks. In Berlin, Appelbaum went to extreme lengths to protect himself from American surveillance. For example, when George Packer interviewed him for the New Yorker, in 2014, he insisted on meeting with Packer naked in a sauna so he could be sure Packer did not have a recording device (other than his notebook.) Appelbaum stated repeatedly in other interviews that he was being spied upon by America. While his claims may have sounded paranoid to his interviewers, as a character in Joseph Heller’s Catch 22 famously said, “Just because you are paranoid doesn’t mean that you are not being followed.” In any event, Appelbaum acted to defeat the perceived surveillance. Runa Sandvik was another principal core developers in the TOR project in 2012. A Norwegian national in her mid-twenties, she wrote in 2012 a well-followed blog for Forbes on Internet privacy in which she identified herself as a privacy and security researcher working at the intersection of technology, law and policy. As a close associate of Appelbaum’s, she worked tirelessly to extend TOR’s cloak of anonymity against the surveillance of the NSA and other would-be intruders of privacy. Appelbaum and Sandvik shared another distinction. They both came in contact with Snowden before he went public and while he was still working for the NSA in Hawaii. Snowden was in 2012 a major advocate of TOR software. He made no secret of his concerns about it electronic interceptions. He even wore to work a jacket with a parody of the NSA insignia, which, instead of merely depicting the NSA eagle, show the eagle clutching AT&T phone lines. He had also become a member of the Electronic Freedom Foundation, the digital rights organization that was helping finance TOR. His efforts on behalf of TOR were not limited to symbolic gestures. Through his work as a system administrator for Dell, he had found documents revealing NSA efforts to defeat TOR’s ability to camouflage its user’s identity on the Internet. Though not yet successful, he found that the NSA was attempting to build back-door entry ways into TOR software. He also knew that the NSA was becoming increasingly hostile to the spread of TOR software. One of the NSA documents that he illicitly downloaded was entitled “TOR Stinks.” It described the NSA’s enormous but not fully successful efforts to penetrate TOR servers. In addition, he downloaded NSA documents describing programs begun in 2012 that aimed at searching the Internet for the cyber-signatures of foreign parties suspected of hacking into US government systems. So he knew that the NSA considered the TOR movement an enemy.

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.