Skip to main content
Skip to content
Case File
kaggle-ho-020226House Oversight

Snowden allegedly organized NSA‑linked TOR “crypto party” in Hawaii while employed as an NSA system administrator

Snowden allegedly organized NSA‑linked TOR “crypto party” in Hawaii while employed as an NSA system administrator The passage suggests a possible breach of NSA policy and internal support for TOR by an employee who later became a whistleblower. It provides specific dates, locations, and names (Snowden, Sandvik, Asher Wolf) that could be followed up, but the claims are largely anecdotal and lack concrete evidence of wrongdoing beyond policy violations, limiting its blockbuster potential. Key insights: Snowden created a TOR exit node in Hawaii in 2012 using a two‑gigabyte server called “The Signal.”; He contacted a woman identified as Sandvik under the alias “Cincinnatus,” providing his real name and address to obtain TOR stickers.; Snowden organized an “Oahu Crypto party” on Dec. 11, 2012, inviting NSA coworkers and promoting TOR installation.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020226
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Snowden allegedly organized NSA‑linked TOR “crypto party” in Hawaii while employed as an NSA system administrator The passage suggests a possible breach of NSA policy and internal support for TOR by an employee who later became a whistleblower. It provides specific dates, locations, and names (Snowden, Sandvik, Asher Wolf) that could be followed up, but the claims are largely anecdotal and lack concrete evidence of wrongdoing beyond policy violations, limiting its blockbuster potential. Key insights: Snowden created a TOR exit node in Hawaii in 2012 using a two‑gigabyte server called “The Signal.”; He contacted a woman identified as Sandvik under the alias “Cincinnatus,” providing his real name and address to obtain TOR stickers.; Snowden organized an “Oahu Crypto party” on Dec. 11, 2012, inviting NSA coworkers and promoting TOR installation.

Persons Referenced (1)

Tags

kagglehouse-oversightmedium-importancensatoredward-snowdencrypto-partyinternal-security-breach

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
74 Nevertheless, Snowden worked to assist the TOR movement. He created TOR’s main exit node in Hawaii in 2012. This activity required a two gigabyte server called “The Signal,” which he described as the largest TOR relay station in Honolulu. Sandvik first heard directly from Snowden in November 2012. At the time, he wrote her under the alias “Cincinnatus,” but also supplied his real name and address in Hawaii so that she could supply him with TOR stickers. So she knew his identity seven months before he went public. He would later tell Sandvik from Moscow that he had been “moonlighting” on behalf of the TOR cause at the NSA. By “moonlighting” he meant that in 2012 he had two jobs: Officially he was working as an NSA system administrator; unofficially he was working to advance the TOR Project. He added, with some understatement, that his moonlighting was “something the NSA might not have been too happy about.” By November 2012, while still working for Dell at the NSA, his dual role led him to organize a “crypto party” aimed at finding new recruits for TOR. The “crypto party” movement itself had been started in 2011 in Australia by Asher Wolf, a radical hacktavist and anarchist living in Melbourne. She promoted them not unlike the tupper-ware parties of the 1950s. They worked as follows. The party organizer, usually with a representative of the TOR project, advertised the party on the Internet. Attendees were encouraged to bring their own laptops so they could install TOR as well encryption software in them. The attendees then would be instructed on how to use it. Finally, those converted to TOR software would be told to proselytize about its virtues by holding their own “crypto party.” Wolf’s idea was to use these gatherings to expand the realm of TOR. On November 18, 2012, Snowden launched his initial crypto party. It was called the “Oahu Crypto party” and had its own web page. He told Asher Wolf that it would be the first Crypto party in Honolulu. She wrote him back, advising him to “keep it simple.”(Wolf later said she did not know he was working at the NSA.) Snowden apparently had no inhibitions in staging a party which the NSA might consider subversive of its battle against TOR. He even invited his fellow NSA workers in Hawaii as well as Others in the local computer culture. He asked Sandvik, who was living in Washington DC at the time, to participate, proposing that she co-host it with him in Honolulu. He scheduled it for December 11, 2012. He suggested that TOR stickers that could be used as “swag” to lure an audience. According to her account, Snowden informed he that he “had been talking to some of the more technical guys at work into setting up some additional fast servers” for TOR. His “work” place at the time was the NSA. If so, he had already attempted to find co-workers at the NSA who might be interested in attending an anti-NSA surveillance presentation. Sandvik not only agreed a to be Snowden’s co-presenter but she made the Oahu Crypto party a TOR-sponsored event. Sandvik flew to Honolulu on December 6, 2012. It was a fourteen hour flight and a relatively expensive one. She later told Wired magazine that the invitation from Snowden coincided with her plan to take a “vacation in Hawaii.” Whatever her reason, it brought

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.