Skip to main content
Skip to content
Case File
kaggle-ho-020227House Oversight

Snowden‑facilitated TOR crypto party in Honolulu with alleged NSA contacts

Snowden‑facilitated TOR crypto party in Honolulu with alleged NSA contacts The passage links Edward Snowden to a private crypto/TOR event in Hawaii, mentions direct contact with a TOR supporter who allegedly had access to NSA computers, and references other hacktivist figures. While it provides some names, dates, and locations, the claims are largely anecdotal, lack concrete evidence of wrongdoing, and repeat already‑public narratives about Snowden’s advocacy for privacy. It offers a moderate investigative lead—potentially worth corroborating attendance logs, video footage, and communications—but its novelty and impact are limited. Key insights: Snowden allegedly coordinated a crypto/TOR gathering in Honolulu on Dec 11, 2012.; A TOR supporter with alleged NSA computer access was present.; Sandvik (unnamed in public records) was introduced as a TOR project speaker.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020227
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Snowden‑facilitated TOR crypto party in Honolulu with alleged NSA contacts The passage links Edward Snowden to a private crypto/TOR event in Hawaii, mentions direct contact with a TOR supporter who allegedly had access to NSA computers, and references other hacktivist figures. While it provides some names, dates, and locations, the claims are largely anecdotal, lack concrete evidence of wrongdoing, and repeat already‑public narratives about Snowden’s advocacy for privacy. It offers a moderate investigative lead—potentially worth corroborating attendance logs, video footage, and communications—but its novelty and impact are limited. Key insights: Snowden allegedly coordinated a crypto/TOR gathering in Honolulu on Dec 11, 2012.; A TOR supporter with alleged NSA computer access was present.; Sandvik (unnamed in public records) was introduced as a TOR project speaker.

Persons Referenced (1)

Tags

kagglehouse-oversightmedium-importancetorencryptionhacktivismnsaedward-snowden

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
75 her in direct contact with a TOR supporter with access to the computers of its main enemy, the NSA. On December 11, 2012, following Snowden’s instructions, Sandvik arrived shortly before 6 PM at the Fishcake furniture store in downtown Honolulu. She proceed to the back of the store where there was a public space called the Box Jelly. It was used mainly for counterculture events. Folding chairs and work tables had already been set up, Snowden was there waiting for her with Lindsay Mills, who he introduced to Sandvik as his girlfriend. He told her that she was there to film the event. Mills did not mention this Crypto party in her blog. But that Snowden brought her and introduced her to Sandvik suggests that he did not keep secret from her his activities to further TOR. The event started at six PM sharp. By Sandvik’s count, about twenty people gradually filled the room. Some of them were from the local “Hi-Cap” computer club and other attendees were from Snowden’s NSA base. Snowden began the presentation by giving reasons why Internet users needed to defend their privacy by using both encryption and TOR software. According to one attendee who asked not to be identified by name, Snowden, while not revealing that he worked for the NSA, spoke with such precise knowledge about government surveillance capabilities that he suspected Snowden worked for the government. Snowden next introduced Sandvik, who took the podium and discussed the work of the TOR project, stressing the importance of expanding the TOR network. Following their presentations, Snowden and Sandvik took questions from the audience. The Oahu crypto party, according to Sandvik, ended about 10 PM. No one objected to Mills making a video of the meeting even though it was dedicated to the idea of protecting privacy. The video was not posted on the Internet so presumably Snowden wanted it for his own purposes. Afterwards, Sandvik went to a local diner called Zippy’s for a late dinner. She left Hawaii two days later. Even though a number of the prominent hacktavists he invited were unable to attend, Snowden declared the Crypto party a huge success in his after-hours report. One of the people Snowden invited under the alias Cincinnatus was Parker Higgins, who was a prime mover in the previously-mentioned Electronic Freedom Foundation. He now lived in California where he had founded the San Francisco Crypto Party. (Higgins would make headlines in 2013 by flying a chartered blimp over the NSA’s secret facility in Utah and photographing it from the air). Despite Snowden’s efforts, Higgins wrote him that he was unable to attend the December Crypto Party because of the high price of the airfare that month between San Francisco and Honolulu. (Higgins was hardly poor: his family home in Oahu had been rented to President Obama for two of his vacations in Hawaii.) As a consolation, Higgins told Snowden that he would try to attend Snowden’s next Crypto Party, which was scheduled for February 23, 2013.

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.