Skip to main content
Skip to content
Case File
kaggle-ho-020237House Oversight

Meeting between Laura Poitras and Glenn Greenwald arranged to securely share Snowden emails in April 2013

Meeting between Laura Poitras and Glenn Greenwald arranged to securely share Snowden emails in April 2013 The passage details a concrete, time‑stamped encounter where Poitras took operational security measures to hand Snowden’s (Citizen 4) emails to Greenwald. It identifies specific actors (Poitras, Greenwald, Snowden) and a date, offering a clear lead for investigators to trace communications, verify the emails, and examine any subsequent publishing decisions. While the overall Snowden‑Greenwald collaboration is known, the granular description of the meeting logistics and security precautions is novel and could uncover additional undisclosed contacts or documents. Key insights: April 19, 2013 meeting at Marriott restaurant in New York between Poitras and Greenwald; Poitras warned Greenwald about NSA phone‑mic capabilities and enforced phone‑free protocol; Multiple table changes used as a security measure

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020237
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Meeting between Laura Poitras and Glenn Greenwald arranged to securely share Snowden emails in April 2013 The passage details a concrete, time‑stamped encounter where Poitras took operational security measures to hand Snowden’s (Citizen 4) emails to Greenwald. It identifies specific actors (Poitras, Greenwald, Snowden) and a date, offering a clear lead for investigators to trace communications, verify the emails, and examine any subsequent publishing decisions. While the overall Snowden‑Greenwald collaboration is known, the granular description of the meeting logistics and security precautions is novel and could uncover additional undisclosed contacts or documents. Key insights: April 19, 2013 meeting at Marriott restaurant in New York between Poitras and Greenwald; Poitras warned Greenwald about NSA phone‑mic capabilities and enforced phone‑free protocol; Multiple table changes used as a security measure

Persons Referenced (1)

Tags

kagglehouse-oversighthigh-importancensasurveillancejournalismwhistlebloweroperational-security

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
85 surveillance, if Gellman agreed to write a story on it for the Washington Post. Even though Gellman had left the staff of the Washington Post in 2010, he had previously written several stories on that subject for the newspaper. He was also highly-regarded by the editors there. He was therefore interested in Poitras’ offer (although he would consult a friend at the Justice Department about the legality of publishing NSA documents. Snowden now had laid the groundwork for at least two possible outlets; one an establishment newspaper in Washington DC, the Washington Post; and a well-respected international newspaper, the Guardian. Poitras, however, was having some difficulty in bringing Greenwald in on the plan. Like Snowden, she did not trust writing him in unencrypted emails and, since Greenwald lived in Brazil, she still had not found an opportunity for a face-to-face meeting with him. That opportunity arose in mid-April 2013. Greenwald had flown to New York to give the lead speech at an event in Yonkers, N.Y. sponsored by the Council on American-Islamic Relations, or CAIR, a pro-Moslem civil rights and anti-Zionist organization. He had delivered the keynote speech at its previous meeting in San Jose, California on November 22, 2012, where his impassioned depiction of the American “Surveillance State” in America received a rousing ovation from the attendees. He was invited to speak at this award dinner for its east coast chapter. Poitras flew from Berlin to New York to see him. On April 19, 2013, she arranged to meet Greenwald at noon in the restaurant of the Marriott hotel where Greenwald was staying. When Greenwald arrived at the restaurant carrying a cell phone, she explained to him that the NSA could surreptitiously turn his cell phone into a microphone and use it to eavesdrop on their conversation. She told him to go back to his room to get rid of the phone. When he returned, phoneless, she took further precautions by having them change tables several times. Greenwald accepted these tactics because, as Greenwald later said, she was in charge of their “operational security.” After they finally found a secure table in the nearly empty restaurant, she showed Greenwald emails she had received from Snowden under the alias Citizen 4. Greenwald, as he recounted, made “no connection to the “long-forgotten emails” he had received from Snowden under the alias Cincinnatus. Reading the emails to Poitras, he was impressed with the “sincerity” of the anonymous correspondent. When Poitras showed Greenwald Citizen 4’s mission statement in which he said his motive was to end the US “surveillance state.” Greenwald was further impressed with the source. After all, the surveillance state Snowden described closely dovetailed with the surveillance state that Greenwald had described himself in his speech at the Council on American-Islamic Relations dinner in 2012. Of course, the close proximity of the phrasing may not have been entirely coincidental. Greenwald’s 2012 speech had been put on YouTube and widely circulated on the Internet just a few days before Snowden first wrote Greenwald on December 1, 2012. Snowden

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.