Skip to main content
Skip to content
Case File
kaggle-ho-020330House Oversight

Document alleges NSA leaker Snowden’s contacts and Russian TOR‑targeting efforts

Document alleges NSA leaker Snowden’s contacts and Russian TOR‑targeting efforts The passage provides several specific names (Edward Snowden, Laura Poitras, Micah Lee, Jacob Appelbaum, Ben Wizner, Barton Gellman, David Miranda, Runa Sandvik) and describes alleged operational security lapses that could be investigated for potential leaks of classified information. It also references a 2009 NSA analysis of Russian cyber capabilities and claims of Russian cash prizes for breaking TOR. While the details are vague and lack concrete transaction or timeline data, the connections between high‑profile journalists, whistleblowers, and foreign cyber‑espionage programs merit follow‑up, especially regarding possible intelligence sharing or compromise. Key insights: Snowden allegedly shared his identity and location with multiple TOR community members.; Laura Poitras reportedly disclosed Snowden’s source to at least five journalists and activists.; David Miranda was told detailed source information by Glenn Greenwald.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020330
Pages
1
Persons
2
Integrity
No Hash Available

Summary

Document alleges NSA leaker Snowden’s contacts and Russian TOR‑targeting efforts The passage provides several specific names (Edward Snowden, Laura Poitras, Micah Lee, Jacob Appelbaum, Ben Wizner, Barton Gellman, David Miranda, Runa Sandvik) and describes alleged operational security lapses that could be investigated for potential leaks of classified information. It also references a 2009 NSA analysis of Russian cyber capabilities and claims of Russian cash prizes for breaking TOR. While the details are vague and lack concrete transaction or timeline data, the connections between high‑profile journalists, whistleblowers, and foreign cyber‑espionage programs merit follow‑up, especially regarding possible intelligence sharing or compromise. Key insights: Snowden allegedly shared his identity and location with multiple TOR community members.; Laura Poitras reportedly disclosed Snowden’s source to at least five journalists and activists.; David Miranda was told detailed source information by Glenn Greenwald.

Persons Referenced (2)

Tags

kagglehouse-oversightmedium-importancewhistleblowernsatorrussian-cyber-espionagejournalistic-sources

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
178 time when he was stealing NSA secrets in February 2013, went to great lengths to impress on Poitras the need for operational security about his contacts with her, but that injunction did not prevent her from telling at least five people about her source, including Micah Lee, the Berkeley- based technology operative for the Freedom of the Press Foundation; Jacob Appelbaum, the TOR proselytizer; Ben Wizner, the ACLU lawyer; Barton Gellman; and Glenn Greenwald. “It is not me that can’t keep a secret, “Abraham Lincoln joked. “It’s the people I tell it that can’t.” In the same vein, Poitras could hardly rely on these five confidants not to tell her (and Snowden’s) to others. Hours after he was told, Greenwald told his lover David Miranda about the source in great detail. He even asked him to evaluate the source’s bona fides for him. Gellman, for his part, raised the matter with a former high official at the Justice Department. Moreover, as the intelligence world knew, Poitras was herself a veritable lightning rod for attracting ex-NSA employees who objected to some of its surveillance programs. In 2012, her filming of NSA insiders, including Binney and Drake, would make her communications of interest to any intelligence services that wanted to keep tabs on possible NSA dissidents. Nor was Snowden himself overly discreet. It will be recalled that he had also advertised his TOR-sponsored crypto party activities over the Internet, and supplied Runa Sandvik, who worked with Appelbaum, his true name and address in Hawaii. Sandvik had no reason not to share the identity of her co-presenter with others in the TOR movement. Snowden also had his girl friend make a video of his presentation, as will be recalled. He also bragged about operating the largest TOR outlets in Hawaii. Even if his TOR software provided him a measure of anonymity, it was not beyond the ability of the world-class cyber services to crack it. Under Putin, Russia had built one of the leading cyber espionage services in the world. According to a 2009 NSA analysis of Russian capabilities, which was obtained by the New York Times in 2013, Russia’s highly-sophisticated tools for cyber-espionage were superior to those of China or any other adversary nation. For example, investigators from FireEye, a well-regarded Silicon Valley security firm, found that in 2007, Russian hackers had developed a highly- sophisticated virus that could bypass the security measures of the servers of both the US government and its private contractors. According to one computer security expert, the virus had made protected Internet websites “sitting ducks” for these Russian sophisticated hackers. The cryptographer Bruce Schneier, a leading specialist in computer security, explained, “It is next to impossible to maintain privacy and anonymity against a well-funded government adversary.” Nor has the Russian cyber service has made a secret out of the fact that it targets TOR software. It even offered a cash prize to anyone in the hacking community who could break TOR. Prior to 2013, according to cyber security experts, it spent over a decade building cyber tools aimed at unraveling the TOR networks used by hacktavists, criminal enterprises, political dissidents and rival intelligence operatives. To this end, it reportedly attempted to map out computers that served as major TOR exit nodes (such as the one Snowden operated in 2012 near a NSA regional base in Hawaii.) It also reportedly attached the equivalent of “electronic ink” to

Related Documents (6)

House OversightUnknown

Possible post‑Snowden leak of NSA document on German Chancellor Merkel to Der Spiegel

Possible post‑Snowden leak of NSA document on German Chancellor Merkel to Der Spiegel The passage suggests that a sensitive NSA file naming Chancellor Angela Merkel as a target (not an asset) appeared in German media weeks after Snowden’s Hong Kong hand‑over, implying an unknown party accessed classified material after Snowden fled to Russia. This raises a concrete lead – identify who supplied the Merkel file to Der Spiegel and when – and involves high‑level officials (the German chancellor, NSA, and possibly Russian intermediaries). The claim is not widely reported, offers specific names and timelines, and could trigger a major diplomatic and intelligence investigation if verified. Key insights: Der Spiegel published a story naming Merkel as an NSA target, citing a document not found in the 58,000 files Snowden gave journalists in Hong Kong.; Journalist Laura Poitras texted Snowden for background after the story broke, indicating she lacked the document beforehand.; James Bamford, reviewing the Hong Kong dump, found no Merkel‑related file, supporting the claim of a later leak.

1p
House OversightUnknown

KGB debriefed ex‑NSA employee Ronald Pelton in Vienna, receiving cash and suggesting a model for future Russian extraction of Snowden’s knowledge

KGB debriefed ex‑NSA employee Ronald Pelton in Vienna, receiving cash and suggesting a model for future Russian extraction of Snowden’s knowledge The passage provides specific details – names (Ronald Pelton, Anatoly Slavnov, Cherkashin), cash payments ($5,000 and $30,000), locations (Vienna, Soviet embassy), and a timeline – that could be pursued to verify a KGB operation against a U.S. intelligence worker. If corroborated, it would illuminate a historic Soviet espionage method and suggest a precedent for Russian interest in Edward Snowden, a highly sensitive and politically charged topic. The lead is moderately novel and points to actionable investigative steps (e.g., seeking declassified NSA/FBI files, Austrian diplomatic records, KGB archives). Key insights: Pelton, a former NSA civilian, was flown to Vienna and debriefed by KGB operatives.; He received $5,000 cash and a plane ticket, then an additional $30,000 after a 15‑day debrief.; KGB electronic communications expert Anatoly Slavnov supervised the debriefings.

1p
House OversightUnknown

Former NSA employee Ronald Pelton allegedly aided a joint NSA‑CIA‑Navy cable‑tap operation and received $30,000 from the KGB

Former NSA employee Ronald Pelton allegedly aided a joint NSA‑CIA‑Navy cable‑tap operation and received $30,000 from the KGB The passage provides a concrete claim that a former NSA contractor (Ronald Pelton) participated in a covert undersea cable‑tap operation with U.S. agencies and was paid by the KGB, linking intelligence services of two superpowers and suggesting a financial flow. It names specific individuals, agencies, dates, and amounts, offering actionable leads for verification, but the details are uncorroborated and the overall claim is not novel enough to be a blockbuster. Key insights: Pelton debriefed for 15 days about "Project A," a joint NSA‑CIA‑Navy operation tapping Soviet undersea cables in the Sea of Okhotsk.; Pelton allegedly received $30,000 from the KGB for his cooperation.; The operation supposedly allowed the KGB to feed false information to the NSA via the compromised tap.

1p
House OversightUnknown

Citations of alleged deep‑state ties and historic espionage recruitments in a House oversight document

Citations of alleged deep‑state ties and historic espionage recruitments in a House oversight document The passage merely repeats previously published quotations about Cold‑War espionage (Ames, Hanssen, Pelton) and a generic “deep state” claim. It offers no new names, dates, transactions, or actionable leads beyond well‑known historical facts, limiting investigative value. However, it does reference a former CIA officer (Victor Cherkashin) and a former NSA employee (Pelton), which could be marginally useful for contextual background, placing it in the low‑to‑moderate range. Key insights: Quotes claim existence of a “deep state” from a Nation article.; Reference to Victor Cherkashin’s interview linking him to Aldrich Ames and Robert Hanssen recruitment.; Mention of former NSA employee James E. Pelton’s espionage conviction (1986).

1p
House OversightUnknown

Chinese intelligence cyber‑espionage harvests millions of U.S. government personnel files and defense contractor data

Chinese intelligence cyber‑espionage harvests millions of U.S. government personnel files and defense contractor data The passage provides concrete, though unverified, claims that China’s Ministry of State Security inserted malware into up to 700,000 U.S. computers, penetrated major tech firms, and stole 20 million federal employee records and 14 million background checks. These specifics (numbers, targets, dates) give a clear investigative trail (e.g., request OPM breach logs, examine contracts with Booz Allen, trace malware signatures). The allegations involve high‑level U.S. agencies (NSA, CIA, OPM) and a foreign power, making it moderately controversial and potentially actionable, but the claims are broadly known in the cyber‑espionage discourse, limiting novelty. Key insights: Chinese MSS allegedly inserted “zombie” programs into ~700,000 U.S. computers by 2007.; Hackers accessed contractors such as Booz Allen Hamilton, Google, Yahoo, Symantec, Adobe.; Estimated theft of 20 million federal employee files and 14 million intelligence background checks by 2015.

1p
House OversightUnknown

Document cites multiple sources linking Edward Snowden’s Moscow stay to Russian officials, lawyers, and possible covert operations

Document cites multiple sources linking Edward Snowden’s Moscow stay to Russian officials, lawyers, and possible covert operations The passage aggregates a variety of references—interviews, news articles, and alleged statements—suggesting that Snowden’s presence in Moscow involved Russian legal counsel, possible secret services cooperation, and high‑profile commentators. While it provides many names and sources, it lacks concrete transaction details or direct evidence of wrongdoing, limiting immediate investigative action but offering several leads for follow‑up. Key insights: Mentions Oliver Stone paying $1 million for a Russian lawyer’s novel about Snowden (source: Mike Fleming Jr.); Cites a “special operation” by Russian secret services with WikiLeaks (Gridasov, Yavlyansky, Gorkovskaya); References interviews with Russian figures (Kucherena, Shevardnadze, Sonkine) about Snowden’s communications

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.