Skip to main content
Skip to content
Case File
d-28373House OversightOther

Snowden allegedly used Booz Allen role to access and steal allied intelligence documents via ‘Priv Ac’ clearance

The passage suggests a concrete method (privileged access) Snow­den used to obtain classified material from foreign partners (UK, Israel, Canada, Australia, New Zealand). It names specific agencies an Snowden claimed a special clearance level called “Priv Ac” at Booz Allen allowed him to request fore He alleges he copied a GCHQ file on a lawful Pakistani telecom‑router tapping operation. He states

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #019766
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The passage suggests a concrete method (privileged access) Snow­den used to obtain classified material from foreign partners (UK, Israel, Canada, Australia, New Zealand). It names specific agencies an Snowden claimed a special clearance level called “Priv Ac” at Booz Allen allowed him to request fore He alleges he copied a GCHQ file on a lawful Pakistani telecom‑router tapping operation. He states

Tags

whistleblowerprivileged-accessprivileged-access-abusebooz-allen-hamiltonforeign-intelligencecrossalliance-data-sharingdata-theftforeign-intelligence-breachlegal-exposuremoderate-importancehouse-oversightnsagchq

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
278 | HOW AMERICA LOST ITS SECRETS Snowden wanted more than just NSA secrets. He used his new position and widened access at Booz Allen to go after secret docu- ments from the intelligence services of Britain, Australia, New Zealand, and Israel. He revealed this operation only after receiving sanctuary in Russia. He told an interviewer that by moving to his new Booz Allen job as an infrastructure analyst, he gained the abil- ity to pry secrets out of the allies of the NSA. “I had a special level of clearance, called ‘Priv Ac” he said. This “priv ac” status did not allow him to bypass the password protection at sealed-off compart- ments at the NSA, but it did allow him to request files from foreign services cooperating with U.S. intelligence. By way of example, he described one file from the British GCHQ cipher service that he copied, stole, and provided to other parties. It exposed a legally authorized British operation to collect electronic data on terrorist matters in Pakistan by tapping into Cisco rout- ers used by telecom companies in Asia. This GCHQ operation, as Snowden knew, violated neither British nor American law. He told a BBC interviewer in regard to that file, “What’s scariest is not what © the government is doing that’s unlawful, but what they’re doing © that is completely lawful.” So his criteria for taking such documents were not their illegality. In his five weeks at this Booz Allen job, he also used this same newly acquired “priv ac” at the NSA to steal files from the Israeli, Canadian, and Australian intelligence services. Jumping from one outside contracting firm to another for the purpose of penetrating other Western intelligence services is not the conventional mission of a whistle-blower. In the parlance of CIA counterintelligence, the actions of an employee of an intelligence service who changes his jobs solely to steal the more valuable secrets of this service is called an “expanding penetration.” It is not possible to believe that Snowden did not know the immense damage that the highly sensitive documents he was taking from the NSA and its allies could cause. His choice to switch jobs did not come out of the blue. It was not based on serendipitously discovering the documents after he began working at Booz Allen. As he told Lana Lam, he knew in advance that by switching to the job at Booz Allen, he would gain the oppor- tunity to take the lists of NSA sources. He knew that the NSA’s | | Epst_9780451494566_2p_all_r.indd 278 ® 9/30/16 8:13AM | |

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.