Skip to main content
Skip to content
Case File
kaggle-ho-020207House Oversight

Snowden’s post‑CIA contractor path and alleged CIA‑Swiss banker operation

Snowden’s post‑CIA contractor path and alleged CIA‑Swiss banker operation The passage mentions a former CIA employee (Snowden) applying to a private contractor (Dell SecureWorks) that supplies NSA staff, and an anecdote about a CIA operation targeting a Swiss banker. It provides some specifics (dates, companies) but lacks verifiable details, transaction data, or direct links to high‑level officials, limiting its immediate investigative utility. However, it hints at possible misuse of private contractors to bypass budget limits and a covert operation abroad, which could merit follow‑up. Key insights: Snowden resigned from the CIA in 2009 and applied to Dell SecureWorks, a contractor for NSA systems.; Private contractors allegedly allow intelligence agencies to sidestep hiring caps and budget restrictions.; Alleged CIA tactic of intoxicating a Swiss banker to facilitate his arrest for compromise purposes.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020207
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Snowden’s post‑CIA contractor path and alleged CIA‑Swiss banker operation The passage mentions a former CIA employee (Snowden) applying to a private contractor (Dell SecureWorks) that supplies NSA staff, and an anecdote about a CIA operation targeting a Swiss banker. It provides some specifics (dates, companies) but lacks verifiable details, transaction data, or direct links to high‑level officials, limiting its immediate investigative utility. However, it hints at possible misuse of private contractors to bypass budget limits and a covert operation abroad, which could merit follow‑up. Key insights: Snowden resigned from the CIA in 2009 and applied to Dell SecureWorks, a contractor for NSA systems.; Private contractors allegedly allow intelligence agencies to sidestep hiring caps and budget restrictions.; Alleged CIA tactic of intoxicating a Swiss banker to facilitate his arrest for compromise purposes.

Persons Referenced (1)

Tags

kagglehouse-oversightmedium-importancecontractorsciansadell-secureworksintelligence-outsourcing

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
35 CHAPTER FIVE Contractor “Private contractors don’t clear employees. The government does.”-- Admiral Michael McConnell, Vice Chairman of Booz Allen Hamilton Snowden, age 26, returned from Europe and moved into his mother’s condo. He was not only unemployed now, having resigned the CIA without qualifying for any benefits, but his financial state had been hurt by the huge losses he had suffered playing the options market in Geneva. His vision of himself as a secret agent, the unstoppable “Wolfking Awesomefox” may have also suffered. According to the narrative he later supplied to the Guardian, he had become deeply concerned about the immoral way in which the CIA conducted its intelligence operations in Switzerland. "Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world. I realized that I was part of something that was doing far more harm than good," Snowden told the Guardian. By way of example, he said he learned that the CIA had gotten a Swiss banker drunk enough arrested to be arrested when he drove, so the CIA could compromise him. Snowden, who did not drink himself, was appalled at this ploy. Despite his growing antagonism towards the US government, he had not given up on, if not becoming a secret agent, working in the netherworld of secret intelligence. Although Snowden’s career had abruptly ended at the CIA, there still was a backdoor through which he could re-enter the spy world. It was private corporations that hired civilian technicians to work for spy agencies as independent contractors. By 2009, The CIA, NSA and other US intelligence services had outsourced much of the job of maintaining and upgrading their computer systems to these private companies. They supplied the NSA with most of its system administrators and other information technology workers. This arrangement allowed the NSA to effectively bypass budget limits and other restrictions limiting how many NSA technicians it could recruit. Instead, of putting these workers on its own payroll, they nominally worked for, and received their paychecks from, private employers. In fact, many of these outside contractors worked full-time for the NSA. Snowden applied in April 2009 to one of these private companies, Dell SecureWorks. It was a subsidiary of the Dell computer company. To diverse out of manufacturing computers, Dell had recently gone into the business of managing government computer systems for the NSA and other intelligence services. As a leading specialist in the field of corporate cyber security, Dell had no problem obtaining sizable contracts for from the NSA’s Technology Directorate. In 2008, the NSA had in effect outsourced to Dell the task of re-organizing its back-up systems at its regional bases. Now Dell had to find thousands of independent contractors to work at these bases In 2009, when Snowden applied, Dell was seeking to fill positions at the NSA’s regional base in

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.