Skip to main content
Skip to content
Case File
kaggle-ho-020210House Oversight

Snowden’s 2009 India trip for alleged hacking training while on Dell contract

Snowden’s 2009 India trip for alleged hacking training while on Dell contract The passage provides specific dates, locations, and a tuition payment that could be followed up to verify Snowden’s alleged attendance at a hacking school in India. It links a high‑profile whistleblower to potential pre‑NSA training, which is moderately novel and sensitive, but lacks direct evidence of wrongdoing beyond the claim of coursework. Key insights: Snowden traveled to India on September 2‑11, 2009, claiming official embassy duties.; Stayed at Koenig Inn, an annex of Koenig Solutions, and paid $2,000 for a hacking course.; Course allegedly covered tools like Spyeye and ZeuS and taught intrusion techniques.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020210
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Snowden’s 2009 India trip for alleged hacking training while on Dell contract The passage provides specific dates, locations, and a tuition payment that could be followed up to verify Snowden’s alleged attendance at a hacking school in India. It links a high‑profile whistleblower to potential pre‑NSA training, which is moderately novel and sensitive, but lacks direct evidence of wrongdoing beyond the claim of coursework. Key insights: Snowden traveled to India on September 2‑11, 2009, claiming official embassy duties.; Stayed at Koenig Inn, an annex of Koenig Solutions, and paid $2,000 for a hacking course.; Course allegedly covered tools like Spyeye and ZeuS and taught intrusion techniques.

Persons Referenced (1)

Tags

kagglehouse-oversightmedium-importanceedward-snowdendell-secureworkshacking-trainingindiansa

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
58 without anyone else realizing that it had been stolen. It intrigued him enough for him to bring it to the attention of his superiors, as he later said. Snowden saw that a rogue system administrator like himself could use his computer privileges to download and steal documents in ways that would go unnoticed. The emergence of a rogue system administrator was not that farfetched in 2009. Hacktavists such as Julian Assange had adopted the battle cry: system administrators, or “syst admins of the world unite.” Instead of asking them to “throw off their chains,” as Marx did, he asked them to send classified documents about secret government activity to the Wikileaks site. Snowden recalled in Moscow in 2014: “I actually recommended they [the NSA] move to two- man control for administrative access back in 2009.” To make his point even clearer, he added: “A whistleblower could use these things, but so could a spy.” Not without irony, Snowden himself became that rogue system administrator some three years later at Dell. In fact, he later used the vulnerability he pointed out to steal NSA documents at Dell (before moving to Booz Allen.). In September 2009, Snowden made a ten day trip to India. He later said he was on an official visit “working at the US embassy.” He was still on the Dell payroll. Hotel records show that he arrived at the Hyatt Regency hotel in New Delhi on September 2™ from Japan, and at 3:30 pm on September 3", checked into the Koenig Inn, a facility that was an annex to Koenig Solutions, a school that gave crash courses on programming and computer hacking. According to Rohit Aggarwal, the head of the school, Snowden stayed there until September 10" while taking classes with a private instructor. It cost $2,000 in tuition and fees, which Snowden prepaid from Japan with his own personal credit card. Even though Snowden later said he only took courses in “programming,” the school’s records show that during that week he took intensive courses in sophisticated hacking techniques. Although the course was entitled “ethical hacking” that was also a euphemism for teaching the techniques of illicit hacking. The course provided tutoring on hacker’s tools, such as “Spyeye” and “ZeuS,” that are used to circumvent security procedures. It also demonstrated how these hacking tools could be customized by criminals and spies to break into files, plant surveillance programs, impersonate system administrators, assume the privileges of system administrators in a network, and capture the passwords of others. On September 11", Snowden, according to hotel records, left India for Japan. While the stated purpose of the hacking training was to allow security consultants to detect intruders, it also prepared Snowden to be, if he chooses to be, an intruder in the NSA system. One problem with working as a contractor is that the standard two-year contracts are not necessarily renewed, making a contractor’s job essentially temporary employment. Nor is there much possibility for advancement for IT workers. As one contractor told me “It is a dead end job with great pay.” In the fall of 2010, Snowden’s contract in Japan with Dell SecureWorks came to anend. Dell then offered Snowden a new position in the United States. He now was assigned to work at Dell headquarters in Annapolis, Maryland. He rented a modest suburban house shaded by a Sakura cherry tree in suburb of Annapolis, Maryland. Mills

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.