Skip to main content
Skip to content

Duplicate Document

This document appears to be a copy. The original version is:

Snowden’s 2012 NSA theft linked to post‑9/11 “stove‑piping” network integration
Case File
kaggle-ho-020219House Oversight

Snowden’s 2012 NSA theft linked to post‑9/11 “stove‑piping” network integration

Snowden’s 2012 NSA theft linked to post‑9/11 “stove‑piping” network integration The passage outlines how NSA’s post‑9/11 network integration created a shared NSANet that Snowden accessed in 2012, suggesting a systemic security lapse that enabled the theft of documents spanning the NSA, CIA, and DoD. While it does not name new actors or specific transactions, it provides a concrete technical detail (the merging of stovepiped networks) and a timeline that could be pursued for internal oversight investigations. The claim is moderately novel and sensitive, implicating high‑level intelligence infrastructure, but lacks direct evidence of wrongdoing by senior officials. Key insights: Post‑9/11 removal of NSA stovepiping created a shared NSANet with CIA and DoD access.; Snowden accessed this integrated network while employed at Dell in 2012.; The network’s “reading rooms” allowed system admins to copy data without detection.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020219
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Snowden’s 2012 NSA theft linked to post‑9/11 “stove‑piping” network integration The passage outlines how NSA’s post‑9/11 network integration created a shared NSANet that Snowden accessed in 2012, suggesting a systemic security lapse that enabled the theft of documents spanning the NSA, CIA, and DoD. While it does not name new actors or specific transactions, it provides a concrete technical detail (the merging of stovepiped networks) and a timeline that could be pursued for internal oversight investigations. The claim is moderately novel and sensitive, implicating high‑level intelligence infrastructure, but lacks direct evidence of wrongdoing by senior officials. Key insights: Post‑9/11 removal of NSA stovepiping created a shared NSANet with CIA and DoD access.; Snowden accessed this integrated network while employed at Dell in 2012.; The network’s “reading rooms” allowed system admins to copy data without detection.

Tags

kagglehouse-oversightmedium-importancensaintelligence-oversightnetwork-securitysnowdenpost‑9/11-reforms

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
67 This 2012 theft was made even more serious by the interconnection of NSA computers with those of other intelligence agencies. It will be recalled that prior to the 9/11 attack in 2001, NSA data had been protected by “stove-piping” that separated NSA’ computers from networks used by other intelligence services. After the 9/11 Commission concluded that part of the reason why US intelligence agencies were unable to “connect the dots” in advance of the attack was because this “stove-piping, the NSA stripped away a large part of its “stove-piping.” One result was that the NSANet, which Snowden had access to at Dell in 2012, became a shared network. It had common access points. General Hayden described them to me as the equivalent of “reading rooms” in a library. They served as a means for NSA workers to exchange ideas about the problems they were encountering on various projects for the intelligence community. In maintaining them, system administrators, or “system admins,” like Snowden acted as the “librarians.” If a stem administrator copied data from this network, no one knew. For Snowden, the NSANet, which included CIA and Defense Department documents, provided a rich hunting ground for Snowden in the fall and winter of 2012. Many of the documents he took off the NSANet revealed not only operations of the NSA but also those of the CIA and Pentagon. By taking them he had come to a Rubicon from which there would be no return. He later explained in an email to Vanity Fair from Moscow, “I crossed that line.” As far as is known, he was not sharing them with any other party prior to May 2013. He was not even yet in contact with Poitras, Greenwald or any other journalists. Presumably, Snowden was collecting them drives, despite the risks that possessing such a collection of secrets might entail, for some future use. But why would Snowden jeopardize his career and, if caught, his freedom, by undertaking this illicit enterprise? He may have had by now strong ideological objections the NSA’s global surveillance. As he said later in Moscow, “we’re subverting our security standards for the sake of surveillance.” But ordinarily even ideologically-opposed employees don’t steal state secrets and risk imprisonment. If they are disgruntled, they seek employment elsewhere. Certainly, Snowden, with his three years experience working for Dell, would have little problem finding a job as an IT worker in the booming civilian sector of computer technology. Instead of resigning, he sought to widen his access to NSA documents. This behavior suggests to me that he had another agenda. One possible clue to it is the first document he took; the NSA exam. The secret in that document, the answers to the questions, were a form of power to him: power to burrow deeper into the executive structure of the NSA. It would unlock the door to door to even the more powerful documents containing the NSA’s sources stored in Level 3 compartments. His later actions demonstrated that he equated the possession of such secrets with personal power. For example, after he arrived in Moscow in 2013, he bragged to James Risen of the New York Times that he had access to secrets that gave him great leverage over the NSA. He told him specifically his access to “full lists” of NSA’s agents and operation in adversary countries could, if revealed, closed down the NSA’s capabilities to gather information in them.

Related Documents (6)

House OversightUnknown

Sparse House Oversight Document Lacks Substantive Content

Sparse House Oversight Document Lacks Substantive Content The document contains only a header and no substantive information linking any influential actors, financial flows, or misconduct. It provides no actionable leads for investigation. Key insights: Document appears to be a placeholder or file identifier only; No names, dates, transactions, or allegations present

1p
House OversightNov 16, 2015

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts”

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts” The passage only provides a title and metadata for a 287‑page draft about the Snowden affair. It contains no specific names, dates, transactions, or allegations that could be pursued as an investigative lead. Consequently, it offers no actionable information and is likely already covered in public discourse. Key insights: Document appears to be a draft manuscript by Edward Jay Epstein.; Length indicated as 287 pages, suggesting extensive coverage.; Associated with a House Oversight file identifier (HOUSE_OVERSIGHT_020153).

1p
House OversightOtherNov 11, 2025

Snowden’s 2012 NSA theft linked to post‑9/11 “stove‑piping” network integration

The passage outlines how NSA’s post‑9/11 network integration created a shared NSANet that Snowden accessed in 2012, suggesting a systemic security lapse that enabled the theft of documents spanning th Post‑9/11 removal of NSA stovepiping created a shared NSANet with CIA and DoD access. Snowden accessed this integrated network while employed at Dell in 2012. The network’s “reading rooms” allowed sy

1p
House OversightApr 28, 2015

Book blurb on Alan Turing, free will, and James Tagg's bio

Book blurb on Alan Turing, free will, and James Tagg's bio The document contains no actionable investigative leads, no mention of powerful officials, financial transactions, or wrongdoing. It is a promotional text about historical topics and an entrepreneur’s background, offering no novel or controversial information. Key insights: Discusses Alan Turing’s historical contributions; Poses philosophical questions about AI and free will; Provides a brief biography of James Tagg, a tech entrepreneur

1p
House OversightUnknown

Empty House Oversight Document Lacks Substantive Content

Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.

1p
House OversightJan 5, 2018

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.