Snowden contacts Julian Assange while Hong Kong intelligence tails journalist Laura Poitras
Snowden contacts Julian Assange while Hong Kong intelligence tails journalist Laura Poitras The passage hints at a direct communication between Edward Snowden and Julian Assange during Snowden's exit from Hong Kong and suggests that Hong Kong intelligence services were monitoring journalist Laura Poitras. While the Snowden‑Assange link is known, the specific timing (June 14‑15) and the claim of Hong Kong agencies’ awareness provide a moderately actionable lead for investigators to verify communications logs or surveillance records. Key insights: Snowden called Julian Assange on June 14‑15, 2013 while arranging his departure from Hong Kong.; Hong Kong intelligence services reportedly knew Poitras was in contact with Snowden and tailed her.; Poitras fled Hong Kong on June 15, 2013, citing heightened risk.
Summary
Snowden contacts Julian Assange while Hong Kong intelligence tails journalist Laura Poitras The passage hints at a direct communication between Edward Snowden and Julian Assange during Snowden's exit from Hong Kong and suggests that Hong Kong intelligence services were monitoring journalist Laura Poitras. While the Snowden‑Assange link is known, the specific timing (June 14‑15) and the claim of Hong Kong agencies’ awareness provide a moderately actionable lead for investigators to verify communications logs or surveillance records. Key insights: Snowden called Julian Assange on June 14‑15, 2013 while arranging his departure from Hong Kong.; Hong Kong intelligence services reportedly knew Poitras was in contact with Snowden and tailed her.; Poitras fled Hong Kong on June 15, 2013, citing heightened risk.
Persons Referenced (1)
Tags
Ask AI About This Document
Extracted Text (OCR)
Related Documents (6)
Cowen CBD Market Outlook Report – No Evident Investigative Leads
Cowen CBD Market Outlook Report – No Evident Investigative Leads The document is a commercial research note on CBD market size and analyst ratings, containing no references to political figures, financial misconduct, or intelligence activities. It offers no actionable investigative leads. Key insights: Provides market size estimate for U.S. CBD ($16 bn by 2025).; Cites a proprietary survey showing 7% adult usage.; Mentions analyst ratings for WEED, TLRY, TPB.
Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services
Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services The passage suggests Snowden stole a highly classified Congressional Budget Justification (the 2013 black budget) that details intelligence priorities and funding across multiple agencies. It claims the document would be valuable to adversary nations such as Russia’s SVR, implying a possible financial or strategic motive beyond whistleblowing. This provides a concrete lead (specific document, fiscal year, agencies) and ties to high‑level actors (NSA, CIA, President, Congress) and foreign intelligence services, making it a strong investigative angle, though the claim is unverified and relies on secondary commentary. Key insights: Snowden allegedly took the 2013 Congressional Budget Justification (black budget) while at Booz Allen.; The document lists funding and priorities for NSA, CIA, DIA, NRO, and other agencies.; Former CIA deputy director Michael Morell is quoted saying the SVR would pay millions for such a document.
Empty House Oversight Document Lacks Substantive Content
Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.
Speculative commentary on digital surveillance and a vague “New Caste” elite
Speculative commentary on digital surveillance and a vague “New Caste” elite The passage offers no concrete names, dates, transactions, or actionable leads. It merely reflects philosophical criticism of mass surveillance and references historical figures without linking them to specific misconduct. While it mentions the NSA and a “Pullthrough Steering Group,” no identifiable individuals or actionable details are provided, limiting investigative usefulness. Key insights: Mentions a “Pullthrough Steering Group Meeting #16” from The Intercept.; References NSA PowerPoint presentations as propaganda for totalitarian surveillance.; Uses the term “New Caste” to describe an unnamed elite controlling digital monitoring.
Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content
Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details
Chinese Hack of U.S. Personnel Records and Potential Exploitation of Sensitive Clearance Data
The passage describes a large‑scale breach of U.S. federal employee and intelligence‑worker records by Chinese hackers, including detailed personal and security‑clearance information. It suggests a se OPM breach traced to 2009, with 20 M personnel files and 14 M background checks stolen by 2015. Chinese hackers also accessed medical records from Anthem and other health‑care firms. Data includes fo
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.