Skip to main content
Skip to content
Case File
kaggle-ho-020272House Oversight

Speculative Scenarios on How Snowden Acquired Access to 24 NSA Vault Passwords

Speculative Scenarios on How Snowden Acquired Access to 24 NSA Vault Passwords The passage outlines unverified theories about Snowden obtaining passwords, mentioning possible unwitting accomplices or technical exploits. While it names a former Booz Allen executive and references NSA compartments, it lacks concrete evidence, dates, or transaction details, limiting immediate investigative action. However, it does suggest lines of inquiry—interviewing analysts, examining key‑logger usage, and reviewing access logs—that could be pursued. Key insights: Two main hypotheses: assistance from an insider or exploitation of NSA security flaws.; Mentions a former Booz Allen executive with DIA background who doubts insider cooperation.; Speculates use of a key‑logger device obtainable online to capture analyst passwords.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020272
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Speculative Scenarios on How Snowden Acquired Access to 24 NSA Vault Passwords The passage outlines unverified theories about Snowden obtaining passwords, mentioning possible unwitting accomplices or technical exploits. While it names a former Booz Allen executive and references NSA compartments, it lacks concrete evidence, dates, or transaction details, limiting immediate investigative action. However, it does suggest lines of inquiry—interviewing analysts, examining key‑logger usage, and reviewing access logs—that could be pursued. Key insights: Two main hypotheses: assistance from an insider or exploitation of NSA security flaws.; Mentions a former Booz Allen executive with DIA background who doubts insider cooperation.; Speculates use of a key‑logger device obtainable online to capture analyst passwords.

Tags

kagglehouse-oversightmedium-importancensaedward-snowdeninformation-securityinsider-threatkey-logger

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
120 sure, scenario-building differs from that of a conventional forensic investigation aimed at finding pieces of evidence that can be used to persuade a jury ina courtroom. Unlike a judicial investigation concerned with guilt and innocence, scenario-building looks building looks to develop a story that is, concurrently: intrinsically consistent, humanly plausible and symbolically memorable; and in the process, it also identifies and explores the possible holes in the case. Such scenarios must aim at constituting a limited set of alternatives that are mutually exclusive The point is to assure that any alternative that fits the relevant facts, no matter how implausible it initially may seem to be, is not neglected. One of the most vexing problems that had to be explained by these scenarios is how Snowden got the passwords to up to 24 of these vaults. He could not have obtained these passwords during his previous employment at Dell because Dell technicians did not have access to the Level 3 documents stored in these compartments. Nor, as was discussed earlier, was he given access to them when he transferred to Booz Allen because he had not completed the requisite training. Snowden had also, it will be recalled, relinquished his privileges as a system administrator when he transferred to Booz Allen, so he did not have the privilege to override password protection. In short, his new position as an infrastructure analyst did not give him the ability to enter compartments which he had not yet been read into. There are two possible ways he could have gotten these passwords: Either he had assistance from a party who had access to them or he found flaws in the NSA’s security procedures that left the supposedly-closed vaults effectively unlocked. The Unwitting Accomplice Possibility As for the first alternative, it is possible whatever assistance that Snowden received was entirely unwitting. For example, he could have simply asked other analysts at the Center who had been “read into” compartments for their passwords. But such an approach would be extremely risky for him. Ifan analyst gave him his password, and it was discovered, that analyst could lose his job. Moreover, any analyst was supposed to report any request for a password to a security officer. Nor was Snowden, who had been working at the Threat Operations Center for just a few weeks as a trainee, well known to other analysts. So asking them to break the rules was fairly risky for Snowden. “It is inconceivable to me that his co-workers would divulge their passwords to him,” a former Booz Allen executive, who had also worked at the Defense Intelligence Agency, told me. “If he was a system administrator he might trick a threat analyst into entering his password into his computer under the pretext that he needed it to deal with an urgent hardware issue.” But Snowden was not a system administrator at the Center. Snowden therefore “had no plausible reason for requesting passwords to compartment he had not been read into,” the former executive said. I asked him what the chance was of him obtaining some 24 passwords in 5 weeks. “In my opinion, near zero,” he said. I next asked him whether it was possible that Snowden could have used a device for intercepting another computer’s electronic signals, called by hackers a “key logger.” Such a device, which was obtainable over the Internet, could be used to steal passwords of the analysts who had been “read into” the compartments. My source said that while it was

Related Documents (6)

House OversightUnknown

Snowden allegedly offers Laura Poitras evidence of Obama‑signed “Presidential Policy 20” authorizing extensive NSA surveillance

Snowden allegedly offers Laura Poitras evidence of Obama‑signed “Presidential Policy 20” authorizing extensive NSA surveillance The passage suggests a specific, previously undocumented directive ("Presidential Policy 20") signed by President Obama in October 2012 that could formalize a broad cyber‑war/martial‑law framework. If true, it would provide a concrete document to pursue, linking the President directly to illegal surveillance. However, the claim is unverified, lacks corroborating details (no copy of the policy, no official reference), and the broader allegation of Snowden’s offer is already public, limiting novelty. Key insights: Snowden claims to possess a detailed 18‑page directive signed by Obama in Oct 2012.; The directive is described as a "martial law for cyber operations" called Presidential Policy 20.; Snowden offered to send encrypted documents to documentary filmmaker Laura Poitras.

1p
House OversightUnknown

Snowden’s alleged motive to acquire broader intelligence budgets and allied agency files after moving to Booz Allen

Snowden’s alleged motive to acquire broader intelligence budgets and allied agency files after moving to Booz Allen The passage suggests Snowden deliberately switched employers to obtain the 2013 Intelligence Community budget and classified allied‑agency documents, implying potential value to foreign actors. It names specific agencies (NSA, CIA, GCHQ, SVR) and a senior CIA official, offering concrete document types and a timeline, which could guide further inquiry. However, the claims are largely based on Snowden’s own statements and lack independent verification, limiting immediate investigative payoff. Key insights: Snowden moved from Dell to Booz Allen to access the FY‑2013 Congressional Budget Justification (the “black budget”).; He allegedly obtained Level‑3 source lists on Russia, China, and other countries.; He claims to have copied a British GCHQ file on lawful surveillance in Pakistan and shared it with other parties.

1p
House OversightUnknown

Snowden's employment at Dell and alleged complaints to NSA officials

Snowden's employment at Dell and alleged complaints to NSA officials The passage repeats widely reported background on Edward Snowden’s work for Dell and his grievances about US intelligence agencies. It offers no new concrete evidence, dates, or financial details, and only restates known public statements, limiting investigative usefulness and novelty. Key insights: Snowden worked for Dell on projects for NSA, CIA, and DIA.; He allegedly voiced complaints to ten NSA officials about surveillance practices.; His girlfriend, Mills, posted about their cohabitation on Instagram.

1p
House OversightUnknown

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services

Snowden’s alleged acquisition of the 2013 Black Budget and its potential value to foreign intelligence services The passage suggests Snowden stole a highly classified Congressional Budget Justification (the 2013 black budget) that details intelligence priorities and funding across multiple agencies. It claims the document would be valuable to adversary nations such as Russia’s SVR, implying a possible financial or strategic motive beyond whistleblowing. This provides a concrete lead (specific document, fiscal year, agencies) and ties to high‑level actors (NSA, CIA, President, Congress) and foreign intelligence services, making it a strong investigative angle, though the claim is unverified and relies on secondary commentary. Key insights: Snowden allegedly took the 2013 Congressional Budget Justification (black budget) while at Booz Allen.; The document lists funding and priorities for NSA, CIA, DIA, NRO, and other agencies.; Former CIA deputy director Michael Morell is quoted saying the SVR would pay millions for such a document.

1p
House OversightUnknown

Snowden’s early NSA contractor onboarding details and subterfuge at Booz Allen

Snowden’s early NSA contractor onboarding details and subterfuge at Booz Allen The passage recounts already‑public information about Edward Snowden’s application fraud, hiring by Booz Allen, and his orientation at the NSA. It offers no new actors, transactions, or undisclosed evidence, limiting investigative usefulness. While it touches on NSA procedures, the content is well‑known and provides little actionable lead. Key insights: Snowden falsified a degree claim on his Booz Allen application.; He was hired as a trainee‑analyst but never worked at the Honolulu office.; Assigned to NSA’s National Operations Threat Center at Kunia base.

1p
House OversightUnknown

NSA document count estimates in Snowden disclosures

NSA document count estimates in Snowden disclosures The passage restates widely reported figures about the number of NSA files Snowden accessed and copied, offering no new names, transactions, or actionable leads. It provides context but lacks novel or actionable investigative value. Key insights: NSA estimated 1.7 million documents were accessed during Snowden's tenure at Booz Allen.; Approximately 1.3 million of those were copied and moved.; Snowden also copied files while working at Dell in 2012.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.