Skip to main content
Skip to content
Case File
kaggle-ho-020273House Oversight

Alleged insider assistance required for Snowden's NSA data exfiltration, based on unnamed Booz Allen source

Alleged insider assistance required for Snowden's NSA data exfiltration, based on unnamed Booz Allen source The passage offers a detailed, though unverified, scenario that Snowden needed a witting insider at the NSA to bypass physical and logical security controls. It names a former Booz Allen executive as a source and describes specific security measures (sealed ports, PKI cards) that could be investigated. However, it lacks concrete names, dates, or documentary evidence, limiting its immediate investigative utility. Key insights: Snowden would have needed a wired key‑logger network across 24 workstations, which would be hard to hide in an open‑plan office.; NSA computers have sealed ports that only system administrators can open, requiring a PKI card with magnetic stripe authentication.; A former Booz Allen executive doubts Snowden could forge a PKI card without special equipment, implying possible insider help.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020273
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Alleged insider assistance required for Snowden's NSA data exfiltration, based on unnamed Booz Allen source The passage offers a detailed, though unverified, scenario that Snowden needed a witting insider at the NSA to bypass physical and logical security controls. It names a former Booz Allen executive as a source and describes specific security measures (sealed ports, PKI cards) that could be investigated. However, it lacks concrete names, dates, or documentary evidence, limiting its immediate investigative utility. Key insights: Snowden would have needed a wired key‑logger network across 24 workstations, which would be hard to hide in an open‑plan office.; NSA computers have sealed ports that only system administrators can open, requiring a PKI card with magnetic stripe authentication.; A former Booz Allen executive doubts Snowden could forge a PKI card without special equipment, implying possible insider help.

Tags

kagglehouse-oversightmedium-importancensasnowdenbooz-allen-hamiltoninsider-threatdata-exfiltration

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
(21 possible that Snowden smuggled in a key logger in his backpack, it could not be operated wirelessly inside the Center because, like all other NSA facilities, the computers had been insulated to lock-out wireless transmission. This precaution was taken to guard against an EMP, or Electro-Magnetic Pulse, attack by an enemy. If so, the only way Snowden could intercept key strokes was to attach a cable from his key logger to each of his fellow workers’ computers. In this scenario, he would have to surreptitiously build his own wired network connecting his hidden key logger to 24 separated computers. Moreover, he would have to do this wiring in an open-plan office where he could not count on these additional wires, even if rigged one by one, not being noticed by either other analysts on the room or the geek squad of system administrators who regularly checked connections. Making the task even more risky, according to my Booz Allen source, there were closed-circuit cameras. The only way he could mitigate the risk of detection was by having someone help him build this network. There was a further security barrier he had to get by. Even after he managed to obtain all the necessary passwords from colleagues, he had to transfer the files to an external storage device. This was not a matter of simply using a thumb drive because, unlike in caper movies such as Mission Impossible, the ports on the computers at the NSA were ordinarily sealed shut. This measure was done specifically to prevent any unauthorized downloading by NSA workers. The only people at the Center who had the authorization, and the means, to open these ports and transfer data were system administrators, according to the former Booz Allen executive. System administrators needed to have this privilege to deal with glitches in the computers. So they were allowed to open up the sealed ports. But Snowden was no longer a system administrator and did not have these privileges. So again, he needed some help. He either would need to borrow another system administrator’s credential or forge his own. The credential he would need is called a public key infrastructure card with its authentication code embedded in a magnetic stripe. When I asked the former Booz Allen executive if Snowden possessed the skill set to forge such a card, he said that he strongly doubted any NSA employee would be capable of such a forgery without special equipment. He could have, however, borrowed this credential from a system administrator who was willing to help him. But just asking such a favor could “set off alarms.” The unwitting accomplice scenario had another stumbling block: time. We know from Poitras that Snowden told her in early April 2013 that he planned to deliver documents to her in six to eight weeks (which he in fact did.) But he had not yet started working for Booz Allen at the Center until that same month. It does not seem plausible (to me) that in making such a commitment he was merely counting on the kindness of strangers to fulfill it The only way he could have known for certain that he would be able to borrow a public key infrastructure card and obtain the passwords, whether by trickery or by a key router, before he had begun working at the Center was that he already knew someone at the Center who would help him. But such a contact leads to a witting accomplice scenario. The Witting Accomplice Possibility

Related Documents (6)

House OversightJan 5, 2018

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details

1p
House OversightNov 16, 2015

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts”

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts” The passage only provides a title and metadata for a 287‑page draft about the Snowden affair. It contains no specific names, dates, transactions, or allegations that could be pursued as an investigative lead. Consequently, it offers no actionable information and is likely already covered in public discourse. Key insights: Document appears to be a draft manuscript by Edward Jay Epstein.; Length indicated as 287 pages, suggesting extensive coverage.; Associated with a House Oversight file identifier (HOUSE_OVERSIGHT_020153).

1p
House OversightUnknown

Empty House Oversight Document Lacks Substantive Content

Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.

1p
House OversightFeb 26, 2019

Cowen CBD Market Outlook Report – No Evident Investigative Leads

Cowen CBD Market Outlook Report – No Evident Investigative Leads The document is a commercial research note on CBD market size and analyst ratings, containing no references to political figures, financial misconduct, or intelligence activities. It offers no actionable investigative leads. Key insights: Provides market size estimate for U.S. CBD ($16 bn by 2025).; Cites a proprietary survey showing 7% adult usage.; Mentions analyst ratings for WEED, TLRY, TPB.

1p
House OversightFinancial RecordNov 11, 2025

Cowen Equity Research Report on U.S. CBD Market Opportunities (Feb 2019)

The document is a commercial equity research briefing that outlines market size estimates, consumer survey data, and company‑level pricing for CBD products. It contains no specific allegations, undisc Proprietary survey of ~2,500 U.S. adults shows ~7% using CBD as a supplement. Cowen projects a $16 bn U.S. CBD market by 2025, with nutraceuticals, topicals, and beverages as maj Lists of public and

130p
House OversightUnknown

Unresolved Fate of Snowden's 'Keys to the Kingdom' NSA Documents

Unresolved Fate of Snowden's 'Keys to the Kingdom' NSA Documents The passage highlights a massive, still-missing cache of top‑secret NSA documents allegedly taken by Edward Snowden, suggesting a significant intelligence gap and potential vulnerability. While it does not provide concrete new evidence of where the files are, it points to a lack of definitive accounting by the NSA and congressional committees, which is a actionable lead for further inquiry. The claim involves high‑level agencies and could spark public outcry if the documents are found to be compromised, but the novelty is moderate as the general issue of missing Snowden files is already known. Key insights: Snowden allegedly removed over one million documents, including 'keys to the kingdom' manuals.; NSA could not definitively quantify the number of documents taken.; House and Senate intelligence committees received only limited briefings on the breach.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.