Skip to main content
Skip to content
Case File
kaggle-ho-020329House Oversight

Document alleges Russian SVR accessed US personnel clearance data to recruit NSA insiders via anti‑surveillance activist networks

Document alleges Russian SVR accessed US personnel clearance data to recruit NSA insiders via anti‑surveillance activist networks The passage outlines a plausible method by which the Russian intelligence service could have harvested US clearance records and targeted NSA personnel through activist circles. It names specific agencies (NSA, SVR), programs (TOR, WikiLeaks), and individuals (Laura Poitras, Edward Snowden), offering concrete investigative angles such as examining breaches of USIS/Office of Personnel Management databases since 2011 and any anomalous contacts between NSA contractors and known anti‑surveillance figures. While unverified, the details provide actionable leads (e.g., data breach timelines, candidate filtering criteria) and involve high‑level intelligence bodies, making it a strong but not yet definitive lead. Key insights: SVR may have obtained US personnel clearance forms (SF‑86) via breaches of USIS and OPM systems dating back to 2011.; The agency could filter candidates by education, employment, foreign contacts, and activist involvement.; Targeted groups include TOR developers, WikiLeaks affiliates, Crypto Party organizers, and other anti‑surveillance activists.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020329
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Document alleges Russian SVR accessed US personnel clearance data to recruit NSA insiders via anti‑surveillance activist networks The passage outlines a plausible method by which the Russian intelligence service could have harvested US clearance records and targeted NSA personnel through activist circles. It names specific agencies (NSA, SVR), programs (TOR, WikiLeaks), and individuals (Laura Poitras, Edward Snowden), offering concrete investigative angles such as examining breaches of USIS/Office of Personnel Management databases since 2011 and any anomalous contacts between NSA contractors and known anti‑surveillance figures. While unverified, the details provide actionable leads (e.g., data breach timelines, candidate filtering criteria) and involve high‑level intelligence bodies, making it a strong but not yet definitive lead. Key insights: SVR may have obtained US personnel clearance forms (SF‑86) via breaches of USIS and OPM systems dating back to 2011.; The agency could filter candidates by education, employment, foreign contacts, and activist involvement.; Targeted groups include TOR developers, WikiLeaks affiliates, Crypto Party organizers, and other anti‑surveillance activists.

Persons Referenced (1)

Tags

kagglehouse-oversighthigh-importancerussian-intelligencensasvrpersonnel-data-breachinsider-recruitment

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
177 that could be hacked into from the outside. It will be recalled that the NSA threat officer had cited these failures in his 1996 report on NSA vulnerability. He also said that efforts of the Russian Intelligence Services to use false flag recruitments provided the KGB with “a learning experience.” The KGB had learned that hacking by itself could not breech the NSA’s protective stove-piping. He predicted that its next logical move would be to “target insider computer personnel.” These false flag recruitment would aim at, in his view, system administrators, computer engineers and cyber service workers who were either already inside the NSA or who had a secrecy clearance that would facilitate getting jobs with NSA contractors. Even with an appropriate false flag, the task of finding such a “Prometheus” was daunting. There were some five thousand civilian technicians at the NSA of all political stripes. Finding the one who met its espionage requisites was the equivalent of seeking the sharpest needle in the proverbial giant haystack. For espionage purposes, however, recruiters did not have to find the sharpest needle, or any particular one; they just needed to find any needle in a position to cooperate. They could hone a willing recruit over time to do the job at hand. The size of the haystack could also be reduced to more manageable proportions by hacking into the personnel records of the intelligence workers seeking to renew their security clearance. The Internet provided the SVR with just this opportunity. As discussed in the previous chapter, holes in the security of the computer networks of the US Office of the Office of Personal Management, USIS and the websites of the companies supplying the NSA with independent contractors had made the background checks on American intelligence workers available to the Chinese and presumably other adversary intelligence service hackers since 2011. If the SVR had access to this personnel data, the research for a candidate would be greatly facilitated. From the 127-page standard form 86 each applicant for a security clearance submits, the SVR could filter out intelligence workers employed by the NSA by their educational background, employment history, affiliations and foreign contacts. It could then search this data for candidates with a possible hacktavist profile, This data could next be crossed with a list of individuals SVR in contact with high-profile activists who are part of the anti-surveillance movements. This would include core participants in the TOR project, Wikileaks, Noisebridge, Crypto Parties, and the Freedom of the Press Foundation and the Electronic Freedom Foundation. (Snowden, for example, had been in touch with members all these groups in 2012 and 2013.) The SVR would have little problem monitoring even encrypted communications with leading figures in the Anti-surveillance world. These activists, despite secrecy rituals such as putting their cell phones in refrigerators, remain visible to a sophisticated intelligence service such as the SVR. Consider, for example, the defensive tactics of Laura Poitras, including PGP encryption, TOR software, and air-gapped computers which are computers that have never been connected to the Internet. She also famously changes her tables at restaurants to evade surveillance. With all these precautions, she did not keep secrets about her sources entirely to herself. Snowden, at a

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.