Skip to main content
Skip to content
Case File
kaggle-ho-020339House Oversight

Alleged NSA tracking of Edward Snowden via lawyers' phones and Obama’s refusal to retrieve him from Hong Kong

Alleged NSA tracking of Edward Snowden via lawyers' phones and Obama’s refusal to retrieve him from Hong Kong The passage claims the NSA monitored Snowden through his lawyers’ cell phones and cites a specific Obama quote refusing to launch a rescue. If true, it reveals a covert surveillance capability and a high‑level policy decision, offering concrete leads (NSA, Obama, June 27 2013) for further verification. The claim is not publicly documented, giving it investigative value, but it lacks corroborating evidence, placing it in the strong‑lead range rather than blockbuster. Key insights: NSA allegedly used phone metadata of Snowden’s lawyers and associates to track his movements.; President Obama is quoted as saying on June 27 2013 he would not scramble jets to retrieve Snowden.; The passage suggests the U.S. lacked any practical means to capture Snowden in Hong Kong, a Chinese‑controlled city.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020339
Pages
1
Persons
1
Integrity
No Hash Available

Summary

Alleged NSA tracking of Edward Snowden via lawyers' phones and Obama’s refusal to retrieve him from Hong Kong The passage claims the NSA monitored Snowden through his lawyers’ cell phones and cites a specific Obama quote refusing to launch a rescue. If true, it reveals a covert surveillance capability and a high‑level policy decision, offering concrete leads (NSA, Obama, June 27 2013) for further verification. The claim is not publicly documented, giving it investigative value, but it lacks corroborating evidence, placing it in the strong‑lead range rather than blockbuster. Key insights: NSA allegedly used phone metadata of Snowden’s lawyers and associates to track his movements.; President Obama is quoted as saying on June 27 2013 he would not scramble jets to retrieve Snowden.; The passage suggests the U.S. lacked any practical means to capture Snowden in Hong Kong, a Chinese‑controlled city.

Persons Referenced (1)

Tags

kagglehouse-oversighthigh-importancensaedward-snowdensurveillanceobama-administrationhong-kong

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
187 The U.Ss also had the ability to track Snowden’s movements via the cell phones of his lawyers and other confederates after he surfaced. This tracking could all be done by the NSA. What the U.S. lacked was any practical means to capture a high-profile intelligence defector in a city that was part of China. By this time, US intelligence had established that Chinese and Hong Kong security services were monitoring Snowden’s every move. This left few options in the game for the U.S. “I’m not going to be scrambling jets to get a 29-year-old hacker,” President Obama said on June 27, 2013. The real prize, in any case, was not Snowden himself but the NSA’s secrets documents that he had with him in Hong Kong. When Snowden was observed entering the Russian consulate, the game was all but over. US diplomats could protest over back channels to Moscow, as they did, but, with a trove of NSA secrets at stake, there was little expectation that they stop the Russians. Two days later, the ’single point of failure,” as Snowden described himself, was on his way to Russia, where he would be subject to Moscow’s rules. When a victory is obtained in a major sports event, such as the world cup, it is celebrated with victory dances, parties and ticker-tape parades. The opposite is true in the Game of Nation. An intelligence victory involving secret documents, even if it cannot be entirely hidden, is kept veiled, as far as is possible, to increase the value of the coup. “The final move in any sophisticated intelligence game,” Angleton told me in relation to espionage intelligence coup, is “obscuring a success.” Following Angleton’s precept the Russian or Chinese intelligence services, if they had a role in acquiring the product of the self-described “single point of failure,” would work to cover their tracks in the affair even before the Aeroflot plane carrying Snowden touched down at Sheremetyevo International Airport on June 23, 2013. If any false flag operations had been used to trick, mislead, or otherwise induce Snowden to come to Hong Kong, they would be disbanded. If any safe housed had been used to quarter Snowden in his first 11 days in Hong Kong, they would be shut down. If any operatives had been used in Hawaii to guide or assist Snowden, they would be put back into the sleep mode. If any tell-tale traces had been left in chat rooms or social media, they would be systematically deleted. Even more important to the ultimate success of such a communications intelligence coup, measures would be taken to conceal the extent of the damage done by the “single point of failure” by not precipitously closing down compromised sources. Snowden might believe that the power of the information he held was so great that, if disclosed by him, all the NSA’s sources would immediately go dark in Russia and China, but Russia might not wish to provide such clarity to its adversaries. An intelligence service need not close down channels it discovers are compromised by an adversary. Instead it can elect to continue to use them and furnish through them bits of sensitive information to advance its own national interest. The real danger here was not that the NSA’s “lights” would dramatically be extinguished but that all the future messages illuminated by those lights would be less reliable sources of intelligence. The Game of Nations 1s, after all, merely a competition among adversaries to gain advantages by the surreptitious exchange of both twisted and straight information. When the NSA asserted in the summer of 2013 that over one million documents, it was recognizing the most massive failure in its 60 year history. Not only NSA secrets, but secret files from the CIA, the British GCHQ, and America’s cyber military commands, had been compromised. It was, as Sir David Omand, the head of the British GCHQ described it, a "huge, strategic setback" for the West. The genie could not be put back in the bottle as there is not a

Related Documents (5)

House OversightUnknown

General discussion of surveillance history and Snowden revelations

General discussion of surveillance history and Snowden revelations The passage provides a broad overview of surveillance practices and historical context but does not contain specific, actionable leads, new allegations, or concrete details linking powerful actors to misconduct. Key insights: Mentions Snowden's disclosures about government collection of phone and internet data.; References historical surveillance by J. Edgar Hoover's FBI on civil rights leaders.; States that surveillance programs were authorized by the President, Congress, and federal judges.

1p
House OversightOtherNov 11, 2025

Sparse references to Snowden interviews and Cold‑War defectors

The excerpt consists mainly of citation fragments and generic statements about past defections and interviews. It provides no concrete names, dates, transactions, or actionable leads linking current p Mentions Anatoly Kucherena’s interview about Snowden’s communications. References a Russian researcher (Vassili Sonkine) and author Edward Jay Epstein. Lists a series of Cold‑War American defectors a

1p
House OversightUnknown

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak

Putin allegedly authorized safe‑passage for Edward Snowden, raising questions about Russian facilitation of the NSA leak The passage suggests that President Vladimir Putin personally approved Snowden’s entry and transport in Russia, potentially explaining Aeroflot’s visa waiver and rapid extraction. If true, it links a head of state to the protection of a U.S. intelligence whistleblower, opening avenues to investigate diplomatic communications, flight‑manifest records, and any quid‑pro‑quo with Russian officials. The claim is not widely reported, offers concrete follow‑up steps (e.g., request airline logs, interview Russian consular staff, examine NSA‑Russia liaison logs), and implicates a high‑ranking leader, but lacks hard evidence, keeping it in the moderate‑to‑strong lead range. Key insights: Putin purportedly told an unnamed “agent” that Snowden would be welcome if he stopped damaging Russian‑U.S. relations.; Aeroflot allegedly waived passport/visa checks for Snowden’s flight, possibly on Putin’s orders.; Russian officials reportedly whisked Snowden from Moscow airport to a waiting car within hours of arrival.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p
House OversightUnknown

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders

Snowden’s encrypted outreach to Laura Poitras via Freedom of the Press Foundation insiders The passage details a concrete chain of encrypted communications linking Edward Snowden, through Freedom of the Press Foundation CTO Lee, to journalist Laura Poitras. It identifies specific aliases, dates, and key individuals (Glenn Greenwald, William Binney, Thomas Drake, Julian Assange) and mentions the use of PGP/TOR. While the overall narrative is already public, the specific mention of Lee’s role as a gateway and the timeline (Jan 23 2013) provide actionable leads for verifying communication logs, key exchanges, and possible undisclosed contacts within the foundation. Key insights: Snowden used alias “Anon108” to contact Lee, CTO of Freedom of the Press Foundation.; Lee supplied Poitras’ public PGP key to Snowden after confirming the alias.; Snowden later used alias “Citizen Four” on Jan 23 2013, falsely claiming senior intelligence roles.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.