>>9212171 (/pb) …………… Q4257 "Review of the Unauthorized Disclosures of Former National Security Agency Contractor EDWARD SNOWDEN"
>>9225120 (/pb) ……. cont'd
>>9223764 (/pb) …….. cont'd
My guess is that the NSA Hawaii 'server crash' event was Snowden's 'first initiation' with the C_A, the C_A needed to confirm that Snowden was 'on team' by conducting such an operation against the NSA's database, as a 'test' of his loyalty and fidelity to his clown handler(s).
This was likely the lead in for Snowden's subsequent mass theft of the NSA's 1.5 million documents.
This declassified document also shows that Snowden didn't just steal 1.5 million documents almost all of which were related to military intelligence for America's operations around the world (which as previously noted was to benefit foreign adversarial government intelligence agencies), but as systems administrator he also spied on all NSA employee's personal network drives, likely a drive with letter Y: or Z: or X:, which are typical labels for an employee's 'private' portion on an organization's network shared drive, files that employees might have that are not for other employee's view, but their own (and the org's systems security / admin, which only the tippy top managers/executives/partners at any org would have access to.
He downloaded many such docs without those employee's permission. SNOWDEN SPIED ON HIS FELLOW EMPLOYEES WITHOUT THEIR KNOWLEDGE.
So much for the 'darling' persona from Fakewood and the Lamestream media.
Snowden got a few similarly morally unscrupulous colleagues to help him do this, getting their security credentials to access what he could not. Apparently they were terminated by the NSA.
Snowden also illegally access the personal network drives of those responsible for hiring positions at the NSA, including those to which Snowden applied.
Imagine someone applying for a promotion at your company, one in which you are also applying for, and that someone illegally spied on the hiring manager's documents, to gain an advantage over your application not by merit but by deception.
Snowden clearly revealed himself as unethical and criminal.
And, after being asked by another systems administrator why there was so much data on his personal network drive, Snowden falsely replied they were 'downloaded systems patches for NSA networks.'
Snowden was quite clearly conducting COUNTER-INTELLIGENCE ACTIVITIES AT THE NSA ON BEHALF OF A THIRD PARTY, well before that March 2013 congressional testimony of Clapper that supposedly served as Snowden's 'breaking point'.