Edward Snowden NSA Revelations

๐Ÿ”’ Semi-protected
DiscussionHistory

Overview

In June 2013, Edward Snowden, a 29-year-old former CIA employee and NSA contractor working for Booz Allen Hamilton, leaked thousands of classified documents to journalists Glenn Greenwald, Laura Poitras, and Barton Gellman. The documents revealed that the U.S. National Security Agency (NSA) โ€” along with allied intelligence agencies โ€” was conducting mass surveillance of global communications on a scale that shocked the world. The revelations confirmed what many privacy advocates and conspiracy theorists had long suspected: the U.S. government was collecting the communications data of millions of ordinary citizens, both American and foreign, with minimal judicial oversight.

Key Programs Revealed

PRISM

One of the first and most significant revelations was PRISM, a program through which the NSA collected internet communications from major technology companies including Microsoft, Google, Yahoo, Facebook, Apple, and others. The program operated under Section 702 of the Foreign Intelligence Surveillance Act (FISA) and allowed the NSA to obtain stored data โ€” including emails, chat logs, photographs, and documents โ€” directly from company servers. The tech companies denied providing "direct access" to their servers but acknowledged complying with lawful government requests.

Bulk Telephony Metadata Collection

Documents revealed that the NSA was collecting metadata (phone numbers, call duration, time stamps, but not content) on virtually all domestic telephone calls in the United States under a secret interpretation of Section 215 of the USA PATRIOT Act. The Foreign Intelligence Surveillance Court (FISC) had been issuing secret orders compelling telecommunications companies like Verizon to hand over these records in bulk on an ongoing basis.

XKeyscore

A search system that allowed NSA analysts to search through vast databases of emails, online chats, and browsing histories of targets worldwide with no prior authorization required. Snowden described it as a system that could intercept "nearly everything a typical user does on the internet."

Upstream Collection

The NSA was tapping directly into the fiber-optic cables that carry internet traffic between major data centers, both within the United States and internationally. Programs with code names like BLARNEY, FAIRVIEW, OAKSTAR, and STORMBREW collected data as it transited through major telecommunications switching points.

MUSCULAR

In partnership with Britain's GCHQ, the NSA was secretly tapping into the private fiber-optic links connecting Yahoo and Google data centers worldwide โ€” outside the United States and without these companies' knowledge or the oversight of the FISA court.

Five Eyes Cooperation

Documents confirmed the extensive intelligence-sharing alliance among the "Five Eyes" nations โ€” the United States, United Kingdom, Canada, Australia, and New Zealand. Each nation conducted surveillance that others could not legally perform on their own citizens, then shared the intelligence, creating a system of mutual surveillance that circumvented domestic legal restrictions.

Edward Snowden's Journey

Snowden began copying classified documents in April 2013 while working at an NSA facility in Hawaii. He flew to Hong Kong on May 20, 2013, where he met with Greenwald and Poitras. The first stories were published in The Guardian and The Washington Post on June 5-6, 2013.

On June 21, the U.S. Department of Justice charged Snowden with two counts of violating the Espionage Act and theft of government property. He flew from Hong Kong to Moscow on June 23, where he was stranded after the U.S. revoked his passport. He was granted temporary asylum by Russia and has lived there since, receiving permanent residency in 2020 and Russian citizenship in 2022.

Impact and Reforms

The Snowden revelations had far-reaching consequences:

  • USA FREEDOM Act (2015): Congress passed legislation ending the bulk collection of domestic telephone metadata, replacing it with a system where the NSA must request specific records from telecommunications companies through the FISC
  • Presidential Policy Directive 28 (2014): President Obama issued guidelines imposing some limits on surveillance of foreign leaders and non-U.S. persons
  • Technology industry changes: Major tech companies implemented end-to-end encryption, published transparency reports, and challenged government surveillance orders more aggressively
  • International fallout: Revelations that the NSA had tapped German Chancellor Angela Merkel's phone and monitored communications of other allied leaders caused significant diplomatic damage
  • Public awareness: Global awareness of government surveillance capabilities increased dramatically, influencing debates about privacy, encryption, and the balance between security and civil liberties

Debate Over Snowden's Actions

The public and political establishment remain deeply divided on Snowden:

Supporters argue he is a whistleblower who exposed unconstitutional surveillance at great personal cost, enabling democratic debate about programs that operated in secret. Supporters include the ACLU, numerous civil liberties organizations, and former NSA officials like William Binney and Thomas Drake.

Critics argue he is a traitor who damaged national security by revealing lawful intelligence programs to adversaries. Critics include most of the U.S. intelligence community, both the Obama and Trump administrations, and congressional leaders from both parties who argue the proper channel was the Intelligence Community Inspector General.

Legacy

The Snowden revelations represent the largest leak of classified documents in NSA history. They confirmed โ€” with documentary evidence โ€” that the scale of government surveillance far exceeded what had been publicly acknowledged or legally authorized through transparent democratic processes. The revelations fundamentally altered the global conversation about digital privacy, government transparency, and the limits of intelligence gathering in democratic societies.

Timeline of Events

โ€”
  1. 2001-10-26
    USA PATRIOT Act signed

    The PATRIOT Act is signed into law, providing the legal framework under which many NSA surveillance programs would later operate.

  2. 2006-05-11
    USA Today reveals NSA call database

    USA Today reports that the NSA has been secretly collecting the phone records of tens of millions of Americans โ€” a story that foreshadows Snowdens revelations.

  3. 2013-05-20
    Snowden arrives in Hong Kong

    Edward Snowden travels from Hawaii to Hong Kong carrying classified NSA documents on encrypted drives.

  4. 2013-06-05
    First Snowden story published

    The Guardian publishes a secret FISA court order showing the NSA collecting phone records of millions of Verizon customers.

  5. 2013-06-06
    PRISM revealed

    The Guardian and Washington Post reveal the PRISM program, showing NSA collection of internet data from major tech companies.

  6. 2013-06-09
    Snowden identifies himself

    Snowden reveals his identity in a video interview from his Hong Kong hotel room, explaining his motivations.

  7. 2013-06-21
    Espionage Act charges filed

    The U.S. Department of Justice charges Snowden with two counts of violating the Espionage Act and theft of government property.

  8. 2013-06-23
    Snowden flies to Moscow

    Snowden departs Hong Kong for Moscow, where he is stranded after the U.S. revokes his passport. He will remain in Russia.

  9. 2013-10-24
    Merkel phone tapping revealed

    Documents reveal the NSA monitored German Chancellor Angela Merkels mobile phone, causing a diplomatic crisis.

  10. 2015-06-02
    USA FREEDOM Act signed

    President Obama signs the USA FREEDOM Act, ending bulk telephone metadata collection and implementing surveillance reforms.

Categories

Sources & References

  1. bookNo Place to Hide โ€” Glenn Greenwald (2014)
  2. videoCitizenfour โ€” Laura Poitras documentary (2014)

Truth Meter

0 votes
Credible Disputed