Overview
In June 2013, Edward Snowden, a 29-year-old former CIA employee and NSA contractor working for Booz Allen Hamilton, leaked thousands of classified documents to journalists Glenn Greenwald, Laura Poitras, and Barton Gellman. The documents revealed that the U.S. National Security Agency (NSA) โ along with allied intelligence agencies โ was conducting mass surveillance of global communications on a scale that shocked the world. The revelations confirmed what many privacy advocates and conspiracy theorists had long suspected: the U.S. government was collecting the communications data of millions of ordinary citizens, both American and foreign, with minimal judicial oversight.
Key Programs Revealed
PRISM
One of the first and most significant revelations was PRISM, a program through which the NSA collected internet communications from major technology companies including Microsoft, Google, Yahoo, Facebook, Apple, and others. The program operated under Section 702 of the Foreign Intelligence Surveillance Act (FISA) and allowed the NSA to obtain stored data โ including emails, chat logs, photographs, and documents โ directly from company servers. The tech companies denied providing "direct access" to their servers but acknowledged complying with lawful government requests.
Bulk Telephony Metadata Collection
Documents revealed that the NSA was collecting metadata (phone numbers, call duration, time stamps, but not content) on virtually all domestic telephone calls in the United States under a secret interpretation of Section 215 of the USA PATRIOT Act. The Foreign Intelligence Surveillance Court (FISC) had been issuing secret orders compelling telecommunications companies like Verizon to hand over these records in bulk on an ongoing basis.
XKeyscore
A search system that allowed NSA analysts to search through vast databases of emails, online chats, and browsing histories of targets worldwide with no prior authorization required. Snowden described it as a system that could intercept "nearly everything a typical user does on the internet."
Upstream Collection
The NSA was tapping directly into the fiber-optic cables that carry internet traffic between major data centers, both within the United States and internationally. Programs with code names like BLARNEY, FAIRVIEW, OAKSTAR, and STORMBREW collected data as it transited through major telecommunications switching points.
MUSCULAR
In partnership with Britain's GCHQ, the NSA was secretly tapping into the private fiber-optic links connecting Yahoo and Google data centers worldwide โ outside the United States and without these companies' knowledge or the oversight of the FISA court.
Five Eyes Cooperation
Documents confirmed the extensive intelligence-sharing alliance among the "Five Eyes" nations โ the United States, United Kingdom, Canada, Australia, and New Zealand. Each nation conducted surveillance that others could not legally perform on their own citizens, then shared the intelligence, creating a system of mutual surveillance that circumvented domestic legal restrictions.
Edward Snowden's Journey
Snowden began copying classified documents in April 2013 while working at an NSA facility in Hawaii. He flew to Hong Kong on May 20, 2013, where he met with Greenwald and Poitras. The first stories were published in The Guardian and The Washington Post on June 5-6, 2013.
On June 21, the U.S. Department of Justice charged Snowden with two counts of violating the Espionage Act and theft of government property. He flew from Hong Kong to Moscow on June 23, where he was stranded after the U.S. revoked his passport. He was granted temporary asylum by Russia and has lived there since, receiving permanent residency in 2020 and Russian citizenship in 2022.
Impact and Reforms
The Snowden revelations had far-reaching consequences:
- USA FREEDOM Act (2015): Congress passed legislation ending the bulk collection of domestic telephone metadata, replacing it with a system where the NSA must request specific records from telecommunications companies through the FISC
- Presidential Policy Directive 28 (2014): President Obama issued guidelines imposing some limits on surveillance of foreign leaders and non-U.S. persons
- Technology industry changes: Major tech companies implemented end-to-end encryption, published transparency reports, and challenged government surveillance orders more aggressively
- International fallout: Revelations that the NSA had tapped German Chancellor Angela Merkel's phone and monitored communications of other allied leaders caused significant diplomatic damage
- Public awareness: Global awareness of government surveillance capabilities increased dramatically, influencing debates about privacy, encryption, and the balance between security and civil liberties
Debate Over Snowden's Actions
The public and political establishment remain deeply divided on Snowden:
Supporters argue he is a whistleblower who exposed unconstitutional surveillance at great personal cost, enabling democratic debate about programs that operated in secret. Supporters include the ACLU, numerous civil liberties organizations, and former NSA officials like William Binney and Thomas Drake.
Critics argue he is a traitor who damaged national security by revealing lawful intelligence programs to adversaries. Critics include most of the U.S. intelligence community, both the Obama and Trump administrations, and congressional leaders from both parties who argue the proper channel was the Intelligence Community Inspector General.
Legacy
The Snowden revelations represent the largest leak of classified documents in NSA history. They confirmed โ with documentary evidence โ that the scale of government surveillance far exceeded what had been publicly acknowledged or legally authorized through transparent democratic processes. The revelations fundamentally altered the global conversation about digital privacy, government transparency, and the limits of intelligence gathering in democratic societies.