Case Study 6.2: The Snowden Moment — What Was Revealed and What Changed
Overview
On June 5, 2013, The Guardian published the first story based on classified documents provided by Edward Snowden: a FISA Court order requiring Verizon to provide the NSA with metadata for all telephone calls made in the United States. Over the following months, dozens of additional stories appeared, collectively revealing the scope and architecture of mass surveillance programs that had been authorized in secret under laws whose interpretation the government had not publicly disclosed. This case study examines the Snowden revelations as a critical historical moment in surveillance architecture — what was disclosed, how the government and public responded, and what substantively changed and did not change in the decade that followed.
The Man and the Decision
Edward Snowden was not the first NSA whistleblower. Before him, Thomas Drake had disclosed waste and mismanagement in the agency's surveillance programs to a reporter — and been prosecuted under the Espionage Act. William Binney, a 36-year NSA veteran who helped design one of the agency's data collection systems, had resigned and become a public critic after concluding the systems were being turned on American citizens. Russ Tice had disclosed that the NSA was monitoring members of Congress and journalists. Each of these disclosures produced some attention and no fundamental change.
Snowden's approach was different in scale and method. Rather than describing programs in general terms, he brought out specific classified documents — presentation slides, court orders, legal opinions, technical specifications — that the public, the media, and in some cases Congress had no knowledge of. He brought them to journalists rather than government oversight bodies, in part because Drake's experience with the latter had demonstrated their inadequacy.
The decision to flee to Hong Kong before disclosure, and subsequently to accept asylum in Russia, complicated the political reception of Snowden's disclosures. The government characterized him as a traitor; defenders argued he was a whistleblower. The legal reality was stark: he was charged with espionage and faced decades in prison if he returned to the United States.
The question the case study asks is not whether Snowden was heroic or treasonous — that debate is endless and often unproductive — but rather: what did the revelations show, and what happened as a result?
The Programs: A Systematic Overview
Bulk Telephone Metadata Collection (Section 215)
The first story — the Verizon metadata order — established a pattern. A single FISA Court order, classified and therefore unknown to the public or most of Congress, required Verizon to produce, on a "daily ongoing basis," all call detail records for calls "wholly within the United States, including local telephone calls" and calls between the U.S. and abroad. The order covered calls by "millions of Americans," the vast majority of whom had no connection to any investigation.
This was the program defended by the administration as "just metadata." As the chapter's main text discusses, subsequent research demonstrated that the metadata pattern could reveal deeply sensitive information about individuals' health, sexuality, political beliefs, and private lives.
PRISM and the Silicon Valley Connection
The second wave of disclosures revealed PRISM — the program through which the NSA collected communications content from the servers of major American technology companies. The companies named — Microsoft, Google, Facebook, Apple, and others — issued immediate public statements asserting that they had not provided the NSA with "direct access" to their servers. The technical accuracy of these statements was carefully worded: the companies complied with individual legal orders (FISA orders under Section 702) but had not provided bulk or real-time access of the kind the government's own slides described in some presentations.
The PRISM revelations raised a question about the relationship between American technology companies and the surveillance state. Companies had built their business models on the collection and analysis of user data; the government had legal authority to demand access to that data; the result was a surveillance architecture that was, in a meaningful sense, a public-private partnership — though the companies were unwilling partners, at least officially.
The XKeyscore Revelation: The Analyst's Toolkit
The disclosure of XKeyscore was, for many technologists, the most alarming of the Snowden revelations. The training slides describing XKeyscore showed that an individual NSA analyst could conduct searches of vast internet traffic databases using simple queries — email addresses, IP addresses, name-and-country combinations — and retrieve content from those communications. The oversight for these searches was largely self-reported.
One quoted passage from the XKeyscore documentation stated that an analyst needed only to fill out an on-screen form providing a "justification" for a query, with no independent review at the point of search. The justification was not verified; it was logged.
This description highlighted a critical dimension of modern surveillance architecture: the legal authorization for collection is subject to court review, however minimal; the individual acts of analysis are largely self-governed by analysts within broad agency guidelines.
The Government's Response: Three Registers
The Obama administration's response to the Snowden revelations operated at three registers simultaneously, and understanding all three is essential for analyzing what the disclosures actually accomplished.
Register One: Damage Control and Framing
The immediate public response was framing: the disclosures had harmed national security, the programs were legal, the programs were effective, and Snowden was a criminal. Director of National Intelligence James Clapper — who had testified before Congress in March 2013 that the NSA did "not wittingly" collect information on millions of Americans (a statement that the Snowden revelations revealed to be false) — issued a statement that he had misled Congress with the "least untruthful" answer available to him in an unclassified setting.
This episode — a Director of National Intelligence giving a demonstrably false answer to Congress about surveillance activities — became itself significant: it demonstrated that the oversight mechanisms in place had failed to produce accurate information even when directly asked for it.
Register Two: Internal Review and Limited Reform
The administration commissioned an internal review that produced the President's Review Group on Intelligence and Communications Technologies, which published its report in December 2013. The report made 46 recommendations, including ending bulk telephone metadata collection, strengthening oversight of the FISA Court, and creating a public advocate for civil liberties in FISC proceedings.
The USA FREEDOM Act of 2015 implemented the most significant recommendation: it ended the NSA's bulk collection of telephone metadata under Section 215 and replaced it with a system in which records remained with telecommunications companies and could be queried with specific selectors. It did not substantially alter Section 702 or the programs operating under it.
Register Three: Continued Defense and Legal Resistance
While making limited concessions on Section 215, the government vigorously defended the programs it considered most operationally significant — particularly Section 702. The administration argued, in classified and public settings, that PRISM and Upstream collection under Section 702 had been essential to preventing terrorist attacks. The specific claims were difficult to evaluate because the supporting evidence was classified.
External analysts and congressional critics questioned whether the bulk collection programs had produced operational benefits proportionate to their costs. A Privacy and Civil Liberties Oversight Board report in 2014 found that the Section 215 telephone metadata program had produced "essentially no" unique intelligence value — that is, information not obtainable through other, less invasive means.
What Actually Changed
The period from 2013 to the present has produced the following substantive changes:
End of NSA bulk telephone metadata collection. The Section 215 program was ended by the USA FREEDOM Act and not effectively restarted. However, the NSA's telephone metadata program was later discontinued entirely after the agency discovered it had been collecting records it was not authorized to collect.
Encryption by major technology companies. One of the most significant practical consequences of the Snowden revelations was the rapid deployment of encryption by major technology companies. Google, Apple, WhatsApp, and others implemented end-to-end encryption or strengthened their encryption practices in direct response to the revelations. This substantially increased the cost of government surveillance for companies with legal obligations to respond to court orders — though it did not affect collection from network infrastructure.
International legal challenges. European courts and regulators drew on the Snowden revelations in challenging the legal frameworks governing data transfers from Europe to the United States. The EU-U.S. Privacy Shield arrangement, which governed data transfers, was invalidated by the European Court of Justice in 2020 (in Schrems II), partly on the basis that U.S. surveillance practices did not provide adequate protection for EU citizens' rights.
Political and public awareness. The most durable consequence of the revelations may be informational: a significant portion of the American public now knows, in general terms, that mass surveillance programs exist. This knowledge has shaped public attitudes toward technology companies, government, and privacy.
What did not change. Section 702 remained largely intact. The FISA Court continued to operate in secret. The legal frameworks governing national security surveillance were reauthorized in 2018 and 2024. The fundamental architecture — fiber-optic cable access, server collection under legal order, metadata analysis — was not dismantled. The intelligence community's budget continued to grow. No one was prosecuted for the surveillance programs themselves, though Snowden was prosecuted in absentia.
The Accountability Gap
The most striking feature of the Snowden moment, in retrospect, is the accountability gap: the revelations produced extensive public knowledge, limited legislative reform, and essentially no accountability for any individual who designed, authorized, or implemented the illegal or constitutionally questionable aspects of these programs.
This gap is not accidental. The classification system, the state secrets privilege, the doctrine of official immunity, and the practical difficulty of prosecuting senior officials for executive branch programs all contributed to the outcome. The one significant prosecution — of Thomas Drake, the earlier NSA whistleblower — was ultimately dropped when a federal judge found that the government's evidence would require disclosure of classified information it was not willing to release.
The accountability gap raises a question that goes beyond the specific case of surveillance: what democratic mechanisms can provide meaningful accountability for classified executive programs? The existing mechanisms — congressional oversight committees, the FISA Court, inspector general offices — have all demonstrated serious limitations. The Snowden case suggests that external disclosure by insiders willing to accept criminal prosecution may be the primary mechanism remaining. This is a troubling conclusion for democratic governance.
Discussion Questions
-
James Clapper told Congress in March 2013 that the NSA did "not wittingly" collect data on millions of Americans — a statement that was false. He was not prosecuted for perjury; he was not removed from his position. What does this episode reveal about the accountability mechanisms governing intelligence officials? Is there a structural reason why accountability is more difficult in classified contexts?
-
The companies whose platforms were accessed through PRISM — Google, Facebook, Apple, Microsoft — were legally compelled to comply. But the business models of those companies were built on data collection, and the government's access was in a sense parasitic on that collection architecture. Does the private surveillance infrastructure make the national security surveillance state's collection easier? Is there a meaningful distinction between "voluntary data collection for advertising" and "coerced data provision to government"?
-
The debate about Snowden — hero or traitor — is often presented as a binary. Develop a more nuanced position: (a) identify specific disclosures that you believe were in the public interest and constituted legitimate whistleblowing; (b) identify specific disclosures, if any, that you believe caused genuine harm to national security without proportionate public benefit. Is there a principled way to make this distinction?
-
The Privacy and Civil Liberties Oversight Board found that the Section 215 bulk telephone metadata program had produced "essentially no" unique intelligence value. If that finding is accurate, it suggests the program continued for years — collecting records on hundreds of millions of Americans — with essentially no counterterrorism benefit. What institutional dynamics might explain the persistence of a program with no demonstrated value? What does this tell us about the relationship between surveillance and security?
-
Jordan, reading about the Snowden revelations, says to Marcus: "At least now we know what's happening." Marcus responds: "But knowing hasn't changed anything." Evaluate this exchange. What is the political and ethical significance of public knowledge of surveillance practices, even if that knowledge does not produce reform? Is awareness itself a form of accountability, or is it insufficient?
-
The Snowden revelations produced significant changes in encryption practices by major technology companies, which has made government surveillance of communications harder. Law enforcement and intelligence agencies argue that "going dark" — the increasing inability to access encrypted communications even with lawful authority — represents a public safety crisis. Evaluate this argument. Is the expansion of encryption a legitimate democratic response to revealed surveillance overreach, or does it create an unacceptable obstacle to legitimate law enforcement?
Case Study 6.2 | Chapter 6: The National Security State | Part 2: State Surveillance