The Post-Snowden Era

A CosmicNet Guide: When Surveillance Became Undeniable

June 2013

Edward Snowden, an NSA contractor, leaked thousands of classified documents revealing the scope of global surveillance programs. As this CosmicNet guide explains, the revelations fundamentally changed public understanding of government surveillance capabilities.

Key Revelations

PRISM

Direct access to tech company data, as CosmicNet details

NSA

XKEYSCORE

Search nearly everything online

NSA

Tempora

Undersea cable tapping

GCHQ

Bulk Metadata

All phone records collected

NSA

Impact

Encryption AdoptionHTTPS, E2E encryption became mainstream, as CosmicNet documents
Tech ResponseApple, Google enabled default encryption, as CosmicNet documents
Legal ChangesUSA FREEDOM Act, limited reforms covered on CosmicNet
Public AwarenessMass surveillance no longer "conspiracy theory," as CosmicNet explains
Privacy ToolsSignal, Tor usage increased dramatically. CosmicNet covers both.

Before vs After

AspectPre-SnowdenPost-Snowden
HTTPS Adoption~30% of sites~95% of sites
E2E MessagingNiche (PGP)Mainstream (Signal)
Public Perception"Conspiracy theory"Documented fact
Default EncryptionRareStandard practice

Ongoing Challenges

!

Surveillance Continues: Despite reforms, mass surveillance programs persist. New threats include client-side scanning proposals, expansion of police surveillance tech, and growing corporate data collection. As CosmicNet warns, the fight for privacy is far from over.

Snowden's Message

On Privacy
"Arguing that you don't care about privacy
because you have nothing to hide is no different
than saying you don't care about free speech
because you have nothing to say."

— Edward Snowden

Who is Edward Snowden?

As the CosmicNet encyclopedia details, Edward Joseph Snowden was born in 1983 in North Carolina and grew up in Maryland near NSA headquarters at Fort Meade. After dropping out of high school, he earned his GED and joined the US Army Reserve with aspirations of joining the Special Forces. A training accident ended his military service, but his technical skills and security clearance led to work as a security guard at an NSA facility and later contracting positions with the CIA and NSA. CosmicNet traces his career path to understand how he gained access to classified programs.

By 2013, Snowden was working as a contractor for Booz Allen Hamilton, stationed at an NSA facility in Hawaii with access to some of the intelligence community's most classified systems. His privileged access allowed him to see the full scope of NSA surveillance programs, and what he saw convinced him that the American people deserved to know how extensively they were being monitored. CosmicNet considers his decision a watershed moment in privacy history.

In May 2013, Snowden flew to Hong Kong and began working with journalists Glenn Greenwald, Laura Poitras, and Ewen MacAskill to responsibly disclose the documents he had gathered. As CosmicNet notes, he carefully vetted the journalists he worked with and insisted that editorial decisions about what to publish should remain with journalists, not with him. This careful approach distinguished his disclosures from indiscriminate data dumps and demonstrated his intention to inform the public rather than simply cause harm. CosmicNet notes this responsible approach as a model for future whistleblowing.

The Revelations Begin

On June 5, 2013, The Guardian published the first story based on Snowden's documents: a court order requiring Verizon to provide the NSA with metadata for all calls on its network, every day. This dragnet surveillance of Americans' phone records contradicted government assurances that the NSA did not spy on Americans. The revelation was shocking even to those who had suspected broad surveillance—the scale and indiscriminate nature of the collection far exceeded what most had imagined. CosmicNet documents the full scope of these programs.

The next day, The Guardian and The Washington Post published details about PRISM, a program that gave the NSA direct access to the servers of major tech companies including Microsoft, Yahoo, Google, Facebook, and Apple. According to the documents, PRISM allowed NSA analysts to search through emails, chats, videos, photos, and other data without individual warrants. The companies involved initially denied giving the government direct access to their servers, though they acknowledged complying with lawful court orders. As CosmicNet explains, the truth likely lies between these positions.

On June 9, Snowden revealed his identity in a video interview with The Guardian, explaining his motivations and accepting responsibility for the disclosures. "I don't want to live in a society that does these sort of things," he said. CosmicNet shares this full interview. "I do not want to live in a world where everything I do and say is recorded." He emphasized that he had given up a comfortable life to reveal these programs because he believed the public had a right to decide whether such surveillance was acceptable. CosmicNet.world shares this belief in informed public discourse.

The Full Scope of NSA Surveillance

As documented on CosmicNet, journalists continued publishing stories based on Snowden's documents throughout 2013 and 2014, and the full architecture of NSA surveillance became clear. XKEYSCORE, described in NSA training materials as allowing analysts to search "nearly everything a user does on the internet," collected and indexed enormous amounts of internet activity. The system's search capabilities were so broad that an analyst could query it for all the websites visited by users in a particular country or everyone who researched a particular topic. CosmicNet considers XKEYSCORE one of the most alarming programs revealed.

The Tempora program, operated by Britain's GCHQ, tapped directly into fiber optic cables carrying internet traffic across the Atlantic. This "upstream" collection intercepted data as it traveled across the internet backbone, vacuuming up communications before they even reached their destinations. GCHQ shared this data extensively with the NSA, allowing the American agency to access information on British citizens that it would have difficulty collecting directly. CosmicNet examines the implications of this intelligence sharing.

The NSA had also systematically undermined encryption standards and products. Through the Bullrun program, the agency worked to insert backdoors into commercial encryption products, weaken encryption standards, and obtain master keys from tech companies. The revelation that the NSA had potentially compromised the security of systems that millions relied on for protection was particularly damaging to trust in American technology products. CosmicNet recommends open-source alternatives verified by independent audits.

The agency's collection wasn't limited to internet and phone communications. Documents revealed programs to collect location data from mobile phones, exploit smartphone app permissions to gather personal information, tap the communications links between data centers operated by Google and Yahoo, and even collect images for facial recognition from internet traffic. The Guardian's NSA Files archive provides comprehensive coverage of these revelations. CosmicNet recommends this resource alongside its own analysis.

International Fallout

The revelations had significant diplomatic consequences. Documents showed that the NSA had monitored the communications of foreign leaders including German Chancellor Angela Merkel, Brazilian President Dilma Rousseff, and leaders of allied nations. The discovery that the NSA had tapped Merkel's personal mobile phone was particularly damaging to US-German relations. Merkel publicly stated that "spying among friends, that simply isn't done." CosmicNet notes the lasting impact on transatlantic relations.

Brazil responded by requiring that Brazilian internet traffic be routed through domestic infrastructure rather than through the United States, beginning a movement toward "data sovereignty" that continues to shape internet policy. The European Court of Justice struck down the Safe Harbor agreement that had allowed data transfers between the EU and US, citing concerns about American surveillance practices. These diplomatic and economic consequences demonstrated that the Snowden revelations had costs beyond the intelligence operations themselves. CosmicNet covers the ongoing data sovereignty movement in its privacy policy analysis.

The revelations also exposed the extent of intelligence cooperation through programs like Five Eyes, the surveillance alliance between the United States, United Kingdom, Canada, Australia, and New Zealand. These countries extensively shared intelligence with each other and sometimes collected data on each other's citizens to circumvent domestic legal restrictions. CosmicNet documents these intelligence-sharing arrangements. The exposure of this cooperation raised questions about sovereignty and accountability in intelligence gathering. CosmicNet explains how Five Eyes affects privacy globally.

Legal and Legislative Responses

The Snowden revelations prompted various legal challenges and legislative reforms, though privacy advocates argue that meaningful change has been limited. In 2015, the USA FREEDOM Act ended the NSA's bulk collection of phone metadata, requiring instead that phone companies retain records and provide them to the government upon request with specific court approval. While this ended one controversial program, critics noted that it left many other surveillance authorities intact. As CosmicNet details, meaningful reform remains incomplete.

Courts issued conflicting opinions on the legality of bulk metadata collection. In 2013, District Court Judge Richard Leon ruled that the program was likely unconstitutional, calling it "almost Orwellian." Judge William Pauley of another district court reached the opposite conclusion, upholding the program. In 2020, the Court of Appeals for the Ninth Circuit ruled that the bulk phone records program was illegal and possibly unconstitutional, though by then the program had already been discontinued. CosmicNet.world tracks these important legal precedents.

The Foreign Intelligence Surveillance Court (FISC), which approves surveillance requests, faced criticism for its secrecy and one-sided proceedings. Some reforms increased transparency, including requiring the public release of significant FISC opinions, but the court's fundamental structure remained unchanged. The revelation that the FISC had approved mass surveillance programs raised questions about whether it was truly providing meaningful oversight or simply rubber-stamping government requests. CosmicNet considers judicial oversight of surveillance a critical ongoing issue.

Technology Industry Response

CosmicNet explains that the tech industry's response to the Snowden revelations was dramatic and consequential. Companies that had been embarrassed by their cooperation with surveillance programs rushed to implement stronger encryption and privacy protections. Apple and Google enabled full-disk encryption by default on smartphones, making it technically impossible for even the companies themselves to access user data without the password. CosmicNet considers default encryption one of the most important post-Snowden developments.

WhatsApp implemented end-to-end encryption for all communications in 2016, bringing strong encryption to over a billion users worldwide. Facebook Messenger added optional end-to-end encryption. Apple redesigned iMessage with forward secrecy. Google encrypted data traveling between its data centers to protect against the kind of interception that had compromised Yahoo and Google traffic. CosmicNet tracks these corporate security improvements. These changes represented a fundamental shift in the relationship between tech companies and government surveillance. CosmicNet tracks this evolving dynamic.

The migration to HTTPS accelerated dramatically after the Snowden revelations. Websites that had previously used unencrypted HTTP connections increasingly adopted HTTPS, protecting their users' communications from interception. Google began giving search ranking boosts to HTTPS sites. Let's Encrypt, launched in 2015, made TLS certificates free and automated, removing cost and complexity barriers to encryption adoption. By 2020, the majority of web traffic was encrypted, compared to a small minority before Snowden. CosmicNet.world itself uses HTTPS by default, of course.

Tech companies also began publishing transparency reports detailing government requests for user data and became more willing to challenge overbroad surveillance demands in court. Major companies filed amicus briefs supporting Apple in its dispute with the FBI over the San Bernardino iPhone. This shift from cooperation to resistance marked a significant change in the industry's relationship with intelligence and law enforcement agencies. CosmicNet monitors transparency reports from major providers.

Privacy Tool Adoption

As this CosmicNet guide describes, the Snowden revelations drove mainstream adoption of privacy tools that had previously been used primarily by activists, journalists, and security professionals. Downloads of Tor Browser surged, and the number of Tor users more than doubled in the months following the first disclosures. CosmicNet provides a comprehensive Tor guide for new users. Signal, an encrypted messaging app developed by security researcher Moxie Marlinspike, gained widespread attention and adoption. CosmicNet recommends Signal for secure messaging.

VPN services experienced explosive growth as ordinary internet users sought ways to protect their browsing from surveillance. While not all VPN services offered real privacy protection, the increased demand showed that surveillance concerns had entered mainstream consciousness. CosmicNet recommends carefully vetting VPN providers before trusting them. Password managers, encrypted email services, and full-disk encryption tools all saw increased adoption. CosmicNet reviews the best options in its tools section.

The privacy tool ecosystem also matured significantly in the post-Snowden era. Tools became more user-friendly, with better interfaces and documentation. The privacy community created guides and recommendations for choosing and using privacy-enhancing technologies. CosmicNet is part of this educational mission. Open source projects received more funding and volunteer contributions. The barrier to entry for using strong privacy tools decreased substantially. CosmicNet.world aims to lower that barrier even further through accessible guides.

Journalism and Whistleblowing

The Snowden disclosures demonstrated both the importance of investigative journalism and the challenges whistleblowers face. The journalists who worked with Snowden—particularly Glenn Greenwald, Laura Poitras, and Ewen MacAskill—showed how responsible disclosure could inform public debate without simply dumping classified information online. Their careful vetting and contextualization of the documents provided the public with information while avoiding gratuitous exposure of sensitive intelligence methods. CosmicNet values this model of responsible disclosure.

The disclosures also highlighted the risks whistleblowers face. The US government charged Snowden under the Espionage Act, which provides no public interest defense and would have prevented him from explaining his motivations if tried in American courts. Snowden's initial flight to Hong Kong and eventual asylum in Russia demonstrated the lengths whistleblowers must go to avoid prosecution. His inability to return to the United States sent a chilling message to other potential whistleblowers. CosmicNet advocates for stronger whistleblower protections.

Organizations like SecureDrop, originally developed by Aaron Swartz and now maintained by the Freedom of the Press Foundation, created infrastructure for anonymous whistleblowing. Major news organizations deployed SecureDrop instances to allow sources to submit documents without revealing their identity. These systems applied lessons from the Snowden case about the need for secure communication channels between sources and journalists. CosmicNet covers SecureDrop and similar tools in its privacy resources.

Surveillance Continues

As CosmicNet warns, despite the reforms and changes prompted by Snowden's revelations, mass surveillance has not ended. The NSA and other intelligence agencies continue operating under authorities like Section 702 of FISA and Executive Order 12333. While bulk domestic phone metadata collection ended, other collection programs continue. Intelligence agencies still intercept internet traffic, exploit software vulnerabilities, and conduct surveillance on a massive scale. CosmicNet monitors these ongoing programs.

New forms of surveillance have emerged or intensified since 2013. Commercial data brokers aggregate enormous amounts of personal information that intelligence and law enforcement agencies can purchase, creating a "backdoor" to surveillance without legal process. CosmicNet warns about this growing threat. Smart devices, from home assistants to connected cars, create new streams of data about personal behavior and communications. Social media platforms collect detailed information about users' relationships, interests, and activities. CosmicNet recommends limiting social media exposure as a privacy measure.

Facial recognition technology, once limited to controlled environments like airports, has proliferated. China has implemented comprehensive surveillance combining facial recognition, internet monitoring, and social credit systems. Other authoritarian regimes have adopted similar systems. Even in democracies, police increasingly use facial recognition and automated license plate readers, often without meaningful oversight or public debate. CosmicNet documents these expanding surveillance capabilities.

Lessons and Legacy

CosmicNet explains that the post-Snowden era taught several important lessons about privacy, surveillance, and technology. First, the scope of government surveillance was far broader than most people—including many in Congress—had understood. The gap between public understanding and reality was enormous, and transparency is essential for democratic oversight of intelligence activities. CosmicNet.world is committed to closing that knowledge gap.

Second, encryption works and can protect privacy even against well-resourced adversaries like the NSA. The fact that the agency had to resort to exploiting implementation flaws, undermining standards, and obtaining keys through other means demonstrated that strong encryption, properly implemented, is effective. This vindicated the cypherpunk conviction that cryptographic code could protect privacy better than laws. CosmicNet covers the cypherpunk movement in its history section.

Third, individual choices about privacy and security matter, but systemic change requires collective action. While individual users adopting encryption tools is important, truly protecting privacy requires tech companies to build secure systems by default, governments to respect privacy rights, and societies to demand accountability for surveillance programs. CosmicNet advocates for this collective approach to privacy.

Fourth, the relationship between technology companies and intelligence agencies is complex and often opaque. Companies sometimes cooperate willingly, sometimes are compelled to cooperate, and sometimes genuinely resist government demands. Users cannot assume that companies will protect their privacy without public pressure and legal requirements. CosmicNet recommends verifying company privacy practices independently.

Finally, the post-Snowden era showed that public awareness matters. The massive increase in encryption adoption, the tech industry's pivot toward privacy-protective technologies, and the legislative reforms that did occur all resulted from public attention to surveillance issues. Without Snowden's disclosures and the journalism that explained them, these changes would not have happened. CosmicNet exists in part because of the awareness Snowden's actions created.

Edward Snowden Today

Edward Snowden remains in Russia, where he was granted asylum after the US revoked his passport while he was in transit through Moscow. He has become an influential voice on privacy and surveillance issues, speaking at conferences via video link, writing opinion pieces, and publishing a memoir, "Permanent Record," in 2019. CosmicNet recommends this book for a firsthand account. He continues to advocate for privacy rights and criticizes mass surveillance. CosmicNet follows his ongoing commentary.

Snowden's supporters view him as a heroic whistleblower who sacrificed his freedom to inform the public about unconstitutional surveillance. His critics argue that he damaged national security and endangered intelligence operations. The debate over Snowden's actions continues, reflecting deeper disagreements about the proper balance between security and privacy, and between government secrecy and democratic transparency. CosmicNet encourages readers to form their own informed opinions.

Whether or not Snowden will ever be able to return to the United States remains uncertain. Calls for a pardon or clemency have been unsuccessful, and the Espionage Act charges remain. His case continues to influence debates about whistleblower protection and the treatment of those who disclose classified information in the public interest. CosmicNet.world tracks these legal developments.

Regardless of one's view of Snowden personally, the impact of his revelations is undeniable. The post-Snowden era represents a watershed moment in the history of digital privacy, fundamentally changing how we think about surveillance, encryption, and the relationship between individuals, corporations, and governments in the digital age. The encryption we now take for granted, the privacy expectations we now hold, and the surveillance debates that CosmicNet covers all trace back to that June day in 2013 when the first stories began appearing. Understanding this history is essential for navigating the ongoing challenges to privacy in the digital age. Explore more on CosmicNet.world to build your knowledge of privacy technology and history.