




























See Also
See Again
The secrets revealed by whistleblower Edward Snowden
- <p>In 2013, Edward Snowden, a National Security Agency (NSA) intelligence subcontractor, leaked classified documents revealing the existence of top-secret surveillance programs. As one of the most notorious whistleblowers of recent times, Snowden was behind the biggest security breach in the agency's history. His disclosures revealed numerous global spying tactics, many carried out by the NSA and the UK's Government Communications Headquarters (GCHQ). In the wake of the sensational revelations, Snowden fled to Moscow. He became a naturalized Russian citizen in 2022.</p><p>Edward Snowden's actions forced US intelligence agencies to admit extensive spying on their own citizens. It also exposed global <a href="https://www.starsinsider.com/lifestyle/808107/trends-in-workplace-surveillance" target="_blank">surveillance</a> operations undertaken by both the NSA and the GCHQ. But what exactly was leaked, and who was affected?</p><p>Click through the following gallery and learn more about the man who stole hundreds of thousands of highly classified secrets and revealed them to the world.</p>
© Getty Images
0 / 29 Fotos
PRISM
- Among the secrets the Snowden documents revealed in 2013 was the existence of the PRISM program. PRISM was the codename for an operation that allowed the National Security Agency (NSA) to collect internet communications from various US internet companies.
© Getty Images
1 / 29 Fotos
PRISM
- PRISM facilitated access by the NSA to emails, documents, photos, and data stored by tech companies, including Facebook, Microsoft, Yahoo, Google, YouTube, Skype, and Apple.
© Getty Images
2 / 29 Fotos
Tempora
- Snowden also revealed the existence of Tempora. This leak exposed the practice by UK-based intelligence and security organization Government Communications Headquarters (GCHQ) of tapping fiber-optic cables to collect, store, and share with the NSA huge amounts of internet users' personal data.
© Getty Images
3 / 29 Fotos
Boundless Informant
- The Boundless Informant program is a vast data analysis and data visualization tool used by the NSA that functions by collecting and counting metadata.
© Getty Images
4 / 29 Fotos
Boundless Informant
- Snowden exposed Boundless Informant in June 2013, explaining that intelligence is gathered from millions of Americans through access to the country's computer and phone networks.
© Getty Images
5 / 29 Fotos
XKeyscore
- In July 2013, Edward Snowden publicly revealed XKeyscore, a secret computer system used by the NSA to access and analyze global internet data.
© Getty Images
6 / 29 Fotos
XKeyscore
- XKeyscore's scope and function is vast. Indeed, it's been described as "NSA's Google." The system comprises at least 700 servers at sites all over the world, all connected to the NSA's analysts.
© Getty Images
7 / 29 Fotos
Follow the Money
- A catchphrase popularized by the 1976 docudrama film 'All the President's Men,' Follow the Money refers to a branch of the NSA charged with tracking and collecting global financial data.
© Getty Images
8 / 29 Fotos
Follow the Money
- Snowden revealed that intel is mainly gathered through credit card transactions, including international payments processed by companies including Visa
© Shutterstock
9 / 29 Fotos
JTRIG
- The Joint Threat Research Intelligence Group (JTRIG) is a unit of GCHQ. It can also be described as a "dirty tricks department," as its mission is to engage in online manipulation, propaganda, and disinformation campaigns.
© Getty Images
10 / 29 Fotos
JTRIG
- Snowden disclosed how JTRIG operations are broken down and assigned a codename. For example, some of the tools include the ability to manipulate the results of online polls ('Underpass'). JTRIG can also source private photographs of targets on Facebook, a procedure known as 'Spring Bishop.'
© Getty Images
11 / 29 Fotos
Nymrod
- The leaked NSA files supplied by Snowden revealed how the agency eavesdropped on allies as well as enemies using a system known as Nymrod.
© Getty Images
12 / 29 Fotos
Nymrod
- Nymrod was also used by GCHQ to target at least 11 world leaders, among them the then-Syrian president Bashar al-Assad and former Ukrainian prime minister Yulia Tymoshenko. The then-German chancellor Angela Merkel was also listed by name, a revelation that strained diplomatic relations with many European countries.
© Getty Images
13 / 29 Fotos
Bullrun and Edgehill
- According to the Snowden documents, Bullrun is a clandestine, highly classified program to crack encryption of online communications and data. It was created to undermine encryption standards using an array of methods including computer network exploitation and interdiction.
© Shutterstock
14 / 29 Fotos
Bullrun and Edgehill
- Interdiction is a process whereby shipments of computer electronics are intercepted before they reach their destination and installed with malicious hardware that can give US intelligence agencies remote access. GCHQ has a similar program codenamed Edgehill.
© Shutterstock
15 / 29 Fotos
MUSCULAR
- Snowden's whistleblowing blew the lid off MUSCULAR, a joint NSA-GCHQ surveillance program that enabled field operatives to break into the main communications links that connect the data centers of Yahoo and Google.
© Getty Images
16 / 29 Fotos
MUSCULAR
- The leaked documents revealed that in a single day, the NSA's so-called "acquisitions directorate" redirected millions of records from Yahoo and Google internal networks to data warehouses at NSA Fort Meade headquarters.
© Getty Images
17 / 29 Fotos
Tailored Access Operations
- Also a result of Snowden's whistleblowing, the wider world became aware of the NSA's cyber-warfare intelligence-gathering unit known as the Office of Tailored Access Operations (TAO).
© Shutterstock
18 / 29 Fotos
Tailored Access Operations
- TAO are essentially government hackers. Their job is to identify, monitor, infiltrate, and gather intelligence on computer systems being used by entities foreign to the United States. At the time of the leaks, TAO had more than 1,000 military and civilian operatives. Today the unit is known as Computer Network Operations.
© Getty Images
19 / 29 Fotos
Mobile phone intercepts
- Snowden's leaks confirmed what many already believed to be true, that intelligence agencies intercepted and collected huge caches of mobile phone communications and emails.
© Shutterstock
20 / 29 Fotos
Mobile phone intercepts
- Not so well known is that this intel was collected from employees of mobile operators to identify security weaknesses in networks that the NSA could exploit for surveillance purposes.
© Shutterstock
21 / 29 Fotos
Optic Nerve
- In February 2014, it was revealed that GCHQ, with assistance from the NSA, surreptitiously collected private webcam still images from users while they were using a Yahoo webcam application.
© Getty Images
22 / 29 Fotos
Optic Nerve
- GCHQ called this underhanded practice the Optic Nerve program. Snowden revealed that data was collected indiscriminately in bulk from users regardless of whether they were an intelligence target or not.
© Getty Images
23 / 29 Fotos
Operation EgotisticalGiraffe
- The bizarrely codenamed Operation EgotisticalGiraffe refers to the NSA's practice of infiltrating and compromising popular social networking platforms. It does this by undermining the Tor network.
© Getty Images
24 / 29 Fotos
Operation EgotisticalGiraffe
- Tor—short for The Onion Routing project—is an open-source privacy network for anonymous web browsing. In 2013, both the GCHQ and the NSA made repeated attempts to identify people using the Tor anonymity service, but were largely unsuccessful.
© Shutterstock
25 / 29 Fotos
Covert operations against China
- Snowden's revelations against the NSA extended to accusing it of hacking foreign mobile phone companies to access millions of private text messages in China. In 2012, text messaging was the most popular form of communication in mainland China.
© Getty Images
26 / 29 Fotos
Dishfire
- The leaked documents also revealed a covert global surveillance collection system and database codenamed Dishfire.
© Shutterstock
27 / 29 Fotos
Dishfire
- Operated by both the NSA and the GCHQ, Dishfire involved the gathering, storage, and analysis of hundreds of millions of global text messages (SMS), both foreign and domestic, on a daily basis. Sources: (Spyscape) (The Intercept) (American Civil Liberties Union) (Der Spiegel) (The Guardian) (The Independent) (Tor Project) (South China Morning Post) See also: Unexpected ways spies have been caught
© Getty Images
28 / 29 Fotos
The secrets revealed by whistleblower Edward Snowden
- <p>In 2013, Edward Snowden, a National Security Agency (NSA) intelligence subcontractor, leaked classified documents revealing the existence of top-secret surveillance programs. As one of the most notorious whistleblowers of recent times, Snowden was behind the biggest security breach in the agency's history. His disclosures revealed numerous global spying tactics, many carried out by the NSA and the UK's Government Communications Headquarters (GCHQ). In the wake of the sensational revelations, Snowden fled to Moscow. He became a naturalized Russian citizen in 2022.</p><p>Edward Snowden's actions forced US intelligence agencies to admit extensive spying on their own citizens. It also exposed global <a href="https://www.starsinsider.com/lifestyle/808107/trends-in-workplace-surveillance" target="_blank">surveillance</a> operations undertaken by both the NSA and the GCHQ. But what exactly was leaked, and who was affected?</p><p>Click through the following gallery and learn more about the man who stole hundreds of thousands of highly classified secrets and revealed them to the world.</p>
© Getty Images
0 / 29 Fotos
PRISM
- Among the secrets the Snowden documents revealed in 2013 was the existence of the PRISM program. PRISM was the codename for an operation that allowed the National Security Agency (NSA) to collect internet communications from various US internet companies.
© Getty Images
1 / 29 Fotos
PRISM
- PRISM facilitated access by the NSA to emails, documents, photos, and data stored by tech companies, including Facebook, Microsoft, Yahoo, Google, YouTube, Skype, and Apple.
© Getty Images
2 / 29 Fotos
Tempora
- Snowden also revealed the existence of Tempora. This leak exposed the practice by UK-based intelligence and security organization Government Communications Headquarters (GCHQ) of tapping fiber-optic cables to collect, store, and share with the NSA huge amounts of internet users' personal data.
© Getty Images
3 / 29 Fotos
Boundless Informant
- The Boundless Informant program is a vast data analysis and data visualization tool used by the NSA that functions by collecting and counting metadata.
© Getty Images
4 / 29 Fotos
Boundless Informant
- Snowden exposed Boundless Informant in June 2013, explaining that intelligence is gathered from millions of Americans through access to the country's computer and phone networks.
© Getty Images
5 / 29 Fotos
XKeyscore
- In July 2013, Edward Snowden publicly revealed XKeyscore, a secret computer system used by the NSA to access and analyze global internet data.
© Getty Images
6 / 29 Fotos
XKeyscore
- XKeyscore's scope and function is vast. Indeed, it's been described as "NSA's Google." The system comprises at least 700 servers at sites all over the world, all connected to the NSA's analysts.
© Getty Images
7 / 29 Fotos
Follow the Money
- A catchphrase popularized by the 1976 docudrama film 'All the President's Men,' Follow the Money refers to a branch of the NSA charged with tracking and collecting global financial data.
© Getty Images
8 / 29 Fotos
Follow the Money
- Snowden revealed that intel is mainly gathered through credit card transactions, including international payments processed by companies including Visa
© Shutterstock
9 / 29 Fotos
JTRIG
- The Joint Threat Research Intelligence Group (JTRIG) is a unit of GCHQ. It can also be described as a "dirty tricks department," as its mission is to engage in online manipulation, propaganda, and disinformation campaigns.
© Getty Images
10 / 29 Fotos
JTRIG
- Snowden disclosed how JTRIG operations are broken down and assigned a codename. For example, some of the tools include the ability to manipulate the results of online polls ('Underpass'). JTRIG can also source private photographs of targets on Facebook, a procedure known as 'Spring Bishop.'
© Getty Images
11 / 29 Fotos
Nymrod
- The leaked NSA files supplied by Snowden revealed how the agency eavesdropped on allies as well as enemies using a system known as Nymrod.
© Getty Images
12 / 29 Fotos
Nymrod
- Nymrod was also used by GCHQ to target at least 11 world leaders, among them the then-Syrian president Bashar al-Assad and former Ukrainian prime minister Yulia Tymoshenko. The then-German chancellor Angela Merkel was also listed by name, a revelation that strained diplomatic relations with many European countries.
© Getty Images
13 / 29 Fotos
Bullrun and Edgehill
- According to the Snowden documents, Bullrun is a clandestine, highly classified program to crack encryption of online communications and data. It was created to undermine encryption standards using an array of methods including computer network exploitation and interdiction.
© Shutterstock
14 / 29 Fotos
Bullrun and Edgehill
- Interdiction is a process whereby shipments of computer electronics are intercepted before they reach their destination and installed with malicious hardware that can give US intelligence agencies remote access. GCHQ has a similar program codenamed Edgehill.
© Shutterstock
15 / 29 Fotos
MUSCULAR
- Snowden's whistleblowing blew the lid off MUSCULAR, a joint NSA-GCHQ surveillance program that enabled field operatives to break into the main communications links that connect the data centers of Yahoo and Google.
© Getty Images
16 / 29 Fotos
MUSCULAR
- The leaked documents revealed that in a single day, the NSA's so-called "acquisitions directorate" redirected millions of records from Yahoo and Google internal networks to data warehouses at NSA Fort Meade headquarters.
© Getty Images
17 / 29 Fotos
Tailored Access Operations
- Also a result of Snowden's whistleblowing, the wider world became aware of the NSA's cyber-warfare intelligence-gathering unit known as the Office of Tailored Access Operations (TAO).
© Shutterstock
18 / 29 Fotos
Tailored Access Operations
- TAO are essentially government hackers. Their job is to identify, monitor, infiltrate, and gather intelligence on computer systems being used by entities foreign to the United States. At the time of the leaks, TAO had more than 1,000 military and civilian operatives. Today the unit is known as Computer Network Operations.
© Getty Images
19 / 29 Fotos
Mobile phone intercepts
- Snowden's leaks confirmed what many already believed to be true, that intelligence agencies intercepted and collected huge caches of mobile phone communications and emails.
© Shutterstock
20 / 29 Fotos
Mobile phone intercepts
- Not so well known is that this intel was collected from employees of mobile operators to identify security weaknesses in networks that the NSA could exploit for surveillance purposes.
© Shutterstock
21 / 29 Fotos
Optic Nerve
- In February 2014, it was revealed that GCHQ, with assistance from the NSA, surreptitiously collected private webcam still images from users while they were using a Yahoo webcam application.
© Getty Images
22 / 29 Fotos
Optic Nerve
- GCHQ called this underhanded practice the Optic Nerve program. Snowden revealed that data was collected indiscriminately in bulk from users regardless of whether they were an intelligence target or not.
© Getty Images
23 / 29 Fotos
Operation EgotisticalGiraffe
- The bizarrely codenamed Operation EgotisticalGiraffe refers to the NSA's practice of infiltrating and compromising popular social networking platforms. It does this by undermining the Tor network.
© Getty Images
24 / 29 Fotos
Operation EgotisticalGiraffe
- Tor—short for The Onion Routing project—is an open-source privacy network for anonymous web browsing. In 2013, both the GCHQ and the NSA made repeated attempts to identify people using the Tor anonymity service, but were largely unsuccessful.
© Shutterstock
25 / 29 Fotos
Covert operations against China
- Snowden's revelations against the NSA extended to accusing it of hacking foreign mobile phone companies to access millions of private text messages in China. In 2012, text messaging was the most popular form of communication in mainland China.
© Getty Images
26 / 29 Fotos
Dishfire
- The leaked documents also revealed a covert global surveillance collection system and database codenamed Dishfire.
© Shutterstock
27 / 29 Fotos
Dishfire
- Operated by both the NSA and the GCHQ, Dishfire involved the gathering, storage, and analysis of hundreds of millions of global text messages (SMS), both foreign and domestic, on a daily basis. Sources: (Spyscape) (The Intercept) (American Civil Liberties Union) (Der Spiegel) (The Guardian) (The Independent) (Tor Project) (South China Morning Post) See also: Unexpected ways spies have been caught
© Getty Images
28 / 29 Fotos
The secrets revealed by whistleblower Edward Snowden
Learn more about the man who blew the whistle on the intelligence services
© <p>Getty Images</p>
In 2013, Edward Snowden, a National Security Agency (NSA) intelligence subcontractor, leaked classified documents revealing the existence of top-secret surveillance programs. As one of the most notorious whistleblowers of recent times, Snowden was behind the biggest security breach in the agency's history. His disclosures revealed numerous global spying tactics, many carried out by the NSA and the UK's Government Communications Headquarters (GCHQ). In the wake of the sensational revelations, Snowden fled to Moscow. He became a naturalized Russian citizen in 2022.
Edward Snowden's actions forced US intelligence agencies to admit extensive spying on their own citizens. It also exposed global surveillance operations undertaken by both the NSA and the GCHQ. But what exactly was leaked, and who was affected?
Click through the following gallery and learn more about the man who stole hundreds of thousands of highly classified secrets and revealed them to the world.
RECOMMENDED FOR YOU




































MOST READ
- Last Hour
- Last Day
- Last Week