The Surveillance State
How the War on Terror Destroyed the 4th Amendment
On June 5, 2013, a 29-year-old NSA contractor named Edward Snowden changed the world. The documents he leaked revealed that the US government was conducting mass surveillance on a scale that would have been unimaginable to the Founders — collecting every phone call record in America, tapping directly into the servers of Google, Apple, and Facebook, and building a global surveillance infrastructure capable of monitoring the communications of virtually every person on Earth.“Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” Benjamin Franklin wrote those words in 1755. Two hundred and fifty years later, America traded both.
$80B+
Intelligence Budget (2023)
18 agencies, mostly classified
854,000
Top Secret Clearances
More than the population of San Francisco
1,271
Government Spy Orgs
Created or reorganized post-9/11
278,000
Warrantless FBI Searches
Of Americans' data (2022 alone)
The Scale of Surveillance
In 2010, the Washington Post published “Top Secret America,” a two-year investigation that mapped the post-9/11 intelligence apparatus. What they found was staggering:
The Intelligence-Industrial Complex
- • 1,271 government organizations working on counterterrorism, intelligence, and homeland security
- • 1,931 private companies doing top-secret intelligence work
- • 854,000 people holding top-secret security clearances
- • 33 building complexes for top-secret intelligence work built or under construction since 9/11 — equivalent to 3 Pentagons
- • 50,000+ intelligence reports published each year — so many that no one can read them all
The Budget
- • $80+ billion combined intelligence budget (FY2023)
- • $71.7 billion National Intelligence Program (DNI)
- • $26.6 billion Military Intelligence Program
- • NSA budget alone: $10.8 billion (2013, Snowden docs)
- • 18 intelligence agencies in the US Intelligence Community
- • Budget has tripled since pre-9/11 levels (~$26B in 2001)
This is a surveillance apparatus larger than the intelligence services of most countries combined. It employs more people with top-secret clearances than the entire population of San Francisco. It spends more money than the GDP of most nations. And it has proven, again and again, that mass surveillance does not make America safer — it just makes America less free.
What the NSA Is Doing: The Snowden Revelations
Sources: Documents provided by Edward Snowden to The Guardian, The Washington Post, The Intercept, Der Spiegel, and others (2013–present).
PRISM
Revealed: June 6, 2013 (Snowden)Direct access to servers of Google, Apple, Facebook, Microsoft, Yahoo, AOL, Skype, YouTube, and PalTalk. NSA could request emails, chat logs, stored data, VoIP, file transfers, video/voice chat, photos, and social networking details of any non-US person — and inevitably collected vast amounts of US person data.
Scale
Tens of thousands of selectors (email addresses, phone numbers) targeted. 117,675 active surveillance targets under PRISM in 2012.
Legal Basis
Section 702 of FISA Amendments Act (2008). Rubber-stamped by the FISA Court, which approved 99.97% of government surveillance requests between 1979–2012.
UPSTREAM
Revealed: June 2013 (Snowden)Collection of communications directly from fiber optic cables and internet backbone infrastructure. The NSA tapped into the cables that carry global internet traffic — physically splicing into AT&T and other telecom providers' fiber optic lines at facilities like Room 641A at AT&T's San Francisco switching center.
Scale
Collected an estimated 250 million internet communications per year. Captured "about" communications — messages that merely mentioned a surveillance target, sweeping in millions of unrelated communications.
Legal Basis
Section 702 FISA. AT&T, Verizon, and other telecoms granted retroactive immunity for their participation by the FISA Amendments Act of 2008.
XKeyscore
Revealed: July 31, 2013 (Snowden)The NSA's Google. A search engine for surveillance data that allows analysts to search through emails, browsing history, chat logs, and virtually all online activity in real-time. An analyst could type in an email address or name and access a person's entire online history without prior authorization.
Scale
Processed over 20 terabytes of data per day from 700+ servers at 150+ sites worldwide. NSA training slides boasted it collected "nearly everything a typical user does on the internet."
Legal Basis
No individual warrant required for non-US persons. For US persons, the system had "minimization procedures" that were routinely circumvented.
Bulk Phone Metadata (Section 215)
Revealed: June 5, 2013 (Snowden — first revelation)The NSA collected metadata for every phone call made in the United States — who called whom, when, for how long, and from where. Not the content of calls, but the metadata, which can reveal intimate details of a person's life: their doctor, lawyer, lover, AA sponsor, political affiliations.
Scale
Every phone call in America. Billions of records per day. The database contained records going back 5 years.
Legal Basis
Section 215 of the USA PATRIOT Act, as interpreted by the FISA Court in a secret ruling. The law says the government can collect business records "relevant" to an investigation. The FISA Court ruled that ALL phone records were "relevant" because the relevant ones might be in there somewhere.
MUSCULAR
Revealed: October 2013 (Snowden)NSA and GCHQ (UK) tapped into the private fiber optic cables connecting Google and Yahoo data centers worldwide. Unlike PRISM (which went through the front door with legal orders), MUSCULAR went through the back door — intercepting data as it moved between company servers.
Scale
Collected 181 million records in one 30-day period. Google and Yahoo were not informed.
Legal Basis
Conducted overseas to avoid US legal restrictions. The NSA exploited the fact that data traveling between US companies' foreign data centers wasn't protected by US law.
CO-TRAVELER
Revealed: 2013 (Snowden)Collected location data from 5 billion cell phone records per day worldwide, tracking the movements of hundreds of millions of people. Used to identify associates of surveillance targets by analyzing who traveled together.
Scale
5 billion records per day. Global cell tower location data. Could track any cell phone on Earth.
Legal Basis
Executive Order 12333. Collected overseas, so US privacy laws were deemed not to apply — even though many Americans' location data was inevitably collected.
The FISA Court: A Rubber Stamp for Tyranny
The Foreign Intelligence Surveillance Court (FISC), created in 1978, was supposed to be a check on government surveillance power. Instead, it became its enabler. Between 1979 and 2012, the FISA Court approved 33,942 out of 33,949 government surveillance requests — a 99.97% approval rate. It rejected 11 requests in 33 years.
The court operates in total secrecy. Its proceedings are classified. Only the government argues before it — there is no adversarial process, no defense attorney, no one to challenge the government's claims. The judges are appointed by the Chief Justice of the Supreme Court alone, with no Senate confirmation. For decades, a majority of FISA judges were Republican appointees of a single Chief Justice (John Roberts).
The FISA Court issued secret legal opinions that effectively rewrote surveillance law. In the most extreme example, the court ruled that the NSA could collect all phone metadata in America because it was “relevant” to terrorism investigations — interpreting the word “relevant” to mean “everything.” This secret reinterpretation of law was binding but hidden from the public and from most members of Congress.
As Senator Ron Wyden (D-OR), a member of the Intelligence Committee, warned for years before the Snowden revelations: the government was operating under a “secret interpretation of the law” that would shock Americans if they knew about it. He was right — but he couldn't tell anyone because the interpretation itself was classified.
The Domestic Surveillance Arsenal
Section 702 FISA — Warrantless FBI Searches
Section 702 authorizes NSA to target non-US persons abroad. But the collected data includes millions of Americans' communications. The FBI can then search this database for American citizens' communications WITHOUT a warrant. In 2021, the FBI conducted 3.4 million warrantless searches of Americans' data. After a FISA Court rebuke, the number was "reduced" to 278,000 in 2022 — still 278,000 warrantless searches of Americans' private communications.
Scale
278,000 warrantless FBI searches of Americans' data in one year (2022)
Stingray / IMSI Catchers
Cell-site simulators that impersonate cell towers, forcing all nearby phones to connect to them. Used by FBI, DEA, ICE, IRS, US Marshals, and at least 75 local police departments. Intercepts calls, texts, and location data of everyone in range — not just the target. Police departments signed NDAs with the FBI agreeing to drop criminal cases rather than reveal Stingray use in court.
Scale
Used by 75+ federal, state, and local law enforcement agencies. Intercepts data from all phones in range — hundreds to thousands of people.
Fusion Centers
A network of 80+ intelligence-sharing centers across the US, created after 9/11 to facilitate information sharing between federal, state, and local law enforcement. A 2012 Senate investigation found they had produced "no useful intelligence." Instead, they tracked anti-war protesters, Occupy Wall Street activists, Ron Paul supporters, and people buying MREs.
Scale
80+ centers across all 50 states. $1.4 billion federal funding. Senate found "no useful intelligence" produced.
Facial Recognition
The FBI's Next Generation Identification system contains over 640 million face photos — including 21 states' driver's license databases searched without consent. Clearview AI scraped 30+ billion photos from social media and sold facial recognition to 3,100+ government agencies. GAO found that 6 federal agencies used facial recognition without required privacy assessments.
Scale
640 million+ face photos in FBI database. 30+ billion photos scraped by Clearview AI. Used by 3,100+ government agencies.
Pegasus Spyware
Developed by Israeli company NSO Group, Pegasus can turn any smartphone into a complete surveillance device — accessing camera, microphone, messages, calls, emails, location, passwords, and encrypted communications. Sold to governments including Saudi Arabia (used to target Jamal Khashoggi's associates), Mexico, UAE, India, Hungary, and others. In 2021, Apple notified US State Department employees that their iPhones had been compromised by Pegasus.
Scale
Sold to 45+ government clients in 36+ countries. Targets included journalists, human rights activists, opposition politicians, and lawyers.
Total Information Awareness (TIA)
DARPA program (2002) designed to create a massive surveillance database integrating financial records, medical records, travel records, communications, and biometric data for every person in America. When exposed, Congress "defunded" it in 2003 — but its component programs were simply moved to the NSA and other classified programs under different names. The concept was fully realized by the NSA programs Snowden revealed a decade later.
Scale
Designed to monitor every American. "Defunded" by Congress but components survived and expanded under classified programs.
Five Eyes: The Surveillance Alliance
The Five Eyes alliance — the US, UK, Canada, Australia, and New Zealand — is the most powerful intelligence-sharing partnership in history, dating back to World War II. Under this arrangement, each nation conducts surveillance on the others' citizens and shares the results — a convenient workaround for domestic spying restrictions.
The UK's GCHQ operates the Tempora program, which taps directly into transatlantic fiber optic cables, collecting the content (not just metadata) of communications flowing between the US and Europe. This data is shared with the NSA. Because it's collected by a foreign government on foreign soil, it bypasses US legal protections entirely.
Australia's ASD, Canada's CSE, and New Zealand's GCSB perform similar functions — each nation spies on the others' citizens and shares intelligence, allowing all five governments to claim they're not spying on their own people while having access to the exact same data.
Snowden documents revealed the full extent: Five Eyes agencies share raw intelligence data, coordinate collection priorities, and jointly operate surveillance infrastructure across the globe. The alliance extends to additional rings: Nine Eyes (adding Denmark, France, Netherlands, Norway) and Fourteen Eyes (adding Germany, Belgium, Italy, Spain, Sweden). The surveillance web covers the entire Western world.
Section 702: The Backdoor to the 4th Amendment
Section 702 of the FISA Amendments Act is the legal foundation for the most expansive surveillance of Americans' communications in history. Here's how the backdoor works:
- 1. The NSA is authorized to target non-US persons abroad (no warrant needed).
- 2. In doing so, it “incidentally” collects enormous volumes of Americans' communications — every email, call, or message that touches a foreign target.
- 3. This data is stored in searchable databases accessible to the NSA, CIA, FBI, and NCTC.
- 4. The FBI can search this database for Americans' communications without a warrant — using Americans' names, email addresses, or phone numbers as search terms.
- 5. The FBI conducted 278,000 warrantless searches of Americans' data in 2022 alone.
This is the “backdoor search” loophole. The government collects Americans' communications under the pretext of foreign intelligence, then searches that data for domestic law enforcement purposes — all without a warrant, without probable cause, and without the target ever knowing.
In April 2024, Congress reauthorized Section 702 for two more years — over the objections of civil liberties groups from across the political spectrum. An amendment requiring a warrant for FBI searches of Americans' data was defeated by a single vote in the House (212-212). The surveillance state's most powerful tool was preserved by one vote.
💡 Did You Know: Mass Surveillance Doesn't Work
Despite the most extensive surveillance apparatus in human history, the US intelligence community has repeatedly failed to prevent major attacks — while claiming that mass surveillance is essential for national security.
Failures
- • 9/11: NSA had intercepted calls from hijackers but didn't share intelligence
- • Boston Marathon bombing (2013): Russia warned FBI about Tamerlan Tsarnaev twice
- • Fort Hood shooting (2009): NSA intercepted Nidal Hasan's emails with Al-Awlaki
- • Pulse nightclub (2016): FBI investigated Omar Mateen twice, closed the case
- • San Bernardino (2015): Attackers communicated openly on social media
The Evidence
- • Obama's own review board (2013): found bulk phone metadata collection “was not essential to preventing attacks”
- • Privacy and Civil Liberties Oversight Board (2014): found “no instance in which the program directly contributed to the discovery of a previously unknown terrorist plot”
- • NSA internal review: only 1 of 54 claimed successes involved Section 215 bulk collection — and that was a $8,500 wire transfer to a Somali group
The pattern is clear: the government has too much data, not too little. The problem is not collection — it's analysis. Collecting everything from everyone creates a haystack so large that finding the needles becomes impossible. Mass surveillance doesn't prevent terrorism; it prevents effective intelligence analysis.
The Chilling Effect: Surveillance Kills Free Speech
The damage of mass surveillance extends far beyond the government reading your emails. The knowledge that you might be monitored changes behavior — a phenomenon called the “chilling effect.”
A 2016 study by PEN America found that 1 in 6 writers self-censored after learning about NSA surveillance — avoiding topics, not researching certain subjects online, and refraining from communicating with sources in monitored countries. A study published in the Berkeley Technology Law Journal found that Wikipedia traffic to articles about terrorism, Al-Qaeda, and other surveilled topics dropped 20% after the Snowden revelations — people were afraid to even read about certain subjects.
Journalists report difficulty protecting sources. Lawyers report clients unwilling to discuss sensitive matters by phone or email. Activists report self-censorship. Muslim Americans report being afraid to donate to charities, attend mosques, or express political views. The surveillance state doesn't need to actively persecute dissent — the mere possibility of monitoring is enough to suppress it.
As Snowden himself said: “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.”
Edward Snowden: Traitor or Patriot?
Edward Snowden was a 29-year-old NSA contractor working for Booz Allen Hamilton in Hawaii when he made the most consequential decision in the history of American whistleblowing. Over several months, he copied approximately 1.5 million classified documents detailing the NSA's global surveillance programs — and gave them to journalists Glenn Greenwald, Laura Poitras, and Barton Gellman.
The US government charged Snowden with espionage and theft of government property. He fled to Hong Kong, then to Moscow, where he was stranded when the State Department revoked his passport. He has lived in Russia since 2013 and was granted Russian citizenship in 2022.
The government says Snowden endangered national security. But his revelations led to: the USA FREEDOM Act (2015), which ended bulk phone metadata collection; major tech companies implementing end-to-end encryption; public awareness of surveillance that polls show the majority of Americans oppose; and the only meaningful public debate about government surveillance in American history.
Snowden could not have used official whistleblower channels — they don't protect intelligence community contractors, and previous NSA whistleblowers (Thomas Drake, William Binney, J. Kirk Wiebe, Ed Loomis) who went through official channels were prosecuted, harassed, or had their lives destroyed. The system is designed to prevent exactly the kind of disclosure Snowden made.
The question is not whether Snowden broke the law — he did. The question is whether the government should have the power to conduct mass surveillance on its own citizens in secret, shield that surveillance behind classification, and prosecute anyone who tells the public what their government is doing to them. The Founders would have had a clear answer.
The Libertarian Case: The 4th Amendment Is Dead
The Fourth Amendment to the United States Constitution:“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Read that again. Now consider: the NSA collected every phone record in America without a warrant. The FBI searches Americans' communications 278,000 times per year without a warrant. The government taps into the servers of every major tech company. Police use fake cell towers to intercept communications of everyone in a neighborhood. Facial recognition databases contain photos of half the adult population.
The Fourth Amendment doesn't have a “national security” exception. It doesn't have a “terrorism” exception. It doesn't have a “metadata” exception. It says “no warrants shall issue but upon probable cause” — not “unless the FISA Court says it's okay” and not “unless it's really important.”
Benjamin Franklin's warning — “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety” — has been proven prophetic. We gave up the liberty. We didn't get the safety. The intelligence community's own reviews found that mass surveillance was “not essential” to preventing attacks. The Boston bombers, the Fort Hood shooter, the Pulse nightclub attacker — all were known to the FBI before they struck. The haystack was too large to find the needles.
The surveillance state is not a bug of the War on Terror — it is its primary product. The trillions spent, the hundreds of thousands killed, the countries destroyed — all of that would be horrifying enough. But the most lasting damage may be what was built at home: a surveillance infrastructure that treats every American as a suspect, collects their most intimate data without their knowledge or consent, and operates behind a wall of classification that makes accountability impossible.
The infrastructure built to fight terrorists will long outlast the War on Terror. It will be turned — it is already being turned — on domestic protesters, journalists, political dissidents, and ordinary Americans. The technology doesn't care who the target is. And a government that has tasted unlimited surveillance power will never voluntarily give it up. As Senator Frank Church warned in 1975, after investigating the NSA's predecessor programs:“That capability at any time could be turned around on the American people, and no American would have any privacy left... There would be no place to hide.”He was right. We are there.
Sources
- • Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State (2014)
- • Barton Gellman, Dark Mirror: Edward Snowden and the American Surveillance State (2020)
- • Washington Post, “Top Secret America” (2010)
- • The Guardian, NSA Files (2013–present)
- • The Intercept, “The Snowden Archive”
- • Privacy and Civil Liberties Oversight Board, “Report on the Telephone Records Program” (2014)
- • FISA Court annual reports and declassified opinions
- • Congressional Research Service, “Section 702 of FISA” (2024)
- • PEN America, “Chilling Effects: NSA Surveillance Drives US Writers to Self-Censor” (2013)
- • Senate Intelligence Committee investigation into CIA detention and interrogation program (2014)
- • GAO, “Facial Recognition Technology” (2021)
- • EFF, NSA spying documentation and FOIA documents