Skip to content

featuring historical research, writing, and media at st. mary's university

  • World History

    World History

    Menu
    • World History
    • Pre-Classical History (to 600 BCE)
    • Classical History (600 BCE-600 CE)
    • Post-Classical History (600 CE-1492 CE)
    • Early Modern History (1492-1789)
    • Modern History (1789-1914)
    • Global History (1900-present)

    From the Ancient World

    The Battle of Zama: Rome's Vengeance

    Posted by Davis Nickle12/01/2020

    From the Modern World

    The Holy See Takes On The Fight Against Climate Change

    Posted by Victor Rodriguez11/30/2020

    Regional Histories

    Menu
    • African and African American Studies
    • Latin American Studies
  • US History

    Early America

    Menu
    • US-Three Worlds Meet (to 1620)
    • US-Colonization and Settlement (1585-1763)
    • US-Revolution and the New Nation (1754-1820s)
    • US-Expansion and Reform (1801-1861)
    • US-Civil War & Reconstruction (1850-1877)

    Nothing keeps Amberley Snyder from getting back on the horse

    Posted by Amariz Puerta04/07/2019

    The First Girl Scout, Juliette Gordon Low

    Posted by Margaret Maguire12/06/2019

    The Trials that Started the American Revolution: John Adams

    Posted by Andrea Degollado04/26/2020

    The Wet Railing that Solved the Clarence Hiller Murder Case

    Posted by Diamond Davidson04/07/2019

    When An Invisible Threat Took Over the World: COVID-19

    Posted by Aracely Beltran05/27/2020

    Jackie Robinson: An Unexpected Hero of Business and Civil Rights

    Posted by Todd Brauckmiller Jr.11/01/2019

    Al Capone: The Real Life Scarface

    Posted by Raul Vallejo11/15/2019

    Segregation and Activism: Then and Now on the Eastside

    Posted by Shine Trabucco06/10/2019

    Soñar Como Sonia

    Posted by Kayla Sultemeier12/02/2020

    The Brutal Murder of The Black Dahlia

    Posted by Saira Locke10/15/2019

    Fortnite and Video Game Violence

    Posted by Elizabeth Maguire12/08/2019

    MS-13: Origin of the Most Dangerous Gang in the World

    Posted by Juliana Montoya03/06/2020

    Excelsior!!! To The King of Comic Books

    Posted by Eliezer Leal10/25/2019

    Bryan Stevenson: Justice in the Deep South

    Posted by Bailey Godwin11/05/2020

    Jaime Cuervo: La Opresión Ignorada Del Latinoamericano

    Posted by Matthew Bennett11/25/2020

    How the Soviet Union Compelled the United States to Build the World's Fastest Jet: The Lockheed A-12 OXCART

    Posted by Nathaniel Bielawski05/07/2020

    Cicada 3301 - An Epic Mystery

    Posted by Stephen Talik11/06/2020

    Mirror Mirror on the Wall Who’s the Fairest? We All Are. Jameela Jamil’s Fight for Body Positivity and Female Empowerment

    Posted by Maria Martinez05/12/2019

    The First Social Distancing: Examining the 1995 Heat Wave of Chicago From a Social Perspective

    Posted by Tavion Varela11/09/2020

    Feeding Students' Mind and Body: When Education Means Providing Meals

    Posted by Yamel Herrera10/30/2020

    Behind The Tapes: The Actions Taken Towards Impeaching Nixon

    Posted by Thalia Romo11/15/2019

    Walter Cronkite: The Most Trusted Man in America

    Posted by Lesley Martinez04/07/2020

    BEYONCÉ: The Early Days of the Worldwide Legend

    Posted by Sydney Hardeman10/01/2019

    ¿Importa el idioma que hablas?

    Posted by Kimberly Parker11/01/2020

    Quiet Man On the Run: The Story of Frank Abagnale, World-Renound Con-Artist

    Posted by Lilia Seijas11/01/2019

    To Love A Serial Killer

    Posted by Krystal Rodriguez04/17/2019

    The Lone Star State: The Reality of Gun Legislation In Texas

    Posted by Sofia Almanzan03/30/2020

    The Duchess of Windsor—How the IRS Helped Create Same Gender Marriage

    Posted by Christopher Metta Bexar04/07/2019

    The Genesis Block of Bitcoin

    Posted by Pablo Ruiz12/08/2019

    RuPaul's Influence On Drag: You Better Work!

    Posted by Nadia Carrasco04/07/2019

    Contemporary America

    Menu
    • US-Industrial United States (1870-1900)
    • US-Emergence of Modern America (1890-1930)
    • US-Great Depression & WWII (1929-1945)
    • US-Postwar United States (1945-early 1970s)
    • US-Contemporary United States (1968-present)
  • Themes

    SPICE Categories

    Specialty Categories

    Special Themes

    Menu
    • Social History
    • Political History
    • Environmental History
    • Cultural History
    • Economic History
    Menu
    • Art History
    • Business
    • Crime
    • Gender Studies
    • Human Rights
    • Public Health and Medicine
    • International Relations
    • Linguistics
    Menu
    • Military History
    • Music
    • People
    • Psychology
    • Religion
    • Science & Technology
    • Sports
    Menu
    • Catholic Heritage
    • The Year 1968
    • COVID-19
    • Social Justice
    • Spanish Language
  • Showcase

    Showcase Editions

    • Vol 1 – 2016
      • Vol 1 No 1 Aug-Sep 2016
      • Vol 1 No 2 Oct-Nov 2016
    • Vol 2 – 2017
      • Vol 2 No 1 Jan-Feb 2017
      • Vol 2 No 2 Mar-Apr 2017
      • Vol 2 No 3 Aug-Sep 2017
      • Vol 2 No 4 Oct-Nov 2017
    • Vol 3 – 2018
      • Vol 3 No 1 Jan-Feb 2018
      • Vol 3 No 2 Mar-Apr 2018
      • Vol 3 No 3 Aug-Sep 2018
      • Vol 3 No 4 Oct-Nov 2018
    • Vol 4 – 2019
      • Vol 4 No 1 Jan-Feb 2019
      • Vol 4 No 2 Mar-Apr 2019
      • Vol 4 No 3 Aug-Sep 2019
      • Vol 4 No 4 Oct-Nov 2019
    • Vol 5 – 2020
      • Vol 5 No 1 Jan-Feb 2020
      • Vol 5 No 2 Mar-Apr 2020
      • Vol 5 No 3 Aug-Sep 2020
    Menu
    • Vol 1 – 2016
      • Vol 1 No 1 Aug-Sep 2016
      • Vol 1 No 2 Oct-Nov 2016
    • Vol 2 – 2017
      • Vol 2 No 1 Jan-Feb 2017
      • Vol 2 No 2 Mar-Apr 2017
      • Vol 2 No 3 Aug-Sep 2017
      • Vol 2 No 4 Oct-Nov 2017
    • Vol 3 – 2018
      • Vol 3 No 1 Jan-Feb 2018
      • Vol 3 No 2 Mar-Apr 2018
      • Vol 3 No 3 Aug-Sep 2018
      • Vol 3 No 4 Oct-Nov 2018
    • Vol 4 – 2019
      • Vol 4 No 1 Jan-Feb 2019
      • Vol 4 No 2 Mar-Apr 2019
      • Vol 4 No 3 Aug-Sep 2019
      • Vol 4 No 4 Oct-Nov 2019
    • Vol 5 – 2020
      • Vol 5 No 1 Jan-Feb 2020
      • Vol 5 No 2 Mar-Apr 2020
      • Vol 5 No 3 Aug-Sep 2020
  • About

    Course Readings

    Article Indexes

    About Us

    Menu
    • Course Readings – SC 3300 – Nash
    • Course Readings – SMC 1301 – Wieck
    • Course Readings – PO 4334 – Dr Celine
    Menu
    • Course Readings – HS 2321 – Whitener
    • Course Readings – HS 2322 – Whitener
    • Course Readings – SMC 1301 – Whitener
    Menu
    • Our Article/Author Index
    • Award Winning Articles
    Menu
    • Our StMU History Media Project
    • Our Faculty Consultants
    • Our Writers
    • Contact Us
  • Crime, Cultural History, Descriptive Article, People, Political History, Science & Technology, United States History, US-Contemporary United States (1968-present)
  • April 4, 2019

Edward Snowden: The Inside Scoop On The World’s Most Infamous Whistleblower

Edward Snowden, NSA whistleblower and political exile, circa June 6, 2013 | Courtesy of Wikimedia Commons
Edward Snowden, NSA whistleblower and political exile, circa June 6, 2013 | Courtesy of Wikimedia Commons
Ryan Estes

Ryan Estes

In the world today, privacy is highly valued. People use passwords to unlock mobile phones and laptops, and many people live in neighborhoods that are gated communities. Many Americans take their privacy for granted, and they do not think about how the United States government handles their sensitive information. Edward Snowden was the hero that U.S. citizens never knew they needed.

In his early twenties, Snowden began working for the Central Intelligence Agency as a telecommunications support officer. He enjoyed relative success as he spent his time at the CIA station in Geneva, protecting the security of the CIA’s computer systems. However, as Snowden continued to savor his prosperity, the unexpected happened. He lost $20,000 in one month in his options speculations, an amount that “represented almost a third of his annual salary.”1 As he often did, Snowden vented on the website Ars Technica, “a publication devoted to technology.”2 He criticized those who questioned his financial judgment and blamed his losses on government officials. As his anger continued to increase, suspicion concurrently grew that Snowden had attempted to break into classified computer files for which he did not have clearance. As a result, Snowden underwent a two-year evaluation and took a polygraph test. The results were concerning, and Snowden’s superior at the CIA placed a derogatory comment in his file.3

To expand, Snowden legally had the right to use the CIA’s computer system in his employment as a communications officer. However, he threatened the security of the system by adding code to it in an attempt to break into classified computer files. As a result, Snowden was threatened with a punitive investigation. Snowden accredited the derogatory comment in his file to the incompetence, blindness, and errors of his superiors. If Snowden was investigated, he would lose his security clearance with the CIA temporarily. With little to no choice left to make, Snowden avoided the investigation by resigning from the CIA and applying to a private subsidiary of the Dell Computer Company.4

Unknowingly, Snowden wanted to work for a company that was just beginning to toy with managing governmental computer systems. The National Security Agency had given the task of rearranging the backup systems at its regional bases to Dell. The NSA’s request created a lot of demand for independent contractors. An independent contractor is “a person or entity contracted to perform work or provide service to another entity as a non-employee.”5 Snowden applied to work at the NSA regional base in Japan. A qualification that set Snowden apart from other candidates and allowed him to start working immediately was his top secret clearance from the CIA. Snowden joined Dell swiftly and quietly; the CIA could not inform Dell or the NSA about their security concerns without violating government privacy regulations.6

After having several jobs at Dell, Snowden became a system administrator. This position gave him direct access to the NSA’s computers. Snowden’s very monotonous job involved sitting in front of a computer all day to make sure that there were no complications in the transfer of NSA files from Maryland to Japan. Eventually, Snowden claimed to have found a major flaw. This defect, according to Snowden, allowed a “rogue system administrator in Japan (to) steal secret data without anyone else’s realizing that it had been stolen.”7

Seal of the National Security Agency. Edward Snowden worked for the Agency from 2009-2013 | Courtesy of Wikimedia Commons

While still on Dell’s payroll, Snowden made a ten day trip to India. Claiming to be “working at the US embassy,” Snowden was actually attending Koenig Solutions, which was a school that provided classes on programming and computer hacking. Snowden claimed to have only taken classes in programming. However, school records indicated that he had paid for a course called “Ethical Hacking.” This course taught Snowden the fundamentals of illicit hacking, from breaking into files to capturing the passwords of others. This course also taught Snowden about tools such as SpyEye and Zeus, which hackers use to bypass security systems. As Snowden flew back to Japan, he was well prepared to hack into the NSA’s computer systems, if he ever felt the need to do so.8

As Snowden’s contract in Japan neared its end, Dell offered him a job in the United States. He worked in Annapolis, solving problems for corporate clients at Dell headquarters. As time went on, Snowden tried unsuccessfully to inform NSA officials of the “illicit surveillance” of citizens by the United States government. According to Snowden, none of the NSA officials he spoke to took any action to stop these surveillance practices. In an interview with The Guardian, Snowden said: “They [the NSA] are intent on making every conversation and every form of behavior in the world known to them.” In addition, Snowden criticized his own employer on Ars Technica. Railing against the apparent alliance between corporate America and the intelligence community, Snowden did not hold back in his criticism of Dell. He wrote: “It really concerns me how little this sort of corporate behavior bothers those outside of technology circles. (Corporate assistance to U.S. intelligence) was entirely within our control to stop.”9

Soon after Snowden vented on the internet about his increasing frustrations, he dodged a bullet that could have ended his career. Snowden’s security clearance with the CIA ran out, so he had to apply for a new one. In the late 1990’s the Clinton administration cut the size of the government by handing the execution of tasks that could be done more efficiently by for-profit companies to said companies. In effect, the Clinton administration privatized these tasks. U.S. Investigations Services, owned by the private equity fund Carlyle Group, won the contract to administer NSA background checks. Eventually, the Carlyle Group sold its rights to a different financial group, Providence Equity Partners. Providence Equity Partners measured their success by how much profit they made. In order to get as much profit as they could from administering these background checks, U.S. Investigations Services had to cut the amount of time they used for each background check. This was because they would not make more money if they held prolonged investigations. As a result, many background checks were rushed and incomplete. The CIA did not share its files with private companies such as Providence Equity Partners. Therefore, the U.S. Investigations Services did not have access to Snowden’s CIA files. All of Snowden’s previous grievances and the threatened investigation from his time at the CIA went undetected. Snowden was quickly given a new security clearance and was able to continue working for Dell without raising any alarms.10

Shortly after receiving his new security clearance, Snowden was offered a new position at the NSA’s Kunia regional base in Hawaii. There, Snowden was a system administrator on the NSA’s backup system. At the time, the NSA was still in the process of upgrading its security protocols to ones that would inspect suspicious activity as anomalies occurred. Similar to Snowden’s job in Japan, he was able to work alone in Hawaii. This lack of supervision provided ample chances for system administrators like Snowden to steal documents if they so desired.11

Part of Snowden’s job was transferring files held at Fort Meade to backup computers in Hawaii. Snowden was well aware of the opportunities he had to steal files as a system administrator, as Hawaii did not audit the movement of documents from one location to another. This lack of an auditing system allowed Snowden to copy classified data to a thumb drive anonymously. Many of the documents Snowden copied were on the NSANet, a database that held NSA, CIA, and Pentagon secrets. Snowden acted illicitly in order to gain leverage over the NSA, in an attempt to avoid an approaching “dark future.” This “dark future,” according to Snowden, was a future in which the elites know everything about United States citizens. In order to avoid the “dark future,” a U.S. citizen would have to gather information about the elites. Snowden was in a position to do just that as a system administrator with a sensitive compartmented information clearance and a pass into an NSA regional base.12

Eventually, Snowden quit his job in Hawaii and became an analyst for the NSA’s highly sensitive National Threat Operations Center. With his scorn for the way the U.S. government handled national security at a peak, Snowden prepared to carry out espionage. Never intending to work at the National Threat Operations Center for long, Snowden fabricated an excuse to take a medical leave of absence. Claiming to suffer from epilepsy, Snowden was granted time off a month in advance. Over the course of four weeks, Snowden pulled off an elaborate heist that gave him access to the NSA’s most closely guarded secrets.13

First, Snowden had to get the passwords to up to twenty-four compartments at the National Threat Operations Center. Doing so was a huge risk, as intelligence professionals who worked for the NSA were forbidden to share their passwords to unauthorized parties and were required to report anyone who asked for their passwords. Somehow, Snowden was able to get these twenty-four passwords, giving him access to the United States’ most closely protected intelligence secrets. Next, Snowden used pre-programmed robotic spiders to comb through over one million documents. These spiders sifted through every single document, highlighting files that Snowden deemed important to his mission. After the spiders concluded their search, Snowden had to find a way to transfer the stolen files to a computer with an opened USB port. Though difficult, Snowden eventually succeeded in downloading hundreds of thousands of potentially harmful documents to an unsealed computer. At the conclusion of his operation, Snowden mobilized his documents by transferring everything on the computer to thumb drives. By this time, Snowden was ready to take his “medical leave,” which he did the following day.14

Snowden departed Honolulu for Hong Kong, taking numerous NSA secrets with him. As Snowden planned a way to release the information he had to the public, he attempted to set up meetings with several journalists. Ultimately, Laura Poitras and The Guardian’s Glenn Greenwald agreed to meet Snowden in his hotel room. There, Snowden was interviewed about his shocking discoveries. With the data Snowden gave them both on and off camera, Greenwald was able to pen the article that would forever change the American public’s understanding of the way the U.S. government handles their private information. The article Greenwald published was headlined “NSA Collecting Phone Records of Millions of Verizon Customers Daily.” The sub-title read “Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama.” Hours later, a second story was published by The Washington Post. This story detailed the PRISM program, a joint FBI-NSA-CIA operation that gathered data on not only foreign terrorists but also on American citizens.15

Edward Snowden supporters in Hong Kong. Locals praised Snowden for his actions since they were trying to maintain Hong Kong’s autonomy from China, circa June 15, 2013 | Courtesy of Wikipedia

In the aftermath of the publication of these stories, Snowden desired to reveal himself as the informant before the U.S. government started searching for the culprit. To accomplish this, Snowden was interviewed by Glenn Greenwald in a twelve minute video titled “Whistleblower.” In the video, Snowden described how the NSA was watching U.S. citizens. After filming concluded, Snowden insisted on the immediate airing of the self-incriminating video, saying “I want to identify myself as the person behind these disclosures.” The video was released with a Guardian story titled “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations.”16

The United States Department of Justice charged Snowden with espionage, forcing him to ask for haven in China, North Korea, and Russia. Snowden eventually found asylum in Russia, a country that was not “intimidated by the threats of reprisals by the United States.” To this day, Snowden resides in Moscow.17

Protestors rally against NSA surveillance. The information Edward Snowden leaked forever changed the way global citizens feel and think about their privacy, by Fibonacci Blue, circa June 18, 2013 | Courtesy of Flickr

Snowden’s revelations about U.S. intelligence secrets caused many different reactions among both politicians and citizens. President Obama, leaders of both houses of Congress, and many citizens roundly denounced Snowden for betraying American secrets. In contrast, some U.S. citizens praised Snowden for his disclosures. In the end, Snowden’s actions caused many people to become angry about domestic surveillance. People began to question their government’s behavior instead of blindly being victims to its twisted policies. Facing pressure from the general public, the NSA and U.S. government were forced to re-evaluate the ways they ensured the security of the American people. Edward Snowden was able to bring the government to its knees from the inside, willingly executing an elaborate heist for the sake of the enlightenment of the American people.18

  1. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 24. ↵
  2. Ars Technica, last modified 2019, https://arstechnica.com/. ↵
  3. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 23-25. ↵
  4. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 26-29. ↵
  5. Will Kenton,  “Independent Contractor,” Investopedia (blog) March 12, 2019. Accessed March 25, 2019. https://www.investopedia.com/terms/i/independent-contractor.asp. ↵
  6. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 29-30. ↵
  7. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 32. ↵
  8. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 33. ↵
  9. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 33-35. ↵
  10. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 35-36. ↵
  11. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 36. ↵
  12. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 44-47. ↵
  13. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 78-79. ↵
  14. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 79-80. ↵
  15. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 81-94. ↵
  16. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 94-95. ↵
  17. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 107. ↵
  18. Edward J. Epstein, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Alfred A. Knopf, 2017), 125-126. ↵

Tags from the story

  • computer hacking, Edward Snowden, espionage, NSA

Share this post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email
Ryan Estes

Ryan Estes

Author Portfolio Page

This Post Has 51 Comments

  1. Avatar
    Alison Morales-Aguilar 20 Aug 2020 Reply

    Of course, like most people here, I had heard about Snowden and his accomplishments before. However, I never knew that he made so many mistakes in his early days. When I think of Snowden I think of an intelligent, suave hacker that risked his life for the citizens of the United States. Hearing about his early days and how he almost got his clearance taken away is interesting. Perhaps the most interesting part of your article is the clear timeline from Snowden’s beginning to his release of all the classified documents.

Comments navigation

Previous commentPrevious

Leave a Reply to Mia Hernandez Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

StMU History Media

A Student Organization of St. Mary's University of San Antonio Texas

Sponsors

  • College of Arts, Humanities, and Social Sciences, St. Mary's University
  • Department of History, St. Mary's University
  • Department of Political Science, St. Mary's University
  • Center for Catholic Studies, St. Mary's University

Support Services

  • The Learning Assistance Center, St. Mary's University
  • Louis J. Blume Library Services, St. Mary's University
  • STRIVE Career Center, St. Mary's University
  • Academic Technology Services, St. Mary's University

About

  • About Us
  • Our Authors
  • Our Archive
  • Contacts

© All rights reserved

Twitter
Facebook
Pinterest