Edward Snowden
Appears in 18 conspiracy theories
Five Eyes — Global Surveillance Alliance
The UKUSA intelligence-sharing agreement between US, UK, Canada, Australia, and New Zealand creates a global SIGINT network that enables each nation to spy on the others' citizens, circumventing domestic surveillance laws.
Government Cover-Ups — A Documented History
A comprehensive overview of confirmed government cover-ups, from the Gulf of Tonkin to NSA mass surveillance, documenting cases where conspiracy theories turned out to be true.
NSA Domestic Spying
NSA PRISM — Mass Surveillance of Internet Users
The confirmed NSA program revealed by Edward Snowden in 2013, collecting data from Google, Facebook, Apple, Microsoft, and other tech companies.
Total Surveillance State
The confirmed reality that intelligence agencies conduct mass surveillance of digital communications globally, with theorists arguing the scope goes far beyond what Snowden revealed.
WikiLeaks — Conspiracy Theory or Conspiracy Fact?
WikiLeaks published millions of classified documents exposing war crimes, diplomatic duplicity, CIA hacking, and political manipulation. Was Julian Assange a transparency hero or a foreign intelligence asset? The answer depends on which leak you're talking about.
CIA / Private Sector Revolving Door
Over 70% of the U.S. intelligence budget goes to private contractors. How the line between spy agency and private company disappeared, and why it matters.
Erosion of Civil Liberties Conspiracy
COINTELPRO Tactics Still Active Today?
COINTELPRO was officially shut down in 1971. But evidence of continued FBI infiltration of protest movements — BLM, Muslim communities, environmental groups — suggests the playbook never really went away.
GCHQ Tempora — UK Taps All Undersea Internet Cables
Snowden documents revealed GCHQ's Tempora program tapped fiber-optic cables carrying internet traffic through the UK, storing content for 3 days and metadata for 30 days.
Economic Espionage — US Spying on Allies for Corporations
European Parliament investigations confirmed that the NSA's ECHELON surveillance network was used for economic espionage — giving Boeing inside intelligence on Airbus bids. This isn't a theory. It's confirmed.
Internet Privacy Conspiracy
Tech giants collect, monetize, and share your data on a scale that makes the NSA jealous. The conspiracy isn't secret — it's in the terms of service you clicked 'agree' on.
Journalist Whistleblowers and Their Fates
The stories of journalists who exposed major conspiracies and cover-ups, and the professional destruction, legal persecution, and suspicious deaths some faced as a result.
NSA Backdoors in Encryption Standards (Dual EC DRBG)
How the NSA secretly weakened encryption standards and paid RSA Security $10 million to use a compromised random number generator. The confirmed story of Dual EC DRBG.
NSA XKeyscore — Search Engine for Global Internet
NSA's XKeyscore lets analysts search through emails, chats, browsing history, and social media of nearly any internet user worldwide. Confirmed by Snowden documents.
Government Social Media Manipulation
Documented programs by which governments manipulate social media — from GCHQ's JTRIG to Russia's Internet Research Agency and Cambridge Analytica's data harvesting.
Total Information Awareness — DARPA Mass Surveillance Program
How John Poindexter's Total Information Awareness program was publicly defunded by Congress in 2003 but reportedly continued under classified programs. Confirmed history examined.
NSA Utah Data Center — Capturing All Communications
The NSA's massive Utah Data Center in Bluffdale stores unprecedented volumes of intercepted communications. Confirmed by Snowden documents and official admissions.