|At least they have a bad-ass logo|
Who would actually be caught by these obvious, basic authoritarian surveillance practices? The vast majority will be innocent people, and that's where the real problem lies. Otherwise, they might be better called "The Darwinian Solution to the Problem of Stupid and Amateur Terrorists". The solution, that is, to the extent that stupid and amateur terrorists are an actual problem. It seems that, over the last few years, the FBI had recruited, entrapped, supplied, funded and encouraged most of the 'terrorists' they then prosecuted. It now appears likely to me that these sort of surveillance programs are how they originally located those targets. I'll leave it to others to decide how valuable they think a program that by definition can only catch the delusional and the rank amateur, but for me, well, I have trouble believing these programs are protecting me from much of a threat.
Real criminals and terrorists have been devising effective tradecraft counters to this kind of electronic communication surveillance for over a decade. It's worth noting that the Abottabad compound where Osama bin Laden died hard did not have an electronic connection to the outside world, and his support staff did face to face meetings, not phone calls. The delay ('latency' in ELINT speak) was well worth it in terms of operational security. It is well understood in these circles that government agencies often don't even try to intercept message content, not because of legal or constitutional niceties, but because real bad guys use strong encryption. It is the meta data around those messages - call patterns, cell and network member IDs and locations that are the only available data.
Have you ever been in a poor neighborhood, pretty much anywhere in the world? Go into a liquor store, a little bodega or a shop in a market. You will be able to buy, for cash, prepaid cell phones, the cheap hand-helds popularized on the TV show "The Wire" as 'burners'. They are cheap, disposable and untraceable. If you get one of the TMobile variety, and prepay at least $100 in airtime, it will not expire for one year. If you don't have one, well, think about it in terms of an 'investment'. For that matter, you can buy a cheap Windows computer. If you only ever boot it from a Linux USB drive, it will look like a brand new, unused computer with all your data and history on the USB drive, which can be hidden, destroyed or tossed a lot easier than a computer can. The point is that anybody who's life, freedom or mission success is dependent on avoiding government surveillance already knows how to avoid government surveillance. The whole thing is pointless, endless and useless.
An interesting point of speculation is how these revelations happened, and why they all came to light now. One entirely plausible thought is that the exposure of these programs was engineered by the Chinese government, just as global pique at Chinese cyber-espionage is growing into a firestorm. It may not be coincidental that this same week President Obama is meeting with President Xi - if the Chinese knew about these programs and wanted to put Obama on the cyber-defensive, this would have been a pretty good way to do it. Apparently, the leaker fully expects to be identified and prosecuted, so we can expect to know more about this in the future. But here's the thing - it's kind of like murder. Once you're wanted for a murder, the inhibition to commit further murders is removed. As the old saying goes, they can only hang you once. At this point, there really is no reason why the leakers that have provided the revelations of this week shouldn't go all in with everything they can get out of the building.
One conclusion is a certainty: Your electronic documents, messages and searches are subject to government surveillance, and you really can't expect constitutional guarantees to protect them. The fight for personal privacy in the age of the internet is over, and corporations and government won. If you find this bothersome, there are actions you can take. You can look for providers of internet services that are not in the US, and are not subject to the kind of coercion the NSA used against the big providers like Google, Microsoft and Apple. You can get a VPN for a few dollars a month. Most of all, you can encrypt. Real Public Key encryption, done right with a large enough key, cannot be realistically cracked, even by agencies like the NSA.
So ultimately, what to think about all these revelations of government electronic surveillance? It really doesn't matter. As long as Congress refuses to limit the surveillance and war-making power of the Executive, and as long as the Judiciary is unwilling to aggressively protect any constitutional protections except the Second Amendment, then we have no democratic recourse. In light of the lack of a functioning Constitutional democracy, we have a kind of hybrid-autocracy with certain kinds of freedoms but no real institutional rule of law.