This is everything Edward Snowden revealed in just one year of unprecedented top-secret leaks

In June 2013, The Guardian reported the first leak based on top-secret documents that then-29-year-old Edward Snowden stole from the National Security Agency (NSA). At the time, Snowden worked as an intelligence contractor for Booz Allen Hamilton in Hawaii.

That leak would certainly not be the last. In the years since, more than 7,000 top secret documents have been released by journalists Snowden entrusted them to, which some believe is less than 1% of the entire archive.

Now, with the film "Snowden" premiering Friday, it's worth taking a look back at what secrets he actually revealed. We've compiled every single leak that came out in the first year of the Snowden saga, though there were many more that came later.

Snowden allegedly downloaded up to 1.5 million files before jetting from Hawaii to Hong Kong to meet with journalists Glenn Greenwald and Laura Poitras. After he handed off his treasure-trove of documents, he flew from Hong Kong and later became stranded in Moscow. His future was far from certain as the journalists he trusted started revealing his secrets.

See photos of Edward Snowden through the years:

Everything Edward Snowden
See Gallery
Everything Edward Snowden
NSA former intelligence contractor Edward Snowden ponders as he participates via video link from Russia to a parliamentary hearing on the subject of 'Improving the protection of whistleblowers' on June 23, 2015, at the Council of Europe in Strasbourg, northeastern France. Snowden, who has been granted asylum in Russia, is being sought by Washington which has branded him a hacker and a traitor who endangered lives by revealing the extent of the NSA spying program. AFP PHOTO / FREDERICK FLORIN (Photo credit should read FREDERICK FLORIN/AFP/Getty Images)
NEW YORK, NY - MAY 8: The former National Security Agency (NSA) contractor and leaker Edward Snowden's bust on display as a 'special guest project' in an annual collaborative exhibition called SEVEN at The Boiler, a Brooklyn art gallery, in New York on May 8, 2015. The bust was illegally installed in Brooklyns Fort Greene Park last month. (Photo by Bilgin S. Sasmaz/Anadolu Agency/Getty Images)
BERLIN, GERMANY - AUGUST 06: Half ripped of flyer with a portrait of Edward Snowden and the request to grant him asylum on August 06, 2014, in Berlin, Germany. Edward Snowden came to international attention after disclosing to several media outlets thousands of classified documents that he acquired while working as an NSA contractor for Dell and Booz Allen Hamilton. (Photo by Thomas Trutschel/Photothek via Getty Images)***Local Caption***
NEW YORK, NY - OCTOBER 11: General view of atmosphere at the Edward Snowden Interviewed by Jane Mayer at the MasterCard stage at SVA Theatre during The New Yorker Festival 2014 on October 11, 2014 in New York City. (Photo by Bryan Bedder/Getty Images for The New Yorker)
DRESDEN, GERMANY - JANUARY 05: A sticker demanding asylum for whistleblower and former NSA worker Edward Snowden hangs stuck to a lamppost on January 5, 2015 in Dresden, Germany. Many Germans favour granting Snowden asylum in Germany following reports that the NSA has conducted extensive eavesrodpping operations in Germany and even listened in on the mobile phone of German Chancellor Angela Merkel. (Photo by Sean Gallup/Getty Images)
Fugitive US intelligence leaker Edward Snowden is shown on a livestream from Moscow during the Right Livelihood Award ceremony at the Swedish Parliament, in Stockholm, on December 1, 2014. Snowden was awarded the Right Livelihood Honorary Award 'for his courage and skill in revealing the unprecedented extent of state surveillance violating basic democratic processes and constitutional rights. The Right Livelihood Award was founded by journalist and professional philatelist Jakob von Uexkull in 1980. AFP PHOTO / TT NEWS AGENCY / Pontus Lundahl / SWEDEN OUT (Photo credit should read PONTUS LUNDAHL/AFP/Getty Images)
BERLIN, GERMANY - DECEMBER 14: Former German Interior Minister Gerhard Baum speaks as former National Security Agency (NSA) contractor turned whistleblower Edward Snowden is seen on a video conference screen during an award ceremony for the Carl von Ossietzky journalism prize on December 14, 2014 in Berlin, Germany. Filmmaker Laura Poitras, Snowden and journalist Glenn Greenwald (the latter two in absentia) were awarded the prize by the International League for Human Rights for having 'put their personal freedom on the line to expose abuse of power' by Germany and the United States in their revelations of the extent of government surveillance on ordinary citizens in the name of 'national security' in the wake of terrorist attacks. The prize is named for journalist and Nobel Peace Prize winner Ossietzky, who died from complications from being held as a dissident in a Nazi concentration camp. A bid to allow Snowden, who has temporary asylum in Moscow, to testify in Berlin before an NSA parliamentary inquiry is ongoing. (Photo by Adam Berry/Getty Images)
AUCKLAND, NEW ZEALAND - SEPTEMBER 15: Edward Snowden, Internet Party leader Laila Harre, Robert Amsterdam, Glenn Greenwald and Kim Dotcom discuss the revelations about New Zealand's mass surveillance at Auckland Town Hall on September 15, 2014 in Auckland, New Zealand. The general election in New Zealand will be held this weekend, on 20 September 2014. (Photo by Hannah Peters/Getty Images)
AUSTIN, TX - MARCH 10: NSA whistleblower Edward Snowden speaks via videoconference at 'A Virtual Conversation with Edward Snowden' during the 2014 SXSW Music, Film + Interactive Festival at Austin Convention Center on March 10, 2014 in Austin, Texas. (Photo by Travis P Ball/Getty Images for SXSW)
Activists take part in a demonstration asking Brazilian President Dilma Rousseff (L) to grant Edward Snowden political asylum during the Expo Catadores 2013 at the Anhembi Pavilion in Sao Paulo, Brazil, on December 19, 2013. AFP PHOTO / Miguel SCHINCARIOL (Photo credit should read Miguel Schincariol/AFP/Getty Images)

Here is everything that Snowden's leaks revealed between 2013 and 2014:

• With a top-secret court order, the NSA collected the telephone records from millions of Verizon customers. — June 5, 2013

NSA PRISM slideHandout/Getty Images• The NSA accessed and collected data through backdoors into U.S. internet companies, such as Google and Facebook, with a program called Prism. — June 6, 2013

• An 18-page presidential memo shows Obama ordering intelligence officials to draw up a list of overseas targets for cyber attacks. — June 7, 2013

Documents reveal the NSA's Boundless Informant program, which gives the agency near real-time ability to understand how much intelligence coverage there is on certain areas through use of a "heat map." — June 8, 2013

• The NSA was hacking computers in Hong Kong and mainland China, little of which were military systems. — June 13, 2013

Britain's GCHQ (its intelligence agency) intercepted phone and internet communications of foreign politicians attending two G20 meetings in London in 2009. — June 16, 2013

Top-secret procedures show steps the NSA must take to target and collect data from "non-U.S. persons" and how it must minimize data collected on U.S. citizens. — June 20, 2013

Britain's GCHQ taps fiber-optic cables to collect and store global email messages, Facebook posts, internet histories and calls, and then shares the data with the NSA. — June 21, 2013

• The NSA has a program codenamed EvilOlive that collects and stores large quantities of Americans' internet metadata, which contains only certain information about online content. Email metadata, for example, reveals sender and recipient address and time but not content or subject. — June 27, 2013

• Until 2011, the Obama administration permitted the NSA's continued collection of vast amounts of Americans' email and internet metadata under a Bush-era program called Stellar Wind. — June 27, 2013

• The U.S. government bugged the offices of the European Union in New York, Washington, D.C., and Brussels. — June 29, 2013

• The U.S. government spies on at least 38 foreign embassies and missions, using a variety of electronic surveillance methods. — June 30, 2013

• The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens. — June 30, 2013

Using a program called Fairview, the NSA intercepts internet and phone call data of Brazilian citizens. — July 6, 2013

Monitoring stations set up in Australia and New Zealand help feed data back to NSA's XKeyscore program. — July 6, 2013

• The NSA conducts surveillance on citizens in a number of Latin American countries, including Venezuela, Colombia, Argentina, Panama, Ecuador, Peru, and others. The agency also sought information on oil, energy, and trade. — July 9, 2013

The Washington Post publishes a new slide detailing NSA's "Upstream" program of collecting communications from tech companies through fiber-optic cables to then feed into its Prism database. — July 10, 2013

Germany's Federal Intelligence Service (BND) help contribute data to the NSA's XKeyscore program. — July 20, 2013

NSA2Handout/Getty Images• NSA analysts, using the XKeyscore program, can search through enormous databases of emails, online chats, and browsing histories of targets. — July 31, 2013

The U.S. government paid Britain's GCHQ roughly $155 million over three years to gain access and influence over its spying programs. — Aug. 1, 2013

Seven of the world's leading telecommunications companies provide GCHQ with secret, unlimited access to their network of undersea cables. — Aug. 2, 2013

• The NSA provided surveillance to U.S. diplomats in order to give them the upper hand in negotiations at the U.N. Summit of the Americas. — Aug. 2, 2013

• The NSA sifts through vast amounts of Americans' email and text communications going in and out of the country. — Aug. 8, 2013

Internal NSA document reveals an agency "loophole" that allows a secret backdoor for the agency to search its databases for U.S. citizens' email and phone calls without a warrant. — Aug. 9, 2013

NSA collection on Japan is reportedly maintained at the same priority as France and Germany. — Aug. 12, 2013

The NSA broke privacy rules thousands of times per year, according to an internal audit. — Aug. 15, 2013

NSA analysts revealed to have sometimes spied on love interests, with the practice common enough to have coined the term LOVEINT, or love intercepts. (It was unclear whether this report came from Snowden docs.) — Aug. 23, 2013

Britain runs a secret internet-monitoring station in the Middle East to intercept emails, telephone calls, and web traffic, The Independent reports, citing Snowden documents. Snowden denies giving the paper any documents, alleging the U.K. government leaked them in an attempt to discredit him. — Aug. 23, 2013

• The top-secret U.S. intelligence "black budget" is revealed for 2013, with 16 spy agencies having a budget of $52.6 billion. — Aug 29, 2013

Black BudgetHandout/Getty ImagesExpanding upon data gleaned from the "black budget," the NSA is found to be paying hundreds of millions of dollars each year to U.S. companies for access to their networks. — Aug. 29, 2013

The U.S. carried out 231 offensive cyber-attacks in 2011. — Aug. 30, 2013

The NSA hacked into Qatar-based media network Al Jazeera's internal communications system. — Aug. 31, 2013

• The NSA spied on Brazilian President Dilma Rousseff and Mexican President Enrique Peña Nieto (then a candidate).Sept. 1, 2013

Using a "man-in-the-middle" attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society for Worldwide Interbank Financial Telecommunications (SWIFT), and Brazilian oil company Petrobras. — Sept. 2, 2013

• A U.S. intelligence "black budget" reveals Al Qaeda's effort to jam, hack, and/or shoot down U.S. surveillance drones. — Sept. 3, 2013

A joint investigation by ProPublica, The New York Times, and The Guardian finds the NSA is winning its war against internet encryption with supercomputers, technical know-how, and court orders. — Sept. 5, 2013

• The NSA has the ability to access user data for most major smartphones on the market, including Apple iPhones, Blackberries, and Google Android phones. — Sept. 7, 2013

• The NSA shares raw intelligence data (minus information about American citizens) to Israel with an information-sharing agreement. — Sept. 11, 2013

• The NSA monitors banks and credit institutions for a comprehensive database that can track the global flow of money. — Sept. 16, 2013

Britain's GCHQ launched a cyberattack against Belgacom, a partly state-owned Belgian telecommunications company. — Sept. 20, 2013

• The NSA spies on Indian diplomats and other officials in an effort to gain insight into the country's nuclear and space programs. — Sept. 23, 2013

• The NSA's internal "wiki" website characterizes political and legal opposition to drone attacks as part of "propaganda campaigns" from America's "adversaries." — Sept. 25, 2013

Since 2010, the NSA has used metadata augmented with other data from public, commercial, and other sources to create sophisticated graphs that map Americans' social connections — Sept. 28, 2013

• The NSA stores a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina. — Sept. 30, 2013

The NSA and GCHQ worked together to compromise the anonymous web browsing Tor network. — Oct. 4, 2013

Canada's signals intelligence agency (CSEC) spied on phone and computer networks of Brazil's Ministry of Mines and Energy and shared the information with the "Five Eyes" intelligence services of the U.S., Canada, Britain, Australia, and New Zealand. — Oct. 7, 2013

nsa computer spyingHandout/Getty Images• The NSA collected more than 250 million email contact lists from services such as Yahoo and Gmail. — Oct. 14, 2013

NSA surveillance was revealed to play a key role in targeting for overseas drone strikes. — Oct. 16, 2013

• The NSA spied on French citizens, companies, and diplomats, and monitored communications at France's embassy in Washington, D.C. and its U.N. office in New York. — Oct. 21, 2013

• The NSA tapped the mobile phone of German Chancellor Angela Merkel. — Oct. 23, 2013

• The NSA monitored the phone calls of 35 world leaders and encouraged other government agencies to share their "rolodexes" of foreign politicians so it could monitor them. — Oct. 24, 2013

• The NSA spied on Italian citizens, companies, and government officials. — Oct. 24, 2013

• The NSA spied on Spanish leaders and citizens. — Oct. 25, 2013

• The NSA stations surveillance teams at 80 U.S. embassies around the world. — Oct. 27, 2013

• A joint program between the NSA and Britain's GCHQ called Muscular infiltrates and copies data flowing out of Yahoo and Google's overseas data centers. One slide boasted of "SSL added and removed here!" with a smiley face.Oct. 30, 2013

• The NSA spied on the Vatican (the Panorama website did not cite Snowden as the source). — Oct. 30, 2013

One slide boasted of "SSL added and removed here!" with a smiley face

Australia's intelligence service has surveillance teams stationed in Australian embassies around Asia and the Pacific. — Oct. 31, 2013

One document reveals tech companies play a key role in NSA intelligence reports and data collection. — Nov. 1, 2013

Britain's GCHQ and other European spy agencies work together to conduct mass surveillance. — Nov. 1, 2013

Strategic missions of the NSA are revealed, which include combatting terrorism and nuclear proliferation, as well as pursuing U.S. diplomatic and economic advantage. — Nov. 2, 2013

Australia's Defense Signals Directorate (DSD) and the NSA worked together to spy on Indonesia during a U.N. climate change conference in 2007. — Nov. 2, 2013

• The NSA spied on the Organization of the Petroleum Exporting Countries (OPEC). — Nov. 11, 2013

Britain's GCHQ monitored the booking systems of 350 high-end hotels with a program called Royal Concierge, which sniffed for booking confirmations sent to diplomatic email addresses, which would be flagged for further surveillance. — Nov. 17, 2013

• Australia's DSD spied on the cell phones of top Indonesian officials, including the president, first lady, and several cabinet ministers. — Nov. 17, 2013

• The NSA spied on millions of cellphone calls in Norway in one 30-day period. — Nov. 19, 2013

The British government struck a secret deal to share phone, internet, and email records of U.K. citizens with the NSA. — Nov. 20, 2013

NSAHandout/Getty Images• A NSA strategy document reveals the agency's goal to acquire data from "anyone, anytime, anywhere" and expand its already broad legal powers. — Nov. 22, 2013

• The NSA infected more than 50,000 computer networks worldwide with malware designed to steal sensitive information. — Nov. 23, 2013

• The NSA gathers evidence of visits to pornographic websites as part of a plan to discredit Muslim jihadists. — Nov. 26, 2013

Working with Canadian intelligence, the NSA spied on foreign diplomats at the G8 and G20 summits in Toronto in 2010. — Nov. 28, 2013

Netherlands' intelligence service gathers data on web forum users and shares it with the NSA. — Nov. 30, 2013

• A draft document reveals Australia offered to share information collected on ordinary Australian citizens with the NSA and other "Five Eyes" partners. — Dec. 1, 2013

• The NSA siphons billions of foreign cellphone location records into its database. — Dec. 4, 2013

Widespread spying is revealed in Italy, with the NSA spying on ordinary Italians, as well as diplomats and political leaders. — Dec. 5, 2013

Swedish intelligence was revealed to be spying on Russian leaders, then passing it on to the NSA. — Dec. 5, 2013

• A document reveals the extent of the relationship between NSA and Canadian counterparts, which includes information-sharing and Canada allowing NSA analysts access to covert sites it sets up. — Dec. 9, 2013

WoW World of Warcraft video game

Handout/Getty Images• Intelligence operatives with NSA and GCHQ infiltrate online video games such as "World of Warcraft" in an effort to catch and stop terrorist plots. — Dec. 9, 2013

• Piggybacking on online "cookies" acquired by Google that advertisers use to track consumer preferences, the NSA is able to locate new targets for hacking. — Dec. 10, 2013

• The NSA has the ability to decrypt the common A5/1 cellphone encryption cipher. — Dec. 13, 2013

• The NSA secretly paid computer security firm RSA $10 million to implement a "back door" into its encryption. — Dec. 20, 2013

• A document reveals how Britain's GCHQ spied on Germany, Israel, the European Union, and several nongovernmental organizations (NGOs) — Dec. 20, 2013

• With a $79.7 million research program, the NSA is working on a quantum computer that would be able to crack most types of encryption. — Jan. 2, 2014

• Using radio transmitters on tiny circuit boards or USB drives, the NSA can gain access to computers not connected to the internet. — Jan. 14, 2014

• The NSA scoops "pretty much everything it can" in untargeted collection of foreign text messages for its Dishfire database. — Jan. 16, 2014

• The NSA scoops up personal data mined from smartphone apps such as "Angry Birds." — Jan. 27, 2014

A program called Squeaky Dolphin by Britain's GCHQ monitors YouTube, Facebook, and Blogger for "broad real-time monitoring of online activity." — Jan. 27, 2014

The NSA scoops "pretty much everything it can" in untargeted collection of foreign text messages

• The NSA spied on negotiators during the 2009 U.N. Climate Change conference in Copenhagen, Denmark. — Jan. 29, 2014

• Canada's CSEC (the country's national cryptologic agency) tested a pilot program with the NSA that captured metadata from users who had logged into free airport WiFi. — Jan. 30, 2014

• Britain's GCHQ waged war on hacker groups such as Anonymous and Lulzsec, mounting Distributed Denial-of-Service attacks and infiltrating their chat rooms. — Feb. 4, 2014

• The NSA reportedly monitored former German Chancellor Gerhard Schröder in the run-up to the Iraq war. — Feb. 5, 2014

• Britain's GCHQ used "dirty tricks" such as computer viruses and sexual "honey pots" to target adversaries. — Feb. 7, 2014

• The U.S.'s "targeted killing" program of drone strikes relies mostly on cellphone metadata and geolocation, rather than on-the-ground human intelligence. — Feb. 10, 2014

• An American law firm was monitored by the Australian Signals Directorate while representing the government of Indonesia during a trade dispute. — Feb. 15, 2014

• The NSA and Britain's GCHQ reportedly monitored traffic to the Wikileaks website and considered a move to monitor communications going to or from Wikileaks and the Pirate Bay. — Feb. 18, 2014

• Britain's GCHQ conducts covert operations to disrupt and shape online discourse. — Feb. 24, 2014

NSA headquartersHandout/Getty Images• Britain's GCHQ, using a program called Optic Nerve, intercepted and stored webcam images from millions of Yahoo users, then passed them on to the NSA's XKeyscore database. — Feb. 27, 2014

• The NSA shared intelligence that helped the Dutch navy capture a ship hijacked by pirates off Somalia, and the Netherlands regularly shares information with the NSA regarding Somalia and Afghanistan. — March 5, 2014

• The NSA has an advice columnist similar to "Dear Abby" who writes an "Ask Zelda!" column distributed on the agency's internal network. — March 7, 2014

• NSA developed sophisticated malware "implants" to infect millions of computers worldwide. In one example, the NSA posed as a fake Facebook server to infect a target's computer and steal files. — March 12, 2014

• Document reveals that, while many foreign governments share information with NSA, few senior officials outside of the intelligence or defense sphere have any knowledge of it. — March 13, 2014

• The NSA built a system capable of recording "100%" of a foreign country's telephone calls with a voice intercept program called Mystic. The Washington Post did not name the countries where the program was used. — March 18, 2014

• The NSA specifically targets foreign systems administrators in order to gain access to their networks. — March 20, 2014

• The NSA closely monitored Chinese technology firm Huawei in attempt to reveal ties between the company and the Chinese military. The agency also spied on Chinese banks and other companies, as well as former President Hu Jintao. — March 22, 2014

Malaysia's political leadership is a high-priority intelligence target for the U.S. and Australia — March 30, 2014

• NSA and Britain's GCHQ discussed various methods of deception, use of propaganda, mass messaging, and pushing stories on social media sites — April 4, 2014

• The Norwegian Intelligence Service is developing a super computer, called Steel Winter, to decrypt and analyze data from Afghanistan, Russia, and elsewhere. — April 26, 2013

NSAPhotosHandout/Getty Images• Britain's GCHQ asked the NSA for "unsupervised access" to the NSA's vast databases. It was unclear whether the request was granted. — April 30, 2014

• The NSA physically intercepts routers, servers, and other computer networking equipment before it's exported outside the U.S., implants "back door" surveillance tools, then repackages them with a factory seal and ships them out. — May 13, 2014

The NSA is intercepting, recording, and archiving virtually every cellphone call in the Bahamas and one other country, which The Intercept redacts. It also reveals metadata collection on Mexico, Kenya, and the Philippines — May 19, 2014

After giving journalist Glenn Greenwald a 72-hour warning to reveal the nation redacted from his previous report on mass surveillance of an entire country, Wikileaks reveals the country in question is Afghanistan. — May 23, 2014

• The NSA harvests millions of faces from web images for use in a previously undisclosed facial recognition database — May 31, 2014

Author's note: I've tried my best to be thorough in sifting through the hundreds of leaks that have come to light thus far. I have not included Snowden's movements, legal situation, or any of the political drama surrounding the leaks. This timeline only shows the many reports stemming from documents the 30-year-old ex-NSA contractor handed over to journalists.

If I have missed any leaks in the hundreds of news stories on these items, that mistake is mine alone.

This post relied upon a similar timeline from Al Jazeera America, as well as a catalog at Lawfare Blog, and an article at the National Journal.

Read Full Story

Sign up for Breaking News by AOL to get the latest breaking news alerts and updates delivered straight to your inbox.

Subscribe to our other newsletters

Emails may offer personalized content or ads. Learn more. You may unsubscribe any time.