Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela. Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge are not known for upholding the sort of democratic values he claims to be defending. While demanding accountability from the U.S. government, he appears to be seeking immunity for his own actions. Snowden's purposes and fate, however, should be of secondary concern. However misguided his actions may have been, they have reopened a much-needed debate about the reach and authority of what is often called the National Security State. While defending the NSA programs, even President Barack Obama seems to welcome that debate. "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," Obama noted when asked about Snowden's leaks. "We're going to have to make some choices as a society. ... There are trade-offs involved." Administration officials and members of Congress say the government's extensive surveillance programs are crucial to preventing terrorist attacks, and that Snowden has done real damage to efforts to keep Americans safe. Because almost all the relevant information remains classified, it is difficult to assess that claim. NSA officials have now promised to make public details of some of the dozens of terrorist plots they say the massive data-collection effort, called Prism, has helped thwart. That sort of disclosure is long overdue. Although Prism was approved by the Foreign Intelligence Surveillance Act court and is monitored by the intelligence committees of Congress, many Americans were shocked to learn that the government now stores their phone and internet records for possible use in future investigations. While the government is prohibited from listening to the tracked calls, it uses sophisticated algorithms to trace calling patterns. If a series of related calls seems suspicious, the NSA or FBI then gets a warrant from the FISA court to investigate further. No abuse of those procedures has come to light. Still, the mere existence of such records in the government's hands, information that might easily be exploited for political purposes, should concern every American. It is axiomatic that fighting clandestine terrorist groups requires clandestine methods. Sources and allies must be protected; in preemptive actions the element of surprise must be prese.