Protecting Sensitive Information

Ever since the Edward Snowden case, the U.S. Government has been in a damage control mode.  What network (or pipes) did he use to extract the information?  What methods did he use to defeat the countermeasures, rules and protective procedures...