"Please don't post insinuations about astroturfing, shilling, brigading, foreign agents and the like. It degrades discussion and is usually mistaken. If you're worried about abuse, email hn@ycombinator.com and we'll look at the data. "
The leaks suggested the NSA was accessing information via taps between unencrypted data center connections, not via direct support or collaboration from the companies.
After the leaks google encrypted those connections.
The other parts are within FISA and other parts of the law. There may be disagreements with the transparency or way this stuff works, but your first comment was overly broad and mostly inaccurate.