One year ago, the Guardian published its first bombshell story based on leaked top-secret documents showing that the National Security Agency was spying on American citizens.
At the time, journalist Glenn Greenwald and the Guardian never mentioned that they had a treasure trove of other NSA documents, nor that they came from one person. Then three days later, the source surprisingly unmasked himself: His name was Edward Snowden.
Sweden’s Proponent of ‘Feminist Foreign Policy,’ Shaped by Abuse
Mr. Lyons took a casting of Ms. Swinton’s mouth and designed teeth to fit. Those were clipped on over Ms. Swinton’s real teeth. For Minister Mason, he came up with a quirky look but didn’t quite want it to be comical. He was, however, interested in adding a little bling. “There’s a little bit of gold on the left-hand side,” he said. “We used real gold to make the filling of one tooth. We did it to put more character into the character.”
1. Secret court orders allow NSA to sweep up Americans' phone records
The very first story revealed that Verizon had been providing the NSA with virtually all of its customers' phone records. It soon was revealed that it wasn't just Verizon, but 五种红木受限价格将上涨 “替代品”或再次蹿红 in America.
This revelation is still one of the most controversial ones. Privacy advocates have challenged the legality of the program in court, and one Judge deemed the program unconstitutional and "almost Orwellian," while another one ruled it legal.
The existence of PRISM was the second NSA bombshell, coming less than 24 hours after the first one. Initially, reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others.
PRISM, we soon learned, was less less evil than first thought. In reality, the NSA doesn't have direct access to the servers, but can request user data from the companies, which are compelled by law to comply.
PRISM was perhaps as controversial as the first NSA scoop, prompting technology companies to first deny any knowledge of it, then later fight for the right to be more transparent about government data requests. The companies ended up partially winning that fight, getting the government to ease some restrictions and allow for more transparency.
3. Britain's version of the NSA taps fiber optic cables around the world
The U.S. is set to add nearly 3 million jobs in 2014 — the biggest increase since 1999. The burst in job creation, expected to continue in 2015, is sure to fuel consumer spending. So, too, will a plunge in gasoline prices that's given households extra cash to spare on other goods and services. See: Americans saved $14 billion as gasoline prices declined in 2014.
Tempora is one of the key NSA/GCHQ programs, allowing the spy agencies to collect vasts troves of data, but for some reason, it has sometimes been overlooked. After a couple of months from the Tempora revelation, a German newspaper revealed the names of the companies that collaborate with the GCHQ in the Tempora program: Verizon Business, British Telecommunications, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute.
4. NSA spies on foreign countries and world leaders
The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.
Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President Dilma Roussef, and Mexico's former President Felipe Calderon, the French Foreign Ministry, as well as leaders at the 2010 G8 and G20 summits in Toronto.
5. XKeyscore, the program that sees everything
XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" through data it intercepts across the world. In leaked documents, the NSA describes it as the "widest-reaching" system to search through Internet data.
6. NSA efforts to crack encryption and undermine Internet security
Encryption makes data flowing through the Internet unreadable to hackers and spies, making the NSA's surveillance programs less useful. What's the point of tapping fiber optic cables if the data flowing through them is unreadable? That's why the NSA has a developed a 北京住房租赁市场整改一个月：租赁价格普遍回落 to circumvent widely used web encryption technologies.
Her piece, titled “Back to Mother Nature," depicts an elaborate water-cleaning machine. Zhang worked with a team of artists at Google to animate her drawing.
Porto is nearly synonymous to port wine, and also its rich history. The city's historic center and the Alto Douro Wine Region have been listed as UNESCO World Heritage Sites.
5. “Carol” (Todd Haynes)
12) I often find myself worrying about something 0 1 2 3 4
Recognize me?: image via blog.discoverymagazine.com
Much of the decline in Chinese imports stems from lower commodity prices, which in turn are a result of falling overall demand from China, long the world’s biggest consumer of materials such as iron ore, coal and copper.
China has been making progress in terms of prevention and control of AIDS, said Wang Bin, an NHC official in charge of disease prevention, during the press conference.
Payouts also varied substantially between industries and cities. The average bonus at financial institutions was over Rmb17,200, while those in the education sector got less than half of that on average at less than Rmb7,500.
7. NSA elite hacking team techniques revealed
The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
Der Spiegel, which detailed TAO's secrets, labelled it as "a squad of plumbers that can be called in when normal access to a target is blocked." But they can probably be best described as the NSA's black bag operations team.
It was not an auspicious start to the new year for bitcoin investors.
8. NSA cracks Google and Yahoo data center links
When bulk collection or PRISM fails, the NSA had other tricks up its sleeve: It could infiltrate links connecting Yahoo and Google data centers, behind the companies' backs.
主流网络游戏仍然是大型多人在线角色扮演游戏 (MMORPG)。报告说，今年10月，中国最热门的10款网络游戏中有6款都属于大型多人在线角色扮演游戏。动视暴雪(Activision Blizzard)开发的《魔兽世界》(World of Warcraft)在注册用户和最高同时在线人数方面仍然排名榜首。但报告指出，目前围绕着这款游戏大陆运营权的政府监管纷争可能会给《魔兽世界》带来负面影响。网易公司目前持有《魔兽世界》的中国大陆独家运营权。
This story truly enraged the tech companies, which reacted with much more fury than before. Google and Yahoo announced plans to strengthen and encrypt those links to avoid this kind of surveillance, and a Google security employee even said on his Google+ account what many others must have thought privately: "Fuck these guys."
9. NSA collects text messages
3. The government bothlocal and national will invest in more technology-driven sectors, includingadvanced agriculture, transportation, medicine and other sectors. Thisinitiative will be aimed squarely at improving China’s productivity andmanufacturing competitiveness. There will be a national effort aimed atachieving quality, first-time yield and ensuring “productivity driven” globalcompetitiveness.
However, respondents also noted that social media has caused them to read fewer books, suffer from worse eyesight, sleep less and maintain less privacy, among other concerns.
— James Ball (@jamesrbuk) January 16, 2014
Other documents also revealed that the NSA can "easily" crack cellphone encryption, allowing the agency to more easily decode and access the content of intercepted calls and text messages.
10. NSA intercepts all phone calls in two countries
The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo.
We learned that you can never turn a wolf into a pet dog.