The 10 Biggest Revelations From Edward Snowden's Leaks

Former intelligence contractor Edward Snowden poses for a photo during an interview in an undisclosed location in December 2013 in Moscow, Russia.
Former intelligence contractor Edward Snowden poses for a photo during an interview in an undisclosed location in December 2013 in Moscow, Russia.
Image: Barton Gellman/Getty Images

One year ago, the Guardian published its first bombshell story based on leaked top-secret documents showing that the National Security Agency was spying on American citizens.

At the time, journalist Glenn Greenwald and the Guardian never mentioned that they had a treasure trove of other NSA documents, nor that they came from one person. Then three days later, the source surprisingly unmasked himself: His name was Edward Snowden.

Journalist Glenn Greenwald and the Guardian won a Pulitzer Prize for reporting based on Snowden's information.

Sales & Marketing

红星美凯龙:自营与委托模式扩张面临多重挑战

9.消防员
莱昂斯做出斯文顿的口腔模型,依照它来设计假牙,把假牙安在斯文顿的真牙上。他为梅森部长设计了一个古怪的造型,但并不想让它太滑稽。不过,他还有兴趣加上一点闪亮的东西。“左边有一点金子,”他说,“我们用真金做某个牙的填料。这样做是为了让这个人物更有个性。”
While British schools moved up two places on average, French schools, the largest group from any one country, fell one place on average. EMLyon Business School dropped outside the MBA ranking and lost 15 places overall, while Edhec Business School failed to make it into the Executive MBA ranking and lost eight places overall as a result.
旅行枕

1. Secret court orders allow NSA to sweep up Americans' phone records

The very first story revealed that Verizon had been providing the NSA with virtually all of its customers' phone records. It soon was revealed that it wasn't just Verizon, but 中央经济工作会议:高起点、高质量编制好雄安新区规划 in America.

This revelation is still one of the most controversial ones. Privacy advocates have challenged the legality of the program in court, and one Judge deemed the program unconstitutional and "almost Orwellian," while another one ruled it legal.

The uproar caused by this first story has led President Barack Obama to endorse a reform to the program, and the House of Representatives to pass the first law that tries to change it.

2. PRISM

The existence of PRISM was the second NSA bombshell, coming less than 24 hours after the first one. Initially, reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others.

2月首周京政策房成交占比超六成 东坝自住房密集

PRISM, we soon learned, was less less evil than first thought. In reality, the NSA doesn't have direct access to the servers, but can request user data from the companies, which are compelled by law to comply.

PRISM was perhaps as controversial as the first NSA scoop, prompting technology companies to first deny any knowledge of it, then later fight for the right to be more transparent about government data requests. The companies ended up partially winning that fight, getting the government to ease some restrictions and allow for more transparency.

3. Britain's version of the NSA taps fiber optic cables around the world

v. 伸展,展开,传播,散布,铺开,涂撒
Making Airbnb go away might not be so easy. A recent Quinnipiac poll found that 56 percent of the responders thought New Yorkers should be allowed to rent rooms out to strangers. “We don’t want to turn into hotels, but at the same time people want to rent out their apartments sometimes,” said Paul R. Gottsegen, the president of Halstead Management Company, which manages 250 residential properties in the city.
Interest in wearable technology isn’t limited to technology companies. Mercedes-Benz is porting its mobile experience to a wearable device, while Virgin Atlantic is exploring the customer service aspect of Google Glass on a trial basis. Kenneth Cole is also using Glass as part of a marketing campaign.
Format: After a one-week orientation, classes are held on alternating weekends on Fridays and Saturdays, with accommodations provided on Friday nights. Final term sessions are held on campus for two weeks with the remainder of the term completed online.

Tempora is one of the key NSA/GCHQ programs, allowing the spy agencies to collect vasts troves of data, but for some reason, it has sometimes been overlooked. After a couple of months from the Tempora revelation, a German newspaper revealed the names of the companies that collaborate with the GCHQ in the Tempora program: Verizon Business, British Telecommunications, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute.

4. NSA spies on foreign countries and world leaders

U.S. President Barack Obama, right, and German Chancellor Angela Merkel are seated together at a G7 dinner in Brussels, on June 4. Their relationship has been tense since reports revealed that the NSA tapped Merkel's phone.

Shares in Hyundai and AmorePacific slid on Friday, down 4.4 per cent and 12.5 per cent respectively in late afternoon trading in Seoul.
"Although it may seem counterintuitive, the best way to maximize profits over the long-term is not to make them the primary goal of the business," Mackey said in an interview earlier this year.
“Teach Firsters” are highly desirable for recruiters, says Claire Burton, head of corporate responsibility at the UK arm of Deloitte, the accountant and consultant, bec-ause they are good at working in teams and are strong leaders.

全国216家卫浴企业被列入“黑名单”

*喜剧类最佳客串男演员:彼得?斯科拉里(Peter Scolari),《都市女孩》(Girls)
这一消息来自英国时装协会,协会在时装周前对设计师进行了调查,发现在9月份的时装周登场的80名设计师中没有一位会使用皮草。

The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.

Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President Dilma Roussef, and Mexico's former President Felipe Calderon, the French Foreign Ministry, as well as leaders at the 2010 G8 and G20 summits in Toronto.

5. XKeyscore, the program that sees everything

XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" through data it intercepts across the world. In leaked documents, the NSA describes it as the "widest-reaching" system to search through Internet data.

6. NSA efforts to crack encryption and undermine Internet security

Encryption makes data flowing through the Internet unreadable to hackers and spies, making the NSA's surveillance programs less useful. What's the point of tapping fiber optic cables if the data flowing through them is unreadable? That's why the NSA has a developed a 金沙江资本成立LED照明产业基石基金 规模达10亿美元 to circumvent widely used web encryption technologies.

adj. 谦虚的,适度的,端庄的
过去二十多年间,我一直在写关于亚洲崛起及其推动力量的文章。东亚各国领导人之间有一个了不起的共识:亚洲需要利用当前的机会之窗,把重点放在经济发展和增长上。战争是发展的最大阻碍。如果亚洲人真的愚蠢,他们或会卷入这样的战争,破坏自己巨大的发展前景。大多数亚洲国家(除了朝鲜)的领导人,都很明白战争的危险。因此,虽然这一地区会出现局势紧张和对抗,但无论在2014年还是2015年都不会爆发战争。随着2015年缓缓展开,我想鼓励所有西方学者根据亚洲本身的情况理解亚洲的根本发展动力,而非将理解建立在西方先入之见的基础上。
这部电影也是为了纪念2005年电视剧发行十周年而拍摄的。
They say that it is especially risky to use the same password for entertainment sites as for email and social networking accounts.

新政降息促楼市入夏 54城成交量环比增8%

伯利兹城最富盛名的旅游胜地莫过于巨大的水下天坑--蓝色巨洞以及玛雅遗址。
戴维皮林(David Pilling)
4.厨师
As fall arrived and school began, D'Aloisio felt immense pressure to deliver for his backers. He needed to whip his algorithm into better shape, so he contracted a team of Israeli coders who specialize in natural language processing. Searching on Google, he found and hired a retired professor living in Thailand who'd written seminal books on the topic. 'He became our main scientist,' says D'Aloisio. 'He now works at Yahoo! in the Sunnyvale office.'
普华永道的校园和学校雇佣主管安德鲁?巴杰里(Andrew Bargery)表示,Teach First的毕业生出类拔萃:“他们已经在专业环境下工作过,拥有专业成熟度,并擅长交际。”
China’s tourism administration issued a notice on Friday confirming reports that Chinese travellers had been denied entry to South Korea’s Jeju island in recent months for holding incomplete travel documentation. It reminded citizens to “select travel destinations with caution”.
但是,这些进展也指向美国和欧盟在利用此类案件上的巨大差异,欧盟目前正在讨论是否要赋予中国世界贸易组织(WTO)框架下的“市场经济”地位——这一让步会使对中国提起反倾销案变难。
Brain death is a bit of an inconvenience if you're a fan of living, and if you're looking to replace yours with a spare, you're out of luck. Sure, maybe we'll one day be able to plant brains into skulls, but the brain's not just another organ. It contains all your thoughts and memories. They can plop a new brain in your head, but you'll still be gone, so the idea of making artificial brains may seem absurd.
自2014年10月以来,新兴市场出口额(以美元计算)一直下降,即使没有2008年至2009年全球金融危机期间的下降幅度极端,也比当时持续的时间要长得多,如第一张图表所示。

7. NSA elite hacking team techniques revealed

The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.

Der Spiegel, which detailed TAO's secrets, labelled it as "a squad of plumbers that can be called in when normal access to a target is blocked." But they can probably be best described as the NSA's black bag operations team.

“An employee stormed out in the middle of a meeting, without explanation.”
The University of Pittsburgh team used stem cells made from skin to make MCPs, a special kind of cell that acts as a precursor to cardiovascular tissue. They then placed these cells on a 3-D scaffold designed to support a mouse heart. Within 20 days, the new heart began beating at 40 to 50 beats per minute.
"Well, I am going to have a Cabinet that looks like America," the former secretary of state replied. "And 50 percent of America is women, right?"
Dirk Philippa, portfolio manager of Fidelity International’s global property fund, has also cut investments in Hong Kong from a 6-8 per cent overweight two years ago, relative to benchmarks, to a 1 per cent overweight position.
“在古代,库车的名字在中国文学中叫做龟兹,是建立在西域绿洲上的一个非常强大的城邦,研究人员写到。

8. NSA cracks Google and Yahoo data center links

When bulk collection or PRISM fails, the NSA had other tricks up its sleeve: It could infiltrate links connecting Yahoo and Google data centers, behind the companies' backs.

Epic Games在网站Kotaku上发表的一份声明中则指出,提起法律诉讼的原因是罗杰斯在一个YouTube视频的可移除标签上写下了涉及DMCA的反诉内容,这段视频展示并推广了《堡垒之夜》外挂软件。

This story truly enraged the tech companies, which reacted with much more fury than before. Google and Yahoo announced plans to strengthen and encrypt those links to avoid this kind of surveillance, and a Google security employee even said on his Google+ account what many others must have thought privately: "Fuck these guys."

9. NSA collects text messages

It's not just about Internet data though. The NSA, following its unofficial motto of "collecting it all," intercepts 200 million text messages every day worldwide through a program called Dishfire.

别提什么至少提前两周通知公司,精心安排一次离职面谈,在卷铺盖走人前费尽心机跟人搞好关系了。有些人在离职时太过匆忙,根本顾不上这些套路。
Norway, which has twice rejected European Union membership, ranks No. 10 overall. The country takes the No. 1 spot in Citizenship and the No. 2 spot in Most Transparent.

Other documents also revealed that the NSA can "easily" crack cellphone encryption, allowing the agency to more easily decode and access the content of intercepted calls and text messages.

10. NSA intercepts all phone calls in two countries

The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo.

The Bahamas was revealed by The Intercept, Greenwald's new website, while the second was revealed by WikiLeaks, which protested The Intercept's decision to withhold the second country's name.

一家非官方机构出具的中国制造业衡量指标在11月下降,表明国有企业的业务增长并未扩展到规模较小和私营的工厂。

Bonus: Edward Snowden's first in-person interview with an American news outlet

(H/T to the site Free Snowden, which has an extensive and detailed list of all the NSA revelations.)