It ’s been one year since the Guardian first publish the Foreign Intelligence Surveillance Court lodge , leaked by former NSA contractor Edward Snowden , that demonstrate that the NSA was conducting dragnet surveillance on millions of innocent people . Since then , the onslaught of disturbing revelations , from disclosures , admissions from government official , Freedom of Information Act requests , and lawsuits , has been around-the-clock . On the anniversary of that first news leak , here are 65 things we know about NSA spying that we did not sleep with a yr ago :

1 . We saw an exercise of the court social club that authorize the NSA tocollect about every phone call recordin the United States — that ’s who you call , who bid you , when , for how long , and sometimes where .

2 . We saw NSA Powerpoint slide documenting how the NSAconducts “ upstream ” compendium , forgather intelligence information directly from the base of telecommunications providers .

Hostinger Coupon Code 15% Off

3 . The NSA hascreated a “ content dragnet”by asserting that it can intercept not only communication where a quarry is a party to a communication but also communications “ about a target , even if the target is n’t a company to the communication . ”

4 . The NSAhas confirmedthat it is searching data point collected under Section 702 of the FISA Amendments Act to access American ’s communications without a guarantee , in what Senator Ron Wyden called the “ back threshold search loophole . ”

5 . Although the NSA has repeatedly state it does not target Americans , its own documents show that lookup of data collected under Section 702 are design just to determine with51 percentage confidence a target ’s “ foreignness . ' ”

Burning Blade Tavern Epic Universe

6 . If the NSA does not determine a target ’s curiousness , itwill not cease spyingon that prey . Instead the NSA will assume that target to be extraneous unless they “ can be positively identified as a United States person . ”

7 . A leak internal NSA audited account detail 2,776violations of rules or court ordersin just a one - year period .

8 . Hackers at the NSAtarget sysadmins , regardless of the fact that these sysadmins themselves may be completely innocent of any error .

Ideapad3i

9 . The NSA and CIAinfiltrated games and online communitieslike World of Warcraft and Second Life to gather data and conduct surveillance .

10 . The governmenthas destroy evidence in EFF ’s case against NSA spying . This is incredibly ironical , considering that the government has also claim EFF ’s clients require this evidence to prove standing .

11 . Director of National Intelligence James Clapperlied to Congresswhen asked directly by Sen. Ron Wyden whether the NSA wasgathering any sort of data on meg of Americans .

Last Of Us 7 Interview

12 . Microsoft , like other party , hascooperated closely with the FBIto allow the NSA to “ circumvent its encryption and gain access code to user ’ data . ”

13 . The intelligence budget in 2013 alone was $ 52.6 billion — this number was revealed by a leak out document , not by the government . Of that budget,$10.8 billion went to the NSA . That ’s approximately $ 167 per mortal in the United States .

14 . The Foreign Intelligence Surveillance Court has issue ordering that permit the NSA toshare raw data — without in person identifying info disrobe out — with the FBI , CIA , and the National Counterterrorism Center .

Anker 6 In 1

15 . Pursuant to amemorandum of intellect , the NSA on a regular basis shares sensitive data with Israel without stripping out personally identify info about U.S. soul .

16 . The Snowden disclosures have made it vindicated the Obama administrationmisled the Supreme Courtabout key return in ACLU ’s case against NSA spying , Clapper v. Amnesty International , lead to the dismission of the case for deficiency of standing .

17 . TheNSA “ cut up into Al Jazeera‘s interior communications system . ” NSA documents state that “ take targets had ‘ high voltage as sources of intelligence . ' ”

Lenovo Ideapad 1

18 . The NSA used supposedly anon. Google cookies asbeacons for surveillance , avail them to track single users .

19 . The NSA “ tap ‘ million of images per 24-hour interval ’ — including about 55,000 ‘ facial recognition quality images ' ” and sue them with powerful facial recognition software .

20 . The NSAfacial recognition program“can now compare undercover agent artificial satellite exposure with intercepted personal photographs direct outdoors to determine the location . ”

Galaxy S25

21 . Although most NSA reform has focused on division 215 of the PATRIOT Act , and most advocates have also agitate for reform of surgical incision 702 of the FISA Amendments Act , some of the worst NSA spying happen underthe authority of Executive Order 12333 , which President Obama could repeal or modify today .

22 . The NSAcollected Americans ’ cell earphone locationinformation for two years as part of a pilot project to see how it could utilize such entropy in its massive database .

23 . In one month , March 2013 , the NSA collected97 billion piece of intelligencefrom computing machine networks worldwide , including3 billion piece of intelligencefrom US computer meshwork .

Dyson Hair Dryer Supersonic

24 . The NSA hastargeted Tor , a stage set of tools that allow Internet drug user to browse the net anonymously .

25 . The NSA programMUSCULAR infiltrates linksbetween the global data centers of applied science troupe such as Google and Yahoo . Many companies have responded to MUSCULAR by encrypting traffic over their internal networks .

26 . TheXKEYSCORE program analyzesemails , on-line chats and the browse histories of millions of person anywhere in the world .

Hostinger Coupon Code 15% Off

27 . NSAundermines the encoding toolsrelied upon by average users , company , fiscal psychiatric hospital , targets , and non - fair game as part of BULLRUN , an unparalleled travail to countermine the security of all Internet user , let in you .

28 . The NSA ’s Dishfire operationhas collected 200 million text edition messagesdaily from user around the world , which can be used to extract worthful info such as location data , liaison retrievals , credit entry card details , missed call alerts , vagabond alarm ( which indicate border crossings ) , electronic business cards , credit rating plug-in payment notifications , move itinerary alerts , and meeting information .

29 . Under the CO - TRAVELER mental process , theUS collects localization informationfrom global cell towers , Wi - Fi , and GPS hub , which is then information analyzed over time , in part in rescript to influence a aim ’s traveling companions .

Burning Blade Tavern Epic Universe

30 . A2004 memoentitled “ DEA- The ‘ Other ’ Warfighter ” , states that the DEA and NSA “ revel a vivacious two - direction selective information - sharing kinship . ”

31 . When the DEA act on information its Special Operations Division receive from the NSA , itcloaks the source of the informationthrough “ parallel structure , ” expire through the charade of recreating an fanciful investigating to hide the informant of the bakshish , not only from the suspect , but from the royal court . This was intended to ensure that no court rule on the legality or scope of how NSA information is used in ordinary investigation .

32 . The fruit of NSA surveillance routinely cease up in the hands of theIRS . Like the DEA , the IRS uses parallel construction to cloak the source of the tip .

Ideapad3i

33 . Even the President ’s handpicked Privacy and Civil Liberties Oversight Board recommend that thegovernment final stage Section 215mass telephone record collection , because that collection is ineffective , illegal , and likely unconstitutional .

34 . The NSA has plans toinfect potentially millionsof computing gadget with malware implant as part of its Tailored Access Operations .

35 . The NSA had a secret $ 10 million contract bridge with security measures firm RSA tocreate a “ back door”in the company ’s widely used encryption products .

Last Of Us 7 Interview

36 . The NSAtracked access to pornand collect other sexually denotative information “ as part of a proposed programme to harm the reputations of those whom the agency believe are radicalizing others through incendiary speeches . ”

37 . The NSA and its partnersexploited nomadic apps , such as the popular Angry Birds game , to access user ’ private information such as location , home base address , gender , and more .

38 . The Washington Post revealed that the NSAharvests “ hundred of millions of contact listsfrom personal e - mail and exigent messaging report around the world , many of them belong to Americans . ”

Polaroid Flip 09

Many of the Snowden revelations have concerned the NSA ’s natural action oversas , as well as the activeness of some of the NSA ’s closelipped allies , such as the its UK twin GCHQ . Some of these have been cooperative ventures . In particular , the “ Five Eyes ” — The United States , New Zealand , Australia , the United Kingdom , and Canada — share citizen datum amongst themselves – bring home the bacon loophole that might undermine internal lawmaking .

39.The NSA paid its British counterpartGCHQ $ 155 million over the last three year “ to fasten access to and influence over Britain ’s intelligence gather programmes . ”

40 . The Guardian reported : “ In one six - month period in 2008 alone , [ GCHQ ] collectedwebcam imaging – include substantial quantity of sexually explicit communications – from more than 1.8 - million Yahoo user accounts globally . ”

Feno smart electric toothbrush

41 . GCHQused malware to compromisenetworks belong to the Belgian telecommunication company Belgacom .

42 . Major telecommunications troupe include BT , Vodafone , and Verizon business organization havegiven GCHQ limitless accessto their fiberoptic cables

43 . GCHQ used DDoS attacks and other method tointerrupt Anonymous and LulzSec communication , including communications of people not charged with any crime .

Govee Game Pixel Light 06

44 . GCHQ ’s Bude stationmonitored leadersfrom the EU , Germany , and Israel . It alsotargeted non - governmental organizationssuch as Dr. of the World .

45 . The NSA ’s partner Down Under , the Australian Signals Directorate , has been implicate in breaches of attorney - client privileged communication , countermine a foundational principleof our partake deplorable justice system .

46 . Australian intelligence official spied on the cell earpiece ofIndonesian cabinet ministersandPresident Susilo Bambang .

Motorbunny Buck motorized sex saddle review

47 . In 2008 , Australiaoffered to share its citizen ‘ raw information with intelligence partners .

48 . CSEC help theNSA spy on political officialsduring the G20 meeting in Canada .

49 . CSEC and CSIS wererecently rebukedby a Union court judge formisleading himin a warrant software five years ago with respect to their consumption of Five optic resource for track Canadians abroad .

Ironically , some of the NSA ’s cognitive operation have been targeted at body politic that have exercise like a shot with the agency in other instance . And some simply seemedunnecessary and disproportional .

50 . NSA documents show that not all governments areclear about their own level of cooperationwith the NSA . As the Intercept report , “ Few , if any , elect leaders have any knowledge of the surveillance . ”

51 . The NSA is tap , recording , and archivingevery single cell phone callin the Bahamas .

52 . The NSAmonitored earphone callsof at least 35 world leaders .

53 . TheNSA stag on French diplomatsin Washington and at the UN .

54 . The NSAhacked in to Chinese company Huawei’snetworks and stole its root code .

55 . The NSAbugged EU embassiesin both New York and Washington . It copied hard drive from the New York federal agency of the EU , and tapped the intragroup computer connection from the Washington embassy .

56 . The NSA collect the metadata of more than45 - million Italian phone callsover a 30 solar day period . It also maintained monitoring sites in Rome and Milan .

57 . The NSA stored data point from approximately500 - million German communicationsconnections per month .

58 . The NSAcollected data from over-60 millionSpanish telephone call over a 30 - Clarence Shepard Day Jr. period in former 2012 and other 2013 andspied on membersof the Spanish government .

59 . The NSA collected data from over70 - million French telephone callsover a 30 - day catamenia in late 2012 and other 2013 .

60 . The Hindu account that , found on NSA document : “ In the overall listing of countries spied on by NSA programs , India stand at fifth stead . ”

61 . The NSAhacked into former Mexican PresidentFelipe Calderon ’s official electronic mail account .

62 . The Guardian report : “ The NSA has , for years , systematically tapped into the Brazilian telecom meshing andindiscriminately tap , collect and storedthe email and telephone records of millions of Brazilians . ”

63 . The NSAmonitored emails(link in Portuguese ) , telephone call , and school text message ofBrazilian President Dilma Roussefand her top adjutant .

64 . Germany’sintelligence agencies cooperatedwith the NSA andimplemented the NSA‘s XKeyscore program , while NSA was in number snoop on German leaders .

65 . Norwegian dailyDagbladet reported(Link in Norwegian ) that the NSA acquire data on33 million Norwegian cell telephone set callsin one 30 - Clarence Day period . ”

There ’s no question that the international relationship Obama pledged to fix , as well as the confidence of the American people in their privacy and constitutional rights , have been damage by the NSAs dragnet surveillance . But one year later , both the United States and international governments have not taken the step necessary to ensure that this surveillance ends . That ’s why everyone must take action — get through your elect representative , joinReset the Net , and check about howinternational law apply to U.S. surveillancetoday .

CybersecurityEdward SnowdenPrivacySecuritySurveillance

Daily Newsletter

Get the good tech , scientific discipline , and culture word in your inbox daily .

News from the future , delivered to your present .

You May Also Like