One year ago, the Guardian published its first bombshell story based on leaked top-secret documents showing that the National Security Agency was spying on American citizens.
At the time, journalist Glenn Greenwald and the Guardian never mentioned that they had a treasure trove of other NSA documents, nor that they came from one person. Then three days later, the source surprisingly unmasked himself: His name was Edward Snowden.
室内环境：这栋砖砌结构、灰泥粉饰并铺着瓷砖屋顶的两层楼房屋由Dorr & Dorr公司设计，于1916年完工，近15年内曾经翻修。该房屋采用了半牧场、半工匠艺术的设计风格，运用了简洁的线条、开敞式空间、典雅的木制品和彩色玻璃等设计。翻修工程由明尼阿波利斯市Sala建筑公司的约瑟夫·麦茨勒(Joseph Metzler)完成。
“The Diary of a Teenage Girl” (Marielle Heller)
1. Secret court orders allow NSA to sweep up Americans' phone records
The very first story revealed that Verizon had been providing the NSA with virtually all of its customers' phone records. It soon was revealed that it wasn't just Verizon, but 郁亮：万科感谢改革开放带来的新时代 以变革应对未来 in America.
This revelation is still one of the most controversial ones. Privacy advocates have challenged the legality of the program in court, and one Judge deemed the program unconstitutional and "almost Orwellian," while another one ruled it legal.
The existence of PRISM was the second NSA bombshell, coming less than 24 hours after the first one. Initially, reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others.
PRISM, we soon learned, was less less evil than first thought. In reality, the NSA doesn't have direct access to the servers, but can request user data from the companies, which are compelled by law to comply.
PRISM was perhaps as controversial as the first NSA scoop, prompting technology companies to first deny any knowledge of it, then later fight for the right to be more transparent about government data requests. The companies ended up partially winning that fight, getting the government to ease some restrictions and allow for more transparency.
3. Britain's version of the NSA taps fiber optic cables around the world
10. Drawing Words Helps Your Brain Recall Them
尼古拉斯·凯奇（Nicolas Cage）向来不随大流，他曾向媒体透露，因为居住权问题，他因影片《离开拉斯维加斯》（Leaving Las Vegas）所获得的小金人“正在某辆卡车上穿越路易斯安那州”。显然，如果政府要对你查户口，问问你的小金人在何处就可以了。
But, despite the incessant warnings from security researchers, many people are still turning to weak, easily guessable passwords to protect their devices.
A disturbing and often bleak analysis of the automated future of work has been named 2015’s business book of the year.
Tempora is one of the key NSA/GCHQ programs, allowing the spy agencies to collect vasts troves of data, but for some reason, it has sometimes been overlooked. After a couple of months from the Tempora revelation, a German newspaper revealed the names of the companies that collaborate with the GCHQ in the Tempora program: Verizon Business, British Telecommunications, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute.
4. NSA spies on foreign countries and world leaders
Over the past 10 years, the value of the top 100 brands has more than doubled — increasing by 133 per cent. That value (see box on page 3 for methodology) is calculated in terms of financial measures such as revenues and profitability combined with surveys of how consumers view brands.
As part of its 2014 capital plan, the San Francisco, Calif.-based bank said it would increase its buybacks by 350 million shares, or a total of almost $17 billion. It also boosted its dividend rate by about 17% to $0.35 a share.
The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.
Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President Dilma Roussef, and Mexico's former President Felipe Calderon, the French Foreign Ministry, as well as leaders at the 2010 G8 and G20 summits in Toronto.
5. XKeyscore, the program that sees everything
XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" through data it intercepts across the world. In leaked documents, the NSA describes it as the "widest-reaching" system to search through Internet data.
6. NSA efforts to crack encryption and undermine Internet security
Encryption makes data flowing through the Internet unreadable to hackers and spies, making the NSA's surveillance programs less useful. What's the point of tapping fiber optic cables if the data flowing through them is unreadable? That's why the NSA has a developed a 中国石材产业面临洗牌 老公司大手笔小企业新玩法 to circumvent widely used web encryption technologies.
According to Oliver Cooke, a financial-services recruiter at Selby Jennings in New York, banks have been stressing what they call “internal mobility”, or redeploying staff from one department to another. If a bank facing sluggish conditions in debt trading, for example, can convert a trader to a risk analyst or a compliance officer, it can keep people interested — and it can save a bundle on severance.
Mr Li said the economy’s strength came as a result of the government shunning strong stimulus policies and its push for supply-side reforms.
Length of program: 21 months
Attention, travel lovers. You may not have made any travel plans yet, but the choices for next year’s best destinations are already out. Recently, the well-known travel guide publisher Lonely Planet issued its Best in Travel 2014 selection. Here, we pick a few countries from its top 10 list to give you a taste.
Citing recent figures from the CPB Netherlands Bureau for Policy Analysis, that show global trade in seasonally-adjusted volume terms fell 1.1 per cent between September and October, Mr Leering suggests last year will prove to be the worst year for world trade since 2009.
Will the Democrats take back the majority in the midterm election in the US House of Representatives
Company: Everyone Counts
As a national exam with more than 1 million test takers every year, the National Postgraduates Entrance Examination is very important for students' academic life, and cheating incidents have been exposed from time to time.
Please accept my season\'s greetings.
7. NSA elite hacking team techniques revealed
The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
Der Spiegel, which detailed TAO's secrets, labelled it as "a squad of plumbers that can be called in when normal access to a target is blocked." But they can probably be best described as the NSA's black bag operations team.
Consumers are feeling better. Consumer confidence is at the highest level in four years, thanks to improvements in jobs, housing and the stock market. In the wake of the recession, Americans whittled down their debts, avoided borrowing and delayed purchases. That means the stage could be set for stronger consumer demand, which could nudge businesses that have put off hiring to add more workers. 'Business has likely pushed productivity growth as far as possible,' Principal Global's Mr. Baur says, suggesting employers will need to boost payrolls to meet stronger demand.[qh]
年度故事将是纽约对911主谋穆罕默德(Khalid Sheikh Mohammed)的审判。
8. NSA cracks Google and Yahoo data center links
When bulk collection or PRISM fails, the NSA had other tricks up its sleeve: It could infiltrate links connecting Yahoo and Google data centers, behind the companies' backs.
“我们的目标是修建尽可能多的单元，同时确保这样做能够维持和提高居民社区的健康运转。”城市规划部(Department of City Planning)部长卡尔·魏斯布罗德(Carl Weisbrod)说。
This story truly enraged the tech companies, which reacted with much more fury than before. Google and Yahoo announced plans to strengthen and encrypt those links to avoid this kind of surveillance, and a Google security employee even said on his Google+ account what many others must have thought privately: "Fuck these guys."
9. NSA collects text messages
The central government is planning to establish a bond market connect between the mainland and Hong Kong Special Administrative Region on a trial basis this year, allowing for the first time overseas capital to access mainland bond markets from overseas. Hong Kong will be the first to benefit from such an arrangement
— James Ball (@jamesrbuk) January 16, 2014
Other documents also revealed that the NSA can "easily" crack cellphone encryption, allowing the agency to more easily decode and access the content of intercepted calls and text messages.
10. NSA intercepts all phone calls in two countries
The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo.