<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:10pt"><div style="" class="">OK, I'm a day late on this one...</div><div style="" class=""><br style="" class=""></div><div style="" class="" id="headline"><h1 style="" class="">65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago</h1></div>
<div style="" class="" id="create_date">Thursday, June 5, 2014 7:52</div><div class="" style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;"><br style="" class=""></div><br style="" class=""><div style="" class=""><i style="" class="">It’s been one year since the Guardian first published the Foreign
Intelligence Surveillance Court order, leaked by former NSA contractor
Edward Snowden, that demonstrated that the NSA was conducting dragnet
surveillance on millions of innocent people. Since then, the onslaught
of disturbing revelations, from disclosures, admissions from government
officials, Freedom of Information Act requests, and lawsuits, has been
nonstop. On the anniversary of that first leak, here are 65 things we
know about NSA spying that we did not know a year ago:</i></div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: italic;" class=""><i style="" class=""><br></i></div>
<div style="" class="">1. We saw an example of the court orders that authorize the NSA to <a style="" class="" href="http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order">collect virtually every phone call record</a> in the United States—that’s who you call, who calls you, when, for how long, and sometimes where.</div><div style="" class=""><br></div>
<div style="" class="">2. We saw NSA Powerpoint slides documenting how the NSA <a style="" class="" href="https://www.eff.org/deeplinks/2014/03/sunshine-week-recap-how-effs-foia-litigation-helped-expose-nsas-domestic-spying">conducts “upstream” collection</a>, gathering intelligence information directly from the infrastructure of telecommunications providers.</div><div style="" class=""><br></div>
<div style="" class="">3. The NSA has <a style="" class="" href="https://www.eff.org/deeplinks/2013/07/what-it-means-be-target-or-why-we-once-again-stopped-believing-government-and-once">created a “content dragnet”</a>
by asserting that it can intercept not only communications where a
target is a party to a communication but also communications “about a
target, even if the target <i style="" class="">isn’t a party to the communication</i>.”</div><div style="" class=""><br></div>
<div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;" class="">4. The NSA <a style="" class="" href="http://www.wyden.senate.gov/news/press-releases/wyden-udall-on-revelations-that-intelligence-agencies-have-exploited-foreign-intelligence-surveillance-act-loophole">has confirmed</a>
that it is searching data collected under Section 702 of the FISA
Amendments Act to access American’s communications without a warrant, in
what Senator Ron Wyden called the "back door search loophole."</div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;" class=""><br></div>
<div style="" class="">5. Although the NSA has repeatedly stated it does not target
Americans, its own documents show that searches of data collected under
Section 702 are designed simply to determine with <a style="" class="" href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_2.html">51 percent confidence a target’s “foreignness</a>.’”</div><div style="" class=""><br></div>
<div style="" class=""> 6. If the NSA does not determine a target’s foreignness, it <a style="" class="" href="https://www.eff.org/deeplinks/2013/06/depth-review-new-nsa-documents-expose-how-americans-can-be-spied-without-warrant">will not stop spying</a>
on that target. Instead the NSA will presume that target to be foreign
unless they “can be positively identified as a United States person.”</div><div style="" class=""><br></div>
<div style="" class="">7. A leaked internal NSA audit detailed 2,776 <a style="" class="" href="http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html">violations of rules or court orders</a> in just a one-year period.</div><div style="" class=""><br></div>
<div style="" class="">8. Hackers at the NSA <a style="" class="" href="https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/">target sysadmins</a>, regardless of the fact that these sysadmins themselves may be completely innocent of any wrongdoing.</div><div style="" class=""><br></div>
<div style="" class="">9. The NSA and CIA <a style="" class="" href="http://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games">infiltrated games and online communities</a> like World of Warcraft and Second Life to gather data and conduct surveillance.</div><div style="" class=""><br></div>
<div style="" class="">10. The government <a style="" class="" href="https://www.eff.org/press/releases/eff-court-theres-no-doubt-government-destroyed-nsa-spying-evidence">has destroyed evidence in EFF’s cases against NSA spying.</a>
This is incredibly ironic, considering that the government has also
claimed EFF’s clients need this evidence to prove standing. </div><div style="" class=""><br style="" class=""></div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;" class="">You can read about the other 55 things here: <a style="" class="" href="https://www.eff.org/deeplinks/2014/06/65-65-things-we-know-about-nsa-surveillance-we-didnt-know-year-ago">https://www.eff.org/deeplinks/2014/06/65-65-things-we-know-about-nsa-surveillance-we-didnt-know-year-ago</a></div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;" class=""><br></div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida
Grande,sans-serif; background-color: transparent; font-style: normal;" class="">Paul<br style="" class=""></div><div style="color: rgb(0, 0, 0); font-size: 13.3333px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style: normal;" class=""> </div></div></body></html>