One year ago, the Guardian published its first bombshell story based on leaked top-secret documents showing that the National Security Agency was spying on American citizens.
At the time, journalist Glenn Greenwald and the Guardian never mentioned that they had a treasure trove of other NSA documents, nor that they came from one person. Then three days later, the source surprisingly unmasked himself: His name was Edward Snowden.
See also: 我以前曾有过一款安卓手机（尽管2009年以来我一直用的是MacBook笔记本电脑，这种搭配挺诡异的，我知道）。自从今年夏天换了iPhone以后，我马上意识到了iPhone“提醒”的力量。每次有提醒事项时，iPhone就会振动起来，然后显示一个弹出窗口，你可以暂停它，或者把它标记为已完成。另外你还可以设置重复提醒，用来提醒你邮寄每个季度的税单、更新订阅、领薪水等容易忘记的事再好不过了。
《危险！》(Jeopardy!)：这个游戏节目今年已播出50年（1964年3月30日首播），它证明自己不仅能难住观众，而且能令他们感到意外。不仅是因为主持人亚历克斯·特里贝克(Alex Trebek)留起了胡子（之前13年他都是把胡子剃得干干净净），而且是因为仍有些选手表明自己能刺激观众。今年刺激观众的是亚瑟·朱(Arthur Chu)，他采用闪电战式的答题方式，在网上引起一片哗然。他的策略令人兴奋，当然也很奏效：他在锦标赛中夺得第二名（友善的本·因格拉姆[Ben Ingram]最后得了第一）。
3. The root cause of eczema has finally been identified. Scientists have tracked down a series of proteins and molecular pathways that lead to this insufferable skin problem, revealing that the protein filaggrin isn't the sole culprit we thought it was.
The contiguous United States set a temperature record in 2012, a year of scorching heat waves and drought. But, mostly because of the unusual chill in the East, 2014 was only the 34th warmest year on record for the lower 48 states.
1. Secret court orders allow NSA to sweep up Americans' phone records
The very first story revealed that Verizon had been providing the NSA with virtually all of its customers' phone records. It soon was revealed that it wasn't just Verizon, but 6天内3家陶企陷入倒闭危局 优胜劣汰再度考验陶企转型 in America.
This revelation is still one of the most controversial ones. Privacy advocates have challenged the legality of the program in court, and one Judge deemed the program unconstitutional and "almost Orwellian," while another one ruled it legal.
The existence of PRISM was the second NSA bombshell, coming less than 24 hours after the first one. Initially, reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others.
PRISM, we soon learned, was less less evil than first thought. In reality, the NSA doesn't have direct access to the servers, but can request user data from the companies, which are compelled by law to comply.
PRISM was perhaps as controversial as the first NSA scoop, prompting technology companies to first deny any knowledge of it, then later fight for the right to be more transparent about government data requests. The companies ended up partially winning that fight, getting the government to ease some restrictions and allow for more transparency.
3. Britain's version of the NSA taps fiber optic cables around the world
In the US, New York, California and Texas received the most investment. Chinese firms invested $5.4bn in New York, the top beneficiary, with most of the money spent on three big financial services and real estate deals.
Another fashion high-flyer making her mark on the first day of the world-famous festival was Winnie Harlow. The Canadian model - who has the skin condition vitiligo - nearly took Emily's crown, as she made a play for the attention with her elegant belle of the ball outfit.
The Warriors are one of the best teams in NBA history, and you can put their championship run up against any team in NBA history for the best playoff performance ever. But there's also a legitimate question of what this means for the sport. If the best or second-best player of all time stands no chance against this team, what does it mean for the sport's competitiveness? It hasn't been a problem so far, thanks to an extremely wild offseason, but the question remains: what happens to a competitive sports league when it's not truly competitive at the highest level?
Tempora is one of the key NSA/GCHQ programs, allowing the spy agencies to collect vasts troves of data, but for some reason, it has sometimes been overlooked. After a couple of months from the Tempora revelation, a German newspaper revealed the names of the companies that collaborate with the GCHQ in the Tempora program: Verizon Business, British Telecommunications, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute.
4. NSA spies on foreign countries and world leaders
Perhaps just as important, stable or falling prices will boost the inflation-adjusted pay of U.S. workers and gives them more bang for their buck. "It's an unambiguous positive for household demand," said Neil Dutta, head of economics at Renaissance Macro Research. "People will have more money to spend."
In addition to WeChat's core private and group messaging functions, users can also find new contacts by using the application's Drift Bottle function, where a user records a message and sends it out to see in a virtual bottle for a stranger to pick up and respond. Its Look Around function, similar to some mobile dating applications, allows users to browse the profiles of other users who are in close proximity. It also has a function called Moments that allows users to share photo albums publicly with groups of contacts, much like photo-sharing application Instagram.
The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.
Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President Dilma Roussef, and Mexico's former President Felipe Calderon, the French Foreign Ministry, as well as leaders at the 2010 G8 and G20 summits in Toronto.
5. XKeyscore, the program that sees everything
XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" through data it intercepts across the world. In leaked documents, the NSA describes it as the "widest-reaching" system to search through Internet data.
6. NSA efforts to crack encryption and undermine Internet security
Encryption makes data flowing through the Internet unreadable to hackers and spies, making the NSA's surveillance programs less useful. What's the point of tapping fiber optic cables if the data flowing through them is unreadable? That's why the NSA has a developed a 中央经济工作会议：明年我国稳健的货币政策要松紧适度 to circumvent widely used web encryption technologies.
One of the men even swoops in to give the girl a quick kiss on the cheek. He turns around in mock-embarrassment and gives his friend a hug, while the young woman speaks to her friend in French.
The new data released yesterday represent the first snapshot of global trade for 2015. But the figures also come amid growing concerns that 2016 is already shaping up to be more fraught with dangers for the global economy than previously expected.
"We will set the exact date and location for our operation in consideration of weather conditions, but it will not be publicised," said Park Sang-Hak, a former defector who has led a series of balloon launches
The drama was broadcast during the summer holiday, targeting young audiences who prefer fantasies and romances.
"When the actual dependency ratio of pension insurance gets down to three to one, the payment cannot be lower than 17 percent. If it drops to two to one ratio, it means that everyone is going to pay 25 percent. The financial burden gets heavier when the dependency ratio gets lower. The restructuring of pension system must be finalized in two years." Yang said.
And, at random, some other highlights from the list:
7. NSA elite hacking team techniques revealed
The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
Der Spiegel, which detailed TAO's secrets, labelled it as "a squad of plumbers that can be called in when normal access to a target is blocked." But they can probably be best described as the NSA's black bag operations team.
5. Mother Nature
哈佛大学著名教授格雷厄姆?阿利森(Graham Allison)也警告说，东亚已走向“修昔底德陷阱”(Thucydides’s trap)，他并补充道：“当一个迅速崛起的大国与一个老牌霸权国竞争时，麻烦接踵而来。”2013年初，时任卢森堡首相的让-克洛德?容克(Jean-Claude Juncker)警告称，2013年看起来像1913年一样危险。2013年底，《经济学人》杂志(The Economist)也警告说，“一个世纪已过去，当今世界却与那个导致第一次世界大战爆发的时代有不少相似之处，令人不安。”
But it's the best pay on offer for a major world leader.
The Florida Project
8. NSA cracks Google and Yahoo data center links
When bulk collection or PRISM fails, the NSA had other tricks up its sleeve: It could infiltrate links connecting Yahoo and Google data centers, behind the companies' backs.
This story truly enraged the tech companies, which reacted with much more fury than before. Google and Yahoo announced plans to strengthen and encrypt those links to avoid this kind of surveillance, and a Google security employee even said on his Google+ account what many others must have thought privately: "Fuck these guys."
9. NSA collects text messages
In the meantime, the sheer total of bitcoin-related startups that launched in 2014 demonstrates bitcoin’s momentum. There is no definitive listing of every single bitcoin startup, but 2014 almost certainly saw the launch of more of them than in any year prior. Data that AngelList sent to Fortune confirms that. In 2011, five bitcoin startups listed themselves on AngelList. In 2012 that number grew to 13. In 2013 it jumped to 193, and last year it exploded to 566. (But not all startups register on AngelList immediately, if at all.) In addition, on January 8 the total number of daily bitcoin transactions hit an all-time high, as Barry Silbert eagerly tweeted.
— James Ball (@jamesrbuk) January 16, 2014
Other documents also revealed that the NSA can "easily" crack cellphone encryption, allowing the agency to more easily decode and access the content of intercepted calls and text messages.
10. NSA intercepts all phone calls in two countries
The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo.