14. The Foreign Intelligence Surveillance Court has issued orders that allow the NSA to share raw data--without personally identifying information stripped out-- with the FBI, CIA, and the National Counterterrorism Center.
15. Pursuant to a memorandum of understanding, the NSA regularly shares raw data with Israel without stripping out personally identifying information about U.S. persons.
16. The Snowden disclosures have made it clear the Obama administration misled the Supreme Court about key issues in ACLU's case against NSA spying, Clapper v. Amnesty International, leading to the dismissal of the case for lack of standing.
17. The NSA "hacked into Al Jazeera's internal communications system." NSA documents stated that "selected targets had 'high potential as sources of intelligence.'"
18. The NSA used supposedly anonymous Google cookies as beacons for surveillance, helping them to track individual users.
19. The NSA "intercepts 'millions of images per day' -- including about 55,000 'facial recognition quality images'" and processes them with powerful facial recognition software.
20. The NSA facial recognition program "can now compare spy satellite photographs with intercepted personal photographs taken outdoors to determine the location."
21. Although most NSA reform has focused on Section 215 of the PATRIOT Act, and most advocates have also pushed for reform of Section 702 of the FISA Amendments Act, some of the worst NSA spying happens under the authority of Executive Order 12333, which President Obama could repeal or modify today.
22. The NSA collected Americans' cell phone location information for two years as part of a pilot project to see how it could use such information in its massive databases.
23. In one month, March 2013, the NSA collected 97 billion pieces of intelligence from computer networks worldwide, including 3 billion pieces of intelligence from US computer networks.
24. The NSA has targeted Tor, a set of tools that allow Internet users to browse the net anonymously.25. The NSA program MUSCULAR infiltrates links between the global data centers of technology companies such as Google and Yahoo. Many companies have responded to MUSCULAR by encrypting traffic over their internal networks.
26. The XKEYSCORE program analyzes emails, online chats and the browsing histories of millions of individuals anywhere in the world.
27. NSA undermines the encryption tools relied upon by ordinary users, companies, financial institutions, targets, and non-targets as part of BULLRUN, an unparalleled effort to weaken the security of all Internet users, including you.
28. The NSA's Dishfire operation has collected 200 million text messages daily from users around the globe, which can be used to extract valuable information such as location data, contact retrievals, credit card details, missed call alerts, roaming alerts (which indicate border crossings), electronic business cards, credit card payment notifications, travel itinerary alerts, and meeting information.
29. Under the CO-TRAVELER operation, the US collects location information from global cell towers, Wi-Fi, and GPS hubs, which is then information analyzed over time, in part in order to determine a target's traveling companions.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).