What's in the News

  • 2873 replies
  • 671296 views
*

AMonk

  • *****
  • 7826
Re: What's in the News
« Reply #2640 on: July 15, 2016, 10:14:45 PM »
Terror attack in Nice, France.  84 people dead, including many children.


http://www.bbc.com/news/world-europe-36801671
Moderation....in most things...

Re: What's in the News
« Reply #2641 on: July 17, 2016, 08:47:52 PM »
ISIS are a hateful bunch and have claimed the Nice attack, but that guy, Mohamed Lahouaiej-Bouhlel, seems not to have been political at all. His was a violent and terrible assault, but I don't know that it was a terror attack.

But Europe and America and even Australia are definitely on their way to substantial anti-immigrant positions.

Having spent all this time in China I can't make too much sense of anti-immigrant positions, but I do recall my brief stint in Sydney and thinking then that - somehow - even there, there were tensions on the streets all the time. I might have been making the vibes rather than picking them up, but there it is.
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2642 on: July 21, 2016, 01:18:31 PM »
Feds Seize Kickass Torrents Piracy Site Domain Names, Announce Arrest of Alleged Ringleader

The U.S. Department of Justice has seized seven domain names associated with Kickass Torrents — purportedly the most-visited piracy site in the world — and charged the man they allege is its owner and operator with criminal copyright infringement and and money laundering.

Federal authorities said Artem Valuin, 30, of Kharkiv, Ukraine, was arrested Wednesday in Poland and that the U.S. will seek to extradite him to the States. Valuin allegedly owns and operates Kickass Torrents, which since launching in 2008 has let users illegally download movies, TV shows, video games, music and other media collectively worth an estimated $1 billion.

Kickass Torrents has consistently listed movies still in theaters that can be downloaded using file-sharing apps, according to the charges. Recent titles include “Captain America: Civil War,” “Now You See Me 2,” “Independence Day: Resurgence,” and “Finding Dory,” officials said.

“Copyright infringement exacts a large toll, a very human one, on the artists and businesses whose livelihood hinges on their creative inventions,” Zachary T. Fardon, U.S. Attorney for the Northern District of Illinois in Chicago, said in a statement. “Vaulin allegedly used the Internet to cause enormous harm to those artists.”...



/gameover
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2643 on: July 22, 2016, 12:01:10 PM »
Calach, I don't/can't download anything. I go to the theatre at least twice a week and sometimes my neighbour and I  are the only ones there. I wonder how long it will be until we no longer have theatres?

when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2645 on: July 22, 2016, 02:17:38 PM »
The morality of downloading eludes me. It's not criminal, but nor is it victimless. And while torrenting, I function as a distributor for anything I've downloaded.

 ¯\_(ツ)_/¯

Ever since I've had computers I've leaned toward shareware and freeware tools. Probably the strongest opinion I have about downloading is I wish I could have downloaded music when I was young. The few cds I bought as a kid were ill-informed and so much less attractive than the things I now know existed.
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2646 on: July 31, 2016, 10:00:50 PM »
Study Finds Chinese Students Excel in Critical Thinking. Until College.

BEIJING — Chinese primary and secondary schools are often derided as grueling, test-driven institutions that churn out students who can recite basic facts but have little capacity for deep reasoning.

A new study, though, suggests that China is producing students with some of the strongest critical thinking skills in the world.

The unexpected finding could recast the debate over whether Chinese schools are doing a better job than American ones, complementing previous studies showing Chinese students outperforming their global peers in reading, math and science.

But the new study, by researchers at Stanford University, also found that Chinese students lose their advantage in critical thinking in college. That is a sign of trouble inside China’s rapidly expanding university system, which the government is betting on to promote growth as the economy weakens....



FYI: the report says comparative data for US students is not available yet. The study compares Chinese results against Russian.

The report also notes that these robust critical thinkers are saying things like "[University] Teachers don’t know how to attract the attention of students." Supposedly these geniuses already know how to identify assumptions, test hypotheses and draw relationships between variables, but maybe the corrupting influence of university already had them by the time they were asked what was wrong.
« Last Edit: July 31, 2016, 10:06:36 PM by Calach Pfeffer »
when ur a roamin', do as the settled do o_0

*

old34

  • *
  • 2509
Re: What's in the News
« Reply #2647 on: August 01, 2016, 05:03:35 AM »
For those of us for whom The NYTIMES is blocked, could you please cut-and-paste the whole article, please. This subject is one of the main themes I use in my own classes with my own students. (Critical  Thinking and Creativity, not the blocking).

If you want to cite blocked articles, cut-and-paste the whole thing, not blocked links. Thanks.
Knowledge is knowing that a tomato is a fruit; wisdom is knowing not to put it in a fruit salad. - B. O'Driscoll.
TIC is knowing that, in China, your fruit salad WILL come with cherry tomatoes AND all slathered in mayo. - old34.

Re: What's in the News
« Reply #2648 on: August 01, 2016, 01:08:42 PM »
Study Finds Chinese Students Excel in Critical Thinking. Until College.

By JAVIER C. HERNÁNDEZ JULY 30, 2016

BEIJING — Chinese primary and secondary schools are often derided as grueling, test-driven institutions that churn out students who can recite basic facts but have little capacity for deep reasoning.

A new study, though, suggests that China is producing students with some of the strongest critical thinking skills in the world.

The unexpected finding could recast the debate over whether Chinese schools are doing a better job than American ones, complementing previous studies showing Chinese students outperforming their global peers in reading, math and science.

But the new study, by researchers at Stanford University, also found that Chinese students lose their advantage in critical thinking in college. That is a sign of trouble inside China’s rapidly expanding university system, which the government is betting on to promote growth as the economy weakens.

The study, to be published next year, found that Chinese freshmen in computer science and engineering programs began college with critical thinking skills about two to three years ahead of their peers in the United States and Russia. Those skills included the ability to identify assumptions, test hypotheses and draw relationships between variables.

Yet Chinese students showed virtually no improvement in critical thinking after two years of college, even as their American and Russian counterparts made significant strides, according to the study.

“It’s astounding that China produces students that much further ahead at the start of college,” said Prashant Loyalka, an author of the study. “But they’re exhausted by the time they reach college, and they’re not incentivized to work hard.”

The findings are preliminary, but the weakness in China’s higher education system is especially striking because Chinese leaders are pressing universities to train a new generation of highly skilled workers and produce innovations in science and technology to serve as an antidote to slowing economic growth.

Continue reading the main story
The government has built hundreds of universities in recent years to meet soaring demand for higher education, which many families consider a pathway into the growing middle class. Enrollment last year reached 26.2 million students, up from 3.4 million in 1998, with much of the increase in three-year polytechnic programs.

But many universities, mired in bureaucracy and lax academic standards, have struggled. Students say the energetic and demanding teaching they are accustomed to in primary and secondary schools all but disappears when they reach college.

“Teachers don’t know how to attract the attention of students,” said Wang Chunwei, 22, an electrical engineering student at Tianjin Chengjian University, not far from Beijing. “Listening to their classes is like listening to someone reading out of a book.”

Others blame a lack of motivation among students. Chinese children spend years preparing for the gaokao, the all-powerful national exam that determines admission to universities in China. For many students, a few points on the test can mean the difference between a good and a bad university, and a life of wealth or poverty.

When students reach college, the pressure vanishes.

“You get a degree whether you study or not, so why bother studying?” said Wang Qi, 24, a graduate student in environmental engineering in Beijing.

The merits of the Chinese education system are a perennial subject of debate, in the United States as much as in China. The Obama administration has held up the stronger performance of Chinese high school students on international exams in math, science and reading as an example of stagnation in the United States.

Critics argue that Chinese teachers place an unhealthy emphasis on test preparation and rote memorization at the expense of critical thinking skills and creativity. They also say international exams overstate the strength of China’s system because they exclude students from poorer regions.

The Stanford study, based in part on exams given to 2,700 students at 11 mainland universities, has its own limitations. It does not account for people who are not enrolled in universities, a large swath of Chinese youth. It looks exclusively at students in computer science and engineering programs. And while it measures critical thinking, it does not offer insight into creativity, a topic often hotly debated in discussing the Chinese education system.

Still, the researchers found stark differences when they compared Chinese students with their overseas counterparts.

In addition to examining critical thinking skills, the study looked at how Chinese students compared in math and physics. While testing for the United States is not yet available, the researchers found that Chinese students arrived at college with skills far superior to their Russian counterparts.

After two years of college, though, the Chinese students showed virtually no improvement while the Russians made substantial progress, though not enough to catch up.

The Stanford researchers suspect the poor quality of teaching at many Chinese universities is one of the most important factors in the results. Chinese universities tend to reward professors for achievements in research, not their teaching abilities. In addition, almost all students graduate within four years, according to official statistics, reducing the incentive to work hard.

“They don’t really flunk anyone,” said Scott Rozelle, an economist who has studied Chinese education for three decades and a co-author of the study. “The contract is, if you got in here, you get out.”

The problems plaguing the higher education system have taken on new urgency as China’s ruling Communist Party tries to navigate a difficult transition from an economy fueled by manufacturing and assembly-line work to one led by growth in fields such as information technology and clean energy.

Eric X. Li, a venture capitalist in Shanghai who helped finance the Stanford study, said the success of Chinese secondary schools in teaching critical thinking could mean more innovation among younger Chinese that would help the economy.

“The common narrative that we hear is that Chinese educational system kills creativity and kills innovation,” he said. “But China is probably one of the most entrepreneurial societies in the world.”

The slowing economy has made it difficult for university graduates to find work, with about one-fifth remaining unemployed immediately after graduation and many settling into low-paying jobs.

Lu Jiawei, 22, who studies engineering management at Beijing Information Science and Technology University, said the gloomy job market was to blame for a lack of motivation among students.

“Some students just give up, because no matter how hard they work, they still will never get their dream jobs,” she said.

The shortcomings of the higher education system have left students struggling to find programs that match their aspirations.

Niu Fuzhi, an aspiring computer scientist at Harbin University of Commerce, had high hopes when she enrolled in 2014. But she was quickly disappointed. Professors focused on teaching high-level theories, she said, and classrooms were chaotic.

“I feel like the past two years were a waste,” said Ms. Niu, 20, who ranks near the top of her class.

But Ms. Niu is hoping to make up for the skills she failed to learn in college — by enrolling in graduate school.



/boom
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2649 on: August 05, 2016, 02:46:36 PM »
Legends say China began in a great flood. Scientists just found evidence that [a] flood was real.

It's said the flood looked like "endless boiling water," surging across the landscape. A wave as tall as a 30-story building would have crashed over the banks of the Yellow River, demolishing everything in its path. It soaked the streets of ancient China's nascent cities and washed away the surrounding farmland.

"The flood is pouring forth destruction. Boundless and overwhelming, it overtops hills and mountains," goes a quote attributed to the legendary Emperor Yao. "Rising and ever rising, it threatens the very heavens."

If civilization was to survive, the people needed a hero who could tame the floodwaters and restore the land. That man was Yu, founder of China's first dynasty, the Xia. Over the course of decades, Yu organized a dredging campaign, dug channels that would carry the water back to its source, and pioneered a tradition of great Chinese public works.

"He brings order out of the chaos and defines the land, separating what would become the center of Chinese civilization," said David Cohen, an anthropologist and early Chinese history expert at National Taiwan University. "He is essentially establishing the political order and the ideologies of rulership."

It is a powerful foundation myth, but many believed that was all it was. Some 4,000 years after the flood was supposed to have happened, historians had found no archaeological evidence of its effect or firsthand accounts of its destruction. There are no historical artifacts from Yu, or the Xia dynasty he founded. All researchers had to go on were stories written long after the fact, dramatized and politicized to justify the ends of those who wrote them.

Until Wu Qinglong, a geologist at Nanjing Normal University, found signs of the flood in the sediments beneath his feet....



/spooky
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2650 on: August 05, 2016, 02:53:04 PM »
Have Scientists Found Evidence of the Great Flood of China?

Along the banks of the Yellow River in northwest China’s Qinghai province, scientists have discovered evidence of one of the most cataclysmic floods on Earth in the past 10,000 years.

This disaster, which occurred nearly 4000 years ago, might match the Great Flood of Chinese legends. Historians have debated whether this flood was merely a myth, part of a founding story to bolster the legitimacy of China’s dynasties. But the findings published in the journal Science today, August 4, offer the first physical evidence of such a catastrophe.

The scope of the flood that the researchers describe is difficult to imagine. According to their reconstructions, a wall of water some 427 feet high—one-third of the height of the Empire State Building—burst through a natural dam in the Jishi Gorge and then rushed downstream at a rate of 300,000–500,000 cubic meters per second. After the dam broke, the Yellow River rose 125 feet above its normal level.

“To put that into perspective, that's roughly equivalent to the largest flood ever measured on the Amazon river, the world's largest river,” study co-author Darryl Granger, a geologist at Purdue University in Indiana, told reporters during a press conference Wednesday. “It's among the largest known floods to have happened on Earth during the past 10,000 years. And it's more than 500 times larger than a flood we might expect on the Yellow River from a massive rainfall."...
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2651 on: August 07, 2016, 06:49:51 PM »
Edward Snowden Not Dead

‘He’s Fine’ Says Glenn Greenwald After Mysterious Tweet

Snowden issued a cryptic 64-character code via Twitter leading to concern that the whistleblower was captured or killed triggering a "dead man’s switch" message designed to release if he didn’t check into his computer at a certain time.

A journalist with The Intercept who has worked extensively with the whistleblower in the past says that Snowden is “fine,” but refused to elaborate further. The response from the journalist comes in the wake of two mysterious tweets by the famed NSA whistleblower who exposed a rampant regime of domestic surveillance by US intelligence agencies....


Edward Snowden tweeted gibberish and people are trying to figure out what it all means
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2652 on: September 16, 2016, 06:23:26 PM »
Tips from Global Times on how to pick up chicks in China:

Besides patting on the head, Pope [Pope, 25, an English teacher from the US who is based in Beijing] has also heard of other classic moves many Chinese men use to hit on girls, including tying their shoes, fastening their seat belt, kissing them on the forehead, hugging them from behind and pushing them to the wall and then kissing them.

"My Chinese friends told me that if men behave this way, they could not help but fall in love with them instantly," she said


And despite the efficacy of corny lines in the western world ("Kiss me if I'm wrong, but dinosaurs still exist, right?", "Excuse me, do you know if there's an airport nearby? Or was that just my heart taking off because you walked past?", "Can I get your picture to prove to my friends that angels do exist?"), don't try them here.

You're welcome.
when ur a roamin', do as the settled do o_0

Re: What's in the News
« Reply #2653 on: September 17, 2016, 01:32:27 PM »
Calach, if they see the movie "Nerve", they might pick up a few more ideas. bfbfbfbfbf agagagagag ahahahahah

Re: What's in the News
« Reply #2654 on: September 17, 2016, 07:52:53 PM »
This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks

Here is everything that Snowden's leaks revealed between 2013 and 2014:

• With a top-secret court order, the NSA collected the telephone records from millions of Verizon customers. — June 6, 2013

• The NSA accessed and collected data through back doors into US internet companies such as Google and Facebook with a program called Prism. — June 7, 2013

• An 18-page presidential memo shows Obama ordering intelligence officials to draw up a list of overseas targets for cyberattacks. — June 7, 2013

• Documents reveal the NSA's Boundless Informant program, which gives the agency near real-time ability to understand how much intelligence coverage there is on certain areas through use of a "heat map." — June 8, 2013

• The NSA was hacking computers in Hong Kong and mainland China, few of which were military systems. — June 13, 2013

• Britain's GCHQ (its intelligence agency) intercepted phone and internet communications of foreign politicians attending two G-20 meetings in London in 2009. — June 16, 2013

• Top-secret procedures show steps the NSA must take to target and collect data from "non-US persons" and how it must minimize data collected on US citizens. — June 20, 2013

• Britain's GCHQ taps fiber-optic cables to collect and store global email messages, Facebook posts, internet histories, and calls, and then shares the data with the NSA. — June 21, 2013

• The NSA has a program codenamed EvilOlive that collects and stores large quantities of Americans' internet metadata, which contains only certain information about online content. Email metadata, for example, reveals the sender and recipient addresses and time but not content or subject. — June 27, 2013

• Until 2011, the Obama administration permitted the NSA's continued collection of vast amounts of Americans' email and internet metadata under a Bush-era program called Stellar Wind. — June 27, 2013

• The US government bugged the offices of the European Union in New York, Washington, and Brussels. — June 29, 2013

• The US government spies on at least 38 foreign embassies and missions, using a variety of electronic surveillance methods. — June 30, 2013

• The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens. — June 30, 2013

• Using a program called Fairview, the NSA intercepts internet and phone-call data of Brazilian citizens. — July 6, 2013

• Monitoring stations set up in Australia and New Zealand help feed data back to NSA's XKeyscore program. — July 6, 2013

• The NSA conducts surveillance on citizens in a number of Latin American countries, including Venezuela, Colombia, Argentina, Panama, Ecuador, Peru, and others. The agency also sought information on oil, energy, and trade. — July 9, 2013

• The Washington Post publishes a new slide detailing NSA's "Upstream" program of collecting communications from tech companies through fiber-optic cables to then feed into its Prism database. — July 10, 2013

• Germany's Federal Intelligence Service, BND, helps contribute data to the NSA's XKeyscore program. — July 20, 2013

• NSA analysts, using the XKeyscore program, can search through enormous databases of emails, online chats, and browsing histories of targets. — July 31, 2013

• The US government paid Britain's GCHQ roughly $155 million over three years to gain access and influence over its spying programs. — August 1, 2013

• Seven of the world's leading telecommunications companies provide GCHQ with secret, unlimited access to their network of undersea cables. — August 2, 2013

• The NSA provided surveillance to US diplomats in order to give them the upper hand in negotiations at the UN Summit of the Americas. — August 2, 2013

• The NSA sifts through vast amounts of Americans' email and text communications going in and out of the country. — August 8, 2013

• Internal NSA document reveals an agency "loophole" that allows a secret backdoor for the agency to search its databases for US citizens' emails and phone calls without a warrant. — August 9, 2013

• NSA collection on Japan is reportedly maintained at the same priority as France and Germany. — August 12, 2013

• The NSA broke privacy rules thousands of times per year, according to an internal audit. — August 15, 2013

• NSA analysts revealed to have sometimes spied on love interests, with the practice common enough to have coined the term LOVEINT, or love intercepts. (It was unclear whether this report came from Snowden docs.) — August 23, 2013

• Britain runs a secret internet-monitoring station in the Middle East to intercept emails, phone calls, and web traffic, The Independent reports, citing Snowden documents. Snowden denies giving The Independent any documents, alleging the UK government leaked them in an attempt to discredit him. — August 23, 2013

• The top-secret US intelligence "black budget" is revealed for 2013, with 16 spy agencies having a budget of $52.6 billion. — August 29, 2013

• Expanding upon data gleaned from the "black budget," the NSA is found to be paying hundreds of millions of dollars each year to US companies for access to their networks. — August 29, 2013

• The US carried out 231 offensive cyberattacks in 2011. — August 30, 2013

• The NSA hacked into Qatar-based media network Al Jazeera's internal communications system. — August 31, 2013

• The NSA spied on former Brazilian President Dilma Rousseff and Mexican President Enrique Peña Nieto (then a candidate). — September 1, 2013

• Using a "man in the middle" attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society for Worldwide Interbank Financial Telecommunications, and the Brazilian oil company Petrobras. — September 2, 2013

• A US intelligence "black budget" reveals Al Qaeda's effort to jam, hack, and/or shoot down US surveillance drones. — September 3, 2013

• A joint investigation by ProPublica, The New York Times, and The Guardian finds the NSA is winning its war against internet encryption with supercomputers, technical know-how, and court orders. — September 5, 2013

• The NSA has the ability to access user data for most major smartphones on the market, including Apple iPhones, BlackBerrys, and Google Android phones. — September 7, 2013

• The NSA shares raw intelligence data (with information about American citizens) to Israel with an information-sharing agreement. — September 11, 2013

• The NSA monitors banks and credit institutions for a comprehensive database that can track the global flow of money. — September 16, 2013

• Britain's GCHQ launched a cyberattack against Belgacom, a partly state-owned Belgian telecommunications company. — September 20, 2013

• The NSA spies on Indian diplomats and other officials in an effort to gain insight into the country's nuclear and space programs. — September 23, 2013

• The NSA's internal "wiki" website characterizes political and legal opposition to drone attacks as part of "propaganda campaigns" from America's "adversaries." — September 25, 2013

• Since 2010, the NSA has used metadata augmented with other data from public, commercial, and other sources to create sophisticated graphs that map Americans' social connections. — September 28, 2013

• The NSA stores a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina. — September 30, 2013

• The NSA and GCHQ worked together to compromise the anonymous web-browsing Tor network. — October 4, 2013

• Canada's signals intelligence agency, CSEC, spied on phone and computer networks of Brazil's Ministry of Mines and Energy and shared the information with the "Five Eyes" intelligence services of the US, Canada, Britain, Australia, and New Zealand. — October 7, 2013

• The NSA collected more than 250 million email contact lists from services such as Yahoo and Gmail. — October 14, 2013

• NSA surveillance was revealed to play a key role in targeting for overseas drone strikes. — October 16, 2013

• The NSA spied on French citizens, companies, and diplomats, and monitored communications at France's embassy in Washington and its UN office in New York. — October 21, 2013

• The NSA tapped the mobile phone of German Chancellor Angela Merkel. — October 23, 2013

• The NSA spied on Italian citizens, companies, and government officials. — October 24, 2013

• The NSA monitored the phone calls of 35 world leaders and encouraged other government agencies to share their "Rolodexes" of foreign politicians so it could monitor them. — October 25, 2013

• The NSA spied on Spanish leaders and citizens. — October 25, 2013

• The NSA stations surveillance teams at 80 locations around the world. — October 27, 2013

• A joint program between the NSA and Britain's GCHQ called Muscular infiltrates and copies data flowing out of Yahoo and Google's overseas data centers. One slide boasted of "SSL added and removed here!" with a smiley face. — October 30, 2013

• The NSA spied on the Vatican. (The Panorama website did not cite Snowden as the source.) — October 30, 2013

One slide boasted of "SSL added and removed here!" with a smiley face.
• Australia's intelligence service has surveillance teams stationed in Australian embassies around Asia and the Pacific. — October 31, 2013

• One document reveals tech companies play a key role in NSA intelligence reports and data collection. — November 1, 2013

• Britain's GCHQ and other European spy agencies work together to conduct mass surveillance. — November 1, 2013

• Strategic missions of the NSA are revealed, which include combatting terrorism and nuclear proliferation, as well as pursuing US diplomatic and economic advantage. — November 2, 2013

• Australia's Defense Signals Directorate and the NSA worked together to spy on Indonesia during a UN climate change conference in 2007. — November 2, 2013

• The NSA spied on OPEC. — November 11, 2013

• GCHQ monitored the booking systems of 350 high-end hotels with a program called Royal Concierge, which sniffed for booking confirmations sent to diplomatic email addresses that would be flagged for further surveillance. — November 17, 2013

• Australia's DSD spied on the cellphones of top Indonesian officials, including the president, first lady, and several cabinet ministers. — November 18, 2013

• The NSA spied on millions of cellphone calls in Norway in one 30-day period. — November 19, 2013

• The British government struck a secret deal with the NSA to share phone, internet, and email records of UK citizens. — November 20, 2013

• A NSA strategy document reveals the agency's goal to acquire data from "anyone, anytime, anywhere" and expand its already broad legal powers. — November 22, 2013

• The NSA infected more than 50,000 computer networks worldwide with malware designed to steal sensitive information. — November 23, 2013

• The NSA gathers evidence of visits to pornographic websites as part of a plan to discredit Muslim jihadists. — November 26, 2013

• Working with Canadian intelligence, the NSA spied on foreign diplomats at the G-8 and G-20 summits in Toronto in 2010. — November 28, 2013

• The Netherlands' intelligence service gathers data on web-forum users and shares it with the NSA. — November 30, 2013

• A draft document reveals Australia offered to share information collected on ordinary Australian citizens with the NSA and other "Five Eyes" partners. — December 1, 2013

• The NSA siphons billions of foreign cellphone location records into its database. — December 4, 2013

• Widespread spying is revealed in Italy, with the NSA spying on ordinary Italians as well as diplomats and political leaders. — December 5, 2013

• Swedish intelligence was revealed to be spying on Russian leaders, then passing it on to the NSA. — December 5, 2013

• A document reveals the extent of the relationship between NSA and Canadian counterparts, which includes information-sharing and Canada allowing NSA analysts access to covert sites it sets up. — December 9, 2013

• Intelligence operatives with NSA and GCHQ infiltrate online video games such as "World of Warcraft" in an effort to catch and stop terrorist plots. — December 9, 2013

• Piggybacking on online "cookies" acquired by Google that advertisers use to track consumer preferences, the NSA is able to locate new targets for hacking. — December 10, 2013

• The NSA has the ability to decrypt the common A5/1 cellphone encryption cipher. — December 13, 2013

• The NSA secretly paid the computer security firm RSA $10 million to implement a "back door" into its encryption. — December 20, 2013

• A document reveals how Britain's GCHQ spied on Germany, Israel, the European Union, and several nongovernmental organizations. — December 20, 2013

• With a $79.7 million research program, the NSA is working on a quantum computer that would be able to crack most types of encryption. — January 2, 2014

• Using radio transmitters on tiny circuit boards or USB drives, the NSA can gain access to computers not connected to the internet. — January 14, 2014

• The NSA scoops "pretty much everything it can" in untargeted collection of foreign text messages for its Dishfire database. — January 16, 2014

• The NSA scoops up personal data mined from smartphone apps such as Angry Birds. — January 27, 2014

• A GCHQ program called Squeaky Dolphin monitors YouTube, Facebook, and Blogger for "broad real-time monitoring of online activity." — January 27, 2014

• The NSA spied on negotiators during the 2009 UN climate change conference in Copenhagen, Denmark. — January 29, 2014

• CSEC, Canada's national cryptologic agency, tested a pilot program with the NSA that captured metadata from users who had logged into free airport Wi-Fi. — January 30, 2014

• Britain's GCHQ waged war on hacker groups such as Anonymous and Lulzsec, mounting Distributed Denial-of-Service attacks and infiltrating their chat rooms. — February 5, 2014

• The NSA reportedly monitored former German Chancellor Gerhard Schröder in the run-up to the Iraq war. — February 5, 2014

• Britain's GCHQ used "dirty tricks" such as computer viruses and sexual "honey traps" to target adversaries. — February 7, 2014

• The US's "targeted killing" program of drone strikes relies mostly on cellphone metadata and geolocation, rather than on-the-ground human intelligence. — February 10, 2014

• An American law firm was monitored by the Australian Signals Directorate while representing the government of Indonesia during a trade dispute. — February 15, 2014

• The NSA and Britain's GCHQ reportedly monitored traffic to the WikiLeaks website and considered a move to monitor communications going to or from WikiLeaks and the Pirate Bay. — February 18, 2014

• Britain's GCHQ conducts covert operations to disrupt and shape online discourse. — February 24, 2014

• Britain's GCHQ, using a program called Optic Nerve, intercepted and stored webcam images from millions of Yahoo users, then passed them on to the NSA's XKeyscore database. — February 28, 2014

• The NSA shared intelligence that helped the Dutch navy capture a ship hijacked by pirates off Somalia, and the Netherlands regularly shares information with the NSA regarding Somalia and Afghanistan. — March 5, 2014

• The NSA has an advice columnist similar to "Dear Abby" who writes an "Ask Zelda" column distributed on the agency's internal network. — March 7, 2014

• NSA developed sophisticated malware "implants" to infect millions of computers worldwide. In one example, the NSA posed as a fake Facebook server to infect a target's computer and steal files. — March 12, 2014

• Document reveals that, while many foreign governments share information with NSA, few senior officials outside of the intelligence or defense sphere have any knowledge of it. — March 13, 2014

• The NSA built a system capable of recording "100%" of a foreign country's phone calls with a voice intercept program called Mystic. The Washington Post did not name the countries where the program was used. — March 18, 2014

• The NSA specifically targets foreign systems administrators to gain access to their networks. — March 20, 2014

• The NSA closely monitored the Chinese technology firm Huawei in attempt to reveal ties between the company and the Chinese military. The agency also spied on Chinese banks and other companies, as well as former President Hu Jintao. — March 22, 2014

• Malaysia's political leadership is a high-priority intelligence target for the US and Australia — March 30, 2014

• NSA and Britain's GCHQ discussed various methods of deception, use of propaganda, mass messaging, and pushing stories on social media sites — April 4, 2014

• The Norwegian Intelligence Service is developing a supercomputer, called Steel Winter, to decrypt and analyze data from Afghanistan, Russia, and elsewhere. — April 26, 2013

• Britain's GCHQ asked the NSA for "unsupervised access" to the NSA's vast databases. It was unclear whether the request was granted. — April 30, 2014

• The NSA physically intercepts routers, servers, and other computer networking equipment before it's exported outside the US, implants "back door" surveillance tools, then repackages them with a factory seal and ships them out. — May 12, 2014

• The NSA is intercepting, recording, and archiving virtually every cellphone call in the Bahamas and one other country, which The Intercept redacted. It also reveals metadata collection on Mexico, Kenya, and the Philippines. — May 19, 2014

• After giving journalist Glenn Greenwald a 72-hour warning to reveal the nation redacted from his previous report on mass surveillance of an entire country, WikLeaks reveals the country in question is Afghanistan. — May 23, 2014

• The NSA harvests millions of faces from web images for use in a previously undisclosed facial recognition database. — May 31, 2014

Author's note: I've tried my best to be thorough in sifting through the hundreds of leaks that have come to light thus far. I have not included Snowden's movements, legal situation, or any of the political drama surrounding the leaks. This timeline only shows the many reports stemming from documents the ex-NSA contractor handed over to journalists.

If I have missed any leaks in the hundreds of news stories on these items, that mistake is mine alone.
when ur a roamin', do as the settled do o_0