晚上老咳嗽是什么原因| 多吃什么对肾好| 糜烂性脚气用什么药| 炖羊肉汤放什么调料| 金蟾吃什么| 什么食物含蛋白质多| 什么立雪| 药流后吃什么消炎药比较好| 乜是什么意思| 中气下陷是什么意思| 子子念什么| momo是什么意思| 芥花油是什么油| 人格是什么| 外阴白斑擦什么药| 什么叫幸福| 四方草地是什么生肖| 什么是义齿| 宝宝消化不好吃什么调理| 大腿外侧是什么经络| 1992年是什么命| 青少年梦遗有什么危害| 面基是什么意思| 青鹏软膏主要治疗什么| 一只眼睛肿了是什么原因| 小孩摇头是什么原因| 什么叫有机食品| 连长相当于地方什么官| 为什么奢侈品都是pvc| 小狗得细小是什么症状| 降结肠疼是什么原因| 物尽其用什么意思| 藏红花有什么作用和功效| 哪吒是什么意思| 杏花代表什么生肖| rr是什么意思| 贫血什么意思| 吃什么补肾壮阳最快速| 孕早期不能吃什么食物| 书到用时方恨少下一句是什么| 百香果有什么营养| 肠胃炎吃什么好| 吃什么拉什么完全不能消化怎么办| 为什么风团会在晚上爆发| 小儿厌食吃什么药最好| 钾低是什么原因造成的| 咖啡色五行属什么| 橡胶过敏是什么症状| 圣经是什么意思| 卡路里什么意思| 让心归零是什么意思| 性激素检查是查什么| 梦见猫是什么预兆| b型和o型生的孩子是什么血型| 手上蜕皮是什么原因| 什么人不能吃阿胶| 肠癌有什么症状| pvd是什么意思| 窦性心律不齐是什么原因引起的| 烟青色是什么颜色| 固本培元是什么意思| 芒果是什么季节的水果| 月出念什么| 迎风流泪用什么眼药水| 诺贝尔为什么没有数学奖| 宝宝益生菌什么时候吃最好| 有什么游戏| 摩羯座哭了代表什么| 下午六点是什么时辰| 鼍是什么动物| 贫血应该吃什么| 什么军官可以随身配枪| 煮玉米为什么要放盐| 冬天喝什么茶| 得罪是什么意思| 早上起来不晨勃是什么原因| 阿莫西林和头孢有什么区别| 6.21什么星座| 扁平苔藓是什么病| 床上为什么会有跳蚤| 7月14号是什么星座| 疱疹用什么药膏最有效| 盥洗室什么意思| 装什么病能容易开病假| 夜间抽搐的原因是什么| 男人遗精是什么原因造成的| 嬴稷和嬴政什么关系| 野蒜有什么功效和作用| 口苦吃什么药| 欧阳修字什么号什么| 自我价值是什么意思| 管教有方是什么意思| 宫颈那囊是什么| brush什么意思| 红色的海鱼是什么鱼| 芒果不能和什么水果一起吃| 碘是什么东西| 晚上睡觉口苦是什么原因| 水鸭是什么鸭| 女生额头长痘痘是什么原因| 普洱是什么茶| 着数是什么意思| 感觉心慌是什么原因| 现在领结婚证需要什么| 女人吃什么补肾| 哪吒属什么生肖| 异位胰腺是什么意思| 7月15日是什么节| 69年属什么| 3月25日是什么星座| 房颤什么意思| 头发不长是什么原因| 洗衣机什么品牌好| 总胆固醇是什么意思| 声音有磁性是什么意思| 飞水是什么意思| k开头的是什么车| 脾大是怎么回事有什么危害| 屈曲是什么意思| 早上起来眼睛肿了是什么原因| 炖牛肉放什么调料| 御守是什么意思| 毫不犹豫的意思是什么| 易岗易薪是什么意思| 闪亮的什么| 为什么脚臭叫香港脚| 老是发烧是什么原因| 吃黄芪有什么好处| 猛吸气胸口疼什么原因| 再生纤维是什么面料| 鬼剃头是什么原因| 同心同德是什么意思| 肉蔻是什么样子| zero什么意思| 羊肠小道什么意思| 形态欠规则是什么意思| 什么姿势睡觉最好| 1996年属什么生肖| ahc是韩国什么档次| 腾空是什么意思| 班草是什么意思| 断背山讲的是什么故事| cns是什么意思| damon英文名什么寓意| 男孩什么时辰出生最好| 9月14号什么星座| mt指什么| 抗凝血是什么意思| pbr是什么意思| 白细胞介素是什么| 属马五行属什么| 大致正常心电图是什么意思| 绿主是什么意思| 回声结节什么意思| 金牛女跟什么星座最配| 扁桃体发炎吃什么食物| 头发染什么颜色显皮肤白显年轻| 雪貂吃什么| 什么叫多囊| 古人的婚礼在什么时间举行| 势利眼是什么意思| 55岁属什么| 眼睛怕光是什么原因| 农历七月初六是什么星座| 黄疸有什么症状| 莲蓬什么时候成熟| 什么叫菩提| 隐血阳性是什么意思| 嘴唇发紫是什么原因| 孩子咳嗽有痰吃什么药| 什么深似海| 癸酉五行属什么| 吃什么可以修复子宫内膜| 盛情款待是什么意思| 流产是什么意思| 做爱时间短吃什么药好| 什么叫三本| 什么运动瘦大腿| 棕色裤子配什么颜色上衣| 六月十号什么星座| 挫伤用什么药| 小肠与什么相表里| 乙肝病毒表面抗体高是什么意思| 荔枝补什么| 左胸口疼是什么原因| 什么桥下没有水脑筋急转弯| 什么已经什么| 反应蛋白偏高说明什么| 什么是情劫| ybb是什么意思| 猪八戒姓什么| 曹操姓什么| 乳房痒是什么原因| 美国报警电话为什么是911| 食指长痣代表什么| 经常催吐有什么危害| suki是什么意思| 真菌阳性是什么意思| 侍郎是什么官| 馊主意是什么意思| 使婢差奴过一生是什么意思| 月字旁的字与什么有关| 异父异母是什么意思| 什么叫逻辑思维| 冲凉是什么意思| 1984年属什么生肖| 梦见小婴儿是什么意思| 为什么不能天天喝豆浆| 保鲜卡是什么原理纸片| 回乳是什么意思| 精子是什么味道| 营养不良会导致身体出现什么症状| 梨子什么时候成熟| 魂穿是什么意思| 做梦梦见打架是什么意思| 一叶知秋是什么生肖| 片仔癀是什么东西| 外阴痒用什么| 梦见玫瑰花是什么预兆| 梦见好多葡萄是什么意思| 女性安全期是什么时候| 母猫怀孕有什么症状| 河南人喜欢吃什么菜| 众里寻他千百度是什么意思| 剖腹产吃什么下奶最快| 疝气是什么原因引起的| 霸王花煲汤放什么材料| 星字属于五行属什么| 语素是什么| 什么菜好消化| 养猫的人容易得什么病| 快照是什么意思| 当家做主是什么生肖| 什么的旅行| 什么牌子的氨基酸洗面奶好| 一躺下就咳嗽是什么原因| 入驻是什么意思| 跨界歌手是什么意思| 成语一什么不什么| 超市是什么意思| 产妇吃什么下奶快又多又营养| 戒色是什么意思| 肉苁蓉有什么功能| 医院有什么科室| 喜筵和喜宴是什么意思| 漂流穿什么衣服| 巳是什么意思| 心率过缓有什么危害| 做梦数钱是什么意思啊| 12.18是什么星座| 314是什么日子| 冬至吃什么馅的饺子| 为什么手机充电慢| 李耳为什么叫老子| 双肺纤维条索是什么意思| gucci是什么意思| 蛇与什么属相相配最好| 鼻炎不能吃什么食物| 脚板疼是什么原因| 水痘是由什么引起的| complete是什么意思| 长乘宽乘高算的是什么| 结局be是什么意思| 排卵期出血是什么样的| 百度

百度 ”三、坚持常态长效,以专项述职推动党管人才工作取得实效。

Oliver Stone’s latest film, “Snowden,” is a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.

Illustration: SooHee Cho for The Intercept. Getty Images.

Oliver Stone’s latest film, “Snowden,” bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.

Stone’s rendering of Snowden’s life combines facts with Hollywood invention, covering Snowden being discharged from the military after an?injury in basic training, meeting his girlfriend, and training in the CIA with fictitious mentors (including Nicolas Cage’s character, most likely a composite of whistleblowers like Thomas Drake and Bill Binney). Snowden then goes undercover, only to see an op turn ugly; becomes a contractor for the CIA and NSA; and finally chooses to leave the intelligence community and disclose its vast surveillance apparatus, some of which he helped develop.

The movie hits key points in Snowden’s story, including his growing interest in constitutional law and the Foreign Intelligence Surveillance Court, some of the U.S. surveillance programs he eventually unmasked, and parts of his furtive meetings in Hong Kong with Glenn Greenwald and Laura Poitras (co-founders of The Intercept), as well as?The Guardian’s Ewen MacAskill.

There are doses of artistic license — for example, a Rubik’s Cube hiding the drive where he stored the documents, and Snowden’s CIA mentor spying on his girlfriend through her webcam. In hazier focus are the global questions his revelations raised, including the legal and moral implications of the U.S. government collecting data on foreigners and Americans with relative impunity, and the very real stories born of Snowden’s massive disclosures.

So here’s a retrospective of sorts for moviegoers and others interested in the journalism Edward Snowden made possible through his decision to become a whistleblower: In all, over 150 articles from 23 news organizations worldwide have incorporated documents provided by Snowden, and The Intercept and other outlets continue to mine the archive for stories of social and political significance.

In the hope that Stone’s movie will spark more widespread interest in the NSA programs Snowden helped bring to light, The Intercept has compiled its stories based on the archive of documents, which can be explored through the chart below.

Published Article Code Names
2/14/14 The NSA’s Secret Role in the U.S. Assassination Program GILGAMESH, SHENANIGANS, VICTORYDANCE
2/18/14 Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters ANTICRISIS GIRL, TEMPORA, XKEYSCORE
2/24/14 How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
3/7/14 The NSA Has an Advice Columnist. Seriously.
3/12/14 How the NSA Plans to Infect “Millions” of Computers With Malware CAPTIVATEDAUDIENCE, FOGGYBOTTOM, FOXACID, GROK, GUMFISH, HAMMERCHANT, HAMMERSTEIN, QUANTUM, QUANTUMCOPPER, QUANTUMHAND, QUANTUMSKY, SADDLEBACK, SECONDDATE, SOCIALIST, STELLARWIND, TURBINE, TURMOIL, UNITEDRAKE, VALIDATOR, WILLOWVIXEN
3/13/14 Foreign Officials in the Dark About Their Own Spy Agencies’ Cooperation With NSA PRISM, TEMPORA
3/15/14 Compare the NSA’s Facebook Malware Denial to Its Own Secret Documents QUANTUMHAND, QUANTUMTHEORY, TURBINE
3/20/14 Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators QUANTUM
4/4/14 The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket ROYAL CONCIERGE, SALAMANCA
4/30/14 British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools BLARNEY, GHOSTMACHINE, PRISM, STORMBREW,
5/19/14 Data Pirates of the Caribbean: The NSA Is Recording Every Cellphone Call in the Bahamas MYSTIC, SOMALGET
7/9/14 Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On
7/14/14 Hacking Online Polls and Other Ways British Spies Seek to Control the Internet ANGRY PIRATE, CHANGELING, ELATE, GATEWAY, GESTATOR, IMPERIAL BARGE, PREDATORS FACE, ROLLING THUNDER, SLIPSTREAM, SPRING BISHOP, UNDERPASS
7/23/14 The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police
8/3/14 Cash, Weapons, and Surveillance: The U.S. Is a Key Party to Every Israeli Attack YESTERNIGHT
8/5/14 NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting
8/25/14 ICREACH: How the NSA Built Its Own Secret Google CRISSCROSS, GLOBALREACH, ICREACH, PROTON,
9/14/14 The NSA and GCHQ Campaign Against German Satellite Companies TREASURE MAP
9/15/14 New Zealand Launched Mass Surveillance Project While Publicly Denying It SPEARGUN, XKEYSCORE
10/10/14 Core Secrets: NSA Saboteurs in China and Germany SENTRYCONDOR, SENTRYEAGLE, SENTRYHAWK, SENTRYOSPREY, SENTRYRAVEN
12/4/14 Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide AURORAGOLD, OPULANT PUP, WOLFRAMITE
12/13/14 Operation Socialist: How GCHQ Spies Hacked Belgium’s Largest Telco HACIENDA, HOPSCOTCH, LEGSPIN, NOCTURNAL SURGE, STELLARWIND, SOCIALIST
2/4/15 Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise INTOLERANT, LOVELY HORSE
2/10/15 NSA Claims Iran Learned From Western Cyberattacks
2/19/15 The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle DAPINO GAMMA, HIGHLAND FLING, XKEYSCORE
3/10/15 iSpy: The CIA Campaign to Steal Apple’s Secrets DREAMY SMURF, NOSEY SMURF, PARANOID SMURF, TRACKER SMURF, WARRIORPRIDE
4/2/15 Britain Used Spy Team to Shape Latin American Public Opinion on Falklands QUITO
5/5/15 The Computers Are Listening: How the NSA Converts Spoken Words Into Searchable Text RHINEHART
5/11/15 The Computers Are Listening: Speech Recognition Is NSA’s Best-Kept Open Secret
6/8/15 The Computers Are Listening: NSA Won’t Say If It Automatically Transcribes American Phone Calls In Bulk PRISM, UPSTREAM
5/8/15 U.S. Government Labeled Al Jazeera Journalist as Al Qaeda SKYNET
5/18/15 Snowden Files Give New Details on Osama Bin Laden Raid
5/21/15 The NSA Plan to Find Bin Laden by Hiding Tracking Devices in Medical Supplies
5/28/15 Inside NSA, Officials Privately Criticize “Collect It All” Surveillance
6/22/15 Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research
6/22/15 Popular Security Software Came Under Relentless NSA and GCHQ Attacks CAMBERDADA, PRISM
6/22/15 Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
6/26/15 How the NSA Started Investigating the New York Times’s Warrantless Wiretapping Story
7/1/15 XKEYSCORE: NSA’s Google for the World’s Private Communications BADASS, NUCLEON, XKEYSCORE
7/15/15 Israeli Special Forces Assassinated Senior Syrian Official
8/3/15 GCHQ and Me: My Life Unmasking British Eavesdroppers CARBOY, FROSTING, ECHELON, SHAMROCK, SOUNDER, TRANSIENT
8/11/15 The Philosopher of Surveillance: What Happens When a Failed Writer Becomes a Loyal Spy?
9/25/15 From Radio to Porn, British Spies Track Web Users’ Online Identities BLACKHOLE, INFINITE MONKEYS, KARMA POLICE, MARBLED GECKO, MEMORY HOLE, MUTANT BROTH, SAMUEL PEPYS, SOCIAL ANTHROPOID, TEMPORA, XKEYSCORE
9/28/15 Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee? SENTRYOWL
11/18/15 Overwhelmed NSA Surprised to Discover Its Own Surveillance “Goldmine” on Venezuela’s Oil Executives CADENCE, PINWALE
1/28/16 Israeli Drone Feeds Hacked by British and American Intelligence ANARCHIST
5/16/16 NSA Closely Involved in Guantánamo Interrogations, Documents Show
6/7/16 Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure MILKWHITE, PRESTON
6/28/16 The Hunter: He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen
8/15/16 In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner PRISM
8/19/16 The NSA Leak Is Real, Snowden Documents Confirm BADDECISION, BLINDDATE, ELIGIBLE BOMBSHELL, FOXACID, MAGICBEAN, MAGIC SQUIRREL, NIGHTSTAND, POLARSNEEZE, SECONDDATE, TURBINE
9/6/16 Inside Menwith Hill: The NSA’s British Base at the Heart of U.S. Targeted Killing GHOSTHUNTER, GHOSTWOLF

 

Since the first revelations from Snowden were published in Glenn Greenwald’s June 6, 2013, Guardian article, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,” nearly 1,200 documents from Snowden’s disclosures have been released to the public. These include fragments of the “black budget,” a secret document presented to Congress by intelligence agencies, images hacked from drone feeds, and PowerPoint presentations that painstakingly detail the technology behind the NSA’s surveillance efforts.

The Intercept and other outlets have reported extensively on some of the major technical programs mentioned during the film — PRISM and Upstream, both authorized under Section 702 of the Foreign Intelligence Surveillance Act. PRISM vacuums up hundreds of millions of internet communications every day from the people it “targets,” and those they communicate with — as well as some irrelevant communications it picks up “incidentally” because of the way the technology works. It’s unclear how many of those communications belong to Americans. Upstream gathers communications while they’re traveling through the cables of the internet — voice, text, and more. In the movie, Snowden gets a glimpse at?these programs while going undercover for the CIA.

When Snowden shares a map with a few of his colleagues displaying data on surveillance conducted within different countries, the film is likely nodding toward a program called Boundless Informant — another one of the first Snowden stories?reported by Greenwald and MacAskill. The NSA denied at the time that it could determine with absolute certainty “the identity or location” of all the communications it collected — but the program gave?it a general sense of the volume of information it got?from each country, appearing like a sort of heat map. The U.S. was not, like the movie suggests, the country where the NSA collected the most information; there were many more intercepts from Iran, at least during the time period reported on by The Guardian.

The Intercept debuted its Snowden coverage with a February 10, 2014, article by Jeremy Scahill and Glenn Greenwald titled “The NSA’s Secret Role in the U.S. Assassination Program.” Since then, we have published at least 50 other pieces based on documents from the Snowden archive.

In July 2015, The Intercept delved into one of the NSA’s central programs, also mentioned in the film, called XKeyscore. The program runs like a search engine that helps NSA detect, analyze, and extract information from the massive amounts of communications and online information it collects every day through various filters. Otherwise, the sheer volume of information would be overwhelming.

The agency’s use of cellphone and computer hacking for surveillance has been a recurring theme in The Intercept’s reporting on the Snowden documents. In May 2015, Jeremy Scahill and Josh Begley uncovered the CIA and NSA’s joint mission to crack the security of popular consumer products, including Apple’s notoriously secure iPhone. In the movie, Snowden covers his laptop’s webcam, which he knows the NSA is capable of exploiting through a program called QUANTUM. In reality, the NSA has developed malware implants potentially capable of infecting millions of targeted computers covertly, and automated some of the processes involved in the attacks, as Ryan Gallagher and Glenn Greenwald reported?in March 2014.

Many news stories from the Snowden archive involve foreign surveillance and the NSA’s partnerships with intelligence agencies from other countries, a subject the Snowden film barely touches?— for example, never mentioning?the NSA’s close relationship to the British spy agency Government Communications Headquarters (GCHQ); its partnership with countries like Saudi Arabia; or foreign officials’?lack of understanding about their own spies’ connections to the NSA. The film’s only nod to foreign intelligence occurs when Snowden passes off a special microchip to MacAskill, suggesting it might help him learn more about British spying.

The NSA is obviously more than its technical programs and tools. Stone conjures up Snowden’s friends and colleagues at the spy agencies, including T-shirt-wearing hackers, super genius engineers, and domineering bosses. The Intercept’s Peter Maass has written about the human side of the agency, including its resident advice columnist, who went by “Zelda” and answered questions about things like kitchen etiquette and gossip, as well as a columnist with literary ambitions who called himself “the SIGINT Philosopher.”

Ultimately, the movie reflects Stone’s image?of the life of an NSA contract employee. For a real window into the agency, there may be no better resource than the NSA’s own documents. In May 2016, The Intercept began the first concerted effort to make large portions of the Snowden archive available to the public with the release of a set of SIDtoday newsletters, the internal news organ of the Signals Intelligence Directorate at the NSA. The batch releases are ongoing?and will likely constitute one of the largest single collections of NSA files.

IT’S EVEN WORSE THAN WE THOUGHT.

What we’re seeing right now from Donald Trump is a full-on authoritarian takeover of the U.S. government.?

This is not hyperbole.

Court orders are being ignored. MAGA loyalists have been put in charge of the military and federal law enforcement agencies. The Department of Government Efficiency has stripped Congress of its power of the purse. News outlets that challenge Trump have been banished or put under investigation.

Yet far too many are still covering Trump’s assault on democracy like politics as usual, with flattering headlines describing Trump as “unconventional,” “testing the boundaries,” and “aggressively flexing power.”?

The Intercept has long covered authoritarian governments, billionaire oligarchs, and backsliding democracies around the world. We understand the challenge we face in Trump and the vital importance of press freedom in defending democracy.

We’re independent of corporate interests. Will you help us?

Donate

Latest Stories

Join The Conversation
什么可以醒酒 阴晴不定是什么意思 孩子流黄鼻涕吃什么药效果好 萎靡是什么意思 为什么睡觉流口水
飞行模式和关机有什么区别 五角硬币是什么材质 咳嗽适合吃什么水果 一个月来两次大姨妈是什么原因 稚嫩是什么意思
棕色裤子搭配什么颜色上衣 备孕需要做什么 赘疣是什么意思 什么洗发水好 什么生肖
白色和什么颜色搭配最好看 浮肿是什么原因引起的 梨的功效与作用是什么 献完血吃什么东西补血 交警支队长是什么级别
拉稀拉水吃什么药管用hcv7jop7ns4r.cn 吃什么长高hcv8jop0ns9r.cn tat是什么意思bfb118.com 女性尿频繁是什么原因tiangongnft.com 细胞质是什么hcv7jop9ns6r.cn
消化快容易饿什么原因hcv9jop3ns4r.cn 1月1号是什么星座hcv9jop6ns4r.cn 四维彩超什么时候做bysq.com 什么病会引起背部疼痛hcv9jop7ns2r.cn 什么是肠漏hcv9jop2ns8r.cn
备孕要注意些什么hcv7jop4ns8r.cn 白脖什么意思hcv7jop6ns4r.cn 异常的异是什么意思hcv9jop3ns0r.cn 母亲节可以做什么礼物naasee.com 724是什么意思1949doufunao.com
玖姿女装属于什么档次hcv8jop1ns0r.cn 吃什么补血小板效果最好hcv8jop0ns9r.cn 鸡鸣寺求什么hcv8jop6ns3r.cn 夏季喝什么茶hcv9jop5ns0r.cn 鼠分念什么hcv9jop7ns2r.cn
百度 技术支持:蜘蛛池 www.kelongchi.com