Birkis by Birkenstock size 37 L6-M4 outlet

Gently used

CategoryWomen, Shoes, Sandals

17 disturbing things Snowden has taught us (so far)

NWT Philips Solar Powered LED 150 Bulb String Light Set,
Updated on
2 NWT Sets LED Fairy White Poms Bells Threshold,
Blue coq feathers Josephine baker purse bag,

Editor's Note: This article was originally published in 2013 and was updated in January 2014. It has been updated again.

Roxy H & K Mod Bikini Top,

The USA Patriot Act Women's High-Low Dress - CUSHNIE for Target Royal Blue 0Umgee Plus Size Emerald V-Neck Short Folded Sleeve Dress with Pockets,

Ever since Congress passed the controversial law in October 2011, proponents have argued its provisions give law enforcement and government agencies the power they need to keep the United States safe from terrorist attacks like 9/11. Critics have said  those powers are far too broad. They've stripped away civil liberties and privacy and made it too easy for the government and law enforcement to spy on US citizens without accountability.

Max Studio Rally Leather Ankle Bootie,

Vintage DVF Diane von Furstenberg Weekender Bag,

Milly of New York Silk and Velvet Ruffle Dress,

Authentic gently used Coach crossbody, reported on June 6, 2013 that, according to documents leaked by Edward Snowden, the Obama administration enabled the National Security Agency to collect caller information from Verizon through a “business records” provision of the Patriot Act, established under President George W. Bush. The government ordered Verizon to hand over call information on a daily basis, including the time, location and duration of calls. The Bush administration began collecting such information in October 2001 from AT&T, Verizon and BellSouth, which USA Today reported in 2006.

The consequence:

Cabana Del Sol bikini set,

Banana Republic leather wool Cardigan,Frosty tipped double up Vest in charcoal,

mk white of card holder,

Snowden also leaked a Supreme Akira Neotokyo LongsleeveLARGE JUICY DUFFEL BAG , NWT,

PRISM is the NSA effort to collect massive amounts of data from internet companies such as email content, search histories and file transfers tied to potential terrorism or espionage suspects. The PowerPoint presentation confirmed that the NSA is able to directly access the servers of "major US service providers,” describing collaboration with tech companies like YouTube, Skype, Google and Apple. Google, Apple, and others in the tech industry, however, denied awareness of the program. 

PRISM began in 2007 with Microsoft and expanded to include Apple in 2012. To be subject to PRISM surveillance, there need only be “reasonable suspicion” that one of the suspects is outside the United States. Unlike the Verizon court-ordered collaboration, the government can access live information, photos, video chats and data from social networks directly through the companies’ servers without required consent or individual court orders. One slide puts the cost of the program at $20 million per year.

The consequence:

Bareminerals Barepro Liquid Foundation- Flax 9.5,

NWT Tommy Hilfiger 100% Lambswool,

"Wild Child" Beaded Coconuts by Matisse Sandles,

Oversized knit pullover,XXS black Carly Lularoe, reported on June 8.

Linea Domain Vest,

Proenza Schouler made in Italy bag,

Bareminerals Barepro Liquid Foundation- natural 11,

Versace Collection See Through Cardigan Sweater,

A great party, club, or girl night out dress.,

India Hicks Gecko Insider clutch,

Snowden, speaking with 2 Sets Noma Indoor Bubble Lights 7 Light Set,, gave his first press interview with an outlet other than the Guardian after revealing himself as the source of the leaks on June 12. He said he would stay in Hong Kong until he is "asked to leave,” and said that he took up his previous role as a consultant with Booz Allen Hamilton with the intent of disseminating state secrets. (Snowden would later fly to Moscow and initiate asylum applications with more than 20 countries, many of them denied.) Snowden also told the South China Morning Post that the NSA has been hacking mainland Chinese and Hong Kong computers since 2009. He claimed the NSA hacked networks at the Chinese University of Hong Kong, home to the Hong Kong Internet Exchange and Hong Kong’s main terminal for all internet traffic.

Set of 4 Battery Operated Light Strings,:

Snowden's statements hardened the standoff between China and the United States over hacking. Hong Kong Secretary for Security Lai Tung-kwok announced that the Hong Kong Internet Exchange has been monitored but appears unaffected, while Chinese University announced that it has not found evidence of hacking on its servers.

The domestic debate in the United States began to reach a fever pitch. A Gallup Poll conducted between June 10 and June 11 placed support among Americans for Snowden’s actions at 44 percent, while 42 percent said his actions were wrong. Still, the poll found that 57 percent of respondents did not support the NSA’s surveillance programs as outlined in the leaked documents, while 37 percent approved.

Off the shoulder sleeves dress SMALL,

(Ethan Miller/Getty Images)

It Cosmetics Celebration Foundation,


There is specific mention in the slides of targeting “the Turkish finance minister and possibly 15 others in his party,” Black off the shoulder full length. The slides suggest “senior level” members of government in Gordon Brown’s administration, Britain's prime minister at the time, were aware of the intelligence gathering and that the information “was passed to British ministers.” The presentation also alludes to such covert techniques being neither unprecedented nor unique.

OTBT Circuit Bone,

Laura Mercier Flawless Longwear Foundation Pecan,

Henri bendel wallet/clutch,

NSA Director General Keith Alexander (L) and Sean Joyce, deputy director of the FBI. (Saul Loeb/Getty Images)

Beautiful flirty dress SMALL,

On June 20, the Guardian revealed two more documents obtained by Snowden (viewable Vera Bradley Tropical Paradise Grand Traveler Bag, and hereRachel Zoe White Pearl Box Bag,

The consequence:

While the documents outline the circumstances the NSA must destroy data collected from US citizens, as well as the rigorous steps analysts are supposed to take to make sure a target is outside the United States, they also reveal several ways the NSA can continue to use data collected on US citizens. The revelations appear to contradict statements by Obama and others that the NSA cannot access data on US citizens without a warrant.

Veronica Beard Dulce Striped Scoop Neck Dress,


Veda Silver Long Open Back Cardigan M,

Chelsea & Violet Crochet Lace Skort,

7) Friends who hack together stay together

C6 Women’s ANN TAYLOR Pinstripe Career Business Work Blazer Suit Jacket 4,revealed slidesSequin purse..... Brand New ....never worn,

The Stunner,

The slides indicate that private companies are required to give GCHQ discreet access to tap the cables. The United Kingdom shared that information with the NSA beginning in 2011, giving the US spy agency unlimited access to GCHQ data. The slides show that “850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.”

The consequence:

Officials and private citizens raised concerns on both sides of the Atlantic that there is insufficient oversight and limited restrictions on the UK’s fiber-optic surveillance system. The close-knit relationship between the US and UK intelligence agencies, as well as the NSA’s unfiltered access to Britain’s world-leading cyber-surveillance stores, came under heightened scrutiny. Some diplomats worried that the revelations could negatively impact EU-US trade discussions, and that China-US cybersecurity talks, already on a tentative footing, could suffer as well.

Tumi Villa Veneto Slim Brief,

Rails Shelley Dress,Outdoor lantern string lights,, Snowden said on June 23 that the NSA has hacked into computer networks at Tsinghua University an unknown number of times. Snowden said on a single day in January 63 computers and servers were hacked. Snowden argued that the internal and external IP addresses he disclosed could only come from hacking or physical access to the computers.

The facility at Tsinghua University is one of six backbone networks that comprise the China Education and Research Network (CERNET), through which internet data for millions of Chinese can be accessed. The system was the first of its kind and is now the largest national research hub in the world. It is owned by the Ministry of Education and maintained by the university and other colleges.

FLAGPOLE Rita One-Piece Key lime Bandeau SwimsuitKate Spade Pink Cedar Street Monday Envelope Bag,

Women Coach Bag,

NEW Jacquard Underwire Halter Top Hipster Bottom Bikini Set Size Large,


Vintage Hand Made Embroidered Table Runner Frayed Edge Floral 76"X26",


Old navy beige size 8Sleeveless turtleneck,

Greenwald said that though the still-secret documents are encrypted, Snowden has made arrangements for the passwords to reach those with the files if he is unable to access them himself.

Lululemon City Summer Sleeveless Mini Dress Sz 6,

The consequence:

The fact that Snowden made multiple copies of the classified intelligence he carries created renewed angst among US officials. New questions were raised as to whether the US intelligence community can adequately stem the current leak and prevent future breaches from occurring.

Antique linen & organdy embroidered napkins (12),


10) NSA surveils Europe

German news magazine Der SpiegelNWT ZARA FAUX FUR WAISTCOAT VEST COAT,

The document reportedly specifies Europeans as a “location target,” with Germans singled out as a major focus of US eavesdropping. The document also mentions telecommunications hacking — first reported by EU officials five years ago — of the EU Council of Ministers and the European Council at the Justus Lipsius Building in Brussels. Calls from an NSA-occupied building at the NATO headquarters outside of Brussells, according to the document, were traced to the Lipsius Building. 

The consequence:

Europeans erupted in anger over the new allegations. German Justice Minister Sabine Leutheusser-Schnarrenberger said: "If the media reports are accurate, then this recalls the methods used by enemies during the Cold War."

Grievences with the US surveillance program were particularly evident in Germany where, after a frank conversation between German Chancellor Angela Merkel and Obama during his visit to Berlin earlier in the month, cybersecurity was a hot topic.  

LED Icicle Lights,

Lithuanian President Dalia Grybauskaite (left) and French President Francois Hollande. (Jacques Demarthon/Getty Images)

Beautiful mermaid style wedding dress,

Louis Vuitton Ultra Rare Monogram Kisslock Pouch,The Guardian revealed a 2007 document that named 38 embassies and missions that were “targets” of US surveillance, including the EU embassy in Washington and its mission in New York. 


The list of countries targeted was not limited to EU members or the traditional enemies of the United States, but instead includes the likes of India and Mexico, as well as Greece and Turkey. Gaining insider knowledge of diplomatic relations between the targeted states and the United States was the primary goal of the targeted surveillance, The Guardian reported.

XXS Gray Carly Lularoe,

Primavera red sequence dress,

Moshi Aria laptop case,

Brazilian President Dilma Rousseff and Barack Obama at the G20 summit in Russia on Sept. 6. (Jewel Samad/Getty Images)

12) Dilma's dilemma 

In July, NEW Vera Bradley SIX Anastasia Placemats + Napkins,Men's polo by Ted Baker London,

FENTY FOUNDATION BY RIHANNA,Vince Ivory Crepe Vest, Size XS; 5Together Embroidered Patchwork Blazer,

Y2k Coach Mini Bag,

As a result, 100% Authentic Anne Klein wedge Size 9 to the White House, demanding answers and a commitment from Washington to stop snooping in her country. It was set to be the first state visit by a Brazilian president in about two decades, and the only one scheduled this year at the White House. Although the Obama administration claimed the postponement was a joint decision made by the two presidents, some media described it as the sternest rebuke yet from a friendly nation over NSA leaks.

Tory Burch Kelly Green Patent Leather Clutch,Waterfall button long pocket Vest jacket - rustStoney Clover x Target Tie-Dye Duffle Bag Rainbow,

NWT Beth Richards Kim Bikini Top Ballet,

NWT MSRP 8 Bailey 44 Dark Horse Lace Trim Dress Women's Size Small,

13) Your address book is the NSA's address book

HOST PICK LAUREN RALPH LAUREN Striped Tie-Waist Dress,Washington PostSmall Criquet Aqua SS Polo Shirt,

Brighton Photo Handbag,

The newly unveiled program expands on the NSA’s reach even beyond the already expansive PRISM and Xkeyscore programs, which gave the government the ability to access nearly all digital communications.

Mario Valentino Vintage Clutch Bag,

NWT Vera Bradley Garment Bag in Sherbert,

German front pages, Oct. 25, 2013. (Sean Gallup/Getty Images)

RACHEL Rachel Roy Women's Ruffle Jumpsuit,

A new round of revelations, courtesy of Snowden, leaked on Oct. 28 focused on the scope of the United States spying on its own allies, including Germany, France and Spain. 

According to media, the NSA had tapped the phones of some 35 world leaders including close ally German Chancellor Angela Merkel, who branded the snooping unacceptable between friends. Spanish media reports that the NSA monitored 60 million phone calls in Spain in one month, according to the Umgee Plus Size Poppy Red V-Neck Short Folded Sleeve Dress with Pockets,Moschino cheap and chic animal print cardigan Size 10,

The consequence:

As a result, tensions are rising between the US and various allies. Merkel personally called Obama on Oct. 23, demanding an explanation, the Michael Kors leather and grommet wristlet reported. Just days prior, President François Hollande of France also called the White House to confront Obama about reports that the NSA was targeting the private phone calls and text messages of millions of French people.

NWT ✨ Yonique | Black High-Waisted 2 Piece Bikini,Diane von Furstenberg DVF ‘Hasina’ Dress, Size 6Genuine leather school/office bag,Kenzo Paris DressBoston Proper Sweater,

(Paul J. Richards/AFP/Getty Images)

Orvis Fleece / Leather Vest,

The Washington Post reported on Jan. 2, 2014 that — as always, according to documents leaked by Snowden — the NSA is racing to build a so-called quantum computer, which would be housed in room-sized metal boxes, that has the ability to break encryptions used to protect everything from banking to medical records. The new quantum computer is part of a $79.7 million program suggestively called "Penetrating Hard Targets."

Many in the scientific community have long been trying to build quantum computers and it's unclear how much further along the NSA's project is compared to anyone else's. "The NSA appears to regard itself as running neck and neck with quantum computing labs sponsored by the European Union and the Swiss government, with steady progress but little prospect of an immediate breakthrough," wrote The Washington Post.

Vivienne Westwood Man Gray Cardigan L large Italy..,

Joie| Lantz Sweater,

Rare Vintage Clare Kasavina Purse,

(Johannes Eisele/AFP/Getty Images)

16) "Dishfire" LOL

Light gold lace sandals,Betsey Johnson Black Loved Sweatshirt Size L from around the world. The NSA then used the messages to extract location information, contact networks and credit card details of mobile users. And in the spirit of sharing, the NSA provided British intelligence with all of that data, with the exception of the actual content of the text messages (so your embarrassing secret is safe?). Like everything the NSA does, the program has a cool name — Dishfire.

Vintage Michael Kors baguette mini bag,

D & G Dolce & Gabbana men's gray cardigan,Dalia Lace Dress, color is Burgandy (which was so full of jargon you'd need a quantum computer to decipher it) outlining proposed policy changes in reaction to Snowden's whistleblowing and the subsequent NSA scandals.

West Virginia University WVU Blue Nike Dri-Fit Short Sleeve Polo Size Medium,

17) SIM City, NSA 

Vintage hand-sewn floral print vest,

Off the shoulder black formal dress in February 2015 that Snowden provided it documents that showed the NSA and the GCHQ had hacked into the network of Gemalto, a Dutch company that manufactures two billion SIM cards per year and supplies AT&T, Verizon, T-Mobile and many other wireless providers. According to the Intercept, the hack would have given the agencies access the billions of unique encryption keys that secure the communications of designated users.

Gemalto admitted that it had been the target of at least two "particularly sophisticated intrusions" and said it was likely the NSA and GCHQ had been responsible. But it denied the hacks would have given the agencies access to the encryption keys.

The consequence:

St pucchi wedding dress,BCBG MAXAZRIA Peplum black dressLittle black dress belted, size 12 White House Black Market, worn once,