INDEX
Explanations
terms related to surveillance and data collection activities carried out by government agencies like NSA
terms related to data collection and surveillance
New Auto-Interp
Negative Logits
reci
-0.75
hus
-0.73
unct
-0.71
Temper
-0.70
pite
-0.69
Obst
-0.66
Vel
-0.66
cal
-0.65
ukemia
-0.65
Gym
-0.64
POSITIVE LOGITS
spying
1.34
surveillance
1.17
wiret
1.16
eaves
1.06
ionage
1.02
spy
1.00
targeting
0.96
NSA
0.96
malware
0.96
NSA
0.96
Activations Density 0.200%
collection
20.79
government requests and the court approves the bulk collection of AmericansâĢĻ records,âĢĿ
collection
20.22
to deliver him a bill before ending the bulk collection of U.S. call data
collection
20.22
deliver him a bill before ending the bulk collection of U.S. call data.
bulk
18.90
stamp FISA court rubber stamped the latest NSA bulk record request without hesitation, almost as though
collection
18.82
in 2015. The provisions for phone metadata collection, he warned, have "got to
oop
18.72
last year, meta-data snooping is not minor. It can âĢľ
oop
18.72
wrote last year, meta-data snooping is not minor. It can âĢ
collection
18.65
te if the government really thought the massive collection of phone records could be kept from the
eaves
18.40
2013↵
↵
The US National Security Agency eavesdropped on the communications of the presidents
↵
The US National Security Agency eavesdropped on the communications of the presidents
dropping
18.36
't raise the possibility of governments quietly eavesdropping on its own citizens -- maybe that was
dropping
17.54
one document from Britain's GCHQ eavesdropping centre, drafted in 2009, which makes
collects
17.19
Intentionally or not, the NSA collects a lot of messages sent to and from
surveillance
17.15
authority to target anyone outside the US for surveillance, but that authority has to be re
collection
16.83
legislation, the courts have now renewed the collection of telephone metadata—the numbers and time
collection
16.78
words of the NSA's own documents, collection directly from the servers of these companies.
collected
16.69
longstanding question of whether or not phone metadata collected by NSA includes geol<|endoftext|> into these
collection
16.62
end the governmentâĢĻs collection and storage of phone metadata and instead require phone companies
collection
16.62
would effectively end the governmentâĢĻs collection and storage of phone metadata and instead require
collection
16.57
.↵
↵
âĢľThe warrantless collection of millions of personal communications from innocent Americans
↵
âĢľThe warrantless collection of millions of personal communications from innocent Americans
surveillance
16.43
Europeans in light of the NSA dragnet surveillance revealed by the recent leaks: some of
surveillance
16.38
leaked details on the NSA's Prism surveillance programme. His revelations massively rocked public trust in
surveillance
16.38
the leaked details on the NSA's Prism surveillance programme. His revelations massively rocked public trust
surveillance
16.38
of the leaked details on the NSA's Prism surveillance programme. His revelations massively rocked public
collection
16.18
same judge who temporarily limited the NSA to seeking approval from the court to search the collection
collection
16.18
seeking approval from the court to search the collection back in 2009, after uncovering years
surveillance
16.17
asylum↵
↵
US judge rules against NSA surveillance methods↵
↵
The collaboration of GCHQ
↵
US judge rules against NSA surveillance methods↵
↵
The collaboration of GCHQ
215
15.78
summer by Edward Snowden and authorized under Section 215 of the post-9/11 Patriot
drop
15.40
Security Establishment, which is mandated to eavesdrop on foreigners, routinely collects metadata about Canadians
collects
14.96
âĢĿ collection In theory, the NSA collects information in order to monitor foreign intelligence targets
spying
14.36
there a constitutional crisis if the NSA is spying on phone records of people in Colorado where
spying
14.36
crisis if the NSA is spying on phone records of people in Colorado where that state legalized
surveillance
14.26
similar concerns about the wide reach of the surveillance.↵
↵
âĢľI expect the
↵
âĢľI expect the
spying
13.43
acknowledged the new documents show that the NSA spying is about more than combating terrorism—the
surveillance
13.28
about the National Security AgencyâĢĻs surveillance programs, Edward Snowden has spoken to the
surveillance
12.14
years to make real changes to the US surveillance apparatus.↵
↵
And yet, just
↵
And yet, just
collected
11.91
phone records and e-mails were inadvertently collected.↵
↵
âĢľItâĢĻ
↵
âĢľItâĢĻ
surveillance
10.80
Western countries of what has been called the surveillance state.↵
↵
Convinced that
↵
Convinced that
compel
10.21
Executive Branch, of course, cannot unilaterally compel the FISC, an Article court,
program
10.13
under the NSA program is used by intelligence agencies here.↵
↵
The Greens senator Scott
↵
The Greens senator Scott
records
9.71
the NSA and FBI have all the phone records, bank account information and credit card transactions
Prism
9.28
asked questions on notice in the Senate about Prism and Australia's knowledge of the controversial program
collection
8.92
by Burr would open the door for that collection to start up again. Target notification Groups
collect
7.24
serious vulnerability, with the exploit itself allowing spies or whomever else to collect both the
retention
7.23
failure to respond to European judgments against the retention of innocent people's DNA we can hard
listening
6.84
, rifling through our inboxes, listening to our personal conversations, reading our private
intelligence
6.70
of EU citizens' private information to US intelligence agencies. The UK Liberal Democrat MEP Baron
Investig
6.65
's various police forces.↵
↵
The Investigatory Powers Act became law in 2016 after
↵
The Investigatory Powers Act became law in 2016 after
program
4.66
controversial and mass-murderous drone program in the Middle East. Since Obama took
gag
4.48
their misdeeds by using threats to gag those who would spread this story and video
y
4.38
that is definitely<|endoftext|> after malware/spyware in the past that didnâĢĻ
profiling
4.23
believing it continues a long pattern of racial profiling at the business district operated by Baltimore-
suppress
2.70
↵
Governments can leverage these tools to suppress dissent.↵
↵
The story of H
Governments can leverage these tools to suppress dissent.↵
↵
The story of H
monitored
2.56
, our longest standing situation of concern being monitored at The Sentinel Project.↵
↵
Since
↵
Since
forfeiture
2.30
Gl<|endoftext|>The whole concept of civil asset forfeiture turns the law on its head,<|endoftext|>
voice
1.49
<|endoftext|>Like last year, it'll also come with Amazon's voice remote that supports voice