Emails from journalists at The New York Times and BBC were swept up.
2014 was full of frustrations for the tech industry.
China is possibly gathering information on U.S. plans in the region.
Wyden: "Stop recklessly pushing for new ways to vacuum up Americans’ private information."
The U.S. Chamber of Commerce sent yet another letter to Senate leaders on Tuesday.
A subsidiary of London-based Vodafone facilitates most of the program.
The program imitates a cell tower and can collect information on any connected device.
Without water, the NSA's giant Utah data center could not operate.
Privacy groups are wary of allowing companies to share cyber threat info with the NSA.
The targeted groups range from Chinese social justice workers to Tibetan monks to Syrian activists.
Google says the project collects "the forest" of data, without seeing "individual trees."
Human rights groups said the revelations potentially contradict previous assurances.
Researchers said software could still help reduce data gathering.
The heavily redacted oversight reports were made public on Christmas Eve.
The programs are very similar to controversial ones in the U.S.
The team will give legal advice on electronic surveillance and guide Congress on cyber legislation.
Germany and Brazil pushed for the measure, which the U.S. did not support.
The malware, Regin, is difficut to trace and can collect almost any network data.
The spyware might be watching you, reading your emails, listening to your calls.
In 2009, executives raised doubts, prompting an internal consideration of the program's merits.
Verizon is still using the program, which tracks mobile app and Internet activity.
The proposal would update a resolution the U.S. previously supported.
But a password is protected by the Constitution, a judge rules.
“Justice may be denied because of a locked phone or encrypted device," Comey said.