14. Ball J. NSA Stores Metadata of Millions of Web Users for up to a Year, Secret Files Show // http://theguardian.com/world / 2013 / sep / 30 / nsa-americans-metadata-year-documents
15. Bamford J. Death in Athens // http://theintercept.com/2015 / 09 / 28/death-athens-rogue-nsa-operation/
16. Begley J., Scahill J. CIA Campaign to Steal Apple's Secrets // http://firstlook.org/theintercept / 2015 / 03 / 10 / ispy-cia-campaign-steal-apples-secrets
17. Blanton S., Carter H., Goldfarb R., Mills J., Siegel В., Thomas D., Wasserman E. After Snowden: Privacy, Secrecy, and Security in the Information Age. – New York, 2015.
18. Boon F, Derix S., Modderkolk H. NSA Infected 50,000 Computer Networks with Malicious Software file://nrc.nl/nieuws/2013/ 11 /23/ nsa-infected-50000-computer-networks-with-malicious-software
19. Donahue D. NSA's Breach of RSA Inc.'s Crypto // http://financialcryptography.com/mt / archives / 001447.html
20. Fidler D. The Snowden Reader. – New York, 2015.
21. Gardner L. The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden – New York, 2016.
22. Gellman B. NSA Secrets. – New York, 2013.
23. Gellman В., Soltani A. NSA Collects Millions of E-Mail Address Books Globally // http://washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14 /8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
24. Goodin D. Meet «badBIOS», the Mysterious Mac and PC MalwareThat Jumps Airgaps // http://arstechnica.com/security / 2013 / 10 /meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
25. Gorman S., Perez E., Hook J. U. S. Collects Vast Data Trove // http://online.wsj.com/news / articles / SB 10001424127887324299104578 529112289298922
26. Greenwald G., Ball J. Top Secret Rules That Allow NSA to Use US Data Without a Warrant file://theguardian.com/world/ 2013/jun / 20 / fisa-court-nsa-without-warrant
27. Greenwald G., MacAskill E., Poitras L, Ackerman S., Rushe D. Microsoft Handed the NSA Access to Encrypted Messages // http://theguardian.com/world / 2013 / Jul / 11 / microsoft-nsa-collaboration-user-data
28. Greenwald G. No Place to Hide: Edward Snowden, the NSA, and the U. S. Surveillance State. – New York, 2014
29. Greenwald G. NSA Collecting Phone Records of Millions of Verizon Customers Daily file://theguardian.com/world/2013/jun /06 / nsa-phone-records-verizon-court-order
30. Greenwald G. NSA Prism Program Taps in to User Data of Apple, Google and Others// http://theguardian.com/world / 2013 /jun / 06 / us-tech-giants-nsa-data
31. Greenwald G. XKeyscore: NSATool Collects'Nearly Everything a User Does on the Internet//http://theguardian.com/world/2013/Jul/ 31 / nsa-top-secret-program-online-data
32. Gurnow M. The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal. – Indianopolis, 2014
33. Harding L. The Snowden Files: The Inside Story of the World's Most Wanted Man. – New York, 2014.
34. Hayden M. Playing to the Edge: American Intelligence in the Age of Terror. – New York, 2016.
35. Hersh S. TheTraitor. The Case against Jonathan Pollard // New Yorker. – 1999. —January 18
36. Holwerda T. The Second Operating System Hiding in Every Mobile Phone // http://osnews.com/story / 27416 / The_second_ operating_system_hiding_in_every_mobile_phone
37. Inside the Mind of Edward Snowden // NBC. – 2014. – May 28
38. Kahn D. The Reader of Gentlemen's Mail. – New Haven, 2004.
39. Kincaid С Blood on His Hands: The True Story of Edward Snowden. – New York, 2015.
40. Lucas E. The Snowden Operation // http://cryptome.org/2014/02 / lucas-snowden.htm
41. Marquis-Boire M., Greenwald G., Lee M. XKEYSCORE: NSA's Google for the World's Private Communications // http://firstlook.org/theintercept / 2015 / 07 / 01 / nsas-google-worlds-private-communications/
42. Mazetti M., Sanger D. Jap on Merkel Provides PeekatVast Spy Net // http://nytimes.com/2013/10/31 / world / europe / tap-on-merkel-provides-peek-at-vast-spy-net.html?_r=3&pagewanted=all&
43. McCullagh D. AT&T Whistleblower Claims to Document Illegal NSA Surveillance // news://news.cnet.com/8301-10784_3-6058346-7.html
44. McCullagh D., Broache A. Some Companies Helped the NSA, but Which? // news://news.cnet.com/some-companies-helped-the-NSA%2C-but-which / 2100–1028_3-6035305.html