45. McCullagh D. How the U. S. Forces Net Firms to Cooperate on Surveillance // news://news.cnet.com/8301-13578_3-57593538-38 / how-the-u.s-forces-net-firms-to-cooperate-on-surveillance
46. McCullagh D. NSA Surveillance Retrospective // news.cnet. com / 8301 -13578_3-57589012-38 / nsa-surveillance-retrospective-at-t-verizon-never-denied-it
47. Out of Control // Cryptologic Quarterly. – 1996. – Vol. 15
48. Nobody Seems to Notice and Nobody Seems to Care – Government & Stealth Malware // http://anonymous.livelyblog.com/2012 / 10 / 05 / nobody-seems-to-notice-and-nobody-seems-to-care-government-stealth-malware/
49. NSA Spies on Venezuela's Oil Company, Snowden Leak Reveals // http://telesurtv.net/english / news / NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.html
50. Perlroth N., Larson J., Shane S. NSAAbleto Foil Basic Safeguards of Privacy on Web // New YorkTimes. – 2013. – September 5
51. Poitras L., Rosenbach M., Scheuermann C, Stark H., Stacker С Quantum Spying: GCHQ Used Fake Linkedln Pages to Target Engineers // http://spiegel.de/ international / world / ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html
52. Prevelakis V., Spinellis D. Athens Affair // http://spectrum.ieee.org/telecom / security / the-athens-affair
53. Riley M. US Agencies Said to Swap Data with Thousands of Firms// http://bloomberg.com/news/ 2013-06-14/ u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
54. Risen J., Poitras L. NSA Report Outlined Goals for More Power // http://nytimes.com/2013 /11 I 23 I us I politics / nsa-report-outlined-goals-for-more-power.html
55. Sanger D. Confront and Conceal. – New York, 2012.
56. Savage С CIA Is Said to Pay AT&T for Call Data // http://nytimes.com/2013 / 11 / 07 / us / cia-is-said-to-pay-att-for-call-data.html?_r=1&
57. Saxena S. NSA Planted Bugs at Indian Missions in DC, UN // http://cryptome.org/2013 / 10 / india-close-access-sigads.pdf
58. Schneier B. Attacking Tor // http://theguardian.com/world / 2013 / oct / 04 / tor-attacks-nsa-users-online-anonymity
59. SchneierB. Did NSA Put a Secret Backdoor in New Encryption Standard? // http://wired.com/politics / security / commentary / securitymatters / 2007 /11/ securitymatters_1115
60. Schneier B. How to Design and Defend Against the Perfect Security Backdoor // http://wired.com/opinion / 2013 / 10 / how-to-design-and-defend-against-the-perfect-backdoor
61. Schneier B. NSA Surveillance // http://theguardian.com/world / 2013 / sep / 05 / nsa-how-to-remain-secure-surveillance
62. SchneierB. Want to Evade NSA Spying? Don't Connect to the Internet // http://wired.com/opinion / 2013 / 10 / 149481
63. Schwartz M. Want NSA Attention? Use Encrypted Communications // http://informationweek.com/security / risk-management / want-nsa-attention-use-encrypted-communications /d/d-id/1110475?
64. Scott S. No Morsel Too Minuscule for All-Consuming NSA // http://nytimes.com/2013 / 11 / 03 / world / no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0
65. Simcox R. Surveillance after Snowden // henryjacksonsociety. org
66. Timberg C., Nakashima E. Agreements with Private Companies Protect U. S. Access to Cables'Data for Surveillance//washingtonpost. com / business / technology / agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance / 2013 / 07 / 06 / aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
67. US National Security Agency Spied on French Diplomats // http://bbc.co.uk/news / world-europe-24628947
68. Weaver N. Our Government Has Weaponized the Internet. Here's How They Did It // http://wired.com/opinion / 2013 /11/ this-is-how-the-internet-backbone-has-beenturned-into-a-weapon
69. Wertheimer M. Encryption and the NSA Role in International Standards // Notices of the AMS. – February. – 2015
70. Yardley H. The American Black Chamber. – Annapolis, 2004
71. Yardley H. The Chinese Black Chamber. – Boston, 1983
72. letter K. British Spies Hacked Telecom Network by Luring Engineers to Fake Linkedln Pages // http://wired.com/threatlevel / 2013 / 11 / british-spies-hacked-telecom
73. Zetter K. Countdown to Zero Day. – New York, 2014 74.Zeffer K. HowaCrypto'Backdoor'PittedtheTech World against the NSA // http://wired.com/threatlevel / 2013 / 09 / nsa-backdoor
75. Zetter K. NSA Laughs at PCs, Prefers Hacking Routers and Switches // http://wired.com/ threatlevel / 2013 / 09 / nsa-router-hacking
76. Zetter K. Report: NSA Is Intercepting Traffic from Yahoo, Google Data Centers // http://wired.com/threatlevel / 2013 / 10 / nsa-hacked-yahoo-google-cables