45. McCullagh D.
How the U. S. Forces Net Firms to Cooperate on Surveillance // news://news.cnet.com/8301-13578_3-57593538-38 / how-the-u.s-forces-net-firms-to-cooperate-on-surveillance46. McCullagh D.
NSA Surveillance Retrospective // news.cnet. com / 8301 -13578_3-57589012-38 / nsa-surveillance-retrospective-at-t-verizon-never-denied-it47.
Out of Control // Cryptologic Quarterly. – 1996. – Vol. 1548.
Nobody Seems to Notice and Nobody Seems to Care – Government & Stealth Malware // http://anonymous.livelyblog.com/2012 / 10 / 05 / nobody-seems-to-notice-and-nobody-seems-to-care-government-stealth-malware/49.
NSA Spies on Venezuela's Oil Company, Snowden Leak Reveals // http://telesurtv.net/english / news / NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.html50. Perlroth N., Larson J., Shane S.
NSAAbleto Foil Basic Safeguards of Privacy on Web // New YorkTimes. – 2013. – September 551. Poitras L., Rosenbach M., Scheuermann
C, Stark H., Stacker С Quantum Spying: GCHQ Used Fake Linkedln Pages to Target Engineers // http://spiegel.de/ international / world / ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html52. Prevelakis V., Spinellis D.
Athens Affair // http://spectrum.ieee.org/telecom / security / the-athens-affair53. Riley M.
US Agencies Said to Swap Data with Thousands of Firms// http://bloomberg.com/news/ 2013-06-14/ u-s-agencies-said-to-swap-data-with-thousands-of-firms.html54. Risen J., Poitras L.
NSA Report Outlined Goals for More Power // http://nytimes.com/2013 /11 I 23 I us I politics / nsa-report-outlined-goals-for-more-power.html55. Sanger D.
Confront and Conceal. – New York, 2012.56. Savage
С CIA Is Said to Pay AT&T for Call Data // http://nytimes.com/2013 / 11 / 07 / us / cia-is-said-to-pay-att-for-call-data.html?_r=1&57. Saxena S.
NSA Planted Bugs at Indian Missions in DC, UN // http://cryptome.org/2013 / 10 / india-close-access-sigads.pdf58. Schneier B.
Attacking Tor // http://theguardian.com/world / 2013 / oct / 04 / tor-attacks-nsa-users-online-anonymity59. SchneierB.
Did NSA Put a Secret Backdoor in New Encryption Standard? // http://wired.com/politics / security / commentary / securitymatters / 2007 /11/ securitymatters_111560. Schneier B.
How to Design and Defend Against the Perfect Security Backdoor // http://wired.com/opinion / 2013 / 10 / how-to-design-and-defend-against-the-perfect-backdoor61. Schneier B.
NSA Surveillance // http://theguardian.com/world / 2013 / sep / 05 / nsa-how-to-remain-secure-surveillance62. SchneierB.
Want to Evade NSA Spying? Don't Connect to the Internet // http://wired.com/opinion / 2013 / 10 / 14948163. Schwartz M.
Want NSA Attention? Use Encrypted Communications // http://informationweek.com/security / risk-management / want-nsa-attention-use-encrypted-communications /d/d-id/1110475?64.
Scott S. No Morsel Too Minuscule for All-Consuming NSA // http://nytimes.com/2013 / 11 / 03 / world / no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=065. Simcox R.
Surveillance after Snowden // henryjacksonsociety. org66. Timberg C., Nakashima E.
Agreements with Private Companies Protect U. S. Access to Cables'Data for Surveillance//washingtonpost. com / business / technology / agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance / 2013 / 07 / 06 / aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html67.
US National Security Agency Spied on French Diplomats // http://bbc.co.uk/news / world-europe-2462894768. Weaver N.
Our Government Has Weaponized the Internet. Here's How They Did It // http://wired.com/opinion / 2013 /11/ this-is-how-the-internet-backbone-has-beenturned-into-a-weapon69. Wertheimer M.
Encryption and the NSA Role in International Standards // Notices of the AMS. – February. – 201570. Yardley H.
The American Black Chamber. – Annapolis, 200471. Yardley H.
The Chinese Black Chamber. – Boston, 198372. letter K.
British Spies Hacked Telecom Network by Luring Engineers to Fake Linkedln Pages // http://wired.com/threatlevel / 2013 / 11 / british-spies-hacked-telecom73. Zetter K.
Countdown to Zero Day. – New York, 2014 74.Zeffer K. HowaCrypto'Backdoor'PittedtheTech World against the NSA // http://wired.com/threatlevel / 2013 / 09 / nsa-backdoor75. Zetter K.
NSA Laughs at PCs, Prefers Hacking Routers and Switches // http://wired.com/ threatlevel / 2013 / 09 / nsa-router-hacking76. Zetter K.
Report: NSA Is Intercepting Traffic from Yahoo, Google Data Centers // http://wired.com/threatlevel / 2013 / 10 / nsa-hacked-yahoo-google-cables