Сноуден: самый опасный человек в мире — страница 76 из 76

ВТ and Vodafone among Telecoms Companies Passing Details to GCHQ // http://theguardian.com/business / 2013 / aug / 02 / telecoms-bt-vodafone-cables-gchq

14. Ball J. NSA Stores Metadata of Millions of Web Users for up to a Year, Secret Files Show // http://theguardian.com/world / 2013 / sep / 30 / nsa-americans-metadata-year-documents

15. Bamford J. Death in Athens // http://theintercept.com/2015 / 09 / 28/death-athens-rogue-nsa-operation/

16. Begley J., Scahill J. CIA Campaign to Steal Apple's Secrets // http://firstlook.org/theintercept / 2015 / 03 / 10 / ispy-cia-campaign-steal-apples-secrets

17. Blanton S., Carter H., Goldfarb R., Mills J., Siegel В., Thomas D., Wasserman E. After Snowden: Privacy, Secrecy, and Security in the Information Age. – New York, 2015.

18. Boon F, Derix S., Modderkolk H. NSA Infected 50,000 Computer Networks with Malicious Software file://nrc.nl/nieuws/2013/ 11 /23/ nsa-infected-50000-computer-networks-with-malicious-software

19. Donahue D. NSA's Breach of RSA Inc.'s Crypto // http://financialcryptography.com/mt / archives / 001447.html

20. Fidler D. The Snowden Reader. – New York, 2015.

21. Gardner L. The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden – New York, 2016.

22. Gellman B. NSA Secrets. – New York, 2013.

23. Gellman В., Soltani A. NSA Collects Millions of E-Mail Address Books Globally // http://washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14 /8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html

24. Goodin D. Meet «badBIOS», the Mysterious Mac and PC MalwareThat Jumps Airgaps // http://arstechnica.com/security / 2013 / 10 /meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/

25. Gorman S., Perez E., Hook J. U. S. Collects Vast Data Trove // http://online.wsj.com/news / articles / SB 10001424127887324299104578 529112289298922

26. Greenwald G., Ball J. Top Secret Rules That Allow NSA to Use US Data Without a Warrant file://theguardian.com/world/ 2013/jun / 20 / fisa-court-nsa-without-warrant

27. Greenwald G., MacAskill E., Poitras L, Ackerman S., Rushe D. Microsoft Handed the NSA Access to Encrypted Messages // http://theguardian.com/world / 2013 / Jul / 11 / microsoft-nsa-collaboration-user-data

28. Greenwald G. No Place to Hide: Edward Snowden, the NSA, and the U. S. Surveillance State. – New York, 2014

29. Greenwald G. NSA Collecting Phone Records of Millions of Verizon Customers Daily file://theguardian.com/world/2013/jun /06 / nsa-phone-records-verizon-court-order

30. Greenwald G. NSA Prism Program Taps in to User Data of Apple, Google and Others// http://theguardian.com/world / 2013 /jun / 06 / us-tech-giants-nsa-data

31. Greenwald G. XKeyscore: NSATool Collects'Nearly Everything a User Does on the Internet//http://theguardian.com/world/2013/Jul/ 31 / nsa-top-secret-program-online-data

32. Gurnow M. The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal. – Indianopolis, 2014

33. Harding L. The Snowden Files: The Inside Story of the World's Most Wanted Man. – New York, 2014.

34. Hayden M. Playing to the Edge: American Intelligence in the Age of Terror. – New York, 2016.

35. Hersh S. TheTraitor. The Case against Jonathan Pollard // New Yorker. – 1999. —January 18

36. Holwerda T. The Second Operating System Hiding in Every Mobile Phone // http://osnews.com/story / 27416 / The_second_ operating_system_hiding_in_every_mobile_phone

37. Inside the Mind of Edward Snowden // NBC. – 2014. – May 28

38. Kahn D. The Reader of Gentlemen's Mail. – New Haven, 2004.

39. Kincaid С Blood on His Hands: The True Story of Edward Snowden. – New York, 2015.

40. Lucas E. The Snowden Operation // http://cryptome.org/2014/02 / lucas-snowden.htm

41. Marquis-Boire M., Greenwald G., Lee M. XKEYSCORE: NSA's Google for the World's Private Communications // http://firstlook.org/theintercept / 2015 / 07 / 01 / nsas-google-worlds-private-communications/

42. Mazetti M., Sanger D. Jap on Merkel Provides PeekatVast Spy Net // http://nytimes.com/2013/10/31 / world / europe / tap-on-merkel-provides-peek-at-vast-spy-net.html?_r=3&pagewanted=all&

43. McCullagh D. AT&T Whistleblower Claims to Document Illegal NSA Surveillance // news://news.cnet.com/8301-10784_3-6058346-7.html

44. McCullagh D., Broache A. Some Companies Helped the NSA, but Which? // news://news.cnet.com/some-companies-helped-the-NSA%2C-but-which / 2100–1028_3-6035305.html

45. McCullagh D. How the U. S. Forces Net Firms to Cooperate on Surveillance // news://news.cnet.com/8301-13578_3-57593538-38 / how-the-u.s-forces-net-firms-to-cooperate-on-surveillance

46. McCullagh D. NSA Surveillance Retrospective // news.cnet. com / 8301 -13578_3-57589012-38 / nsa-surveillance-retrospective-at-t-verizon-never-denied-it

47. Out of Control // Cryptologic Quarterly. – 1996. – Vol. 15

48. Nobody Seems to Notice and Nobody Seems to Care – Government & Stealth Malware // http://anonymous.livelyblog.com/2012 / 10 / 05 / nobody-seems-to-notice-and-nobody-seems-to-care-government-stealth-malware/

49. NSA Spies on Venezuela's Oil Company, Snowden Leak Reveals // http://telesurtv.net/english / news / NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.html

50. Perlroth N., Larson J., Shane S. NSAAbleto Foil Basic Safeguards of Privacy on Web // New YorkTimes. – 2013. – September 5

51. Poitras L., Rosenbach M., Scheuermann C, Stark H., Stacker С Quantum Spying: GCHQ Used Fake Linkedln Pages to Target Engineers // http://spiegel.de/ international / world / ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html

52. Prevelakis V., Spinellis D. Athens Affair // http://spectrum.ieee.org/telecom / security / the-athens-affair

53. Riley M. US Agencies Said to Swap Data with Thousands of Firms// http://bloomberg.com/news/ 2013-06-14/ u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

54. Risen J., Poitras L. NSA Report Outlined Goals for More Power // http://nytimes.com/2013 /11 I 23 I us I politics / nsa-report-outlined-goals-for-more-power.html

55. Sanger D. Confront and Conceal. – New York, 2012.

56. Savage С CIA Is Said to Pay AT&T for Call Data // http://nytimes.com/2013 / 11 / 07 / us / cia-is-said-to-pay-att-for-call-data.html?_r=1&

57. Saxena S. NSA Planted Bugs at Indian Missions in DC, UN // http://cryptome.org/2013 / 10 / india-close-access-sigads.pdf

58. Schneier B. Attacking Tor // http://theguardian.com/world / 2013 / oct / 04 / tor-attacks-nsa-users-online-anonymity

59. SchneierB. Did NSA Put a Secret Backdoor in New Encryption Standard? // http://wired.com/politics / security / commentary / securitymatters / 2007 /11/ securitymatters_1115

60. Schneier B. How to Design and Defend Against the Perfect Security Backdoor // http://wired.com/opinion / 2013 / 10 / how-to-design-and-defend-against-the-perfect-backdoor

61. Schneier B. NSA Surveillance // http://theguardian.com/world / 2013 / sep / 05 / nsa-how-to-remain-secure-surveillance

62. SchneierB. Want to Evade NSA Spying? Don't Connect to the Internet // http://wired.com/opinion / 2013 / 10 / 149481

63. Schwartz M. Want NSA Attention? Use Encrypted Communications // http://informationweek.com/security / risk-management / want-nsa-attention-use-encrypted-communications /d/d-id/1110475?

64. Scott S. No Morsel Too Minuscule for All-Consuming NSA // http://nytimes.com/2013 / 11 / 03 / world / no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0

65. Simcox R. Surveillance after Snowden // henryjacksonsociety. org

66. Timberg C., Nakashima E. Agreements with Private Companies Protect U. S. Access to Cables'Data for Surveillance//washingtonpost. com / business / technology / agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance / 2013 / 07 / 06 / aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html

67. US National Security Agency Spied on French Diplomats // http://bbc.co.uk/news / world-europe-24628947

68. Weaver N. Our Government Has Weaponized the Internet. Here's How They Did It // http://wired.com/opinion / 2013 /11/ this-is-how-the-internet-backbone-has-beenturned-into-a-weapon

69. Wertheimer M. Encryption and the NSA Role in International Standards // Notices of the AMS. – February. – 2015

70. Yardley H. The American Black Chamber. – Annapolis, 2004

71. Yardley H. The Chinese Black Chamber. – Boston, 1983

72. letter K. British Spies Hacked Telecom Network by Luring Engineers to Fake Linkedln Pages // http://wired.com/threatlevel / 2013 / 11 / british-spies-hacked-telecom

73. Zetter K. Countdown to Zero Day. – New York, 2014 74.Zeffer K. HowaCrypto'Backdoor'PittedtheTech World against the NSA // http://wired.com/threatlevel / 2013 / 09 / nsa-backdoor

75. Zetter K. NSA Laughs at PCs, Prefers Hacking Routers and Switches // http://wired.com/ threatlevel / 2013 / 09 / nsa-router-hacking

76. Zetter K. Report: NSA Is Intercepting Traffic from Yahoo, Google Data Centers // http://wired.com/threatlevel / 2013 / 10 / nsa-hacked-yahoo-google-cables