Сноуден: самый опасный человек в мире (Сырков) - страница 269

45. McCullagh D. How the U. S. Forces Net Firms to Cooperate on Surveillance // news://news.cnet.com/8301-13578_3-57593538-38 / how-the-u.s-forces-net-firms-to-cooperate-on-surveillance

46. McCullagh D. NSA Surveillance Retrospective // news.cnet. com / 8301 -13578_3-57589012-38 / nsa-surveillance-retrospective-at-t-verizon-never-denied-it

47. Out of Control // Cryptologic Quarterly. – 1996. – Vol. 15

48. Nobody Seems to Notice and Nobody Seems to Care – Government & Stealth Malware // http://anonymous.livelyblog.com/2012 / 10 / 05 / nobody-seems-to-notice-and-nobody-seems-to-care-government-stealth-malware/

49. NSA Spies on Venezuela's Oil Company, Snowden Leak Reveals // http://telesurtv.net/english / news / NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.html

50. Perlroth N., Larson J., Shane S. NSAAbleto Foil Basic Safeguards of Privacy on Web // New YorkTimes. – 2013. – September 5

51. Poitras L., Rosenbach M., Scheuermann C, Stark H., Stacker С Quantum Spying: GCHQ Used Fake Linkedln Pages to Target Engineers // http://spiegel.de/ international / world / ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html

52. Prevelakis V., Spinellis D. Athens Affair // http://spectrum.ieee.org/telecom / security / the-athens-affair

53. Riley M. US Agencies Said to Swap Data with Thousands of Firms// http://bloomberg.com/news/ 2013-06-14/ u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

54. Risen J., Poitras L. NSA Report Outlined Goals for More Power // http://nytimes.com/2013 /11 I 23 I us I politics / nsa-report-outlined-goals-for-more-power.html

55. Sanger D. Confront and Conceal. – New York, 2012.

56. Savage С CIA Is Said to Pay AT&T for Call Data // http://nytimes.com/2013 / 11 / 07 / us / cia-is-said-to-pay-att-for-call-data.html?_r=1&

57. Saxena S. NSA Planted Bugs at Indian Missions in DC, UN // http://cryptome.org/2013 / 10 / india-close-access-sigads.pdf

58. Schneier B. Attacking Tor // http://theguardian.com/world / 2013 / oct / 04 / tor-attacks-nsa-users-online-anonymity

59. SchneierB. Did NSA Put a Secret Backdoor in New Encryption Standard? // http://wired.com/politics / security / commentary / securitymatters / 2007 /11/ securitymatters_1115

60. Schneier B. How to Design and Defend Against the Perfect Security Backdoor // http://wired.com/opinion / 2013 / 10 / how-to-design-and-defend-against-the-perfect-backdoor

61. Schneier B. NSA Surveillance // http://theguardian.com/world / 2013 / sep / 05 / nsa-how-to-remain-secure-surveillance