62. SchneierB. Want to Evade NSA Spying? Don't Connect to the Internet // http://wired.com/opinion / 2013 / 10 / 149481
63. Schwartz M. Want NSA Attention? Use Encrypted Communications // http://informationweek.com/security / risk-management / want-nsa-attention-use-encrypted-communications /d/d-id/1110475?
64. Scott S. No Morsel Too Minuscule for All-Consuming NSA // http://nytimes.com/2013 / 11 / 03 / world / no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0
65. Simcox R. Surveillance after Snowden // henryjacksonsociety. org
66. Timberg C., Nakashima E. Agreements with Private Companies Protect U. S. Access to Cables'Data for Surveillance//washingtonpost. com / business / technology / agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance / 2013 / 07 / 06 / aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
67. US National Security Agency Spied on French Diplomats // http://bbc.co.uk/news / world-europe-24628947
68. Weaver N. Our Government Has Weaponized the Internet. Here's How They Did It // http://wired.com/opinion / 2013 /11/ this-is-how-the-internet-backbone-has-beenturned-into-a-weapon
69. Wertheimer M. Encryption and the NSA Role in International Standards // Notices of the AMS. – February. – 2015
70. Yardley H. The American Black Chamber. – Annapolis, 2004
71. Yardley H. The Chinese Black Chamber. – Boston, 1983
72. letter K. British Spies Hacked Telecom Network by Luring Engineers to Fake Linkedln Pages // http://wired.com/threatlevel / 2013 / 11 / british-spies-hacked-telecom
73. Zetter K. Countdown to Zero Day. – New York, 2014 74.Zeffer K. HowaCrypto'Backdoor'PittedtheTech World against the NSA // http://wired.com/threatlevel / 2013 / 09 / nsa-backdoor
75. Zetter K. NSA Laughs at PCs, Prefers Hacking Routers and Switches // http://wired.com/ threatlevel / 2013 / 09 / nsa-router-hacking
76. Zetter K. Report: NSA Is Intercepting Traffic from Yahoo, Google Data Centers // http://wired.com/threatlevel / 2013 / 10 / nsa-hacked-yahoo-google-cables