Loading

PWNEDbyNSA - Pwned by NSA

  1. PWNEDbyNSA - Pwned by NSA
  2.  
  3. ##
  4.  
  5. - 2013-1811.pdf         NSA TAO ANT COTTONMOUTH (DE Original)            December 29, 2013
  6. http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
  7.  
  8. - 2013-1810.pdf         NSA TAO ANT COTTONMOUTH                          December 29, 2013
  9. http://cryptome.org/2013/12/nsa-tao-ant.pdf
  10.  
  11. ##
  12.  
  13. -  Part 1: Inside TAO: Documents Reveal Top NSA Hacking Unit
  14.  
  15. 1/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
  16.  
  17. - Part 2: Targeting Mexico
  18. 2/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html
  19.  
  20. -  Part 3: The NSA's Shadow Network
  21. 3/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html
  22.  
  23. ##
  24.  
  25. - Shopping for Spy Gear: Catalog Advertises NSA Toolbox
  26.  
  27. http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
  28.  
  29. ##
  30.  
  31. - NSA reportedly intercepting laptops purchased online to install spy malware
  32.  
  33. http://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spy
  34.  
  35. ##
  36.  
  37. - Cryptome Mailing List
  38.  
  39. Unauthorized disclosures of secrets are essential for democracy
  40.  
  41. http://www.freelists.org/list/cryptome
  42. http://www.freelists.org/archive/cryptome/
  43.  
  44. ##
  45.  
  46. - New algorithm finds you, even in untagged photos
  47.  
  48. http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/
  49.  
  50. ##
  51.  
  52. - The World In An Eye
  53.  
  54. http://www.cs.columbia.edu/CAVE/projects/world_eye/
  55. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf
  56. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf
  57.  
  58. ##
  59.  
  60. - Target’s Close Relationship to Government Needs to Be Watched
  61. -- Target’s Forsenic Services is who the FBI, Secret Service, BATF and others have turned to for help for two decades
  62. http://www.infowars.com/targets-close-relationship-to-government-needs-to-be-watched/
  63.  
  64. ##
  65.  
  66. - New algorithm finds you, even in untagged photos
  67.  
  68. http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/
  69.  
  70. ##
  71.  
  72. - The World In An Eye
  73.  
  74. http://www.cs.columbia.edu/CAVE/projects/world_eye/
  75. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf
  76. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf
  77.  
  78. ##
  79.  
  80. - On Hacking MicroSD Cards
  81.  
  82. http://www.bunniestudios.com/blog/?p=3554
  83. https://news.ycombinator.com/item?id=6980058
  84. https://events.ccc.de/congress/2013/wiki/Main_Page
  85.  
  86. ##
  87.  
  88. - Are Your Windows Error Reports Leaking Data?
  89. http://community.websense.com/blogs/securitylabs/archive/2013/12/29/dr-watson.aspx
  90.  
  91. ##
  92.  
  93. - #1 ICS and SCADA Security Myth: Protection by Air Gap
  94. http://www.blog.beldensolutions.com/1-ics-and-scada-security-myth-protection-by-air-gap/
  95.  
  96. ##
  97.  
  98. - Edward Snowden Leaks
  99.  
  100. http://cryptome.org/2013/11/snowden-tally.htm