pastebin - collaborative debugging tool
kpaste.net RSS


PWNEDbyNSA - Pwned by NSA
Posted by Anonymous on Mon 30th Dec 2013 13:08
raw | new post

  1. PWNEDbyNSA - Pwned by NSA
  2.  
  3. ##
  4.  
  5. - 2013-1811.pdf         NSA TAO ANT COTTONMOUTH (DE Original)            December 29, 2013
  6. http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
  7.  
  8. - 2013-1810.pdf         NSA TAO ANT COTTONMOUTH                          December 29, 2013
  9. http://cryptome.org/2013/12/nsa-tao-ant.pdf
  10.  
  11. ##
  12. -  Part 1: Inside TAO: Documents Reveal Top NSA Hacking Unit
  13.  
  14. 1/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
  15.  
  16. - Part 2: Targeting Mexico
  17. 2/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html
  18.  
  19. -  Part 3: The NSA's Shadow Network
  20. 3/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html
  21.  
  22. ##
  23.  
  24. - Shopping for Spy Gear: Catalog Advertises NSA Toolbox
  25.  
  26. http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
  27.  
  28. ##
  29.  
  30. - NSA reportedly intercepting laptops purchased online to install spy malware
  31.  
  32. http://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spy
  33.  
  34. ##
  35.  
  36. - Cryptome Mailing List
  37.  
  38. Unauthorized disclosures of secrets are essential for democracy
  39.  
  40. http://www.freelists.org/list/cryptome
  41. http://www.freelists.org/archive/cryptome/
  42.  
  43. ##
  44.  
  45. - New algorithm finds you, even in untagged photos
  46.  
  47. http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/
  48.  
  49. ##
  50.  
  51. - The World In An Eye
  52.  
  53. http://www.cs.columbia.edu/CAVE/projects/world_eye/
  54. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf
  55. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf
  56.  
  57. ##
  58.  
  59. - Target’s Close Relationship to Government Needs to Be Watched
  60. -- Target’s Forsenic Services is who the FBI, Secret Service, BATF and others have turned to for help for two decades
  61. http://www.infowars.com/targets-close-relationship-to-government-needs-to-be-watched/
  62.  
  63. ##
  64.  
  65. - New algorithm finds you, even in untagged photos
  66.  
  67. http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/
  68.  
  69. ##
  70.  
  71. - The World In An Eye
  72.  
  73. http://www.cs.columbia.edu/CAVE/projects/world_eye/
  74. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf
  75. http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf
  76.  
  77. ##
  78.  
  79. - On Hacking MicroSD Cards
  80.  
  81. http://www.bunniestudios.com/blog/?p=3554
  82. https://news.ycombinator.com/item?id=6980058
  83. https://events.ccc.de/congress/2013/wiki/Main_Page
  84.  
  85. ##
  86.  
  87. - Are Your Windows Error Reports Leaking Data?
  88. http://community.websense.com/blogs/securitylabs/archive/2013/12/29/dr-watson.aspx
  89.  
  90. ##
  91.  
  92. - #1 ICS and SCADA Security Myth: Protection by Air Gap
  93. http://www.blog.beldensolutions.com/1-ics-and-scada-security-myth-protection-by-air-gap/
  94.  
  95. ##
  96.  
  97. - Edward Snowden Leaks
  98.  
  99. http://cryptome.org/2013/11/snowden-tally.htm

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at