PWNEDbyNSA - Pwned by NSA ## - 2013-1811.pdf NSA TAO ANT COTTONMOUTH (DE Original) December 29, 2013 http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf - 2013-1810.pdf NSA TAO ANT COTTONMOUTH December 29, 2013 http://cryptome.org/2013/12/nsa-tao-ant.pdf ## - Part 1: Inside TAO: Documents Reveal Top NSA Hacking Unit 1/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html - Part 2: Targeting Mexico 2/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html - Part 3: The NSA's Shadow Network 3/3: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html ## - Shopping for Spy Gear: Catalog Advertises NSA Toolbox http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html ## - NSA reportedly intercepting laptops purchased online to install spy malware http://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spy ## - Cryptome Mailing List Unauthorized disclosures of secrets are essential for democracy http://www.freelists.org/list/cryptome http://www.freelists.org/archive/cryptome/ ## - New algorithm finds you, even in untagged photos http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/ ## - The World In An Eye http://www.cs.columbia.edu/CAVE/projects/world_eye/ http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf ## - Target’s Close Relationship to Government Needs to Be Watched -- Target’s Forsenic Services is who the FBI, Secret Service, BATF and others have turned to for help for two decades http://www.infowars.com/targets-close-relationship-to-government-needs-to-be-watched/ ## - New algorithm finds you, even in untagged photos http://www.ece.utoronto.ca/news/aarabi-algorithm-finds-you/ ## - The World In An Eye http://www.cs.columbia.edu/CAVE/projects/world_eye/ http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_IJCV06.pdf http://www1.cs.columbia.edu/CAVE/publications/pdfs/Nishino_CVPR04.pdf ## - On Hacking MicroSD Cards http://www.bunniestudios.com/blog/?p=3554 https://news.ycombinator.com/item?id=6980058 https://events.ccc.de/congress/2013/wiki/Main_Page ## - Are Your Windows Error Reports Leaking Data? http://community.websense.com/blogs/securitylabs/archive/2013/12/29/dr-watson.aspx ## - #1 ICS and SCADA Security Myth: Protection by Air Gap http://www.blog.beldensolutions.com/1-ics-and-scada-security-myth-protection-by-air-gap/ ## - Edward Snowden Leaks http://cryptome.org/2013/11/snowden-tally.htm