- NSA official GitHub Account
- USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
- WikiLeaks Publishes NSA Target List
- NSA Warns of the Dangers of Quantum Computing (futurism.com)
- Right to privacy (wikipedia.org)
- Patriot Act | Wikipedia + CALEA act + FISA
- Cryptome | cryptome.org
- NSA's Autonomous Systems (AS),
- 33bits | 33bits.org
- What an IP Address Can Reveal About You | priv.gc.ca
- Randomtalker web-privacy
- [https://bosnadev.com/2015/04/14/facebook-chats-are-being-scanned-by-a-cia-funded-company/](Chats Are Being Scanned By A CIA Funded Company)
- Mobile Security Wiki | mobilesecuritywiki.com
- Researcher at Kaspersky Labs have discovered a list of domains used by the NSA to install malware on victim's PC around the world.
- NSA PRISM Keywords For Domestic Spying | Business Insider
- Windows and the backdoor question from 1999 | CNN
- Psssst: Wanna Buy a Used Spy Website? | Wired
- Understanding NSA Malware | Schneier on Security
- Check if NSA warrantless surveillance is looking at your IP traffic | Lookingglassnews
- Sensitive IP addresses | Wikipedia
- Do Not Scan - Government IP list | PeerBlock Forums
- Hardened user.js for Firefox to stop data leackage | GitHub
- Firefox Zero-Day Exploit used by FBI to shutdown Child porn on Tor Network hostin; Tor Mail Compromised
- Entire set of 5,300+ .gov domains as .csv file | GitHub
- SS7 hack shown demonstrated to track anyone | 60 Minutes
- SSL Blacklist
- MITM-Proxy + Lagado proxy test + Lagado cache test
- Detect Superfish, Komodia and Privdog | filippo
- SSL eye prism protection | digi77
- NSAPlaySet
- Global surveillance disclosures (2013–present) | Wikipedia
- Attacking Tor: how the NSA targets users' online anonymity |TheGuardian
- Using a Power Law Distribution to describe Big Data | Arxiv.org
- 5 reasons you need to be tracking Big Data security analytics (monitor.us)
- FBI, intel chiefs decry “deep cynicism” over cyber spying programs (arstechnica.com)
- Internet-Wide Scan Data Repository (scans.io)
- .onion (ietf.org)
- Mail tester to check you eMail security score + eMail defense
- List of United States mobile virtual network oprators
- If you are interested in switching away from Google, take a look at https://github.com/sovereign/sovereign
- Julian Assange: Debian Is Owned by the NSA (igurublog.wordpress.com)
- Vodafone Australia admits hacking Fairfax journalist's phone (theguardian.com)
- Hacking Team, Computer Vulnerabilities, and the NSA (schneier.com)
- Big Data and Environmental Sustainability: A Conversation Starter (in Brief) (medium.com)
- ISPs don’t have First Amendment right to edit Internet, FCC tells court (arstechnica.com)
- Homeland Security websites vulnerable to cyber attack: audit (reuters.com)
- Now you can find out if GCHQ illegally spied on you (privacyinternational.org)
- Hacking Team, Computer Vulnerabilities, and the NSA (georgetown.edu)
- New Federalist platform lets [government] agencies quickly launch websites (gsa.gov)
- Government spying spooks French citizens (straitstimes.com)
- NSA Plans to Develop Encryption That Could Stump Quantum Computers (wired.com)
- Japanese government orders closure of university social science/humanities depts (timeshighereducation.com)
- Tollow (reqrypt.org)
- Chinese government firms sell products that subvert censorship (larrysalibra.com)
- The Tricky Encryption That Could Stump Quantum Computers (wired.com)
- GCHQ tried to track Web visits of “every visible user on Internet” (arstechnica.com)
- [A Q&A with NSA Whistleblower Edward Snowden (fusion.net)(http://fusion.net/story/201737/edward-snowden-interview/)
- Skype Alternatives, Part 2: Edward Snowden’s Recommendations (cointelegraph.com)
- The FBI has no trouble spying on encrypted communications (boingboing.net)
- Encryption doesn't stop the FBI (theintercept.com)
- NSA runs its spying activities on Red Hat Linux
- How the NSA can break trillions of encrypted Web and VPN connections
- THE NSA WORKED TO “TRACK DOWN” BITCOIN USERS, SNOWDEN DOCUMENTS REVEAL
- THE INTERCEPT IS BROADENING ACCESS TO THE SNOWDEN ARCHIVE. HERE’S WHY (theintercept.com)
- https://www.google.com/#q=goldenfrog+thisisourkey Archive
- http://www.gfwvpn.com/?q=node/224 Archive
- https://www.vpnreactor.com/android_l2tp_ipsec.html Archive
- http://unblockvpn.com/support/how-to-set-up-l2tp-on-the-android.html Archive
- http://www.ibvpn.com/billing/knowledgebase/34/Set-up-the-VPN-connection-on-Android-handsets.html Archive
- https://www.astrill.com/knowledge-base/50/L2TP-IPSec-PSK---How-to-configure-L2TP-IPSec-on-Android.html Archive
- http://billing.purevpn.com/knowledgebase.php?action=displayarticle&id=33 Archive
- https://www.privateinternetaccess.com/pages/client-support/ Archive
- http://torguard.net/knowledgebase.php?action=displayarticle&id=58 Archive
- https://www.ipvanish.com/visualguides/L2TP/Android/ Archive
- http://www.earthvpn.com/android-l2tp-setup-guide/ Archive
- https://nordvpn.com/tutorials/android/l2tpipsec/ Archive
- https://help.tigervpn.com/support/search/solutions?term=shared+secret+tigerVPN Archive
- https://www.slickvpn.com/tutorials/ipsec-for-iphone/ Archive
- DoubleHop.me: Archive and http://archive.is/MZgWE and http://imgur.com/Zn5HSIj
- https://en.wikipedia.org/wiki/Trusted_Computing#Loss_of_anonymity (measure.c)
- NIST Special Publication 800-63B
- https://file.wikileaks.org/torrent/
- Greenwald Vs. NSA debate (youtube.com)
- A Conversation with Edward Snowden (Part 1) [Podcast] (startalkradio.net)
- Pages From OAKSTAR Weekly 2013-03-29
- Pages From OAKSTAR Weekly 2013-03-15
- Detect IP spoofing with 97 chance of success
- ENCRYPT Act of 2016
- Google PDF Search: “not for public release”
- Password guidance - simplifying your approach (GCHQ) [pdf] (gov.uk)
- ISP wins 11-year battle to reveal warrantless FBI spying [pdf] (calyxinstitute.org)
- TheIntercept Documents
- Speicherfristen von Verkehrsdaten im Mobilfunk (spiegel.de)