{"id":193218,"date":"2017-05-17T01:34:15","date_gmt":"2017-05-17T05:34:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/malware-case-is-major-blow-for-the-nsa-new-york-times\/"},"modified":"2017-05-17T01:34:15","modified_gmt":"2017-05-17T05:34:15","slug":"malware-case-is-major-blow-for-the-nsa-new-york-times","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/malware-case-is-major-blow-for-the-nsa-new-york-times\/","title":{"rendered":"Malware Case Is Major Blow for the NSA &#8211; New York Times"},"content":{"rendered":"<table border=\"0\" cellpadding=\"2\" cellspacing=\"7\" style=\"vertical-align:top;\"><tr><td width=\"80\" align=\"center\" valign=\"top\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFRezm0iJRcNeCinTbMv5RfXpBv5w&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/www.nytimes.com\/2017\/05\/16\/us\/nsa-malware-case-shadow-brokers.html\"><img loading=\"lazy\" decoding=\"async\" src=\"\/\/t0.gstatic.com\/images?q=tbn:ANd9GcSgNdH5l_1606kY877m2qMVGuRTokJ-KT68lfOiVeu8MgdyjB-xO2ThUHGlopiK5IShXCwfXTrR\" alt=\"\" border=\"1\" width=\"80\" height=\"80\" style=\"padding-left:10px; padding-right: 10px;\"><br><font size=\"-2\">New York Times<\/font><\/a><\/font><\/td><td valign=\"top\" class=\"j\"><font style=\"font-size:85%;font-family:arial,sans-serif\"><div style=\"padding-top:0.8em;\"><img alt=\"\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/div><div class=\"lh\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFRezm0iJRcNeCinTbMv5RfXpBv5w&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/www.nytimes.com\/2017\/05\/16\/us\/nsa-malware-case-shadow-brokers.html\"><b>Malware Case Is Major Blow for the <b>NSA<\/b><\/b><\/a><br><font size=\"-1\"><b><font color=\"#6f6f6f\">New York Times<\/font><\/b><\/font><br><font size=\"-1\">In 2013, Edward J. Snowden gave journalists hundreds of thousands of <b>N.S.A.<\/b> documents he had taken as a contractor, igniting a global debate over the agency's targeting of allies as well as foes. Last August, shortly after the Shadow Brokers' debut,&nbsp;...<\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGayKj7_3JwyG7qWnCCMXmGczZf5w&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/www.washingtonpost.com\/business\/technology\/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did\/2017\/05\/16\/50670b16-3978-11e7-a058-ddbb23c75d82_story.html\"><b>NSA<\/b> officials worried about the day its potent hacking tool would get loose. Then it did.<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Washington Post<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNGDPFj9HhR4Foh7sZ0tUV-d1sipLg&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/techcrunch.com\/2017\/05\/16\/after-wannacry-ex-nsa-director-defends-agencies-holding-exploits\/\">After WannaCry, ex-<b>NSA<\/b> director defends agencies holding exploits<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>TechCrunch<\/nobr><\/font><\/font><br><font size=\"-1\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNHB-NaINKCc9AtCtzBsrdqJoM4RZA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=http:\/\/www.miamiherald.com\/news\/nation-world\/world\/article150844272.html\">Hacker group that leaked <b>NSA<\/b> spy tools likely includes a US insider, experts say<\/a><font size=\"-1\" color=\"#6f6f6f\"><nobr>Miami Herald<\/nobr><\/font><\/font><br><font size=\"-1\" class=\"p\"><a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNEnDBuF0-_na8zrQ62JnDxR4ougeA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=http:\/\/www.reuters.com\/article\/us-cyber-attacks-shadowbrokers-idUSKCN18C1N2\"><nobr>Reuters<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNEiTSCYg_cA_GUvRMBAT-c_l1fhyA&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/www.cnet.com\/news\/hackers-behind-stolen-nsa-tool-for-wannacry-more-leaks-coming\/\"><nobr>CNET<\/nobr><\/a>&nbsp;-<a href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;ct2=us&amp;usg=AFQjCNFEwhbAvKalmPEtvcQTHSWtIIHcCQ&amp;clid=c3a7d30bb8a4878e06b80cf16b898331&amp;cid=52779497434466&amp;ei=yOAbWZjTNdif3QGliKGYAQ&amp;url=https:\/\/fcw.com\/articles\/2017\/05\/16\/wannacry-more-leaks-carberry.aspx\"><nobr>FCW.com<\/nobr><\/a><\/font><br><font class=\"p\" size=\"-1\"><a class=\"p\" href=\"http:\/\/news.google.com\/news\/more?ncl=dU4Ge_0XoxzRPIMe2EJtpQbqfhPtM&amp;authuser=0&amp;ned=us\"><nobr><b>all 42 news articles&nbsp;&raquo;<\/b><\/nobr><\/a><\/font><\/div><p><\/p><\/font><\/td><\/tr><\/table><p><!-- Auto Generated --><\/p><p>See the article here:<br><a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/05\/16\/us\/nsa-malware-case-shadow-brokers.html\" title=\"Malware Case Is Major Blow for the NSA - New York Times\">Malware Case Is Major Blow for the NSA - New York Times<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p> New York Times Malware Case Is Major Blow for the NSA New York Times In 2013, Edward J. Snowden gave journalists hundreds of thousands of N.S.A. documents he had taken as a contractor, igniting a global debate over the agency&#39;s targeting of allies as well as foes <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/malware-case-is-major-blow-for-the-nsa-new-york-times\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193218","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193218"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193218"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193218\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}