Электронная библиотека » Киви Берд » » онлайн чтение - страница 24

Текст книги "Гигабайты власти"


  • Текст добавлен: 28 октября 2013, 20:10


Автор книги: Киви Берд


Жанр: О бизнесе популярно, Бизнес-Книги


Возрастные ограничения: +18

сообщить о неприемлемом содержимом

Текущая страница: 24 (всего у книги 24 страниц)

Шрифт:
- 100% +

JB01

«Internet Voting Project Cost Pentagon $73,809 Per Vote,» by John Dunbar, The Public Integrity Special Report, August 9, 2001, http://www.notablesoftware.com/Press/JDunbar.html


JD01

«Pentagon braces for a makeover,» by John Dillin, The Christian Science Monitor, February 12, 2001


JD02

«French agents probe Murdoch firm,» by Jamie Doward, The Observer, March 17, 2002, http://observer.guardian.co.uk/business/story/0,6903,669046,00.html


JD03

«500 paedophiles to be tracked by satellite tags,» by Jamie Doward, Observer, Sep 21, 2003, http://observer.guardian.co.uk/uk_news/story/0,6903,1046614,00.html


JD97

«Networking With Spooks» by John Dillon, Covert Actions Quarterly, Winter 1997, http://mediafilter.org/caq/internic


JD99

«Are Pentagon computers compromised? Analyst charges Windows NT isn't secure,» by Jon E. Dougherty, WorldNetDaily.com, Feb 23, 1999, http://www.worldnetdaily.com/bluesky_dougherty/19990223_xnjdo_are_pentag.shtml


JE02

«Mob informant scandal involved highest levels of FBI, documents show,» by Jeff Donn, Associated Press, July 28, 2002, http://www.boston.com/news/daily/28/fbi_mob.htm


JE98

«NSA Network Security Framework Forum (NSFF), Baltmore Maryland, March 2 1998,» by Jeremy Epstein, IEEE Cipher, 1998, http://www.ieee-security.org/Cipher/ConfReports/conf-rep-NSFF.html


JG97

«Cryptanalysis of Alleged A5 Stream Cipher,» by Jovan Golic, in Proceedings of EUROCRYPT'97, LNCS 1233, Springer-Verlag 1997, http://jya.com/a5-hack.htm


JH01

«Free the Encyclopedias!» by Judy Heim, Technology Review, September 4, 2001, http://www.techreview.com/articles/print_version/heim090401.asp


JH03

«The Business of Fear,» by Jack Hitt, Business 2.0, June 2003, http://www.business2.com/subscribers/articles/mag/0,1640,49468,00.html


JK03

«Saving Private Lynch story 'flawed',» by John Kampfner, BBC News, 15 May 2003, http://news.bbc.co.uk/2/hi/programmes/correspondent/3028585.stm


JL02

«Neuromarketing firm launched by Atlanta ad veteran,» by Jim Lovel, Atlanta Business Chronicle, June 17, 2002, http://atlanta.bizjournals.com/atlanta/stories/2002/06/17/story6.html


JL03

«ID cards protect civil liberties – Blair,» by John Leyden, The Register, 30 Sept 2003, http://www.theregister.co.uk/content/6/33138.html


JM02

«Implantable chips make first run at personal ID,» by Charles J. Murray, EE Times, February 16, 2002, http://www.eetimes.com/story/OEG20020215S0046


JM03

«13 million on terror watch list», by James Gordon Meek, NY Daily News, April 8, 2003, http://www.nydailynews.com/04-08-2003/news/wn_report/story/73628p-68132c.html


JM96

«The Complete, Unofficial TEMPEST Information Page,» by Joel McNamara http://www.eskimo.com/~joelm/tempest.html


JO03

«Hollywood goes paranoid,» by Joanne Ostrow, The Denver Post, May 18, 2003, http://www.denverpost.com/Stories/0,1413,36~122~1393956,00.html


JP01

«Roosevelt's Secret War: FDR and World War Two Espionage,» by Joseph Persico, Random House, 2001


JR01

«A Cautionary Tale for a New Age of Surveillance,» By Jeffrey Rosen, New York Times Magazine, October 7, 2001, http://www.nytimes.com/2001/10/07/magazine/07SURVEILLANCE.html


JS01

«Thought Police Peek Into Brains,» by Julia Scheeres, Wired News, October 05, 2001, http://www.wired.com/news/business/0,1367,47221,00.html


JS02

«Understanding the Windows EAL4 Evaluation», by Jonathan S. Shapiro, http://eros.cs.jhu.edu/~shap/NT-EAL4.html


JS03

«Three R's: Reading, Writing, RFID» by Julia Scheeres, Wired News, Oct. 24, 2003, http://www.wired.com/news/technology/0,1282,60898,00.html


JU02a

«They Want Their ID Chips Now,» by Julia Scheeres, Wired News, 06 Feb 2002, http://www.wired.com/news/privacy/0,1848,50187,00.html


JU02b

«Politician Wants to 'Get Chipped',» by Julia Scheeres, Wired News, Feb. 15, 2002, http://www.wired.com/news/technology/0,1282,50435,00.html


JU02c

«ID Chip's Controversial Approval,» by Julia Scheeres, Wired News, Oct. 23, 2002, http://www.wired.com/news/politics/0,1283,55952,00.html


JU03

«When Cash Is Only Skin Deep,» by Julia Scheeres, Wired News, Nov. 25, 2003, http://www.wired.com/news/technology/0,1282,61357,00.html


JW00

«Why We Spy on Our Allies,» by R. James Woolsey, The Wall Street Journal, March 17, 2000, http://cryptome.org/echelon-cia2.htm


JW02

«Watching your every move,» by Jane Wakefield, BBC News Online, 7 February, 2002, http://news.bbc.co.uk/2/hi/science/nature/1789157.stm


JW03

«GSM Association downplays mobile security concerns,» by John Walko, EETimes Germany, September 3, 2003, http://www.eetimes.de/at/news/OEG20030903S0018


JW94

«The Future Direction of Intelligence», address by James Woolsey to the Center for Strategic and Internatioal Studies, Washington, D.C., 18 July 1994


JY01

«Euro bank notes to embed RFID chips by 2005,» by Junko Yoshida, EE Times, December 19, 2001, http://www.eetimes.com/story/OEG20011219S0016


KA98

«Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations,» by Markus Kuhn and Ross Anderson, in Information Hiding, Second International Workshop, IH'98, Portland, Oregon, USA, April 15–17, 1998, Proceedings, LNCS 1525, Springer-Verlag, http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf


KB93

«Mobile ComSec in Europe (A5),» by Klaus Brunnstein, RISKS DIGEST, Volume 14: Issue 60, 12 May 1993, http://catless.ncl.ac.uk/Risks/14.60.html#subj6.1


KD92

«Hiding Space. NASA's Tips for Avoiding Scrutiny,» by Kate Doyle, Columbia Journalism Review, July/August 1992, http://www.cjr.org/year/92/4/nasa.asp


KF03

«Brave new elections,» by Mike Keefe-Feldman, Missoula Independent, Vol.14 No. 50, Dec 11, 2003, http://www.missoulanews.com/News/News.asp?no=3670


KJ99

«Differential Power Analysis,» by P. Kocher, J. Jaffe, B. Jun; in Crypto 99 Proceedings, LNCS 1666, M. Wiener ed., Springer-Verlag, 1999. http://www.cryptography.com/resources/whitepapers/DPA.pdf


KK99

«Design Principles for Tamper-Resistant Smartcard Processors,» by Oliver Kommerling, Markus G. Kuhn, USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10–11, 1999. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf


KP00

«Echelon Reporter answers Ex-CIA Chief,» by Kevin Poulsen, SecurityFocus.com, March 23, 2000, http://www.securityfocus.com/news/6


KP01

«Electronic warfare tactics wipe out thousands of hacked smart cards,» by Kevin Poulsen, SecurityFocus, Jan 25 2001, http://www.securityfocus.com/news/143


KR02

«Iraqi Denial and Deception Far Beyond Battlefield Tactics,» by Kathleen T. Rhem, American Forces Press Service, Oct. 8, 2002, http://www.defenselink.mil/news/Oct2002/n10082002_200210085.html


KR03

«Iraqis Say Lynch Raid Faced No Resistance,» by Keith B. Richburg, Washington Post, April 15, 2003, http://www.washingtonpost.com/ac2/wp-dyn/A26714-2003Apr14


LD03

«Mark of the Beast: ID Verichip microchip called Digital Angel» by These Last Days Ministries, Revised: November 25, 2003, http://gvsregistry.4verichip.com


LG02

«Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers», Lucky Green, Presentation at the 11th USENIX Security Symposium, August 2002, http://www.cypherpunks.to/TCPA_DEFCON_10.pdf


LG03

«The story behind the Lynch story,» by Lou Gelfand, Star Tribune, June 1, 2003, http://www.startribune.com/stories/782/3910734.html


LG96

«The Package» by Bernard Levine and Fred Guinther, Electronic News, Issue: 29 July 1996, http://gbop.nm.ru/lg96.htm


LG99

«More NSAKEY musings,» by Lucky Green, Crypto-Gram, September 15, 1999, http://www.schneier.com/crypto-gram-9909.html


LL03b

«NIST Ignores Scientific Method for Voting Technology,» by Lynn Landes, Voting Machine Webpage, Dec. 15, 2003, http://www.ecotalk.org/NIST.htm


LL03a

«Offshore Company Captures Online Military Vote», by Lynn Landes, Voting Machine Webpage, July 16, 2003, http://www.ecotalk.org/SERVEaccenture.htm


LM03

«Computer Voting Expert Ousted From Elections Conference,» by Lynn Landes, www.EcoTalk.org, Aug 1, 2003, http://www.ecotalk.org/MercuriIACREOT.htm


LN00

«Black Mass: The Irish Mob, the FBI, and a Devil's Deal,» by Dick Lehr and Gerard O'Neill, Public Affairs, 2000


LR03

«Americans give thumbs up to biometrics,» by John Leyden, The Register, Jan 8, 2003, http://www.securityfocusonline.com/news/2001


LU02

«Information Leakage from Optical Emanations,» by Joe Loughry and David A. Umphress, ACM Trans. Info. Sys. Security, Vol. 5, No. 3, pp. 262–289. http://applied-math.org/acm_optical_tempest.pdf


MA03

«Is RFID Technology Easy to Foil?» by Mark Baard, Wired News, Nov. 18, 2003, http://www.wired.com/news/privacy/0,1848,61264,00.html


MB03a

«GCHQ arrest over Observer spying report,» by Martin Bright, The Observer, March 9, 2003, http://www.observer.co.uk/iraq/story/0,12239,910648,00.html


MB03b

«Shoot-to-kill demand by US», by Martin Bright, The Observer, November 16, 2003, http://observer.guardian.co.uk/uk_news/story/0,6903,1086397,00.html


MB99

«Solving the Bible Code Puzzle,» by Brendan McKay, Dror Bar-Natan, Maya Bar-Hillel, and Gil Kalai, Statistical Science, Vol. 14 (1999) 150–173, http://cs.anu.edu.au/~bdm/dilugim/StatSci


MC03

«Uncensored Gore (an interview with Gore Vidal),» by Marc Cooper, LA Weekly, November 14–20, 2003, http://www.laweekly.com/ink/03/52/features-cooper.php


MD00

The 2000 Ballistic Missile Defense Applications Report, http://www.defenselink.mil/specials/missiledefense/tar02g.html


MD02

«Bible Code II: The Countdown,» by Michael Drosnin, 2002


DW02

«He's Ba-a-ack!» by Maureen Dowd, The New York Times, December 1, 2002, http://www.nytimes.com/2002/12/01/opinion/01DOWD.html


MD97

«Bible code,» by Michael Drosnin, 1997


MP97

1997 Space And Missile Defense Technologies Army Science and Technology Master Plan, http://www.fas.org/man/dod-101/army/docs/astmp/aD/D5C.htm


ME01

«Cops tap database to harass, intimidate,» by M.L.Elrick, Detroit Free Press, July 31, 2001, http://www.freep.com/news/mich/lein31_20010731.htm


ME03

«Cryptographers sound warnings on Microsoft security plan,» by Rick Merritt, EE Times, April 15, 2003, http://www.eetimes.com/story/OEG20030415S0013


MF00

«VeriSign buys Network Solutions in $21 billion deal» by Melanie Austria Farmer, CNET News.com, March 7, 2000, http://news.com.com/2100-1023-237656.html


MF02

«Partnership is Critical to Preparation», Microsoft Frontlines, 2002 February, 18th Issue, http://www.microsoft.com/usa/government/February18thIssue.pdf


MF98

«New security flap over Windows NT», by Mary Jo Foley, Sm@rt Reseller, September 23, 1998, http://www.zdnet.com/zdnn/stories/news/0,4586,2140612,00.html


MK02

«Optical Time-Domain Eavesdropping Risks of CRT Displays,» by Markus Kuhn, Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 12–15 May 2002, http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf


ML03

«Voting Machines Gone Wild!» by Mark Lewellen-Biddle, In These Times, 11 Dec 2003, http://www.inthesetimes.com/comments.php?id=490_0_1_0_C


MM01

«Making Dead Birds The Deal of the Century,» by Michael Menduno, Wired, August 2001, http://www.wired.com/wired/archive/9.08/mustread.html?pg=8


MM03

«What’s inside the government’s e-voting booth?» by Susan M. Menke, GCN, 14 July 2003, http://www.gcn.com/22_18/new_products-technology/22718-1.html


MN02

«Homeland Insecurity,» by Merrell Noden, Popular Science, September 2002, http://www.popsci.com/popsci/science/article/0,12543,335438,00.html


PY03

«Peru wants Yale to give back relics,» by Associated Press, March 6, 2003, http://www.cnn.com/2003/WORLD/americas/03/06/peru.relic.ap/


MP03

«The Real 'Saving of Private Lynch',» by Mitch Potter, Toronto Star, May 4, 2003 http://www.refuseandresist.org/war/art.php?aid=769


MR02

«How to find hidden cameras», by Marc Roessler, preprint, 2002, http://www.tentacle.franken.de/papers/hiddencams.pdf


MR03

«Intel Backs Off Security Plan: LaGrande architecture will appear in only some chips, and can be disabled,» by Robert McMillan, IDG News Service, September 17, 2003, http://www.pcworld.com/resource/printable/article/0,aid,112519,00.asp


MS01

«Bruce Lee's Fantastic Comeback,» by Michael Stroud, Wired News, November 16, 2001, http://www.wired.com/news/digiwood/0,1412,48449,00.html


MZ02

«Scanning Tech a Blurry Picture,» by Declan McCullagh and Robert Zarate, Wired News, Feb 16, 2002, http://www.wired.com/news/print/0,1294,50470,00.html


ND03

«NDS Rejects EchoStar Lawsuit as Opportunistic and Baseless,» NDS Press Release, 20 June 2003, http://www.nds.com/newspdfs/EchoStar_200603.pdf


NH96

«Secret Power,» by Nicky Hager, Craig Potton Publishing, New Zealand, 1996.


NI02

«Top Ten Most Stolen Vehicles in the U.S.» by the US National Insurance Crime Bureau (NICB), December 10, 2002, http://www.mymobileguardian.com/MG/MG_topten.asp


NI03

«NIST Symposium on Building Trust and Confidence in Voting Systems,» Gaithersburg, Maryland, Dec. 10–11, 2003, http://vote.nist.gov/


NN01

«NASA and NIMA Begin Joint Review Of Mars Polar Lander Search Analysis,» NASA Press Release, 26 Mar 2001, http://sse.jpl.nasa.gov/whatsnew/pr/010326A.html


NP98

«Probing into C2 security claims: Is NT as secure as Microsoft has said it is?» by Nicholas Petreley, InfoWorld, July 13, 1998, http://www.infoworld.com/pageone/opinions/petrel/980713np.htm


NR02

«GSM calls even more secure thanks to new A5/3 Algorithm,» ETSI News Release, 3 July 2002, http://www.etsi.org/pressroom/previous/2002/3algorithm.htm


NS00

«Name.Space, Inc. v. Network Solutions», US Court Of Appeals, Decided: January 21, 2000, http://namespace.pgmedia.net/law/appeal/2ndcir-dec.html


NS02

NavSource Online: Aircraft Carrier Photo Archive, PCU GEORGE H.W. BUSH (CVN-77), http://www.navsource.org/archives/02/77.htm


NS03

«Stop dodging the awkward truth,» by Norman Solomon, The Observer, March 9, 2003, http://www.observer.co.uk/iraq/story/0,12239,910381,00.html


NY03

«NYC police to destroy database on protesters,» by AP, Apr 11, 2003, http://www.usatoday.com/tech/news/techpolicy/2003-04-11-nypd-database_x.htm


OI89

Obituary: «Intrepid» – Sir William Stephenson, Time, Feb. 13, 1989, page 76


OR03

«SAIC has role in cellphone changes,» The Oak Ridger, 27 November 2003, http://www.oakridger.com/stories/112703/new_20031127006.shtml


PB03

«Tampa police eliminate facial-recognition system,» by Associated Press, 08 Aug 2003, http://www.palmbeachpost.com/news/content/news/0820camera.html


PD02

«Arlington 'Bait Car' Hooks Suspect,» by By Patricia Davis, The Washington Post, 16 April 2002, http://lists.jammed.com/crime/2002/04/0099.html


PE03

«Hall Monitors or Spies? Wireless Tech to Track Building Occupants,» by By Paul Eng, ABC News, Sept. 10, 2003, http://abcnews.go.com/sections/scitech/FutureTech/smartbadges030910.html


PG99

«Re: Forthcoming Biryukov/Shamir result against A5/1 GSM privacy algorithm», Peter Gutmann, posting to [email protected] mailing list, 7 Dec 1999, http://www.mail-archive.com/[email protected]/msg02546.html


PK00

«Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned,» by Ton van der Putte and Jeroen Keuning, in the Proceedings of Fourth Working Conference on Smart Card Research and Advanced Applications, pages 289–303, Kluwer Academic Publishers, 2000; http://cryptome.org/fake-prints.htm


PK03

«In the Company of Spies,» by Paul Kaihla, Business 2.0, May 01, 2003, http://www.business2.com/subscribers/articles/mag/0,1640,49068,00.html.


PK96

«Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,» by P. Kocher, in Crypto 96 Proceedings, LNCS 1109, Springer-Verlag, 1996. http://www.cryptography.com/resources/whitepapers/TimingAttacks.pdf


PL98

«Re: Status of GSM Crypto Attacks», Paul Leyland, posting to [email protected] mailing list, 21 Oct 1998, http://jya.com/gsm102898.htm


PR02

«Can a Hacker Outfox Microsoft?» by Peter Rojas, Oct. 18, 2002, Wired News, http://www.wired.com/news/technology/0,1282,55807,00.html


PR03

«Poll Examines Saddam, 9-11 Link,» Associated Press, September 06, 2003, http://wireservice.wired.com/wired/story.asp?section=Breaking&storyId=779532


PS02

«Prison Statistics On June 30, 2002,» U.S. Department of Justice, Bureau of Justice Statistics, 2002, http://www.ojp.usdoj.gov/bjs/prisons.htm


PW87

«Spycatcher – The Candid Autobiography of a Senior Intelligence Officer,» by Peter Wright, William Heinemann Australia, 1987


QA03

«Q&A On Facial Recognition,» ACLU Web feature on face-recognition technology, 2003, http://www.aclu.org/Privacy/Privacy.cfm?ID=13434&c=130


RA03

«Trusted Computing Frequently Asked Questions – TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCPA» by Ross Anderson, Version 1.1 (August 2003), http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html


RA94

«Subject: A5», Ross Anderson, posting to Newsgroups: sci.crypt,alt.security; 17 Jun, 1994, http://www.ecn.org/crypto/etere/ander.htm


RA96

«The Eternity Service,» by Ross J. Anderson, in Proceedings of Pragocrypt 96, http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html


RB98

«And there are it nevertheless, the movement profiles,» by Niklaus Ramseyer and Denis Von Burg, SonntagsZeitung Online, July 12, 1998. English translation: http://jya.com/gsm-scandal.htm


RC03

«Banned BBC film up for sale on internet,» by Rob Crilly, Glasgow Herald, 26 August 2003, http://www.theherald.co.uk/news/archive/26-8-19103-0-7-44.html


RE00

«Pentagon launches 'smart card' ID – New badges will serve as passport to electronic world,» by Reuters, Oct. 11, 2000, http://www.nytimes.com/reuters/technology/tech-smartcard-pentag.html


RE02

«Microsoft says Windows 2000 passes security check, gets Level 4 Common Criteria OK», Reuters, October 30, 2002, http://www.usatoday.com/tech/news/computersecurity/2002-10-30-windows-secure_x.htm


RE03

«Microsoft Large Army Software Contract», Reuters, June 25, 2003. http://www.forbes.com/technology/newswire/2003/06/25/rtr1011470.html


RF03

«Michelin Embeds RFID Tags in Tires,» RFID Journal News, Jan 17, 2003, http://www.rfidjournal.com/article/articleview/269/1/1/


RH03

«On Election Day 2004, How Will You Know If Your Vote Is Properly Counted? – Answer: You Won't». Representative Rush Holt (Democrat, New Jersey). May 22, 2003, http://holt.house.gov/issues2.cfm?id=5996%20


RJ03

«Bad publicity, clashes trigger MS Palladium name change», The Register, 27 January 2003, http://www.theregister.co.uk/content/archive/29039.html


RL03

«VeriSign tapped to secure Internet voting» by Robert Lemos, CNET News.com, 30 Sept 2003, http://news.com.com/2100-1029-5083772.html


RM03

Rumsfeld, Myers Pentagon Briefing, April 3, 2003, http://usinfo.state.gov/topical/pol/terror/texts/03040408.htm


RN03

«Bush OKs Global Crossing sale to STT,» Reuters, Sep 19, 2003, http://money.cnn.com/2003/09/19/news/international/global_crossing.reut/index.htm


RO02

«U.S. Hopes to Check Computers Globally,» by Robert O'Harrow Jr., The Washington Post, 12 Nov 2002, http://www.washingtonpost.com/wp-dyn/articles/A40942-2002Nov11.html


RO99

«Airborne Remotely Operated Device (1982–1988),» ROBOTICS at Space and Naval Warfare Systems Center, San Diego, 10 December 1999, http://www.spawar.navy.mil/robots/air/arod/arod.html


RP01

«Ping service can test mobile phone availability», Rick Perera, 21 November, 2001, http://www.gate5.de/english/news/coverages/view_idg20011119.html


RR02

«Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards,» by Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely, 2002 IEEE Symposium on Security and Privacy, May 12–15, 2002 Berkeley, http://www.research.ibm.com/intsec/gsm.html


RR03

«Risk Assessment Report: Diebold AccuVote-TS Voting System and Processes (Redacted Final)», SAIC-6099-2003-261, Sep 2, 2003, http://www.dbm.maryland.gov/dbm_search/technology/toc_voting_system_report/votingsystemreportfinal.pdf


RS01

«Rental driver finds Big Brother over shoulder,» by Richard Stenger, CNN News, 22 June 2001, http://www.cnn.com/2001/TECH/ptech/06/22/gps.airiq/index.html


RS02

«Face Scanning at Airports: Ready for Prime Time?» by Richard M. Smith, Biometrics Presentation, 2002, http://www.computerbytesman.com/biometrics/presentation


RS98

«Radio Sweden on Mobile Phone Tapping», Feb 1999, http://www.shmoo.com/mail/cypherpunks/feb99/msg00306.html


RW00

«U.S. spying pays off for business,» by Robert Windrem, NBC News online, 15 April 2000, http://www.dei.uc.pt/majordomo/sociedade/msg01132.html


SA02

«Optical Fault Induction Attacks,» by Sergei P. Skorobogatov, Ross J. Anderson; Cryptographic Hardware and Embedded Systems Workshop (CHES-2002), San Francisco, CA, USA, 13–15 August 2002; http://www.cl.cam.ac.uk/~sps32/ches02-optofault.pdf


SC00

«When The Best Must Do Even Better,» the text of NASA Administrator Dan Goldin’s speech before JPL, March 29, 2000, http://www.space.com/news/goldin_speech_000329.html


SC01

«Sikorsky CYPHER II UAV Conducts First Flight», Press Release, July 5, 2001, http://www.sikorsky.com/news/20010705b.html


SC03

«TIA Is Dead – Long Live TIA» by Steven M. Cherry, IEEE Spectrum Online, Nov 2003, http://www.spectrum.ieee.org/WEBONLY/resource/nov03/1103ntia.html


SC96

«Semiconductor Cubing,» NASA Spinoff Technologies Homepage, 1996, http://www.sti.nasa.gov/tto/spinoff1996/57.html


SC98

Press release of Smartcard Developer Association, 13 Apr 1998, http://www.scard.org/gsm/


SG03

«CIA exhibits spy gadgets with Bond edge» by Reuters, October 28, 2003, http://reuters.com/newsArticle.jhtml?type=technologyNews&storyID=3706593


SI03

«Radio tracking devices set to boom,» by SwissInfo, September 13, 2003, http://www.swissinfo.org/sen/Swissinfo.html?siteSect=511&sid=1642638


KI01

«Identifying terrorists before they strike by using computerized knowledge assessment (CKA),» by Steve Kirsch, Version 2, October 07, 2001, http://www.skirsch.com/politics/plane/ultimate.htm


SK01

«Echelon Panel Calls It a Day,» by Steve Kettmann, Wired News, June 21, 2001, http://www.wired.com/news/politics/0,1283,44721,00.html


SL01

«Thirty countries sign cybercrime treaty,» by Sarah Left, Guardian, November 23, 2001, http://www.guardian.co.uk/internetnews/story/0,7369,604964,00.html


SL02

«Where piracy and profits converge» by Bob Sullivan, MSNBC, May 30, 2002, http://www.legal-rights.org/NDSLAWSUIT/wherepiracy.html


SL03

«She Was Fighting to the Death, Details Emerging of W. Va. Soldier's Capture and Rescue,» by Susan Schmidt and Vernon Loeb, Washington Post, April 3, 2003; http://www.washingtonpost.com/ac2/wp-dyn/A14879-2003Apr2


SM03

«A Very American Coup,» by SCOOP New Zealand, 2002–2003 http://scoop.co.nz/mason/features/?s=usacoup


SO03

«Microsoft plans new PC fortifications,» NewScientist.com news, 9 October 2003, http://www.newscientist.com/news/news.jsp?id=ns99994258


SP03

«Divvying up the Iraq Pie,» by Stephen Pizzo, AlterNet.org, Independent Media Institute, October 7, 2003, http://www.alternet.org/story.html?StoryID=16901


SQ02

«On a New Way to Read Data from Memory,» by David Samyde, Sergei Skorobogatov, Ross Anderson, Jean-Jacques Quisquater; First International IEEE Security in Storage Workshop, 11 December 2002, Greenbelt Marriott, Maryland, USA. http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/SISW02.pdf


SR03

«Special Report: Attack on the 507th Maintenance Company, 23 March 2003, An Nasiriyah, Iraq», U.S. Army Public Affairs Office, July 17, 2003, http://www.army.mil/features/507thMaintCmpy/


SS03

«Uncle Sam keeps SAIC on call for top tasks,» by Scott Shane, The Baltimore Sun, October 26, 2003, http://www.sunspot.net/news/bal-te.saic26oct26,0,1485260.story


ST03

«IBM details Blue Gene supercomputer», by Stephen Shankland, CNET News.com, May 8, 2003, http://news.com.com/2100-1008-1000421.html


SS94

«Cryptanalysis of the GSM A5 Cipher Algorithm», by Simon J. Shepherd, IEE Colloquium on Security and Cryptography Applications to Radio Systems, Digest No. 1994/141, Savoy Place, London, 3 June 1994


ST02

«Startup Profiles: Aspex Technology,» Semiconductor Times, February 2002, Vol 7 Issue 2, http://www.pinestream.com/PDF%20files/Semiconductor.pdf


SU00

«EU pact criminalizing security research?» By Bob Sullivan, MSNBC, October 25, 2000, http://www.zdnet.com/zdnn/stories/news/0,4586,2644958,00.html


SU02

«A $1 billion, corporate-funded hack?» by Bob Sullivan, MSNBC, April 19, 2002, http://www.msnbc.com/news/740634.asp


SV03

«The yeast and the cockroach – a spy tale», by Sue Vorenberg, Seattle Post-Intelligencer, Oct 29, 2003, http://seattlepi.nwsource.com/national/145921_science29.html


SZ03

«Report Raises Electronic Vote Security Issues» by John Schwartz, Sep 25, The New York Times, http://www.nytimes.com/2003/09/25/technology/25VOTE.html


TA01

«3D Stacked Neuro Processor Device – 3DANN,» NASA Technology And Applications Program, February 14, 2001, http://technology.jpl.nasa.gov/gallery/techGallery/gallery/gl_pages/DANN-R_Cube.html


TC01

«Brain-scans can defeat terrorism, InfoSeek founder claims,» by Thomas C Greene, The Register, 03 Oct 2001, http://www.theregister.co.uk/content/55/22020.html


TE03

«TR100/2003: 100 innovators poised to make a dramatic impact on our world», Technology Review, October 2003, http://www.techreview.com/tr100/index.asp


TG01

«US Supremes: Hi-tech surveillance is out,» by Thomas C Greene, The Register, 12 June 2001, http://www.theregister.co.uk/content/6/19655.html


TG03

«The truth about Jessica,» The Guardian, 15 May 2003, http://www.guardian.co.uk/Iraq/Story/0,2763,956255,00.html


TI03

«Microsoft software „riddled with vulnerabilities“, trade body claims,» The Inquirer, 28 August 2003, http://www.theinquirer.net/?article=11249


TL02

«TEMPEST timeline», the compilation of the history of TEMPEST technology, http://cryptome.org/tempest-time.htm


TM01

«Climbing Inside The Criminal Mind (TIME 100: The Next Wave/Innovators/ Security/The Brain Scientist)», by Sarah Sturman Dale, Nov. 26, 2001, http://www.brainwavescience.com/in-the-news.php


TM02

«Impact of Artificial „Gummy“ Fingers on Fingerprint Systems» by Tsutomu Matsumoto et al., Prepared for Proceedings of SPIE Vol.#4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002, http://cryptome.org/gummy.htm


TR03

«Finger, faceprints get green light for Europe's ID standard,» by John Lettice, The Register, 03 October 2003, http://www.theregister.co.uk/content/6/33208.html


TT96

«Wild Bill And Intrepid: Donovan, Stephenson, and the Origin of CIA», by Thomas F. Troy, 1996


TZ02

«Body Check: Biometric Access Protection Devices and their Programs Put to the Test,» by Lisa Thalheim, Jan Krissler, Peter-Michael Ziegler, c't, n11, 2002, http://www.heise.de/ct/english/02/11/114/


WB03

«China Begins Effort to Replace Citizen IDs With Digital Cards,» by Andrew Batson, Wall Street Journal, August 12, 2003, http://cryptome.org/cn-1bn-ids.htm


WE85

«Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?» by Wim van Eck, Computers & Security 4 (1985) 269-286


WF03

«What is Freenet?» The Freenet Project Website, 2003, http://freenetproject.org/index.php?page=whatis


WG95

«alt.scientology.war» by Wendy M. Grossman, Wired Magazine, Issue 3.12 – Dec 1995, http://www.wired.com/wired/archive/3.12/alt.scientology.war.html


WH93

«Biography of Bobby Ray Inman,» The White House Office of the Press Secretary, December 16, 1993, http://www.fas.org/irp/news/1993/931216i.htm


WJ03

«The Good Book holds key to bin Laden whereabouts,» The Wall Street Journal, Feb 28, 2003, http://online.wsj.com/article/0,SB1046387440730138423,00.html


WK02

«Drone plane kills terror suspects,» by Will Knight, NewScientist.com news, 05 November 2002, http://www.newscientist.com/news/news.jsp?id=ns99993014


WK03

«Site Lets Citizens Monitor 'Big Brother',» by Jonathan Krim, Washington Post, July 8, 2003; http://www.washingtonpost.com/ac2/wp-dyn/A23552-2003Jul7&e=42


WM03

«Tipsters told Americans: POW is alive,» by Tracy Wilkinson and Greg Miller, Los Angeles Times, April 3, 2003, http://www.chicagotribune.com/news/nationworld/iraq/chi-0304030290apr03,0,2870927.story?coll=chi-news-hed


WP03

«Maryland Keeps E-Voting System, Promises Fixes», Washington Post, 25 September 2003, http://www.washingtonpost.com/wp-dyn/articles/A60825-2003Sep24.html


WP04

«Wikipedia», from Wikipedia, the free encyclopedia; last modified 3 Jan 2004, http://en.wikipedia.org/wiki/Wikipedia


WS76

«A Man Called Intrepid: The Secret War», by William Stevenson, New York and London: Macmillan, 1976


WS98

«British Security Coordination: The Secret History of British Intelligence in the Americas 1940–1945», William S. Stephenson, ed., Fromm International Publishing, 1998.


YB02

«Smart glasses mean instant refills,» by Yudhijit Bhattacharjee, New Scientist, 04 April 2002, http://www.newscientist.com/news/news.jsp?id=ns99992123


Страницы книги >> Предыдущая | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
  • 0 Оценок: 0

Правообладателям!

Это произведение, предположительно, находится в статусе 'public domain'. Если это не так и размещение материала нарушает чьи-либо права, то сообщите нам об этом.


Популярные книги за неделю


Рекомендации