KnigaRead.com/

Киви Берд - Гигабайты власти

На нашем сайте KnigaRead.com Вы можете абсолютно бесплатно читать книгу онлайн "Киви Берд - Гигабайты власти". Жанр: О бизнесе популярно издательство Бестселлер, год 2004.
Перейти на страницу:

JM96 «The Complete, Unofficial TEMPEST Information Page,» by Joel McNamara http://www.eskimo.com/~joehn/tempest.html

JO03 «Hollywood goes paranoid,» by Joanne Ostrow, The Denver Post, May 18, 2003, http://www.denverpost.com/Stories/0,1413,36~122~1393956,OO.html

JP01 «Roosevelt's Secret War: FDR and World War Two Espionage,» by Joseph Persico, Random House, 2001

JR01 «A Cautionary Tale for a New Age of Surveillance,» By Jeffrey Rosen, New York Times Magazine, October 7, 2001, http://www.nytimes.com/2001/10/07/magazine/ 07SURVEILLANCE.html

JS01 «Thought Police Peek Into Brains,» by Julia Scheeres, Wired News, October 05, 2001, http://www.wired.com/news/business/0,1367,4722l,00.html

JS02 «Understanding the Windows EAL4 Evaluation», by Jonathan S. Shapiro, http://eros.cs.jhu.edu/~shap/NT-EAL4.html

JS03 «Three R's: Reading, Writing, RFID» by Julia Scheeres, Wired News, Oct. 24, 2003, http://www.wired.com/news/technology/0,1282,60898,00.html

JU02a «They Want Their Ш Chips Now,» by Julia Scheeres, Wired News, 06 Feb 2002, http://www.wired.com/news/privacy/0,1848,50187,00.html

JU02b «Politician Wants to 'Get Chipped',» by Julia Scheeres, Wired News, Feb. 15, 2002, http://www.wired.com/news/technology/0,1282,50435,00.html

JU02c «ID Chip's Controversial Approval,» by Julia Scheeres, Wired News, Oct. 23, 2002, http://www.wired.com/news/politics/0,1283,55952,00.html

JU03 «When Cash Is Only Skin Deep,» by Julia Scheeres, Wired News, Nov. 25, 2003, http://www.wired.com/news/technology/0,1282,61357,00.html

JWOO «Why We Spy on Our Allies,» by R. James Woolsey, The Wall Street Journal, March 17,2000, http://cryptome.org/echelon-cia2.htm

JW02 «Watching your every move,» by Jane Wakefield, BBC News Online, 1 February, 2002, http://news.bbc.co.Uk/2/hi/science/nature/1789157.stm

JW03 «GSM Association downplays mobile security concerns,» by John Walko, EETimes Germany, September 3,2003, http://www.eetimes.de/at/news/OEG20030903S0018

JW94 «The Future Direction of Intelligence», address by James Woolsey to the Center for Strategic and Internatioal Studies, Washington, D.C., 18 July 1994

JY01 «Euro bank notes to embed RFID chips by 2005,» by Junko Yoshida, ЕЕ Times, December 19,2001, http://www.eetimes.com/story/OEG20011219S0016

KA98 «Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations,» by Markus Kuhn and Ross Anderson, in Information Hiding, Second International Workshop, IH'98, Portland, Oregon, USA, April 15—17, 1998, Proceedings, LNCS 1525, Springer-Verlag, http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

KB93 «Mobile ComSec in Europe (A5),» by Klaus Brunnstein, RISKS DIGEST, Volume 14: Issue 60,12 May 1993, http://catless.ncl.ac.uk/Risks/14.60.htmltfsubj6.1

KD92 «Hiding Space. NASA's Tips for Avoiding Scrutiny,» by Kate Doyle, Columbia Journalism Review, July/August 1992, http://www.cjr.Org/year/92/4/nasa.asp

KF03 «Brave new elections,» by Mike Keefe-Feldman, Missoula Independent, Vol.14 No. 50, Dec 11,2003, http://www.missoulanews.com/News/News.asp?no=3670

KJ99 «Differential Power Analysis,» by P. Kocher, J. Jaffe, B. Jun; in Crypto 99 Proceedings, LNCS 1666, M. Wiener ed., Springer-Verlag, 1999. http://www.cryptography.com/resources/whitepapers/DPA.pdf

KK99 «Design Principles for Tamper-Resistant Smartcard Processors,» by Oliver Kom-merling, Markus G. Kuhn, USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10—11,1999. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf

KPOO «Echelon Reporter answers Ex-CIA Chief,» by Kevin Poulsen, SecurityFocus.com, March 23,2000, http://www.securityfocus.eom/news/6

KP01 «Electronic warfare tactics wipe out thousands of hacked smart cards,» by Kevin Poulsen, SecurityFocus, Jan 25 2001, http://www.securityfocus.com/news/143

KR02 «Iraqi Denial and Deception Far Beyond Battlefield Tactics,» by Kathleen T. Rhem, American Forces Press Service, Oct. 8, 2002, http://www.defenselink.mil/news/ Oct2002/nl0082002 200210085.html

KR03 «Iraqis Say Lynch Raid Faced No Resistance,» by Keith B. Richburg, Washington Post, April 15, 2003, http://www.washingtonpost.com/ac2/wp-dyn/A26714-2003Aprl4

LD03 «Mark of the Beast: Ш Verichip microchip called Digital Angel» by These Last Days Ministries, Revised: November 25, 2003, http://gvsregistry.4verichip.com

LG02 «Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers», Lucky Green, Presentation at the 11th USENIX Security Symposium, August 2002, http://www.cypherpunks.to/TCP A_DEFCON_10.pdf

LG03 «The story behind the Lynch story,» by Lou Gelfand, Star Tribune, June 1, 2003, http://www.startribune.com/stories/782/3910734.html

LG96 «The Package» by Bernard Levine and Fred Guinther, Electronic News, Issue: 29 July 1996, http://gbop.nm.ru/lg96.htm

LG99 «More NSAKEY musings,» by Lucky Green, Crypto-Gram, September 15, 1999, http://www.schneier.com/crypto-gram-9909.html

LL03b «NIST Ignores Scientific Method for Voting Technology,» by Lynn Landes, Voting Machine Webpage, Dec. 15,2003, http://www.ecotalk.org/NIST.htm

LL03a «Offshore Company Captures Online Military Vote», by Lynn Landes, Voting Machine Webpage, July 16, 2003, http://www.ecotalk.org/SERVEaccenture.htm

LM03 «Computer Voting Expert Ousted From Elections Conference,» by Lynn Landes, www.EcoTalk.org, Aug 1, 2003, http://www.ecotalk.org/MercuriIACREOT.htm

LNOO «Black Mass: The Irish Mob, the FBI, and a Devil's Deal,» by Dick Lehr and Gerard O'Neill, Public Affairs, 2000

LR03 «Americans give thumbs up to biometrics,» by John Leyden, The Register, Jan 8, 2003, http://www.securityfocusonline.com/news/2001

LU02 «Information Leakage from Optical Emanations,» by Joe Loughry and David A. Umphress, ACM Trans. Info. Sys. Security, Vol. 5, No. 3, pp. 262—289. http://applied-math. org/acm_optical_tempest.pdf

MA03 «Is RFK» Technology Easy to Foil?» by Mark Baard, Wired News, Nov. 18, 2003, http://www.wired.com/news/privacy/0,1848,61264,00.html

МВОЗа «GCHQ arrest over Observer spying report,» by Martin Bright, The Observer, March 9,2003, http://www.observer.co.uk/iraq/story/0,12239,910648,00.html

МВОЗЬ «Shoot-to-kill demand by US», by Martin Bright, The Observer, November 16, 2003,http://observer.guardian.co.uk/uk_news/story/0,6903,1086397,00.html

MB99 «Solving the Bible Code Puzzle,» by Brendan McKay, Dror Bar-Natan, Maya Bar-Hillel, and Gil Kalai, Statistical Science, Vol. 14 (1999) 150—173, http://cs.anu.edu.au/~bdm/dilugim/StatSci

МСОЗ «Uncensored Gore (an interview with Gore Vidal),» by Marc Cooper, LA Weekly, November 14 – 20,2003, http://www.laweekly.com/ink/03/52/features-cooper.php

MDOO The 2000 Ballistic Missile Defense Applications Report, http://www.defenselink. mil/specials/missiledefense/tar02g.html

MD02 «Bible Code П: The Countdown,» by Michael Drosnin, 2002

DW02 «He's Ba-a-ack!» by Maureen Dowd, The New York Times, December 1, 2002, http://www.nytimes.com/2002/12/01/opinion/01DOWD.html

MD97 «Bible code,» by Michael Drosnin, 1997

MP97 1997 Space And Missile Defense Technologies Army Science and Technology Master Plan, http://www.fas.org/man/dod-101/army/docs/astmp/aD/D5C.htm

ME01 «Cops tap database to harass, intimidate,» by M.L.Elrick, Detroit Free Press, July 31,2001, http://www.freep.com/news/mich/lein31_20010731.htm

ME03 «Cryptographers sound warnings on Microsoft security plan,» by Rick Merritt, ЕЕ Times, April 15,2003, http://www.eetimes.com/story/OEG20030415S0013

MFOO «VeriSign buys Network Solutions in $21 billion deal» by Melanie Austria Farmer, CNETNews.com, March 7, 2000, http://news.com.com/2100-1023-237656.html

MF02 «Partnership is Critical to Preparation», Microsoft Froutlines, 2002 February, 18th Issue, http://www.microsoft.com/usa/government/Februaryl 8thlssue.pdf

MF98 «New security flap over Windows NT», by Mary Jo Foley, [email protected] Reseller, September 23,1998, http://www.zdnet.com/zdnn/stories/news/0,4586,2140612,00.html

MK02 «Optical Time-Domain Eavesdropping Risks of CRT Displays,» by Markus Kuhn, Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 12—15 May 2002, http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf

ML03 «Voting Machines Gone Wild!» by Mark Lewellen-Biddle, In These Times, 11 Dec 2003, http://www.mthesetmes.cony comments.php?id=490_0_l_0_C

MM01 «Making Dead Birds The Deal of the Century,» by Michael Menduno, Wired, August 2001, http://www.wired.com/wired/archive/9.08/mustread.html?pg=8

MM03 «What's inside the government's e-voting booth?» by Susan M. Menke, GCN, 14 July 2003, http://www.gcn.com/22_18/new_products-technology/22718-l.html

MN02 «Homeland Insecurity,» by Merrell Noden, Popular Science, September 2002, http://www.popsci.com/popsci/science/article/0,12543,335438,00.html

PY03 «Peru wants Yale to give back relics,» by Associated Press, March 6, 2003, http://www.cnn.com/2003/WORLD/americas/03/06/peru.relic.ap/

MP03 «The Real 'Saving of Private Lynch',» by Mitch Potter, Toronto Star, May 4, 2003 http://www.refuseandresist. org/war/art.php?aid=769

MR02 «How to find hidden cameras», by Marc Roessler, preprint, 2002, http://www.tentacle.franken.de/papers/hiddencams.pdf

MR03 «Intel Backs Off Security Plan: LaGrande architecture will appear in only some chips, and can be disabled,» by Robert McMillan, IDG News Service, September 17, 2003,http://www.pcworld.com/resource/printable/article/0,aid,112519,00.asp

MS01 «Bruce Lee's Fantastic Comeback,» by Michael Stroud, Wired News, November 16, 2001, http://www. wired. com/news/digiwood/0,1412,48449,00.html

MZ02 «Scanning Tech a Blurry Picture,» by Declan McCullagh and Robert Zarate, Wired News, Feb 16, 2002, http://www.wired.com/news/print/0,1294,50470,00.html

ND03 «NDS Rejects EchoStar Lawsuit as Opportunistic and Baseless,» NDS Press Release, 20 June 2003, http://www.nds.com/newspdfs/EchoStar_200603.pdf

NH96 «Secret Power,» by Nicky Hager, Craig Potton Publishing, New Zealand, 1996.

N102 «Top Ten Most Stolen Vehicles in the U.S.» by the US National Insurance Crime Bureau (NICB), December 10, 2002, http://www.mymobileguardian.com/MG/ MG_topten.asp

N103 «NIST Symposium on Building Trust and Confidence in Voting Systems,» Gaithers-burg, Maryland, Dec. 10—11,2003, http://vote.nist.gov/

NN01 «NASA and NIMA Begin Joint Review Of Mars Polar Lander Search Analysis,» NASA Press Release, 26 Mar 2001, http://sse.jpl.nasa.gov/whatsnew/pr/ 010326A.html

NP98 «Probing into C2 security claims: Is NT as secure as Microsoft has said it is?» by Nicholas Petreley, InfoWorld, July 13, 1998, http://www.infoworld.com/pageone/ opinions/petrel/980713np.htm

NR02 «GSM calls even more secure thanks to new A5/3 Algorithm,» ETSI News Release, 3 July 2002, http://www.etsi.org/pressroom/previous/2002/3algorithm.htm

NSOO «Name.Space, Inc. v. Network Solutions», US Court Of Appeals, Decided: January 21,2000, http://namespace.pgmedia.net/law/appeal/2ndcir-dec.html

NS02 NavSource Online: Aircraft Carrier Photo Archive, PCU GEORGE H.W. BUSH (CVN-77), http://www.navsource.org/archives/02/77.htm

NS03 «Stop dodging the awkward truth,» by Norman Solomon, The Observer, March 9, 2003,http://www.observer.co.uk/iraq/story/0,12239,910381,00.html

NY03 «NYC police to destroy database on protesters,» by AP, Apr 11, 2003, http://www.usatoday.com/tech/news/techpolicy/2003-04-l l-nypd-database_x.htm

OI89 Obituary: «Intrepid» – Sir William Stephenson, Time, Feb. 13,1989, page 76

Перейти на страницу:
Прокомментировать
Подтвердите что вы не робот:*