RR03 «Risk Assessment Report: Diebold AccuVote-TS Voting System and Processes (Redacted Final)», SAIC-6099-2003-261, Sep 2, 2003, http://www.dbm.maryland. gov/dbm_search/technology/toc_voting_system_report/votingsystemreportfinal.pdf
RS01 «Rental driver finds Big Brother over shoulder,» by Richard Stenger, CNN News, 22 June 2001, http://www.cnn.com/2001/TECH/ptech/06/22/gps.airiq/index.html
RS02 «Face Scanning at Airports: Ready for Prime Time?» by Richard M. Smith, Biometrics Presentation, 2002, http://www.computerbytesman.com/biometrics/ presentation
RS98 «Radio Sweden on Mobile Phone Tapping», Feb 1999, http://www.shmoo.com/ mail/cypherpunks/feb99/msg00306.html
RWOO «U.S. spying pays off for business,» by Robert Windrem, NBC News online, 15 April 2000, http://www.dei.uc.pt/majordomo/sociedade/msg01132.html
SA02 «Optical Fault Induction Attacks,» by Sergei P. Skorobogatov, Ross J. Anderson; Cryptographic Hardware and Embedded Systems Workshop (CHES-2002), San Francisco, CA, USA, 13-15 August 2002; http://www.cl.cam.ac.uk/~sps32/ches02-optofault.pdf
SCOO «When The Best Must Do Even Better,» the text of NASA Administrator Dan Goldin's speech before JPL, March 29, 2000, http://www.space.com/news/ goldin_speech_000329.html
SC01 «Sikorsky CYPHER П UAV Conducts First Flight», Press Release, July 5, 2001, http://www.sikorsky.com/news/20010705b.html
SC03 «TIA Is Dead – Long Live TIA» by Steven M. Cherry, IEEE Spectrum Online, Nov 2003, http://www.spectrum.ieee.Org/WEBONLY/resource/nov03/l 103ntia.html
SC96 «Semiconductor Cubing,» NASA Spinoff Technologies Homepage, 1996, http://www.sti.nasa.gov/tto/spinoffl996/57.html
SC98 Press release of Smartcard Developer Association, 13 Apr 1998, http://www.scard. org/gsm/
SG03 «CIA exhibits spy gadgets with Bond edge» by Reuters, October 28, 2003, http://reuters.com/newsArticle.jhtml?type=technologyNewsstoryID=3706593
SI03 «Radio tracking devices set to boom,» by Swisslnfo, September 13, 2003, http://www.swissinfo.org/sen/Swissinfo.html?siteSect=511sid=1642638
KI01 «Identifying terrorists before they strike by using computerized knowledge assessment (CKA),» by Steve Kirsch, Version 2, October 07, 2001, http://www.skirsch.com/politics/plane/ultimate.htm
SK01 «Echelon Panel Calls It a Day,» by Steve Kettmann, Wired News, June 21, 2001, http://www.wired.eom/news/politics/0,1283,44721,00.html
SL01 «Thirty countries sign cybercrime treaty,» by Sarah Left, Guardian, November 23, 2001, http://www.guardian.co.uk/internetnews/story/0,7369,604964,00.html
SL02 «Where piracy and profits converge» by Bob Sullivan, MSNBC, May 30, 2002, http://www.legal-rights.org/NDSLAWSUIT/wherepiracy.html
SL03 «She Was Fighting to the Death, Details Emerging of W. Va. Soldier's Capture and Rescue,» by Susan Schmidt and Vernon Loeb, Washington Post, April 3, 2003; http://www.washingtonpost.com/ac2/wp-dyn/A14879-2003Apr2
SM03 «A Very American Coup,» by SCOOP New Zealand, 2002-2003 http://scoop.co.nz/ mason/features/?s=usacoup
SO03 «Microsoft plans new PC fortifications,» NewScientist.com news, 9 October 2003, http://www.newscientist.com/news/news.jsp?id=ns99994258
SP03 «Divvying up the Iraq Pie,» by Stephen Pizzo, AlterNet.org, Independent Media Institute, October 7,2003, http://www.alternet.org/story.html?StoryID=16901
SQ02 «On a New Way to Read Data from Memory,» by David Samyde, Sergei Skoroboga-tov, Ross Anderson, Jean-Jacques Quisquater; First International IEEE Security in Storage Worbhop, 11 December 2002, Greenbelt Marriott, Maryland, USA. http://www.flp.cl.cam.ac.uk/ftp/users/rjal4/SISW02.pdf
SR03 «Special Report: Attack on the 507th Maintenance Company, 23 March 2003, An Nasiriyah, Iraq», U.S. Army Public Affairs Office, July 17, 2003, http://www.army.mil/features/507thMaintCmpy/
SS03 «Uncle Sam keeps SAIC on call for top tasks,» by Scott Shane, The Baltimore Sun, October 26,2003, http://www.sunspot.net/news/bal-te.saic26oct26,0,1485260.story
ST03 «IBM details Blue Gene supercomputer», by Stephen Shankland, CNETNews.com, May 8,2003, http://news.com.com/2100-1008-1000421.html
SS94 «Cryptanalysis of the GSM A5 Cipher Algorithm», by Simon J. Shepherd, IEE Colloquium on Security and Cryptography Applications to Radio Systems, Digest No. 1994/141, Savoy Place, London, 3 June 1994
ST02 «Startup Profiles: Aspex Technology,» Semiconductor Times, February 2002, Vol 7 Issue 2, http://www.pinestream.com/PDF%20files/Semiconductor.pdf
SUOO «EU pact criminalizing security research?» By Bob Sullivan, MSNBC, October 25, 2000, http://www.zdnet.com/zdnn/stories/news/0,4586,2644958,00.html
SU02 «A $1 billion, corporate-funded hack?» by Bob Sullivan, MSNBC, April 19, 2002, http://www.msnbc. com/news/740634. asp
SV03 «The yeast and the cockroach – a spy tale», by Sue Vorenberg, Seattle Post-Intelligencer, Oct 29, 2003, http://seattlepi.nwsource.com/national/ 145921_science29.html
SZ03 «Report Raises Electronic Vote Security Issues» by John Schwartz, Sep 25, The New York Times, http://www.nytimes.com/2003/09/25/technology/25VOTE.html
TA01 «3D Stacked Neuro Processor Device – 3DANN,» NASA Technology And Applications Program, February 14, 2001, http://technology.jpl.nasa.gov/gallery/ techGal-lery/gallery/gl_pages/DANN-R_Cube.html
TC01 «Brain-scans can defeat terrorism, InfoSeek founder claims,» by Thomas С Greene, The Register, 03 Oct 2001, http://www.theregister.co.uk/content/55/ 22020.html
TE03 «TR100/2003: 100 innovators poised to make a dramatic impact on our world», Technology Review, October 2003, http://www.techreview.com/trlOO/index.asp
TG01 «US Supremes: Hi-tech surveillance is out,» by Thomas С Greene, The Register, 12 June 2001, http://www.theregister.co.Uk/content/6/19655.html
TG03 «The truth about Jessica,» The Guardian, 15 May 2003, http://www.guardian.co.uk/ Iraq/Story/0,2763,956255,OO.html
ТЮЗ «Microsoft software „riddled with vulnerabilities“, trade body claims,» The Inquirer, 28 August 2003, http://www.theinquirer.net/?article=l 1249
TL02 «TEMPEST timeline», the compilation of the history of TEMPEST technology, http://cryptome.org/tempest-time.htm
TM01 «Climbing Inside The Criminal Mind (TIME 100: The Next Waveflnnovators/ Security/The Brain Scientist)», by Sarah Sturman Dale, Nov. 26, 2001, http://www.brainwavescience.com/in-the-news.php
TM02 «Impact of Artificial „Gummy“ Fingers on Fingerprint Systems» by Tsutomu Ma-tsumoto et al., Prepared for Proceedings ofSPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002, http://cryptome.org/ gummy.htm
TR03 «Finger, faceprints get green light for Europe's ГО standard,» by John Lettice, The Register, 03 October 2003, http://www.theregister.co.Uk/content/6/33208.html
TT96 «Wild Bill And Intrepid: Donovan, Stephenson, and the Origin of CIA», by Thomas F. Troy, 1996
TZ02 «Body Check: Biometric Access Protection Devices and their Programs Put to the Test,» by Lisa Thalheim, Jan Krissler, Peter-Michael Ziegler, c't, nil, 2002, http://www.heise.de/ct/english/02/! 1/114/
WB03 «China Begins Effort to Replace Citizen IDs With Digital Cards,» by Andrew Bat-son, Wall Street Journal, August 12, 2003, http://cryptome.org/cn-lbn-ids.htm
WE85 «Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?» by Wim van Eck, Computers Security 4 (1985) 269-286
WF03 «What is Freenet?» The Freenet Project Website, 2003, http://freenetproject.org/ index.php?page=whatis
WG95 «alt.scientology.war» by Wendy M. Grossman, Wired Magazine, Issue 3.12 – Dec 1995, http://www. wired, com/wired/archive/3.12/alt. scientology.war.html
WH93 «Biography of Bobby Ray Inman,» The White House Office of the Press Secretary, December 16,1993, http://www.fas.org/irp/news/1993/931216i.htm
Читать дальше