-
1
-
-
56749163382
-
-
accessed 14 November 2008
-
U.S.C., Part II, Chapter 206, Section 3127, a://www4.law.cornell. edu/uscode/uscode18/usc-sec-18-00003127----000-.html, accessed 14 November 2008.
-
U.S.C., Part II, Chapter 206, Section 3127
-
-
-
2
-
-
56749182118
-
-
American Civil Liberties Union ACLU, at, accessed 16 June 2008
-
American Civil Liberties Union (ACLU), 2008. "FISA: Fear-mongering and what we've learned since January" (14 May), at http://www.aclu.org/ safefree/general/35270leg20080514.html, accessed 16 June 2008.
-
(2008)
FISA: Fear-mongering and what we've learned since January (14 May)
-
-
-
3
-
-
56749156440
-
Phone tapping plan proposed
-
6 March
-
Associated Press, 1992. "Phone tapping plan proposed" (6 March).
-
(1992)
Associated Press
-
-
-
4
-
-
56749163381
-
-
AT&T, 2008. History of network switching, at http://www.corp.att.com/history/nethistory/switching.html, accessed 16 June 2008.
-
AT&T, 2008. "History of network switching," at http://www.corp.att.com/history/nethistory/switching.html, accessed 16 June 2008.
-
-
-
-
5
-
-
56749175062
-
Virtual Jihad: The Internet as the ideal terrorism recruiting tool
-
26 December, at, accessed 14 November 2008
-
Luis Miguel Ariza, 2005. "Virtual Jihad: The Internet as the ideal terrorism recruiting tool," Scientific American (26 December), at http://www.sciam.com/article.cfm?id=virtual-jihad, accessed 14 November 2008.
-
(2005)
Scientific American
-
-
Miguel Ariza, L.1
-
6
-
-
56749096594
-
War of secrets; Eyes in the sky, ears to the wall, and still wanting
-
8 September, at, accessed 14 November 2008
-
James Bamford, 2002. "War of secrets; Eyes in the sky, ears to the wall, and still wanting," New York Times (8 September), at http://www.nytimes.com, accessed 14 November 2008.
-
(2002)
New York Times
-
-
Bamford, J.1
-
9
-
-
56749107216
-
-
G. Bossert, S. Cooper, and W. Drummond, 1997. Considerations for Web transaction security, Network Working Group RFC 2084 (January), at http://www.ietf.org/rfc/rfc2084.txt, accessed 16 June 2008.
-
G. Bossert, S. Cooper, and W. Drummond, 1997. "Considerations for Web transaction security," Network Working Group RFC 2084 (January), at http://www.ietf.org/rfc/rfc2084.txt, accessed 16 June 2008.
-
-
-
-
10
-
-
56749154405
-
Law, trust and the wìred world: Privacy, profiling and e-commerce
-
Spring
-
Christopher Bronk and Lapo Salucci, 2001. "Law, trust and the wìred world: Privacy, profiling and e-commerce," Maxwell Review, volume 9, number 1 (Spring).
-
(2001)
Maxwell Review
, vol.9
, Issue.1
-
-
Bronk, C.1
Salucci, L.2
-
13
-
-
0344559509
-
-
February, Washington, D.C, at, accessed 14 November 2008
-
George W. Bush, 2003a. "National strategy to secure cyberspace" (February). Washington, D.C.; White House, at http://www.whitehouse.gov/pcipb/, accessed 14 November 2008.
-
(2003)
National strategy to secure cyberspace
-
-
Bush, G.W.1
-
14
-
-
56749156438
-
-
17 December, at, accessed 16 June 2008
-
George W. Bush, 2003b. "Homeland Security Presídential Directíve (HSPD) 7" (17 December), at http://www.whitehouse.gov/ news/releases/2003/12/20031217-5.html, accessed 16 June 2008.
-
(2003)
Homeland Security Presídential Directíve (HSPD)
, vol.7
-
-
Bush, G.W.1
-
15
-
-
56749157995
-
Air Force explores the next frontier: Cyber Command could establish model for info operations
-
19 February, at, accessed 14 November 2008
-
Peter A. Buxbaum, 2007. "Air Force explores the next frontier: Cyber Command could establish model for info operations," Government Computing News (19 February), at http://www.gcn.com/print/26-04/43153-1. html, accessed 14 November 2008.
-
(2007)
Government Computing News
-
-
Buxbaum, P.A.1
-
16
-
-
56749150894
-
-
Barry Buzan, Ole Wæver, and Jaap de Wilde, 1998. Security: A new framework for analysis. Boulder, Colo.: Lynne Rlenner.
-
Barry Buzan, Ole Wæver, and Jaap de Wilde, 1998. Security: A new framework for analysis. Boulder, Colo.: Lynne Rlenner.
-
-
-
-
17
-
-
56749096584
-
-
Brian Cashell, W.D. Jackson, Mark Jickllng, and Baird Webel, 2004. The economic impact of cyber-attacks, Congressional Research Service (1 April), and at http://www.cìsco.com/warp/public/779/govtaffairs/ images/CRS-Cyber-Attacks.pdf, accessed 14 November 2008.
-
Brian Cashell, W.D. Jackson, Mark Jickllng, and Baird Webel, 2004. "The economic impact of cyber-attacks," Congressional Research Service (1 April), and at http://www.cìsco.com/warp/public/779/govtaffairs/ images/CRS-Cyber-Attacks.pdf, accessed 14 November 2008.
-
-
-
-
18
-
-
56749154395
-
-
Sabra Chartrand, 1994. Clinton gets a wiretapping bill that covers new technologies, New York Times (9 October), at http://query.nytimes.com/gst/fullpage.html? res= 9502E7D8113DF93AA35753C1A962958260, accessed 14 November 2008.
-
Sabra Chartrand, 1994. "Clinton gets a wiretapping bill that covers new technologies," New York Times (9 October), at http://query.nytimes.com/gst/fullpage.html? res= 9502E7D8113DF93AA35753C1A962958260, accessed 14 November 2008.
-
-
-
-
21
-
-
56749096585
-
-
14 February, at, accessed 16 June 2008
-
CNN, 2006. "Poll: Fifth of Americans think calls have been monitored" (14 February), at http://www.cnn.com/2006/POLITICS/02/14/poll. wiretaps/index.html, accessed 16 June 2008.
-
(2006)
Poll: Fifth of Americans think calls have been monitored
-
-
-
22
-
-
56749156426
-
-
Danny Cohen, 1976. Specifications for the Network Voice Protocol (NVP), RFC 741 (29 January), at http://tools.íetf.org/html/rfc741, accessed 16 June 2008.
-
Danny Cohen, 1976. "Specifications for the Network Voice Protocol (NVP)," RFC 741 (29 January), at http://tools.íetf.org/html/rfc741, accessed 16 June 2008.
-
-
-
-
24
-
-
56749161681
-
-
20 April, at, accessed 16 June 2008
-
James Dempsey, Daniel Wíesner, Martin Stern, and Lísa Leventhal, 1998. "Comments of the Center for Democracy and Technology, In the matter of communications assistance for Law Enforcement Act" (20 April), at http://www.cdt.org/dìgí_tele/calea052098.html, accessed 16 June 2008.
-
(1998)
Comments of the Center for Democracy and Technology, In the matter of communications assistance for Law Enforcement Act
-
-
Dempsey, J.1
Wíesner, D.2
Stern, M.3
Leventhal, L.4
-
25
-
-
56749156435
-
Al-Qaeda steers clear of NSA's ears
-
17 October, at, accessed 14 November 2008
-
John Diamond, 2002. "Al-Qaeda steers clear of NSA's ears," USA Today (17 October), at http://www.usatoday.com/news/washington/2002-10-17-nsa- al-qaeda_x.htm, accessed 14 November 2008.
-
(2002)
USA Today
-
-
Diamond, J.1
-
26
-
-
56749102806
-
-
Whitfield Diffie and Susan Landau, 2007. Privacy on the line: The politics of wiretapping and encryption. Updated and expanded edition. Cambridge, Mass.: MIT Press.
-
Whitfield Diffie and Susan Landau, 2007. Privacy on the line: The politics of wiretapping and encryption. Updated and expanded edition. Cambridge, Mass.: MIT Press.
-
-
-
-
27
-
-
56749160129
-
-
Henry A. Duran, 1998. Riding the superhighway to glory; Jody Williams v. U.S., strategy research project, Carlisle, Pa.: U.S. Army War College, at http://handle.dtic.mil/100.2/ADA345887, accessed 14 November 2008.
-
Henry A. Duran, 1998. "Riding the superhighway to glory; Jody Williams v. U.S., strategy research project," Carlisle, Pa.: U.S. Army War College, at http://handle.dtic.mil/100.2/ADA345887, accessed 14 November 2008.
-
-
-
-
29
-
-
56749185582
-
-
Federal Communications Commission FCC, at, accessed 16 June 2008
-
Federal Communications Commission (FCC), 2008, "Voice Over Internet Protocol (VOIP)," at http://www.fcc.gov/voip/, accessed 16 June 2008.
-
(2008)
Voice Over Internet Protocol (VOIP)
-
-
-
30
-
-
56749183631
-
Last word: Make the FISMA grade meaningful
-
at, accessed 14 November 2008
-
Christopher Fountain, 2008. "Last word: Make the FISMA grade meaningful," SC Magazine (1January), at http://www.scrnagazineus. com/Last-word-the-FISMA-grade-meaningful/article/100431/, accessed 14 November 2008.
-
(2008)
SC Magazine (1January)
-
-
Fountain, C.1
-
32
-
-
56749183630
-
-
Siobhan Gorman, 2007a. NSA to defend against hackers: Privacy fears raised as spy agency turns to systems protection, Baltimore Sun (20 September), and at http://hdvoice.tmcnet.com/news/2007/09/20/2954276.htm, accessed 14 November 2008.
-
Siobhan Gorman, 2007a. "NSA to defend against hackers: Privacy fears raised as spy agency turns to systems protection," Baltimore Sun (20 September), and at http://hdvoice.tmcnet.com/news/2007/09/20/2954276.htm, accessed 14 November 2008.
-
-
-
-
33
-
-
56749161682
-
House panel chief demands details of cybersecurity plan,
-
24 October
-
Siobhan Gorman, 2007b. "House panel chief demands details of cybersecurity plan," Baltimore Sun (24 October).
-
(2007)
Baltimore Sun
-
-
Gorman, S.1
-
34
-
-
56749131827
-
Bush looks to beef up protection against cyberattacks; Estimated cost could be $6 billion; Democrats are wary,
-
28 January
-
Siobhan Gorman, 2008a. "Bush looks to beef up protection against cyberattacks; Estimated cost could be $6 billion; Democrats are wary," Wall Street Journal (28 January).
-
(2008)
Wall Street Journal
-
-
Gorman, S.1
-
35
-
-
56749154406
-
-
Siobhan Gorman, 2008b. NSA's domestic spying grows as agency sweeps up data; Terror fight blurs line over domain; Tracking email, Wall Street Journal (10 March), at http://online.wsj.com/public/article_print/ SB12051197337723845.html, accessed 14 November 2008.
-
Siobhan Gorman, 2008b. "NSA's domestic spying grows as agency sweeps up data; Terror fight blurs line over domain; Tracking email," Wall Street Journal (10 March), at http://online.wsj.com/public/article_print/ SB12051197337723845.html, accessed 14 November 2008.
-
-
-
-
36
-
-
56749150892
-
-
Government Accounting Office (GAO), 2004. Information security: Agencies need to implement consistent processes in authorizing systems for operation (June), and at http://www.gao.gov/products/GAO-04-376, accessed 14 November 2008.
-
Government Accounting Office (GAO), 2004. "Information security: Agencies need to implement consistent processes in authorizing systems for operation" (June), and at http://www.gao.gov/products/GAO-04-376, accessed 14 November 2008.
-
-
-
-
37
-
-
56749163380
-
-
William Gravell, 2002. National security in transformation: Outlining a comprehensive approach to national information power, In: U.S. Congress. Joint Economic Committee. Security in the information age: New challenges, new strategies (May), at http://www.cyberconflict.org/pdf/ gravll.pdf, accessed 14 November 2008.
-
William Gravell, 2002. "National security in transformation: Outlining a comprehensive approach to national information power," In: U.S. Congress. Joint Economic Committee. Security in the information age: New challenges, new strategies (May), at http://www.cyberconflict.org/pdf/ gravll.pdf, accessed 14 November 2008.
-
-
-
-
38
-
-
56749182117
-
Bush's double-edged cyber-security plan
-
26 February, at, accessed 14 November 2008
-
Andy Greenberg, 2008. "Bush's double-edged cyber-security plan," Forbes (26 February), at http://www.forbes.com/2008/02/26/ cyber-security-bush-tech-security-cx_ag_0226security.html, accessed 14 November 2008.
-
(2008)
Forbes
-
-
Greenberg, A.1
-
39
-
-
56749185583
-
America's hackable backbone
-
22 August, at, accessed 14 November 2008
-
Andy Greenberg, 2007. "America's hackable backbone," Forbes (22 August), at http://www.forbes.com/2007/08/22/scada-hackers- infrastucture-tech-security-cx_ag_0822hack.html, accessed 14 November 2008.
-
(2007)
Forbes
-
-
Greenberg, A.1
-
40
-
-
56749104301
-
-
Scott W. Gross, 2003. White paper: MAE services, version 1.0, November, MCI at, accessed 14 November 2008
-
Scott W. Gross, 2003. "White paper: MAE services, version 1.0," (November), MCI at http://globle.mci.com/ca/resources/whitepapers/pdf/MAE2.pdf, accessed 14 November 2008.
-
-
-
-
41
-
-
42349110092
-
The new e-spionage threat
-
10 April, at, accessed 14 November 2008
-
Brian Grow, Keith Epstein, and Chi-Chu Tschang, 2008. "The new e-spionage threat," Business Week (10 April), at http://www.businessweek.com/magazine/content/08-16/b4080032218430.htm, accessed 14 November 2008.
-
(2008)
Business Week
-
-
Grow, B.1
Epstein, K.2
Tschang, C.-C.3
-
42
-
-
80052707765
-
Third of Americans suspect 9-11 government conspiracy
-
1 August, at, accessed 14 November 2008
-
Thomas Hargrove, 2008. "Third of Americans suspect 9-11 government conspiracy," Scripps Howard News Service (1 August), at http://www.scrippsnews.com/911poll, accessed 14 November 2008.
-
(2008)
Scripps Howard News Service
-
-
Hargrove, T.1
-
43
-
-
56749104300
-
-
Cato Institute 20 January, at, accessed 16 June 2008
-
Gene Healy, 2003. "Beware total information awareness," Cato Institute (20 January), at http://www.cato.org/pub-display.php?-id=2959, accessed 16 June 2008.
-
(2003)
Beware total information awareness
-
-
Healy, G.1
-
46
-
-
2342589690
-
Inside the Windows security push
-
January, pp
-
Michael Howard and Steve Lipner, 2003. "Inside the Windows security push," IEEE Security and Privacy, volume 1, number 1 (January), pp. 57-61.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 57-61
-
-
Howard, M.1
Lipner, S.2
-
48
-
-
56749182115
-
-
New York Public Library 8 May, at, accessed 14 November 2008
-
Bob Inman, 2006. "Listening in: Eavesdropping and the National Security Agency," New York Public Library (8 May), at http://www.nypl.org/ research/calendar/imagesprog/LiseningIn050806.pdf, accessed 14 November 2008.
-
(2006)
Listening in: Eavesdropping and the National Security Agency
-
-
Inman, B.1
-
49
-
-
56749105768
-
-
Internet Society, March, at, accessed 16 June 2008
-
Internet Society, 2004. "Wiretapping the Internet: Member survey" (March), at http://www.isoc.org/members/surveys/survey-9.shtml, accessed 16 June 2008.
-
(2004)
Wiretapping the Internet: Member survey
-
-
-
50
-
-
35648934643
-
Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics
-
October, pp
-
Paul Jaeger, 2007. "Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics," Government Information Quarterly, volume 24, number 4 (October), pp. 840-859.
-
(2007)
Government Information Quarterly
, vol.24
, Issue.4
, pp. 840-859
-
-
Jaeger, P.1
-
51
-
-
0003877405
-
-
Second edition. Malden, Mass: Polity Press
-
Mary Kaldor, 2006. New & old wars. Second edition. Malden, Mass: Polity Press.
-
(2006)
New & old wars
-
-
Kaldor, M.1
-
52
-
-
56749107215
-
-
Daniel Kimmage, 2008. The Al-Qaeda media nexus: The virtual network behind the global message. Washington, D.C.: Radio Free Europe/Radio Liberty, and at http://www.rferl.org/content/pressRelease/1105999.html, accessed 14 November 2008.
-
Daniel Kimmage, 2008. The Al-Qaeda media nexus: The virtual network behind the global message. Washington, D.C.: Radio Free Europe/Radio Liberty, and at http://www.rferl.org/content/pressRelease/1105999.html, accessed 14 November 2008.
-
-
-
-
53
-
-
56749152387
-
-
Alec Klein and Ellen Nakashima, 2007. For Windows Vista security, Microsoft called in pros, Washington Post (9 January), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/2007/01/08/ AR2007010801352.html, accessed 14 November 2008.
-
Alec Klein and Ellen Nakashima, 2007. "For Windows Vista security, Microsoft called in pros," Washington Post (9 January), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/2007/01/08/ AR2007010801352.html, accessed 14 November 2008.
-
-
-
-
55
-
-
56749182116
-
Interview,
-
at, accessed 16 June 2008
-
Evan Kohlman, 2005. "Interview," Washington Post, at http://www.washingtonpost.com/wedyn/content/custom/2005/08/05/CU2005080501141. html?whichDay=1, accessed 16 June 2008.
-
(2005)
Washington Post
-
-
Kohlman, E.1
-
56
-
-
30344452580
-
Security, wiretapping, and the Internet
-
November/December, pp
-
Susan Landau, 2005. "Security, wiretapping, and the Internet," IEEE Security and Privacy, volume 3, number 6 (November/December), pp. 26-33.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 26-33
-
-
Landau, S.1
-
57
-
-
56749185572
-
-
7 November, at, accessed 14 November 2008
-
James Lewis, 2007. "Domestic surveillance, FISA and terrorism," Center for Strategic and International Studies (7 November), at http://www.csis.org/media/csis/pubs/071107_lewis.pdf, accessed 14 November 2008.
-
(2007)
Domestic surveillance, FISA and terrorism
-
-
Lewis, J.1
-
58
-
-
56749104299
-
-
14 December, at, accessed 14 November 2008
-
James Lewis, 2005. "Computer espionage, Titan Rain and China," Center for Strategic and International Studies (14 December), at http://www.csis.org/media/csis/pubs/051214-china-titan_rain.pdf, accessed 14 November 2008.
-
(2005)
Computer espionage, Titan Rain and China
-
-
Lewis, J.1
-
59
-
-
42949148345
-
Al-Qaeda online: Understanding jihadist Internet infrastructure
-
1 January, and at www, accessed 14 November 2008
-
Brynjar Lia, 2006. "Al-Qaeda online: Understanding jihadist Internet infrastructure," Jane's Intelligence Review (1 January), and at www.mil.no/multimedia/archive/00075/Al-Qaeda_online_und_75416a.pdf, accessed 14 November 2008.
-
(2006)
Jane's Intelligence Review
-
-
Lia, B.1
-
60
-
-
56749102807
-
As U.S. spars With Microsoft, federal offices use its systems,
-
4 May, at, accessed 14 November
-
Steve Lohr, 1998. "As U.S. spars With Microsoft, federal offices use its systems, " New York Times (4 May), at http://query.nytimes.com/ gst/fullpage.html?res=980DE7DD1E3EF937A35756COA96E958260, accessed 14 November 2008.
-
(1998)
New York Times
-
-
Lohr, S.1
-
63
-
-
56749157994
-
USC machine system demonstrates superhuman speech-recognition abilities
-
18 October, at, accessed 14 November 2008
-
Eric Mankin, 1999. "USC machine system demonstrates superhuman speech-recognition abilities," USC Chronicle (18 October), at http://uscnews.usc.edu/newstools/detail.ohp?recordnum=4831, accessed 14 November 2008.
-
(1999)
USC Chronicle
-
-
Mankin, E.1
-
64
-
-
0142040723
-
The case against privatizing national security
-
October, pp
-
Ann R. Markusen, 2003. "The case against privatizing national security," Governance, volume 16, number 4 (October), pp. 471-501.
-
(2003)
Governance
, vol.16
, Issue.4
, pp. 471-501
-
-
Markusen, A.R.1
-
65
-
-
56749156437
-
FBI, phone firms in tiff over turning on the taps,
-
10 March, p
-
John Mintz, 1992, "FBI, phone firms in tiff over turning on the taps," Washington Post (10 March), p. C1.
-
(1992)
Washington Post
-
-
Mintz, J.1
-
66
-
-
56749104296
-
Electronic surveillance manual
-
Washington, D.C, U.S. Department of Justice, Criminal Division, Office of Enforcement Operations
-
Robert S. Mueller, 1991. Electronic surveillance manual. Volume 1: Procedures and forms. Washington, D.C.: U.S. Department of Justice, Criminal Division, Office of Enforcement Operations.
-
(1991)
Procedures and forms
, vol.1
-
-
Mueller, R.S.1
-
67
-
-
56749180752
-
-
Ellen Nakashima, 2008. Bush order expands network monitoring, Washington Past (26 January), p. A.03, and at.http://www.washingtonpost. com.wpdyn/content/artical/2008/01/25/AR2008012503261_pf.html, accessed 14 November 2008.
-
Ellen Nakashima, 2008. "Bush order expands network monitoring," Washington Past (26 January), p. A.03, and at.http://www.washingtonpost. com.wpdyn/content/artical/2008/01/25/AR2008012503261_pf.html, accessed 14 November 2008.
-
-
-
-
68
-
-
56749156436
-
-
Ellen Nakashima, 2007, A story of surveillance: Former technician 'turning in' AT&T over NSA program, Washington Post (7 November), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/ 2007/11/07/AR2007110700006.html?nav=emailpage, accessed 14 November 2008.
-
Ellen Nakashima, 2007, "A story of surveillance: Former technician 'turning in' AT&T over NSA program," Washington Post (7 November), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/ 2007/11/07/AR2007110700006.html?nav=emailpage, accessed 14 November 2008.
-
-
-
-
69
-
-
0034858214
-
A new dynamic synapse neural network for speech recognition
-
Washington, D.C
-
Hassan Heidari Namarvar, Jim-Shih Liaw and Theodore W. Berger, 2001. "A new dynamic synapse neural network for speech recognition," Neural Networks 2001, Proceedings, International Joint Conference on Neural Networks (Washington, D.C.), volume 4, pp. 2985-2990.
-
(2001)
Neural Networks 2001, Proceedings, International Joint Conference on Neural Networks
, vol.4
, pp. 2985-2990
-
-
Heidari Namarvar, H.1
Liaw, J.-S.2
Berger, T.W.3
-
70
-
-
56749173555
-
-
National Security Agency, December, at, accessed 14 November 2008
-
National Security Agency, 2000. Transition 2001 (December), at http://www.thisiswiretap.com/2001/, accessed 14 November 2008.
-
(2000)
Transition 2001
-
-
-
71
-
-
56749173554
-
-
Joseph S. Nye, Jr. and William A. Owens, 1996. America's information edge, Foreign Affairs, 75, number 2 (March/April), pp. 20-36, and at http://www.foreignaffairs.org/ 19960301faessay4185/joseph-s-nye-jr-william-a-owens/america-s-information-edge. html, accessed 14 November 2008.
-
Joseph S. Nye, Jr. and William A. Owens, 1996. "America's information edge," Foreign Affairs, volume 75, number 2 (March/April), pp. 20-36, and at http://www.foreignaffairs.org/ 19960301faessay4185/joseph-s-nye-jr-william-a-owens/america-s-information-edge. html, accessed 14 November 2008.
-
-
-
-
72
-
-
56749091949
-
-
New Paradigm Resources, 2007. VoIP year in review, at http://www.nprg.com/2007vojpyearinReview/tabid/389/Default.aspx, accessed 16 June 2008.
-
New Paradigm Resources, 2007. "VoIP year in review," at http://www.nprg.com/2007vojpyearinReview/tabid/389/Default.aspx, accessed 16 June 2008.
-
-
-
-
73
-
-
33745810301
-
-
at, accessed 14 November 2008
-
Olmstead v. United States, at http://www.law.corneil.edu/supct/ html/historics/USSC_CR-0277-0438-ZS.html, accessed 14 November 2008.
-
Olmstead v. United States
-
-
-
74
-
-
56749131826
-
-
Organisation for Economic Co-operation and Development (OECD), 2007. Broadband subscribers per 100 inhabitants in OECD countries and ICCP Committee observers countries (June), at http://www.oecd.org/document/23/ 0,3343,en-2649-34449-33987543-1-1-1-1.00.html, accessed 14 November 2008.
-
Organisation for Economic Co-operation and Development (OECD), 2007. "Broadband subscribers per 100 inhabitants in OECD countries and ICCP Committee observers countries" (June), at http://www.oecd.org/document/23/ 0,3343,en-2649-34449-33987543-1-1-1-1.00.html, accessed 14 November 2008.
-
-
-
-
75
-
-
56749175061
-
-
Organisation for Economic Co-operation and Development (OECD), 2003. Broadband subscribers per 100 inhabitants in OECD countries (December), at http://www.oecd.org.document/23/0,3343,en-2649-34449-33987543-1- 1-1-1.00.html, accessed 14 November 2008.
-
Organisation for Economic Co-operation and Development (OECD), 2003. "Broadband subscribers per 100 inhabitants in OECD countries" (December), at http://www.oecd.org.document/23/0,3343,en-2649-34449-33987543-1- 1-1-1.00.html, accessed 14 November 2008.
-
-
-
-
76
-
-
56749150891
-
As technology makes wiretaps more difficult, F.B.I, seeks help,
-
8 March, at, accessed 14 November
-
Anthony Ramirez, 1992a. "As technology makes wiretaps more difficult, F.B.I, seeks help," New York Times (8 March), at http://query.nytimes.com/gst/fullpage.html?res= 9E0CE7DB113CF93BA35750C0A964958260, accessed 14 November 2008.
-
(1992)
New York Times
-
-
Ramirez, A.1
-
77
-
-
56749183617
-
The FBI's latest idea: Make wiretapping easier,
-
19 April, Section 4, p
-
Anthony Ramirez, 1992b. "The FBI's latest idea: Make wiretapping easier," New York Times (19 April), Section 4, p. 2.
-
(1992)
New York Times
, pp. 2
-
-
Ramirez, A.1
-
78
-
-
56749131816
-
-
Rasmussen Reports, 2008. 32% say U.S. legal system worries too much about national security at expense of individual rights (18 February), at http://www.rasmussenreports.com/public-content/politics/current-events/general- current-events/32-say-u-s-legal-system-worries-too-much-about-national-security- a1 accessed 16 June 2008.
-
Rasmussen Reports, 2008. "32% say U.S. legal system worries too much about national security at expense of individual rights" (18 February), at http://www.rasmussenreports.com/public-content/politics/current-events/general- current-events/32-say-u-s-legal-system-worries-too-much-about-national-security- a1 accessed 16 June 2008.
-
-
-
-
79
-
-
56749098106
-
-
Robert Richardson, 2007. CSl computer crime and security survey, Computer Security Institute, and at http://www.gocsi.com/, accessed 14 November 2008.
-
Robert Richardson, 2007. "CSl computer crime and security survey," Computer Security Institute, and at http://www.gocsi.com/, accessed 14 November 2008.
-
-
-
-
80
-
-
56749105758
-
The 'big ear' gone deaf,
-
13 June, at, accessed 14 November
-
William Safire, 2002. "The 'big ear' gone deaf," New York Times (13 June), at http://qwww.nytimes.com/, accessed 14 November 2008.
-
(2002)
New York Times
-
-
Safire, W.1
-
81
-
-
56749175054
-
Terrorists on the Net? Who cares?
-
2 December, at, accessed 14 November 2008
-
Noah Schachtman, 2002. "Terrorists on the Net? Who cares?" Wired (2 December), at http://www.wired.com/techbiz/it/news/2002/12/ 56935, accessed 14 November 2008.
-
(2002)
Wired
-
-
Schachtman, N.1
-
82
-
-
56749170686
-
-
Roger R. Schell, 1979. Computer security: The Achilles heel of the electronic Air Force? Air University Review (January-February), at http://www.airpower.maxwell.af.mil/airchronicles/aureview/1979/jan-feb/schell, html, accessed 14 November 2008.
-
Roger R. Schell, 1979. "Computer security: The Achilles heel of the electronic Air Force?" Air University Review (January-February), at http://www.airpower.maxwell.af.mil/airchronicles/aureview/1979/jan-feb/schell, html, accessed 14 November 2008.
-
-
-
-
83
-
-
70350132014
-
-
financial Times 3 September, at, accessed 14 November 2008
-
Demetri Sevastopulo, 2007. "Chinese military hacked into Pentagon," financial Times (3 September), at http://www.ft.com/cms/ s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html, accessed 14 November 2008.
-
(2007)
Chinese military hacked into Pentagon
-
-
Sevastopulo, D.1
-
84
-
-
36849083821
-
What the NSA is doing ... and why it's illegal
-
John Cary Sims, 2006. "What the NSA is doing ... and why it's illegal," Hastings Constitutional Law Quarterly, volume 33, p. 101.
-
(2006)
Hastings Constitutional Law Quarterly
, vol.33
, pp. 101
-
-
Cary Sims, J.1
-
86
-
-
56749175055
-
Terror's confounding online trail,
-
28 March, at, accessed 14 November
-
Susan Stellin, 2002. "Terror's confounding online trail," New York Times (28 March), at http://query.nytimes.com/gst/fullpage.html? res=9D07EFD8103BF93BA15750C0A9649C8B63, accessed 14 November 2008.
-
(2002)
New York Times
-
-
Stellin, S.1
-
87
-
-
56749178664
-
-
Louise Story, 2007. ADVERTISING; A company will monitor phone calls and devise ads to suit, New York Times (24 September), at http://query.nytimes.com/gst/fullpage.html?res= 990DE3D61531F937A1575AC0A9619C8B63, accesssed 14 November 2008.
-
Louise Story, 2007. "ADVERTISING; A company will monitor phone calls and devise ads to suit," New York Times (24 September), at http://query.nytimes.com/gst/fullpage.html?res= 990DE3D61531F937A1575AC0A9619C8B63, accesssed 14 November 2008.
-
-
-
-
88
-
-
56749154396
-
-
Teralight, 2008. The history of signaling System #7, at http://www.terallght.com/newterallght/wpapers/SS7%20Architecture%200verview.pdf, accessed 16 June 2008.
-
Teralight, 2008. "The history of signaling System #7," at http://www.terallght.com/newterallght/wpapers/SS7%20Architecture%200verview.pdf, accessed 16 June 2008.
-
-
-
-
89
-
-
56749131825
-
-
Timothy L. Thomas, 2003, Al Qaeda and the Internet: The danger of 'cyberplanning', Parameters, 33, number 1, pp. 112-123, and at http://www.carlisle,army,mil/usawc/parameters/03spring/thomas.pdf, accessed 14 November 2008.
-
Timothy L. Thomas, 2003, "Al Qaeda and the Internet: The danger of 'cyberplanning'," Parameters, volume 33, number 1, pp. 112-123, and at http://www.carlisle,army,mil/usawc/parameters/03spring/thomas.pdf, accessed 14 November 2008.
-
-
-
-
90
-
-
56749178672
-
-
Time, 1967. Unplugging bugging, Time (29 December), at http://www.times.com/time/magazine/article/0,9171,844334,00.html, accessed 16 June 2008.
-
Time, 1967. "Unplugging bugging," Time (29 December), at http://www.times.com/time/magazine/article/0,9171,844334,00.html, accessed 16 June 2008.
-
-
-
-
91
-
-
56749156434
-
-
U.S. Department of Defense, 2006, Information operations (DOD Directive o-3600.1, 14 August), at http://www.fas.org/irp/doddir/dod/info-ops. pdf, accessed 16 June 2008.
-
U.S. Department of Defense, 2006, "Information operations" (DOD Directive o-3600.1, 14 August), at http://www.fas.org/irp/doddir/dod/info-ops. pdf, accessed 16 June 2008.
-
-
-
-
92
-
-
56749173543
-
S. 272, High-Performance Computing Act of 1991
-
at, accessed 14 November 2008
-
U.S. Senate, 1991. "S. 272, High-Performance Computing Act of 1991," 102nd Congress, at http://thomas.ioc.gov/, accessed 14 November 2008.
-
(1991)
102nd Congress
-
-
Senate, U.S.1
-
93
-
-
56749104295
-
-
U.S. Senate, Armed Services Committee. 2008. National Defense Authorization Act for fiscal year 2009 (12 May), at http://thomas.loc.gov/ , accessed 14 November 2008.
-
U.S. Senate, Armed Services Committee. 2008. "National Defense Authorization Act for fiscal year 2009" (12 May), at http://thomas.loc.gov/ , accessed 14 November 2008.
-
-
-
-
94
-
-
56749173542
-
-
Sandra Upson, 2007. Wiretapping woes: Trouble ahead for those wanting to monitor Internet-based calls, IEEE Spectrum, 44, number 5 (May), pp. 10-12, and at http://www.spectrum.ieee.org/may07/5047, accessed 14 November 2008.
-
Sandra Upson, 2007. "Wiretapping woes: Trouble ahead for those wanting to monitor Internet-based calls," IEEE Spectrum, volume 44, number 5 (May), pp. 10-12, and at http://www.spectrum.ieee.org/may07/5047, accessed 14 November 2008.
-
-
-
-
95
-
-
56749178663
-
Government outsourcing grows fastest of all sectors
-
4 March, at, accessed 14 November 2008
-
Patience Wait, 2002. "Government outsourcing grows fastest of all sectors," Washington Technology, volume 16, number 23 (4 March), at http://www.washingtontechnology.com/print/16-23/17920-1.html, accessed 14 November 2008.
-
(2002)
Washington Technology
, vol.16
, Issue.23
-
-
Wait, P.1
-
96
-
-
56749102796
-
Sisyphean circles: The Communications Assistance for Law Enforcement Act
-
David Ward, 1996. "Sisyphean circles: The Communications Assistance for Law Enforcement Act," Rutgers Computer and Technology Law Journal, volume 22, number 1, pp. 267-299.
-
(1996)
Rutgers Computer and Technology Law Journal
, vol.22
, Issue.1
, pp. 267-299
-
-
Ward, D.1
-
97
-
-
56749177091
-
Back to smoke signals (editorial)
-
26 March
-
Washington Post, 1992. "Back to smoke signals" (editorial), Washington Post (26 March).
-
(1992)
Washington Post
-
-
Post, W.1
-
98
-
-
56749170685
-
-
Gabriel Weirnann, 2004. www.terror.net: How modern terrorism uses the Internet, United States Institute of Peace, special report 116, at http://www.usip.org/pubs/specialreports/sr116.pdf, accessed 14 November 2008.
-
Gabriel Weirnann, 2004. "www.terror.net: How modern terrorism uses the Internet," United States Institute of Peace, special report 116, at http://www.usip.org/pubs/specialreports/sr116.pdf, accessed 14 November 2008.
-
-
-
-
100
-
-
56749163370
-
-
Tom Zeller, 2000. Ideas & trends; Cloak, dagger, Echelon, New York Times (16 July), and at http://query.nytimes.com/gst/fullpage. html?res=9502EFD6153BF935A54C0A9669C8B63, accessed 14 November 2008.
-
Tom Zeller, 2000. "Ideas & trends; Cloak, dagger, Echelon," New York Times (16 July), and at http://query.nytimes.com/gst/fullpage. html?res=9502EFD6153BF935A54C0A9669C8B63, accessed 14 November 2008.
-
-
-
|