메뉴 건너뛰기




Volumn 13, Issue 11, 2008, Pages

Webtapping: Securing the internet to save us from transnational terrior?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 56749151378     PISSN: 13960466     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (100)
  • 1
    • 56749163382 scopus 로고    scopus 로고
    • accessed 14 November 2008
    • U.S.C., Part II, Chapter 206, Section 3127, a://www4.law.cornell. edu/uscode/uscode18/usc-sec-18-00003127----000-.html, accessed 14 November 2008.
    • U.S.C., Part II, Chapter 206, Section 3127
  • 2
    • 56749182118 scopus 로고    scopus 로고
    • American Civil Liberties Union ACLU, at, accessed 16 June 2008
    • American Civil Liberties Union (ACLU), 2008. "FISA: Fear-mongering and what we've learned since January" (14 May), at http://www.aclu.org/ safefree/general/35270leg20080514.html, accessed 16 June 2008.
    • (2008) FISA: Fear-mongering and what we've learned since January (14 May)
  • 3
    • 56749156440 scopus 로고
    • Phone tapping plan proposed
    • 6 March
    • Associated Press, 1992. "Phone tapping plan proposed" (6 March).
    • (1992) Associated Press
  • 4
    • 56749163381 scopus 로고    scopus 로고
    • AT&T, 2008. History of network switching, at http://www.corp.att.com/history/nethistory/switching.html, accessed 16 June 2008.
    • AT&T, 2008. "History of network switching," at http://www.corp.att.com/history/nethistory/switching.html, accessed 16 June 2008.
  • 5
    • 56749175062 scopus 로고    scopus 로고
    • Virtual Jihad: The Internet as the ideal terrorism recruiting tool
    • 26 December, at, accessed 14 November 2008
    • Luis Miguel Ariza, 2005. "Virtual Jihad: The Internet as the ideal terrorism recruiting tool," Scientific American (26 December), at http://www.sciam.com/article.cfm?id=virtual-jihad, accessed 14 November 2008.
    • (2005) Scientific American
    • Miguel Ariza, L.1
  • 6
    • 56749096594 scopus 로고    scopus 로고
    • War of secrets; Eyes in the sky, ears to the wall, and still wanting
    • 8 September, at, accessed 14 November 2008
    • James Bamford, 2002. "War of secrets; Eyes in the sky, ears to the wall, and still wanting," New York Times (8 September), at http://www.nytimes.com, accessed 14 November 2008.
    • (2002) New York Times
    • Bamford, J.1
  • 9
    • 56749107216 scopus 로고    scopus 로고
    • G. Bossert, S. Cooper, and W. Drummond, 1997. Considerations for Web transaction security, Network Working Group RFC 2084 (January), at http://www.ietf.org/rfc/rfc2084.txt, accessed 16 June 2008.
    • G. Bossert, S. Cooper, and W. Drummond, 1997. "Considerations for Web transaction security," Network Working Group RFC 2084 (January), at http://www.ietf.org/rfc/rfc2084.txt, accessed 16 June 2008.
  • 10
    • 56749154405 scopus 로고    scopus 로고
    • Law, trust and the wìred world: Privacy, profiling and e-commerce
    • Spring
    • Christopher Bronk and Lapo Salucci, 2001. "Law, trust and the wìred world: Privacy, profiling and e-commerce," Maxwell Review, volume 9, number 1 (Spring).
    • (2001) Maxwell Review , vol.9 , Issue.1
    • Bronk, C.1    Salucci, L.2
  • 13
    • 0344559509 scopus 로고    scopus 로고
    • February, Washington, D.C, at, accessed 14 November 2008
    • George W. Bush, 2003a. "National strategy to secure cyberspace" (February). Washington, D.C.; White House, at http://www.whitehouse.gov/pcipb/, accessed 14 November 2008.
    • (2003) National strategy to secure cyberspace
    • Bush, G.W.1
  • 14
    • 56749156438 scopus 로고    scopus 로고
    • 17 December, at, accessed 16 June 2008
    • George W. Bush, 2003b. "Homeland Security Presídential Directíve (HSPD) 7" (17 December), at http://www.whitehouse.gov/ news/releases/2003/12/20031217-5.html, accessed 16 June 2008.
    • (2003) Homeland Security Presídential Directíve (HSPD) , vol.7
    • Bush, G.W.1
  • 15
    • 56749157995 scopus 로고    scopus 로고
    • Air Force explores the next frontier: Cyber Command could establish model for info operations
    • 19 February, at, accessed 14 November 2008
    • Peter A. Buxbaum, 2007. "Air Force explores the next frontier: Cyber Command could establish model for info operations," Government Computing News (19 February), at http://www.gcn.com/print/26-04/43153-1. html, accessed 14 November 2008.
    • (2007) Government Computing News
    • Buxbaum, P.A.1
  • 16
    • 56749150894 scopus 로고    scopus 로고
    • Barry Buzan, Ole Wæver, and Jaap de Wilde, 1998. Security: A new framework for analysis. Boulder, Colo.: Lynne Rlenner.
    • Barry Buzan, Ole Wæver, and Jaap de Wilde, 1998. Security: A new framework for analysis. Boulder, Colo.: Lynne Rlenner.
  • 17
    • 56749096584 scopus 로고    scopus 로고
    • Brian Cashell, W.D. Jackson, Mark Jickllng, and Baird Webel, 2004. The economic impact of cyber-attacks, Congressional Research Service (1 April), and at http://www.cìsco.com/warp/public/779/govtaffairs/ images/CRS-Cyber-Attacks.pdf, accessed 14 November 2008.
    • Brian Cashell, W.D. Jackson, Mark Jickllng, and Baird Webel, 2004. "The economic impact of cyber-attacks," Congressional Research Service (1 April), and at http://www.cìsco.com/warp/public/779/govtaffairs/ images/CRS-Cyber-Attacks.pdf, accessed 14 November 2008.
  • 18
    • 56749154395 scopus 로고    scopus 로고
    • Sabra Chartrand, 1994. Clinton gets a wiretapping bill that covers new technologies, New York Times (9 October), at http://query.nytimes.com/gst/fullpage.html? res= 9502E7D8113DF93AA35753C1A962958260, accessed 14 November 2008.
    • Sabra Chartrand, 1994. "Clinton gets a wiretapping bill that covers new technologies," New York Times (9 October), at http://query.nytimes.com/gst/fullpage.html? res= 9502E7D8113DF93AA35753C1A962958260, accessed 14 November 2008.
  • 21
    • 56749096585 scopus 로고    scopus 로고
    • 14 February, at, accessed 16 June 2008
    • CNN, 2006. "Poll: Fifth of Americans think calls have been monitored" (14 February), at http://www.cnn.com/2006/POLITICS/02/14/poll. wiretaps/index.html, accessed 16 June 2008.
    • (2006) Poll: Fifth of Americans think calls have been monitored
  • 22
    • 56749156426 scopus 로고    scopus 로고
    • Danny Cohen, 1976. Specifications for the Network Voice Protocol (NVP), RFC 741 (29 January), at http://tools.íetf.org/html/rfc741, accessed 16 June 2008.
    • Danny Cohen, 1976. "Specifications for the Network Voice Protocol (NVP)," RFC 741 (29 January), at http://tools.íetf.org/html/rfc741, accessed 16 June 2008.
  • 25
    • 56749156435 scopus 로고    scopus 로고
    • Al-Qaeda steers clear of NSA's ears
    • 17 October, at, accessed 14 November 2008
    • John Diamond, 2002. "Al-Qaeda steers clear of NSA's ears," USA Today (17 October), at http://www.usatoday.com/news/washington/2002-10-17-nsa- al-qaeda_x.htm, accessed 14 November 2008.
    • (2002) USA Today
    • Diamond, J.1
  • 26
    • 56749102806 scopus 로고    scopus 로고
    • Whitfield Diffie and Susan Landau, 2007. Privacy on the line: The politics of wiretapping and encryption. Updated and expanded edition. Cambridge, Mass.: MIT Press.
    • Whitfield Diffie and Susan Landau, 2007. Privacy on the line: The politics of wiretapping and encryption. Updated and expanded edition. Cambridge, Mass.: MIT Press.
  • 27
    • 56749160129 scopus 로고    scopus 로고
    • Henry A. Duran, 1998. Riding the superhighway to glory; Jody Williams v. U.S., strategy research project, Carlisle, Pa.: U.S. Army War College, at http://handle.dtic.mil/100.2/ADA345887, accessed 14 November 2008.
    • Henry A. Duran, 1998. "Riding the superhighway to glory; Jody Williams v. U.S., strategy research project," Carlisle, Pa.: U.S. Army War College, at http://handle.dtic.mil/100.2/ADA345887, accessed 14 November 2008.
  • 29
    • 56749185582 scopus 로고    scopus 로고
    • Federal Communications Commission FCC, at, accessed 16 June 2008
    • Federal Communications Commission (FCC), 2008, "Voice Over Internet Protocol (VOIP)," at http://www.fcc.gov/voip/, accessed 16 June 2008.
    • (2008) Voice Over Internet Protocol (VOIP)
  • 30
    • 56749183631 scopus 로고    scopus 로고
    • Last word: Make the FISMA grade meaningful
    • at, accessed 14 November 2008
    • Christopher Fountain, 2008. "Last word: Make the FISMA grade meaningful," SC Magazine (1January), at http://www.scrnagazineus. com/Last-word-the-FISMA-grade-meaningful/article/100431/, accessed 14 November 2008.
    • (2008) SC Magazine (1January)
    • Fountain, C.1
  • 32
    • 56749183630 scopus 로고    scopus 로고
    • Siobhan Gorman, 2007a. NSA to defend against hackers: Privacy fears raised as spy agency turns to systems protection, Baltimore Sun (20 September), and at http://hdvoice.tmcnet.com/news/2007/09/20/2954276.htm, accessed 14 November 2008.
    • Siobhan Gorman, 2007a. "NSA to defend against hackers: Privacy fears raised as spy agency turns to systems protection," Baltimore Sun (20 September), and at http://hdvoice.tmcnet.com/news/2007/09/20/2954276.htm, accessed 14 November 2008.
  • 33
    • 56749161682 scopus 로고    scopus 로고
    • House panel chief demands details of cybersecurity plan,
    • 24 October
    • Siobhan Gorman, 2007b. "House panel chief demands details of cybersecurity plan," Baltimore Sun (24 October).
    • (2007) Baltimore Sun
    • Gorman, S.1
  • 34
    • 56749131827 scopus 로고    scopus 로고
    • Bush looks to beef up protection against cyberattacks; Estimated cost could be $6 billion; Democrats are wary,
    • 28 January
    • Siobhan Gorman, 2008a. "Bush looks to beef up protection against cyberattacks; Estimated cost could be $6 billion; Democrats are wary," Wall Street Journal (28 January).
    • (2008) Wall Street Journal
    • Gorman, S.1
  • 35
    • 56749154406 scopus 로고    scopus 로고
    • Siobhan Gorman, 2008b. NSA's domestic spying grows as agency sweeps up data; Terror fight blurs line over domain; Tracking email, Wall Street Journal (10 March), at http://online.wsj.com/public/article_print/ SB12051197337723845.html, accessed 14 November 2008.
    • Siobhan Gorman, 2008b. "NSA's domestic spying grows as agency sweeps up data; Terror fight blurs line over domain; Tracking email," Wall Street Journal (10 March), at http://online.wsj.com/public/article_print/ SB12051197337723845.html, accessed 14 November 2008.
  • 36
    • 56749150892 scopus 로고    scopus 로고
    • Government Accounting Office (GAO), 2004. Information security: Agencies need to implement consistent processes in authorizing systems for operation (June), and at http://www.gao.gov/products/GAO-04-376, accessed 14 November 2008.
    • Government Accounting Office (GAO), 2004. "Information security: Agencies need to implement consistent processes in authorizing systems for operation" (June), and at http://www.gao.gov/products/GAO-04-376, accessed 14 November 2008.
  • 37
    • 56749163380 scopus 로고    scopus 로고
    • William Gravell, 2002. National security in transformation: Outlining a comprehensive approach to national information power, In: U.S. Congress. Joint Economic Committee. Security in the information age: New challenges, new strategies (May), at http://www.cyberconflict.org/pdf/ gravll.pdf, accessed 14 November 2008.
    • William Gravell, 2002. "National security in transformation: Outlining a comprehensive approach to national information power," In: U.S. Congress. Joint Economic Committee. Security in the information age: New challenges, new strategies (May), at http://www.cyberconflict.org/pdf/ gravll.pdf, accessed 14 November 2008.
  • 38
    • 56749182117 scopus 로고    scopus 로고
    • Bush's double-edged cyber-security plan
    • 26 February, at, accessed 14 November 2008
    • Andy Greenberg, 2008. "Bush's double-edged cyber-security plan," Forbes (26 February), at http://www.forbes.com/2008/02/26/ cyber-security-bush-tech-security-cx_ag_0226security.html, accessed 14 November 2008.
    • (2008) Forbes
    • Greenberg, A.1
  • 39
    • 56749185583 scopus 로고    scopus 로고
    • America's hackable backbone
    • 22 August, at, accessed 14 November 2008
    • Andy Greenberg, 2007. "America's hackable backbone," Forbes (22 August), at http://www.forbes.com/2007/08/22/scada-hackers- infrastucture-tech-security-cx_ag_0822hack.html, accessed 14 November 2008.
    • (2007) Forbes
    • Greenberg, A.1
  • 40
    • 56749104301 scopus 로고    scopus 로고
    • Scott W. Gross, 2003. White paper: MAE services, version 1.0, November, MCI at, accessed 14 November 2008
    • Scott W. Gross, 2003. "White paper: MAE services, version 1.0," (November), MCI at http://globle.mci.com/ca/resources/whitepapers/pdf/MAE2.pdf, accessed 14 November 2008.
  • 41
    • 42349110092 scopus 로고    scopus 로고
    • The new e-spionage threat
    • 10 April, at, accessed 14 November 2008
    • Brian Grow, Keith Epstein, and Chi-Chu Tschang, 2008. "The new e-spionage threat," Business Week (10 April), at http://www.businessweek.com/magazine/content/08-16/b4080032218430.htm, accessed 14 November 2008.
    • (2008) Business Week
    • Grow, B.1    Epstein, K.2    Tschang, C.-C.3
  • 42
    • 80052707765 scopus 로고    scopus 로고
    • Third of Americans suspect 9-11 government conspiracy
    • 1 August, at, accessed 14 November 2008
    • Thomas Hargrove, 2008. "Third of Americans suspect 9-11 government conspiracy," Scripps Howard News Service (1 August), at http://www.scrippsnews.com/911poll, accessed 14 November 2008.
    • (2008) Scripps Howard News Service
    • Hargrove, T.1
  • 43
    • 56749104300 scopus 로고    scopus 로고
    • Cato Institute 20 January, at, accessed 16 June 2008
    • Gene Healy, 2003. "Beware total information awareness," Cato Institute (20 January), at http://www.cato.org/pub-display.php?-id=2959, accessed 16 June 2008.
    • (2003) Beware total information awareness
    • Healy, G.1
  • 44
  • 46
    • 2342589690 scopus 로고    scopus 로고
    • Inside the Windows security push
    • January, pp
    • Michael Howard and Steve Lipner, 2003. "Inside the Windows security push," IEEE Security and Privacy, volume 1, number 1 (January), pp. 57-61.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 57-61
    • Howard, M.1    Lipner, S.2
  • 48
    • 56749182115 scopus 로고    scopus 로고
    • New York Public Library 8 May, at, accessed 14 November 2008
    • Bob Inman, 2006. "Listening in: Eavesdropping and the National Security Agency," New York Public Library (8 May), at http://www.nypl.org/ research/calendar/imagesprog/LiseningIn050806.pdf, accessed 14 November 2008.
    • (2006) Listening in: Eavesdropping and the National Security Agency
    • Inman, B.1
  • 49
    • 56749105768 scopus 로고    scopus 로고
    • Internet Society, March, at, accessed 16 June 2008
    • Internet Society, 2004. "Wiretapping the Internet: Member survey" (March), at http://www.isoc.org/members/surveys/survey-9.shtml, accessed 16 June 2008.
    • (2004) Wiretapping the Internet: Member survey
  • 50
    • 35648934643 scopus 로고    scopus 로고
    • Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics
    • October, pp
    • Paul Jaeger, 2007. "Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics," Government Information Quarterly, volume 24, number 4 (October), pp. 840-859.
    • (2007) Government Information Quarterly , vol.24 , Issue.4 , pp. 840-859
    • Jaeger, P.1
  • 51
    • 0003877405 scopus 로고    scopus 로고
    • Second edition. Malden, Mass: Polity Press
    • Mary Kaldor, 2006. New & old wars. Second edition. Malden, Mass: Polity Press.
    • (2006) New & old wars
    • Kaldor, M.1
  • 52
    • 56749107215 scopus 로고    scopus 로고
    • Daniel Kimmage, 2008. The Al-Qaeda media nexus: The virtual network behind the global message. Washington, D.C.: Radio Free Europe/Radio Liberty, and at http://www.rferl.org/content/pressRelease/1105999.html, accessed 14 November 2008.
    • Daniel Kimmage, 2008. The Al-Qaeda media nexus: The virtual network behind the global message. Washington, D.C.: Radio Free Europe/Radio Liberty, and at http://www.rferl.org/content/pressRelease/1105999.html, accessed 14 November 2008.
  • 53
    • 56749152387 scopus 로고    scopus 로고
    • Alec Klein and Ellen Nakashima, 2007. For Windows Vista security, Microsoft called in pros, Washington Post (9 January), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/2007/01/08/ AR2007010801352.html, accessed 14 November 2008.
    • Alec Klein and Ellen Nakashima, 2007. "For Windows Vista security, Microsoft called in pros," Washington Post (9 January), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/2007/01/08/ AR2007010801352.html, accessed 14 November 2008.
  • 55
    • 56749182116 scopus 로고    scopus 로고
    • Interview,
    • at, accessed 16 June 2008
    • Evan Kohlman, 2005. "Interview," Washington Post, at http://www.washingtonpost.com/wedyn/content/custom/2005/08/05/CU2005080501141. html?whichDay=1, accessed 16 June 2008.
    • (2005) Washington Post
    • Kohlman, E.1
  • 56
    • 30344452580 scopus 로고    scopus 로고
    • Security, wiretapping, and the Internet
    • November/December, pp
    • Susan Landau, 2005. "Security, wiretapping, and the Internet," IEEE Security and Privacy, volume 3, number 6 (November/December), pp. 26-33.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 26-33
    • Landau, S.1
  • 57
    • 56749185572 scopus 로고    scopus 로고
    • 7 November, at, accessed 14 November 2008
    • James Lewis, 2007. "Domestic surveillance, FISA and terrorism," Center for Strategic and International Studies (7 November), at http://www.csis.org/media/csis/pubs/071107_lewis.pdf, accessed 14 November 2008.
    • (2007) Domestic surveillance, FISA and terrorism
    • Lewis, J.1
  • 58
    • 56749104299 scopus 로고    scopus 로고
    • 14 December, at, accessed 14 November 2008
    • James Lewis, 2005. "Computer espionage, Titan Rain and China," Center for Strategic and International Studies (14 December), at http://www.csis.org/media/csis/pubs/051214-china-titan_rain.pdf, accessed 14 November 2008.
    • (2005) Computer espionage, Titan Rain and China
    • Lewis, J.1
  • 59
    • 42949148345 scopus 로고    scopus 로고
    • Al-Qaeda online: Understanding jihadist Internet infrastructure
    • 1 January, and at www, accessed 14 November 2008
    • Brynjar Lia, 2006. "Al-Qaeda online: Understanding jihadist Internet infrastructure," Jane's Intelligence Review (1 January), and at www.mil.no/multimedia/archive/00075/Al-Qaeda_online_und_75416a.pdf, accessed 14 November 2008.
    • (2006) Jane's Intelligence Review
    • Lia, B.1
  • 60
    • 56749102807 scopus 로고    scopus 로고
    • As U.S. spars With Microsoft, federal offices use its systems,
    • 4 May, at, accessed 14 November
    • Steve Lohr, 1998. "As U.S. spars With Microsoft, federal offices use its systems, " New York Times (4 May), at http://query.nytimes.com/ gst/fullpage.html?res=980DE7DD1E3EF937A35756COA96E958260, accessed 14 November 2008.
    • (1998) New York Times
    • Lohr, S.1
  • 63
    • 56749157994 scopus 로고    scopus 로고
    • USC machine system demonstrates superhuman speech-recognition abilities
    • 18 October, at, accessed 14 November 2008
    • Eric Mankin, 1999. "USC machine system demonstrates superhuman speech-recognition abilities," USC Chronicle (18 October), at http://uscnews.usc.edu/newstools/detail.ohp?recordnum=4831, accessed 14 November 2008.
    • (1999) USC Chronicle
    • Mankin, E.1
  • 64
    • 0142040723 scopus 로고    scopus 로고
    • The case against privatizing national security
    • October, pp
    • Ann R. Markusen, 2003. "The case against privatizing national security," Governance, volume 16, number 4 (October), pp. 471-501.
    • (2003) Governance , vol.16 , Issue.4 , pp. 471-501
    • Markusen, A.R.1
  • 65
    • 56749156437 scopus 로고
    • FBI, phone firms in tiff over turning on the taps,
    • 10 March, p
    • John Mintz, 1992, "FBI, phone firms in tiff over turning on the taps," Washington Post (10 March), p. C1.
    • (1992) Washington Post
    • Mintz, J.1
  • 66
    • 56749104296 scopus 로고
    • Electronic surveillance manual
    • Washington, D.C, U.S. Department of Justice, Criminal Division, Office of Enforcement Operations
    • Robert S. Mueller, 1991. Electronic surveillance manual. Volume 1: Procedures and forms. Washington, D.C.: U.S. Department of Justice, Criminal Division, Office of Enforcement Operations.
    • (1991) Procedures and forms , vol.1
    • Mueller, R.S.1
  • 67
    • 56749180752 scopus 로고    scopus 로고
    • Ellen Nakashima, 2008. Bush order expands network monitoring, Washington Past (26 January), p. A.03, and at.http://www.washingtonpost. com.wpdyn/content/artical/2008/01/25/AR2008012503261_pf.html, accessed 14 November 2008.
    • Ellen Nakashima, 2008. "Bush order expands network monitoring," Washington Past (26 January), p. A.03, and at.http://www.washingtonpost. com.wpdyn/content/artical/2008/01/25/AR2008012503261_pf.html, accessed 14 November 2008.
  • 68
    • 56749156436 scopus 로고    scopus 로고
    • Ellen Nakashima, 2007, A story of surveillance: Former technician 'turning in' AT&T over NSA program, Washington Post (7 November), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/ 2007/11/07/AR2007110700006.html?nav=emailpage, accessed 14 November 2008.
    • Ellen Nakashima, 2007, "A story of surveillance: Former technician 'turning in' AT&T over NSA program," Washington Post (7 November), p. D01, and at http://www.washingtonpost.com/wpdyn/content/article/ 2007/11/07/AR2007110700006.html?nav=emailpage, accessed 14 November 2008.
  • 70
    • 56749173555 scopus 로고    scopus 로고
    • National Security Agency, December, at, accessed 14 November 2008
    • National Security Agency, 2000. Transition 2001 (December), at http://www.thisiswiretap.com/2001/, accessed 14 November 2008.
    • (2000) Transition 2001
  • 71
    • 56749173554 scopus 로고    scopus 로고
    • Joseph S. Nye, Jr. and William A. Owens, 1996. America's information edge, Foreign Affairs, 75, number 2 (March/April), pp. 20-36, and at http://www.foreignaffairs.org/ 19960301faessay4185/joseph-s-nye-jr-william-a-owens/america-s-information-edge. html, accessed 14 November 2008.
    • Joseph S. Nye, Jr. and William A. Owens, 1996. "America's information edge," Foreign Affairs, volume 75, number 2 (March/April), pp. 20-36, and at http://www.foreignaffairs.org/ 19960301faessay4185/joseph-s-nye-jr-william-a-owens/america-s-information-edge. html, accessed 14 November 2008.
  • 72
    • 56749091949 scopus 로고    scopus 로고
    • New Paradigm Resources, 2007. VoIP year in review, at http://www.nprg.com/2007vojpyearinReview/tabid/389/Default.aspx, accessed 16 June 2008.
    • New Paradigm Resources, 2007. "VoIP year in review," at http://www.nprg.com/2007vojpyearinReview/tabid/389/Default.aspx, accessed 16 June 2008.
  • 73
    • 33745810301 scopus 로고    scopus 로고
    • at, accessed 14 November 2008
    • Olmstead v. United States, at http://www.law.corneil.edu/supct/ html/historics/USSC_CR-0277-0438-ZS.html, accessed 14 November 2008.
    • Olmstead v. United States
  • 74
    • 56749131826 scopus 로고    scopus 로고
    • Organisation for Economic Co-operation and Development (OECD), 2007. Broadband subscribers per 100 inhabitants in OECD countries and ICCP Committee observers countries (June), at http://www.oecd.org/document/23/ 0,3343,en-2649-34449-33987543-1-1-1-1.00.html, accessed 14 November 2008.
    • Organisation for Economic Co-operation and Development (OECD), 2007. "Broadband subscribers per 100 inhabitants in OECD countries and ICCP Committee observers countries" (June), at http://www.oecd.org/document/23/ 0,3343,en-2649-34449-33987543-1-1-1-1.00.html, accessed 14 November 2008.
  • 75
    • 56749175061 scopus 로고    scopus 로고
    • Organisation for Economic Co-operation and Development (OECD), 2003. Broadband subscribers per 100 inhabitants in OECD countries (December), at http://www.oecd.org.document/23/0,3343,en-2649-34449-33987543-1- 1-1-1.00.html, accessed 14 November 2008.
    • Organisation for Economic Co-operation and Development (OECD), 2003. "Broadband subscribers per 100 inhabitants in OECD countries" (December), at http://www.oecd.org.document/23/0,3343,en-2649-34449-33987543-1- 1-1-1.00.html, accessed 14 November 2008.
  • 76
    • 56749150891 scopus 로고
    • As technology makes wiretaps more difficult, F.B.I, seeks help,
    • 8 March, at, accessed 14 November
    • Anthony Ramirez, 1992a. "As technology makes wiretaps more difficult, F.B.I, seeks help," New York Times (8 March), at http://query.nytimes.com/gst/fullpage.html?res= 9E0CE7DB113CF93BA35750C0A964958260, accessed 14 November 2008.
    • (1992) New York Times
    • Ramirez, A.1
  • 77
    • 56749183617 scopus 로고
    • The FBI's latest idea: Make wiretapping easier,
    • 19 April, Section 4, p
    • Anthony Ramirez, 1992b. "The FBI's latest idea: Make wiretapping easier," New York Times (19 April), Section 4, p. 2.
    • (1992) New York Times , pp. 2
    • Ramirez, A.1
  • 78
    • 56749131816 scopus 로고    scopus 로고
    • Rasmussen Reports, 2008. 32% say U.S. legal system worries too much about national security at expense of individual rights (18 February), at http://www.rasmussenreports.com/public-content/politics/current-events/general- current-events/32-say-u-s-legal-system-worries-too-much-about-national-security- a1 accessed 16 June 2008.
    • Rasmussen Reports, 2008. "32% say U.S. legal system worries too much about national security at expense of individual rights" (18 February), at http://www.rasmussenreports.com/public-content/politics/current-events/general- current-events/32-say-u-s-legal-system-worries-too-much-about-national-security- a1 accessed 16 June 2008.
  • 79
    • 56749098106 scopus 로고    scopus 로고
    • Robert Richardson, 2007. CSl computer crime and security survey, Computer Security Institute, and at http://www.gocsi.com/, accessed 14 November 2008.
    • Robert Richardson, 2007. "CSl computer crime and security survey," Computer Security Institute, and at http://www.gocsi.com/, accessed 14 November 2008.
  • 80
    • 56749105758 scopus 로고    scopus 로고
    • The 'big ear' gone deaf,
    • 13 June, at, accessed 14 November
    • William Safire, 2002. "The 'big ear' gone deaf," New York Times (13 June), at http://qwww.nytimes.com/, accessed 14 November 2008.
    • (2002) New York Times
    • Safire, W.1
  • 81
    • 56749175054 scopus 로고    scopus 로고
    • Terrorists on the Net? Who cares?
    • 2 December, at, accessed 14 November 2008
    • Noah Schachtman, 2002. "Terrorists on the Net? Who cares?" Wired (2 December), at http://www.wired.com/techbiz/it/news/2002/12/ 56935, accessed 14 November 2008.
    • (2002) Wired
    • Schachtman, N.1
  • 82
    • 56749170686 scopus 로고    scopus 로고
    • Roger R. Schell, 1979. Computer security: The Achilles heel of the electronic Air Force? Air University Review (January-February), at http://www.airpower.maxwell.af.mil/airchronicles/aureview/1979/jan-feb/schell, html, accessed 14 November 2008.
    • Roger R. Schell, 1979. "Computer security: The Achilles heel of the electronic Air Force?" Air University Review (January-February), at http://www.airpower.maxwell.af.mil/airchronicles/aureview/1979/jan-feb/schell, html, accessed 14 November 2008.
  • 83
    • 70350132014 scopus 로고    scopus 로고
    • financial Times 3 September, at, accessed 14 November 2008
    • Demetri Sevastopulo, 2007. "Chinese military hacked into Pentagon," financial Times (3 September), at http://www.ft.com/cms/ s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html, accessed 14 November 2008.
    • (2007) Chinese military hacked into Pentagon
    • Sevastopulo, D.1
  • 84
    • 36849083821 scopus 로고    scopus 로고
    • What the NSA is doing ... and why it's illegal
    • John Cary Sims, 2006. "What the NSA is doing ... and why it's illegal," Hastings Constitutional Law Quarterly, volume 33, p. 101.
    • (2006) Hastings Constitutional Law Quarterly , vol.33 , pp. 101
    • Cary Sims, J.1
  • 86
    • 56749175055 scopus 로고    scopus 로고
    • Terror's confounding online trail,
    • 28 March, at, accessed 14 November
    • Susan Stellin, 2002. "Terror's confounding online trail," New York Times (28 March), at http://query.nytimes.com/gst/fullpage.html? res=9D07EFD8103BF93BA15750C0A9649C8B63, accessed 14 November 2008.
    • (2002) New York Times
    • Stellin, S.1
  • 87
    • 56749178664 scopus 로고    scopus 로고
    • Louise Story, 2007. ADVERTISING; A company will monitor phone calls and devise ads to suit, New York Times (24 September), at http://query.nytimes.com/gst/fullpage.html?res= 990DE3D61531F937A1575AC0A9619C8B63, accesssed 14 November 2008.
    • Louise Story, 2007. "ADVERTISING; A company will monitor phone calls and devise ads to suit," New York Times (24 September), at http://query.nytimes.com/gst/fullpage.html?res= 990DE3D61531F937A1575AC0A9619C8B63, accesssed 14 November 2008.
  • 88
    • 56749154396 scopus 로고    scopus 로고
    • Teralight, 2008. The history of signaling System #7, at http://www.terallght.com/newterallght/wpapers/SS7%20Architecture%200verview.pdf, accessed 16 June 2008.
    • Teralight, 2008. "The history of signaling System #7," at http://www.terallght.com/newterallght/wpapers/SS7%20Architecture%200verview.pdf, accessed 16 June 2008.
  • 89
    • 56749131825 scopus 로고    scopus 로고
    • Timothy L. Thomas, 2003, Al Qaeda and the Internet: The danger of 'cyberplanning', Parameters, 33, number 1, pp. 112-123, and at http://www.carlisle,army,mil/usawc/parameters/03spring/thomas.pdf, accessed 14 November 2008.
    • Timothy L. Thomas, 2003, "Al Qaeda and the Internet: The danger of 'cyberplanning'," Parameters, volume 33, number 1, pp. 112-123, and at http://www.carlisle,army,mil/usawc/parameters/03spring/thomas.pdf, accessed 14 November 2008.
  • 90
    • 56749178672 scopus 로고    scopus 로고
    • Time, 1967. Unplugging bugging, Time (29 December), at http://www.times.com/time/magazine/article/0,9171,844334,00.html, accessed 16 June 2008.
    • Time, 1967. "Unplugging bugging," Time (29 December), at http://www.times.com/time/magazine/article/0,9171,844334,00.html, accessed 16 June 2008.
  • 91
    • 56749156434 scopus 로고    scopus 로고
    • U.S. Department of Defense, 2006, Information operations (DOD Directive o-3600.1, 14 August), at http://www.fas.org/irp/doddir/dod/info-ops. pdf, accessed 16 June 2008.
    • U.S. Department of Defense, 2006, "Information operations" (DOD Directive o-3600.1, 14 August), at http://www.fas.org/irp/doddir/dod/info-ops. pdf, accessed 16 June 2008.
  • 92
    • 56749173543 scopus 로고
    • S. 272, High-Performance Computing Act of 1991
    • at, accessed 14 November 2008
    • U.S. Senate, 1991. "S. 272, High-Performance Computing Act of 1991," 102nd Congress, at http://thomas.ioc.gov/, accessed 14 November 2008.
    • (1991) 102nd Congress
    • Senate, U.S.1
  • 93
    • 56749104295 scopus 로고    scopus 로고
    • U.S. Senate, Armed Services Committee. 2008. National Defense Authorization Act for fiscal year 2009 (12 May), at http://thomas.loc.gov/ , accessed 14 November 2008.
    • U.S. Senate, Armed Services Committee. 2008. "National Defense Authorization Act for fiscal year 2009" (12 May), at http://thomas.loc.gov/ , accessed 14 November 2008.
  • 94
    • 56749173542 scopus 로고    scopus 로고
    • Sandra Upson, 2007. Wiretapping woes: Trouble ahead for those wanting to monitor Internet-based calls, IEEE Spectrum, 44, number 5 (May), pp. 10-12, and at http://www.spectrum.ieee.org/may07/5047, accessed 14 November 2008.
    • Sandra Upson, 2007. "Wiretapping woes: Trouble ahead for those wanting to monitor Internet-based calls," IEEE Spectrum, volume 44, number 5 (May), pp. 10-12, and at http://www.spectrum.ieee.org/may07/5047, accessed 14 November 2008.
  • 95
    • 56749178663 scopus 로고    scopus 로고
    • Government outsourcing grows fastest of all sectors
    • 4 March, at, accessed 14 November 2008
    • Patience Wait, 2002. "Government outsourcing grows fastest of all sectors," Washington Technology, volume 16, number 23 (4 March), at http://www.washingtontechnology.com/print/16-23/17920-1.html, accessed 14 November 2008.
    • (2002) Washington Technology , vol.16 , Issue.23
    • Wait, P.1
  • 96
    • 56749102796 scopus 로고    scopus 로고
    • Sisyphean circles: The Communications Assistance for Law Enforcement Act
    • David Ward, 1996. "Sisyphean circles: The Communications Assistance for Law Enforcement Act," Rutgers Computer and Technology Law Journal, volume 22, number 1, pp. 267-299.
    • (1996) Rutgers Computer and Technology Law Journal , vol.22 , Issue.1 , pp. 267-299
    • Ward, D.1
  • 97
    • 56749177091 scopus 로고
    • Back to smoke signals (editorial)
    • 26 March
    • Washington Post, 1992. "Back to smoke signals" (editorial), Washington Post (26 March).
    • (1992) Washington Post
    • Post, W.1
  • 98
    • 56749170685 scopus 로고    scopus 로고
    • Gabriel Weirnann, 2004. www.terror.net: How modern terrorism uses the Internet, United States Institute of Peace, special report 116, at http://www.usip.org/pubs/specialreports/sr116.pdf, accessed 14 November 2008.
    • Gabriel Weirnann, 2004. "www.terror.net: How modern terrorism uses the Internet," United States Institute of Peace, special report 116, at http://www.usip.org/pubs/specialreports/sr116.pdf, accessed 14 November 2008.
  • 100
    • 56749163370 scopus 로고    scopus 로고
    • Tom Zeller, 2000. Ideas & trends; Cloak, dagger, Echelon, New York Times (16 July), and at http://query.nytimes.com/gst/fullpage. html?res=9502EFD6153BF935A54C0A9669C8B63, accessed 14 November 2008.
    • Tom Zeller, 2000. "Ideas & trends; Cloak, dagger, Echelon," New York Times (16 July), and at http://query.nytimes.com/gst/fullpage. html?res=9502EFD6153BF935A54C0A9669C8B63, accessed 14 November 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.