-
1
-
-
84882215469
-
FBI uses cellphones to eavesdrop on suspects - even when they're off
-
URL:, [Accessed: June 7th, 2008]
-
Coughlin K FBI uses cellphones to eavesdrop on suspects - even when they're off. The Seattle Times 2006, URL:, [Accessed: June 7th, 2008]. http://www.policeone.com/police-products/radios/surveillance-accessories/articles/1197457/.
-
(2006)
The Seattle Times
-
-
Coughlin, K.1
-
3
-
-
84882133670
-
Harrington Signal Isolation
-
URL:, (requires registration) [Accessed: June 7th, 2008]
-
Harrington Signal Isolation 2007, URL:, (requires registration) [Accessed: June 7th, 2008]. http://www.mobile-examiner.com/vb/showthread.php?p=39.
-
(2007)
-
-
-
4
-
-
84882233101
-
-
[Accessed: July 17th, 2008]
-
Naccache D. Forensics and mobile communications 2007, [Accessed: July 17th, 2008]. http://www.lsec.be/upload_directories/documents/3ForensicsandMobileCommunications_DavidNaccache.pdf.
-
(2007)
Forensics and mobile communications
-
-
Naccache, D.1
-
5
-
-
48749111433
-
Guidelines on Cell Phone Forensics. Special Publication 800-101
-
NIST, National Institute for Standards and Technology, USA
-
Guidelines on Cell Phone Forensics. Special Publication 800-101 2007, NIST, National Institute for Standards and Technology, USA.
-
(2007)
-
-
-
6
-
-
77952255373
-
-
COSEINC Advanced Malware Labs, Singapore, URL:, [Accessed: July 17th, 2008]
-
Rutkowska Joanna Beyond the CPU: Defeating Hardware-Based RAM Acquisition 2007, COSEINC Advanced Malware Labs, Singapore, URL:, [Accessed: July 17th, 2008]. http://www.i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Rutkowska-ppt.pdf.
-
(2007)
Beyond the CPU: Defeating Hardware-Based RAM Acquisition
-
-
Rutkowska, J.1
-
7
-
-
84882193593
-
Symantec SymbOS.Commwarrior.A. Symantec security response
-
Symantec, USA, CA, URL:, [Accessed: July 17th, 2008]
-
Symantec SymbOS.Commwarrior.A. Symantec security response 2005, Symantec, USA, CA, URL:, [Accessed: July 17th, 2008]. http://www.symantec.com/security_response/writeup.jsp?docid=2005-030721-2716-99&tabid=2.
-
(2005)
-
-
-
8
-
-
84882204105
-
Trend-Micro Vulnerability in Internet Explorer for Windows Mobile
-
Trend-Micro, Cupertino, CA, Security Advisories. URL:, [Accessed: June 7th, 2008]
-
Trend-Micro Vulnerability in Internet Explorer for Windows Mobile 2007, Trend-Micro, Cupertino, CA, Security Advisories. URL:, [Accessed: June 7th, 2008]. http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+Internet+Explorer+for+Windows+Mobile.
-
(2007)
-
-
|