References:

Encryption References

 

 

Blaze, Matt Welcome to Matt Blaze’s web site. www.crypto.com 20 November 1999

 

In Matt Blaze’s web site you are given a personal background and

many links to sources, research papers, images, his personal home

page, and other resources.

 

Electronic Privacy Information Center "The Clipper Chip site." 20 November 1999

www.epic.org/crypto/clipper/

 

Here you will find many pertinent links to information about

and uses for the Clipper Chip.

 

Electronic Privacy Information Center (EPIC) www.epic.org/alert/EPIC_Alert_6.01.html "

20 November 1999

 

Here is the table of contents for the publication by the

Electronic Privacy Information Center (EPIC)

 

 

Freeh, Louis J. Director of Federal Bureau of Investigation "Statement to US Senate"

www.fbi.gov/pressrm/congress/95-96archives/encrypt.htm 20 November 1999

 

Statements by Freeh to the Committee on Commerce, Science, and

Transportation United States Senate

 

Freeh, Louis J. Director of Federal Bureau of Investigation " Statement to House"

www.fbi.gov/pressrm/congres/97archives/encrypt4.htm 20 November 1999

 

Statements by Freeh to the Permanent Select Committee on Intelligence

United States House of Representatives

 

Froomkin, Michael, A. "The Metaphor is the Key --IAB" 20 November 1999

http://www-swiss.ai.mit.edu/6095/articles/froomkin-metaphor/partIAB.html

 

Link to most of the pertinent information gleaned for this web

document.

 

 

Gibbs. W. Wayt. "Watch the Watchers." Scientific America April 1999, 20 November

www.sciam.com/1999/0499issue/0499cyber.htm.

 

This is the link to many of the other sites including the World

Wide Web Consortium.

 

"Metaphor is the key." The Metaphor is the Key --IAB 20 November 1999

http://www-swiss.ai.mit.edu/6095/articles/froomkin-metaphor/text.htm.#contents

 

Table of Contents for all pertinent information pertaining to

this subject matter.

 

"Rivest, Ron, L. web page" 1999, 20 November 1999

http://theory.lcs.mit.edu/~rivest/

 

In Professor Rivest’s web site you are given a personal background and

links to sites within MIT that are related either to computer science or

encryption and his mailing address and e-mail address along with

telephone contact number.

 

"Zack the Hack, alias Personal interview, 20 November 1999.

 

 

 

Hacking References

 

"Denver, John"(alias). Personal interview. 28 November 1999.

 

"Nerd World War" Economist 30 October 1999, Vol. 353 Issue 8143, p46, 3/4p, 1bw

 

Discusses the use of ‘cyber war,’ in various Asian countries. The use of the Internet to spread propaganda; Efforts of political activists to sabotage each other’s computers; The spread of computer viruses; Relationship between computer hackers in China and Taiwan; Development of defenses for computer networks by various governments worldwide.

 

Radcliff, Deborah. "The Hacker in All of Us" Computerworld 11 November 1999, Vol. 33 Issue 41, p78, 2p, 1c

Presents information on how computer hackers attack networks; Steps in hacking a network; Common network troubleshooting tools deployed by hackers; Information gained by hackers if they enter the network of the target.

 

 

Taylor, Chris. "Hackers Delight" Time 01 November 1999, Vol. 154 Issue 18, p112, 1p, 3c, 1bw

 

Discusses why cable modems are vulnerable to hacker attacks. Why dial-up users of the Internet are harder for hackers to find than cable modem users; The ease at which hackers can get into the Microsoft operating system; How cable modem users can prevent hacker attacks.

 

 

 

Home | Admin hacking | Encryption | Hacking | Created by: