SS03 «Uncle Sam keeps SAIC on call for top tasks,» by Scott Shane, The Baltimore Sun, October 26,2003, http://www.sunspot.net/news/bal‑te.saic26oct26,0,1485260.story ST03 «IBM details Blue Gene supercomputer», by Stephen Shankland, CNETNews.com, May 8,2003, http://news.com.com/2100‑1008‑1000421.html SS94 «Cryptanalysis of the GSM A5 Cipher Algorithm», by Simon J. Shepherd, IEE Colloquium on Security and Cryptography Applications to Radio Systems, Digest No. 1994/141, Savoy Place, London, 3 June 1994 ST02 «Startup Profiles: Aspex Technology,» Semiconductor Times, February 2002, Vol 7 Issue 2, http://www.pinestream.com/PDF%20files/Semiconductor.pdf SUOO «EU pact criminalizing security research?» By Bob Sullivan, MSNBC, October 25, 2000, http://www.zdnet.com/zdnn/stories/news/0,4586,2644958,00.html SU02 «A $1 billion, corporate‑funded hack?» by Bob Sullivan, MSNBC, April 19, 2002, http://www.msnbc. com/news/740634. asp SV03 «The yeast and the cockroach – a spy tale», by Sue Vorenberg, Seattle Post‑Intelligencer, Oct 29, 2003, http://seattlepi.nwsource.com/national/ 145921_science29.html SZ03 «Report Raises Electronic Vote Security Issues» by John Schwartz, Sep 25, The New York Times, http://www.nytimes.com/2003/09/25/technology/25VOTE.html TA01 «3D Stacked Neuro Processor Device – 3DANN,» NASA Technology And Applications Program, February 14, 2001, http://technology.jpl.nasa.gov/gallery/ techGal‑lery/gallery/gl_pages/DANN‑R_Cube.html TC01 «Brain‑scans can defeat terrorism, InfoSeek founder claims,» by Thomas Ñ Greene, The Register, 03 Oct 2001, http://www.theregister.co.uk/content/55/ 22020.html TE03 «TR100/2003: 100 innovators poised to make a dramatic impact on our world», Technology Review, October 2003, http://www.techreview.com/trlOO/index.asp TG01 «US Supremes: Hi‑tech surveillance is out,» by Thomas Ñ Greene, The Register, 12 June 2001, http://www.theregister.co.Uk/content/6/19655.html TG03 «The truth about Jessica,» The Guardian, 15 May 2003, http://www.guardian.co.uk/ Iraq/Story/0,2763,956255,OO.html ÒÞÇ «Microsoft software „riddled with vulnerabilities“, trade body claims,» The Inquirer, 28 August 2003, http://www.theinquirer.net/?article=l 1249 TL02 «TEMPEST timeline», the compilation of the history of TEMPEST technology, http://cryptome.org/tempest‑time.htm TM01 «Climbing Inside The Criminal Mind (TIME 100: The Next Waveflnnovators/ Security/The Brain Scientist)», by Sarah Sturman Dale, Nov. 26, 2001, http://www.brainwavescience.com/in‑the‑news.php — 237 —
|