SK01 «Echelon Panel Calls It a Day,» by Steve Kettmann, Wired News, June 21, 2001, http://www.wired.eom/news/politics/0,1283,44721,00.html
SL01 «Thirty countries sign cybercrime treaty,» by Sarah Left, Guardian, November 23, 2001, http://www.guardian.co.uk/internetnews/story/0,7369,604964,00.html
SL02 «Where piracy and profits converge» by Bob Sullivan, MSNBC, May 30, 2002, http://www.legal-rights.org/NDSLAWSUIT/wherepiracy.html
SL03 «She Was Fighting to the Death, Details Emerging of W. Va. Soldier's Capture and Rescue,» by Susan Schmidt and Vernon Loeb, Washington Post, April 3, 2003; http://www.washingtonpost.com/ac2/wp-dyn/A14879-2003Apr2
SM03 «A Very American Coup,» by SCOOP New Zealand, 2002—2003mason/features/?s=usacoup
SO03 «Microsoft plans new PC fortifications,» NewScientist.com news, 9 October 2003, http://www.newscientist.com/news/news.jsp?id=ns99994258
SP03 «Divvying up the Iraq Pie,» by Stephen Pizzo, AlterNet.org, Independent Media Institute, October 7,2003, http://www.alternet.org/story.html?StoryID=16901
SQ02 «On a New Way to Read Data from Memory,» by David Samyde, Sergei Skoroboga-tov, Ross Anderson, Jean-Jacques Quisquater; First International IEEE Security in Storage Worbhop, 11 December 2002, Greenbelt Marriott, Maryland, USA. http://www.flp.cl.cam.ac.uk/ftp/users/rjal4/SISW02.pdf
SR03 «Special Report: Attack on the 507th Maintenance Company, 23 March 2003, An Nasiriyah, Iraq», U.S. Army Public Affairs Office, July 17, 2003, http://www.army.mil/features/507thMaintCmpy/
SS03 «Uncle Sam keeps SAIC on call for top tasks,» by Scott Shane, The Baltimore Sun, October 26,2003, http://www.sunspot.net/news/bal-te.saic26oct26,0,1485260.story
ST03 «IBM details Blue Gene supercomputer», by Stephen Shankland, CNETNews.com, May 8,2003, http://news.com.com/2100-1008-1000421.html
SS94 «Cryptanalysis of the GSM A5 Cipher Algorithm», by Simon J. Shepherd, IEE Colloquium on Security and Cryptography Applications to Radio Systems, Digest No. 1994/141, Savoy Place, London, 3 June 1994
ST02 «Startup Profiles: Aspex Technology,» Semiconductor Times, February 2002, Vol 7 Issue 2, http://www.pinestream.com/PDF%20files/Semiconductor.pdf
SUOO «EU pact criminalizing security research?» By Bob Sullivan, MSNBC, October 25, 2000, http://www.zdnet.com/zdnn/stories/news/0,4586,2644958,00.html
SU02 «A $1 billion, corporate-funded hack?» by Bob Sullivan, MSNBC, April 19, 2002,com/news/740634. asp
SV03 «The yeast and the cockroach – a spy tale», by Sue Vorenberg, Seattle Post-Intelligencer, Oct 29, 2003,145921_science29.html
SZ03 «Report Raises Electronic Vote Security Issues» by John Schwartz, Sep 25, The New York Times, http://www.nytimes.com/2003/09/25/technology/25VOTE.html
TA01 «3D Stacked Neuro Processor Device – 3DANN,» NASA Technology And Applications Program, February 14, 2001,techGal-lery/gallery/gl_pages/DANN-R_Cube.html
TC01 «Brain-scans can defeat terrorism, InfoSeek founder claims,» by Thomas С Greene, The Register, 03 Oct 2001,22020.html
TE03 «TR100/2003: 100 innovators poised to make a dramatic impact on our world», Technology Review, October 2003, http://www.techreview.com/trlOO/index.asp
TG01 «US Supremes: Hi-tech surveillance is out,» by Thomas С Greene, The Register, 12 June 2001, http://www.theregister.co.Uk/content/6/19655.html
TG03 «The truth about Jessica,» The Guardian, 15 May 2003,Iraq/Story/0,2763,956255,OO.html
ТЮЗ «Microsoft software „riddled with vulnerabilities“, trade body claims,» The Inquirer, 28 August 2003,1249
TL02 «TEMPEST timeline», the compilation of the history of TEMPEST technology, http://cryptome.org/tempest-time.htm
TM01 «Climbing Inside The Criminal Mind (TIME 100: The Next Waveflnnovators/ Security/The Brain Scientist)», by Sarah Sturman Dale, Nov. 26, 2001, http://www.brainwavescience.com/in-the-news.php
TM02 «Impact of Artificial „Gummy“ Fingers on Fingerprint Systems» by Tsutomu Ma-tsumoto et al., Prepared for Proceedings ofSPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002,gummy.htm
TR03 «Finger, faceprints get green light for Europe's ГО standard,» by John Lettice, The Register, 03 October 2003, http://www.theregister.co.Uk/content/6/33208.html
TT96 «Wild Bill And Intrepid: Donovan, Stephenson, and the Origin of CIA», by Thomas F. Troy, 1996
TZ02 «Body Check: Biometric Access Protection Devices and their Programs Put to the Test,» by Lisa Thalheim, Jan Krissler, Peter-Michael Ziegler, c't, nil, 2002,1/114/
WB03 «China Begins Effort to Replace Citizen IDs With Digital Cards,» by Andrew Bat-son, Wall Street Journal, August 12, 2003, http://cryptome.org/cn-lbn-ids.htm
WE85 «Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?» by Wim van Eck, Computers Security 4 (1985) 269-286
WF03 «What is Freenet?» The Freenet Project Website, 2003,index.php?page=whatis
WG95 «alt.scientology.war» by Wendy M. Grossman, Wired Magazine, Issue 3.12 – Dec 1995,wired, com/wired/archive/3.12/alt. scientology.war.html