MA03 «Is RFK» Technology Easy to Foil?» by Mark Baard, Wired News, Nov. 18, 2003, http://www.wired.com/news/privacy/0,1848,61264,00.html

МВОЗа «GCHQ arrest over Observer spying report,» by Martin Bright, The Observer, March 9,2003, http://www.observer.co.uk/iraq/story/0,12239,910648,00.html

МВОЗЬ «Shoot-to-kill demand by US», by Martin Bright, The Observer, November 16, 2003,http://observer.guardian.co.uk/uk_news/story/0,6903,1086397,00.html

MB99 «Solving the Bible Code Puzzle,» by Brendan McKay, Dror Bar-Natan, Maya Bar-Hillel, and Gil Kalai, Statistical Science, Vol. 14 (1999) 150—173, http://cs.anu.edu.au/~bdm/dilugim/StatSci

МСОЗ «Uncensored Gore (an interview with Gore Vidal),» by Marc Cooper, LA Weekly, November 14 – 20,2003, http://www.laweekly.com/ink/03/52/features-cooper.php

MDOO The 2000 Ballistic Missile Defense Applications Report, http://www.defenselink. mil/specials/missiledefense/tar02g.html

MD02 «Bible Code П: The Countdown,» by Michael Drosnin, 2002

DW02 «He’s Ba-a-ack!» by Maureen Dowd, The New York Times, December 1, 2002, http://www.nytimes.com/2002/12/01/opinion/01DOWD.html

MD97 «Bible code,» by Michael Drosnin, 1997

MP97 1997 Space And Missile Defense Technologies Army Science and Technology Master Plan, http://www.fas.org/man/dod-101/army/docs/astmp/aD/D5C.htm

ME01 «Cops tap database to harass, intimidate,» by M.L.Elrick, Detroit Free Press, July 31,2001, http://www.freep.com/news/mich/lein31_20010731.htm

ME03 «Cryptographers sound warnings on Microsoft security plan,» by Rick Merritt, ЕЕ Times, April 15,2003, http://www.eetimes.com/story/OEG20030415S0013

MFOO «VeriSign buys Network Solutions in $21 billion deal» by Melanie Austria Farmer, CNETNews.com, March 7, 2000, http://news.com.com/2100-1023-237656.html

MF02 «Partnership is Critical to Preparation», Microsoft Froutlines, 2002 February, 18th Issue, http://www.microsoft.com/usa/government/Februaryl 8thlssue.pdf

MF98 «New security flap over Windows NT», by Mary Jo Foley, Sm@rt Reseller, September 23,1998, http://www.zdnet.com/zdnn/stories/news/0,4586,2140612,00.html

MK02 «Optical Time-Domain Eavesdropping Risks of CRT Displays,» by Markus Kuhn, Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 12—15 May 2002, http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf

ML03 «Voting Machines Gone Wild!» by Mark Lewellen-Biddle, In These Times, 11 Dec 2003, http://www.mthesetmes.cony comments.php?id=490_0_l_0_C

MM01 «Making Dead Birds The Deal of the Century,» by Michael Menduno, Wired, August 2001, http://www.wired.com/wired/archive/9.08/mustread.html?pg=8

MM03 «What’s inside the government’s e-voting booth?» by Susan M. Menke, GCN, 14 July 2003, http://www.gcn.com/22_18/new_products-technology/22718-l.html

MN02 «Homeland Insecurity,» by Merrell Noden, Popular Science, September 2002, http://www.popsci.com/popsci/science/article/0,12543,335438,00.html

PY03 «Peru wants Yale to give back relics,» by Associated Press, March 6, 2003, http://www.cnn.com/2003/WORLD/americas/03/06/peru.relic.ap/

MP03 «The Real ‘Saving of Private Lynch’,» by Mitch Potter, Toronto Star, May 4, 2003 http://www.refuseandresist. org/war/art.php?aid=769

MR02 «How to find hidden cameras», by Marc Roessler, preprint, 2002, http://www.tentacle.franken.de/papers/hiddencams.pdf

MR03 «Intel Backs Off Security Plan: LaGrande architecture will appear in only some chips, and can be disabled,» by Robert McMillan, IDG News Service, September 17, 2003,http://www.pcworld.com/resource/printable/article/0,aid,112519,00.asp

MS01 «Bruce Lee’s Fantastic Comeback,» by Michael Stroud, Wired News, November 16, 2001, http://www. wired. com/news/digiwood/0,1412,48449,00.html

MZ02 «Scanning Tech a Blurry Picture,» by Declan McCullagh and Robert Zarate, Wired News, Feb 16, 2002, http://www.wired.com/news/print/0,1294,50470,00.html

ND03 «NDS Rejects EchoStar Lawsuit as Opportunistic and Baseless,» NDS Press Release, 20 June 2003, http://www.nds.com/newspdfs/EchoStar_200603.pdf

NH96 «Secret Power,» by Nicky Hager, Craig Potton Publishing, New Zealand, 1996.

N102 «Top Ten Most Stolen Vehicles in the U.S.» by the US National Insurance Crime Bureau (NICB), December 10, 2002, http://www.mymobileguardian.com/MG/ MG_topten.asp

N103 «NIST Symposium on Building Trust and Confidence in Voting Systems,» Gaithers-burg, Maryland, Dec. 10—11,2003, http://vote.nist.gov/

NN01 «NASA and NIMA Begin Joint Review Of Mars Polar Lander Search Analysis,» NASA Press Release, 26 Mar 2001, http://sse.jpl.nasa.gov/whatsnew/pr/ 010326A.html

NP98 «Probing into C2 security claims: Is NT as secure as Microsoft has said it is?» by Nicholas Petreley, InfoWorld, July 13, 1998, http://www.infoworld.com/pageone/ opinions/petrel/980713np.htm

NR02 «GSM calls even more secure thanks to new A5/3 Algorithm,» ETSI News Release, 3 July 2002, http://www.etsi.org/pressroom/previous/2002/3algorithm.htm

NSOO «Name.Space, Inc. v. Network Solutions», US Court Of Appeals, Decided: January 21,2000, http://namespace.pgmedia.net/law/appeal/2ndcir-dec.html

NS02 NavSource Online: Aircraft Carrier Photo Archive, PCU GEORGE H.W. BUSH (CVN-77), http://www.navsource.org/archives/02/77.htm

NS03 «Stop dodging the awkward truth,» by Norman Solomon, The Observer, March 9, 2003,http://www.observer.co.uk/iraq/story/0,12239,910381,00.html

NY03 «NYC police to destroy database on protesters,» by AP, Apr 11, 2003, http://www.usatoday.com/tech/news/techpolicy/2003-04-l l-nypd-database_x.htm

OI89 Obituary: «Intrepid» – Sir William Stephenson, Time, Feb. 13,1989, page 76

OR03 «SAIC has role in cellphone changes,» The Oak Ridger, 27 November 2003, http://www.oakridger.eom/stories/l 12703/new_20031127006.shtml

РВОЗ «Tampa police eliminate facial-recognition system,» by Associated Press, 08 Aug 2003, http://www.palmbeachpost.com/news/content/news/0820camera.html

PD02 «Arlington ‘Bait Car’ Hooks Suspect,» by By Patricia Davis, The Washington Post, 16 April 2002, http://lists.jammed.com/crime/2002/04/0099.html

PE03 «Hall Monitors or Spies? Wireless Tech to Track Building Occupants,» by By Paul Eng, ABC News, Sept. 10, 2003, http://abcnews.go.com/sections/scitech/ Fu-tureTech/smartbadges03 0910.html

PG99 «Re: Forthcoming Biryukov/Shamir result against A5/1 GSM privacy algorithm», Peter Gutmann, posting to [email protected] mailing list, 7 Dec 1999, http://www.mail-archive.eom/ [email protected] /msg02546.html

PKOO «Biometrical Fingerprint Recognition: Don’t Get Your Fingers Burned,» by Ton van der Putte and Jeroen Keuning, in the Proceedings of Fourth Working Conference on Smart Card Research and Advanced Applications, pages 289—303, Kluwer Academic Publishers, 2000; http://cryptome.org/fake-prints.htm

PK03 «In the Company of Spies,» by Paul Kaihla, Business 2.0, May 01, 2003, http://www.business2.com/subscribers/articles/mag/0,1640,49068,00.html.

PK96 «Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,» by P. Kocher, in Crypto 96 Proceedings, LNCS 1109, Springer-Verlag, 1996. http://www.cryptography.com/resources/whitepapers/TimingAttacks.pdf

PL98 «Re: Status of GSM Crypto Attacks», Paul Leyland, posting to [email protected] mailing list, 21 Oct 1998, http://jya.com/gsml02898.htm

PR02 «Can a Hacker Outfox Microsoft?» by Peter Rojas, Oct. 18, 2002, Wired News, http://www.wired.com/news/technology/0,1282,55807,00.html

PR03 «Poll Examines Saddam, 9-11 Link,» Associated Press, September 06, 2003, http://wireservice.wired.com/wired/story.asp?section=BreakingstoryId=779532

PS02 «Prison Statistics On June 30, 2002,» U.S. Department of Justice, Bureau of Justice Statistics, 2002, http://www.ojp.usdoj.gov/bjs/prisons.htm

PW87 «Spycatcher – The Candid Autobiography of a Senior Intelligence Officer,» by Peter Wright, William Heinemann Australia, 1987