> wiley.com



www.belisarius.com - John Boyd and the OODA loop

Chapter 1 - Spies

cryptome.org - John Young's Cryptome.org site

Chapter 2 - Spying and the Law

www.usdoj.gov/criminal/cybercrime/usamarch2001_2.htm - DOJ perspective on wiretaps and computer investigations

www4.law.cornell.edu/uscode/18/3121.html - "Pen register" and "trap and trace" statutes

www.uscourts.gov/wiretap.html - Federal wiretap statistics

www4.law.cornell.edu/uscode/18/pIch119.html - ECPA wiretap provisions

www4.law.cornell.edu/uscode/18/pIch121.html - Stored Communication Act

www4.law.cornell.edu/uscode/18/1030.html - Computer Fraud and Abuse Act

www.ca9.uscourts.gov/ca9/newopinions.nsf/DD51CB5C3834F00F88256C1E0002A94D/$file/9955106.pdf?openelement - Konop v. Hawaiian Airlines Inc.

www4.law.cornell.edu/uscode/50/ch36.html - Foreign Intelligence Surveillance Act (FISA)

www.askcalea.net - Communications Assistance for Law Enforcement Act (CALEA) information

www4.law.cornell.edu/uscode/18/2522.html - CALEA text

my.execpc.com/~mhallign/indict.html - Mark Halligan's Economic Espionage Act site

www.ncsl.org/programs/lis/CIP/surveillance.htm - National Conference of State Legislatures summary of state laws relating to surveillance

nsi.org/Library/Compsec/computerlaw/statelaws.html - National Security Institute links to state computer crime laws

www.house.gov/judiciary/patriotresponses101702.pdf - Department of Justice letter of response regarding USA-PATRIOT Act

www.cdt.org/security/010911response.shtml - Analysis of USA-PATRIOT Act

thomas.loc.gov/cgi-bin/bdquery/z?d107:HR03162:%5D - Full text of USA-PATRIOT Act

Chapter 3 - Black Bag Jobs

www.watergate.info/index.php?itemid=18 - Description of the Watergate black bag job

www.dss.mil/training/csg/security/Treason/Intro.htm#Treason%20101 - Treason 101, all about spies

www.indra.com/archives/alt-locksmithing/ - USENET alt.locksmithing FAQ

www.security.org - "Locks, Safes, and Security," the ultimate reference

www.asisonline.org - American Society for Industrial Security (ASIS)

www.sibgonline.com - Security Industry Buyers Guide

www.adtdl.army.mil/cgi-bin/atdl.dll/fm/3-19.30/toc.htm - Army FM 3-19.30 Physical Security

locks.nfesc.navy.mil - Dpeartment of Defense Lock Program

cryptome.org/nsa-scif.htm - Physical Security Requirements for NSA/CSS Sensitive Compartmented Information Facilities

nces.ed.gov/pubs98/safetech/index.html - Safeguard Your Technology, Practical Guidelines for Electronic Education Security

www.dss.mil/isec/nispom.htm - National Industrial Security Program Operating Manual (NISPOM)

www.cl.cam.ac.uk/ftp/users/rja14/nsaman.pdf - National Security Agency Security Manual

ftp://ftp.isi.edu/in-notes/rfc2196.txt - Site Security Handbook (RFC2196), IETF Site Security Task Force

Chapter 4 - Breaching the System

www.wimsbios.com - Wim Bervoets BIOS information site

www.pwcrack.com - Password Crackers Inc., replacement BIOS chips

www.nortek.on.ca - Nortek Computers Ltd, specializes in bypassing ThinkPad laptop protection

www.securityfocus.com/popups/forums/bugtraq/intro.shtml - Bugtraq full disclosure vulnerability list

www.ntbugtraq.com - Vulnerability list devoted to Windows NT/2000/XP

www.microsoft.com/technet/security/current.asp - List of Microsoft security bulletins

www.cert.org - Computer Emergency Response Team (CERT)

www.nipc.gov - National Infrastructure Protection Center (NIPC)

www.cgsecurity.org/index.html?cmospwd.html - Cmposwd, BIOS password utility

www.packetstormsecurity.org/Crackers/bios/ - BIOS password crackers

packetstormsecurity.org/Win/RWSaverBust.zip - RatWare Windows 9x screensaver password utility

www.bockelkamp.de - Scrsavpw Windows screensaver password utility

www.atstake.com - LC (L0phtCrack) Windows NT/2000/XP account password utility

www.ntsecurity.nu/toolbox/fakegina/ - FakeGINA Windows NT/2000 logon Trojan horse

www.elcomsoft.com/antexp.html - Advanced NT Security Explorer NT/2000/XP account password utility

razor.bindview.com/tools/index.shtml - Pwdump 2 NT/2000/XP account password utility

www.polivec.com/pwdump3.html - Pwdump 3 NT/2000/XP account password utility

www.winternals.com - ERD Commander 2002 NT/2000/XP account password utility

www.ciacommander.com - CIA Commander NT/2000/XP account password utility

www.ntsecurity.nu - ClearLogs and WinZapper log cleaners

www.sysinternals.com - NTFSDOS, NTFS utility

www.winternals.com - NTFSDOS Pro, NTFS utility

home.eunet.no/~pnordahl/ntpasswd/ - Chntpw (Linux), NT/2000/XP account password utility

www.openwall.com/john/ - John the Ripper, NT/2000/XP account password utility

www.microsoft.com/technet/security - Microsoft Security Bulletins

support.microsoft.com/default.aspx?scid=KB;en-us;q303215 - Microsoft Network Security Hotfix Checker

www.microsoft.com/technet/security/tools/Tools/MBSAhome.asp - Microsoft Baseline Security Advisor

www.nsa.gov/snac/index.html - NSA Security Recommendation Guides for Windows NT, 2000, and XP

Chapter 5 - Searching for Evidence

www.ncjrs.org/pdffiles1/nij/187736.pdf - Department of Justice Electronic Crime Scene Investigation: A Guide for First Responders

www.cops.org - International Association of Computer Investigative Specialists (IACIS)

www.htcia.org - High Technology Crime Investigative Association (HTCIA)

www.cybercrime.org - National White Collar Crime Center (NWCC)

www.forensics-intl.com - New Technologies Inc. - computer forensics training

www.cybercrime.gov/s&smanual2002.htm - Department of Justice's "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations"

www.digitalintel.com - Digital Intelligence computer forensics hardware manufacturer

www.dibsusa.com - DIBS USA computer forensics hardware manufacturer

www.forensic-computers.com - Forensics Computers hardware manufacturer

www.wotsit.org - Popular fire formats

filext.com - List of file extensions and associated applications

support.microsoft.com/default.aspx?scid=kb;EN-US;136517 - How Windows recycling works

www.regedit.com - Information site about the Windows Registry

www.systemtools.com/somarsoft/ - DumpReg utility to list the contents of the Registry

www.datarecoverylinks.com - List of U.S. and European data recovery companies

www.ontrack.com - OnTrack data recovery services (and software)

www.drivesavers.com - DriveSavers data recovery company

www.dcfl.gov - Department of Defense Computer Forensics Laboratory (DCFL) - restricted floppy disk recovery techniques

www.maresware.com/maresware/linksto_forensic_tools.htm - Dan Mares list of computer forensics hardware and software

www.forensics-intl.com/safeback.html - SafeBack forensic duplication tool

www.symantec.com - Symantec Norton Ghost duplication utility

www.ncjrs.org/pdffiles1/nij/196352.pdf - Department of Justice report on using dd for forensic duplication

www.encase.com - EnCase, widely used computer forensics application

www.accessdata.com - Access Data Forensic Toolkit

www.ilook-forensics.org - iLook, free, law-enforcement only forensics application

www.winhex.com - WinHex disk editor

www.jasc.com - Quick View Plus image viewer

www.symantec.com - Symantec Norton Utilities

www.ontrack.com - OnTrack EasyRecovery Professional Edition

world.std.com/~franl/crypto.html - General information about cryptography

www.counterpane.com/crypto-gram.html - Crypto-Gram monthly newsletter

www.cdt.org/crypto/ - Center for Democracy and Technology, Encryption Issues

www.pgp.com - PGP (commercial version) encryption utility

www.pgpi.org - PGP (open-source versions) encryption utility

www.gnupg.org - GnuPG encryption utility

members.tripod.com/markus_hahn/software.html - Blowfish Advanced CS encryption utility

www.abisoft.net/bd.html - AbiCoder encryption utility

www.webattack.com - Other free/shareware crypto utilities

www.microsoft.com/windows2000/downloads/recommended/encryption/ - Windows 2000 high encryption update

www.steganos.com - Steganos Security Suite encryption utility

www.jetico.com - BestCrypt encryption utility

www.drivecrypt.com - DriveCrypt encryption utility

www.fortunecity.com/skyscraper/true/882/Comparison_OTFCrypto.htm - "On-the-fly" encryption utilities review

www.citi.umich.edu/u/provos/stego/usenet.php - Niels Provos paper on steganography in USENET

os.inf.tu-dresden.de/~westfeld/publikationen/ihw99.pdf - Paper on attacks on steganography

www.outguess.org - Stegdetect stego detector utility

ftp.uni-stuttgart.de/pub/rus/security/win95/s-tools4.zip - S-Tools stego utility

wbstego.wbailer.com/ - wbStego commercial setgo utility

stegoarchive.com - List of stego software

www.fas.org/irp/doddir/navy/5239_26.htm - U.S. Navy's 1993 Remanence Security Guidebook

www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html - Peter Gutmann's "Secure Deletion of Data from Magnetic and Solid-State Memory" paper

www.heidi.ie/eraser/ - Eraser, popular file wiper

www.fortunecity.com/skyscraper/true/882/Comparison_Shredders.htm - Reviews and comparisons of various file wipers

www.webroot.com/washer.htm - Window Washer evidence eliminator

www.surfsecret.com - Surf Secret Privacy Protector

www.cyberscrub.com - CyberScrub evidence eliminator

Chapter 6 - Unprotecting Data

www.counterpane.com/whycrypto.html - "Why Cryptography Is Harder Than It Looks" by Bruce Schneier

www.counterpane.com/pitfalls.html - "Security Pitfalls in Cryptography" by Bruce Schneier

lambda.cs.yale.edu/cs422/doc/unix-sec.pdf - "Password Security: A Case History"

dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C89/44.PDF - "UNIX Password Security Ten Years Later"

geodsoft.com/howto/password/klein.pdf - "Foiling the cracker": A Survey of, and Improvements to, Password Security"

www.centralnic.com/page.php?cid=77 - British password study

rr.sans.org/authentic/cracking.php - Paul Bobby paper on creating focused dictionaries

www.uruklink.net/iraq - Iraqi government Web site, in case you too want to try to crack Saddam's email

www.accessdata.com/dictionaries.htm - Access Data's collection of dictionaries

www.elcomsoft.com/prs.html - ElcomSoft's collection of dictionaries

ftp.ox.ac.uk/pub/wordlists/ - Word lists at the University of Oxford

www.interhack.net/pubs/des-key-crack - Final results of the DES Challenge

distributed.net - Distributed crypto breaking projects

www.rsa.com/node.aspx?id=2898 - RSA Laboratories' FAQ About Today's Cryptography

www.fas.org/irp/doddir/army/fm34-40-2/ - Basic Cryptanalysis (Army Field Manual 34-40-2)

www.counterpane.com/cryptanalysis.pdf - A Self-Study Course in Block-Cipher Cryptanalysis

www.accessdata.com - AccessData Password Recovery Toolkit

www.cryptography.com/resources/whitepapers/DES.html - EFF hardware DES cracker

www.elcomsoft.com - ElcomSoft password recovery tools

www.lost-password.com - Passware password recovery tools

support.microsoft.com/default.aspx?scid=KB;en-us;q290112 - Microsoft encryption algorithms

www.password-crackers.com - is Pavel Semjanov's "Russian Password Crackers" site

members.aol.com/jpeschel/ - Joe Peschel's "D.O.E. SysWorks" password cracking site

www.packetstormsecurity.org/assess.html - Packetstorm list of password recovery tools

members.aol.com/jpeschel/Glidepwl.zip - Glide PWL password recovery tool

lastbit.com/vitas/pwlview.asp - PWLView PWL password recovery utility

lastbit.com/vitas/pwltool.asp - PWLTool commercial PWL password recovery tool

www.pilabs.org.ua/wisdom/download/pwlhack/pwl_h410.rar - PWLHack password recovery utility

www.snadboy.com/ - Revelation dialog box password recovery tool

ntsecurity.nu/toolbox/snitch/ - Snitch dialog box password recovery utility

www.iopus.com/password_recovery.htm - iOpus Password Recovery XP commercial dialog box password recovery tool

www.csc.calpoly.edu/~bfriesen/software/pwdspy.shtml - PasswordSpy , dialog box password recovery tool

www.password-crackers.com/DOWNLOAD/phbv101c.zip - PhoneBook Viewer dialog box password recovery tool

www.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf - "The Memorability and Security of Passwords - Some Empirical Results"

www.webattack.com/Freeware/security/fwpass.shtml - Windows password managers

heise.de/ct/english/02/11/114/ - c't magazine article on attacks against biometric systems

www.itu.int/itudoc/itu-t/workshop/security/present/s5p4.pdf - Gummi bear attacks on fingerprint scanners

www.biometrics.org - Biometrics Consortium organization

biometrics.cse.msu.edu/ - Michigan State University Biometrics Research

www.sims.berkeley.edu/~rachna/dejavu/ - Déjà Vu symbol recognition authentication

Chapter 7 - Copying Data

martin.f2o.org/windows/archivers - Martin Tsachev's comparison of archiving tools

www.everythingusb.com - Everything USB reference site

www.iomega.com - Iomega, manufacturer of Zip and Jaz drives

www.sandisk.com - SanDisk flash memory storage device manufacturer

www.everythingusb.com/hardware/Storage/USB_Flash_Drives.htm - List of flash drives

www.lexarmedia.com - Lexar JumpDrive

www.apple.com/ipod/ - Apple iPod

www.nomadworld.com/products/Jukebox_Zen/ - Creative Labs Nomad Zen

www.logicube.com - Logicube SF-5000 hard drive duplicator

www.corpsys.com - Corporate Systems hard drive duplicators

www.ics-iq.com - Intelligent Computer Solutions Masster hard drive duplicator

www.pocketec.net - Pockey DataStor hard drive

www.hgst.com/products/microdrive/index.html - Hitachi/IBM Microdrive

www.atstake.com/research/tools/network_utilities/ - NetCat network tool

farm9.org/Cryptcat/GetCryptcat.php - CryptCat network tool

www.minox-web.de - Minox classic spy camera

www.sipixdigital.com - SiPix StyleCam Snap digital camera

www.americas.creative.com - Creative Labs Cardcam digital camera

Chapter 8 - Snooping with Keyloggers

www.spectorsoft.com - SpectorSoft Professional Edition Keylogger

www.amecisco.com - Invisible KeyLogger Stealth

www.pcmag.com/article2/0,4149,272723,00.asp - PC Magazine review of keyloggers

www.keyghost.com - KeyGhost hardware keylogger

www.amecisco.com - Hardware KeyLogger

www.keykatcher.com - KeyKatcher hardware keylogger

www.answersthatwork.com/Tasklist_pages/tasklist.htm - Common task list processes

www.sysinternals.com - File Monitor utility

www.ratct.net - God firewall penetrator

www.spycop.com - SpyCop keylogger detector

www.trapware.com - Who's Watching Me keylogger detector

www.pestpatrol.com - PestPatrol keylogger and Trojan detector

beam.to/spybotsd - Spybot Search & Destroy keylogger and spyware detector

www.extremetech.com/article2/0,3973,472055,00.asp - CompuSafe review

Chapter 9 - Spying with Trojan Horses

www.acm.org/classics/sep95/ - Ken Thompson paper on trust

www.simovits.com/nyheter9902.html - Mikael Simovits Trojan port list

upx.sourceforge.net - UPX (Ultimate Packager for Executables)

www.tlsecurity.net/exebinder.htm - List of Trojan "binders"

www.megasecurity.org/Droppers.html - List of Trojan "droppers"

msdn.microsoft.com/workshop/author/hta/overview/htaoverview.asp - HTML Applications (HTAs)

www.guninski.com - HTA and other Microsoft vulnerabilities and exploits

www.spectorsoft.com - Spector, commercial version of NetBus Trojan

www.cultdeadcow.com/tools/ - Cult of the Dead Cow Back Orifice Trojan

bo2k.sourceforge.net - Back Orifice 2000

www.megasecurity.org/trojans/subseven/Subseven_all.html - List of different versions of Sub7 Trojan

www.digitalsin.net/cyn/HTML_/News.html - LANfiltrator Trojan

www.evileyesoftware.com - Optix Trojans

www.net-devil.com/main.html - Net-Devil Trojan

www.trojanforge.net - TrojanForge underground site

www.evileyesoftware.com - Evil Eye Software Trojan site

www.areyoufearless.com - Fearless Trojan site

www.sinred.com - SinRed Trojan site

www.megasecurity.org/Main.html - MegaSecurity computer security and Trojan site

www.symantec.com/pcanywhere/ - Symantec pcAnywhere

www.uk.research.att.com/vnc/ - VNC remote administration tool

www.tightvnc.com/ - TightVNC remote administration tool

www.diamondcs.com.au/web/htm/regprot.htm - RegistryProt Registry integrity tool

www.gfi.com/lansim/index.html - GFI LANguard System Integrity Monitor

www.wilders.org/free_tools.htm - Integrity checkers and other anti-Trojan tools

www.kaspersky.com - Kaspersky Anti-Virus (KAV)

tds.diamondcs.com.au/ - Trojan Defence Suite (TDS), anti-Trojan utility

www.nsclean.com/boclean.html - BOClean, anti-Trojan utility

www.agnitum.com/products/tauscan/ - Tauscan, anti-Trojan utility

www.misec.net/trojanhunter/ - Trojan Hunter, anti-Trojan utility

www.misec.net/trojansimulator/ - Mischel Internet Security Trojan simulator

Chapter 10 - Network Eavesdropping

www.lambiek.net/prohias_antonio.htm - Mad Magazine, Spy vs. Spy

www.fas.org/irp/cia/product/ig_deutch.html - Internal CIA investigation of John Deutch

slashdot.org - Slashdot dot org site

www.wiley.com/cda/product/0,,0471232823,00.html - "Hack Attacks Revealed" by John Chirillo

www.iana.org/assignments/port-numbers - Internet Assigned Numbers Authority (IANA) list of ports

www.mycgiserver.com/~ethicalhackers/netbios.html - NetBIOS attack tutorial

www.sans.org/rr/netdevices/packet.php - ARP (Address Resolution Protocol) spoofing paper

www.silentrunner.com - SilentRunner corporate monitoring application

www.sandstorm.net/products/netintercept/ - NetIntercept corporate monitoring application

www.nai.com - DragNet corporate monitoring application

www.convera.com - RetrievalWare data-mining tool

www.robertgraham.com/altivore/ - Altivore, open-source Carnivore

www.robertgraham.com/pubs/sniffing-faq.html - Sniffer FAQ

www.softsecurity.com/products/ser/ - Stealth Email Redirector spy utility

pivx.com/larholm/unpatched/ - List of unpatched Internet Explorer security holes

www.samspade.org - SamSpade network utility

www.insecure.org/nmap/ - Nmap network mapping and discovery tool

www.nmapwin.org - Windows version of Nmap

www.foundstone.com/knowledge/proddesc/superscan.html - Foundstone SuperScan port scanner

www.nessus.org - Nessus open-source security scanner

www.iss.net - Internet Security Systems (ISS) Internet Scanner, commercial security scanner

online.securityfocus.com/tools/543 - NAT (NetBIOS Auditing Tool)

packetstormsecurity.org/groups/rhino9/legionv21.zip - Legion NetBIOS tool

www.ethereal.com - Ethereal open-source sniffer

winpcap.polito.it - WinPCap driver and utilities

www.datanerds.net/~mike/dsniff.html - Windows version of dsniff sniffer

ettercap.sourceforge.net - Ettercap sniffer

www.oxid.it - Cain & Abel sniffer

www.wiley.com/cda/product/0,,0471232831,00.html - "Hack Attacks Deneied" by John Chirillo

www.snort.org - Snort open-source intrusion detection

www.iss.net - BlackIce PC Protection

www.securepoint.cc/en/products-sids.html - Securepoint Intrusion Detection

www.robertgraham.com/pubs/network-intrusion-detection.html - Intrusion Detection System (IDS) FAQ

www.paoloiorio.it/fw.htm - FIREWAR firewall penetrator

www.grc.com/x/ne.dll?bh0bkyd2 - Shields Up! Firewall tester

scan.sygatetech.com - Sygate firewall tester

www.wallwatcher.com - WallWatcher, Linksys router log utility

www.kiwisyslog.com - Kiwi Syslog Daemon log utility

www.linux-firewall-tools.com/linux/ - Linux firewalls

www.computerworld.com/services/buyersguide/subcat/0,4846,KEY73_SUB16,00.html - ComputerWorld firewall buyer's list

www.firewallguide.com - Small Office, Home Office firewalls

www.mynetwatchman.com - My NetWatchman logging tool

www.dshield.org - Dshield log utility

www.stunnel.org - SSL VPN

www.vpnlabs.com/ - VPN Labs information site

ntsecurity.nu/toolbox/inzider/ - Inzider port viewer

www.sysinternals.com - TCPView, TDImon packet and port information tools

www.trillian.cc - Trillian Instant Messaging (IM) encryption utility

www.commandcode.com - SpyShield IM encryption tool

www.invisiblenet.net/iip/index.php - Invisible IRC Project, IRC encryption tool

www.jfitz.com/tips/ssh_for_windows.html - Windows SSH and SCP how-to

www.hushmail.com - Hushmail secure Web email

www.sendfakemail.com/~raph/remailer-list.html - Anonymous remailer information

www.chez.com/frogadmin/ - Anonymous remailer information and stats

www.eskimo.com/~joelm/pi.html - Private Idaho privacy tool

directory.google.com/Top/Computers/Internet/Proxies/Free/ - List of Web proxies

Chapter 11 - 802.11b Wireless Network Eavesdropping

standards.ieee.org/regauth/oui/index.shtml - List of manufacturer MAC addresses

www.warchalking.org - WarChalking

www.turnpoint.net/wireless/has.html - Homebrew wireless antenna review

www.netstumbler.com - NetStumbler wireless discovery tool

www.stumbler.net - Personal Web site of the developer of NetStumbler

www.kismetwireless.net/ - Kismet (Linux) wireless utility

www.wildpackets.com/products/airopeek_nx - AiroPeek NX commercial sniffer

www.sniffer.com/products/sniffer-wireless/default.asp?A=3 - NAI Sniffer Wireless

chocobospore.org/mognet/ - MogNet, a wireless sniffer written in Java

airtraf.sourceforge.net/ - AirTraf open-source wireless sniffer

www.remote-exploit.org/ - Wellenreiter GTK/Perl wireless sniffer

airsnort.shmoo.com/ - AirSnort WEP encryption key recovery utility

www.sonar-security.com/ - StumbVerter mapping tool for NetStumbler output

www.airmagnet.com - AirMagnet Pocket PC wireless tool

home.attbi.com/~digitalmatrix/nsspyglass/ - NSSpyglass, NetStumbler detector

www.airdefense.net - AirDefense hardware wireless intrusion detectors

www.blackalchemy.to - FakeAP wardriver countermeasure

Chapter 12 - Spying on Electronic Devices

www.mindspring.com/~jgrand/pdd/pdd-palm-forensics.pdf - pdd: Memory Imaging and Forensic Analysis of Palm OS Devices by Joe Grand

www.mindspring.com/~jgrand/pdd/ - pdd Palm memory dump tool

www.paraben-forensics.com/pda.html - Paraben PDA Seizure forensics utility

www.atstake.com/research/advisories/2000/notsync.zip - NotSync Palm system password revealer

www.atstake.com/research/advisories/2000/a092600-1.txt - @Stake research report on Palm vulnerability

www.pdadefense.com - PDA Defense Palm and Pocket PC security application

www.softwinter.com/sentry_ce.html - Sentry 2020 Pocket PC security application

www.tranzona.com - OnlyMe Palm security application

www.tealpoint.com/softlock.htm - TealLock Palm security application

www.atstake.com/research/advisories/1998/ansmach.txt - @Stake research paper on answering machine attacks

www.m4phr1k.com - Stephan Barnes information on hacking PBX and voicemail systems

www.snowcrest.net/marnells/digital-scanner.htm - Latest digital scanner info

www.secureshredders.com - Vendor of NSA/CSS Specification 02-01 shredders

www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB21/ - CIA reconstructed shredded cable from U.S. Embassy takeover in Iran, 1979

www.phenoelit.de/dpl/index.html - Hardware and software default password list

homepages.ihug.co.nz/~Sbarnes/pocsag/software.html - List of software that can be used to eavesdrop on pager messages

www.applet.cz/~ulcak/4_level_fsk_interface.htm - Hardware schematics for pager decoder

www.rh-law.com/ediscovery/Blackberry.pdf - "Forensic Examination of a Rim (BlackBerry) Wireless Device"

www.geocities.com/ResearchTriangle/Lab/1578/smart.htm - Bo Lavare's Smartcard Security

Chapter 13 - Advanced Computer Espionage

www.eskimo.com/~joelm/tempest.html - Author's definitive TEMPEST site

cryptome.org/tempest-time.htm - TEMPEST historical timeline

applied-math.org/optical_tempest.pdf - Loughry and Umphress paper on "optical TEMPEST"

www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf - Markus Kuhn paper on reflected light eavesdropping

www.echelonwatch.org - Echelon information site

www.epic.org/privacy/carnivore/ - EPIC files on Carnivore

www.rootkit.com - NT root kit

tsehp.cjb.net/ - Classic software reverse engineering information from Fravia

www.privacy.com.au/pgpatk.html - Author's "Practical attacks on PGP" paper

web.archive.org/web/19990221015817/http://members.tripod.com/opiccb/index.htm - Archived copy of Opic's site (author of Caligula virus)

www.digi-watcher.com - Digi-watcher Webcam surveillance software

inetshepherd.com/ - InetShepard Webcam surveillance software

www.webattack.com/shareware/webpublish/swwebcam.shtml - List of Webcam surveillance software

www.supercircuits.com - Super Circuits video surveillance equipment

www.tscm.com/ - Granite Island Group extensive technical surveillance countermeasures (TSCM) site

www.mediaeater.com/cameras/ - NYC Surveillance Camera Project

www.epic.org/privacy/surveillance/ - Video surveillance information from EPIC

www.usace.army.mil/inet/usace-docs/eng-pamphlets/ep1110-3-2/toc.htm - Electromagnetic Pulse (EMP) and TEMPEST Protection for Facilities

www.eff.org/Privacy/Security/tempest_monitoring.article - Grady Ward TEMPEST sheilding document

www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf - Anderson and Kuhn TEMPEST fonts paper

www.nrc.nl/W2/Lab/Echelon/ic2kreport.htm - European "Interception Capabilities 2000" ECHELON report

www.ep.net/ep-main.html - List of current Internet Exchanges

cryptome.org/cryptout.htm#Echelon - Cryptome collection of ECHELON documents

www.cdt.org/security/carnivore/001214carniv_final.pdf - IIT independent report on Carnivore

cryptome.org/dirt-guide.htm - Cryptome DIRT and Magic Lantern information

cryptome.org/dirty-lantern.htm - More Cryptome DIRT and Magic Lantern information

cryptome.org/dirty-secrets2.htm - Even more Cryptome DIRT and Magic Lantern information

badtrans.monkeybrains.net/ - Badtrans spy virus email database


ISBN 0-7645-3710-5
384 Pages
June 2003

Wiley Technology Publishing
Timely. Practical. Reliable.

[ Home ]

[ Links ]

[ Updates ]