| < Day Day Up > |
|
Pacific Command, 281
packet data, 476–77
packet sniffers, 448
Page Files, 49
PAGEFILE.SYS, 49
paging mode, 476
Palestine Information Center, 328
Palestine site, 328
Palestinian Hamas site, 262
Palestinian Islamic Jihad’s command and control system, 325
Palestinian supporters, 350, 352, 418
paper documents, 185–86
paper trail, 123, 185, 412–13
Partition Magic™, 153
passwords, 299, 388, 396
past event reconstruction action agenda, 216–17
past event reconstruction conclusions, 216
Paul Fromm, 330
Paul Mace Software, 145
PBX equipment, 67
PC PhoneHome, 47
Penet re-mailer, 581, 583
pen register devices, 450
Pentagon, 268, 288, 295, 330, 346, 371
Pentaguard, 573
Penthouse, 347
people monitoring, 469
People’s Liberation Army, 360
People’s Liberation Daily, 344
People’s Republic of China, 363
percentsystemroot percent\system32 \configdirectory, 611
personal handy phone systems (PHS), 475–76
personal identification numbers (PINs), 539
personal identifiers, 533
personal locator system (PLS), 474–75
Peter Zhou, 470–71
PGP, 559
Philadelphia’s Third Circuit Court of Appeals, 596
Philip Zimmermann, 565
phone home, 490
PhonePrint, 539–40
Phrack, 525
PHS phone handset, 481
PHS service areas, 481
physical level searches, 622–24
picture files, 489
piezoelectric ceramics, 457–58
Pilot Network Services, 65
ping ip command, 74
PKCS #10 signature standards, 168
PKCS #7 signature standards, 168
PKZIP files, 44
plaintext, 557
plaintiffs’ lawyers, 184
Plan Version 1.0 “An Invitation to a Dialog”, 527
PLO, 325, 360–61
pluralistic America, 254, 256–57
Point-In-Time (PIT) recovery, 113
PointShare Corp., 546
Policy Enforcement Group, 399
polymer forms, 463
POP3 (110), 592
port attacks, 592–93
ports, 53, 230, 592–593
postage-stamp-sized chipset (Star II), 480
PowerPoint 2000 documents, 489, 491–92
PowerPoint files, 211
Practical Guide to Aryan Revolution, David Myat, 330
prerevolutionary Russian terrorists, 315
President Clinton, 248, 272, 295, 336–37, 572
President George W. Bush, 251–52, 272, 287
Presidential Commission, 510
President Reagan, 310, 337
previewing crime scene media, 621–22
Pricewaterhouse Coopers, 247–48
Prime Minister Yitzhak Rabin, 301, 312
privacy advocates, 265
privacy agreements, 403–04
Privacy Foundation, 450–51, 488–89, 491, 546
privacy issues
128-bit Secure Sockets Layer (Web encryption), 545–46
1984, George Orwell, 547
alumni registries, 531
America Online, 526, 531
American Management Association, 546
analog phones, 538–40
Anonymizer, 530
Army’s National Ground Intelligence Center research contract, 548
AuthenTec Inc., 536
authentication, 540–41
Beth Israel Deaconess Medical Center, 545
BioFusion, 548
Boston Consulting Group’s privacy survey, 530
brain prints, 547
brain-mapping, 548–49
brain-mimicking software, 548
Buck Rogers, 547
call counting, 540–41
CareGroup Healthcare System, 545
CDB Infotek, 531
cellular handsets distribution, 542
Cellular One, 535
cellular service providers, 535–36
Cellular Telecommunications Industry Association (CTIA), 472538
CIA, 546
cloned phones, 540
code-division multiple-access (CDMA), 478, 538
commercial reference services, 531
consumer privacy, 530
Cookie Crusher, 531
Cookie Pal, 531
CookieMaster, 531
Corsair Communications Inc., 539–40
credit system’s personal identification, 533
cryptography, 168, 335, 565
Defense Advanced Research Projects Agency research contract, 548
Delaware State Police, 531
digital penetration, 538
digital phones, 538–39
Dow Chemical, 546
drivers’ license rolls, 531
Echelon, 387, 412, 547
electrohypnomentalophone, 547–48
Electronic Communication Privacy Act (ECPA, 607
Electronic Privacy Information Center (EPIC), 412, 527
electronic serial numbers (ESNs), 539
European Parliament President Nicole Fontaine, 547
European Union privacy directive, 528–29
Fair Credit Reporting Act, 529, 531
Falun Dafa, 566
Federal Intrusion Detection Network (FIDNet), 295, 412, 527
Federal Trade Commission (FTC) workshop, 530–31
filtering programs, 532
FingerLoc fingerprint sensor, 536–37
fingerprinting, 536–37, 539–41, 611
fraud (Title 18, Section 1029, of the U.S. Code), 539
fraud-fighting technology, 540
hacked patient files, 542–53
Health Insurance Portability and Accountability Act (HIPAA), 543–45
Hong Kong’s privacy commissioner, 529
Human Rights Watch, 565
identification/information fraud Title 18, Section 1028 of the U.S. Code, 541
identity fraud, 532–35
Information America, 531
Internet Explorer, 530
IW civilian casualties action agenda, 550–51
IW civilian casualties conclusions, 548–49
John Norseen, 547–49
junk e-mail, 530–31
L. L. Bean, 528–29
Latin America, 302, 542
Le Monde, 547
Lexis-Nexis, 531
Lockheed Martin, 444, 547–48
Lockheed Martin’s Intelligent Systems Division research contract, 548
magnetic resonance imaging (MRI) machine, 548
medical ID cards, 542–53
medical privacy rules, 544
Microsoft, 526, 529
mobile identity numbers ((MINs), 539
MOMR Inc, 545–46
National Plan for Information Systems Protection, 295, 527
Nazism, 529
Netscape Navigator, 530
news archives, 531
on-line databases, 531
Open Profiling Standard (OPS), 530
personal identification numbers (PINs), 539
personal identifiers, 533
Philip Zimmermann, 565
PhonePrint, 539–40
Plan Version 1.0 “An Invitation to a Dialog”, 527
PointShare Corp., 546
privacy codes: United States Code at Title 18, section 2701, 607–08
Privacy Foundation, 450–51, 488–89, 491, 546
privacy provision: Title 18 USC 2703(f), 607–08
professional directories, 531
property tax records, 531
prosecution of fraud and deception, 532
protection, 527
research-and-development plan, 548
résumé banks, 531
Robert Bork, 528
Sabre Group, 528
scanners, 538–39
SecurityFocus.com, 76, 355, 543
self-regulation concept, 529
sniffer software, 543
Spam, 530–32
spy-free workplaces, 546–47
subscription fraud, 536
subsidy loss, 542
Switchboard, 531
synthetic reality, 547
The National Aeronautics and Space Administration research contract, 548
The New York Times Co, 546
time-division multiple-access TDMA, 538
Trans Union, 535
TRW Inc., 340
U.S. Department of Health and Human Services (HHS), 544–45
U.S. Secret Service, 539, 595
U.S. Senate Judiciary Subcommittee, 527
U.S.’s First Amendment, 529
University of Washington Medical Center, 542–53
violations, 526–27
workplace surveillance, 546–47
WorldPages, 531
Xerox, 546
Yankee Group, 538
privacy laws, 155–56, 175
privacy-oriented Open Profiling Standard (OPS), 530
privacy provision: Title 18 USC 2703(f), 607–08
privacy seal of approval, 405
privacy standards, 525
private detectives, 408–09
Private Idaho, 414
private key algorithms, 195
Proctor & Gamble, 199
professional directories, 531
program features and benefits, 44
program-language source code, 264
pro-Israeli hackers, 352
proper computer shutdown, 609
property tax records, 531
prosecution of fraud and deception, 532
Pro Tech Monitoring Inc., 484
proving of business books, 17
proving of documents, 17
provisioning software, 594
Prudential Insurance Co. Sales Practices Litigation, 169 F.R.D., 598 [D.N.J. 1997]) retention policies, 224–25
ps -aux, 609
ps -ef, 609
pseudonymous remailers, 414
PSINet, 398
psychological operations (PSYOPS), 240–41, 248–49
public key cryptography, 167–68, 195
public key encryption (PGP), 561–65
public/private key pair, 167–69
public safety answering point (PSAP), 482
publisher identity, 166
Purity Wholesale Grocers, 595
| < Day Day Up > |
|