Related articles by Suelette Dreyfus
Lose your password? Try abstract art! The Independent, 10 Oct 2000
Researchers at the University of California at Berkeley have been
studying how people use passwords and PINs. They have also tested a
new prototype system, called Deja Vu, that replaces these traditional
forms of authentication with a "password" made up of abstract art
A high-tech search for the truth about Kosovo, The Independent, 15 May 2000
During the war in Yugoslavia last year,
hundreds of thousands of Kosovar refugees
fled their homes. Were they running from
the Serbian military or Nato bombs? Was the
refugee flight completely chaotic, or was
someone orchestrating it with deliberate
precision behind the scenes?
Spy in the sky hears secrets, The Age, 14 Mar 2000
The increase in the use of e-mail and mobile phones has left Australian
businesses more exposed to economic espionage by foreign governments,
according to an Australian National University academic.
Dr Michael McKinley, a senior lecturer researching a book assessing the
alliance between American and Australian intelligence agencies, says:
Most Australians dont fully understand ... just how much of their
private life is open to government.
Gurus keep us guessing on next year's fasion code, The Age, 4 Apr 2000
So what is hot in cryptowear?
Look for ephemeral keys,
sheer digital watermarks
lined with a crinoline of
crypto and au natural
Semantic Forests, Cyberwire Dispatch, 30 Nov 1999
"Semantic Forests" doesn't mean much to the average person. But if
you say it in concert with the words "automatic voice telephone
interception" and "U.S. National Security Agency" to a
computational linguist, you might just witness the physical
manifestations of the word "fear."
Spies in the forests, The Independent, 22 Nov 1999
THE US Department of Defense is
lab-testing technology that could make it
easier automatically to sift through a
vast pool of private communications,
including international telephone phone
calls, in a similar manner to using an
Internet search engine.
This is Just Between Us (And the Spies), The Independent, 15 Nov 1999
The US National Security Agency has
designed and patented a new technology
that could aid it in spying on
international telephone calls. The NSA
patent, granted on 10 August, is for a
system of automatic topic spotting and
labelling of data. The patent officially
confirms for the first time that the NSA
has been working on ways of automatically
analysing human speech.
Fighting the good fight, The Age, 9 Feb 1999
He followed the shifting battle ground from sneaking through wire fences
at nuclear test sites, to finding legal ways of fighting against
crypto-export laws in the mid-1990s, to CA infrastructures in the late
We found a way to legally export strong crypto from the US without
Government approval - we print it in books, he said. Thats how it got
Starlight Closes the Air Gap, The Age, 2 Feb 1999
MILITARY agencies have battled with the problem for decades; how to
create a system
which lets staff simultaneously use both classified and unclassified
networks all on
the same computer. Their search has just come to an end, thanks to
scientist Dr Mark Anderson, of the Defence Science and Technology
Export ban kills Nexus' WHO deal, The Age, 26 Jan 1999
THE directors of Sydney e-commerce software firm Nexus Solutions
Pty Ltd prepared to pop the champagne corks when they landed a
major deal to sell encryption products to the World Health
Organisation (WHO). They planned to celebrate the company's biggest
financial deal of the year and the fact that its strong crypto
product, NTrust, would be protecting people's private medical
records for a WHO worldwide database project.
Then everything fell apart.
Green light for limited crypto exports, The Age, 19 Jan 1999
A new international arrangement signed by the Government will make it
Australian companies to export IT products containing weak encryption.
However, the new Wassenaar Arrangement continues the ban on the export of
crypto-products without a Government permit, despite the growing demand
products from the e-commerce sector.
Named for the suburb of The Hague where the first guidelines were signed
Wassenaar is an arrangement between 33 countries to control the export of
Encryption keeps human rights group ahead of the military, The Age, 12 Jan 1999
Dodging hostile military patrols and trekking his way through steep
mountains in Guatemala, human rights worker Hugo Cabrera smuggled out
vital evidence of human rights abuses armed with only a laptop computer,
a good encryption program and solar panels.
Sex sells soap, so why not computers?, The Age, 18 Nov 1998
The simple outline on the laptop cover traces her midriff, down around
sides, to the middle of her thighs. She is full and soft, but
her curves, more Marilyn than Monica. And, there, in the lower half of
post-modernist, minimalist icon of femininity is - what else - an apple.
RMIT's industrial design program director David Lugton described the G3
"gorgeous", "rounded" the "most feminine notebook" he has ever seen.
And, he added,
"that is one very strategically placed apple".
Hack Stock / Three days of Fun, Sun and Breakins, The Australian, 4 Oct 1997
AT THE centre of the camp site lay a large black tombstone. On it was
engraved the name Bill Gates and this epitaph: "Where do you want to go
today?". Mock mourners paused for a moment's silence and, after raising
their glasses in a toast to Bill's demise, attached their own epitaphs to
the stone: "It seems Bill has signed the final nondisclosure agreement"
Hacker attacks up 400 percent, The Age, 5 Aug 1997
THE number of computer hacker attacks reported in Australia has more than
the past year compared to the same period in 1996, according to AUSCERT,
Australian Computer Emergency Response Team.
Much of the increase seems to be due to "script weenies" - unskilled or
hackers who use automated hacking programs.