Privacy, Security, Hoaxes, PC Performance - KU CIAS

hamburgerfensuckedSecurity

Nov 20, 2013 (4 years and 10 months ago)

2,863 views



















“The List”


P
r
ivacy

Cryptography

Ethical Hacking

Internet, Network, and Computer Security

Optimization

Critical Thinking

Distros


(with some other
interesting
stuff
thrown in)


View in Full Screen Reading



Be Legal

February 21, 2012

Be Ethical


Table of Contents


Information for Computer and Internet Privacy, Security, and Optimization



PAGE

1


Cyber Laws









PAGE
12


Cryptography

and Encryption







PAGE
23


Ethical Hacking









PAGE
30


Fact Checking,
Hoax, Scam, Virus Hoax
Sites







PAGE
54


Critical Thinking
--

How Thinking Goes Wrong






PAGE
5
8


Conspiracies/Secret Government








PAGE
61



Technology
Netcasts/Podcasts/Web Video







P
AGE
68


Keeping
Current









PAGE
69


Interesting
Blogs and Websites







PAGE
72


Various useful computer websites and free downloads

(Freeware and Shareware)


PAGE
81


Optimization
Fast Start Page


(First page of useful websites and free downloads
section)

PAGE

81


Free Alternatives to Microsoft Office







PAGE
82


V
irus and M
alware Information







PAGE
9
8



Network Tools









PAGE
102


Toolkits (Security, Forensics, Auditing)






PAGE
105


Bootable USB
Drive








PAGE
106


Distros (Run Toolkit or Operating System from CD

)





PAGE
107


Ultimate USB Key (
Article on
run
ning

apps from USB)





PAGE
113


Caution


Please use Safe Computing Practives.

Due to the nature of these websites, there is always the possibility of
some type
of hacking or malware attack. Many of these sites are used by Black Hats as
well as White Hats. Known good sites are obvious targets for phishing and
malware attacks.


Open the sites and download files at your own risk.


These are presented for

education purposes only.



Be Legal

February 21, 2012

Be Ethical


Some of the
listed w
ebsites present information which may be used
in violation
of
law
s
.


For White Hats Only.

Please be honest, ethical, and obey the law.



Remember t
he Software and Websites h
ave not been tested for safety.


Please use caution and safe practices
.


Use anti
-
malware and firewalls
.

You may want to use virualization for testing
.


EDUCATIONAL PURPOSES ONLY


Sites with
Safe Download Tips


http://www.microsoft.com/protect/

http://www.us
-
cert.gov/reading_room/

http://www.us
-
cert.gov/cas/tips/

http://www.microsoft.com/windows/ie/community/columns/protection.mspx

http:/
/factoidz.com/how
-
to
-
decide
-
if
-
free
-
software
-
is
-
safe
-
to
-
use
-
and
-
download/

http://cybercoyote.org/internet/download.shtml

http://w
ww.spamlaws.com/malware
-
protection.html


http://www.siteadvisor.com/

http://www.allthewebsites.org/malware_diagnostic.php

http://www.zdnet.com/blog/security/ie8
-
outperforms
-
competing
-
browsers
-
in
-
malware
-
protection
-
again/4072

http://community.spiceworks.com/education/projects/Virus,_Spyware_And_Malware_Protection

http://www.claymania.com/safe
-
hex.html

http://askthegeek.kennyhart.com/safe
-
computing
-
tips/

http://www.broadbandchoices.co.uk/safe
-
downloading.html

http://en.wikipedia.org/wiki/File_verification

(checksums)

Be Legal

February 21, 2012

Be Ethical

Page
1



Information for Computer and Internet Privacy, Security,

Hacki
nging

and Optimization

1.

General overview, evaluations and links

1.1.

Privacy Organizations

1.1.1.


ACLU
-

American Civil Liberties Union
http://www.aclu.org

1.1.2.


CDT
-

Center for Democracy and Technology
http://www.cdt.org


1.1.3.


CPI
-

Center for Public Integrity
http://www.publicintegrity.org

1.1.4.


CPSR
-

Computer Professi
onals for Social Responsibility
http://www.cpsr.org

1.1.5.


CFA
-

Consumer Federation of America
http://www.consumerfed.org

1.1.6.


Consumer Privacy Guide
http://www.consumerprivacyguide.org/


1.1.7.


CPT
-

Consumer Project on Technology
http://www.cptech.org

1.1.8.


Defend our Freedom
http://defendourfreedoms.or
g/

1.1.9.


EFF
-

Electronic Frontier Foundation
http://www.eff.org

1.1.10.


EPIC
-

Electronic Privacy Information Center

1.1.10.1.1.

http://www.epic.org

1.1.10.1.2.

http://www.epic.org/graphics/threat_levels.gif

(privacy threat level)

1.1.10.1.3.

http://epic.org/privacy/privacy_resources_faq.html

1.1.10.1.4.

http://www.epic.org/privacy/tools.html

(large list of tools)

1.1.11.


GILC
-

Global Internet Liberty Campaign
http://www.gilc.org

1.1.12.


IPC
-

Internet Privacy Coalition
http://www.epic.org/crypto/

1.1.13.


OPA
-

Online Privacy Alliance
http://www.privacyalliance.org

1.1.14.


Privacy International
http://www
.privacyinternational.org/

1.1.15.


PRC
-

Privacy Rights Clearinghouse
http://www.privacyrights.org

1.1.15.1.1.

http://www.privacyrights.org/ar/ChronDataBreache
s.htm

Data Breaches

1.1.16.


PIRG
-

U.S. Public Interest Research Group
http://www.pirg.org

1.1.17.


Privacy Net
http://privacy.net/

1.1.18.


Privacy.Org
http://www.privacy.org/

1.1.19.


Public Knowledge
http://www.publicknowledge.org/index.html


1.2.

General Information on Privacy and Security

1.2.1.

http://www.m
icrosoft.com/security/home/

1.2.2.

http://lrs.ed.uiuc.edu/wp/privacy/

(an educator’s guide to privacy)

1.2.3.

http://www.consumerprivacyguide.org/howto/

(consum
er guide to privacy)

1.2.4.

http://www.epinions.com/content_3150880900

1.2.5.

http://www.consumerprivacyguide.org/law/

(List of Laws)

1.2.6.

http://www.isoc.org/internet/law/

Guide to internet law

1.2.7.

http://www.readwriteweb.com/archives/data_in
_the_cloud_still_governed_by_obsolete_priva.php

1.2.8.

http://www.privacyrights.org/fs/

(Fact Sheets


see especially FS1 “Privacy Survival Guide”)


1.2.9.

http://www.cexx.or
g/adware.htm

1.2.10.

http://www.firewallguide.com/

1.2.11.

http://www.bordc.org/resources/sources.php


1.2.12.

http://www.pcworld.com/resource/article/0,aid,92895,00.asp

(article on taking back privacy)

1.2.13.

http://www.webopedia.com/TERM/f/firewall.html

1.2.14.

http://www.interhack.net/pubs/fwfaq/

1.2.15.

http://www.aclu.org/Privacy/PrivacyMain.cfm


1.2.16.

http:/
/www.vericheckinfo.com/Privacy.htm


1.2.17.

http://www.vortex.com/privacy.html


1.2.18.

http://www.vicomsoft.com/knowledge/reference/firewalls1.html

1.2.19.

http://www.jehtoday.net/security/

Freeware Security Tools

1.2.20.

ht
tp://money.cnn.com/2005/05/11/pf/security_privacyadvocate_wish/

(article)

1.2.21.

http://www.zdnet.com/


(use the search box to find the software or articles)

1.2.22.

http://www.pcmag.com/


(search for reviews or articles)

1.2.23.

http://www.pcworld.com/

(search for reviews or articles)

1.2.24.

http://directory.google.com
/Top/Society/Issues/Human_Rights_and_Liberties/Privacy/

(list)

1.2.25.

http://www.techtv.com/screensavers/

(search for info or links)

1.2.26.

http://compnetworking.about.com/od/networksecurityprivacy/l/aa071900a.htm

(Carnivore)

1.2.27.

http://computer.howstuffworks.com/carnivore.htm

(Carnivore)

1.2.28.

http://en.wikipedia.org/wiki/ECHELON

(Echelon)

1.2.29.

http://echelononline.free.fr/documents/dc/inside_echelon.htm

(Echelon)

Be Legal

February 21, 2012

Be Ethical

Page
2

1.2.30.

http://en.wikipedia.org/wiki/USA_PATRIOT_Act

(Patriot Act)

1.2.31.

http://www.sitejabber.com/blog/2011/02/03/a
-
privacy
-
bill
-
of
-
rights/

Proposal for a privacy bill of rights

1.2.32.

http://www.pcworld.com/article/id,126083;page,1;c,privacysecurity/article.html

Ten Biggest Security Risks (June
2006 PC Wo
rld)

1.2.33.

http://www.businessintelligencelowdown.com/2007/02/the_top_ten_pri.html

Top 10 Big Brother Companies:
Ranking the Worst Consumer Privacy Infringers

1.2.34.

http://www.worldsbiggests.com/2010/02/top
-
10
-
largest
-
databases
-
in
-
world.html

1.2.35.

http://www.freerepublic.com/fo
cus/f
-
chat/2508670/posts

1.2.36.

http://weblogs.asp.net/pleloup/archive/2003/12/15/43693.aspx

1.2.37.

http:
//www.businessintelligencelowdown.com/2007/02/top_10_largest_.html

Top 10 Largest Databases in the
World

1.2.38.

http://bencraigo.wordpress.com/2007/02/22/these
-
are
-
not
-
the
-
10
-
largest
-
databases
-
in
-
the
-
world/


1.3.

Nothing to hide argument

1.3.1.

http://www.cs.drexel.edu/~greenie/privacy/solove.pdf

Essay by Law Professor
Daniel Solove

1.3.1.1.

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565

Another link to above

1.3.2.

http://www.schneier.com/blog/archives/2007/07/privacy_and_the.html

Schneier reference to above

1.3.3.

http://docs.law.gwu.edu/facweb/dsolove/Nothing
-
to
-
Hide/index.html

Book by Solove

1.3.4.

http://chronicle.com/article/Why
-
Privacy
-
Matters
-
Even
-
if/127461/

1.3.5.

http://www.schneier.com/essay
-
114.html

Bruce Schneier

1.3.6.

http://www.schneier.com/blog/archives/2008/10/chinese_monitor.html

1.3.7.

http://www.concurringopinions.com/archives/2011/05/nothing
-
to
-
hide
-
the
-
false
-
tradeoff
-
between
-
privacy
-
and
-
security.html

1.3.8.

http://blog.tech
-
and
-
law.com/2009/12/bruce
-
schneier
-
on
-
future
-
of
-
privacy.html

Video

1.3.9.

http://www.ted.com/talks/bruce_schneier.htm
l

Schneier on Ted

1.3.10.

http://nothingtohide.us/who
-
has
-
nothing
-
to
-
hide/

Blog

1.3.11.

http://www.thegeekprofessor.com/guides/privacy/nothing
-
to
-
hide/

1.3.12.

http://www.schneier.com/blog/archives/2009/12/my_reaction_to.html

1.3.12.1.

http://smarterware.org/4009/bruce
-
schneier
-
responds
-
to
-
google
-
ceo
-
eric
-
schmidt
-
on
-
privacy

1.3.12.2.

http://techland.time.com
/2010/08/03/counterspy
-
nothing
-
to
-
hide/

1.3.12.3.

http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886

1.3.12.4.

http://www.homelandstupidity.us/2006/05/14/if
-
you
-
have
-
nothing
-
to
-
hide
-
you
-
have
-
everything
-
to
-
fear/

1.3.12.5.

http://www.zdnet.com/blog/igeneration/privacy
-
is
-
innately
-
flawed
-
nothing
-
to
-
hide
-
does
-
not
-
exist/9577

1.3.12.6.

http://www.businessweek.com/news/2010
-
06
-
09/facebook
-
founder
-
has
-
nothing
-
to
-
hide
-
except
-
privacy
-
blind
-
spot.html

1.3.12.7.

http://www.freerepublic.com/focus/f
-
news/1863889/posts


1.4.

Why you

should never talk to the police

(Fifth Amendment)

1.4.1.

http://www.youtube.com/watch?v=i8z7NC5sgik&feature=player_embedded

1.4.2.

http://www.youtube.com/watch?v=08fZQWjDVKE&NR=1

1.4.3.

http://legallad.quickanddirtytips.com/the
-
fifth
-
amendment.aspx

1.4.4.

http://www.time.com/time/magazine/article/0,9171,893044,00.html

(1955)

1.4.5.

http://en.wikipedia.org/wiki/Miranda_warning

Miranda v. Arizona, 384 U.S. 436, 477 (1966).

1.4.6.

http://comparativelawblog.blogspot.com/2010/05/public
-
safety
-
exception
-
to
-
miranda.html

1.4.7.

http://nationalparalegal.edu/conlawcrimproc_public/PoliceInterrogation/WaivingFifthAmend.asp



1.5.

Real ID

1.5.1.

http://en.wikipedia.org/wiki/REAL_ID_Act

1.5.2.

http://www.schneier.com/blog/archives/2005/05/real_id.html

1.5.3.

http://news.cnet.com/8301
-
31921_3
-
20039568
-
281.html

1.5.4.

http://www.dhs.gov/files/laws/gc_1172765386179.shtm


1.5.5.

http://www.networkworld.com/community/blog/rea
l
-
id
-
dhs
-
national
-
id
-
nightmare
-
keeps
-
cropp

1.5.6.

http://epic.org/privacy/id_cards/

1.5.7.

http://www.eff.org/issues/real
-
id

1.5.8.

http://www.ncsl.org/default.aspx?tabid=13577

1.5.9.

http://www.realnightmare.org/

1.5.10.

http://en.wikipedia.org
/wiki/PASS_ID


1.6.

Social Security Account Number

1.6.1.

http://en.wikipedia.org/wiki/Social_Security_number


1.6.2.

http://www.privacyrights.org/fs/fs10
-
ssn.htm


1.6.3.

http://epic.org/privacy/ssn/

Be Legal

February 21, 2012

Be Ethical

Page
3

1.6.4.

http://cpsr.org/prevsite/cpsr/privacy/ssn/ssn.faq.html/



1.6.5.

http://www.ssa.gov/pubs/idtheft.htm

1.6.6.

http://proagency.tripod.com/usasssearch.html

1.6.7.


http://steve
morse.org/ssn/ssn.html

Tool to locate when and where issued

1.6.8.

http://www.attackvector.org/social
-
security
-
number
-
format/

Number Format

1.6.9.


http://www.esia.net/Social_Security_Numbers.htm

Changing your SS number

1.6.10.

http://wiki.answers.com/Q/How_Can_i_change_my_social_security_number



1.7.

Credit
Reports
,
Credit Score
, and personal information reports (medical, employment, residence history, insurance,
lawsuits,
criminal history,
etc.)

1.7.1.

https://w3.lexis.com/consumeracces
s2.0/sample/person_report.htm

S
ample comprehensive report from LexisNexis

1.7.1.1.

https://knowx.com/

LexisNexis product which makes public records available to the general public over the
Internet.

1.7.1.2.

http://accurint.com/

The most widely accepted locate
-
and
-
research tool available to government, law
enforcement and commercial customers.

1.7.2.

http://www.privacyrights.org/Credit
-
and
-
Credit
-
Reports

1.7.2.1.

http://www.privacyrights.org/fs/fs6
-
crdt.htm

1.7.2.2.

http://www.privacyrights.o
rg/fs/fs6b
-
SpecReports.htm

Speciality reports

1.7.2.3.

http://www.privacyrights.org/fs/fs16
-
bck.htm

Employment background checks

1.7.2.4.

http://www.pr
ivacyrights.org/fs/fs26
-
CLUE.htm

Insurance report (CLUE)

1.7.2.5.

http://www.privacyrights.org/Debt
-
Collection

debt collection

1.7.3.

http://www.eff.org

1.7.3.1.

http://w2.eff.org/Privacy/Credit_financial/credit_report.kit

1.7.3.2.

https://ssd.eff.org/


1.7.4.

https://personalreports.lexisnexis.com/index.jsp

LexisNexis personal reports (maintains a number of reports


some free and some for a small fee



ChoiceTrust is now part of LexisNexis
)

1.7.5.

http
://en.wikipedia.org/wiki/Background_check

1.7.6.

http://en.wikipedia.org/wiki/Criminal_record_check



1.7.7.

http://en.wikipedia.org/wiki/National_Instant_Criminal_Background_Check_System


1.7.8.

http://en.wikipedia.org/wiki/National_Driver_Register


1.7.9.

http://www.iso.com/Products/A
-
PLUS/Consumers
-
Order
-
Your
-
Free
-
A
-
PLUS
-
Loss
-
History
-
Report.html

A
-
Plus
Insurance Report

1.7.10.

www.mib.com

The Medical Information Bureau (M
IB)

1.7.11.

http://www.ingenix.com/

Medpoint (prescription drug purchase
)

1.7.12.

http://www.rxhistories.com/

IntelliScript

(prescription drug purchase
)

1.7.13.

http://www.fadvsaferent.com/consumer_relations/contact_cr/index.php

tenent history report
-

also from
LexisNexis

1.7.14.

https://www.consumerdebit.com/consumerinfo/us/en/chexsystems/report/index.htm

Check writing history


1.7.15.

http://www.telecheck.com/home/index.htm

Check writing history

1.7.16.

http://www.firstdata.com/en_us/home

Services to business

1.7.17.

http://www.theworknumber.com/Employees/datareport.asp

employment data report

1.7.18.

http://money.howstuffworks.com/credit
-
report.htm

1.7.19.

http://money.howstuffworks.com/personal
-
finance/debt
-
management/credit
-
score.htm

1.7.20.

http://clarkhoward.com/shownotes/category/7/

1.7.21.

http://www.frbsf.org/publications/consumer/creditreport.html

1.7.22.

http://wiki.fool.com/FICO_score

Credit Score

1.7.23.

http://en.wikipedia.org/wiki/Credit_
score

Credit Score

1.7.24.

http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre34.shtm

Credit Report Information
-

Federal Trade
Commission with warning about “imposter” websites

1.7.24.1.

http://www.ftc.gov/bcp/menus/consumer/credit/rights.shtm

FTC

1.7.24.2.

http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt156.shtm

FTC

1.7.25.

https://www.annualcreditreport.com/cra/index.jsp

Does not include credit score

1.7.25.1.

http://
www.experian.com/

Credit Reporting Agency

1.7.25.2.

http://www.equifax.com/

Credit Reporting agency

1.7.25.3.

http://www.transunion.com/index.jsp

Credit Reporting Agenc
y

1.7.25.4.

https://www.innovis.com/InnovisWeb/pers_personalServices.html

Innovis (4th agency
-

not as big as the big
three)

1.7.26.


http://publications.usa.gov/USAPubs.php?PubID=3116

Building a Better Credit Report


1.7.27.

http://loan.yahoo.com/c/

Managing you credit history

1.7.28.

http:/
/www.hsh.com/pamphlets/credit_errors_dispute.html

Disputing Errors

1.7.29.

http://www.bbb.org/us/article/ftc
--
credit
-
reports
-
what
-
information
-
providers
-
n
eed
-
to
-
know
-
4401

1.7.30.

http://ezinearticles.com/?Instant
-
Criminal
-
History
-
Check&id=4034513

Be Legal

February 21, 2012

Be Ethical

Page
4

1.7.31.

http://www.fbi.gov/hq/cjisd/fprequest.htm

FBI

1.7.31.1.

http://www.fbi.gov/hq/cjisd/ncic.htm


1.7.32.

http://www.justice.gov/olp/ag_bgchecks_report.pdf


1.7.33.

http://govrecordsregistry.org/

1.7.34.


http://www.governmentregistry.org/

1.7.35.

http://www.criminalbackgroundrecord
s.com/



1.7.36.


http://criminalsearches.com/

1.7.37.

http://publicrecordssearchonline.org/

1.7.38.

http://www.discreetresearch.com/





1.8.

Do not c
all
, email, fax directories

1.8.1.

https://www.donotcall.gov/


(Home or Mobile Phone


does not expire)

1.8.2.

http://www.fcc.gov/cgb/donotcall/

1.8.3.

http://www.the
-
dma.org/government/donotcalllists.shtml

1.8.4.

http://urbanle
gends.about.com/library/bl_cell_phone_directory.htm


1.8.5.

http://www.realtor.org/libweb.nsf/pages/fg707


field guide to do not call, fax, email

1.8.6.

http://www.yellowpagesoptout.com/homepage

Yellow pages opt
-
out


1.9.

Social Engineering, fraud, scams, phishing, pharming, vishing, identity theft
)

1.9.1.

http://en.wikipedia.org/wiki/Certified_Social_Engineering_Prevention_Specialist


1.9.2.

http://en.wikipedia.org/wiki/Psychological_manipulation

1.9.3.

http://www.sans.org/rr/whitepapers/engineering/

1.9.4.

http://www.social
-
engineer.org/

1.9.4.1.

http://www.social
-
enginee
r.org/framework/Social_Engineering_Framework

1.9.5.

http://www.symantec.com/connect/es/articles/social
-
engineering
-
fundamentals
-
part
-
i
-
hacker
-
tactics

Social
Engineering hacking tactics

1.9.6.

http://www.securitytube.net/video/1322


1.9.7.

http://hackapc.com/complete
-
tutorial
-
on
-
social
-
engineering.html


1.9.8.

Free an
http://www.antionline.com/showthread.php?t=230752


1.9.9.

http://www.gamerzplanet.net/forums/tech
-
support/356366
-
social
-
engineering.html


1.9.10.

http://www.antiphishing.org/

1.9.11.

http://labmice.techtarget.com/security/socialengineering.htm

1.9.12.

http://www.technewsworld.com/rsstory/54867.html?wlc=1285348701

Pretexting

1.9.13.

http://mcmkm.wordpress.com/2007/03/06/security
-
phishing
-
pretexting/

Links in article

1.9.14.

http://socialware.ru/

1.9.15.

http://vimeo.com/spylabs

videos on social engineering

1.9.16.

http://video.google.com/videoplay?docid=
-
2160824376898701015#


1.9.17.

http://www.jocktoday.com/2010/02/08/social
-
engineering
-
manipulating
-
caller
-
id/


1.9.18.

http://www.msnbc.msn.com/id/2
1566341/

striptease scam

1.9.19.

http://compnetworking.about.com/sitesearch.htm?terms=social%20engineering&SUName=compnetworking&Top
Node=3123&type=1

About.com links

1.9.20.

http://cybercrimes.net/Property/Hacking/Social%20Engineering/PsychSocEng/PsySocEng.html

1.9.21.

http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208803634

baiting

1.9.22.

http
://www.us
-
cert.gov/cas/tips/ST04
-
014.html

1.9.23.

http://www.enigmasoftware.com/stop
-
top
-
5
-
hidden
-
computer
-
security
-
threats/



1.9.24.

http://www.isoc.org/isoc/conferences/inet/99/proceedings/3g/3g_2.htm

1.9.25.

http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt

1.9.26.

http://www.kuro5hin.org/story/2004/6/3/223758/2267

1.9.27.

http://www.professionalsecuritytesters.org/Documents/phishing/phishing.pdf

1.9.28.

http://www.simovits.com/archive/socialeng.pdf

1.9.29.

http://www.cyveill
ance.com/default.asp


1.9.30.

http://www.privacyrights.org/identity.htm

Privacy Rights Clearinghouse

1.9.31.

http://www.privacyrights.org/fs/fs17a.htm

1.9.32.

http://www.identitytheft.org/

1.9.33.

http://www.fightidentitytheft.com/

1.9.34.

http://www.rlrouse.com/identity
-
theft.ht
ml

How to protect yourself from Identity Theft

1.9.35.

http://www.pcworld.com/howto/article/0,aid,110162,00.asp

Avoid Identity Theft Article

1.9.36.

http://www.ssa.gov/pubs/idtheft.htm

1.9.37.


http://clarkhoward.com/shownotes/category/6/

Scams and Ripoffs

1.9.38.


http://clarkhoward.com/shownote
s/category/8/

Computer crimes and scams

1.9.39.

http://www.mint.com/blog/consumer
-
iq/now
-
read
-
this
-
5
-
sites
-
every
-
smart
-
consumer
-
should
-
bookmark/

5 sites
every smart comsumer should bookmark

Be Legal

February 21, 2012

Be Ethical

Page
5

1.9.40.

http://computer.howstuffworks.com/identity
-
theft.htm


1.9.41.

http://www.bos.frb.org/consum
er/identity/


1.9.42.

http://www.bbbonline.org/idtheft/index.asp

(Quiz to access safety)

1.9.43.

http://www.privcom.gc.ca/fs
-
fi/02_05_d_10_e.asp

Cana
da

1.9.44.

http://security4information.blogspot.com/search?updated
-
min=2010
-
01
-
01T00%3A00%3A00
-
06%
3A00&updated
-
max=2011
-
01
-
01T00%3A00%3A00
-
06%3A00&max
-
results=8

phishing tutorial part 1

1.9.45.

http://vimeo.com/19016634

phishing tutorial part 2

1.9.46.

http://toolbar.netcraft.com/

Anti
-
phishing toolbar

1.9.47.

http://www.microsoft.com/protect/fraud/phishing/symptoms.aspx


1.9.48.

http:/
/www.channelregister.co.uk/2006/07/13/2
-
factor_phishing_attack/


1.9.49.


http://www.cio.com/blog_view.html?CID=23011

invisible rootkit

1.9.50.


http://www.ngsconsulting.com/papers/ThePharmingGuide.pdf

1.9.51.

http://www.earthlink.net/software/free/toolbar


1.9.52.

http://www.usatoday.com/tech/news/internetprivacy/2006
-
07
-
11
-
data
-
mining_x.htm?csp=34

Data Mining

1.9.53.

http://www.usatoday.com/tech/news/i
nternetprivacy/2006
-
07
-
12
-
vishing
-
scam_x.htm?csp=34

vishing

1.9.54.

http://mensnewsdaily.com/2006/07/11/top
-
10
-
cities
-
to
-
have
-
your
-
identity
-
stolen/

1.9.55.

http://www.informationweek.com/story/showArticle.jhtml?articleID=190301898&cid=RSSfeed_IWK_All

FBI
Warns Job Hunters Of Online Scams

1.9.56.

http://www.channelregister.co.uk/2006/07/13/2
-
factor_phishing_attack/

Phishers rip into two
-
factor authentication

1.9.57.

http://www.pcmag.com/article2/0,1895,1981797,00.asp

Vishing

1.9.58.

http://www.infosecwriters.com/text_resources/pdf/IBM_ISS_vishing_guide_GOllmann.pdf

IBM vishing
guide

1.9.59.

http://www.onguardonline.gov/topics/phishing.aspx

tips from the government

1.9.60.

http://www.ftc.gov/bcp/edu/pubs/c
onsumer/alerts/alt127.shtm

FTC

1.9.61.

http://www.bankinfosecurity.com/articles.php?art_id=2457


1.9.62.

http://blogs.consumerreports.org/money/2010/09/phishing_vishing_smishing_scams_community_banks_credit_uni
ons_cybercrime.html


1.9.63.

http://www.
govinfosecurity.com/articles.php?art_id=2896


1.9.64.


http://en.wikipedia.org/wiki/Social_engineering_(security)

1.9.64.1.

http://en.wikipedia.org/wiki/Category:Computer_security_exploits


1.9.65.

http://en.wikipedia.org/wiki/Confidence_trick


1.9.66.

http://en.wikipedia.org/wiki/List_of_confidence_tricks


1.9.67.

http://en.wikipedia.org/wiki/Pharming

1.9.68.

http://en.wikipedia.org/wiki/Page_hijacking

1.9.69.

http://en.wikipedia.org/wiki/DNS_cache_poisoning


1.9.70.

http://en.wikipedia.org/wiki/SMiShing

SMiShing

1.9.71.

http://en.wikipedia.org/wiki/Scareware

1.9.72.

http://en.wikipedia.org/wiki/Vishing

1.9.73.

http://vil.nai.com/vil/hoaxes.aspx


1.9.73.1.

http://en.wikipedia.org/wiki/Ransomware_(malware)

1.9.73.2.

http://www.symantec.com/norton/theme.jsp?themeid=mislead

misleading applications


1.10.

Geotagging

1.10.1.

http://en.wikipedia.org/wiki/Geotagging

1.10.2.

http://en.wikipedia.org/wiki/Real
-
time_geotagging

1.10.3.

http://www.eye.fi/how
-
it
-
works/features/geotagging

1.10.4.

http://dmna.state.ny.us/members/geotagging.pdf

Army PP on protecting unit safety

1.10.5.

http://news.cnet.com/8301
-
13556_3
-
9803769
-
61.html

1.10.6.

http://www.wired.com/gadgetlab/2008/05/how
-
to
-
geotag
-
y/

How to

1.10.7.

http://geotag.sourceforge.net/

Geotag (open source software)

1.10.8.

http://icanstalku.com/how.php

ways to disable

1.10.9.

http://www.geotagsecurity.com/

geotag security software


1.11.

Social Media and Privacy

1.11.1.

http://www.nytimes.com/2010/03/17/technology/17privacy.html?_r=1&scp=1&sq=how%20privacy%20can%20van
ish%20steve%20lohr
&st=cse

How Privacy Vanish
es

Onl
ine

1.11.2.

http://gigaom.com/collaboration/are
-
privacy
-
and
-
social
-
networking
-
incompatible
/

1.11.3.

http://www.markevanstech.com/2010/02/21/the
-
dark
-
side
-
of
-
social
-
media
-
and
-
privacy/

1.11.4.

http://www.huffingtonpost.com/robert
-
siciliano/social
-
media
-
privacy
-
and_b_245857.html

1.11.5.


http://epic.org/privacy/socialnet/

1.11.6.

http://www.zdnet.com/blog/feeds/toeing
-
the
-
line
-
between
-
privacy
-
and
-
social
-
media/2663

1.11.7.

http://www.blogherald.com/2010/05/21/social
-
media
-
privacy
-
scandal
-
revealed/

1.11.8.

http://www.pcworld.com/article/203444/how_to_spot_facebook_scams_like
_dislike.html?tk=rel_news

Be Legal

February 21, 2012

Be Ethical

Page
6

1.11.9.

http://www.allfacebook.com/facebook
-
privacy
-
2009
-
02

1.11.10.

http://www.pcworld.com/article/159738/5_facebook_schemes_that_threaten_your_privacy.html?tk=rel_news

1.11.11.

http://radar.oreilly.com/2010/06/privacy
-
social
-
media
-
and
-
busin
.html

1.11.12.

http://www.nten.org/blog/2010/04/28/social
-
media
-
and
-
privacy
-
best
-
practices
-
managing
-
your
-
personal
-
and
-
prof
essional
-
identities

1.11.13.

http://www.ignitesocialmedia.com/social
-
media
-
and
-
personal
-
privacy/

1.11.14.

http://www.pcworld.com/article/140182/facebooks_beacon_more_intrusive_than_previously_thought.html


1.12.

Biometrics

1.12.1.

http://en.wikipedia.org/wiki/Biometrics


1.12.2.

http://www.informationweek.com/story/showArticle.jhtml?articleID=190301179&cid=R
SSfeed_IWK_All


1.12.3.

http://www.silicon.com/financialservices/0,3800010322,39160561,00.htm

Article on biometric spoofing


1.13.

Find People, reverse directories, maps, satellite ima
ges
, potential OPSEC

1.13.1.

www.fas.org

1.13.2.

http://www.gsinstitute.org/


1.13.3.


http://www.janes.com/

1.13.4.

http://www.defensenews.com/


1.13.5.

http://www.cdi.org/


1.13.6.


http://www.strategypage.com/

1.13.7.

http://www.isis
-
online.org/


1.13.8.

http://www.military.com/


1.13.9.

www.globalsecurity.org

1.13.10.

www.digitalglobe.com


1.13.11.

http://www.mapquest.com/

maps

1.13.12.

http://www.bing.com/maps


maps

(aerial bird’s eye view for many locations


very detailed
)

1.13.13.

http://maps.google.com/maps

maps (street view for many locations)

1.13.14.

http://earth.google.com/

Google Earth

1.13.15.

http://maps.yahoo.com/

maps

1.13.16.

http://www.multimap.com/

maps

1.13.17.

http://www.randmcnally.com/

maps

1.13.18.

http://www.mapsonus.com/

maps

1.13.19.

http://www.topozone.com/

E
very USGS topographic map, orthophotomap,

and aerial photograph in the entire
United States

1.13.20.

http://worldwind.arc.nasa.gov/

Landsat satellite imagery

1.13.21.

http://worldwindcentral.com/wiki/Main_page


1.13.22.

http://www.terraserver.com/

1.13.23.

http://www.digitalglobe.com/


1.13.24.

http://www.census.gov/epcd/www/zipstats.html


1.13.25.

http://www.zipinfo.com/search/zipcode.htm


1.13.26.

http://www.zipwise.com/

distance between zipcodes

1.13.27.

http:/
/www.escapeartist.com/global10/zip.htm

Country Codes

1.13.28.

http://www.zip
-
codes.com/


1.13.29.

http://zipcodes.addresses.com/zip_code_lookup.php


1.13.30.

http://www.usc.edu/dept/source/zipcode/

wealthy zip codes

1.13.31.

http://www.epa.gov/epahome/whereyoulive.htm


1.13.32.

http://www.whitepages.com/10001/area_codes


1.13.33.

http://en.wikipedia.org/wiki/Zip_code


1.13.34.

http://www.esribis.com/reports/ziplookup.html


1.13.35.

http://library.csun.edu/mfinley/zipstats.html

Zipcode information

1.13.36.

http://benfry.com/zipdecode/


pinpoint zipcodes

1.13.37.

http://www.backgroundsonline.com/

1.13.38.

http://www.lexisnexis.com/risk/

(Choicepoint is now part of Lexisnexis)

1.13.39.

http://www.zabasearch.com/

Search for people

or phone number

1.13.40.

http://www.peoplefinders.com/

Search for people

1.13.41.

http://www.pipl.com

Search people on the deep web

1.13.42.

http://www.spokeo.com

Provides additional information

1.13.43.

http://www.fullnamedirectory.com/

Full name directory

1.13.44.

http://www.peoplesearch.com

1.13.45.

http://www.privateeye.com/?from=P1069&vw=people

Pay Site

1.13.46.

http://www.ussearch.com/consumer/index.jsp


1.13.47.

http://proagency.tripod.com/profive.html


Be Legal

February 21, 2012

Be Ethical

Page
7

1.13.48.

http://www.researchingtools.com/


1.13.49.

http://www.knowx.com/

Lots of information $

1.13.50.

http://www.monash.com/people.html

“How to”

1.13.51.

http://www.nettrace.com.au/resource/search/people.html

Large Listing of searches

1.13.52.

http://www.google.co
m

1.13.53.


http://www.reversephonedirectory.com/lookup2.htm

Reverse phone

1.13.54.


http://www.criminalcheck.com/

one
-
click search of sex offender databases

1.13.55.

http://www.publicdata.com/


1.13.56.

http://www.usps.com/ncsc/ziplookup/lookupmenu.htm

1.13.57.


http://zip.langenberg.com/

1.13.58.


http://www.melissadata.com/lookups/

Free Lookups

1.13.59.

http://sfgate.com/cgi
-
bin/article.cgi?f=/c/a/2006/07/09/BIGMOTHER.TMP

Parents track kids

1.13.60.

http://wikileaks.org/



1.14.

Search Engines

1.14.1.

http://en.wikipedia.org/wiki/List_of_search_engines

List of search engines (by category)

1.14.2.

http://websearch.about.com/library/searchengine/blsearchenginesatoz.htm


1.14.3.

http://computer.howstuffworks.com/internet/basics/search
-
engine.htm

1.14.4.

http://websearch.about.com/od/crawlersrobotsspiders/a/spdirs.htm

spiders

1.14.5.

http://websearch.about.com/od/enginesanddirectories/a/searchengine.htm


1.14.6.

http://searchenginewatch.com/

1.14.7.

http://www.searchenginecolossus.com/

International directory of search engines

1.14.8.

http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/SearchEngines.html


1.14.9.

http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/MetaSearch.html



1.14.10.

http://www.consumersearch.co
m/search
-
engine
-
reviews


1.14.11.

http://websearch.about.com/od/enginesanddirectories/tp/search
-
engine
-
list.htm

Search engine directories

1.14.12.

http://websearch.about.com/library/tableofcontents/blsearchenginetableofcontents.htm

100 search engines in
100 days

1.14.13.

http://searchengineland.co
m/

1.14.14.


http://en.wikipedia.org/wiki/Search_engine_optimization


1.14.15.

http://www.addpro.com/

SEO


1.14.16.

htt
p://www.searchengineshowdown.com/

(last updated 2007)

1.14.17.

http://www.zabasearch.com

People

1.14.18.

http://www.pipl.com/

Deep people search

1.14.19.

http://www.allsearchengines.com/

1.14.20.

http://www.allsearchengines.com/complete.html

Large Listing

1.14.21.

ht
tp://www.noodletools.com/debbie/literacies/information/5locate/adviceengine.html


1.14.22.

http://www.cyndislist.com/search.htm

Geneology search engines

1.14.23.

http://www.academic
-
genealogy.com/topsearchenginesdirectories.htm

1.14.24.

http://www.archives.gov/st
-
louis/military
-
personnel/

Military personnel Records


1.14.25.

http://www.startpage.com/eng/protect
-
privacy.html

1.14.26.

http://www.ixquick.com/

Search engine that does not record y
our IP address

1.14.27.

http://en.wikipedia.org/wiki/Ixquick

1.14.28.

http://www.beaucoup.com/
the ultimate source of free information

1.14.29.

http://www.kartoo.com/

1.14.30.

http://swicki.eurekster.com/

1.14.31.

http://www.wordstream.com/articles/google
-
privacy
-
internet
-
privacy

Infograph
ic

1.14.32.

http://www.eff.org/wp/six
-
tips
-
protect
-
your
-
search
-
privacy


1.14.33.

http://www.informationweek.com/news/internet/search/showArticle.jhtml?articleID=178600222

Five Ways to
Keep Your Google Searches Private

1.14.34.

http://www.freenet.org.nz/misc/google
-
privacy.html

P
rotect Your Privacy from Google

1.14.35.


http://news.com.com/2100
-
1025_3
-
6103486.html?part=rss&tag=6103486&subj=news

Protecting yourself from
search engines

1.14.36.

http://news.cnet.com/2100
-
1029_3
-
6202068.html

How search engines rate on

privacy

1.14.37.

http://www.yauba.com/


P
rivacy safe,real
-
time search engine

1.14.38.

http://www.aafter.com/

Pracy guaranteed web search

1.14.39.

http://www.nndb.com/

Notable Names Database

1.14.40.

http://www.publicdata.com/

Public Data

1.14.41.

http://msdn.microsoft.com/en
-
us/library/cc848862(VS.85).aspx


1.14.42.

http://www.google.com

1.14.42.1.1.1.

http://www.g
oogle.com/instant/


1.14.43.

http://www.yahoo.com

Be Legal

February 21, 2012

Be Ethical

Page
8

1.14.44.

http://www.dogpile.com

1.14.45.

http://www.metacrawler.com/


1.14.46.

http://www.altavista.com/


1.14.47.

http://www.alltheweb.com/




1.14.48.

http://search.creativecommons.org/



1.14.49.

http://mooter.com/

1.14.50.

http://searchengine.com/index.asp


1.14.51.

http://duckduckgo.com/



1.14.52.

http://www.ask.com/

1.14.53.

http://www.bing.c
om

1.14.54.

http://www.viewzi.com/


1.14.55.

http://beta.spezify.com/spezify.swf


1.14.56.

http://www.oskope.com/

1.14.57.

http://www.mamma.com/



1.14.58.

http://search
-
cube.com/

1.14.59.

http://www.wolframalpha.com/


Computational knowledge engine

1.14.59.1.1.1.

http://www.wolframalpha.com/examples/

1.14.60.

http://www.mahalo.com/

Human Search Engine

1.14.61.

http://www.ufoseek.com/

UFO Paranormal search engine

1.14.62.

http:/
/www.cuil.com/

the automated encyclopedia

1.14.63.

http://computer.howstuffworks.com/internet/basics/wolfram
-
alpha.htm


1.14.64.

http://www.wolframalpha.com/


computational knowledge engine

1.14.65.


http://quinturakids.com/

Search engine for kids

1.14.66.

http://www.cyndislist.com/search.htm

Geneology search engines

1.14.67.

http://www.academic
-
genealogy.com/topsearchenginesdirectories.htm


1.14.68.

http://www.bing.com/visualsearch

Visual Search

1.14.69.

http://www.techtified.com/2009/12/12
-
inspiring
-
visual
-
search
-
engines/

Visual Search Engines

1.14.70.

http://www.masternewmedia.org/top
-
visual
-
search
-
engines
-
the
-
most
-
interesting
-
ways
-
to
-
visually
-
explore
-
search
-
engine
-
results/

1.14.71.

http://gigaom.com/collaboration/for
-
visual
-
searches
-
try
-
a
-
few
-
different
-
approaches/

1.14.72.

http://www.shambles.net/pages/learning/infolit/vissearch/

Visual Search

1.14.73.

http://economictimes.indiatimes.com/infotech/int
ernet/Google
-
buys
-
visual
-
search
-
engine
-
Likecom/articleshow/6391362.cms


1.14.74.

http://www.tineye.com/

Reverse Image
Searc
h which

finds out where an image came from, how it is being used,
if modified versions of the image exi
st, or if there is a higher resolution version

1.14.75.

http://www.google.com/imghp

Google image search


1.15.

The Bubble Filter

(search engines personalize your results)

1.15.1.



http://www.thefilterbubble.com/

1.15.2.



http://blog.louisgray.com/2011/05/why
-
filter
-
bubble
-
is
-
no
-
bubble
-
and
-
its.html


1.15.3.



http://dontbubble.us/

1.15.4.



http://donttrack.us/


1.15.5.



http://duckduckgo.com/


1.15.6.



http://searc
hengineland.com/duckduckgo
-
sets
-
new
-
traffic
-
record
-
109275


1.15.7.



http://www.searchenginejournal.com/the
-
google
-
filter
-
bubble
-
and
-
its
-
problems/29879/


1.15.8.



http://www.wired.com/epicenter/2012/01/google
-
filter
-
bubble/



1.15.9.



http://www.seroundtable.com/google
-
search
-
bubble
-
response
-
13591.html

1.15.10.

http://www.computerworld.com/s/article/9216484/Elgan_How_to_pop_your_Internet_
filter_bubble_

1.15.11.

http://www.pcworld.com/article/247835/googles_search_plus_your_world_what_it_means_for_users.html

1.15.12.

http://gplussearch.com/

1.15.13.

http://www.wired.com/epicenter/2012/01/gpsf/




1.16.

Hidden Web (Invisible Web, Deep web)

1.16.1.

http://library.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html


1.16.2.

http://www.deepwebresearch.com/

Deep Web Rese
arch
2011
, lots of links

1.16.3.

http://library.laguardia.edu/invisibleweb

Beyond

Google: The invisible Web

1.16.3.1.

http://library.laguardia.edu/invisibleweb/graphics

Graphics

1.16.4.

http://websearch.about.com/od/deepwebsearchengines/Invisible_Web_Search_Engines.htm

1.16.5.

http://en.wikipedia.org/wiki/Deep_Web

1.16.6.

http://en.wikipedia.org/wiki/Dark_Internet

1.16.7.

http:/
/en.wikipedia.org/wiki/Darknet_(file_sharing)

Be Legal

February 21, 2012

Be Ethical

Page
9

1.16.8.

http://quod.lib.umich.edu/cgi/t/text/text
-
idx?c=jep;view=text;rgn=main;idno=3336451.0007.104


1.16.9.

http://www.weblens.org/invisible.html


1.16.10.

http://websearch.about.com/od/invisibleweb/a/invisibleweb.htm


1.16.11.


http://www.oclc.org/oaister/




1.16.12.

http://oedb.org/library/college
-
basics/invisible
-
web

Ultimate Guide to the Hidden Web

1.16.13.


http://en.wikipedia.org/wiki/Hidden_web

Search Links at bottom

1.16.14.

http://www.ericdigests.org/2002
-
2/hidden.htm


1.16.15.

http://www.online
-
college
-
blog.com/index.php/features/100
-
useful
-
tips
-
and
-
tools
-
to
-
research
-
the
-
deep
-
web/



1.16.16.

http://www.pipl.com/

Deep Web People Search

1.16.17.

http://www.123people.com/

1.16.18.

http://www.deeppeep.org/


Deep Peep

1.16.19.


http://www.je
nkinslaw.org/researchlinks/index.php?rl=176


1.16.20.

http://aip.completeplanet.com/

Complete planet

1.16.21.

http://en.wikipedia.org/wiki/Turbo10

1.16.22.

http://websearch.about.com/od/invisibleweb/a/turbo10.htm


1.16.23.

http://www.turbo10.com/

(as of april 2010,
no
longer offering deep web searches)

1.16.24.

http://clusty.com/

Was acquired by
www.yippy.com

1.16.25.

http://search.yippy.com/about

1.16.26.

http://en.wikipedia.org/wiki/Tor_(anonymity_network)

1.16.27.

https://www.torproject.org/download/download.html.en

1.16.28.

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

Hidden Wiki

1.16.29.

http://en.wikipedia.org/wiki/.onion

.onion

1.16.30.

http://www.reddit.com/r/onions


1.17.

Using Search Engines

1.17.1.

http://www.googleguide.com/

1.17.2.

http://www.google.com/intl/en/help/features.html#calculator


1.17.3.

http://www.google.com/landing/searchtips/#helpcenter


1.17.4.

http://www
.google.com/help/features.html

1.17.5.

http://www.google.com/analytics/apps/

1.17.6.

http://www.googleguide.com/


1.17.6.1.

http://www.googleguide.com/synonym_operator.html


1.17.7.

http://www.dumblittleman.com/2007/06/20
-
tips
-
for
-
more
-
efficient
-
google.html


1.17.8.

http://www.googletutor.com/

1.17.9.

http://lifehacker.com/#!339474/top
-
10
-
obscure
-
google
-
search
-
tricks


1.17.10.

http://www.techradar.com/news/internet/web/101
-
google
-
tips
-
tricks
-
and
-
hacks
-
462143


1.17.11.

http://blog.syrac
use.com/cny/2011/01/tips_on_using_google_part_1.html

1.17.12.

http://blog.syracuse.com/cny/2011/01/tips_on_using_google_part_2.html


1.17.13.

http://blog.syracuse.com/cny/2011/02/tips_on_using_google_part_3.html


1.17.14.


http://lifehacker.com/#!5750842/google
-
chrome
-
cheat
-
sheet
-
10
-
tips
-
and
-
tricks



1.18.

Proxies

1.18.1.

http://en.wikipedia.org/wiki/Proxy_server

See risks of anonymous proxy servers

1.18.2.


http://proxy.org/


1.18.3.

http://www.2
-
privacy.com/index.php/2007/06/04/free
-
proxy
-
list/

1.18.4.

http://www.dmoz.org/Computers/Internet/Proxying_and_Filtering/Products_and_Tools/Software/

1.18.5.

http:
//www.dmoz.org/Computers/Internet/Proxying_and_Filtering/Hosted_Proxy_Services/Free/CGI_Proxy/

1.18.6.

http://www.dmoz.org/Computers/Internet/Prox
ying_and_Filtering/Hosted_Proxy_Services/Free/Proxy_Lists/


1.18.7.

http://anonymouse.org/



1.19.

Archived Web Pages

(Find what a webpage looked like in the past)

1.19.1.

http://www.searchengineshowdown.com/others/archive.shtml

List of archives

1.19.2.

http://www.archive.org/

Digital library of Internet sites (Way back machine)

1.19.3.

http://webservices.xml.com/pub/a/ws/2002/01/18/brewster.html

Article about the way back machine

1.19.4.

http://www.faqs.org/faqs/

Faq archives


1.20.

Tr
acking users

1.20.1.

http://news.cnet.com/8301
-
1009_3
-
20005185
-
83.html

1.20.2.

http://en.wikipedia.org/wiki/HTTP_cookie

1.20.3.

Mom Software tracks user activity

(such as children or employees)

1.20.4.

http://arstechnica.com/t
ech
-
policy/news/2008/06/congress
-
urged
-
to
-
investigate
-
isps
-
opt
-
out
-
user
-
tracking.ars

1.20.5.

http://www.theregister.co.uk/2010/01/27/google_toolbar_caught_transmitting_data_when_disabled/

Be Legal

February 21, 2012

Be Ethical

Page
10

1.20.6.

http://www.techradar.com/news/internet/web/google
-
e
xpands
-
tracking
-
to
-
logged
-
out
-
users
-
656158

1.20.7.

http://www.pcworld.com/businesscenter/article/146457/thirdparty_advertisers_trac
king_users_in_google_ad_netw
ork.html

1.20.8.

http://www.teleread.com/2010/05/01/amazon
-
now
-
tracking
-
highlighted
-
passages
-
from
-
kindle
-
use
rs
-
by
-
brad
-
vertrees/

1.20.9.

http://technology.timesonline.co.uk/tol/news/tech_and_web/personal_tech/article6813713.ece

1.20.10.

http://appadvice.com/appnn/2010/06/apple
-
tracking
-
iphone
-
ipad
-
users/

1.20.11.

http://philip.greenspun.com/panda/user
-
tracking

1.20.12.

http://latimesblogs.latimes.com/technology/2010/02/reverse
-
image
-
tineye
-
photo
-
fingerprint
-
tracking
-
context.html

TinEye enables use
rs to track photos

1.20.12.1.

http://www.tineye.com/

1.20.13.

http://www.j
-
learning.org/promote_it/category/Tracking%20Your%20Users/

1.20.14.

http://joshduck.com/blog/2010/01/29/abusing
-
the
-
cache
-
tracking
-
users
-
without
-
cookies/

1.20.15.

http://www.irongeek.com/i.php?page=security/tracking
-
users
-
malware
-
and
-
data
-
leaks
-
via
-
the
-
usb
-
serial
-
numbers
-
on
-
flash
-
drives
-
smart
-
phones
-
and
-
mp3
-
players

1.20.16.

http://blogs.techrepublic.com.com/window
-
on
-
windows/?p=745

Track a user’s internet history with
IEHistoryView

1.20.17.

http://www.faqs.org/abstracts/Business
-
general/Employers
-
user
-
software
-
to
-
track
-
resumes
-
Software
-
helps
-
reps
-
fill
-
custom
-
order.htm
l

1.20.18.

http://www.howtodothings.com/electronics/how
-
to
-
track
-
a
-
cell
-
phone

How to track a cell phone

1.20.19.

http://www.statwin.com/

Computer monitoring software

1.20.20.

http://www.tracemyip.org/

1.20.21.

http://www.filecluster.com/Security/Keylogger
-
Monitoring/Download
-
007
-
Spy
-
Software.html

1.20.22.

http://www.discretewireless.com/


1.20.23.

http://www.track4win.com/

1.20.24.

http://www.key
-
logger.ws/

1.20.25.

http://www.softactivity.com/

1.20.26.

http://lastbit.com/usertracker
/

1.20.27.

http://www.freeusersonline.com/

1.20.28.

http://wufoo.com/

1.20.28.1.

http://wufoo.com/2008/03/25/how
-
to
-
track
-
users
-
with
-
wufoo/


1.21.

Methods and software that maintain privacy (see also social media and privacy)

Getting

a new identity and going off the
grid.

1.21.1.


http://www.torproject.org/

Tor is a network of virtual tunnels that allows people and groups to improve their
privacy and security on the Internet

1.21.1.1.

http://en.wikipedia.org/wiki/Tor_(anonymity_network)

1.21.1.2.

https://www.eff.org/torchallenge

1.21.1.3.

http://www.theatlantic.com/technology/archive/2011/06/libertarian
-
dream
-
a
-
site
-
where
-
you
-
buy
-
drugs
-
with
-
digital
-
do
llars/239776/

Article on Tor being used for illegal activites

1.21.2.

http://gadgetbox.msnbc.msn.com/_news/2011/10/28/8523553
-
how
-
to
-
cre
ate
-
a
-
fake
-
identity
-
and
-
stay
-
anonymous
-
online


1.21.3.


http://netforbeginners.about.com/od/internet101/f/anonymous_surf.htm

1.21.4.


http://anonymo
use.org/


1.21.5.


http://anonymous.livelyblog.com/how
-
to
-
browse
-
anonymously/

1.21.6.


http://howto.wired.com/wiki/Hide_From_Google

Hide from Google

1.21.7.


http://www.makeuseof.com/dir/webprivacycheck
-
check
-
proxy
-
effectiveness
-
in
-
hiding
-
your
-
identity/

1.21.8.


http://www.techsoup.org/learningcenter/internet/page6042.cfm

Anomymous blogging

1.21.9.


http://www.pcmag.com/article2/0,
2817,2376023,00.asp

1.21.10.


http://www.letmeby.com/

1.21.11.


http://www.max
-
info.com/secretstuff/newid.html

1.21.12.

http://www.wired.com/vanish/2009/11/ff_vanish2/

1.21.13.

http://www.off
-
grid.net/

1.21.14.

http://www.frankahearn.com/welcome.html

1.21.15.

http://www.escapeartist.com/efam/45/Disappearing.html

1.21.16.

http://www.skeptictank.org/hs/vanish.htm

1.21.17.

http://www.darknet.org.uk/2006/05/anonymity
-
hiding
-
your
-
identity
-
in
-
2006/

1.21.18.

http://w
ww.digitaltrends.com/how
-
to/how
-
to
-
hide
-
your
-
identity
-
online/

1.21.19.

http://www.ehow.com/how_4844421_hide
-
identity
-
online.html

1.21.20.

http://archi
ves.seul.org/or/talk/


1.21.21.

http://eng.anarchopedia.org/Tor_network_links


Be Legal

February 21, 2012

Be Ethical

Page
11

1.21.22.

http://en.wikipedia.org/wiki/Anonymous_P2P#List_of_anonymous_P2P_networks_and_clients

1.21.23.

http://online
-
privacy
-
guide.com/opg
-
2
-
search
-
engine
-
history
-
and
-
hidi
ng
-
your
-
identity/

1.21.24.

http://urbansemiotic.com/2007/03/06/why
-
do
-
you
-
hide
-
your
-
identity/


1.21.25.

http://www.december
.com/cmc/mag/1997/sep/boyan.html

(Article on Anonymizer)

1.21.26.

http://www.thefreesite.com/Anonymous_Freebies/

Free privacy software

1.21.27.

http://www.privacy.gov.au/internet/tools/index.html#3

Office of the Privacy Commissioner's website (Australia)

On
-
line privacy tools.

1.21.28.

http://ano
nymous.to/

privacy products

1.21.29.

HiProxy

-

Manage your proxy settings and servers

1.21.30.

http://lifehacker.com/5834964/top
-
10
-
s
ecret
-
agent
-
security
-
tips
-
and
-
tricks

tips and tricks


1.21.31.

Ghost Mail

hides your identity when sending e
-
mail.

1.21.32.

Potato

anonymous e
-
mail software

1.21.33.

http://www.advicebox.com/

anonymous email

1.21.34.

http://www.youtube.com/watch?v=gmTHUadu
-
MU

hiding sendmail identity

1.21.35.

http://www.gilc.org/speech/anonymous/remailer.html W3

Anonymous Remailer
home net

1.21.36.

http://www.1netcentral.com/anonymous
-
email.html

1.21.37.

http://www.web
-
development
-
blog.com/archives/your
-
e
-
mail
-
address
-
hidden
-
with
-
jquery/


1.21.38.

http://www.anonymizer.com/anonymizer2005/1.
5/

Anonymous surfing

1.21.39.

http://www.invisiblesurfing.com/

1.21.40.

Private Idaho

anonymous e
-
mail software

1.21.41.

http://www.epic.org/privacy/tools.html

(tools
-
Snoop Proof Email, Anonymous Remailers, Surf Anonymously,
HTML Filters, Cookie Busters, Voice Privacy, Email and File Privacy, Secure Instant Messaging, Web Encryption,
Telnet Encryption, Disk Encryption, Disk
/File Erasing Programs, Privacy Policy Generators, Password Security,
Firewalls, Other Resources)

1.21.42.

http://www.msnbc.msn.com/id/36837465/ns/technology_and_scienc
e
-
tech_and_gadgets/

Hiding data


1.22.

Digital Currency

or Electronic Money

1.22.1.

http://en.wikipedia.org/wiki/Electronic_money

1.22.2.


http://www.bitcoin.org/

1.22.3.

http://en.wikipedia.org/wiki/

Bitcoin

1.22.4.

http://arstechnica.com/tech
-
policy/news/2011/06/bitcoin
-
inside
-
the
-
encrypted
-
peer
-
to
-
peer
-
currency.ars

1.22.5.

Dingle, S. (2011). (Virtually) The strongest currency.
Finweek
, 1. Retrieved from EBSCO
host


1.23.

Cookie managers/blockers and ad blockers

1.23.1.

http://www.cook
iecentral.com/c_concept.htm

The Cookie concept

1.23.2.

http://www.compukiss.com/sandyclassroom/tutorials/article816.htm?link=scmaintxt


1.23.3.

Pop
-
up stopper

stops annoying pop
-
up windows.

1.23.4.

CookieSweeper

-

Check cookies while online.

1.23.5.

IDcide

-

Manages cookies and banner networks.

1.23.6.

Shields Up.



Test your computer for vulnerabilities online.

1.23.7.

Coo
kie Crusher (cookie blocker) and Cyber Clean (cache cleaner)


1.23.8.

Cookie Pal

cookie manager.

1.23.9.

http://www.snapfiles.com

1.23.10.


http://www.
doxdesk.com/parasite/


1.23.11.

http://thecoffeedesk.com/news/index.php/2009/08/14/delete
-
adobe
-
flash
-
cookies/



1.24.


Photocopier

(Modern photocopiers contain harddrives

which stores data.
)

1.24.1.

http://www.schneier.com/blog/archives/2010/03/hard_drives_in.html

1.24.2.

http://www.thestar.com/news/gta/article/781567
--
high
-
tech
-
copy
-
machines
-
a
-
gold
-
mine
-
for
-
data
-
thieves

1.24.3.

http://www.prlog.o
rg/10640424
-
how
-
to
-
protect
-
your
-
photocopier
-
hard
-
drive
-
and
-
security.html

1.24.4.

http://www.cbsnews.com/8301
-
31727_162
-
20003072
-
10391695.html

1.24.5.

http://www.youtube.com/watch?v=6pIFUOav2xE


1.24.6.

http://www.thedailygreen.com/environmental
-
news/latest/digital
-
copier
-
security
-
461009

1.24.7.

http://www.docucrunch.com/that
-
copier
-
hard
-
drive
-
your
-
weakest
-
link

1.24.8.

http://boingboing.net/2010/03/26/discarded
-
photocopie.html



2.

Cyberl
aws

2.1.

http://www.itu.int/ITU
-
D/cyb/cybersecurity/docs/itu
-
toolkit
-
cybe
rcrime
-
legislation.pdf

The
Toolkit for Cybercrime
Legislation (Toolkit)

2.2.

http://en.wikipedia.org/wiki/Cyberlaw

2.3.

http://www.un.int/kamal/the_law_of_cyber_space/fulltext.htm

Downloadable book

Be Legal

February 21, 2012

Be Ethical

Page
12

2.4.

http://www.harveymortensen.com/courses/digitallaw/cyberlaw/lessig.pdf


2.5.

http://www.lawresearchservices.com/firms/practice/cyberlaw.htm

2.6.

http://www.thecre.com/fedlaw/legal8.htm

2.7.

http://www.michbar.org/journal/pdf/pdf4article865.pdf

2.8.

http://www.nau.edu/legal/


2.9.

www.fas.org/irp/crs/RL32357.pdf

(summary of laws)

2.10.

http://www.washlaw.edu/subject/law.computer.htm
l

2.11.

http://www.megalaw.com/top/internet.
php

2.12.

http://www.cerias.purdue.edu/site/hotlist

2.13.

http://www.educause.edu/icpl

EDUCAUSE/Cornell Institute for Computer Policy and Law

2.14.

http://library2.lawschool.cornell.edu/esources/Default.aspx?ID=337

2.15.

http://jurist.law.pitt.edu/sg_cyb.htm

2.16.

http://www.hg.org/compute.html

2.17.

http://www.infosyssec.com/infosyssec/secstan1.htm

Security Standards, Laws and Guidelines

2.18.

http://www.cooley.edu/library/research_guides/Internet_Ecommerce.pdf

2.19.

http://en.wikipedia.org/wiki/Computer_crime

2.20.

http://law.findlaw.com/state
-
laws/computer
-
crimes/

State computer crime laws

2.21.

http://ezinearticles.com/?Ten
-
Important
-
Things
-
in
-
Cyber
-
Law&id=2785358

2.22.

http://www.suite101.com/reference/usa_cyber_law


2.23.

http://www.cyberlaw.com/

2.24.

http://legal.practitioner.com/computer
-
crime/

2.25.

http://www.sans.org/reading_room/whitepapers/legal/fed
eral
-
computer
-
crime
-
laws_1446

2.26.

http://www.cyberlawtimes.com/

2.27.

From a seminar in the laws of cyber space at the Univeristy of Michigan

2.27.1.

http://www
-
personal.umich.edu/~jdlitman/classes/cyber/sources.html

2.27.2.

http://www
-
personal.umich.edu/~jdlitman/classes/cyber/Topics2010.html

2.27.3.

http://www
-
personal.umich.edu/~jdlitman/classes/cyber/courses.html

courses and seminars in internet law

2.27.4.

htt
p://www
-
personal.umich.edu/~jdlitman/newdev.html


2.28.

http://www.nytimes.com/library/tech/reference/indexcyberlaw.html

2.29.

http://www.justice.gov/criminal/cybercrime/

2.30.

http://www.ccmostwanted.com/CP/LE.htm


2.31.

http://unpan1.un.org/intra
doc/groups/public/documents/APCITY/UNPAN005846.pdf

2.32.

http://www.cyberlawdb.com/main/

Global cyberlaw database

2.33.

http://www.ll.georgetown.edu/intl/intl.h
tml


2.34.

http://blog.sherweb.com/controversial
-
cyber
-
laws
-
around
-
the
-
world/

2.35.

http://www.experiencefestival.com/cyber_law_
-
_controversial_american_laws


2.36.

http://www.cyberlaws.net/


2.37.

http://www.cyberlawassociation.com/index.php

2.38.

http://www.cyberlawusa.com/

2.39.

http://www.himels
-
computer
-
law.com/inet.htm

2.40.

http://www.cyberspac.com/Cyber_Law_and_Policy/Internet_Law_Links.html


2.41.

http://www.llrx.com/llrxlink.htm

2.42.

http://www.lectlaw.com/inll/95.htm

2.43.

http://www.rsa.com/rsalabs/node.asp?id=2312

Laws Concerning Cryptography


3.

Ethics

3.1.

http://www.secureworks.com/research/articles/ethi
cs

3.2.

http://www.sans.org/reading_room/whitepapers/legal/legal
-
system
-
ethics
-
information
-
security_54

3.3.

http://www.ethicsweb.ca/resources/computer/index.html

3.4.

http://www.sigcas.org/ethics

3.5.

http://en.wikipedia.org/wiki/Computer_ethics

3.6.

http://en.wikipedia.org/wiki/Cyberethics


3.7.

http://cyberethics.cbi.msstate.edu/

3.8.

http://www.emr.org/linksUCE.html


3.9.

http://computerethicsinstitute.org/

3.10.

http://courses.cs.vt.edu/cs3604/lib/WorldCodes/10.
Commandments.html

3.11.

http://ethics.csc.ncsu.edu/

3.12.

http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm

3.13.

http://www.isaca.org/Journal/Past
-
Issues/2008/Volume
-
6/Documents/jpdf0806
-
computer
-
ethics.pdf


4.

Types of threats

to computer systems

Be Legal

February 21, 2012

Be Ethical

Page
13

4.1.

http://www.pcworld.com/article/206107/the_17_most_dangerous_places_on_the_web.html

17 Most dangerous places on
the web

4.2.

http://www.makeuseof.com/tag/8
-
sources
-
follow
-
computer
-
virus
-
news
-
alerts/



4.3.

Wiki List of

Computer security exploits

http://en.wikipedia.org
/wiki/Category:Computer_security_exploits

4.4.

Wiki List of Malware
http://en.wikipedia.org/wiki/Category:Malware

4.5.

http://en.wikipedia.org/wiki/List_of_computer_viruses


4.6.


http://en.wikipedia.org/wiki/List_of_computer_worms

4.7.

http
://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp


4.8.

http://en.wikipedia.org/wiki/Timeline_of_notable_computer_viruses_and_worms

4.9.

http://www.osnews.com/comments/22142


4.10.


http://www.wildlist.org/WildList/

4.11.

http://www.avira.com/en/threats/section/wildlist_intro/index.html


4.12.

http://www.symantec.com/security_response/index.jsp

4.12.1.

http://www.symantec.com/business/security_response/threatexplorer/threats.jsp

4.12.2.

http://www.symantec.com/norton/security_response/threatexplorer/index.jsp


4.13.

http://www.mcafee.com/us/threat_center/



4.13.1.

http://vil.nai.com/vil/default.
aspx


4.14.

http://www.securelist.com/en/threats


4.15.

http://security.ucdavis.edu/sophos_atoz.pdf


4.16.

http://www.cloudantivirus.com/en/listofviruses/


4.17.

http://www.sans.org/top
-
cyber
-
security
-
risks/

4.18.

http://www.computer
-
security.org.uk/threats/threats.htm


5.

Critical infrastruct
ure protection

(SCADA)

5.1.

http://en.wikipedia.org/wiki/Critical_infrastructure_protection

5.2.

http://en.wikipedia.org/wiki/Smar
t_grid

5.3.

http://en.wikipedia.org/wiki/Electromagnetic_pulse

5.4.

http://en.wikipedia.org/wiki/SCADA

5.5.

http://io9.com/5662593/the
-
us
-
electrical
-
grid
-
is
-
too
-
crappy
-
to
-
be
-
vulnerable
-
to
-
terrorist
-
attack
-
say
-
physicists

5.6.

http://www.blackhat.com/presentations/bh
-
federal
-
06/BH
-
Fed
-
06
-
Maynor
-
Graham
-
up.pdf

5.7.

http://www.csa.com/
discoveryguides/homeland/overview.php

5.8.

http://www.waterandwastewater.com/computer/software.htm

5.9.

http://hewreck.com/malicious
-
computer
-
malware
-
called
-
stuxnet
-
attacks
-
45000
-
computers/

S
tuxnet

5.10.

http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName
=Network+Security&taxonomyId=142

Stuxnet


6.

Information Warfare

6.1.

http://en.wikipedia.org/wiki/Information_warfare

6.2.

http://www.infowar.com/


6.3.

http://www.fas.org/irp/wwwinfo.html


6.4.

http://www.iwar.org.uk/

6.5.

http://www.infowar
-
monitor.net/

6.6.

http://www.fas.org/irp/eprint/snyder/infowarfare.htm


6.7.

http://www.webring.org/hub/infowar


7.

Cyber War

7.1.

http://en.wikipedia.org/wiki/Cyberwarfare

7.2.

ht
tp://www.cbsnews.com/stories/2010/06/10/60minutes/main6568387.shtml

7.3.

http://www.nature.com/news/2011/110608/full/474142a.html

7.4.

http://www.economist.com/node/16481504

7.5.

http://www.economist.com/node/16478792

7.6.

http://news.cnet.com/8301
-
31921_3
-
20012121
-
281.html

7.7.

http://www.guardian.co.uk/technology/2010/feb/03/cyber
-
warfare
-
growing
-
threat

7.8.

http://abcnews.go.com/GMA/Books/cyber
-
war
-
richard
-
clarke/story?id=10414617

7.9.

http://www.wired.com/threatlevel/2010/04/cyberwar
-
richard
-
clarke/

7.10.

http://www.huffingtonpost.com/2010/04/20/cyberwar
-
richard
-
clarke
-
o_n_544468.html

7.11.

http://www.gu
ardian.co.uk/world/2010/may/23/us
-
appoints
-
cyber
-
warfare
-
general

7.12.

http://www.telegr
aph.co.uk/news/newstopics/politics/defence/8008520/Defence
-
Review
-
The
-
Services
-
have
-
a
-
fight
-
on
-
their
-
hands
-
but
-
who
-
is
-
the
-
biggest
-
enemy.html

7.13.

http://www.was
hingtonpost.com/wp
-
dyn/content/article/2010/02/25/AR2010022502493.html

7.14.

http://articles.cnn.com/2010
-
07
-
07/opinion/schneier.cyberwar.hyped_1_cyberwar
-
national
-
cyber
-
security
-
division
-
amit
-
yoran?_s=PM:OPINION


Be Legal

February 21, 2012

Be Ethical

Page
14

7.15.

http://www.thenation.com/blog/155026/cyberwar
-
against
-
iran
-
obama
-
already
-
war
-
tehran

7.16.

http://www.securenation.org/a
-
more
-
resilient
-
nation
-
c
rafting
-
a
-
comprehensive
-
cyber
-
deterrence
-
strategy

7.17.

http://news.yahoo.com/s/yblog_thelookout/20110601/us_yblog_thelookout/pentagon
-
s
ays
-
cyberattack
-
is
-
act
-
of
-
war

7.18.

http://www.telegraph.co.uk/technology/news/6727100/Cold
-
war
-
enemies
-
Russia
-
and
-
China
-
lau
nch
-
a
-
cyber
-
attack
-
every
-
day.html

7.19.

http://online.wsj.com/article/SB10001424052748704370704575228653351323986.html

7.20.

http://blogs.forbes.com/billdavidow/2011/05/24/is
-
obama
-
planning
-
to
-
lose
-
world
-
war
-
iii/

7.21.

http://en.wikipedia.org/wiki/Siberian_pi
peline_sabotage

7.22.

http://www.telegraph.co.uk/technology/news/6727100/Cold
-
war
-
enemies
-
Russia
-
and
-
China
-
launch
-
a
-
cyber
-
at
tack
-
every
-
day.html

online game

7.23.

http://works.bepress.com/cgi/viewcontent.cgi?article=1001&context=athina_karatzogianni&sei
-
redir=1#search="cyber+attack+cold+war+"former+secretary
""

7.24.

http://www.mcafee.com/us/resources/reports/rp
-
in
-
crossfire
-
critical
-
infrastructure
-
cyber
-
war.pdf

McAfee
-

2007 over
120 countries have or are developing cyber capabilities.



8.

OVERVIEW ARTICLES on Hacker/Security Tools

8.1.

http://www.infosyssec.net

Comprehen
sive site


Good Place to start

8.2.

http://netsecurity.about.com/cs/hackertools/

8.3.

http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html


8.4.

http://netsecurity.about.com/cs/hackertools/a/aafreetools.htm

8.5.

http://www.insecure.org/

Top 100 network
security tools

8.6.

http://www.itsecurity.com/features/103
-
best
-
free
-
security
-
utilities
-
041608/

103 best free security utilitie
s

8.7.

http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci919962,00.html

8.8.

http://www.windowsitpro.com/Windows/Articles/ArticleID/44648/pg/1/1.html

8.9.

http://www.irongeek.com/i.php?page=security/hackingillustrated

Some how
-
to guides

8.10.

http://www.irongeek.com/all.php

8.11.

http://www.irongeek.com/i.php?page=links

See Links at bottom of page for 25 best sites

8.12.

http://labmice.techtarget.com/security/default.htm

8.13.

http://www.theregister.co.uk/2005/05/07/live_cd_paradise/

8.14.

http://www.darkreading.com/document.asp?doc_id=102228&WT.svl=news1_4


8.15.

http://technet.microsoft.com/e
n
-
us/library/cc722487.aspx



9.

Sources of Security Incident Information and Tools

9.1.

CERT

9.1.1.

Web Site
http://www.cert.org

9.1.2.

Current Activity
http://www.us
-
cert.gov/current/


9.1.3.

Bulletin
http://www.us
-
cert.gov/current/index.html#adobe_releases_security_bulletin_for12

9.1.4.

Bulletin
s archive
http://www.us
-
cert.gov/cas/bulletins/SB11
-
164.html

9.1.5.

alerts

http://www.us
-
cert.gov/cas/alerts/index.html

9.1.6.

tech alerts

http://www.us
-
cert.gov/cas/techalerts/index.html

9.1.7.

Statistics

http://www.cert.org/stats/cert_stats.html


9.1.8.

Fixes

http://www.cert.org/nav/index_red.html

9.1.9.

First Time
http://www.cert.org/tech_tips/before_you_plug_in.html


9.1.10.

Insider

http://www.cert.org/nav/index_green.html

9.1.11.

Resources
http://www.us
-
cert.gov/resources.html

9.1.12.


Archive
http://www.cert.org/archive/pdf/insidercross051105.pdf


9.2.

Secret Service National Threat

Assessment Center (Insider threat)

9.2.1.

Web Page
http://www.secretservice.gov/ntac.shtml#programs

9.3.

Infosyssec


The Security Portal for IS Professionals (very comprehensive)

9.3.1.

http://www.infosyssec.net/index.html

9.3.2.

http://www.infosyssec.net/infosyssec/seceth1.htm

Security Ethics, Policy and Laws

9.4.

DOE

9.4.1.

http://www.doecirc.energy.gov/index.html



9.5.

CERIAS