Related articles by Suelette Dreyfus

Lose your password? Try abstract art! The Independent, 10 Oct 2000
Researchers at the University of California at Berkeley have been studying how people use passwords and PINs. They have also tested a new prototype system, called Deja Vu, that replaces these traditional forms of authentication with a "password" made up of abstract art images.
A high-tech search for the truth about Kosovo, The Independent, 15 May 2000
During the war in Yugoslavia last year, hundreds of thousands of Kosovar refugees fled their homes. Were they running from the Serbian military or Nato bombs? Was the refugee flight completely chaotic, or was someone orchestrating it with deliberate precision behind the scenes?

Spy in the sky hears secrets, The Age, 14 Mar 2000
The increase in the use of e-mail and mobile phones has left Australian businesses more exposed to economic espionage by foreign governments, according to an Australian National University academic. Dr Michael McKinley, a senior lecturer researching a book assessing the alliance between American and Australian intelligence agencies, says: Most Australians dont fully understand ... just how much of their private life is open to government.

Gurus keep us guessing on next year's fasion code, The Age, 4 Apr 2000
So what is hot in cryptowear? Look for ephemeral keys, template-less biometrics, sheer digital watermarks lined with a crinoline of crypto and au natural molecular computing.

Semantic Forests, Cyberwire Dispatch, 30 Nov 1999
"Semantic Forests" doesn't mean much to the average person. But if you say it in concert with the words "automatic voice telephone interception" and "U.S. National Security Agency" to a computational linguist, you might just witness the physical manifestations of the word "fear."

Spies in the forests, The Independent, 22 Nov 1999
THE US Department of Defense is lab-testing technology that could make it easier automatically to sift through a vast pool of private communications, including international telephone phone calls, in a similar manner to using an Internet search engine.

This is Just Between Us (And the Spies), The Independent, 15 Nov 1999
The US National Security Agency has designed and patented a new technology that could aid it in spying on international telephone calls. The NSA patent, granted on 10 August, is for a system of automatic topic spotting and labelling of data. The patent officially confirms for the first time that the NSA has been working on ways of automatically analysing human speech.

Fighting the good fight, The Age, 9 Feb 1999
He followed the shifting battle ground from sneaking through wire fences at nuclear test sites, to finding legal ways of fighting against crypto-export laws in the mid-1990s, to CA infrastructures in the late 1990s. We found a way to legally export strong crypto from the US without Government approval - we print it in books, he said. Thats how it got to Australia.

Starlight Closes the Air Gap, The Age, 2 Feb 1999
MILITARY agencies have battled with the problem for decades; how to create a system which lets staff simultaneously use both classified and unclassified networks all on the same computer. Their search has just come to an end, thanks to Australian scientist Dr Mark Anderson, of the Defence Science and Technology Organisation.

Export ban kills Nexus' WHO deal, The Age, 26 Jan 1999
THE directors of Sydney e-commerce software firm Nexus Solutions Pty Ltd prepared to pop the champagne corks when they landed a major deal to sell encryption products to the World Health Organisation (WHO). They planned to celebrate the company's biggest financial deal of the year and the fact that its strong crypto product, NTrust, would be protecting people's private medical records for a WHO worldwide database project. Then everything fell apart.

Green light for limited crypto exports, The Age, 19 Jan 1999
A new international arrangement signed by the Government will make it easier for Australian companies to export IT products containing weak encryption. However, the new Wassenaar Arrangement continues the ban on the export of strong crypto-products without a Government permit, despite the growing demand for these products from the e-commerce sector. Named for the suburb of The Hague where the first guidelines were signed in 1996, Wassenaar is an arrangement between 33 countries to control the export of weapons and dual-use goods.

Encryption keeps human rights group ahead of the military, The Age, 12 Jan 1999
Dodging hostile military patrols and trekking his way through steep mountains in Guatemala, human rights worker Hugo Cabrera smuggled out vital evidence of human rights abuses armed with only a laptop computer, a good encryption program and solar panels.

Sex sells soap, so why not computers?, The Age, 18 Nov 1998
The simple outline on the laptop cover traces her midriff, down around her ample sides, to the middle of her thighs. She is full and soft, but well-proportioned in her curves, more Marilyn than Monica. And, there, in the lower half of this post-modernist, minimalist icon of femininity is - what else - an apple. RMIT's industrial design program director David Lugton described the G3 laptop as "gorgeous", "rounded" the "most feminine notebook" he has ever seen. And, he added, "that is one very strategically placed apple".

Hack Stock / Three days of Fun, Sun and Breakins, The Australian, 4 Oct 1997
AT THE centre of the camp site lay a large black tombstone. On it was engraved the name Bill Gates and this epitaph: "Where do you want to go today?". Mock mourners paused for a moment's silence and, after raising their glasses in a toast to Bill's demise, attached their own epitaphs to the stone: "It seems Bill has signed the final nondisclosure agreement"

Hacker attacks up 400 percent, The Age, 5 Aug 1997
THE number of computer hacker attacks reported in Australia has more than doubled in the past year compared to the same period in 1996, according to AUSCERT, the Australian Computer Emergency Response Team. Much of the increase seems to be due to "script weenies" - unskilled or inexperienced hackers who use automated hacking programs.