Biometrics & Security

Total Page:16

File Type:pdf, Size:1020Kb

Biometrics & Security Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography THÈSE NO 4748 (2010) PRÉSENTÉE LE 25 AOÛT 2010 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Claude BARRAL acceptée sur proposition du jury: Prof. A. Lenstra, président du jury Prof. S. Vaudenay, Dr A. Tria, directeurs de thèse Prof. B. Dorizzi, rapporteur Dr A. Drygajlo, rapporteur Prof. A. Ross, rapporteur Suisse 2010 Acknowledgments First of all, I would like to thank David Naccache for his crazy idea to give me the opportunity to start a PhD thesis, on the late, and Serge Vaudenay for his welcoming in LASEC, for teaching me cryptography, and his incredible patience with my slow advancement in this PhD work. Many thanks to Jean-Pierre Gloton, David Naccache and Pierre Paradinas for sup- porting my Doctoral School application. I must thank all my colleagues in Gemplus, then Gemalto, for all their support. Especially Pierre Paradinas for hiring me, more than ten years ago, in his GRL team - the Gemplus Research Lab - Denis Praca, my very first mentor at Gemplus and Michel Agoyan for his precious sup- port whatever was the subject (e.g. Hardware, Software, Chip Design, Trainees management). Then Eric Brier and Cédric Cardonnel, first persons to work with me on Biometrics. Pascal Paillier and Louis Goubin for their support in cryptography. Jean-Louis Lanet for giving me the opportunity to give my very first courses at universities. Precisely, I would like to thank every person having trusted me for my teaching skills on Biomet- rics, Smart Cards and Cryptography: Traïan Muntean at Ecole Supérieure d’Ingénieurs de Lu- miny, Marseille, France. Caroline Fossati at Ecole Centrale Marseille, France. Marie-Laure Potet at ENSIMAG, Grenoble, France. Assia Tria and Laurent Freund at Ecole des Mines de St Etienne - Centre Microelectronique de Provence George Charpak, Gardanne, France. Thierry Fournel at Institut Supérieur d’Optique, St Etienne, France. Thanks a lot to all my past and present colleagues at LASEC for helping me with practical work during cryptography learning: Pascal Junod, Gildas Avoine, Jean Monnerat, Thomas Baignières, Sylvain Pasini, Martin Vuagnoux, Julien Brouchier. And Philippe Oechslin for teaching me IT security at EPFL. My professional relations were very helpful: especially Bernadette Dorizzi from INT Evry, Nicolas Delvaux and Loïc Bournon from Sagem, Jean-François Mainguet from At- mel. The rock band which I’m proud to be the bass guitar player and helped me, for more than five years now, to counter-measure with professional and thesis stress. Thanks a lot to past and present mem- bers: Eric Brier, Julien Brouchier,Cédric Cardonnel,David Hallé, Laurent Lagosanto and Daniela Laurans. And thanks God for my very first marathon (during this dis- sertation’s redaction), and finally a second one while I was in late with the redaction... Ecole des Mines de St Etienne and CEA-Leti welcomed me in their lab and gave me the opportunity to pursue my research. Thanks a lot to Assia Tria and Alain Merle. My colleagues were very helpful with Linux, LATEX, and other stuffs: Michel Agoyan, Sylvain Bouquet, Pascal Manet, Jean-Baptiste Rigaud, Bruno Robisson. For their collaboration on biometrics, many thanks to Stéphanie Anceau, Philippe De Choudens, Abdel Yakoub. David Naccache and Assia Tria finally convinced me not to give up in particular hard times, thanks! Many thanks to one external reader and spellchecker: Bart Bombay, and to the jury: the President, the Director, the co-Director and the three Examiners. And last but not least, MANY THANKS to my family. Especially my wife, Agathe, and children Julien, Antoine, Axel, for supporting me. And my mother, mother-in-law, sisters, nieces and everyone having helped me to save time for my studies and helped my wife while I was in Lausanne few days a week for several months. — À ceux que j’aime. “Tout le monde savait que c’était impossible. Il est venu un imbécile qui ne le savait pas et qui l’a fait.” — Marcel Pagnol. Résumé Depuis le début de ce siècle et plus particulièrement depuis les évenements du 11 Septembre 2001 aux Etats-Unis, plusieurs technologies biométriques sont considérées comme assez matures pour être un nouvel outil de sécurité. Généralement associées à un support personnel afin de respecter la vie privée, les données biométriques de référence sont enregistrées dans des équipements électroniques securisés, tel les cartes à puce et les systèmes utilisent des outils de cryptographie pour entrer en communication avec la carte à puce et échanger les données biométriques de manière sécurisée. Après une introduction générale sur la biométrie, les cartes à puce et la cryptographie, une second partie adressera nos travaux sur les fausses empreintes et les failles des systèmes de capture d’empreintes digitales. La troisième partie présentera notre approche d’un algorithme léger de reconnaissance d’empreinte digitale dédié aux cartes à puce. La quatrième partie détaillera les protocoles de sécurité dans les applications telles que la carte PIV, et présentera notre implémentation dans la carte à puce du protocole proposé par le NIST. Finalement, une cinquième partie adressera l’interaction entre Cryptographie et Biométrie, leur antagonisme, leur complémentarité, et présentera notre application d’un protocole de challenge-response aux donnèes biométriques afin de faciliter la reconnaissance d’empreintes digitales. Mots-clés: Biométrie, Cartes à Puce, Cryptographie, Reconnaissance d’Empreinte Digitale, Match-On- Card, Algorithmes Légers, Electronique Embarquée, Protocole Sécurisé de Vérification d’Identité par Biométrie, Cryptographie-Biométrie Interaction. Abstract Since the beginning of this brand new century, and especially since the 2001 Sept 11 events in the U.S, several biometric technologies are considered mature enough to be a new tool for security. Generally associated to a personal device for privacy protection, biometric references are stored in secured elec- tronic devices such as smart cards, and systems are using cryptographic tools to communicate with the smart card and securely exchange biometric data. After a general introduction about biometrics, smart cards and cryptography, a second part will introduce our work with fake finger attacks on fingerprint sensors and tests done with different materials. The third part will present our approach for a lightweight fingerprint recognition algorithm for smart cards. The fourth part will detail security protocols used in different applications such as Personal Identity Verification cards. We will discuss our implementation such as the one we developed for the NIST to be used in PIV smart cards. Finally, a fifth part will address Cryptography-Biometrics interaction. We will highlight the antagonism between Cryptography - deter- minism, stable data - and Biometrics - statistical, error-prone -. Then we will present our application of challenge-response protocol to biometric data for easing the fingerprint recognition process. Keywords: Biometrics, Smart Cards, Cryptography, Fingerprint Recognition, Match-On-Card, Light Weight Algorithms, Embedded Electronics, Cryptography-Biometrics Interaction, Secure Biometric Iden- tity Verification Protocol. Contents Glossary xxv Notations xxix Abbreviations xxxi Thesis Outline & Results Overview Part I. General Introduction Chapter 1. Introduction to Biometrics 1.1 A few words about Biometrics ............................. 9 1.1.1 A little bit of History ............................. 10 1.1.2 A little bit of Science Fiction ......................... 10 1.2 Biometric Modalities .................................. 11 1.2.1 Introduction .................................. 11 1.2.2 Fingerprint Recognition ............................ 11 1.2.3 Face Recognition ............................... 12 1.2.4 Hand Geometry ................................ 13 1.2.5 Iris/Retina Recognition ............................ 13 1.2.6 Vein Pattern Recognition ........................... 13 1.2.7 Other Techniques ............................... 14 1.2.8 Multimodal Biometric Systems ........................ 15 1.3 Biometric Systems Architecture ............................ 16 1.3.1 General Architecture .............................. 16 1.3.2 Extraction Algorithm ............................. 16 1.3.3 Matching Algorithm .............................. 17 1.3.4 Enrollment ................................... 17 xi Contents 1.3.5 Authentication/Verification .......................... 18 1.3.6 Identification .................................. 18 1.3.7 Authentication vs Identification ........................ 19 1.4 Biometric Systems Errors ............................... 19 1.5 Biometric Systems Evaluation ............................. 21 1.6 Biometric Systems Management ............................ 22 1.7 Privacy Issues ..................................... 22 1.8 Applications ...................................... 23 Chapter 2. Introduction to Smart Cards 2.1 A few words about Smart Cards ............................ 25 2.1.1 A little bit of History ............................. 26 2.1.2 A little bit of Science Fiction ......................... 26 2.1.3 Authentication Token ............................. 26 2.2 Smart Card Architecture ................................ 27 2.2.1 Physical Characteristics ............................ 27 2.2.2 Electrical Characteristics
Recommended publications
  • The Informant
    PRESS INFORMATION The Informant History Permanent exhibition Collection Eye-witnesses Facts AS OF 10/17 Inhalt History 4 Permanent exhibition 6 Our collection 9 Eye-witnesses 10 Our experts 11 Events 12 Facts 14 Dear members of the press, Thank you very much for your interest in our museum. We hope that the information we provide here, about our permanent exhibition focussing on the secret world of espionage from ancient times to the present, will be of use to you. This is just an overview of our activities; if you have any further questions, please do not hesitate to contact us. We are also happy to give interviews and look forward to your visit! Robert Rückel, Director Contact: [email protected] Tel: +49 (0)30 - 39 82 00 45 - 0 Further information: deutsches-spionagemuseum.de/en/press 4 HISTORY The history of espionage The Persian King Cyrus II. (6th century BC) established a wide network of spies Alberti’s cipher disc, one of the first tools for Mata Hari – a double agent in WWI The Cryptex may look medieval but was the encryption of messages (15th century) invented by the author Dan Brown Knowledge has always been power – right Espionage was profes sionalized during the gauge the strength of enemy forces and shore back to the earliest settlements and the 15th century. The counsellors of the English up various political systems. The collapse of need of every ruler to find out what his Queen Elizabeth I (1533–1603) established the Warsaw Pact in the 1990s heralded a fur- enemies were doing, thinking and planning.
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • Symbol Quest Now Live
    Symbol Quest Now Live Submitted by Greg on Tue, 2009-09-08 16:17 y The Lost Symbol TheLostSymbol.com now has a challenge live and ready to play, in which you must identify 33 symbols correctly (symbolic itself of the 33 degrees in Scottish Rite Freemasonry) in order to hear a short message from Dan Brown himself. You must get to all 33 with *no* errors, even though it seems to give you three strikes. If you're stuck, or just a bit lazy, click on 'Read More' for my solutions, and to find out what Dan Brown says at the end: -------------- Here are the solutions. You'll have to Google the symbols themselves if you don't know what I'm referring to with my answers. The numbers are the order I got the questions in, but they are random for each new challenger: 1. Sounds like a resident in the Garden of Eden: "Atom" (Adam) 2. Without End: "Infinity" 3. Hood ornament for Emil Jellinek's daughter: "Mercedes" 4. An age in the hair of broadway: "Aquarius" 5. Iesous Christos Theou Yios Soter: "Ichthys" (Christian Fish symbol) 6. The fork of Zeus's Younger Brother: "Trident of Neptune" 7. Opposing yet unified. "Yin and Yang" 8. Proofreader's mark from Latin "delere": "Delete proofreading symbol" (squiggle with loop at top right) 9. Kafka, Poe, or Khepri Embodied: "Scarab" (Egyptian Dung beetle) 10. Robert Langdon's favorite symbol: "Ankh" 11. Who uses this symbol? "World Health Organization (WHO" 12. Greek Goddess of Triumph: "Nike" 13. Alpha's antithesis: "Omega" 14.
    [Show full text]
  • 054214052 Full[1].Pdf
    THE CONTRIBUTIONS OF MINOR CHARACTERS IN DEVELOPING THE PLOT AS SEEN IN DAN BROWN’S DA VINCI CODE AN UNDERGRADUATE THESIS Presented as Partial Fulfillment of the Requirements for the Degree of Sarjana Sastra in English Letters By CITA PARAMITA WIJAYA Student Number: 054214052 ENGLISH LETTERS STUDY PROGRAMME DEPARTMENT OF ENGLISH LETTERS FACULTY OF LETTERS SANATA DHARMA UNIVERSITY YOGYAKARTA 2010 THE CONTRIBUTIONS OF MINOR CHARACTERS IN DEVELOPING THE PLOT AS SEEN IN DAN BROWN’S DA VINCI CODE AN UNDERGRADUATE THESIS Presented as Partial Fulfillment of the Requirements for the Degree of Sarjana Sastra in English Letters By CITA PARAMITA WIJAYA Student Number: 054214052 ENGLISH LETTERS STUDY PROGRAMME DEPARTMENT OF ENGLISH LETTERS FACULTY OF LETTERS SANATA DHARMA UNIVERSITY YOGYAKARTA 2010 i ii iii Dream as if you will live forever Live as if you will die tomorrow iv This is for Amak and Papa v ACKNOWLEDGEMENTS First, I would like to thank my awesome lecturer, Dewi Widyastuti, S. Pd., M. Hum and my co-advisor, Elisa Wardani, S.S., M. Hum., This thesis will not be complete without your guidance and advice. I would like to thank Amak, and Papa. If my gratitude were symbolized as people then it would be the citizen of People Republic of China. I would also like to thank these people who happens to come out of the same womb as me or I would like to call them “my siblings”: Andri a.k.a. Tua Hia, Benny a.k.a. Dji Hia, Debby a.k.a. Babi. Next gratitude is for my friends in Pondok Melati: Artis, Etul Setiatul, Ci Vindot, Dotul, Carlita Dada, Nyonya Hong, Ci Nora (Cina Norak), Ci Her a.k.a.
    [Show full text]
  • Cracking Codes & Cryptograms
    ™ Making Everything Easier! Cracking Codes & Cryptograms Learn to: • Expose conspiracies like the characters do in Dan Brown’s The Lost Symbol • Decipher cryptic puzzles • Understand the role coded messages play in secret societies • Use encrypted alphabets to unveil secrets of the past Denise Sutherland Syndicated puzzle author Mark E. Koltko-Rivera, PhD MІMІ, 32°, KT Foreword by Christopher Hodapp 32° Author, Freemasons For Dummies Get More and Do More at Dummies.com® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/crackingcodescryptograms Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cracking Codes & Cryptograms FOR DUMmIES‰ by Denise Sutherland Syndicated puzzle author by Mark E. Koltko-Rivera, PhD MІMІ, 32°, KT Foreword by Chris Hodapp Author and
    [Show full text]
  • The Da Vinci Code: a Pseudo-Feminist Text
    Open Journal of Social Sciences, 2020, 8, 35-53 https://www.scirp.org/journal/jss ISSN Online: 2327-5960 ISSN Print: 2327-5952 The Da Vinci Code: A Pseudo-Feminist Text Peng Zhao Nanjing Normal University, Zhongbei College, Danyang, China How to cite this paper: Zhao, P. (2020). Abstract The Da Vinci Code: A Pseudo-Feminist Text. Open Journal of Social Sciences, 8, Dan Brown is able to compress extensive intellectual and religious arguments 35-53. into quickly accessible sound bites, and his story takes place essentially in one https://doi.org/10.4236/jss.2020.85004 twenty-four-hour period like James Joyce’s Ulysses. Women are a large con- Received: April 16, 2020 stituency of The Da Vinci Code, and the book responds in many ways to new Accepted: May 8, 2020 thinking about women in western culture. In the novel’s estimation, Mary Published: May 11, 2020 Magdalene was a strong, independent figure, patron of Jesus, cofounder of his movement, his only believer in his greatest hour of need, author of her own Copyright © 2020 by author(s) and Scientific Research Publishing Inc. Gospel, his romantic partner, and the mother of his child. Based on these de- This work is licensed under the Creative scriptions of the novel, some scholars assert The Da Vinci Code is a feminist Commons Attribution International novel, which opens everyone’s eyes to a startlingly different view of the po- License (CC BY 4.0). werful role of women in the birth of Christianity. Contrary to the dominating http://creativecommons.org/licenses/by/4.0/ Open Access criticism of the novel, the thesis relies on feminist literary theory to scrutinize the patriarchal traces and hidden sexual discrimination in the phallogocentric text of Dan Brown.
    [Show full text]
  • Apple Platform Security
    Apple Platform Security May 2021 Contents Introduction to Apple platform security 5 A commitment to security 6 Hardware security and biometrics 7 Hardware security overview 7 Apple SoC security 8 Secure Enclave 9 Touch ID and Face ID 17 Hardware microphone disconnect 24 Express Cards with power reserve 25 System security 26 System security overview 26 Secure boot 26 Secure software updates 48 Operating system integrity 50 Additional macOS system security capabilities 52 System security for watchOS 63 Random number generation 67 Apple Security Research Device 68 Encryption and Data Protection 70 Encryption and Data Protection overview 70 Passcodes and passwords 70 Data Protection 73 FileVault 85 How Apple protects users’ personal data 89 Digital signing and encryption 91 App security 93 App security overview 93 Apple Platform Security 2 App security in iOS and iPadOS 94 App security in macOS 99 Secure features in the Notes app 103 Secure features in the Shortcuts app 104 Services security 105 Services security overview 105 Apple ID and Managed Apple ID 105 iCloud 107 Passcode and password management 110 Apple Pay 119 iMessage 132 Secure Business Chat using the Messages app 135 FaceTime security 136 Find My 137 Continuity 140 Car keys security in iOS 143 Network security 146 Network security overview 146 TLS security 146 IPv6 security 147 Virtual private network (VPN) security 148 Wi-Fi security 149 Bluetooth security 152 Ultra Wideband security in iOS 154 Single sign-on security 154 AirDrop security 155 Wi-Fi password sharing security on
    [Show full text]
  • UNCLASSIFIED Accession Folder Doc Ref ID Filename Doc Title Date
    UNCLASSIFIED Accession Folder Doc Ref ID Filename Doc Title Date No. of Pages 21609 ACC21609 A101014 41768429080752 CODES AND CIPHERS (CRYPTOLOGY); REPRINT OF FRIEDMAN'S ARTICLE IN ENCYCLOPEDIA BRITANNICA 1/1/1961 9 27475 ACC27475 A101100 41769269080836 INVESTIGATION OF SYSTEM INDICATOR ENCIPHERMENT; FRIEDMAN'S CRITIQUE OF A PAPER 5/2/1945 20 34839 ACC34839 A101106 41769069080816 PATENT APPLICATIONS NOS. 107,244 AND 682,096 OF WILLIAM F. FRIEDMAN RE PROPOSED MOTION CONTROL MEANS 9/19/1949 6 35225 ACC35225 A101154 41768689080778 LISBONIAN SELECTION OF ROOTS AND TERMINALS 1/1/1911 76 35288 ACC35288 A101155 41768919080801 COMMENT BY FRIEDMAN ON THE PREFACE TO "INVARIANTENTHEORIE" 4/30/1954 3 37006 ACC37006 A101157 41768509080760 DESCRIPTION OF THE SOLUTION OF A SPANISH DIPLOMATIC CODE IN 1918-19; CONTAINS NOTE BY FRIEDMAN DATED JANUARY 15 1932 1/15/1932 111 9407 ACC9407 A101175 41768489080758 INFORMAL MEMORANDUM NOTING M02 HAS CORRESPONDENCE DEALING WITH THE FRIEDMAN BILL 8/16/1963 1 9407 ACC9407 A101177 41768609080770 JOB DESCRIPTION FOR W.F. FRIEDMAN AS CHIEF OF THE COMMUNICATIONS RESEARCH SECTION 1/1/1949 1 9407 ACC9407 A101178 41768459080754 W.F. FRIEDMAN'S MILITARY SERVICE; INFORMAL NOTE LISTING PERIODS OF ACTIVE DUTY 1/1/1950 3 9407 ACC9407 A101180 41768539080762 POSITION AND GRADE SUMMARY FOR W.F. FRIEDMAN, 1918-1949 1/1/1950 6 9407 ACC9407 A101194 41768599080769 SIGNAL CORPS PATENT BOARD, MEETING NO. 2; CONVENED TO CONSIDER FRIEDMAN'S PATENT FOR MODIFICATION OF M-134-T1 AND M-134-T2 4/17/1936 2 9407 ACC9407 A101198 41768559080765 CONDITIONS OF FRIEDMAN'S EMPLOYMENT IN THE OFFICE OF THE CHIEF SIGNALS OFFICER; PERTAINING TO INVENTIONS AND PATENTS 4/25/1936 2 9407 ACC9407 A101205 41768789080788 LETTER TO W.F.
    [Show full text]
  • I. Fact, Fiction, and Speculation About Fortune`S Hour Within Instructive
    I. Fact, Fiction, and speculation about fortune`s hour Within instructive creation land rich not to devour Alphanumeric refined definition shelves still Hair skin fingers move calculate emulatable till Source form lights, money profit, speaking Pharoh over window sill of strong held hand Superstition is premonition, solar versus lunar band Helix acts attracting and repelling to tell Story from tunnel Prophet, common seer, in a land set with propped trash making story ill Visit situation based under growing student plans and academic emminating a ringing bell Solitary presence, beyond each and every miniscuity Duality artificial, eightfold direction natural supernatural intent A pupil`s crescent falls holy and uneven like a seed in a hidden tent Inside knowledge, voltage advantages spent oil heater in case trinity Riddle aplace eventually to reach a face Force set into spin creating some unemulatable pace Martyr mentioned over tongue, go it undebated Grain the preacher saturated, united before crowds soon rated The last leg to the lost civilization, a ship spotting a beige and shall Silent reflection word that one did install Inventions in vast glory, protect artist`s antagonist Inscriptions interpreted through folly red textile Never found dome building with sideways rectangular windows door height while Forbidden destroyers of the last shepherds and peace list Drifting grains and securing inks one thousand words Song should manifest with no pen cursed swords Mirroring moons Whose tongues fork backwards From the place with the biggest
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • Drilling Deep: a Look at Cyberattacks on the Oil and Gas Industry
    Drilling Deep A Look at Cyberattacks on the Oil and Gas Industry Feike Hacquebord and Cedric Pernet TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. 5 Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing The Infrastructure of a Typical herein should be construed otherwise. Trend Micro Oil and Gas Company reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy 7 is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Threats the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include 23 accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Case Study: APT33 to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, 29 producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, Security Recommendations for the indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, Oil and Gas Industry use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof.
    [Show full text]
  • Da Vinci Versus Kafka: Looking for Answers
    City University of New York Law Review Volume 8 Issue 2 Fall 2005 Da Vinci versus Kafka: Looking for Answers Robert Batey Stetson University Follow this and additional works at: https://academicworks.cuny.edu/clr Part of the Law Commons Recommended Citation Robert Batey, Da Vinci versus Kafka: Looking for Answers, 8 N.Y. City L. Rev. 319 (2005). Available at: 10.31641/clr080204 The CUNY Law Review is published by the Office of Library Services at the City University of New York. For more information please contact [email protected]. Da Vinci versus Kafka: Looking for Answers Acknowledgements I should begin by thanking the members of the book club with whom I read The Da Vinci Code: Kristen Adams, Debbie and Mike Allen, Denise and John Cooper, Darby Dickerson, Julian Kossow, Marian Moss, and Diane and Mike Swygert. Along the same lines, thanks go to every student who struggled through The Trial over the many semesters I have taught law and literature. I am also indebted to Tony Casoria for research assistance. Finally, thanks go to the organizers of the symposium honoring Ruthann Robson and to the editors of this journal for allowing me to participate in it. This article is available in City University of New York Law Review: https://academicworks.cuny.edu/clr/vol8/iss2/5 DA VINCI VERSUS KAFKA: LOOKING FOR ANSWERS Robert Batey* There are many reasons to honor Ruthann Robson. Her mul- tifaceted career has significantly impacted gender studies, law, literature, and education. Even among polymaths, Ruthann is rare in that she integrates all of her interests: she applies gender studies to law, to literature, and to education, and vice versa, and so on down the line.
    [Show full text]