http://www.securitychallenges.org.au/ArticlePages/vol3no1ThomasandBell.html