Aaron Emigh, Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures (Rev. 1.3) (Oct. 3, 2005) (full-text).
This report examines the information flow in phishing attacks of all types. Technologies used by phishers are discussed, in combination with countermeasures that can be applied. The focus is primarily on technology that can be deployed to stop phishing. Both currently available countermeasures and research-stage technologies are discussed.