Updated
|
|
| Added 3.20.2007 |
Current
Terrorism Threat Level: U.S. Department of Homeland Security |
| |
Daily updated list of U.S. & Coalition Casualties in Iraq
: CNN |
| |
The Special Operations Warrior Foundation
: The Warrior Foundation
|
| |
[ISN]: InfoSec News Mailing List
: William Knowles (Moderator) |
| |
Packet Storm
: Full Disclosure Computer Security Site |
| |
Directory of Open Access Journals: Lund University Libraries |
| |
Shadow Company: Nick Bicanic |
| |
The Center for Contemporary Conflict: Naval Postgraduate School |
| |
Jane's C4I Systems 2006 - 2007
: Giles Ebbutt
|
| |
Terrorist Capabilities for Cyberattack: John Rollins and Clay Wilson |
| |
The Militant Ideology Atlas: Dr. William McCants, Dr. Jarret Brachman, USMA |
| |
Reflections from a Red Team Leader: Susan Craig |
| |
Black Alchemy Fake AP: 53,000 False Generated
Wireless Access Points |
| |
Treachery Unlimited: Jay Dyson |
| |
UCS Satellite Database: Union of Concerned Scientists |
| |
Open Source Disaster Recovery: Calvert Jones and Sarai Mitnick |
| |
Heavens-Above (Satellite Predictions): Chris Peat |
| |
The Bunker
: Ultra-Secure Data Colocation
|
| |
Joint Doctrine for Military Deception (Updated) [.pdf]: Joint Chiefs of Staff |
| |
Send Care Packages to U.S. Military
: AnySoldier.com |
| |
Licensed to Kill: Hired Guns in the War on Terror:
Robert Young Pelton |
| |
OSVDB: Independent, Unbiased Resource of Security Information |
| |
Clandestine and Guerrilla Radio Stations
: Daily Intelligence on Subversive TV & Radio |
| |
Chinese Unrestricted Warfare [.pdf]: PLA Senior Colonels Qia Liang & Wang Xiangsui |
| |
Link to C4I.org - Buttons &
Propaganda:
C4I.org Staff |
| Added 2.10.2006 |
Information Operations Roadmap
: Department of Defense |
| |
Jane's C4I Systems 2005 - 2006
: Giles Ebbutt
|
| |
New Attrition Mailing Lists
: Attrition.org Staff
|
| |
Chinese Military Power
: The Project on Defense Alternatives |
| |
Stealing the Network
: FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale |
| |
Teaching Intelligence: Getting Started
: John Macartney |
| |
Ambient Findability
: Peter Morville |
| |
Build Security In
: DHS National Cyber Security Division |
|
Basic Security Awareness [.pdf]: Geraint Jones
|
| |
Tor
: The Tor Project, Inc., EFF & ONR & DARPA |
| |
CISSP Exam & Study Information
: William Knowles |
| |
10 GPS Vulnerabilities
: LTC. Thomas K. Adams (Ret.)
|
| |
Hacking for a cause
: Brian Still |
| |
Rewards for Justice: Department of State,
Diplomatic Security Service |
| |
CERIAS Incident Response Database
: Purdue University |
| |
Redacting with Confidence
: SNAC-IAD - National Security Agency
|
| |
China's Psychological Warfare
: Laura K. Murray |
| |
The World's Most Dangerous Places: 5th Edition
: Robert Young Pelton |
| |
Electronic Encyclopaedia of Civil Defense & Emergency Management
: Walter Green |
| |
Chronology of Data Breaches Reported Since the ChoicePoint Incident
: Privacy Rights Clearinghouse |
| |
Chiefs of State & Cabinet Members of Foreign Governments
: Central Intelligence Agency |
| Added 7.4.2005 |
The Dynamic Terrorist Threat
: R. Kim Cragin, Sara A. Daly, RAND Corporation |
| |
Encyclopedia of Intelligence and Counterintelligence
: Edited by Rodney Carlisle |
| |
An Incomplete Manifesto for Growth
: Bruce Mau |
| |
2005 Terrorism Risk Map
: Aon United |
| |
Buzztracker
: Visual Representations of News on the Internet |
| |
ProcessLibrary.com
: Detailed information about every common process. |
| |
Arms Control Wonk
: Jeffrey Lewis, Paul Kerr |
| |
Open CRS Network
: CRS Reports for the People |
| |
Marine Corps Gazette
: The Professional Journal of the U.S. Marines |
| |
Air University Library Map Room
: U.S. Air Force |
| |
Electronic Warfare for the Digitized Battlefield
: by Michael Frater, Michael Ryan |
| |
Sun Tzu - The Art of War Strategy Site
: Intelligent Approach to Competition |
| |
Roadside Bombs and Armored Vehicles
: Thomas Herlihy |
| |
START
: National Consortium for the Study of Terrorism and Responses to Terrorism |
| |
Building Security: Handbook for Architectural Planning & Design
: Barbara A. Nadel |
| |
The Media's Portrayal of Hacking, Hackers, and
Hacktivism Before & After 9/11
: Sandor Vegh |
| Added 8.15.2004 |
Knoppix STD
: Linux Security Tools Distribution |
| |
Insecure.org: Home of Nmap, by Fyodor |
| |
Jane's C4I Systems 2004-2005: Giles Ebbutt (Editor) |
| |
Psychology of Intelligence Analysis: Richards J. Heuer, Jr. |
| |
ACIG Journal: Air Combat Information Group |
| |
Relearning Counterinsurgency Warfare: Robert T. Tomes |
| |
Military Battles and Campaigns: The Library of Congress |
| |
Urban Sunrise: U.S.A.F. Research Laboratory |
| |
WiGLE
: Wireless Geographic Logging Engine |
| |
Defeating Terrorists on the Waterfront: Commander James Pelkofski, U.S.N. |
| |
Hardening Your Computing Assets: Carlo Kopp |
| |
International Stability Operations Association (IPOA): Doug Brooks |
| |
Cybersecurity for Critical Infrastructure Protection: Government Accountability Office |
| |
Cyber Adversary Characterization: Auditing the Hacker Mind: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost |
| |
Info from Iraq - From Someone who is Doing the Run and Gun: Ben Thomas |
| |
What is C4I?
: C4I.org Staff |
| Added 11.15.2003 |
Hacker Generations
: Richard Thieme |
| |
Simple Nomad's DefCon 11 Rant
: Simple Nomad |
| |
Angola Landmine Database: Norwegian
Peoples Aid |
| |
Middle East Media Research Institute:
Independent Research Group |
| |
Partnership for Effective Peacekeeping Operations: A policy working group |
| |
BlackBerry Reveals Bank's Secrets: Kim
Zetter |
| |
Real-Time Top Ten Vulnerabilities: Qualys
Vulnerability Research Lab |
| |
Dead Horses in the Sun: Larry A.
Bell |
| |
SecurityDriver.com: Tony
Scotti |
| |
The Dawn of the E-Bomb: Michael Abrams |
| |
The Myth of Homeland Security: Marcus
Ranum |
| |
Jane's C4I Systems, 2003-2004: Giles Ebbutt (Editor) |
| |
Real 802.11 Security: Wi-Fi Protected Access & 802.11i: Jon Edney & William A. Arbaugh |
| |
Annual Report on the Military Power of The Peoples's Republic of China
[.pdf]: U.S. Department of Defense |
| |
Analysis of an Electronic Voting System:
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, & Dan S. Wallach |
| Added 7.1.2003 |
Iraq's Crash Course in Cyberwar: Brian McWilliams |
| |
Help Support C4I.org, Please Make a Donation: C4I.org Staff |
| |
North Korean Tactics: Maj. James M. Minnich |
| |
No Outward Sign: Bill Neugent |
| |
Jane's C4I Systems, 2002-2003: Giles Ebbutt (Editor) |
| |
Intrusion Detection with Snort: Jack Koziol |
| |
In the Company of Heroes: Michael J. Durant |
| |
Nothing Learned from Black Hawk Down: Mike Sparks |
| |
Failing to Keep Up With the Information Revolution: Bruce Berkowitz |
| |
Planning for Survivable Networks: Annlee A. Hines |
| |
Joint Doctrine for Information Operations [.pdf]: Joint Chiefs of Staff |
| |
Stealing the Network: How to Own the Box: Ryan Russell, Ido Dubrawsky, FX |
| |
Secrets of Computer Espionage: Joel McNamara |
| |
The Mind of War: Grant Tedrick Hammond |
| |
Chinese Defence Today: Unofficial website of the Chinese defence affair |
| |
If We Run Out of Batteries, This War is Screwed.
: Joshua Davis |
| |
The Influence Component of Counterterrorism
: Paul K. Davis & Brian Michael Jenkins |
| |
Association of Old Crows
: The Electronic Warfare & Information Operations Association
|
| |
International Charter Incorporated of Oregon: Worldwide aviation, security, and logistics services |
| Added
2.15.2002 |
The Marine Corps Professional Reading
Program List:
United States Marine Corps |
| |
Black Hawk Down - A Story of
Modern War:
Mark Bowden |
| |
Information Assurance Technology Analysis
Center:
Department of Defense |
| |
Civilians, Spies, and Blue Suits: Jeffrey T. Richelson
|
| |
Breakdown - How America's
Intelligence Failures Led to 9/11: Bill Gertz |
| |
The Center for Internet Security: Not-For-Profit Security
Organization |
| |
Internet Storm Center: The SANS Institute |
| |
DigitalGlobe: High-Res Commerical Satellite Imagery
|
| |
Boyd - The Fighter Pilot Who
Changed the Art of War: Robert Coram |
| |
Understanding Revolutionary
Warfare:
Major Dennis I. Merritt, USMC |
| |
Securing 802.11 with OpenBSD: Jarkko Turkulainen |
| |
The Liberty Incident: A. Jay Cristol |
| |
Pattern Recognition: William Gibson |
| |
Maximum Wireless Security: Cyrus Peikari, Seth Fogie
|
| |
Information Operations - The IFOR Experience
: Larry K. Wentz |
| |
The Ten Commandments of
Counterintelligence: James M. Olson |
| |
Strong Cryptography Links on the
Internet:
William Knowles |
| |
UCIA.org Domain For Sale
: C4I.org Staff |
| |
The Spread of the
Sapphire/Slammer Worm: David Moore, Vern Paxson Stefan Savage,
Colleen Shannon, Stuart Staniford, & Nicholas Weaver
|
| Added
11.15.2002 |
Reality Bytes: Cyberterrorism
and Terrorist 'Use' of the Internet:
Maura Conway |
| |
The Memorability and Security of
Passwords:
Jianxin Yan, Alan Blackwell, Ross Anderson, &
Alasdair Grant |
| |
The Art of Deception:
Controlling the Human Element of Security: Kevin D. Mitnick, William L.
Simon |
| |
The Myth of Cyberterrorism: Joshua Green |
| |
Honeypots: Tracking Hackers: Lance Spitzner |
| |
Matrix of recently prosecuted computer
intrusion cases:
U.S. Department of Justice |
| |
Network Intrusion Detection: An
Analyst's Handbook (2nd Edition): Stephen Northcutt |
| |
America Still Unprepared -
America Still in Danger: Council on Foreign Relations
|
| |
Managing Information Security
Risks: The OCTAVE Approach: Christopher J. Alberts, Audrey J.
Dorofee |
| |
IntelligenceCareers.com: Defense & intelligence
employment opportunities |
| |
Inferring Internet
Denial-of-Service Activity: David Moore, Geoffrey Voelker, &
Stefan Savage |
| |
Command and Control Research Program: Office of the Assistant
Secretary of Defense |
| |
Information-Age Psychological Operations
[.pdf]:
Commander Randall G. Bowdish, USN |
| |
Global Engagement: Building
Castles On Sand?: Col. Carla D. Bass, USAF |
| |
List of TCP and UDP port numbers: Wikipedia |
| |
Body of Secrets: Anatomy of the
Ultra-Secret National Security Agency: James Bamford |
| |
The Book of Five Rings: Miyamoto Musashi, William
Scott Wilson (Translator) |
| |
Information Operations: U.S. Air Force Doctrine
Document 2-5 |
| |
Hacktivists or Cyberterrorists?
The Changing Media Discourse on Hacking: Sandor Vegh |
| |
Electronic Warfare for the
Digitized Battlefield: Michael Frater, Michael Ryan
|
| |
The International Crisis Group
: Private, Multinational Organization to Prevent & Resolve Deadly Conflict. |
| |
Security Engineering: A Guide to
Building Dependable Distributed Systems: Ross J. Anderson |
| |
Critical Infrastructure
Protection - Commercial Satellite Security Should be More
Fully Addressed [.pdf]: General Accounting Office |
| |
Espionage Against the United States by American Citizens [.pdf]
: Katherine L. Herbig, Martin F. Wiskoff |
| |
Military
Operations Research Society: Professional Association of Military
and Civilian Defense Analysts, Planners, & Operators
|
| |
Oklahoma
City National Memorial Institute for the Prevention of
Terrorism:
Dedicated to preventing and reducing terrorism
|
| Added 8.15.2002 |
Military Response to 4GW in
Afghanistan:
Greg Wilcox and Gary I. Wilson |
| |
The Art of War: Sun Tzu, Samuel B. Griffith
(Translator) |
| |
How to Fight the Terror Networks: Francis Pisani |
| |
David H. Hackworth: Unique & Interesting
Viewpoints on the U.S. Military |
| |
The End of Secrecy?: Lt. Col. Beth M. Kasper, USAF
|
| |
Inside Al Qaeda: Global Network
of Terror:
Rohan Gunaratna |
| |
Envisioning Information: Edward R. Tufte |
| |
Homeland Insecurity: Charles Mann |
| |
Critical Infrastructure
Protection - July 2002: General Accounting Office |
| |
The CIA in Somalia, 1993: Vernon Loeb |
| |
On War: Karl Von Clausewitz
|
| |
MicroPilot: Low Cost Autopilot Hardware & UAV's
|
| |
Introduction to UAV Systems: Paul G. Fahlstrom, Thomas J.
Gleason |
| |
Trinux: Linux Security Toolkit |
| |
Realizing the Potential of C4I:
Fundamental Challenges: National Research Council |
| |
Management Responsibility in
Protecting Information Assets: An Australian Perspective: Adrian McCullagh |
| |
The Art of Information Warfare:
Insight into the Knowledge Warrior Philosophy: Richard Forno, Ronald Baklarz
|
| Added 4.30.2002 |
Stay
Safe Online:
National Cyber Security Alliance |
| |
BECCA: William M. Johnson, Ph.D |
| |
VulnWatch: Steve Manzuik |
| |
The New Mobile Infantry: Michael Behar |
| |
The Man Who Tried to Save the
World : The Dangerous Life and Mysterious Disappearance
of Fred Cuny:
Scott Anderson |
| |
The Open Channel Foundation: Open Source Software from
Academic & Research Institutions |
| |
Textfiles.com: Jason Scott |
| |
The CIA Insider's Dictionary of
U.S. and Foreign Intelligence, Counterintelligence &
Tradecraft:
Leo D. Carl |
| |
Uncloaking Terrorist Networks: Valdis E. Krebs |
| |
Trusted Recovery and Defensive
Information Warfare: Peng Liu & Sushil Jajodia
|
| |
Intelligence Analysis for
Internet Security: Ideas, Barriers and Possibilities: Timothy Shimeall, Phil
Williams, & Casey Dunleavy |
| |
KGB Lexicon: The Soviet
Intelligence Officer's Handbook: Vasiliy Mitrokhin |
| |
In Athena's Camp: Preparing for
Conflict in the Information Age: John Arquilla |
| |
G2mil
- Warfare Research Portal: Carlton Meyer |
| |
AlertNet: Reuters Foundation |
| |
Snort: Open Source Network Intrusion
Detection System |
| |
An Analysis of Al-Qaida
Tradecraft:
Decision Support Systems, Inc. |
| |
Asymmetric Warfare and the
Threat to the American Homeland: Joseph C. Cyrulik |
| Added 2.15.2002 |
Councils of War: James Fallows |
| |
w00w00 Security Development: Largest Private, Non-Profit
Computer Security Group |
| |
Shadow Warriors: Inside the
Special Forces:
Tom Clancy & General Carl Stiner (Ret.) |
| |
SecureMac: Apple Macintosh Security Site
|
| |
Terrorist Group Profiles - Index
of Groups:
Naval Postgraduate School |
| |
Minimanual of the Urban
Guerrilla:
Carlos Marighella |
| |
The Falling Leaf: The Journal of the Psywar
Society |
| |
Dual Use Aspects of Commercial
High-Resolution Imaging Satellites: Gerald Steinberg |
| Added 1.1.2002 |
Network-Centric Warfare and
Complex Humanitarian Emergencies, Meet Napster! [.doc]: W. Scott Gureck |
| |
The Art of Naming Operations: Gregory C. Sieminski
|
| |
The Creation and Dissemination of All
Forms of Information in Support of Psychological
Operations (PSYOP) in Time of Military Conflict [.pdf]: Department of Defense
|
| |
Networks and Netwars: The Future
of Terror, Crime, and Militancy: John Arquilla & David F.
Ronfeldt |
| |
Working with the CIA: Garrett Jones |
| |
Nomad
Mobile Research Centre: Simple Nomad |
| |
Cryptology in the 16th and 17th
Centuries:
Thomas Leary |
| |
Navajo Code Talkers' Dictionary: Department of the Navy
|
| |
NIST National Vulnerability Database: National Institute of
Standards & Technology |
| |
Information Warfare Principles
and Operations:
Edward Waltz |
| |
Joint Force Quarterly: National Defense University
|
| |
The Nessus Project: Renaud Deraison |
| |
Information Warfare Tutorial: Robert F. Minehart, Jr.
|
| |
Warfare in the Third World: Robert E. Harkavy, Stephanie
G. Neuman |
| |
An Unorthodox Soldier: Tim Spicer |
| |
Mines
Advisory Group:
Private Landmine Clearance Organization |
| |
Directed Energy Professional
Society:
Research and Development of Directed Energy |
| |
Hunter, the Hammer, and Heaven:
Journeys to Three Worlds Gone Mad: Robert Young Pelton
|
| |
Robotics at SPAWAR: Space and Naval Warfare
Systems Center, San Diego |
| |
WarDriving.com: Driving around looking for
unsecured wireless networks |
| |
World Trade Center Damage Map: The City of New York, Urban
Data Solutions & CNN |
| |
List of Business Offices,
Tenants, and Companies in the World Trade Center: Gary Stock |
| |
National
Law Enforcement and Corrections Technology Center: National Institute of Justice
|
| Added 10.2.2001 |
The Packetfactory
: Clearinghouse for Free Network Security Software - Mike Schiffman |
| |
Fundamentals of Electronic
Warfare:
Sergei A. Vakin |
| |
Ew 101 : A First Course in
Electronic Warfare: David L. Adamy |
| |
Talisker's List of Intrusion Detection
Systems:
Talisker |
| |
The
International Policy Institute for Counter-Terrorism: Boaz Ganor |
| |
FM 90-10 Military Operations on
Urbanized Terrain (MOUT): United States Army |
| |
Seismic Observations of the
World Trade Center Disaster: Lamont-Doherty Earth Observatory of
Columbia University |
| |
Information Technology & Operations
Center:
United States Military Academy |
| |
Defense Security Service: Department of Defense
|
| |
The
Center for Strategic & International Studies: Strategic Insights on Current
& Emerging Global Issues |
| Added 8.27.2001 |
Security-Enhanced Linux: National Security Agency |
| |
Defensive Information Warfare: David S. Alberts |
| |
Information Security: An
Integrated Collection of Essays: Edited by Marshall D. Abrams,
Sushil Jajodia & Harold J. Podell |
| |
Computer Viruses in Electronic
Warfare:
Dr. Myron L. Cramer and Stephen R. Pratt |
| |
Fighting the Wily Hacker:
Modeling Information Security Issues for Online Financial
Institutions Using the SEAS Environment: Alok Chaturvedi, Mukul Gupta,
Shailendra Mehta & Lorenzo Valeri |
| |
The meaning of Eligible Receiver: The Crypt Newsletter
|
| |
U.S.S. Liberty Homepage: Jim Ennes & Joe Meadors
|
| Added 6.27.2001 |
Information Operations [.pdf]: United States Marine Corps
Warfighting Publication |
| |
Equipped To Survive: Douglas Ritter |
| |
ProMED-mail
: The Global Electronic
Reporting System for Outbreaks of Emerging Infectious
Diseases & Toxins |
| |
Journal of Military and Strategic Studies
: Centre for Military and Strategic Studies |
| |
Center for the Study of Chinese
Military Affairs: National Defense University |
| |
Cyber Threat Trends and US Network Security
: National Intelligence Council |
| |
DominoSecurity.org: Chuck Connell |
| |
Jane's C4I Systems 2001-2002: Edited by Clive Walker
|
| |
The Cult of the Dead Cow: cDc Communications |
| Added 5.1.2001 |
Swarming and the Future of
Conflict [.pdf]:
John Arquilla & David F. Ronfeldt |
| |
Cornerstones of Information Warfare: United States Air Force
|
| |
Blind Man's Bluff: The Untold
Story of American Submarine Espionage: Sherry Sontag |
| |
The Spy Who Lost Me: Michelle Delio - Wired News
|
| |
Whom the Gods Would Destroy: An
Information Warfare Alternative for Deterrence and
Compellence:
Maj. Robert D. Critchlow |
| |
The Ethics of Computer Network
Attack:
William J. Bayles |
| Added 4.6.2001 |
Information Warfare: Hype or
Reality [.pdf]:
E. Anders Eriksson |
| |
Asymmetric Threats and the next QDR
: Kenneth McKenzie, Jr. |
| Added 3.23.2001 |
Microsoft, VeriSign Warn of
Security Hole:
Cameron Crouch, PCWorld.com |
| |
Sources and Techniques of
Obtaining National Defense Science and Technology
Intelligence:
Huo Zhongwen and Wang Zongxiao |
| Added 1.29.2001 |
Microsoft Admits Hack Attacks: Cameron Crouch, PCWorld.com
|
| Added
12.17.2000 |
U.S. Is Relaxing Rules on Sale of
Satellite Photos: Vernon Loeb - Washington Post
|
| Added
11.28.2000 |
Pentagon IG Report on
Allegations of Breaches of Security by Dr. John M.
Deutch: Federation of American Scientists |
| Added
11.16.2000 |
Checklist for the Future of
Intelligence:
Dr. John Hollister Hedley |
| |
Institute for Crisis, Disaster and Risk
Management:
George Washington University |
| |
Naval Intelligence Professionals: Furthering knowledge of the
art of maritime intelligence. |
| Added
11.14.2000 |
Research
Institute for European and American Studies: Non-profit institute for the
analysis of security, intelligence, and policy issues. |
| |
Special Operations.Com: Information about U.S. and
International Special Operations teams |
| Added 11.6.2000 |
Russian merchant ships used in spying: Bill Gertz - The Washington
Times |
| Added
10.30.2000 |
Pings and E-Arrows Fly in Mideast
Cyber-War:
The Washington Post |
| |
Information Security in a Third Wave
Society:
William P. Crowell, Deputy Director, NSA |
| Added
10.20.2000 |
NSA Korean War Commemoration: National Security Agency
|
| Added
10.16.2000 |
SearchMil: Privately run search engine of U.S.
Military sites. |
| Updated
11.25.2002 |
Photos of Sierra Leone: Doug Brooks |
| Added 9.8.2000 |
Managing the Information
Security Program: U.S. Air Force |
| Added 8.6.2000 |
A Look at Spy Satellites and Hollywood: The Washington Post |
| |
Man Poses as Astronaut, Steals NASA
Secrets :
Reuters News Service |
| Added 7.10.2000 |
Possible Soviet Responses to the
US Strategic Defense Initiative: Declassified Interagency
Intelligence Assessment |
| Added 6.25.2000 |
WHY SPY? The Uses and Misuses of
Intelligence:
Stanley Kober - CATO Institute |
| |
The Complete, Unofficial TEMPEST
Information Page: Joel McNamara |
| |
FIRST: Forum of Incident Response and
Security Teams |
| Added 6.21.2000 |
The
Common Vulnerabilities & Exposures (CVE) Project: The MITRE Corporation |
| Added 6.14.2000 |
May 2000 GAO Report on FAA Computer
Security [.pdf]:
General Accounting Office |
| Added 6.9.2000 |
Countering the Changing Threat
Of International Terrorism: National Commission on Terrorism |
| |
The Inevitability of Failure: The Flawed
Assumption of Security in Modern Computing Environments
[.pdf]:
Peter A. Loscocco, Stephen D. Smalley, Patrick A.
Muckelbauer, Ruth C. Taylor, |
| |
Considerations for Allocating Resources
for Information Security [.pdf]: Marshall D.
Abrams, Carolyn M. Johnson, Jay J. Kahn, and Susan G.
King - MITRE Corporation |
| |
NASA NPG 2810.1 - Security of Information
Technology:
NASA Chief Information Officer |
| |
Rainbow Series Library: National Computer Security
Center |
| |
NOT the Orange Book: Paul H. Merrill |
| Added 4.22.2000 |
Missing PC Held Trove of Secrets: The Washington Post |
| Updated
1.1.2002 |
It's Not What You Know,
It's Who You Know: Work in the Information Age: Bonnie Nardi |
| Added 3.13.2000 |
Toys for the U.S. Military?: Pros and Cons of laptops
and Palm Pilots for the military. |
| Added 2.18.2000 |
Improper Handling of
Classified Information by John M. Deutch: Central Intelligence
Agency |
| |
Activism, Hacktivism, and
Cyberterrorism: Dorothy E. Denning |
| |
Hostile Intelligence Threat
[.pdf]:
Department of Defense |
| Added 5.15.2000 |
NASA's Information Security
Vulnerability: United States General Accounting
Office |
| |
Strategic Information
Warfare Rising: RAND Corporation |
| |
FM 34-8-2 Intelligence
Officer's Handbook: United States Army |
| |
FM 34-60
Counterintelligence: United States Army |
| |
Humanitarian Assistance and Disaster
Relief Assessments [.pdf]: United States Marine
Corps Warfighting Laboratory |
| |
Jane's C4I Systems
1999-2000:
Edited by Clive Walker |
| Added
11.19.2000 |
Zen and the Art of Hacking: Richard Thieme - Internet
Underground |
| Updated
11.15.2002 |
Cutting Out The Hackers: Ted C. Fishman -
Playboy.com |
| Updated
10.2.2001 |
The Economic Espionage Act
of 1996: Department of Justice |