Document 01
This volume reports on the result of the author's investigation into the behavior of distributed communications networks under various loading conditions.
Document 02
This paper examines vulnerabilities in global, national and defense information infrastructure; reviews directives, regulations, and policies; and discusses the role of government in protecting information infrastructure.
Document 03
Cyber Conflict Studies Association.
This transcript of an interview related to the Moonlight Maze investigation concerns a call from an individual reporting on the use of her username and password to break in into computers, including those at Wright Patterson Air Force Base in Ohio.
Document 04
Defense Technical Information Center.
This technical report describes the development of the Automated Intrusion Detection Environment - a computer network attack warning capability designed "to respond to the need of local administrators, regional computer emergency response team analysts, and analysts at the [Global Network Security Operations Center]."
Document 05
This directive establishes guidance and procedures for the DoD INFOCON system - which provides a framework for increasing the measurable readiness of networks to match operational priorities.
Document 06
Topics discussed in this Top Secret Codeword briefing include MyNOC as a physical space, concept, and personnel, the relation to MyNOC and the Network Analysis Centre, and a collection operation targeting Belgian communications.
Document 07
This GAO study responds to a Congressional requirement for the office to evaluate the Joint Information Environment - a 2010 Secretary of Defense initiative to improve mission effectiveness and network security.
Document 08
This document discusses the four topics concerning the United Kingdom's newly established National Cyber Security Centre - vision, key objectives, methodology, and "who we work for."
Document 09
This strategy document focuses on five themes of action for Australian cyber security from 2016 to 2020 - national cyber partnership, strong cyber defenses, global responsibility and influence, growth and innovation, and "a cyber smart nation."
Document 10
This audit is a follow up a to 2015 investigation concerning United States Secret Service employees improperly accessing and distributing sensitive information on the service's Master Criminal Index system. It resulted in ten recommendations to the USSS and one to the DHS Privacy Office.
Document 11
This audit details the results of an Inspector General's investigation of the Transportation Department's procedures for (1) monitoring, detecting, and eradicating cyber incidents, and (2) reporting incidents and their resolution to appropriate authorities.
Document 12
This FinCEN advisory is intended to assist financial institutions with regard to Bank Secrecy Act obligations with respect to cyber-events and cyber-related crime. Subjects discussed include reporting via Suspicious Activity Reports (SARs), information to be included in SARs, collaboration between BSA/Anti-Money Laundering units and in-house cybersecurity units, and information sharing.