![United-States-Congress-Testimony-of-Gene-Aloise](/sites/default/files/styles/thumbnail/public/documents/3996846/United-States-Congress-Testimony-of-Gene-Aloise.pdf.jpeg?itok=v6Y9Tltx)
Document 01
This testimony, delivered in 2008 at the conclusion of a security review of the Los Alamos National Laboratory, reports on the state of the laboratory's physical and cyber security, including shortcomings in the security of its unclassified computer networks.
![Government-of-South-Korea-National-Cyber](/sites/default/files/styles/thumbnail/public/documents/3996847/Government-of-South-Korea-National-Cyber.pdf.jpeg?itok=pUEbGP1H)
Document 02
This document outlines South Korea's strategy for developing an effective cyber response capability. Cooperative efforts are heavily emphasized.
![Department-of-the-Navy-Realignment-of](/sites/default/files/styles/thumbnail/public/documents/3996850/Department-of-the-Navy-Realignment-of.pdf.jpeg?itok=vbmCvv-w)
Document 04
This notice by the Chief of Naval Operations reorganizes commands between Fleet Cyber Command and the Navy Information Dominance Force.
![Congressional-Research-Service-Encryption-and](/sites/default/files/styles/thumbnail/public/documents/3996851/Congressional-Research-Service-Encryption-and.pdf.jpeg?itok=m4klXGZ-)
Document 05
This document outlines challenges to law enforcement that arise from rapidly evolving encryption techniques and risk outpacing the law enforcement community's decryption capabilities.
![National-Institute-of-Standards-and-Technology](/sites/default/files/styles/thumbnail/public/documents/3996852/National-Institute-of-Standards-and-Technology.pdf.jpeg?itok=tVbP0b-8)
Document 06
This presentation outlines an adaptable framework for cybersecurity that can be tailored to specific critical infrastructure 'profiles'.
![US-Department-of-Homeland-Security-Strategic](/sites/default/files/styles/thumbnail/public/documents/3996853/US-Department-of-Homeland-Security-Strategic.pdf.jpeg?itok=7tzH_9em)
Document 07
This document observes that security is being outpaced by innovation related to the Internet of Things and establishes a framework of developing the relevant security within the developer, manufacturer, service provider, and consumer communities.
![Government-Accountability-Office-Critical](/sites/default/files/styles/thumbnail/public/documents/3996855/Government-Accountability-Office-Critical.pdf.jpeg?itok=cJ7XDCrI)
Document 08
This report examines secure efforts in federally-administered critical infrastructure and recommends that DHS make efforts to coordinate access control between different sectors.
![Office-of-the-Director-of-National-Intelligence](/sites/default/files/styles/thumbnail/public/documents/3996856/Office-of-the-Director-of-National-Intelligence.pdf.jpeg?itok=IVh0LQAy)
Document 09
This document explains the FISA Amendments Act from the perspective of the US Intelligence Community.
![Department-of-Homeland-Security-Cyber-Threats-to](/sites/default/files/styles/thumbnail/public/documents/3996857/Department-of-Homeland-Security-Cyber-Threats-to.pdf.jpeg?itok=EVaZNhec)
Document 10
This document reveals that first responder professional networks and personal information have been increasingly targeted in cyber attacks.
![Congressional-Research-Service-Justice](/sites/default/files/styles/thumbnail/public/documents/3996858/Congressional-Research-Service-Justice.pdf.jpeg?itok=qSXeersD)
Document 11
This document explains the function of the Justice Department, specifically the FBI, in federal response to cyber incidents.
![Cyber-Emergency-Response-Team-Advisory-Abbot](/sites/default/files/styles/thumbnail/public/documents/3996859/Cyber-Emergency-Response-Team-Advisory-Abbot.pdf.jpeg?itok=BzW8R9Yc)
Document 12
This notice warns of vulnerabilities in several models of pacemakers using RF communications.