This document outlines the basic concepts of information warfare and gives an overview of implementation as of 1996.
This document outlines Saudi Arabia's information security objectives, frameworks, and infrastructure. The strategy document also makes recommendations related to implementation.
This presentation assesses the DOD's ability to produce a clear budget estimate for cyber operations and concludes that budget difficulties are due to unclear organization and definitions.
This document outlines Estonia's cyber defense capabilities, policies, and legal frameworks.
This bulletin explained to law enforcement ways in which the "hidden internet" was being used by criminals.
This report gives the history of Section 702, legal and policy assessments, and makes 10 recommendations addressing privacy concerns.
This publication outlines procedures for cyberspace operations and examines emerging capabilities within the Marine Corps.
This report examines social engineering as it relates to multi-layered information operations.
This IG report examines the FBI's use of the "business record" provision of the Patriot Act.
This report documents the results of a workshop by the same name and finds six themes in workshop discussions.
This document notifies all departments and agencies in the executive branch of the issuance of a directive to discontinue use of Kaspersky products.
This opinion gives the court's reasons for dismissing the class action lawsuit against the OPM for failing to control access to the personal information of federal employees.