This document provides procedures for the implementation of Executive Order 12958 with the Department of Defense.
This document provides a short introduction to the NSA's working group for the development of VPN exploits.
This document makes recommendations for cooperation between the United States and the United Kingdom related to emerging technologies including power sources, improved computing, critical electronic components, command environments, and surveillance.
This document identifies trends in tech development and its relevance to defense strategy.
This document is a piece of a leak which revealed details related to cooperation between the Russian Government and the telecommunications industry for complex data collection operations in Russia.
This document provides guidance to civilian drone operators for managing risk in a variety of ways to include communications and data security.
This report is the result of an industry discussion on harnessing and securing the "Internet of Things" most effectively.
This document gives guidance for the use of encryption for securing unclassified Federal data.
This document identifies ten key practices for the use of cloud computing and assesses cloud computing contractors by department according to those practices.
This document provides an overview of organized crime either occurring on or enabled by the cyber domain.
This opinion rules that the FBI will not be able to conceal the price paid to a tech vendor for unlocking an iPhone belonging to a suspected terrorist.
This testimony explains how Equifax data was compromised and what measures were taken to protect US consumers after the attack.