Document 01
This report explains the costs associated with a widespread power failure, particular vulnerabilities, and strategies to mitigate vulnerabilities. The document was written at an early stage of reliance on computer systems.
Document 02
This agreement is intended to facilitate bilateral development for infrastructure and border security between the US and Canada.
Document 03
This document assesses the impact of the EINSTEIN program, an automated collection, analysis, and sharing process for computer security on Federal civilian networks and employee privacy.
Document 04
This document describes NSA efforts to decrypt peer-to-peer (P2P) internet traffic.
Document 05
This document provides a framework for maintaining control of classified information when interacting with contractors.
Document 06
This document reports the findings of a panel convened to take the trends identified in Volume I and consider what new missions, capabilities, and technology may be required in the future.
Document 07
This document is a request to submit prepared text to the United Nations CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes. The text includes the US position on the challenges presented by terrorist activity on the internet, legal measures to counter terrorist use of the internet, protection of human rights online, projects to research and counter terrorist use of the internet, and information sharing projects to counter terrorist use of the internet.
Document 08
This notice, which references OPNAVINST 5400.44A and OPNAVINST 5400.45, gives approval for the reorganization of Navy cyber-operations units to rename Navy Cyber Forces as Navy Information Dominance Force, which becomes responsible for manning, training, and equipping all "information dominance forces".
Document 09
This report provides recommendations for the modernization of interagency information technology and addresses challenges related to prioritization, procurement, and technical issues.
Document 10
This document summarizes trends in response to a request for comments issued as part of the process of implementing Executive Order 13800.
Document 11
This testimony provides an assessment of the Army's network and readiness and summarizes the strategy for network modernization.