This report explains the costs associated with a widespread power failure, particular vulnerabilities, and strategies to mitigate vulnerabilities. The document was written at an early stage of reliance on computer systems.
This agreement is intended to facilitate bilateral development for infrastructure and border security between the US and Canada.
This document assesses the impact of the EINSTEIN program, an automated collection, analysis, and sharing process for computer security on Federal civilian networks and employee privacy.
This document describes NSA efforts to decrypt peer-to-peer (P2P) internet traffic.
This document provides a framework for maintaining control of classified information when interacting with contractors.
This document reports the findings of a panel convened to take the trends identified in Volume I and consider what new missions, capabilities, and technology may be required in the future.
This document is a request to submit prepared text to the United Nations CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes. The text includes the US position on the challenges presented by terrorist activity on the internet, legal measures to counter terrorist use of the internet, protection of human rights online, projects to research and counter terrorist use of the internet, and information sharing projects to counter terrorist use of the internet.
This notice, which references OPNAVINST 5400.44A and OPNAVINST 5400.45, gives approval for the reorganization of Navy cyber-operations units to rename Navy Cyber Forces as Navy Information Dominance Force, which becomes responsible for manning, training, and equipping all "information dominance forces".
This report provides recommendations for the modernization of interagency information technology and addresses challenges related to prioritization, procurement, and technical issues.
This document summarizes trends in response to a request for comments issued as part of the process of implementing Executive Order 13800.
This testimony provides an assessment of the Army's network and readiness and summarizes the strategy for network modernization.