This memorandum gave authority to the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence, the Under Secretary of Defense for Policy, the General Counsel, the Under Secretary of Defense for the Office of the Comptroller, and the Chairman of the Joint Chiefs of Staff to negotiate agreements with other nations for cooperation related to information security and critical infrastructure protection.
This document provides organizations within the UK's Critical National Infrastructure guidance for responding to DDoS attacks.
This document examines ways to transform the DoD's science and technology enterprise to address future security challenges.
This document explains how to conduct Layer 3 network shaping using Yemen as an example.
This document is an agreement between the US and UK to cooperating on technology development related to infrastructure and homeland security.
This guide establishes a framework for securing industrial control systems as well as how to respond in the case of a cyber security event.
This version/letterhead no longer online
In this speech, Clapper uses an anecdote about a trip to North Korea to argue that a form of cyber deterrence would be appropriate for increasing the cost of North Korean cyber operations.
This presentation by the US-CERT Cyber Threat Information Sharing Branch provides information on the Brobot and Dridex botnets as well as the third version of the CryptoWall ransomware.
This report explores the legal implications of encryption including compelled decryption as it relates to the right against self-incrimination and compelled assistance.
This document reports that HR3101 would cost an estimated $38 million from 2018-2022.
This document reports weaknesses in the Department of Energy's vulnerability management program, web application integrity, and access control.
This document outlines the fundamental elements developed by the G-7 for cybersecurity in the financial sector.