This document reveals how the Air Force conceptualized information warfare as a part of Air Force doctrine in the mid-to-late 1990s.
This agreement establishes a joint-operated International Law Enforcement Academy to provide training and assistance to Latin American law enforcement agencies for combating cyber-crime and other criminal threats.
This document examines challenges in acquiring a fielding next-generation technologies and potential enablers to the acquisition process.
This memo requests all military department secretaries and combatant command commanders to beat a deadline set by the Chairman of the Joint Chiefs of Staff for incorporating cyber challenges into major military exercises.
This document provides an outline of career progression and skills requirements for cyber careers within the Air Force.
This document provides guidance for the use of threat intelligence and situational awareness for network security.
This document provides details related to the December 2015 cyber-attack on Ukrainian power companies as well as mitigating steps that could and/or should have been taken.
This document serves as a guide for the secure implementation and use of cloud computing within the Department of Defense.
This testimony explores cyber threats and possible responses within the context of Russian activities.
This memo announces the establishment of a team to accelerate integration of big-data and machine learning into joint operations.
This document reports findings from the DEFCON Voting Machine Hacking Village in which every piece of equipment was breached by the end of the conference.