
Document 01
This document reveals how the Air Force conceptualized information warfare as a part of Air Force doctrine in the mid-to-late 1990s.

Document 02
This agreement establishes a joint-operated International Law Enforcement Academy to provide training and assistance to Latin American law enforcement agencies for combating cyber-crime and other criminal threats.

Document 03
This document examines challenges in acquiring a fielding next-generation technologies and potential enablers to the acquisition process.

Document 04
FOIA Request
This memo requests all military department secretaries and combatant command commanders to beat a deadline set by the Chairman of the Joint Chiefs of Staff for incorporating cyber challenges into major military exercises.

Document 05
This document provides an outline of career progression and skills requirements for cyber careers within the Air Force.

Document 06
This document provides guidance for the use of threat intelligence and situational awareness for network security.

Document 07
This document provides details related to the December 2015 cyber-attack on Ukrainian power companies as well as mitigating steps that could and/or should have been taken.

Document 08
This document serves as a guide for the secure implementation and use of cloud computing within the Department of Defense.

Document 09
This testimony explores cyber threats and possible responses within the context of Russian activities.

Document 10
This memo announces the establishment of a team to accelerate integration of big-data and machine learning into joint operations.

Document 11
This document reports findings from the DEFCON Voting Machine Hacking Village in which every piece of equipment was breached by the end of the conference.