This document reports weaknesses in IRS modernization efforts stemming from managerial and technical shortcomings.
This presentation examines cyber operations within the context of jihadist group global asymmetric warfare strategies.
This thesis explores the risk from microchips manufactured with intentional vulnerabilities and strategies for securing the cyber supply chain.
This thesis explores the possibility of effective deterrence in cyberspace.
This thesis explores the impact of cyber on military strategy and proposes a theory for cyberspace strategy.
This document analyzes objectives and threats for the Department of Defense's consideration and places cyber within the context of greater joint operations and threats.
This document contains three unsealed NSA OIG reports related to FISA Section 702 as well as, in the case of the first report, Section 215 of the USA PATRIOT Act.
This document shows how attackers can use a vulnerability present in modern computer processors to access information without security or privileges on nearly all consumer computer devices.
This document shows how attackers can use vulnerabilities in Intel, AMD, and ARM processor designs to cause systems to leak confidential information.