Document 01
This document reports weaknesses in IRS modernization efforts stemming from managerial and technical shortcomings.
Document 02
This presentation examines cyber operations within the context of jihadist group global asymmetric warfare strategies.
Document 03
This thesis explores the risk from microchips manufactured with intentional vulnerabilities and strategies for securing the cyber supply chain.
Document 04
This thesis explores the possibility of effective deterrence in cyberspace.
Document 05
This thesis explores the impact of cyber on military strategy and proposes a theory for cyberspace strategy.
Document 06
This document analyzes objectives and threats for the Department of Defense's consideration and places cyber within the context of greater joint operations and threats.
Document 07
This document contains three unsealed NSA OIG reports related to FISA Section 702 as well as, in the case of the first report, Section 215 of the USA PATRIOT Act.
Document 08
This document shows how attackers can use a vulnerability present in modern computer processors to access information without security or privileges on nearly all consumer computer devices.
Document 09
This document shows how attackers can use vulnerabilities in Intel, AMD, and ARM processor designs to cause systems to leak confidential information.