May 1, 2016 United States Government Accountability Office, Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems, May 2016
May 1, 2016 United States Government Accountability Office, GAO Report to the Committee on Science, Space, and Technology, House of Representatives. POLAR WEATHER SATELLITES: NOAA is working to ensure continuity but needs to quickly address information security weaknesses and future program uncertainties, May 2016
May 1, 2016 Department of Homeland Security, Electricity Subsector Coordinating Council, Protecting the Electric Grid from threats that could impact national security is a responsibility shared by both the government and the electric power sector, May 2016
May 1, 2016 Department of Homeland Security, Electricity Subsector Coordinating Council, Protecting the Electric Grid from threats that could impact national security is a responsibility shared by both the government and the electric power sector, May 2016
May 1, 2016 National Institute of Standards and Technology, NIST Special Publication 800-160, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, May 2016
May 1, 2016 National Institute of Standards and Technology, NIST Special Publication 800-160, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, May 2016
May 1, 2016 Sen. Mike Rounds, "Cyber Act of War Act of 2016," May 2016. Unclassified. Source US Senator Mike Rounds website
May 1, 2016 Office of the Inspector General, Department of State, ESP-16-03, Office of the Secretary Evaluation of Email Records Management and Cybersecurity Requirements, May 2016. Unclassified. Source Department of State.
May 1, 2016 Donald Tobin, Michael J. Stone, Anne Townsend, Harry Perper, and Sarah Weeks, National Institute of Standards and Technology, The Mitre Corporation, Data Integrity: Recovering from a destructive malware attack, May 2016. Unclassified. Source National Institute of Standards and Technology.
May 1, 2016 Government Accountability Office, Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems, May 2016. Unclassified. Source Government Accountability Office.
May 1, 2016 2015 Assessment of Most Significant Drug Trafficking Organizations Operating in Mexico Source Freedom of Information Act request to DEA
May 1, 2016 Huawei Cyber Security Evaluation Centre (HCSEC) Oversight Board, Annual Report 2016: A report to the National Security Adviser of the United Kingdom. May 2016. Source Government of the United Kingdom.
Apr 30, 2016 Office of the Director of National Intelligence, "Statistical Transparency Report Regarding use of National Security Authorities, Annual Statistics for Calendar Year 2015", April 30 2016. Unclassified. Source DNI
Apr 30, 2016 Sonia Kaestner, Craig Arndt, and Robin Dillon-Merrill, Proceedings of the Thirteenth Annual Acquisition Research Symposium, Wednesday Sessions, Volume I, The Cybersecurity Challenge in Acquisition, April 30, 2016. Unclassified. Source Defense Technical Information Center.
Apr 29, 2016 National Security Agency//CSS, NSA/CSS FOIA release. Any and all records about the NSA 'search be it manual or electronic, for emails written/sent by Edward Snowden, April 29, 2016
Apr 29, 2016 Federal Bureau of Investigation, Private Industry Notification, "Wireless Keystroke Logger Disguised as USB Device Charger Targets Wireless Keyboards," April 29, 2016. Unclassified. Source Public Intelligence.
Apr 29, 2016 Inspector General, Department of Defense, DODIG-2016-082, DoD Needs to Require Performance Assurance Countermeasures During Major Weapon System Acquisitions, April 29, 2016. Unclassified/For Official Use Only. Source Inspector General, Department of Defense.
Apr 28, 2016 Department of StateIguala, PDAS, Rep Lowenthal - Subcommittee Hearing: Examining FY 2017 Funding Priorities 4/27Unclassified Source FOIA
Apr 26, 2016 Department of Justice, James Comey(FBI) speach at the International Conference on Cyber Engagement, Georgetown University, Privacy, Public Safety, and Security: How we can confront the Cyber Threat Together, April 26, 2016