Apr 1, 2014 Government Accountability Office, GAO-14-354, Information Security: Agencies Need to Improve Cyber Incident Response Practices. April 2014. Unclassified. Source Government Accountability Office.
Apr 1, 2014 Department of Energy (U.S.), Cybersecurity Procurement Language for Energy Delivery Systems, April 2014
Mar 26, 2014 William S. Angerman, National Defense University, Cyber Power for the Joint Force Commander: An Operational Design Framework, March 26, 2014. Unclassified. Source Defense Technical Information Center.
Mar 14, 2014 Department of Defense Instruction 8500.01, Subject: Cybersecurity, March 14, 2014. Unclassified. Source www.dtic.mil/whs/directives
Mar 14, 2014 USCYBERCOM, "TASKORD 14-0061: USCYBERCOM Operational Processes", March 14 2014. Unclassified. Source FOIA
Mar 12, 2014 Department of Defense, DoD Instruction 8510.01, Subject: Risk Management Framework (RMF) for DoD Information Technology, March 12, 2014. Unclassified. Source Defense Technical Information Center.
Mar 6, 2014 John M. McHugh, Secretary of the Army, General Orders No. 2014-02, Affirmation of Secretary of the Army Commitment to Unity of Effort: Designation of U.S. Army Cyber Command as an Army Force Component Headquarters: Reactivation of Second Army and Designation as a Direct Reporting Unit; Disestablishment of the U.S. Army Network Enterprise Technology Command/9th Signal Command (Army) as a Direct Reporting Unit and Reassignment to Second Arm; Designation of General Court-Martial Convening Authorities, March 6, 2014. Unclassified. Source www.apd.army.mil/pdffiles/go1402.pdf
Mar 5, 2014 Secretary of the Air Force, Air Force Instruction 10-1701, "Command and Control (C2) for Cyberspace Operations," March 5, 2014. Unclassified. Source www.e-publishing.af.mil
Mar 1, 2014 Wylie McDade, Naval Postgraduate School, Attribution, delayed attribution and covert cyber-attack. Under what conditions should the United States publicly acknowledge responsibility for cyber operations?, March 2014. Unclassified. Source Defense Technical Information Center
Mar 1, 2014 Justin R. Ball, Air Force Institute of Technology, Air University, Detection and Prevention of Android Malware Attempting to Root the Device, March 2014. Unclassified. Source Defense Technical Information Center.
Mar 1, 2014 Office of the Director of National Intelligence, National Intelligence Program, FY 2015 Congressional Budget Justification, Volume XIII: National Geospatial-Intelligence Agency. Top Secret/SI/TK/RSEN/Noforn. Source www.fas.org.
Mar 1, 2014 United States Marine Corps, Marine Corps Enterprise Network Unification Plan 2014-2017, March 2014. Unclassified. Source United States Marine Corps
Mar 1, 2014 North American Electric Reliability Corporation, “Grid Security Exercise (GridEx II) After-Action Report”, March 2014. Unclassified. Source North American Electric Reliability Corporation
Feb 28, 2014 Emily O. Goldman and John Arquilla (eds.), Naval Postgraduate School, Cyber Analogies, February 28, 2014. Unclassified. Source Naval Postgraduate School.
Feb 26, 2014 UK Trade and Investment, “Cyber Security: The UK’S Approach to Exports,” February 26, 2014. Unclassified. Source Gov.uk.
Feb 26, 2014 Department of Justice, James Comey (FBI) speeach at the RSA Cyber Security conference, The FBI and the Private Sector: Closing the Gap in Cyber Security, February 26, 2014