Jun 1, 2015 Office of the Director of National Intelligence, Cyber Threat Intelligence Integration Center (CTIIC) 90-Day Status Report, June 2015. Unclassified. Source ODNI Freedom of Information Act Release.
Jun 1, 2015 Air Force Institute of Technology, Fighting Through a Logistics Cyber Attack, June 2015. Unclassified. [3246] Source Defense Technical Information Center
Jun 1, 2015 Department of Homeland Security, Enhancing resilience through cyber incident data sharing and analysis, June 2015
Jun 1, 2015 Department of Homeland Security, Enhancing resilience through cyber incident data sharing and analysis, June 2015
Jun 1, 2015 Department of Homeland Security, Informing Cyberstorm V: Lessons Learned from CyberStorm IV, June 2015. Unclassified. Source Department of Homeland Security.
Jun 1, 2015 U.S. Coast Guard, United States Coast Guard Cyber Strategy, June 2015. Unclassified. Source www.uscg.mil/seniorleadership/DOCS/cyber.pdf
Jun 1, 2015 Government of the United Kingdom, Advice on Information Risk Management for Remotely Piloted Aircraft Systems (RPAS), June 2015. Unclassified.
Jun 1, 2015 Ministry of the Interior, Government of Iceland, Icelandic National Cyber Security Strategy2015-2026, Plan of Action 2015-2018 (Summary), June 2015. Unclassified. Source Cooperative Cyber Defence Centre of Excellence.
May 30, 2015 Ministry of Defense, Government of Japan, "Joint Statement of the U.S.-Japan Cyber Defense Policy Working Group," May 30, 2015. Unclassified. Source Ministry of Defense, Government of Japan.
May 28, 2015 Department of Defense, DoD Instruction Number 5200.39, Critical Program Information Identification and Protection within research, Development, Test, and Evaluation, May 28, 2015
May 21, 2015 Edward Liu, Andrew Nolan, and Richard Thompson, “Overview of Constitutional Challenges to NSA Collection Activities,” May 21, 2015. Unclassified. Source FAS.
May 19, 2015 National Geospatial Intelligence Agency, Directive Number 8231, Cyber Defense Operations, May 19, 2015
May 16, 2015 Department of Energy, DOE O 205.1B, Subject: Department of Energy Cyber Security Program, May 16, 2011. Unclassified . Source www.energy.gov
May 14, 2015 Christopher M.E. Painter, Coordinator for Cyber Issues, Department of State, Testimony before Senate Foreign Relations Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy," May 14, 2015. Unclassified. Source Senate Foreign Relations Committee.
May 8, 2015 Department of Homeland Security and Federal Bureau of Investigation, "Criminal Hackers Target Police to Protect Perceived Injustices," May 8, 2015. Unclassified/For Official Use Only. Source Public Intelligence.
May 1, 2015 Federal Deposit Insurance Corporation, FDIC Continuous Monitoring Methodology, May 2015. Unclassified. Source Cryptome.
May 1, 2015 Lawrence Livermore National Laboratory, R J Vince, Cross-Domain Deterrence Seminar Summary Notes, May 1 2015. Unclassifed. Source Lawrence Livermore National Laboratory
May 1, 2015 Department of Justice, OIG - A Review of the FBI's Use of Section 215 Orders: Assessment of Progress in Implementing Recommendations and Examination of Use in 2007 through 2009, May 2015
May 1, 2015 United States Department of Justice Office of the Inspector General, A Review of the FBI's Use of Section 215 Orders: Assessment of Progress in Implementing Recommendations and Examination of Use in 2007 Through 2009, May 2015. Unclassified. Source Department of Justice