Skip to content
What's New
About FBIIC
Press Releases
Policies
Emergencies
Events
Executive Orders
Links
Members Only
Contact Us
FBIIC Home
|
Links
Cyber Security | Foreign Public Sector | Foreign Private Sector | Pandemic Flu Public Sector | GAO Reports| Incident|In The News
| 2009 Inauguration|Public Sector Resources | Public Sector Links | 2009 Upper Midwest Flooding | 2009 Hurricane Season materials | Freedom of Information Act | 2009-H1N1 Flu
Reporting Stimulus Fraud
Consumer Alert
OBP Training Fact Sheet-w-planned activities (09-05-01)
This section contains links
to public and private sector sites that will provide the reader with further
background on Critical Infrastructure Protection / Homeland Security issues, and Pandemic Flu
including organizations involved in activities related to those issues.
2009-H1N1 Flu
Freedom of Information Act
2009 Hurricane Season materials
2009 Upper Midwest Flooding
2009 Inauguration
All Files Moved to Archives
Public Sector Resources
GAO Reports
Hurricane Ike
All Files Moved to Archives
Hurricane Hanna
All Files Moved to Archives
Hurricane Gustav
All Files Moved to Archives
June 2008 flooding
All Files Moved to Archives
Public Sector Links
- Hurricane Ike in Texas and Louisiana: Mitigation Assessment Team Report, Building Performance Observations, Recommendations, and Technical Guidance
- Issue 41: March 2009 NIPP Newsletter
- 2009 NIPP - Electronic Copy Available
- Planning Guidance for Response to a Nuclear Detonation
- General Protective Measures For Vehicle Borne Improvised Explosive Devices (VBIED)
- Top Private-Sector Security Concerns in 2008 : Global Security Concerns
- Issue 39: January 2009 NIPP Newsletter
- Commission on the Prevention of WMD Proliferation and Terrorism:The Report of the Commission on the Prevention of WMD Proliferation and Terrorism
- Issue 38: November 2008 NIPP Newsletter
- Issue 37: October 2008 NIPP Newsletter
- Mail Handling Procedures File #1
- Mail Handling Procedures File #2
- FBI Statement
- USPS Information on How to Handle Suspicious Mail
- USPS Poster on How to Handle Suspicious Mail
- Risk-Based Capital: New Basel II Rules Reduced Certain Competitive Concerns, but Bank Regulators Should Address Remaining Uncertainties. GAO-08-953, September 12 | Highlights
- General Protective Measures For Vehicle Borne Improvised Explosive Devices (VBIED)
- Vehicle Borne IED Identification Guide: Parked Vehicles
- International Association of Chiefs of Police - "To Protect and Defend"
- Infrastructure Resiliency Guide
- 2007/2008 NIPP Update
- FY08 DHS Protective Security Coordination Division Training 19 September 2008
- Issue 36: Aug/Sept 2008 NIPP Newsletter
- National Counterterrorism Center - Historical references
- US Postal Service closings related to Hurricane Ike
- National Security Professional Development
- ILTF Brochure
- Bulletin of the Seismological Society of America
- Observations and Tectonic Setting of Historic and Instrumentally Located Earthquakes in the Greater New York City–Philadelphia Area
- US Air Force Weather
- National Academy of Public Administration
"Addressing the 2009 Presidential Transition at the Department of Homeland Security"
- Incorporated Research Institutions for Seismology
Global Seismic Monitor
- Earthquake safety
- Homegrown Terrorist Threat Report
- Tropical Storm Dolly SITREP #1 (0600 EDT 24 Jul 08)
- LA City Readiness Report
- TX SCU update and advisory
- OCC Allows National Bank Offices
Affected by Hurricane Dolly to Close
- Midwest Flood Update
- NOAA Midwest Flooding Situation and Outlook 1600L 061808
- The President’s National Science and Technology Council, Subcommittee on Disaster Reduction
- U.S. Forest Service Fire and Aviation Management Program
- National Interagency Fire Center
- Electromagnetic Interference From Radio Frequency Identification Inducing Potentially Hazardous Incidents in Critical Care Medical Equipment
- June 2008 NIPP Newsletter
- U.S. Army War College Guide to National Security Issues, Vol. II: National Security Policy and Strategy
- U.S. Army War College Guide to National Security Issues, Vol. I: Theory of War and Strategy
- Brochure - Regional Coalitions
- Federal Register Notice: Notice of Availability of Draft Guidances to Assist in Preparation for an Influenza Pandemic
- Dominant Cyber Offensive Engagement and Supporting Technology
- CIA World Leaders Reference Guide
- TRENDS AND ANALYSIS REPORT
- Seminar on Countering Insider Threats
- Security Configuration Guides
- 2008 Emergency Response Guidebook
- DHS ICE Investigations Mission Roles in Multi Agency Areas of Responsibility
- Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
- Journal of Biological Chemistry, April 22, 2008
- US DOS Reports on Terrorism 2007
- US JSSRT Security and Suitability Process Reform Initial Report 4-30-08
- Country Reports on Terrorism
- Federal guidence to assist states in improving state-level pandemic influenza operating plans
- New 18th Sector - Federal Register Notice
- 4/14 Changes in Espionage by Americans: 1947-2007
- 4/7 Director for National Intelligence
Information Sharing Strategy
- 3/31 NIST/ITL Bulletin
- 3/31 The U.S. Department of Transportation's Federal Highway Administration (FHWA)
- 3/31 State Department Travel Warnings
- 3/31 CYBER SOLIDARITY: Five Nations, One Mission
- 3/31 Department of the Treasury
Blueprint for a Modernized Financial Regulatory Structure
- 3/20 Defense Intelligence Agency
Terrorist Recognition Cards
- 3/19 FFIEC Business Continuity Plan
- 3/17 DHS FEMA US Fire Administration Emergency Incident Rehabilitation
- 3/12 The Center for Homeland Defense and Security
- 3/5 Research paper on cyber security
- 2/27 ODNI report to Congress
- 2/15 U.S. State Department's notice "Remain in Country During a Pandemic."
- 2/12 Investigative Programs
Cyber Investigations
- 2/12 Internet Safety: Get Safe Online
- 2/12 Internet Safety: Insafe European network of e-safety awareness
- 2/12 FBI warns of Valentines Day Storm Worm virus
- 2/11 Submarine Cable Cut Repairs - Bulletin
- 2/06 Annual Threat Assessment of the Director of National Intelligence
- 2/08 FEMA RELEASES ON-LINE TRAINING COURSE
FOR THE NATIONAL RESPONSE FRAMEWORK
- 2/08 Update on Submarine Cable Cut Repairs - Daily Bulletin
@ 0900 GMT February 7 2008 [external pdf]
- 2/08 Update on Submarine Cable Cut - Daily Bulletin
@ 0900 GMT February 6 2008 [external pdf]
- 2/08 Submarine Cable Map [external gif]
- 2/08 FERC Mandatory Reliability Standards for Critical Infrastructure Protection [external pdf]
- 2/08 Important Change in International Land
and Sea Travel Document Procedures [128 kb pdf]
- 2/08 An increase in Internet schemes purportedly from the FBI (external link)
Foreign Public
Sector Links
Foreign Private
Sector Links Archive
Financial Services Sector Coordinating
Council (FSSCC) Links:
Pandemic Flu Public
Sector Links
Cyber Security
- Information Security: Cyber Threats and Vulnerabilities Place Federal
Systems at Risk. GAO-09-661T, May 5| Highlights
- US-CERT Monthly Summary Activity - March 2009
- Melissa Hathaway's comments at RSA
- 2009 Data Breach Investigations Report
- Vulnerability Summary for the Week of April 6, 2009
- April Newsletter - Security of Credit Card Transactions
- Electricity Grid in U.S. Penetrated By Spies
- US-CERT Cyber Security Bulletin SB09-096 -- Vulnerability Summary for the Week of March 30, 2009
- 2008 Internet Crime Report
- A Comprehensive Study of Financial Data Security Breaches in the United States 3-30-09
- Conficker Computer Worm Detection Tool
- Information Bulletin - April 1, 2009 - Conficker C Activation
- Report of the Interagency Working Group on Digital Data
- US CERT Monthly Activity Summary for February 2009
- GAO - National Cybersecurity Strategy: Key Improvements Are Needed to Strengthen the Nation's Posture.GAO-09-432T, March 10 | Highlights
- Optimised to Fail : Card Readers for Online Banking
- RSA Online Fraud Report
- I3P National Cyber Security
- Microsoft Document for DNSSEC on the Windows Server 2008 R2 and Windows 7 operating systems
- US-CERT National Cyber Alert System Monthly Activity Summary
- GAO Reports about Information Management - Information Security: Further Actions Needed to Address Risks to Bank
Secrecy Act Data. GAO-09-195, January 30
- McAfee Report: Unsecured Economies: Protecting Vital Information
- US-CERT Public Trends and Analysis Report FY08 Q4
- January 2009 Cyber Security Tips Newsletter - Challenge or Secret Questions
- Monthly Activity Summary
- CWE/SANS TOP 25 Most Dangerous Programming Errors
- Which? Computing
- Twitter Blog
- Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
- Digital World, Digital Life - December 2008
- NORAD Tracking
- France Telecom -- Three undersea cables cut: traffic greatly disturbed between Europe and Asia/Near East zone
- ENISA Quarterly Review
- Cisco 2008: Annual Security Report
- Microsoft confirms that all versions of IE have critical new bug
- Microsoft Security Vulnerability Research & Defense
- Microsoft Security Response Center (MSRC)
- Pew Internet & American Life Project - “The Future of the Internet III”
- Government of Australia - Communications Infrastructure and Services Availability Report 2006-07
- Federal Trade Commission Alert - "Free Security Scan" Could Cost Time and Money
- Federal Trade Commission - Court Halts Bogus Computer Scans
- A Report of the CSIS Commission on Cybersecurity for the 44th Presidency
- CIIN-08-309-01-Using Caution with USB Drives
- Symantec Report on the Underground Economy July 07–June 08
- 2008 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION
- Future of Privacy Forum
- Online criminals can make £14,500 from average UK internet user
- Arbor Networks - Worldwide Infrastructure Security Report Volume IV, 2008
- Spamalytics: An Empirical Analysis of Spam Marketing Conversion
- US-CERT - CIIN-08-309-01: Using Caution with USB Drives
- Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding
- Microsoft Security Intelligence Report volume 5 (January – June 2008)
- United Kingdom - "Corporate IT Forum Survey: Is organised electronic crime on the rise?"
- United Kingdom -
"The Frontline In The Fight Against E-Crime: Lessons From Top Organisations"
- Garlik UK Cybercrime Report 2008
- United Kingdom Information Commissioner's Office - Speech of 29 October 2008
- Internet Watch Foundation
- Critical Infrastructure Information Notice- CIIN-08-297-01
- Microsoft Security Bulletin MS08-067
- Ecole Polytechnique Federale de Lausanne - "Compromising Electromagnetic Emanations of Keyboards"
- SwA Community Resources and Information Clearinghouse
- Enhancing the Development Life Cycle to Produce Secure Software -
Version 2, October 3, 2008
- Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today - Released October 8, 2008
- Software Assurance in Acquisition: Mitigating Risks to the Enterprise - Version 1.01, October 2008
- Practical Measurement Framework for Software Assurance and Information
Security - Version 1.0, October 2008
-
Practical Measurement Framework for Software Assurance and Information Security - Released October 1, 2008
- Engineering for System Assurance - Version 1.0, October 1, 2008
- Common Weakness Enumeration - Released October 14, 2008
- Financial Impact of Cyber Security
- Georgia Tech Information Security Center - "Emerging Cyber Threats Report for 2008"
- Information Technology: Management Improvements Needed on the Department of Homeland Security's Next Generation Information Sharing System. GAO-09-40, October 8 | Highlights
- Government Accountability Office - "GAO’s Efforts to Assist the 111th Congress"
- United Kingdom All Party Parliamentary Group on Identity Fraud - Identity Fraud Report
- 13th European Symposium on Research in Computer Security
- Radboud University Nijmegen - "Dismantling MIFARE Classic"
- Radboud University Nijmegen - "Making the Best of Mifare Classic"
- Avoiding Social Engineering and Phishing Attacks
- Recognizing and Avoiding Email Scams (PDF)
- Department of Justice
Press Release - October 2, 2008
- United Kingdom Home Office - "Fighting back against electronic crime"
- University of Toronto, Munk Centre for International Studies - "Breaching Trust"
- State of Washington Attorney General - Scareware:
Press Release | Complaint
- Connecting Research in Security to Practice (CRISP) Report - Lost Laptops = Lost Data
- House Committee on Homeland Security - "Cybersecurity Recommendations for the Next Administration"
- European Commission - Second periodic review of the scope of universal service in electronic communications networks and services
- Proceedings of Human Factors and Ergonomics Society
- Delivering super-fast broadband in the UK
- GAO Reports about Information Management
- Mitigation Monday - Defense Against Malicious E-mail Attachments, Release 1
- Shadowserver Foundation
- Do Zebras get more Spam than Aardvarks? Source: University of Cambridge
- Ignoring the Great Firewall of China Source: University of Cambridge
- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries Source: University of Cambridge
- Upcoming Cyber Security Conferences
- Products for DNS Issue -
CIIN | SAR
- Analyzing Websites for User-Visible Security Design Flaws
- US-CERT Advisory 08-04- BlackBerry Security Advisory
- Using Wireless Technology Securely
- Swiss Federal Institute of Technology Zurich
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg"
- StopBadware.org - a partnership amongst academic and research organizations
- Internet Corporation for Assigned Names and Numbers
- Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks
- Methods for Sharing Dynamic IP Address Space Information with Others
- Power of Information Task Force Competition
- Power of Information Task Force
- UCLA CENTER FOR INFORMATION AND COMPUTATION SECURITY
- OECD Internet Address Space Report
- WI-FI SECURITY
- US Senate Violent Islamist Extremism,
The Internet, and the Homegrown Terrorist Threat
- NATO opens new centre of excellence on cyber defence
- Internet Traffic Studies Site
- CYBER ALERT
- Fact Sheet: Protecting Our Federal Networks Against Cyber Attacks
- Global Information Technology Report
- Protected Critical Infrastructure Information (PCII) Program Survey
- Being Human: Human-Computer Interaction in the year 2020
- Carnegie Mellon link
- National Cyber-Forensics and Training Alliance
- Identity Theft
- Joint Task Force - Global Network Operations
- 2nd International Forum Against Cybercrime - France
- Podcast: Significant insider threat vulnerabilities can be introduced
(and mitigated) during all phases of the software development life
cycle.
- Report: Insider Threat Study: Illicit Cyber Activity in the Information
Technology and Telecommunications Sector
- Report: Insider Threat Study: Illicit Cyber Activity in the Government
Sector
- Survey of Federal Chief Information Officers
Research & Development
Incident
All Files Moved to Archives
Links Archive
|