MiPAL: Cybersecurity Compiled by the National Defense University Library
Recently Added Documents General Information U.S. Policy White House Department of Defense Department of State Department of Homeland Security Other Policy Sources U.S. Congress U.S. Policy Analysis Cloud Computing and Security Critical Infrastructure & Industry Security Cybercrime Economic Consequences International Initiatives and Issues Warfare and Deterrence Research & Analysis Congressional Research Service Government Accountability Office Other Reports News Sources & Online Journals Web Gateways
Military Policy Awareness Links
Recently Added Documents This section contains the ten most-recently added documents to this MiPAL. All recently included items can also be found by subject division below.
TOP
General Information
TOP
U.S. Policy
White House
- [1 Oct 12] Presidential Proclamation – National Cybersecurity Awareness Month, 2012
- [14 June 12] Contracting Guidance to Support Modular Development
Office of Management and Budget
- [23 May 12] Digital Government: Building a 21st Century Platform to Better Serve the American People
- [23 May 12] Executive Order: Building a 21st Century Digital Government
- [7 March 12] Fiscal Year 2011 Report to Congress on the Implementation of the Federal Information Security Management Act of 2002
Office of Management and Budget
- [7 March 12] FY 2011 Report to Congress on the Implementation of the E-Government Act of 2002
Office of Management and Budget
- [March 12] Report to Congress on the Benefits of the President's E-Government Initiatives: Fiscal Year 2012
Office of Management and Budget
- [Feb 12] Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in a Global Digital Economy
- [8 Dec 11] Security Authorization of Information Systems in Cloud Computing Environments
Office of Management and Budget
- [Dec 11] Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program
National Science and Technology Council
- [1 Nov 11] VP's Remarks to London Cyberspace Conference
- [7 Oct 11] Executive Order 13587 - Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information
- [7 Oct 11] Fact Sheet: Safeguarding the U.S. Government’s Classified Information and Networks
- [3 Oct 11] Presidential Proclamation - National Cybersecurity Awareness Month
- [25 May 11] Joint Fact Sheet: U.S. and UK Cooperation on Cyberspace
- [16 May 11] Fact Sheet: International Strategy for Cyberspace - Prosperity, Security, and Openness in a Networked World
- [12 May 11] Fact Sheet: Cybersecurity Legislative Proposal
- [12 May 11] Fact Sheet: The Administration's Cybersecurity Accomplishments
- [May 11] International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
- [15 April 11] Press Release: Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace
- [April 11] National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy
- [8 Feb 11] Federal Cloud Computing Strategy
Vivek Kundra. Chief Information Officer
- [11] Fiscal Year 2010 Report to Congress on the Implementation of the Federal Information Security Management Act of 2002
Office of Management and Budget
- [1 Oct 10] Presidential Proclamation – National Cybersecurity Awareness Month
- [20 May 10] State of Public Sector Cloud Computing
Vivek Kundra, Federal Chief Information Officer
- [19 April 10] National Initiative for Cybersecurity Education (NICE): Relationship to President's Education Agenda
- [15 April 10] FY 2009 Report to Congress on the Implementation of the E-Government Act of 2002
Office of Management and Budget
- [March 10] The Comprehensive National Cybersecurity Initiative
- [1 Oct 09] Proclamation by the President: National Cybersecurity Awareness Month, 2009
- [29 May 09] Remarks by the President on Securing Our Nation's Cyber Infrastructure
- [29 May 09] Fact Sheet: Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure
- [May 09] Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure
- [29 March 09] Remarks by the President on Securing Our Nation's Cyber Infrastructure
- [7 Feb 09] Remarks by Vice President Biden at 45th Munich Conference on Security Policy
- [09] National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency
- [Feb 05] Cyber Security: A Crisis of Prioritization
President's Information Technology Advisory Committee
- [Feb 03] The National Strategy to Secure Cyberspace
- [Feb 03] National Strategy for Physical Protection of Critical Infrastructure and Key Assets
- [Oct 97] Critical Foundations: Protecting America's Infrastructures
President's Commission on Critical Infrastructure Protection TOP
Department of Defense
- [current] U.S. Department of Defense – Cyber Strategy
- [current] Cyber Security
U.S. Cyber Command
- [11 Oct 12] Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City
- [13 July 12] Enterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DOD's Auditability Goals
Inspector General, Department of Defense
- [July 12] Cloud Computing Strategy
Chief Information Officer, Department of Defense
- [26 June 12] Designation of the Defense Information Systems Agency as the Department of Defense Enterprise Cloud Service Broker
Chief Information Officer, Department of Defense
- [11 May 12] Fact Sheet: Defense Industrial Base (DIB) Cybersecurity Activities
- [7 May 12] Joint Press Briefing with Secretary Panetta and Gen. Liang from the Pentagon
- [May 12] Department of Defense Mobile Device Strategy
Office of the DoD Chief Information Officer
- [March 12] Factsheet: DOD IT Modernization
Chief Information Officer, U.S. Department of Defense
- [28 Feb 12] Keynote Address by Deputy Secretary of Defense Ashton Carter to the RSA Conference
- [15 Nov 11] Space and Cyber: Shared Challenges, Shared Opportunities
Remarks by Madelyn R. Creedon, Assistant Secretary of Defense for Global Strategic Affairs, at the USSTRATCOM Cyber and Space Symposium
- [7 Nov 11] Keynote Remarks for the Cyber Colloquium, Washington DC
Remarks by Regina E. Dugan, Director, Defense Advanced Research Projects Agency
- [Nov 11] Department of Defense Cyberspace Policy Report
- [27 July 11] Air Force Instruction 51-402: Legal Reviews of Weapons and Cyber Capabilities
U.S. Department of the Air Force
- [14 July 11] Remarks on the Department of Defense Cyber Strategy
Remarks by William J. Lynn, III, Deputy Secretary of Defense, at the National Defense University
- [14 July 11] Media Availability on Department of Defense Strategy for Operating in Cyberspace (DSOC)
William J. Lynn, III, Deputy Secretary of Defense, and Gen James Cartwright, USMC, Vice Chairman, Joint Chiefs of Staff
- [July 11] Department of Defense Strategy for Operating in Cyberspace
- [16 June 11] Remarks by Deputy Secretary of Defense William J. Lynn, III, at the International Workshop on Global Security, Paris, France
- [16 May 11] Remarks at the Release of the U.S. International Strategy for Cyberspace
William J. Lynn, III, Deputy Secretary of Defense
- [15 Feb 11] Remarks on Cyber at the RSA Conference
William J. Lynn, III, Deputy Secretary of Defense
- [13 Oct 10] Joint Statement on Enhancing Coordination to Secure America's Cyber Networks
Robert M. Gates, Secretary of Defense, and Janet Napolitano, Secretary of Homeland Security
- [13 Oct 10] Memorandum of Agreement between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity
- [15 July 10] Cyberspace Operations: Air Force Doctrine Document 3-12
U.S. Department of the Air Force
- [3 June 10] U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM
Transcript of a Center for Strategic and International Studies event featuring GEN Keith Alexander
- [26 May 10] Remarks at Stratcom Cyber Symposium
William J. Lynn, III, Deputy Secretary of Defense
- [21 May 10] Press Release: DOD Announces First U.S. Cyber Command and First U.S. CYBERCOM Commander
- [22 Feb 10] The United States Army's Cyberspace Operations Concept Capability Plan: 2016-2028
U.S. Department of the Army
- [18 Feb 10] Space, Cyberspace, and National Security
Remarks by Gen Norton A. Schwartz, Chief of Staff, U.S. Air Force, to the Air Force Association
- [13 Feb 10] Roundtable on Cyber Security with Australian Business and Civic Leaders
William J. Lynn, III, Deputy Secretary of Defense
- [1 Feb 10] DOD News Briefing with Undersecretary Flournoy and Vice Adm. Stanley
- [1 Feb 10] DOD News Briefing with Undersecretary Hale and Vice Adm. Stanley
- [20 Jan 10] Keynote Address at the Air, Space, and Cyberspace Power in the 21st Century Conference
Remarks by Gen Norton A. Schwartz, Chief of Staff, U.S. Air Force, at the 38th Institute for Foreign Policy Analysis-Fletcher Conference on National Security Strategy and Policy
- [1 Oct 09] National Cyber Security Alliance Kick-Off for Cyber Security Awareness Month
Remarks by William J. Lynn, III, Deputy Secretary of Defense, at the Ronald Reagan Building and International Trade Center
- [Aug 09] Deputy Assistant Secretary of Defense For Cyber, Identity and Information Assurance Strategy
Office of the Assistant Secretary of Defense for Networks and Information Integration
- [Feb 09] Electronic Warfare in Operations
Army Field Manual 3-36
- [24 Aug 07] Continuity of Operations Plans for Computer Networks
Air Force Audit Agency, U.S. Department of the Air Force
- [Dec 06] The National Military Strategy for Cyberspace Operations (U)
Chairman of the Joint Chiefs of Staff
- [May 99] An Assessment of International Legal Issues in Information Operations
Office of General Counsel
- [April 97] Cornerstones of Information Warfare
U.S. Department of the Air Force TOP
Department of State
- [current] U.S. Department of State – Office of the Coordinator for Cyber Issues
- [14 June 12] Statement in Support of Fundamental Freedoms in the Digital Age (FFIDA)
Ian C. Kelly, U.S. Representative to the Organization for Security and Cooperation in Europe
- [23 March 12] Media Note: U.S.-Japan Policy Cooperation Dialogue on the Internet Economy Third Director General-Level Meeting
- [8 Dec 11] Conference on Internet Freedom
Remarks by Hillary Rodham Clinton, Secretary of State
- [7 Dec 11] U.S.-China Internet Industry Forum
Remarks by Robert D. Hormats, Under secretary for Economic, Energy and Agricultural Affairs
- [31 Oct 11] Background Briefing: Secretary Clinton's Participation in the London Conference on Cyberspace
- [27 Oct 11] From the Manhattan Project to the Cloud: Arms Control in the Information Age
Remarks by Rose Gottemoeller, Assistant Secretary, Bureau of Arms Control, Verification and Compliance
- [18 Oct 11] Cybersecurity Update
Foreign Press Center briefing by Christopher Painter, State Department Coordinator for Cyber Issues
- [27 July 11] Press Release: Declaration of Delegates from Kenya, Tanzania, Uganda, Rwanda, and Burundi from the 2011 East African Workshop on Cyberspace Security
- [14 July 11] Fact Sheet: International Cyber Diplomacy: Promoting Openness, Security and Prosperity in a Networked World
- [13 July 11] Internet Freedom and Human Rights: The Obama Administration's Perspective
Remarks by Michael H. Posner, Assistant Secretary, Bureau of Democracy, Human Rights and Labor
- [15 June 11] Background Briefing by Senior State Department Officials on Internet Freedom Programs
- [11 June 11] Joint Press Statement for the U.S. - Japan Policy Cooperation Dialog on the Internet Economy
- [18 May 11] Release of the Obama Administration’s International Strategy for Cyberspace
Foreign Press Center briefing by Christopher Painter, Coordinator for Cyber Issues
- [16 May 11] Remarks on the Release of President Obama Administration's International Strategy for Cyberspace
Hillary Rodham Clinton, Secretary of State
- [4 Mar 11] Internet Freedom: Promoting Human Rights in the Digital Age - A Panel Discussion
Michael H. Posner, Assistant Secretary Bureau of Democracy, Human Rights and Labor and Eileen Chamberlain Donahoe, Ambassador
- [18 Feb 11] Conversations with America; The State Department's Internet Freedom Strategy
Michael H. Posner, Assistant Secretary, Bureau of Democracy, Human Rights and Labor and Philip J. Crowley, Assistant Secretary, Bureau of Public Affairs
- [15 Feb 11] Internet Rights and Wrongs: Choices and Challenges in a Networked World
Remarks by Hillary Rodham Clinton, Secretary of State
- [15 Feb 11] Fact Sheet: Internet Freedom
- [7 Dec 10] WikiLeaks and Other Global Issues
Foreign Press Center briefing by Philip J. Crowley, Assistant Secretary of State
- [1 Dec 10] WikiLeaks and Other Global Events
Foreign Press Center briefing by Philip J. Crowley, Assistant Secretary of State
- [28 June 10] Terrorist Use of the Internet
Remarks by Gina Abercrombie-Winstanley, Deputy Coordinator for Counterterrorism
- [23 Mar 10] Cyberspace - Taming the Wild West
Remarks by John Savage, Jefferson Science Lecture Series, Bureau for Economic, Energy and Agricultural Affairs
- [22 Jan 10] Briefing on Internet Freedom and 21st Century Statecraft
Michael H. Posner, Assistant Secretary, Bureau of Democracy, Human Rights and Labor and Alec Ross, Senior Advisor for Innovation
- [21 Jan 10] Remarks on Internet Freedom
Hillary Rodham Clinton, Secretary of State
- [17 Dec 09] U.S. Diplomacy in the Age of Facebook and Twitter: An Address on 21st Century Statecraft
Remarks by Alec Ross, Senior Advisor for Innovation
- [10 Dec 09] Remarks to U.S.-China Internet Industry Forum
Remarks by Robert D. Hormats, Under Secretary for Economic, Energy and Agricultural Affairs
- [3 Dec 09] International Innovation and Broadband
Remarks by Phillip L. Verveer, Coordinator for International Communications and Information Policy
- [22 Sep 09] Future of the Cyber-Network
Remarks by Michael El-Batanouny, Jefferson Science Lecture Series, Bureau for Economic, Energy and Agricultural Affairs
- [26 May 09] Cybercrime: International Partnerships to Combat Threats
Foreign Press Center briefing by Shawn Henry, Assistant Director, Cyber Division, FBI
- [10 Nov 04] United States and India Launch New Phase of Cyber Security Cooperation
Media Note. Office of the Spokesman
TOP
Department of Homeland Security
- [6 June 12] Press Release: Readout of Secretary Napolitano's Participation in Cyber Workforce Event
- [16 April 12] Remarks at San Jose State University
Janet Napolitano, Secretary of Homeland Security
- [13 Jan 12] Privacy Impact Assessment for the National Cyber Security Division Joint Cybersecurity Services Pilot (JCSP)
Brendan Goode. National Cyber security Division, Department of Homeland Security
- [12] ICS-CERT Incident Response Summary Report: 2009-2011
Industrial Control Systems Cyber Emergency Response Team, Control Systems Security Program, Department of Homeland Security
- [12 Dec 11] Factsheet: Blueprint for a Secure Cyber Future
- [Nov 11] Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise
- [7 Oct 11] Remarks at the Michigan Cyber Security Summit / National Cyber Security Awareness Month Kick-Off Event
Janet Napolitano, Secretary of Homeland Security
- [29 Sep 11] Review of the Department of Homeland Security’s Capability to Share Cyber Threat Information (Redacted)
Office of Inspector General, U.S. Department of Homeland Security
- [27 Sep 11] Evaluation of DHS’ Information Security Program for Fiscal Year 2011
Office of Inspector General, U.S. Department of Homeland Security
- [7 Sep 11] Coast Guard Has Taken Steps to Strengthen Information Technology Management, but Challenges Remain
Office of Inspector General, U.S. Department of Homeland Security
- [25 July 11] Fact Sheet: Cyber Storm: Securing Cyber Space
- [19 July 11] Press Release: United States and India Sign Cybersecurity Agreement
- [July 11] Implementing 9/11 Commission Recommendations: Progress Report 2011
NOTE: Please see the section on “Protecting Cyber Networks and Critical Physical Infrastructure”
- [June 11] Preventing and Defending Against Cyber Attacks
- [23 March 11] Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
- [17 Dec 10] Remarks by Secretary Napolitano at the Atlantic's Cybersecurity Forum
Janet Napolitano, Secretary of Homeland Security
- [Nov 10] Preventing and Defending Against Cyber Attacks
- [13 Oct 10] Joint Statement on Enhancing Coordination to Secure America's Cyber Networks
Robert M. Gates, Secretary of Defense, and Janet Napolitano, Secretary of Homeland Security
- [13 Oct 10] Memorandum of Agreement between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity
- [Sep 10] Preventing and Defending Against Cyber Attacks
- [18 Aug 10] DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems
Office of Inspector General, U.S. Department of Homeland Security
- [28 July 10] Remarks at the Black Hat Conference
Jane Holl, Deputy Secretary of Homeland Security
- [7 June 10] U.S. Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain
Office of Inspector General
- [4 May 10] Privacy Impact Assessment for the Malware Lab Network
- [18 March 10] Privacy Impact Assessment for the Initiative Three Exercise
- [19 Feb 10] Computer Network Security and Privacy Protection
- [19 Feb 10] Privacy Impact Assessment Update for the EINSTEIN 1: Michigan Proof of Concept
- [Nov 09] A Roadmap for Cybersecurity Research
- [4 Aug 09] Remarks at the Global Cyber Security Conference
Janet Napolitano, Secretary of Homeland Security
- [Aug 09] Information Technology Sector Baseline Risk Assessment
- [July 09] Cyber Storm II - Final Report
National Cyber Security Division, Office of Cybersecurity and Communications
- [23 Jan 09] Press Release: Secretary Napolitano Issues Additional Action Directives on Cyber Security and Northern Border Strategy
- [09] National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency
- [18 Dec 08] Remarks at the Cyber Strategic Inquiry 2008
Michael Chertoff, Secretary of Homeland Security
- [14 Oct 08] Remarks by Homeland Security Secretary Michael Chertoff at the Chamber of Commerce on Cybersecurity
- [8 Oct 08] Secretary Chertoff Hosts Blogger Roundtable on Cybersecurity
- [2 Oct 08] Remarks at the 2008 National Cyber Security Awareness Month Kick-off Event
Greg Garcia, Assistant Secretary of Homeland Security for Cybersecurity and Communications
- [1 Oct 08] Fact Sheet: National Cyber Security Awareness Month
- [15 Sep 08] Remarks on the National Cyber Security Initiative
Paul Scneider, Deputy Secretary of Homeland Security
- [July 08] National Emergency Communications Plan
- [19 May 08] Privacy Impact Assessment for EINSTEIN 2
- [8 April 08] Remarks by Homeland Security Secretary Michael Chertoff to the 2008 RSA Conference
- [8 April 08] Fact Sheet: Protecting Our Federal Networks Against Cyber Attacks
- [26 March 08] Letter Report: DHS Needs to Prioritize Its Cyber Assets
Office of the Inspector General, U.S. Department of Homeland Security
- [14 March 08] Remarks at a Pen-and-Pad Briefing on Cyber Storm II
Robert Jamison, Under Secretary of Homeland Security for National Protection and Programs and Greg Garcia, Assistant Secretary of Homeland Security for Cyber Security and Communications
- [11 Dec 07] Remarks at the New York Metro Infragard Alliance Security Summit
Greg Garcia, Assistant Secretary of Cybersecurity and Communications
- [11 Oct 07] Remarks at the Dartmouth CIO/CISO Executive Workshop on Cyber Security
Greg Garcia, Assistant Secretary of Cybersecurity and Communications
- [1 Oct 07] Remarks at the National Cyber Security Awareness Month Kick-Off Summit
Greg Garcia, Assistant Secretary of Cybersecurity and Communications
- [24 April 07] Our National Cyber Security Challenge
Remarks by Greg Garcia, Assistant Secretary of Homeland Security for Cybersecurity and Communications, at the CA World Conference
- [29 March 07] Privacy Impact Assessment for the 24x7 Incident Handling and Response Center
- [12 Sep 06] Cyber Storm: Exercise Report
National Cyber Security Division, Office of Cybersecurity and Communications
- [10 Feb 06] Press Conference on the "Cyber Storm" Cyber Security Preparedness Exercise with Under Secretary for Preparedness George Foresman and Acting Director for the National Cyber Security Division Andy Purdy
- [15 Feb 05] Fact Sheet: Protecting America's Critical Infrastructure - Cyber Security
- [Sep 04] Privacy Impact Assessment: EINSTEIN Program: Collecting Analyzing and Sharing Computer Security Information Across the Federal Civilian Government
National Cyber Security Division, Computer Emergency Readiness Team
- [17 Dec 03] Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
- [Feb 03] National Strategy for Physical Protection of Critical Infrastructure and Key Assets
TOP
Other Policy Sources
- [current] Internet Crime Complaint Center: Annual Reports
Federal Bureau of Investigation, National White Collar Crime Center and the Bureau of Justice Assistance
- [8 Aug 12] Press Release: Proposed Expansion of Information Technology Agreement to be Examined by U.S. International Trade Commission: Proposed New Products Could Gain Duty-Free Treatment from ITA Participant Countries
U.S. International Trade Commission
- [6 June 12] Remarks at NIST Cloud Computing Forum and Workshop
Rebecca Blank, Deputy Secretary of Commerce
- [May 12] 2011 Internet Crime Report
Internet Crime Complaint Center, Federal Bureau of Investigation
- [19 April 12] Remarks at Information Technology and Innovation Foundation Conference
Rebecca Blank, Deputy Secretary of Commerce
- [7 March 12] Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage
Prepared for the U.S.-China Economic and Security Review Commission by Bryan Krekel, Patton Adams, and George Bakos of the Northrop Grumman Corp
- [1 March 12] Combating Threats in the Cyber World: Outsmarting Terrorists, Hackers and Spies
Remarks by Robert S. Mueller, III, Director, Federal Bureau of Investigation, at the RSA Cyber Security Conference
- [March 12] Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers
Federal Trade Commission
- [28 Feb 12] Federal Risk and Authorization Management Program: Joint Authorization Board Charter
General Services Administration, Department of Defense and Department of Homeland Security
- [23 Feb 12] Remarks at White House Event on Consumer Privacy Bill of Rights
John Bryson, U.S. Secretary of Commerce
- [7 Feb 12] Concept of Operations (CONOPS)
Federal Risk and Authorization Management Program (FedRAMP), General Services Administration
- [Dec 11] Guidelines on Security and Privacy in Public Cloud Computing
Wayne Jansen and Timothy Grance. National Institute of Standards and Technology, U.S. Department of Commerce
- [17 Nov 11] Changing Threats in a Changing World: Staying Ahead of Terrorists, Spies, and Hackers
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [Nov 11] US Government Cloud Computing Technology Roadmap – Volume I, Release 1.0 (Draft): High-Priority Requirements to Further USG Agency Cloud Computing Adoption
Lee Badger, et al. National Institute of Standards and Technology, U.S. Department of Commerce
- [Nov 11] US Government Cloud Computing Technology Roadmap – Volume II, Release 1.0 (Draft): Useful Information for Cloud Adopters
Lee Badger, et al. National Institute of Standards and Technology, U.S. Department of Commerce
- [Nov 11] Evaluation Report: The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011
Office of Inspector General, U.S. Department of Energy
- [20 Oct 11] Evaluation Report: The Department’s Unclassified Cyber Security Program – 2011
Office of Inspector General, U.S. Department of Energy
- [20 Oct 11] Responding to the Cyber Threat
Remarks by Shawn Henry, Executive Assistant Director, Federal Bureau of Investigation, at the Information Systems Security Association International Conference
- [13 Oct 11] CF Disclosure Guidance: Topic No. 2 – Cybersecurity
Division of Corporation Finance, U.S. Securities and Exchange Commission
- [Oct 11] Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011
Office of the National Counterintelligence Executive
- [Sep 11] The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology
Peter Mell and Timothy Grance. National Institute of Standards and Technology, U.S. Department of Commerce
- [Sep 11] The NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology
Fang Liu, et al. National Institute of Standards and Technology, U.S. Department of Commerce
- [19 July 11] Department of Justice Press Release: Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks
- [June 11] Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such as Programmable Logic Controllers (PLC)
Keith Stouffer, Joe Falco and Karen Scarfone. National Institute of Standards and Technology, U.S. Department of Commerce
- [June 11] Cybersecurity, Innovation and the Internet Economy
Internet Policy Task Force. Department of Commerce
- [16 May 11] Remarks at the White House on the Launch the U.S. International Strategy for Cyberspace
Gary Locke, U.S. Secretary of Commerce
- [16 May 11] Rollout of the U.S. International Strategy for Cyberspace
Eric Holder, U.S. Attorney General
- [15 April 11] Remarks at Administration's Announcement of National Strategy for Trusted Identities in Cyberspace
Gary Locke, U.S. Secretary of Commerce
- [April 11] The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat
Office of the Inspector General, U.S. Department of Justice
- [28 March 11] Inadequate Security Practices Expose Key NASA Network to Cyber Attack
Office of the Inspector General, National Aeronautical and Space Administration
- [Jan 11] Audit Report: Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security
Office of Inspector General, U.S. Department of Energy
- [22 Oct 10] Evaluation Report: The Department's Unclassified Cyber Security Program - 2010
Office of Inspector General, U.S. Department of Energy
- [23 Sep 10] Press Release: Secretary Chu Announces Latest Efforts to Address Cybersecurity
U.S. Department of Energy
- [5 Aug 10] Using Partnerships to Combat Cyber Threats
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [Aug 10] Guidelines for Smart Grid Cyber Security
The Smart Grid Interoperability Panel - Cyber Security Working Group, National Institute of Standards and Technology, U.S. Department of Commerce
- [23 March 10] The Cyber Threat: Who’s Doing What to Whom?
Remarks by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation, at the GovSec/FOSE Conference
- [13 May 10] Cybersecurity Game-Change: Research and Development Recommendations
Federal Networking and Information Technology Research and Development Program
- [4 March 10] Tackling the Cyber Threat
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [1 May 10] Recommended Security Controls for Federal Information Systems and Organizations
National Institute of Standards and Technology, U.S. Department of Commerce
- [Jan 10] NIST Framework and Roadmap for Smart Grid Interoperability: Standards, Release 1.0
Office of the National Coordinator for Smart Grid Interoperability, National Institute of Standards and Technology, Department of Commerce
- [9 Oct 09] Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
Bryan Krekel. Prepared for the U.S.-China Economic and Security Review Commission by the Northrop Grumman Corporation
- [7 Oct 09] Cloak and Dagger in the Virtual World: The FBI’s Fight Against Cyber Threats
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [26 May 09] Cybercrime: International Partnerships to Combat Threats
Foreign Press Center briefing by Shawn Henry, Assistant Director, Cyber Division, Federal Bureau of Investigation
- [3 April 09] Business Strategies in Cyber Security and Counterintelligence
Joel F. Brenner, National Counterintelligence Executive
- [April 09] Study of Security Attributes of Smart Grid Systems - Current Cyber Security Issues
Idaho National Laboratory, U.S. Department of Energy
- [Nov 08] Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program
Idaho National Laboratory, U.S. Department of Energy
- [8 Oct 08] Safeguarding Our Cyber Borders
Op-ed by Melissa Hathaway, Cyber Coordination Executive for the Office of the Director of National Intelligence
- [March 08] Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology
National Institute of Standards and Technology, U.S. Department of Commerce
- [6 Nov 07] The FBI: Stopping Real Enemies at the Virtual Gates
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [Sep 06] Lessons Learned From Cyber Security Assessments of SCADA and Energy Management Systems
Raymond K. Fink, David F. Spencer and Rita A. Wells, Idaho National Laboratory, U.S. Department of Energy
- [15 Feb 06] Protecting Cyberspace by Working Together and Sharing Information
Robert S. Mueller, III, Director, Federal Bureau of Investigation
- [9 Feb 05] Partnering to Protect Cyber Space
Remarks by Steven M. Martinez, Acting Assistant Director, Cyber Division, Federal Bureau of Investigation, at the Third Annual Cyber Security Summit
- [31 Oct 02] Combating E-Crime
Robert S. Mueller, III, Director, Federal Bureau of Investigation
TOP
U.S. Congress
- [8 Oct 12] Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE
Mike Rogers and C.A. Dutch Ruppersberger. Report to the House Permanent Select Committee on Intelligence
- [12 Sep 12] Where the Jobs Are: There’s an App for That
Hearing before the House Energy and Commerce Committee, Subcommittee on Commerce, Manufacturing and Trade
- [31 July 12] State of Federal Privacy and Data Security Law: Lagging Behind the Times?
Hearing before the Senate Homeland Security and Governmental Affairs Committee, Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia
- [25 July 12] Digital Warriors: Improving Military Capabilities for Cyber Operations
Hearing before the House Committee on Armed Services, Subcommittee on Emerging Threats and Capabilities
- [25 July 12] Cloud Computing: An Overview of the Technology and Issues facing American Innovators
Hearing before the House Committee on the Judiciary, Subcommittee on Intellectual Property, Competition and the Internet
- [17 July 12] Cyber Security and the Grid
Hearing before the Senate Committee on Energy and Natural Resources
- [28 June 12] Economic Espionage: A Foreign Intelligence Threat to American Jobs and Homeland Security
Hearing before the House Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence
- [19 June 12] New Technologies and Innovations in the Mobile and Online Space, and the Implications for Public Policy
Hearing before the House Committee on the Judiciary, Subcommittee on Intellectual Property, Competition and the Internet
- [31 May 12] International Proposals to Regulate the Internet
Hearing before the House Energy and Commerce Committee, Subcommittee on Communications and Technology
- [26 April 12] Iranian Cyber Threat to the U.S. Homeland
Hearing Before the House Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies
- [24 April 12] America is Under Cyber Attack: Why Urgent Action is Needed
House Committee on Homeland Security, Subcommittee on Oversight, Investigations, and Management
- [24 April 12] Press Release: Chairman Rogers and Ranking Member Ruppersberger Announce Important Amendments to the Cyber Intelligence Sharing and Protection Act
House Permanent Select Committee on Intelligence
- [20 April 12] H.R. 4257, Federal Information Security Amendments Act of 2012
Congressional Budget Office
- [20 April 12] H.R. 3674, Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2012
Congressional Budget Office
- [28 March 12] Cybersecurity: Threats to Communications Networks and Public-Sector Responses
Hearing before the House Committee on Energy and Commerce, Subcommittee on Communications and Technology
- [27 March 12] IT Supply Chain Security: Review of Government and Industry Efforts
Hearing before the House Committee on Energy and Commerce, Subcommittee on Oversight and Investigations
- [27 March 12] On U.S. Strategic Command and U.S. Cyber Command in Review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program
Hearing before the Senate Committee on Armed Services
- [20 March 12] Fiscal Year 2013 Budget Request for Information Technology and Cyber Operations Programs
Hearing before the House Armed Services Committee, Subcommittee on Emerging Threats and Capabilities
- [20 March 12] On Cybersecurity Research and Development in Review of the Defense Authorization Request for Fiscal Year 2013 and the Future Years Defense Program
Hearing before the Senate Committee on Armed Services, Subcommittee on Emerging Threats and Capabilities
- [7 March 12] Cybersecurity: The Pivotal Role of Communications Networks
Hearing before the House Energy and Commerce Committee, Subcommittee on Communications and Technology
- [29 Feb 12] NASA Cybersecurity: An Examination of the Agency’s Information Security
Hearing before the House Committee on Science, Space, and Technology, Subcommittee on Investigations and Oversight
- [28 Feb 12] Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security
Hearing before the House Energy and Commerce Committee, Subcommittee on Oversight and Investigations
- [16 Feb 12] Securing America's Future: the Cybersecurity Act of 2012
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [14 Feb 12] Cybersecurity Act of 2012(S. 2105)
Bill Introduced by the Senate Committee on Homeland Security and Governmental Affairs
- [8 Feb 12] Cybersecurity: Threats to Communications Networks and Private-Sector Responses
Hearing before the House Energy and Commerce Committee
- [6 Dec 11] Hearing on Draft Legislative Proposal on Cybersecurity
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies
- [6 Dec 11] Jihadist Use of Social Media: How to Prevent Terrorism and Preserve Innovation
Hearing before the House Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence
- [1 Dec 11] Cyber Security: Protecting Your Small Business
Hearing before the House Small Business Committee, Subcommittee on Healthcare and Technology
- [30 Nov 11] Cyber Intelligence Sharing and Protection Act of 2011 (H.3523)
Bill Introduced by the House Select Committee on Intelligence
- [16 Nov 11] H.R. 3261, the "Stop Online Piracy Act"
Hearing before the House Committee on the Judiciary
- [15 Nov 11] Cyber Security: Protecting America's New Frontier
Hearing before the House Committee on the Judiciary, Subcommittee on Crime, Terrorism and Homeland Security
- [6 Oct 11] Cloud Computing: What are the Security Implications?
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
- [15 Sep 11] Internet Privacy: The Impact and Burden of EU Regulation
Hearing before the House Committee on Energy and Commerce, Subcommittee on Commerce, Manufacturing and Trade
- [14 Sep 11] Cybersecurity: Threats to the Financial Sector
Hearing before the House Committee on Financial Services, Subcommittee on Financial Institutions and Consumer Credit
- [7 Sep 11] Cybercrime: Updating the Computer Fraud and Abuse Act to Protect Cyberspace and Combat Emerging Threats
Hearing before the Senate Committee on the Judiciary
- [26 July 11] Cybersecurity: An Overview of Risks to Critical Infrastructure
Hearing before the House Energy and Commerce Committee, Subcommittee on Oversight and Investigations
- [7 July 11] Cybersecurity: Assessing the Nation’s Ability to Address the Growing Cyber Threat
Hearing before the House Committee on Oversight and Government Reform, Subcommittee on National Security, Homeland Defense, and Foreign Operations
- [29 June 11] Hacked Off: Helping Law Enforcement Protect Private Financial Information
Field Hearing before the House Committee on Financial Services in Hoover, Alabama
- [29 June 11] Privacy and Data Security: Protecting Consumers in the Modern World
Hearing before the Senate Commerce, Science and Transportation Committee
- [24 June 11] Examining the Homeland Security Impact of the Obama Administration's Cybersecurity Proposal
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
- [21 June 11] Cybersecurity and Data Protection in the Financial Sector
Hearing before the Senate Committee on Banking, Housing, and Urban Affairs
- [21 June 11] Cybersecurity: Evaluating the Administration’s Proposals
Hearing before the Senate Committee on the Judiciary, Subcommittee on Crime and Terrorism
- [26 May 11] Unlocking the SAFETY Act’s Potential to Promote Technology and Combat Terrorism
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
- [25 May 11] Cybersecurity: Assessing the Immediate Threat to the United States
Hearing before the House Committee on Oversight and Government Reform, Subcommittee on National Security, Homeland Defense and Foreign Operations
- [23 May 11] Protecting Cyberspace: Assessing the White House Proposal
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [5 May 11] A Joint Staff Discussion Draft Pertaining to Cyber Security of the Bulk-Power System and Electrical Infrastructure and for Other Purposes
Hearing before the Senate Committee on Energy and Natural Resources
- [4 May 11] The Threat of Data Theft to American Consumers
Hearing before the House Energy and Commerce Committee, Subcommittee on Commerce, Manufacturing, and Trade
- [15 April 11] Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology
Hearing before the House Committee on Foreign Affairs, Subcommittee on Oversight and Investigations
- [15 April 11] The DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
- [12 April 11] Cyber Security: Responding to the Threat of Cyber Crime and Terrorism
Hearing before the Senate Committee on the Judiciary, Subcommittee on Crime and Terrorism
- [6 April 11] The Electronic Communications Privacy Act: Government Perspectives on Protecting Privacy in the Digital Age
Hearing before the Senate Committee on the Judiciary
- [16 March 11] 2012 Budget Request from U.S. Cyber Command
Hearing before the House Armed Services Committee, Subcommittee on Emerging Threats and Capabilities
- [16 March 11] Examining the Cyber Threat to Critical Infrastructure and the American Economy
Hearing before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
- [10 March 11] Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [17 Feb 11] Cybersecurity and Internet Freedom Act of 2011 (S.413)
Bill Introduced by the Senate Committee on Homeland Security and Governmental Affairs
- [11 Feb 11] What Should the Department of Defense’s Role in Cyber Be?
Hearing before the House Armed Services Committee, Subcommittee on Emerging Threats and Capabilities
- [1 Feb 11] Statement on Cybersecurity
Joe Lieberman, Susan Collins and Tom Carper. Senate Committee on Homeland Security and Governmental Affairs
- [15 Dec 10] Protecting Cyberspace as a National Asset Act of 2010 (S.3480 RS)
Bill Introduced by the Senate Committee on Homeland Security and Governmental Affairs
- [17 Nov 10] Cost Estimate: S. 3480 - Protecting Cyberspace as a National Asset Act of 2010
Congressional Budget Office
- [17 Nov 10] Securing Critical Infrastructure in the Age of Stuxnet
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [23 Sep 10] Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations
Hearing before the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats, and Capabilities
- [23 Sep 10] U.S. Cyber Command: Organizing for Cyberspace Operations
Hearing before the House Armed Services Committee
- [15 July 10] Planning for the Future of Cyber Attack Attribution
Hearing before the House Committee on Science, Space, and Technology, Subcommittee on Technology and Innovation
- [1 July 10] Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud
Hearing before the House Committee on Oversight and Government Reform
- [23 June 10] Fact Sheet: Myth v. Reality of Cybersecurity Legislation: The Facts About S. 3480, “Protecting Cyberspace as a National Asset Act of 2010”
Senate Committee on Homeland Security and Governmental Affairs
- [16 June 10] Cybersecurity: DHS' Role, Federal Efforts and National Policy
Hearing before the House Committee on Homeland Security
- [15 June 10] Protecting Cyberspace as a National Asset: Comprehensive Legislation for the 21st Century
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [10 June 10] Protecting Cyberspace as a National Asset Act of 2010 (S.3480)
Bill Introduced by the Senate Committee on Homeland Security and Governmental Affairs
- [15 April 10] Nominations of VADM James A. Winnefeld, JR., USN to be Admiral and Commander, U.S. Northern Command/Commander, North American Aerospace Defense Command; and LTV Keith B. Alexander, USA, to be General and Director, National Security Agency/Chief, Central Security Service/Commander, U.S. Cyber Command
Nominations before the U.S. Senate Committee on Armed Services
- [24 March 10] Federal Information Security: Current Challenges and Future Policy Considerations
Hearing before the House Committee on Oversight and Government Reform, Subcommittee on Government Management, Organization, and Procurement
- [10 March 10] The Google Predicament: Transforming U.S. Cyberspace Policy to Advance Democracy, Security, and Trade
Hearing before the House Committee on Foreign Affairs
- [3 March 10] The Department of Homeland Security's Science and Technology Directorate
Hearing before the House Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
- [25 Feb 10] Private Sector Perspectives on Department of Defense Information Technology and Cybersecurity Activities
Hearing before the House Armed Services Committee, Terrorism, Unconventional Threats and Capabilities Subcommittee
- [16 Dec 09] Understanding Cyberspace as a Medium for Radicalization and Counter-Radicalization
Hearing before the House Armed Services Committee, Terrorism, Unconventional Threats and Capabilities Subcommittee
- [17 Nov 09] Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace
Hearing before the Senate Committee on the Judiciary, Subcommittee on Terrorism and Homeland Security
- [29 Oct 09] More Security, Less Waste: What Makes Sense for our Federal Cyber Defense
Hearing before the Senate Committee on Homeland Security and Governmental Affairs, Federal Financial Management Subcommittee
- [14 Sep 09] Cyber Attacks: Protecting Industry Against Growing Threats
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [5 May 09] Cyberspace as a Warfighting Domain: Policy, Management and Technical Challenges to Mission Assurance
Hearing before the House Armed Services Committee, Terrorism, Unconventional Threats and Capabilities Subcommittee
- [5 May 09] Cyber Security: Emerging Threats, Vulnerabilities, and Challenges in Securing Federal Information Systems
Hearing before the House Committee on Oversight and Government Reform, Subcommittee on Government Management, Organization, and Procurement
- [28 April 09] Cyber Security: Developing a National Strategy
Hearing before the Senate Homeland Security and Governmental Affairs Committee
- [10 March 09] Reviewing the Federal Cybersecurity Mission
Hearing before the House Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
- [16 Sep 08] Cybersecurity Recommendations for the Next Administration
Hearing before the House Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity and Science and Technology
- [21 May 08] Implications of Cyber Vulnerabilities on the Resiliency and Security of the Electric Grid
Hearing before the House Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
- [20 May 08] China's Proliferation Practices, and the Development of its Cyber and Space Warfare Capabilities
Hearing before the U.S. - China Economic and Security Review Commission
- [7 May 09] A Joint Staff Draft Related to Cyber Security and Critical Electricity Infrastructure
Hearing before the Senate Committee on Energy and Natural Resources
- [1 April 08] The Holistic Approaches to Cybersecurity Enabling Network Centric Operations
Hearing before the House Armed Services Committee, Terrorism, Unconventional Threats and Capabilities Subcommittee
- [13 Sep 06] The Future of Cyber and Telecommunications Security at DHS
Hearing before the House Committee on Homeland Security, Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity
- [28 July 06] Cyber Security: Recovery and Reconstitution of Critical Networks
Hearing before the Senate Homeland Security and Governmental Affairs Committee
- [19 July 05] Securing Cyberspace: Efforts to Protect National Information Infrastructures Continue to Face Challenges
Hearing before the Senate Committee on Homeland Security and Governmental Affairs
- [17 Dec 02] E-Government Act of 2002 (Public Law 107-347)
TOP
U.S. Policy Analysis
- [30 July 12] Cybersecurity Legislation: Questions that Need to be Answered
Paul Rosenzweig. Heritage Foundation
- [12 July 12] Department of Defense Implementation of the Federal Data Center Consolidation Initiative: Implications for Federal Information Technology Reform Management
Patricia Moloney Figliola, Anthony Andrews and Eric A. Fischer. Congressional Research Service
- [24 July 12] Cybersecurity Act of 2012: Revised Cyber Bill Still Has Problems
Paul Rosenzweig. Heritage Foundation
- [16 July 12] Securing U.S. Computer Networks with SECURE IT
Steven P. Bucci. Heritage Foundation
- [July 12] Cyber Security Legislation Privacy Protections are Substantially Similar
Rob Strayer and David Beardwood. Bipartisan Policy Center
- [July 12] Cyber Security Task Force: Public-Private Information Sharing
Bipartisan Policy Center
- [5 June 12] Ensuring Cybersecurity: More Red Tape Is Not the Answer
James L. Gattuso. Heritage Foundation
- [24 May 12] The Alarming Trend of Cybersecurity Breaches and Failures in the U.S. Government
Paul Rosenzweig. Heritage Foundation
- [21 May 12] From Tunis to Tunis: Considering the Planks of U.S. International Cyber Policy, 2005-2011
Christopher Bronk. James A. Baker III Institute for Public Policy
- [May 12] Preparing for Cyber 9/12
Jason Healey. Atlantic Council of the United States
- [27 April 12] Target Cyber-Oppressors, Not U.S. Businesses
Helle C. Dale and Paul Rosenzweig. Heritage Foundation
- [April 12] Sailing the Cyber Sea
James G. Stavridis and Elton C. Parker. Joint Force Quarterly
- [28 March 12] Information Sharing, Monitoring and Countermeasures in the Cyber Security Act, S. 2105, and the SECURE IT Act, S. 2151
Center for Democracy and Technology
- [20 March 12] On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy
Robert Belk and Matthew Noyes. Belfer Center for Science and International Affairs
- [7 March 12] Senate Cybersecurity Bill: Not Ready for Prime Time
Paul Rosenzweig. Heritage Foundation
- [March 12] The US Cyber Policy Reboot
Jason Healey. Atlantic Council of the United States
- [March 12] Who Should Lead U.S. Cybersecurity Efforts?
Kevin P. Newmeyer. Prism
- [March 12] Is there A Market Failure in Cybersecurity?
Eli Dourado and Jerry Brito. Mercatus Center, George Mason University
- [Spring 12] Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers
Jonah Force Hill. Belfer Center for Science and International Affairs
- [Spring 12] Virtual Checkpoints and Cyber –Terry Stops: Digital Scams to Protect the Nation’s Critical Infrastructure and Key Resource
Scott Glick. Journal of National Security Law and Policy
- [6 Feb 12] Promoting Cybersecurity Through the PRECISE Act
Paul Rosenzweig. Heritage Foundation
- [Feb 12] Cloud and Mobile Privacy: the Electronic Communications Privacy Act
Vivek Mohan. Belfer Center for Science and International Affairs, Harvard University
- [Feb 12] Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle
Adam Thierer. Mercatus Center, George Mason University
- [31 Jan 12] Congressional Cyber Initiative Shows Promise
Paul Rosenzweig. Heritage Foundation
- [27 Jan 12] Recommendations for the Implementation of a Comprehensive and Constitutional Cybersecurity Policy
The Constitution Project
- [Jan 12] Is there a Cybersecurity Market Failure?
Eli Dourado. Mercatus Center, George Mason University
- [Dec 11] The Power of 'the Few": A Key Strategic Challenge for the Permanently Disrupted High-Tech Homeland Security Environment
Rodrigo Nieto-Gomez. Homeland Security Affairs
- [16 Nov 11] Cybersecurity: the View from Washington
Carl Ungerer. Australian Strategic Policy Institute Note: Click on the Download PDF in the middle of the page to access the article
- [15 Nov 11] Cybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and the Stop Online Piracy Act
Allan A. Friedman. Brookings Institution
- [Oct 11] Defending the Homeland in Cyber Space: Developing, Testing and Improving Cyber Security Strategy
Rob Ayoub and Chris Rodriguez. Frost and Sullivan
- [Aug 11] Pursuing Cyber Statecraft
Jason Healey. Atlantic Council of the United States
- [21 July 11] Cybersecurity: Incentives and Governance
Transcript of a Brookings Institution event
- [21 July 11] Economic and Policy Frameworks for Cybersecurity Risks
Allan Friedman. Brookings Institution
- [27 June 11] Obama Cybersecurity Proposal Flawed, But Fixable
Paul Rosenzweig. Heritage Foundation
- [15 June 11] Cybersecurity and Intelligence: the U.S. Approach
Holly Porteous. Library of Parliament, Canada
- [June 11] Internet Freedom: A Foreign Policy Imperative in the Digital Age
Richard Fontaine and Will Rogers. Center for a New American Security
- [24 May 11] An Analysis of the Primary Authorities Supporting and Governing the Efforts of the Department of Homeland Security to Security the Cyberspace of the United States
Matthew H. Fleming and Eric Goldstein. Homeland Security Studies and Analysis Institute
- [23 May 11] Confronting the Cyber Threat
Jonathan Masters. Council on Foreign Relations
- [26 April 11] Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy
Jerry Brito and Tate Watkins. Mercatus Center, George Mason University
- [7 April 11] Investigating Cyber Security Threats: Exploring National Security and Law Enforcement Perspectives
Fredric Lemieux, Cyber Security Policy and Research Institute, George Washington University
- [1 April 11] Databuse: Digital Privacy and the Mosaic
Benjamin Wittes. Brookings Institution
- [April 11] Protecting Privacy through Cybersecurity
Adriane Lapointe. Center for Strategic and International Studies
- [22 March 11] The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
Patricia Moloney Figliola. Congressional Research Service
- [March 11] Beyond Cyber Doom
Sean Lawson. Mercatus Center, George Mason University
- [22 Feb 11] Internet "Kill Switch": Mapping Out Government's Proper Role in Cybersecurity
Paul Rosenzweig. Heritage Foundation
- [31 Jan 11] 10 Conservative Principles for Cybersecurity Policy
Paul Rosenzweig. Heritage Foundation
- [Jan 11] Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History
Sean Lawson. Mercatus Center, George Mason University
- [Jan 11] Cybersecurity Two Years Later
James A. Lewis, et al. Center for Strategic and International Studies
- [14 Dec 10] From Perfect Citizen to Naked Bodyscanners: When is Surveillance Reasonable?
Jeffrey Rosen. Cyber Security Policy and Research Institute, George Washington University
- [8 Dec 10] The Cyberthreat, Government Network Operations, and the Fourth Amendment
Jack Goldsmith. Brookings Institution
- [2 Dec 10] Oversight for Cybersecurity Activities: Why Intelligence Policies Won't Work, and What Kind of Approach Will
Adriane Lapointe. Center for Strategic and International Studies
- [Dec 10] Creating the Demand Curve for Cybersecurity
Melissa E. Hathaway. Atlantic Council of the United States
- [Sep 10] Protecting Cyberspace and the US National Interest
Aki J. Peritz and Michael Sechrist. Belfer Center for Science and International Affairs, Harvard University
- [Fall 10] Foundational Questions Regarding the Federal Role in Cybersecurity
Brian M. White and Gus P. Coldebella. Journal of National Security Law and Policy
- [Fall 10] National Cyber Doctrine: The Missing Link in the Application of American Cyber Power
Mark Young. Journal of National Security Law and Policy
- [Fall 10] Square Legal Pegs in Round Cyber Holes: the NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace
John N. Greer. Journal of National Security Law and Policy
- [Fall 10] Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line
Steven R. Chabinsky. Journal of National Security Law and Policy
- [Fall 10] History Repeats Itself: The 60-Day Cyberspace Policy Review in Context
Eric A. Greenwald. Journal of National Security Law and Policy
- [Fall 10] Will There Be Cybersecurity Legislation?
John Grant. Journal of National Security Law and Policy
- [Fall 10] The Past, Present and Future of Cybersecurity
Walter Gary Sharp. Journal of National Security Law and Policy
- [26 Aug 10] Cyber Security: A Complex "Web" of Problems
Paul Rosenzweig. Heritage Foundation
- [Aug 10] Cyber Security: An Integrated Governmental Strategy for Progress
Franklin D. Kramer. Atlantic Council of the United States
- [July 10] Cyber ShockWave: Simulation Report and Findings
Bipartisan Policy Center
- [June 10] Cyber Space Policies We Need
David M. Hollis and Katherine Hollis. Armed Forces Journal
- [7 April 10] Cybersecurity and National Policy
Daniel E. Geer, Jr. Harvard National Security Journal
- [April 10] Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation
Eric Landree, et al. RAND Corporation
- [23 Feb 10] The Cybersecurity Enhancement Act of 2009: A Start, But Not Nearly Enough
Paul Rosenzweig and Jena Baker McNeill. Heritage Foundation
- [30 Sep 09] Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
Catherine A. Theohary and John Rollins. Congressional Research Service
- [Sep 09] The Role of a 'Cyber Czar'
Stanton Sloane. Armed Forces Journal
- [25 Aug 09] Securing Cyberspace: Guarding the New Frontier
Richard Mereand. Institute of Land Warfare, Association of the United States Army
- [27 March 09] Comments to the White House 60-Day Cybersecurity Review
Fred H. Cate. Center for Applied Cybersecurity Research, Indiana University
- [March 09] Critical Issues in Cyber Assurance Policy Reform: an Industry Assessment
Intelligence and National Security Alliance
- [09] Social Contract 2.0: A 21st Century Program for Effective Cyber Security
Internet Security Alliance
- [16 Dec 08] Building Cyber Security Leadership for the 21st Century
James Jay Carafano and Eric Sayers. Heritage Foundation
- [Dec 08] Securing Cyberspace for the 44th Presidency
Center for Strategic and International Studies
- [June 08] Information Security and Public Diplomacy: Lessons from the Past, a Look at the Future
Hirsh Goodman. Institute for National Security Studies
- [08] The Cyber Security Social Contract - Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information
Internet Security Alliance
- [5 July 07] Future Computing and Cutting-Edge National Security
James Jay Carafano and Andrew Gudgel. Heritage Foundation
- [Spring 06] Cyberstrategy 2.0
Frank J. Cilluffo and J. Paul Nicholas. Journal of International Security Affairs
- [22 Feb 05] Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
Eric A. Fischer. Congressional Research Service
TOP
Cloud Computing and Security
- [July 12] Information Technology Reform: Progress Made but Future Cloud Computing Efforts Should be Better Planned
Government Accountability Office
- [27 June 12] Getting Cyber Serious: Mastering the Challenges of Federal Cloud Computing
Steven P. Bucci. Heritage Foundation
- [28 June 12] Privacy, Security and Trust in Cloud Computing
Siani Pearson. HP Laboratories
- [March 12] Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community
Cloud Computing Task Force, Intelligence and National Security Alliance
- [Feb 12] Cloud and Mobile Privacy: the Electronic Communications Privacy Act
Vivek Mohan. Belfer Center for Science and International Affairs, Harvard University
- [12] DoD Information Technology Modernization: A Recommended Approach to Data Center Consolidation and Cloud Computing
Defense Business Board
- [Dec 11] Guidelines on Security and Privacy in Public Cloud Computing
Wayne Jansen and Timothy Grance. National Institute of Standards and Technology, U.S. Department of Commerce
- [Nov 11] The Security of Cloud Infrastructure: Survey of U.S. IT and Compliance Practitioners
Vormetric and Ponemon Institute
- [25 July 11] Addressing Export Control in the Age of Cloud Computing
John Villasenor. Brookings Institution
- [15 July 11] Cloud Computing Zone Tests “Chongqing Model”
Matthew Luce. Jamestown Foundation
- [April 11] The Cloud: Understanding the Security, Privacy and Trust Challenges
Neil Robinson, et al. RAND Corporation
- [April 11] Security of Cloud Computing Providers Study
Ponemon Institute
- [Jan 11] Security and Resilience in Governmental Clouds: Making and Informed Decision
European Network and Information Security Agency NOTE: Select the "Download Full Report" link below the overview to access the full-text
- [11] State of Cloud Survey: Global Findings
Symantec Corporation
- [18 Dec 10] Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business
Ross A. Lumley. Cyber Security Policy and Research Institute, George Washington University
- [9 Sep 10] Cloud Computing Risks and National Security: Keeping Pace with Expanding Technology
Frank Cilluffo, Ron Ritchey, and Timothy Tinker. Homeland Security Policy Institute
- [6 May 10] Security of Cloud Computing Users
Ponemon Institute
- [May 10] Information Security: Federal Guidance Needed to Address Control Issue with Implementing Cloud Computing
Government Accountability Office
- [7 April 10] Saving Money through Cloud Computing
Darrell M. west. Brookings Institution
- [20 Jan 10] Cloud Computing for Business and Society
Transcript of a Brookings Institution Event
- [Jan 10] The Cloudy Future of Government IT: Cloud Computing and the Public Sector Around the World
David C. Wyld. International Journal of Web and Semantic Technology
- [21 Aug 09] Data Protection-Aware Design for Cloud Computing
Sadie Creese, et al. HP Laboratories
- [Aug 09] Cisco Cloud Computing - Data Center Strategy, Architecture and Solutions
Kapil Bakshi. CISCO
- [6 March 09] Taking Account of Privacy When Designing Cloud Computing Services
Siani Pearson. HP Laboratories
- [09] Moving to the Cloud: An Introduction to Cloud Computing in Government
David C. Wyld. IBM Center for The Business of Government
- [3 June 08] Assessing the Security Risks of Cloud Computing
Jay Heiser and Mark Nicolett. Gartner
TOP
Critical Infrastructure and Industry Security
- [current] SmartGrid.gov
- [8 Oct 12] ZTE's Equipment is Safe and Poses No Threat to US Telecommunications Infrastructure: The Company's Trusted Delivery Model Improves Equipment Safety and National Security
ZTE
- [16 Aug 12] Pipeline Cybersecurity: Federal Policy
Paul W. Parfomak. Congressional Research Service
- [17 July 12] Cybersecurity: Challenges in Securing the Electricity Grid
Statement of Gregory C. Wilshusen, Director, Information Security Issues, Government Accountability Office, before the Senate Committee on Energy and Natural Resources
- [July 12] Smarter Protection for the Smart Grid
McAfee
- [5 March 12] Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
Sergei Skorobogatov and Christopher Woods. University of Cambridge and Quo Vadis Labs
- [March 12] IT Supply Chain: National Security-Related Agencies Need to Better Address Risks
Government Accountability Office
- [Spring 12] Virtual Checkpoints and Cyber –Terry Stops: Digital Scams to Protect the Nation’s Critical Infrastructure and Key Resource
Scott Glick. Journal of National Security Law and Policy
- [3 Feb 12] Smart Meter Data: Privacy and Cybersecurity
Brandon J. Murrill, Edward C. Liu and Richard M. Thompson II. Congressional Research Service
- [Feb 12] New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems
Michael Sechrist. Belfer Center for Science and International Affairs, Harvard University
- [Feb 12] DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms
Government Accountability Office
- [9 Dec 11] Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use
Government Accountability Office
- [2 Nov 11] Protecting National Infrastructure Against Cyber Threats
Transcript of a Chatham House Event
- [Nov 11] The Security of Cloud Infrastructure: Survey of U.S. IT and Compliance Practitioners
Vormetric and Ponemon Institute
- [Sep 11] Cyber Security and the UK’s Critical National Infrastructure
Paul Cornish, et al. Chatham House
- [11 July 11] Critical Infrastructures: Background, Policy, and Implementation
John D. Moteff. Congressional Research Service
- [15 June 11] The Smart Grid and Cybersecurity—Regulatory Policy and Issues
Richard J. Campbell. Congressional Research Service
- [Summer 11] A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense
Larry Clinton. Journal of Strategic Security
- [May 11] Ensuring Hardware Cybersecurity
John D. Villasenor. Brookings Institution
- [May 11] Cyber Infrastructure Protection
Tarek Saadawi and Louis Jordan, Jr., eds. Strategic Studies Institute
- [12 Jan 11] Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed
Government Accountability Office
- [Sep 10] 2010 U.S. Smart Grid Vendor Ecosystem: Report on the Companies and Market Dynamics Shaping the Current U.S. Smart Grid Landscape
Greg Neichin and David Cheng, et al. Cleantech Group NOTE: Full-text made available by the U.S. Department of Energy
- [15 July 10] Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed
Government Accountability Office
- [May 10] Smart Grid Implementation: Strategies for Success
Rebecca L. Grant. Lexington Institute
- [March 10] The Electrical Grid as a Target for a Cyber Attack
James Andrew Lewis. Center for Strategic and International Studies
- [March 10] Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience
Government Accountability Office
- [March 10] Protecting Your Critical Assets: Lessons Learned from "Operation Aurora"
McAfee Labs and McAfee Foundstone Professional Services
- [Jan 10] In the Crossfire: Critical Infrastructure in the Age of Cyber War
Stewart Baker, Shaun Waterman, and George Ivanov. McAfee
- [10] Worldwide Infrastructure Security Report - 2010 Report
Arbor Networks
- [Nov 09] Addressing Cyber Security Through Public-Private Partnership: An Analysis of Existing Models
Intelligence and National Security Alliance
- [24 Sep 09] Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment
Government Accountability Office
- [March 09] Critical Issues in Cyber Assurance Policy Reform: an Industry Assessment
Intelligence and National Security Alliance
- [9 Sep 08] Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise
Government Accountability Office
- [Jan 08] Strategic Fragility: Infrastructure Protection and National Security in the Information Age
Robert A. Miller and Irving Lachow. Defense Horizons
- [08] The Cyber Security Social Contract - Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information
Internet Security Alliance
- Note: Full-text made available by the White House
- [31 Oct 07] Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
Government Accountability Office
- [13 Sep 06] Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity
Government Accountability Office
- [Feb 06] An Inventory of 20 National and 6 International Critical Information Infrastructure Protection Policies
Isabelle Abele-Wigert and Myriam Dunn. Center for Security Studies, ETH Zurich
- [26 May 05] Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities
Government Accountability Office
- [28 May 04] Technology Assessment: Cybersecurity for Critical Infrastructure Protection
Government Accountability Office
- [Aug 03] Homeland Security
Homeland Security Working Group. Lexington Institute Note: Four essays [Framing Danger; Is Cyber-Terrorism Getting Closer; An Assessment of Federal Critical Infrastructure Protection Efforts Since September 11; and Public Health & Medical Preparedness for Mass Terrorism] present different perspectives on what has been accomplished in homeland security and what needs to be done
TOP
Cybercrime
- [Sep 12] The Elderwood Project
Gavin O'Gorman and Geoff McDonald. Symantec
- [Aug 12] Gauss: Abnormal Distribution
Kaspersky Lab Global Research and Analysis Team
- [20 July 12] Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
Kristin M. Finklea and Catherine A. Theohary. Congressional Research Service
- [June 12] Measuring the Cost of Cybercrime
Ross Anderson, et al. Workshop on the Economics of Information Security
- [31 May 12] sKyWIper (a.k.a Flame a.k.a Flamer): A Complex Malware for Targeted Attacks
Laboratory of Cryptography and Systems Security, Budapest University of Technology and Economics
- [4 May 12] Significant Cyber Incidents Since 2006
Center for Strategic and International Studies
- [April 12] Internet Security Threat Report: 2011 Trends
Symantec
- [12 March 12] Cybersecurity: Cyber Crime Protection Security Act (S. 2111) - A Legal Analysis
Charles Doyle. Congressional Research Service
- [March 12] 2012 Data Breach Investigations Report
Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit and United States Secret Service
- [2 Feb 12] Malware and Cyber Crime: Twelfth Report of Session 2010-12
Science and Technology Committee, House of Commons, United Kingdom
- [Jan 12] Cyber Security: The Emerging Threat Landscape
Bangladesh Institute of Peace and Security Studies
- [Jan 12] Spotlight On: Malicious Insiders and Organized Crime Activity
Chris King. CERT Program, Carnegie Mellon University
- [11 Aug 11] Cybertheft and the U.S. Economy
Dmitri Alperovitch. Council on Foreign Relations
- [Aug 11] Revealed: Operation Shady RAT - An Investigation of Targeted Intrusions into More than 70 Global Companies, Governments, and Non-Profit Organizations During the Last Five Years
Dmitri Alperovitch. McAfee
- [1 July 11] Internet Facilitated Organised Crime
EUROPOL
- [July 11] Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs
Noah Shachtman. Brookings Institution
- [April 11] Symantec Internet Security Threat Report: Trends for 2010
Symantec Corporation
- [10 Feb 11] Global Energy Cyberattacks: “Night Dragon”
McAfee
- [11] Cyber Espionage: The Harsh Reality of Advanced Security Threats
Deloitte
- [11] The Cost of Cyber Crime
DETICA and the Office of Cyber Security and Information Assurance, UK Cabinet Office
- [11] McAfee Threats Report: Third Quarter 2011
McAfee Labs
- [11] 2011 Data Breach Investigations Report
Verizon RISK Team, U.S. Secret Service and Dutch High Tech Crime unit
- [11] Botnets: Detection, Measurement, Disinfection and Defence
European Network and Information Security Agency NOTE: Select the "Download Full Report" link below the overview to access the full-text
- [11] Botnets: 10 Tough Questions
European Network and Information Security Agency NOTE: Select the "Download Full Report" link below the overview to access the full-text
- [11] The Nitro Attacks: Stealing Secrets from the Chemical Industry
Eric Chien and Gavin O'Gorman. Symantec Corporation
- [27 Dec 10] Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
Charles Doyle. Congressional Research Service
- [27 Dec 10] Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Charles Doyle. Congressional Research Service
- [Dec 10] Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites
Ethan Zuckerman, et al. Berkman Center for Internet and Society, Harvard University
- [June 10] Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
Report of the Inquiry into Cyber Crime, House of Representatives, Parliament of the Commonwealth of Australia Note: Click on "Consolidated Version Download" in the middle of the page to access the full-text
- [6 April 10] Shadows in the Cloud: Investigating Cyber Espionage 2.0
Information Warfare Monitor and the Shadowserver Foundation
- [March 10] Protecting Your Critical Assets: Lessons Learned from "Operation Aurora"
McAfee Labs and McAfee Foundstone Professional Services
- [Feb 10] Cyber Crime: A Clear and Present Danger: Combating the Fastest Growing Cyber Security Threat
Deloitte
- [10] Mapping the Mal Web: The World’s Riskiest Domains
Barbara Kay and Paula Greve. McAfee
- [10] 2010 Data Breach Investigation Report
Verizon RISK Team and the U.S. Secret Service
- [29 March 09] Tracking Ghostnet: Investigating a Cyber Espionage Network
Information Warfare Monitor
- [March 09] Spotlight On: Malicious Insiders with Ties to the Internet Underground Community
Michael Hanley, et al. CERT Program, Carnegie Mellon University
- [09] 2009 Data Breach Investigations Report
Verizon Business RISK Team
- [09] Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare
Virtual Criminology Report 2009, McAfee
- [Dec 08] Spotlight On: Programming Techniques Used as an Insider Attack Tool
Dawn M. Cappelli, et al. CERT Program, Carnegie Mellon University
- [July 08] ITU Study on the Financial Aspects of Network Security: Malware and Spam
Johannes M. Bauer, et al. International Telecommunication Union
- [29 May 08] Economics of Malware: Security Decisions, Incentives and Externalities
Michel J.G. van Eeten and Johannes M. Bauer. Organization for Economic Co-operation and Development
- [29 Jan 08] Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Clay Wilson. Congressional Research Service
- [08] 2008 Data Breach Investigations Report
Verizon Business RISK Team
- [Dec 07] Cyber Attack: A Risk Management Primer for CEOs and Directors
British-North American Committee and the Atlantic Council of the United States
- [22 June 07] Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats
Government Accountability Office
- [28 Sep 06] Cybercrime: The Council of Europe Convention
Kristin Archick. Congressional Research Service
- [23 Nov 01] Convention on Cybercrime
Council of Europe
TOP
Economic Consequences
- [July 12] Information Technology Cost Estimation: Agencies Need to Address Significant Weaknesses In Policies and Practices
Government Accountability Office
- [July 12] Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
Adam Cummings, et al. Software Engineering Institute, Carnegie Mellon University
- [March 12] Is there A Market Failure in Cybersecurity?
Eli Dourado and Jerry Brito. Mercatus Center, George Mason University
- [27 Feb 12] The Digital Single Market 2.0
Hans Martens and Fabian Zuleeg. European Policy Centre
- [Feb 12] Cyber Security: The Vexed Question of Global Rules
Brigid Grauman. Security and Defense Agenda and McAfee
- [Jan 12] Is there a Cybersecurity Market Failure?
Eli Dourado. Mercatus Center, George Mason University
- [17 Oct 11] Cyberspace and U.S. Competitiveness
Betsy Masiello, et al. Council on Foreign Relations
- [11 Aug 11] Cybertheft and the U.S. Economy
Dmitri Alperovitch. Council on Foreign Relations
- [Aug 11] Information Security: Federal Deposit Insurance Corporation Has Made Progress, but Further Actions Are Needed to Protect Financial Data
Government Accountability Office
- [Aug 11] Revealed: Operation Shady RAT - An Investigation of Targeted Intrusions into More than 70 Global Companies, Governments, and Non-Profit Organizations During the Last Five Years
Dmitri Alperovitch. McAfee
- [29 July 11] Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates
Government Accountability Office
- [25 July 11] Addressing Export Control in the Age of Cloud Computing
John Villasenor. Brookings Institution
- [21 July 11] Economic and Policy Frameworks for Cybersecurity Risks
Allan Friedman. Brookings Institution
- [1 June 11] An Overview of the Economics of Cybersecurity and Cybersecurity Policy
Joseph J. Cordes. Cyber Security Policy and Research Institute, George Washington University
- [June 11] The Vulnerabilities of Developed States to Economic Cyber Warfare
Paul Cornish. Chatham House
- [Summer 11] A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense
Larry Clinton. Journal of Strategic Security
- [May 11] Ensuring Hardware Cybersecurity
John D. Villasenor. Brookings Institution
- [8 March 11] Improving Our Nation's Cybersecurity through the Public-Private Partnership: A White Paper
Center for Democracy and Technology, et al.
- [11] Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council
- [Sep 10] 2010 U.S. Smart Grid Vendor Ecosystem: Report on the Companies and Market Dynamics Shaping the Current U.S. Smart Grid Landscape
Greg Neichin and David Cheng, et al. Cleantech Group NOTE: Full-text made available by the U.S. Department of Energy
- [Jan 10] In the Crossfire: Critical Infrastructure in the Age of Cyber War
Stewart Baker, Shaun Waterman, and George Ivanov. McAfee
- [10] The Financial Management of Cyber Risk: An Implementation Framework for CFOs
Internet Security Alliance and American National Standards Institute
- [09] National Cyber Security Research and Development Challenges: Related to Economics, Physical Infrastructure and Human Behavior
Martin N. Wybourne, Martha F. Austin and Charles C. Palmer. Institute for Information Infrastructure Protection
- [09] Social Contract 2.0: A 21st Century Program for Effective Cyber Security
Internet Security Alliance
- [Sep 08] Research Agenda for the Banking and Financial Sector
Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security
- [July 08] ITU Study on the Financial Aspects of Network Security: Malware and Spam
Johannes M. Bauer, et al. International Telecommunication Union
- [29 May 08] Economics of Malware: Security Decisions, Incentives and Externalities
Michel J.G. van Eeten and Johannes M. Bauer. Organization for Economic Co-operation and Development
- [08] The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask
Internet Security Alliance and American National Standards Institute
- [Sep 07] Growing Business Dependence on the Internet: New Risks Require CEO Action
Business Roundtable
- [05] Authentication in an Electronic Banking Environment
Federal Financial Institutions Examination Council
- [1 April 04] The Economic Impact of Cyber-Attacks
Brian Cashell, et al. Congressional Research Service
- [10 Feb 03] High Performance Computers and Export Control Policy: Issues for Congress
Glenn J. McLoughlin and Ian F. Fergusson. Congressional Research Service
- [8 Aug 01] Authentication in an Electronic Banking Environment
Federal Financial Institutions Examination Council
TOP
International Initiatives and Issues
- [Current] Country Reports
European Network and Information Security Agency
- [current] National Strategies and Policies
NATO Cooperative Defence Centre of Excellence
- [Sep 12] Toward Stable and Effective Use of Cyberspace
Ministry of Defense, Japan
- [Sep 12] Achieving International Cyber Stability
Franklin D. Kramer. Atlantic Council of the United States
- [Sep 12] Moving Towards Tallinn: Drafting the Shape of Cyber Warfare
Ashley S. Boyle. American Security Project
- [Sep 12] The Tallinn Manual on International Law Applicable to Cyber Warfare (Draft)
Cooperative Cyber Defence Center of Excellence, NATO NOTE: Select the "Open Publication" link below the overview to access the full-text
- [Fall 12] The Customary International Law of Cyberspace
Gary Brown and Keira Poellet. Strategic Studies Quarterly
- [30 Aug 12] Promoting Global Internet Freedom: Policy and Technology
Patricia Moloney Figliola. Congressional Research Service
- [Aug 12] Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace
Ron Deibert. Canadian Defence and Foreign Affairs institute
- [20 July 12] Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
Kristin M. Finklea. Congressional Research Service
- [13 July 12] China, Internet Freedom, and U.S. Policy
Thomas Lum, Patricia Moloney Figliola and Matthew C. Weed. Congressional Research Service
- [July 12] Safety on the Line: Exposing the Myth of Mobile Communication Security
Cormac Callanan and Hein Dries-Ziekenheiner. Freedom House and Broadcasting Board of Governors
- [July 12] Digital Freedom of Expression in Uzbekistan: An Example of Social Control and Censorship in the 21st Century
Sarah Kendzior. New America Foundation
- [June 12] ICT For Growth: A Targeted Approach
Michal Grajek. Bruegel
- [June 12] Cyber Power and International Security
David Betz. Foreign Policy Research Institute
- [21 May 12] From Tunis to Tunis: Considering the Planks of U.S. International Cyber Policy, 2005-2011
Christopher Bronk. James A. Baker III Institute for Public Policy
- [18 May 12] Internet Surveillance
Philip Ward. House Of Commons Library, United Kingdom
- [May 12] China's Cyber Power and America's National Security
Jayson M. Spade. U.S. Army War College
- [May 12] Policy Making in 140 Characters or Less: NATO and Social Media
Lucy Leiderman. NATO Defense College
- [May 12] Five Years After Estonia's Cyber Attacks: Lessons Learned For NATO?
Vincent Joubert. NATO Defense College
- [April 12] ANZUS 2.0: Cybersecurity and Australia - US Relations
Andrew Davies, et al. Australian Strategic Policy Institute NOTE: Select the "Download PDF" link below the overview to access the full-text
- [April 12] Sailing the Cyber Sea
James G. Stavridis and Elton C. Parker. Joint Force Quarterly
- [15 March 12] Beware of Cyber China
Paul Rosenzweig. Hoover Institution, Stanford University
- [2 March 12] Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere
Karina Alexanyan, et al. Berkman Center for Internet and Society, Harvard University
- [March 12] The Global Information Technology Report 2012: Living in a Hyperconnected World
Soumitra Dutta and Beñat Bilbao-Osorio, eds. INSEAD and World Economic Forum
- [March 12] Feasibility Study for a European Cybercrime Centre
Neil Robinson, et al. Rand Corporation NOTE: Select the "Full Document" link below the overview to access the full-text
- [March 12] A Governance Switchboard: Scalability Issues in International Cyber Policymaking
Christopher Bronk. James A. Baker III Institute for Public Policy, Rice University
- [27 Feb 12] The Digital Single Market 2.0
Hans Martens and Fabian Zuleeg. European Policy Centre
- [Feb 12] Cyber Security: The Vexed Question of Global Rules
Brigid Grauman. Security and Defense Agenda and McAfee
- [Feb 12] Cybersecurity and U.S.-China Relations
Kenneth Lieberthal and Peter W. Singer. Brookings Institution
- [Feb 12] NATO's Cyber Capabilities: Yesterday, Today and Tomorrow
Jason Healey and Leendert van Bochoven. Atlantic Council
- [Jan 12] Beyond Attribution: Seeking National Responsibility for Cyber Attacks
Jason Healey. Atlantic Council
- [Winter 12] A Saudi Outlook for Cybersecurity Strategies: Extrapolated from Western Experiences
Naef Bin Ahmed Al-Saud. Joint Force Quarterly
- [12] V4 Cooperation in Ensuring Cyber Security – Analysis and Recommendations
Tomas Rezek, et al. Kosciuszko Institute NOTE: Full-text provided by the Policy Association for an Open Society
- [14 Dec 11] Recording Everything: Digital Storage as an Enabler of Authoritarian Governments
John Villasenor. Brookings Institution
- [14 Nov 11] International Institutions and Global Governance Program
Adam Segal. Council on Foreign Affairs
- [11 Nov 11] The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
Mark A. Stokes, Jenny Lin and L.C. Russell Hsiao. Project 2049 Institute
- [Nov 11] Cyberwarfare and International Law
Nils Melzer. United Nations Institute for Disarmament Research
- [Nov 11] Cyber Security Aspects in the Maritime Sector
European Network and Information Security Agency NOTE: Select the "Download Full Report" link below the overview to access the full-text
- [Nov 11] The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World
Cabinet Office, United Kingdom
- [Sep 11] New Threats: the Cyber-Dimension
Olaf Theiler. NATO Review Magazine
- [Sep 11] Cyber Security and the UK’s Critical National Infrastructure
Paul Cornish, et al. Chatham House
- [Sep 11] Cyber Norm Emergence at the United Nations: An Analysis of the Activities at the UN Regarding Cyber-Security
Tim Maurer. Belfer Center for Science and International Affairs, Harvard University
- [21 July 11] Strategies to Mitigate Targeted Cyber Intrusions
Department of Defense. Australia
- [June 11] China-U.S. Bilateral on Cybersecurity: Fighting Spam to Build Trust
Karl Frederick Rauscher and Zhou Tonglin. EastWest Institute and the Internet Society of China
- [5 May 11] China and Cybersecurity: Trojan Chips and U.S.-Chinese Relations
Dean Cheng and Derek Scissors. Heritage Foundation
- [April 11] Russia-U.S. Bilateral on Cybersecurity: Critical Terminology Foundations
Karl Frederick Rauscher and Valery Yaschenko, eds. EastWest Institute
- [17 March 11] Cyberspace Governance: The Next Step
Adam Segal. Council on Foreign Relations
- [Spring 11] Blown to Bits: China's War in Cyberspace August - September 2020
Christopher Bronk. Strategic Studies Quarterly
- [4 Feb 11] Building Security in an Age of Austerity
Remarks by Anders Fogh Rasmussen, Secretary General, NATO, at the 2011 Munich Security Conference
- [Feb 11] Cyber Security Strategy for Germany
Federal Ministry of the Interior, Germany
- [Jan 11] Working Towards Rules for Governing Cyber Conflict: Rendering Geneva and Hague Conventions in Cyberspace
Karl Rauscher and Audrey Korotkov. EastWest Institute
- [11] Leaping Over the Firewall: A Review of Censorship Circumvention Tools
Cormac Callanan, et al. Freedom House
- [11] 2012 Australian Government Information Security Manual
Department of Defense. Australia
- [11] The National Cyber Security Strategy (NCSS): Success through Cooperation
Netherlands
- [11] Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization
James A. Lewis and Katrina Timlin. United Nations Institute for Disarmament Research and the Center for Strategic and International Studies
- [25 Oct 10] Privacy on the Internet
Grahame Danby. House of Commons Library, United Kingdom
- [7 Sep 10] Speak Loudly and Carry a Small Stick: The North Korean Cyber Menace
James A. Lewis. U.S.-Korea Institute at SAIS
- [Sep 10] Russia, the United States, and Cyber Diplomacy: Opening the Doors
Franz-Stefan Gady and Greg Austin. EastWest Institute NOTE: Select the "Click here to download the report" link to access the full-text PDF
- [Sep 10] Internet Governance in an Age of Cyber Insecurity
Robert K. Knake. Council on Foreign Relations NOTE: Link to the full-text of the report is available above the overview
- [Sep 10] Controlling Behavior - Not Arms: Moving Forward on an International Convention for Cyberspace
Ramtin Amin. Belfer Center for Science and International Affairs
- [Fall 10] U.S. International Policy for Cybersecurity: Five Issues that Won’t Go Away
Jeffrey Hunker. Journal of National Security Law and Policy
- [Fall 10] A Comparative Study of the Information Security Policies of Japan and the United States
Atsuhiro Yamagishi, Ben T. Katsumi and Yasuhide Yamada. Journal of National Security Law and Policy
- [Aug 10] Rights and Responsibilities in Cyberspace: Balancing the Need for Security and Liberty
Jody R. Westby, Henning Wegener, and William Barletta. EastWest Institute and the World Federation of Scientists NOTE: Select the link that says “Click here to download the paper” to access the full-text
- [22 July 10] China's Cyber Command?
Russell Hsiao. Jamestown Foundation
- [2 July 10] Cyberspace: United States Faces Challenges in Addressing Global Cybersecurity and Governance
Government Accountability Office
- [June 10] Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
Report of the Inquiry into Cyber Crime, House of Representatives, Parliament of the Commonwealth of Australia Note: Click on "Consolidated Version Download" in the middle of the page to access the full-text
- [June 10] Multilateral Agreements to Constrain Cyberconflict
James A. Lewis. Arms Control Association
- [June 10] The Cybersecurity Agenda: Mobilizing for International Action
Kamlesh Bajaj. EastWest Institute NOTE: Select the link that says “Click here to download the paper” to access the full-text
- [Summer 10] Google Confronts China's "Three Warfares"
Timothy L. Thomas. Parameters
- [May 10] Cyber War and Competition in the China-U.S. Relationship
James A. Lewis. Center for Strategic and International Studies
- [April 10] Global Cyber Deterrence: Views from China, the U.S., Russia, India, and Norway
Tang Len, et al. EastWest Institute
- [17 Feb 10] Cyber Attacks: International Responses
Remarks by Michael Chertoff, Former U.S. Secretary of Homeland Security, at the 7th Worldwide Security Conference, EastWest Institute
- [Feb 10] China's Cyberspace Control Strategy: An Overview and Consideration of Issues for Canadian Policy
Ronald Deibert. Canadian International Council
- [10] International Cyber Incidents: Legal Considerations
Eneken Tikk, Kadrl Kaska, and Lils Vihul. NATO Cooperative Cyber Defence Centre of Excellence
- [10] Worldwide Infrastructure Security Report - 2010 Report
Arbor Networks
- [Nov 09] Weighing the Case for a Convention to Limit Cyberwarfare
David Elliott. Arms Control Association
- [9 Oct 09] Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
Prepared by Northrop Grumman for the U.S.-China Economic and Security Review Commission
- [Oct 09] The "Korean" Cyber Attacks and Their Implications for Cyber Conflict
James A. Lewis. Center for Strategic and International Studies
- [June 09] Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space
Office of Cyber Security and Cyber Security Operations Centre, United Kingdom
- [13 May 09] Russia and the Cyber Threat
Kara Flook. American Enterprise Institute
- [1 April 09] Freedom on the Net: A Global Assessment of Internet and Digital Media
Freedom House
- [March 09] Cyberspace and the National Security of the United Kingdom: Threats and Responses
Paul Cornish, Rex Hughes, and David Livingstone. Chatham House
- [3 Feb 09] The Second National Strategy on Information Security: Aiming for Strong "Individual" and "Society" in IT Age
National Information Security Policy Council, Japan
- [Feb 09] Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks
Requested by the Committee on Foreign Affairs, European Parliament, European Union and produced by Chatham House
- [Jan 09] The IT Security Situation in Germany in 2009
Federal Office for Information Security, Germany
- [09] NATO and Cyber Defence
Sverre Myrli. NATO Parliamentary Assembly
- [09] Protecting Europe from Large Scale Cyber-Attacks and Disruptions: Enhancing Preparedness, Security and Resilience
Commission of the European Communities, European Union
- [Winter 08/09] Georgia's Cyber Left Hook
Stephen W. Korns and Joshua E. Kastenberg. Parameters
- [Jan 08] Cyber Influence and International Security
Franklin D. Kramer and Larry Wentz. Defense Horizons
- [08] Australia and Cyber-Warfare
Gary Waters, Desmond Ball, and Ian Dudgeon. Australian National University
- [08] Cyber Security Strategy
Cyber Security Strategy Committee, Ministry of Defence, Estonia
- [12 Dec 07] Trojan Dragons: China's International Cyber Warriors
John J. Tkacik, Jr. Heritage Foundation
- [May 07] Governing the Internet: Freedom and Regulation in the OSCE Region
Organization for Security and Co-operation in Europe
- [Feb 06] An Inventory of 20 National and 6 International Critical Information Infrastructure Protection Policies
Isabelle Abele-Wigert and Myriam Dunn. Center for Security Studies, ETH Zurich
- [6 Jan 06] Developments in the Field of Information and Telecommunications in the Context of International Security
Resolution Adopted by the General Assembly, United Nations
- [10 June 05] A Comparative Analysis of Cybersecurity Initiatives Worldwide
Myriam Dunn. International Telecommunications Union, United Nations
- [04] Applicability of the Additional Protocols to Computer Network Attacks
International Committee of the Red Cross
- [23 Nov 01] Convention on Cybercrime
Council of Europe
- [3 July 01] Developments in the field of information and telecommunications in the context of international security
Report of the Secretary-General, United Nations
TOP
Warfare and Deterrence
- [13 Sep 12] The Case for Cyber
Jon Brickey, et al. Small Wars Journal
- [Sep 12] Moving Towards Tallinn: Drafting the Shape of Cyber Warfare
Ashley S. Boyle. American Security Project
- [Sep 12] The Tallinn Manual on International Law Applicable to Cyber Warfare (Draft)
Cooperative Cyber Defence Center of Excellence, NATO NOTE: Select the "Open Publication" link below the overview to access the full-text
- [Fall 12] Cyberspace Is Not a Warfighting Domain
Martin C. Libicki. I/S: A Journal of Law and Policy for the Information Society
- [Fall 12] Claiming the Lost Cyber Heritage
Jason Healey. Strategic Studies Quarterly
- [Fall 12] Escalation Dynamics and Conflict Termination in Cyberspace
Herbert Lin. Strategic Studies Quarterly
- [Fall 12] Sharing the Cyber Journey
Suzanne M. Vautrinot. Strategic Studies Quarterly
- [Fall 12] The Spector of Non-Obvious Warfare
Martin C. Libicki. Strategic Studies Quarterly
- [Fall 12] Internet Governance and National Security
Panayotis A. Yannakogeorgos. Strategic Studies Quarterly
- [Aug 12] Cyber Warfare: A “Nuclear Option”?
Andrew F. Krepinevich. Center for Strategic and Budgetary Assessments NOTE: Select the "Download" button above the overview to access the full-text
- [July/Aug 12] KWar: Cyber and Epistemological Warfare - Winning the Knowledge War by Rethinking Command and Control
Mark Ashley. Air and Space Power Journal
- [26 July 12] Cyber Threat Indications & Warning: Predict, Identify and Counter
Scott Swanson, Craig Astrich and Michael Robinson. Small Wars Journal
- [July 12] Deterrence and Escalation in Cross-domain Operations: Where do Space and Cyberspace Fit?
Vincent Manzo. Joint Force Quarterly
- [July 12] Electronic Warfare: DOD Actions Needed to Strengthen Management and Oversight
Government Accountability Office
- [July 12] Shadow Boxing: Cyber Warfare and Strategic Economic Attack
Soren Olson. Joint Force Quarterly
- [July 12] Offensive Cyber for the Joint Force Commander: It’s Not that Different
Rosemary M. Carter, Brent Feick and Roy C. Undersander. Joint Force Quarterly
- [July 12] Cyber Ricochet: Risk Management and Cyberspace Operations
Benjamin Leitzel. Center for Strategic Leadership, U.S. Army War College
- [July 12] Addressing Cyber Instability: Executive Summary
James C. Mulvenon and Gregory J. Rattray, eds. Atlantic Council of the United States and Cyber Conflict Studies Association
- [June 12] Secret Weapons and Cyberwar
Ravi R. Hichkad and Christopher J. Bowie. Armed Forces Journal
- [May 12] The ‘Oceans 11’ of Cyber Strikes: Advanced Persistent Threats are Rare, but Sophisticated
Peter W. Singer. Armed Forces Journal
- [Spring 12] Designer Satellite Collisions from Covert Cyber War
Jan Kallberg. Strategic Studies Quarterly
- [Feb 12] Cyber Security: The Vexed Question of Global Rules
Brigid Grauman. Security and Defense Agenda and McAfee
- [Jan 12] Cyber Security: The Emerging Threat Landscape
Bangladesh Institute of Peace and Security Studies
- [Winter 12] A Saudi Outlook for Cybersecurity Strategies: Extrapolated from Western Experiences
Naef Bin Ahmed Al-Saud. Joint Force Quarterly
- [9 Dec 11] From Worms to Cyber War
Paul Rosenzweig. Hoover Institution
- [Dec 11] Deterrence and Escalation in Cross-Domain Operations: Where Do Space and Cyberspace Fit?
Vincent Manzo. Institute for National Strategic Studies, National Defense University
- [Dec 11] The Five Futures of Cyber Conflict and Cooperation
Jason Healey. Atlantic Council
- [10 Nov 11] Self-Development for Cyber Warriors
Greg Conti, et al. Small Wars Journal
- [10 Nov 11] A Reserve Component Initiative to Defend DoD and National Cyberspace
David M. Hollis. Small Wars Journal
- [Nov 11] Cyberwarfare and International Law
Nils Melzer. United Nations Institute for Disarmament Research
- [Oct 11] The Mystique of “Cyberwar” and the Strategic Latency of Networked Social Movements
David Betz. Strategic Insights
- [20 Sept 11] Deterrence in Cyberspace: Debating the Right Strategy with Ralph Langner and Dmitri Alperovitch
Transcript of a Brookings Institution event
- [Fall/Winter 11] Stuxnet and After
Brent J. Talbot. Journal of International Security Affairs
- [11 July 11] Leadership of Cyber Warriors: Enduring Principles and New Directions
Gregory Conti and David Raymond. Small Wars Journal
- [11 July 11] Cyber Attacks, Real or Imagined, and Cyber War
James Andrew Lewis. Center for Strategic and International Studies
- [5 July 11] Cyber-Physical Attacks and Drone Strikes: The Next Homeland Security Threat
John Villasenor. Brookings Institution
- [28 June 11] Framing Cyber Warfare: Between Offence and Defence
Alan Chong and Nah Liang Tuang. S. Rajaratnam School of International Studies
- [1 June 11] Deterrence of Cyber Attacks and U.S. National Security
Charles L. Glaser. Cyber Security Policy and Research Institute, George Washington University
- [1 June 11] Cyberwar: A More Realistic Threat Assessment
Myriam Dunn Cavelty. International Relations and Security Network
- [Summer 11] Deciphering Cyberpower: Strategic Purpose in Peace and War
John B. Sheldon. Strategic Studies Quarterly
- [Summer 11] Building a New Command in Cyberspace
GEN Keith B. Alexander, USA, Commander, U.S. Cyber Command and Director, National Security Agency/Chief, Central Security Service. Strategic Studies Quarterly
- [Summer 11] Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)
Matthew C. Waxman. Yale Journal of International Law
- [Summer 11] The Cyber Warfare Professional: Realizations for Developing the Next Generation
Lt Col Timothy Franz, USAF. Air and Space Power Journal
- [31 May 11] Lessons of WikiLeaks: The U.S. Needs a Counterinsurgency Strategy for Cyberspace
Paul Rosenzweig. Heritage Foundation
- [15 April 11] Stuxnet : Cyberwar Revolution in Military Affairs
Paulo Shakarian. Small Wars Journal
- [8 March 11] Terrorist Use of the Internet: Information Operations in Cyberspace
Catherine A. Theohary and John Rollins. Congressional Research Service
- [March 11] Cyberspace Operations: What Senior Leaders Need to Know about Cyberspace
William Waddell, et al. Center for Strategic Leadership, U.S. Army War College
- [Spring 11] Retaliatory Deterrence in Cyberspace
Eric Sterner. Strategic Studies Quarterly
- [Spring 11] Perspectives for Cyber Strategists on Law for Cyberwar
Charles J. Dunlap, Jr. Strategic Studies Quarterly
- [Spring 11] Nuclear Crisis Management and "Cyberwar:" Phishing for Trouble?
Stephen J. Cimbala. Strategic Studies Quarterly
- [Spring 11] Cyberwar as a Confidence Game
Martin C. Libicki. Strategic Studies Quarterly
- [Spring 11] Rise of a Cybered Westphalian Age
Chris C. Demchak and Peter Dombrowski. Strategic Studies Quarterly
- [Spring 11] World Gone Cyber MAD: How "Mutually Assured Debilitation" is the Best Hope for Cyber Deterrence
Matthew D. Crosston. Strategic Studies Quarterly
- [15 Feb 11] Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report
David Albright, Paul Brannan, and Christina Walrond. Institute for Science and International Security
- [Feb 11] Cyber Defense: U.S. Cybersecurity Must-Do's
David M. Hollis and Katherine Hollis. Armed Forces Journal
- [Jan 11] A Commander's Strategy for Social Media
COL Thomas D. Mayfield, III, USA. Joint Force Quarterly
- [Jan 11] Airpower, Spacepower, and Cyberpower
Benjamin S. Lambeth. Joint Force Quarterly
- [11] A Cyberworm that Knows no Boundaries
Isaac R. Porche III, Jerry M. Sollinger and Shawn McKay. Rand Corporation
- [11] Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization
James A. Lewis and Katrina Timlin. United Nations Institute for Disarmament Research and the Center for Strategic and International Studies
- [22 Dec 10] Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?
David Albright, Paul Brannan, and Christina Walrong. Institute for Science and International Security
- [9 Dec 10] The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability
Paul K. Kerr, John Rollins, and Catherine A. Theohary. Congressional Research Service
- [Nov/Dec 10] Technician and Philosopher: Building the Relevance and Intellectual Capital of the Army's Information Warriors
James E. Shircliffe, Jr. Military Review
- [23 Nov 10] IAEA Iran Safeguards Report: Shutdown of Enrichment at Natanz Result of Stuxnet Virus?; Downgrade in Role of Fordow Enrichment Site; LEU Production May Have Decreased
David Albright, Andrea Stricker, and Christina Walrond. Institute for Science and International Security
- [Nov 10] On Cyber Warfare
Paul Cornish, et al. Chatham House
- [Nov 10] Cyber War and Cyber Power: Issues for NATO Doctrine
Jeffrey Hunker. NATO Defense College
- [Nov 10] 'Cry Stuxnet and Let Slip the Dogs of War?': The Potentially Deadly Viruses of Cyber Warfare
Dean Picciotti and Gregory Montanaro. Foreign Policy Research Institute
- [Oct 10] Information Strategy: The Missing Link
Lt Col Hans F. Palaoro, USAF. Joint Force Quarterly
- [Oct 10] What U.S. Cyber Command Must Do
Wesley R. Andrues. Joint Force Quarterly
- [8 Sep 10] Spyware: Background and Policy Issues for Congress
Patricia Moloney Figliola. Congressional Research Service
- [Sep 10] Thresholds for Cyberwar
James A. Lewis. Center for Strategic and International Studies
- [Fall 10] Cyber Deterrence: Tougher in Theory than in Practice?
Will Goodman. Strategic Studies Quarterly
- [Fall 10] Congress's Role in Cyber Warfare
Stephen Dycus. Journal of National Security Law and Policy
- [Fall 10] Offensive Cyber Operations and the Use of Force
Herbert S. Lin. Journal of National Security Law and Policy
- [Fall 10] Cyber Threats and the Law of War
David E. Graham. Journal of National Security Law and Policy
- [July/Aug 10] Warfare by Internet: The Logic of Strategic Deterrence, Defense, and Attack
BG Huba Wass de Czege, USA (ret.). Military Review
- [June 10] Securing the Info Advantage
Ed Grandstedt and Troy Nolan. Armed Forces Journal
- [June 10] The Silent Infiltrator
Mike Lloyd. Armed Forces Journal
- [Summer 10] USCYBERCOM: The Need for a Combatant Command versus a Subunified Command
David M. Hollis. Joint Force Quarterly
- [May/June 10] Information Operations as a Deterrent to Armed Conflict
COL Blane R. Clark, USA (ret.). Military Review
- [May/June 10] Attack or Defend? Leveraging Information and Balancing Risk in Cyberspace
COL Dennis M. Murphy, USA (ret.). Military Review
- [March 10] The Electrical Grid as a Target for a Cyber Attack
James Andrew Lewis. Center for Strategic and International Studies
- [March 10] Air Force Cyber Command (Provisional) Decision Support
Richard Mesic, et al. RAND Corporation
- [Spring 10] Cyber Vision and Cyber Force Development
Kamal Jabbour. Strategic Studies Quarterly
- [16 Feb 10] Cyberterrorism Hype v. Fact
Robert K. Knake. Council on Foreign Relations
- [Jan 10] Spooks in the Machine: How the Pentagon Should Fight Cyber Spies
Noah Shachtman. Progressive Policy Institute
- [28 Dec 09] Prioritizing U.S. Cybersecurity
James A. Lewis. Council on Foreign Relations
- [Oct 09] Cyberdeterrence and Cyberwar
Martin C. Libicki. RAND Corporation
- [Sep 09] Cyberspace and the "First Battle" in 21st-Century War
Robert A. Miller and Daniel T. Kuehl. Center for Technology and National Security Policy, National Defense University
- [Sep 09] Know Thy Enemy
Richard Davenport. Armed Forces Journal
- [Sep 09] Data Bombs Away
John Osterholtz. Armed Forces Journal
- [Aug 09] To Kill a Mockingbird: The Deconstruction of Information Operations
Randolph Rosin. Small Wars Journal
- [Aug 09] Proactive Self-Defense in Cyberspace
Bruce D. Caulkins. Institute of Land Warfare, Association of the United States Army
- [July 09] Future Naval Use of COTS Networking Infrastructure
Naval Research Advisory Committee
- [July 09] Military Perspectives on Cyberpower
Larry K. Wentz, Charles L. Barry, and Stuart H. Starr, eds. Center for Technology and National Security Policy, National Defense University
- [Summer 09] Cyber Operations: The New Balance
Stephen W. Korns. Joint Force Quarterly
- [Spring 09] The Art of (Cyber) War
Brian M. Mazanec. Journal of International Security Affairs
- [Winter 08/09] The Information Domain as an Element of National Power
Robert Kozloski. Strategic Insights
- [8 Aug 08] Off We Go...Cyberspace, the Air Force and the New Face of Battle
Christopher Bronk. James A. Baker III Institute for Public Policy, Rice University
- [27 Feb 08] The Evolution of Cyber Warfare
Greg Bruno. Council on Foreign Relations
- [Feb 08] Countering Violent Extremism: Videopower and Cyberspace
J. Rami Mroz. EastWest Institute
- [Dec 07] Air Force and the Cyberspace Mission: Defending The Air Force's Computer Network in the Future
Shane P. Courville. Center for Strategy and Technology, Air University
- [Oct 07] Victory in Cyberspace
Rebecca Grant. Air Force Association
- [April 07] Placing US Air Force Information Technology Investment under the "Nanoscope": A Clear Vision of Nanotechnology's Impact on Computing in 2030
Joseph H. Imwalle. Center for Strategy and Technology, Air University
- [April 07] Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare
Brent A. Peacock. Center for Strategy and Technology, Air University
- [20 March 07] Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
Clay Wilson. Congressional Research Service
- [15 March 07] Network Centric Operations: Background and Oversight Issues for Congress
Clay Wilson. Congressional Research Service
- [22 Jan 07] Terrorist Capabilities for Cyberattack: Overview and Policy Issues
John Rollins and Clay Wilson. Congressional Research Service
- [14 Sep 06] Information Operations and Cyberwar: Capabilities and Related Policy Issues
Clay Wilson. Congressional Research Service
- [Summer 06] Cyber-Mobilization: The New Levee en Masse
Audrey Kurth Cronin. Parameters
- [31 May 05] Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
Ronald O'Rourke. Congressional Research Service
- [1 Apr 05] Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Clay Wilson. Congressional Research Service
- [Jan 05] Information Assurance: Trends in Vulnerabilities, Threats, and Technologies
Jacques S. Gansler and Hans Binnendijk, eds. Center for Technology and National Security Policy, National Defense University
- [Dec 04] Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States
Charles Billo. Institute for Security Technology Studies, Dartmouth College
- [Nov 03] Examining the Cyber Capabilities of Islamic Terrorist Groups
Technical Analysis Group, Institute for Security Technology Studies, Dartmouth College
- [Aug 03] Homeland Security
Homeland Security Working Group. Lexington Institute Four essays [Framing Danger; Is Cyber-Terrorism Getting Closer; An Assessment of Federal Critical Infrastructure Protection Efforts Since September 11; and Public Health & Medical Preparedness for Mass Terrorism] present different perspectives on what has been accomplished in homeland security and what needs to be done
- [Dec 02] Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
James A. Lewis. Center for Strategic and International Studies
TOP
Research & Analysis
Congressional Research Service
- [11 Sep 12] Cybersecurity: Authoritative Reports and Resources
- [30 Aug 12] Promoting Global Internet Freedom: Policy and Technology
- [30 Aug 12] The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
- [16 Aug 12] Pipeline Cybersecurity: Federal Policy
- [20 July 12] Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement
- [20 July 12] Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
- [13 July 12] China, Internet Freedom, and U.S. Policy
- [12 July 12] Department of Defense Implementation of the Federal Data Center Consolidation Initiative: Implications for Federal Information Technology Reform Management
- [29 June 12] Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions
- [20 April 12] Cybersecurity: Selected Legal Issues
- [12 March 12] Cybersecurity: Cyber Crime Protection Security Act (S. 2111) - A Legal Analysis
- [9 Feb 12] Internet Governance and the Domain Name System: Issues for Congress
- [3 Feb 12] Smart Meter Data: Privacy and Cybersecurity
- [29 July 11] The Obama Administration's Cybersecurity Proposal: Criminal Provisions
- [11 July 11] Critical Infrastructures: Background, Policy, and Implementation
- [15 June 11] The Smart Grid and Cybersecurity—Regulatory Policy and Issues
- [6 April 11] Privacy Protections for Personal Information Online
- [8 March 11] Terrorist Use of the Internet: Information Operations in Cyberspace
- [27 Dec 10] Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
- [27 Dec 10] Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
- [9 Dec 10] The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability
- [8 Sep 10] Spyware: Background and Policy Issues for Congress
- [28 Jan 10] Federal Information Security and Data Breach Notification Laws
- [30 Sep 09] Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
- [10 March 09] Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations
- [14 May 08] Reauthorization of the E-Government Act: A Brief Overview
- [10 April 08] Federal Enterprise Architecture and E-Government: Issues for Information Technology Management
- [29 Jan 08] Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
- [23 July 07] State E-Government Strategies: Identifying Best Practices and Applications
- [20 March 07] Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
- [15 March 07]Network Centric Operations: Background and Oversight Issues for Congress
- [22 Jan 07] Terrorist Capabilities for Cyberattack: Overview and Policy Issues
- [28 Sep 06] Cybercrime: The Council of Europe Convention
- [14 Sep 06] Information Operations and Cyberwar: Capabilities and Related Policy Issues
- [31 May 05] Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
- [2 May 05] The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
- [1 Apr 05] Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
- [22 Feb 05] Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
- [3 Feb 05] Information Technology (IT) Management: The Clinger-Cohen Act and the Homeland Security Act of 2002
- [1 April 04] The Economic Impact of Cyber-Attacks
- [10 Feb 03] High Performance Computers and Export Control Policy: Issues for Congress
- [28 Jan 03] A Primer on E-Government: Sectors, Stages, Opportunities and Challenges of Online Governance
- [12 Dec 02] Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview
TOP
Government Accountability Office
- [Sep 12] Information Security: Better Implementation of Controls for Mobile Devices Should be Encouraged
- [17 July 12] Cybersecurity: Challenges in Securing the Electricity Grid
Statement of Gregory C. Wilshusen, Director, Information Security Issues, before the Senate Committee on Energy and Natural Resources
- [July 12] Information Technology Cost Estimation: Agencies Need to Address Significant Weaknesses In Policies and Practices
- [July 12] Data Center Consolidation: Agencies Making Progress on Efforts, but Inventories and Plans Need to Be Completed
- [July 12] Information Technology: DHS Needs to Further Define and Implement Its New Governance Process
- [July 12] Information Technology Reform: Progress Made but Future Cloud Computing Efforts Should be Better Planned
- [July 12] Electronic Warfare: DOD Actions Needed to Strengthen Management and Oversight
- [April 12] Information Technology Reform: Progress Made; More Needs to be Done to Complete Actions and Measure Results
- [March 12] IT Supply Chain: National Security-Related Agencies Need to Better Address Risks
- [Feb 12] DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms
- [9 Dec 11] Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use
- [29 Nov 11] Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination
- [3 Oct 11] Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements
- [Aug 11] Information Security: Federal Deposit Insurance Corporation Has Made Progress, but Further Actions Are Needed to Protect Financial Data
- [29 July 11] Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates
- [25 July 11] Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities
- [8 July 11] Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain
- [20 May 11] Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
- [12 Jan 11] Electricity Grid Modernization: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed
- [30 Nov 10] Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk
- [6 Oct 10] Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
- [15 Sep 10] Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems
- [15 July 10] Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed
- [2 July 10] Cyberspace: United States Faces Challenges in Addressing Global Cybersecurity and Governance
- [3 June 10] Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development
- [May 10] Information Security: Federal Guidance Needed to Address Control Issue with Implementing Cloud Computing
- [5 March 10] Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative
- [March 10] Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience
- [17 Nov 09] Cybersecurity: Continued Efforts Are Needed to Protect Information Systems from Evolving Threats
- [15 Oct 09] Critical Infrastructure Protection: OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect Federal Cyber Assets
- [24 Sep 09] Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment
- [9 Sep 08] Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise
- [31 July 08] Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability
- [27 June 08] Information Security: Federal Agency Efforts to Encrypt Sensitive Information Are Under Way, but Work Remains
- [31 Oct 07] Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
- [22 June 07] Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats
- [13 Sep 06] Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity
- [26 May 05] Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities
- [May 05] Information Security: Emerging Cybersecurity Issues Threaten Federal Information Systems
- [28 May 04] Technology Assessment: Cybersecurity for Critical Infrastructure Protection
TOP
Other Reports
- [Sep/Oct 12] Driving Towards Success in the Air Force Cyber Mission: Leveraging Our Heritage to Shape Our Future
David S. Fadok and Richard A. Raines. Air and Space Power Journal
- [25 Sep 12] Keeping Nukes Safe from Cyber Attack
John Reed. Foreign Policy
- [Aug 12] Preparing the Pipeline: The U.S. Cyber Workforce for the Future
David J. Kay, Terry J. Pudas and Brett Young. Institute for National Strategic Studies, National Defense University
- [July 12] Averting Catastrophe in Cyberspace: Core Requirements
Loren Thompson. Lexington Institute
- [July 12] Smarter Protection for the Smart Grid
McAfee
- [2 June 12] The Internet Health Model for Cybersecurity
EastWest Institute Note: Select the "Download the Report" link below the overview to access the full-text
- [June 12] Internet Security Without Law: How Service Providers Create Order Online
Eli Dourado. Mercatus Center, George Mason University
- [5 March 12] Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
Sergei Skorobogatov and Christopher Woods. University of Cambridge and Quo Vadis Labs
- [5 March 12] Lessons from Our Cyber Past: The First Military Cyber Units
Transcript of an Atlantic Council Event
- [March 12] Cyber Threat Metrics
Mark Mateski, et al. Sandia National Laboratories
- [Feb 12] State-Level Cybersecurity: The Missing Link in the Battle Against Global Botnets
Michael J. Glennon. Policy Review
- [Feb 12] New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems
Michael Sechrist. Belfer Center for Science and International Affairs, Harvard University
- [13 Jan 12] Lessons from 2011: The New Media Revolution is a Strategic Asset
Shruti Pandalai. Institute for Defence Studies and Analyses NOTE: Select the "Download Issue Brief" link below the overview to access the full-text
- [12] Risk Intelligent Governance in the Age of Cyber Threats: What you Don't Know Could Hurt You
Deloitte
- [Dec 11] Getting Down to Business: Realistic Goals for the Promotion of Peace in Cyber-space
Daniel Stauffacher, Riccardo Sibilia and Barbara Weekes. ICT4Peace Foundation
- [Dec 11] Cyber Security: Future Challenges and Opportunities
European Network and Information Security Agency Note: Click on the "Download Full Report" in the middle of the page to access the article
- [2 Nov 11] Protecting National Infrastructure Against Cyber Threats
Transcript of a Chatham House Event
- [1 Nov 11] Thinking Across Stovepipes: Using a Holistic Development Strategy to Build the Cybersecurity Workforce
Lance J. Hoffman, Diana Burley and Costis Toregas. Cyber Security Policy and Research Institute, George Washington University
- [Nov 11] Assessing Threats in Cyberspace: Interrogating Methodological Approaches and the Challenges of Today’s Complex Risk Environment
Gabriel Brönnimann, et al. Center for Security Studies
- [22 Sep 11] Cybersecurity, An Introduction
Paul Rosenzweig. Hoover Institution, Stanford University
- [6 Sep 11] Cyber Governance and Instability
Paul Twomey. Council on Foreign Relations
- [Sep 11] When Good Metaphors Go Bad: The Metaphoric “Branding” of Cyberspace
Adriane Lapointe. Center for Strategic and International Studies
- [Aug 11] On Cyber Peace
Les Bloom and John E. Savage. Atlantic Council of the United States
- [Aug 11] Wikileaks 2010: A Glimpse of the Future?
Tim Maurer. Belfer Center for Science and International Affairs, Harvard University
- [26 June 11] The Publication of National Security Information in the Digital Age
Mary-Rose Papandrea. Journal of National Security Law and Policy
- [2 June 11] America's Cyber Future: Security and Prosperity in the Information Age
Transcript of a Center for a New American Security event
- [June 11] Strategic Cyber Security
Kenneth Geers. NATO Cooperative Defence Centre of Excellence
- [June 11] America's Cyber Future: Security and Prosperity in the Information Age
Kristin M. Lord and Travis Sharp, eds. Center for a New American Security
- [May 11] Cyber Infrastructure Protection
Tarek Saadawi and Louis Jordan, Jr., eds. Strategic Studies Institute
- [May 11] The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States
National Cyber Security Alliance, Microsoft Corporation, and Zogby/463
- [11 April 11] Cyber Security: The Mess We're In and Why It's Going to Get Worse
Julie J.C.H. Ryan. Cyber Security Policy and Research Institute, George Washington University
- [April 11] Best Practices for National Cyber Security: Building a National Cyber Security Incident Management Capability, Version 2.0
John Haller, et al. CERT Program, Carnegie Mellon University
- [March 11] Social Media: the Frontline of Cyberdefence?
Tobias Franke. NATO Review Magazine
- [14 Feb 11] Cybersecurity and Cyber Freedom: The Future of Digital Surveillance Technology
Susan Landau, et al. Brookings Institution
- [2 Feb 11] Recruiting, Educating and Retaining Cyber Security Professionals in the Federal Workforce: Lessons Learned but not yet Applied
Diana L. Burley. Cyber Security Policy and Research Institute, George Washington University
- [31 Jan 11] Cybersecurity: Is Technology Moving Faster than Policy?
David Koczij, rapporteur. Security and Defense Agenda and Microsoft Corporation Note: Full text provided by Center for Security Studies, Swiss Federal Institute of Technology
- [14 Jan 11] Reducing Systemic Cybersecurity Risk
Peter Sommer and Ian Brown. Organisation for Economic Co-operation and Development
- [Jan 11] Mastering the Art of Wiki: Understanding Social Networking and National Security
James Jay Carafano. Joint Force Quarterly
- [Jan 11] Peacebuilding in the Information Age: Sifting Hype from Reality
Daniel Stauffacher, et al. eds. ICT4Peace Foundation, Berkman centre for Internet and Society, Harvard University and Georgia Institute of Technology
- [Winter 11] Nuclear Lessons for Cyber Security?
Joseph S. Nye, Jr. Strategic Studies Quarterly
- [11] A Window into Mobile Device Security: Examining the Security Approaches Employed in Apple's iOS and Google's Android
Carey Nachenberg. Symantec Corporation
- [Dec 10] Net Neutrality as Diplomacy
Jonathan Zittrain. Yale Law and Policy Review
- [Dec 10] A Taxonomy of Operational Cyber Security Risks
James J. Cebula and Lisa R. Young. CERT Program, Carnegie Mellon University
- [Dec 10] The CERT Approach to Cybersecurity Workforce Development
Josh Hammerstein and Christopher May. CERT Program, Carnegie Mellon University
- [Nov 10] Science of Cyber-Security
JASON & Mitre Corporation
- [Nov 10] A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters
Karen Evans and Franklin Reeder. Center for Strategic and International Studies
- [Fall 10] Cybersecurity and Freedom on the Internet
Gregory T. Nojeim. Journal of National Security Law and Policy
- [Aug 10] Conflicting Policy Presumptions about Cybersecurity: Cyber–Prophets, –Priests, –Detectives, and –Designers, and Strategies for a Cybered World
Chris Demchak. Atlantic Council of the United States
- [July 10] A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters
Center for Strategic and International Studies
- [May 10] Smart Grid Implementation: Strategies for Success
Rebecca L. Grant. Lexington Institute
- [May 10] Cyber Power
Joseph S. Nye, Jr. Belfer Center for Science and International Affairs
- [17 Feb 10] Balancing Cyber Threats and Cyber Benefits
Remarks by Peter Altabef, President of Dell Services, at the 7th Worldwide Security Conference, EastWest Institute
- [Nov 09] Addressing Cyber Security Through Public-Private Partnership: An Analysis of Existing Models
Intelligence and National Security Alliance
- [Oct 09] Strategic Advantage: Why America Should Care About Cybersecurity
Melissa E. Hathaway. Belfer Center for Science and International Affairs
- [Sep 09] Defending the New Silk Road
Bryce L. Meyer. Armed Forces Journal
- [July 09] Cyber In-Security: Strengthening the Federal Cybersecurity Workforce
Partnership for Public Service, Booz Allen Hamilton
- [16 May 09] Plan for Enhancing Internet Security, Stability, and Resiliency
Internet Corporation for Assigned Names and Numbers
- [Jan 08] Strategic Fragility: Infrastructure Protection and National Security in the Information Age
Robert A. Miller and Irving Lachow. Defense Horizons
- [Oct 07] Security Issues and Recommendations for Online Social Networks
Giles Hogben, ed. European Network and Information Security Agency
TOP
News Sources & Online Journals
TOP
Web Gateways
TOP
Military Policy Awareness links
|
|