Document 01
This document provides procedures for the implementation of Executive Order 12958 with the Department of Defense.
Document 02
This document provides a short introduction to the NSA's working group for the development of VPN exploits.
Document 03
This document makes recommendations for cooperation between the United States and the United Kingdom related to emerging technologies including power sources, improved computing, critical electronic components, command environments, and surveillance.
Document 04
This document identifies trends in tech development and its relevance to defense strategy.
Document 05
This document is a piece of a leak which revealed details related to cooperation between the Russian Government and the telecommunications industry for complex data collection operations in Russia.
Document 06
This document provides guidance to civilian drone operators for managing risk in a variety of ways to include communications and data security.
Document 07
This report is the result of an industry discussion on harnessing and securing the "Internet of Things" most effectively.
Document 08
This document gives guidance for the use of encryption for securing unclassified Federal data.
Document 09
This document identifies ten key practices for the use of cloud computing and assesses cloud computing contractors by department according to those practices.
Document 10
This document provides an overview of organized crime either occurring on or enabled by the cyber domain.
Document 11
This opinion rules that the FBI will not be able to conceal the price paid to a tech vendor for unlocking an iPhone belonging to a suspected terrorist.
Document 12
This testimony explains how Equifax data was compromised and what measures were taken to protect US consumers after the attack.