![United-States-Air-Force-Cornerstones-of](/sites/default/files/styles/thumbnail/public/documents/4164297/United-States-Air-Force-Cornerstones-of.pdf.jpeg?itok=iufkqa0o)
Document 01
This document reveals how the Air Force conceptualized information warfare as a part of Air Force doctrine in the mid-to-late 1990s.
![Department-of-State-Agreement-Between-the](/sites/default/files/styles/thumbnail/public/documents/4164298/Department-of-State-Agreement-Between-the.pdf.jpeg?itok=bd1q8Z7P)
Document 02
This agreement establishes a joint-operated International Law Enforcement Academy to provide training and assistance to Latin American law enforcement agencies for combating cyber-crime and other criminal threats.
![Defense-Science-Board-21st-Century-Strategic](/sites/default/files/styles/thumbnail/public/documents/4164299/Defense-Science-Board-21st-Century-Strategic.pdf.jpeg?itok=G3fkueo9)
Document 03
This document examines challenges in acquiring a fielding next-generation technologies and potential enablers to the acquisition process.
![Department-of-Defense-Maintaining-Readiness-to](/sites/default/files/styles/thumbnail/public/documents/4164300/Department-of-Defense-Maintaining-Readiness-to.pdf.jpeg?itok=ecXSbTjo)
Document 04
FOIA Request
This memo requests all military department secretaries and combatant command commanders to beat a deadline set by the Chairman of the Joint Chiefs of Staff for incorporating cyber challenges into major military exercises.
![United-States-Air-Force-Cyber-Warfare-Operations](/sites/default/files/styles/thumbnail/public/documents/4164301/United-States-Air-Force-Cyber-Warfare-Operations.pdf.jpeg?itok=Ynjt4YlF)
Document 05
This document provides an outline of career progression and skills requirements for cyber careers within the Air Force.
![Centre-for-the-Protection-of-National](/sites/default/files/styles/thumbnail/public/documents/4164302/Centre-for-the-Protection-of-National.pdf.jpeg?itok=NJBu9JEA)
Document 06
This document provides guidance for the use of threat intelligence and situational awareness for network security.
![Department-of-Homeland-Security-NCCIS-ICS-CERT](/sites/default/files/styles/thumbnail/public/documents/4164304/Department-of-Homeland-Security-NCCIS-ICS-CERT.pdf.jpeg?itok=4paTTjN8)
Document 07
This document provides details related to the December 2015 cyber-attack on Ukrainian power companies as well as mitigating steps that could and/or should have been taken.
![Department-of-Defense-Department-of-Defense](/sites/default/files/styles/thumbnail/public/documents/4164305/Department-of-Defense-Department-of-Defense.pdf.jpeg?itok=mKYlzUhW)
Document 08
This document serves as a guide for the secure implementation and use of cloud computing within the Department of Defense.
![United-States-Congress-Prepared-Testimony-and](/sites/default/files/styles/thumbnail/public/documents/4164303/United-States-Congress-Prepared-Testimony-and.pdf.jpeg?itok=p-96w_Yu)
Document 09
This testimony explores cyber threats and possible responses within the context of Russian activities.
![Department-of-Defense-Establishment-of](/sites/default/files/styles/thumbnail/public/documents/4164306/Department-of-Defense-Establishment-of.pdf.jpeg?itok=v4HLKq9v)
Document 10
This memo announces the establishment of a team to accelerate integration of big-data and machine learning into joint operations.
![DEFCON-DEFCON-25-Voting-Machine-Hacking-Village](/sites/default/files/styles/thumbnail/public/documents/4164307/DEFCON-DEFCON-25-Voting-Machine-Hacking-Village.pdf.jpeg?itok=2mkLe0pa)
Document 11
This document reports findings from the DEFCON Voting Machine Hacking Village in which every piece of equipment was breached by the end of the conference.