| Current Terrorism Threat Level: U.S. Department of Homeland Security |
| Daily updated list of U.S. & Coalition Casualties in Iraq : CNN |
| List of Iraq Coalition Contractor Casualties: Lunaville & iCasualties |
| The Special Operations Warrior Foundation : The Warrior Foundation |
| [ISN]: InfoSec News Mailing List : William Knowles (Moderator) |
| RAND Voices of Jihad Database: RAND Corporation |
| Packet Storm : Full Disclosure Computer Security Site |
| The Small Wars Manual (1940 edition): U.S. Marine Corps |
| Directory of Open Access Journals: Lund University Libraries |
| Shadow Company: Nick Bicanic |
| The Center for Contemporary Conflict: Naval Postgraduate School |
| Jane's C4I Systems 2006 - 2007 : Giles Ebbutt |
| Russian-Chechen Information Warfare 1994-2006: Major Dan Fayutkin - IDF |
| Unrestricted Warfare Symposium 2007: The Johns Hopkins University |
| Terrorist Capabilities for Cyberattack: John Rollins and Clay Wilson |
| The Wider War: By Michael A. Ledeen - American Enterprise Institute |
| The Militant Ideology Atlas: Dr. William McCants, Dr. Jarret Brachman, USMA |
| Reflections from a Red Team Leader: Susan Craig |
| Bastille Hardening System: Jon Lasser & Jay Beale |
| Black Alchemy Fake AP: 53,000 False Generated Wireless Access Points |
| Treachery Unlimited: Jay Dyson |
| Blackwater's 'Little Birds' of Baghdad pack quite a sting: Joanne Kimberlin |
| UCS Satellite Database: Union of Concerned Scientists |
| Open Source Disaster Recovery: Calvert Jones and Sarai Mitnick |
| Intellnet : Open Source Intelligence - Brooks Isoldi |
| Heavens-Above (Satellite Predictions): Chris Peat |
| 2007 CIA World Factbook : Central Intelligence Agency |
| The Bunker : Ultra-Secure Data Colocation |
| Joint Doctrine for Military Deception (Updated) [.pdf]: Joint Chiefs of Staff |
| Send Care Packages to U.S. Military : AnySoldier.com |
| Free Business Publications for Qualified Professionals: TradePub.com |
| Licensed to Kill: Hired Guns in the War on Terror: Robert Young Pelton |
| OSVDB: Independent, Unbiased Resource of Security Information |
| Clandestine and Guerrilla Radio Stations : Daily Intelligence on Subversive TV & Radio |
| Chinese Unrestricted Warfare [.pdf]: PLA Senior Colonels Qia Liang & Wang Xiangsui |
| Link to C4I.org - Buttons & Propaganda: C4I.org Staff |
Added 2.10.2006 | Information Operations Roadmap : Department of Defense |
| Jane's C4I Systems 2005 - 2006 : Giles Ebbutt |
| New Attrition Mailing Lists : Attrition.org Staff |
| Chinese Military Power : The Project on Defense Alternatives |
| Stealing the Network : FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale |
| Teaching Intelligence: Getting Started : John Macartney |
| Ambient Findability : Peter Morville |
| Build Security In : DHS National Cyber Security Division |
| Basic Security Awareness [.pdf]: Geraint Jones |
| Tor : Electronic Frontier Foundation, ONR & DARPA |
| CISSP Exam & Study Information : William Knowles |
| 10 GPS Vulnerabilities : LTC. Thomas K. Adams (Ret.) |
| Hacking for a cause : Brian Still |
| Rewards for Justice: Department of State, Diplomatic Security Service |
| CERIAS Incident Response Database : Purdue University |
| PandemicFlu.gov : U.S. Department of Health & Human Services |
| Warnings of a Flu Pandemic : Nature Magazine |
| Iraq: Learning the Lessons of Vietnam : Melvin R. Laird |
| Redacting with Confidence : SNAC-IAD - National Security Agency |
| China's Psychological Warfare : Laura K. Murray |
| The World's Most Dangerous Places: 5th Edition : Robert Young Pelton |
| Emergency Email Network : Free E-mail Notification Service |
| Electronic Encyclopaedia of Civil Defense & Emergency Management : Walter Green |
| Chronology of Data Breaches Reported Since the ChoicePoint Incident : Privacy Rights Clearinghouse |
| Chiefs of State & Cabinet Members of Foreign Governments : Central Intelligence Agency |
Added 7.4.2005 | The Dynamic Terrorist Threat : R. Kim Cragin, Sara A. Daly, RAND Corporation |
| Encyclopedia of Intelligence and Counterintelligence : Edited by Rodney Carlisle |
| An Incomplete Manifesto for Growth : Bruce Mau |
| International Journal of Digital Evidence : Economic Crime Institute |
| SecurityDocs : Directory of Network Security White Papers |
| 2005 Terrorism Risk Map : Aon United |
| Buzztracker : Visual Representations of News on the Internet |
| Jihad Unspun : Interesting propaganda from another viewpoint. |
| ProcessLibrary.com : Detailed information about every common process. |
| Arms Control Wonk : Jeffrey Lewis, Paul Kerr |
| C4I Forcast : Forcast International |
| Open CRS Network : CRS Reports for the People |
| Marine Corps Gazette : The Professional Journal of the U.S. Marines |
| Air University Library Map Room : U.S. Air Force |
| Electronic Warfare for the Digitized Battlefield : by Michael Frater, Michael Ryan |
| Sun Tzu - The Art of War Strategy Site : Intelligent Approach to Competition |
| Roadside Bombs and Armored Vehicles : Thomas Herlihy |
| MIPT Terrorism Knowledge Base : National Memorial Institute for the Prevention of Terrorism |
| Building Security: Handbook for Architectural Planning & Design : Barbara A. Nadel |
| The Media's Portrayal of Hacking, Hackers, and Hacktivism Before & After 9/11 : Sandor Vegh |
Added 8.15.2004 | Knoppix STD : Linux Security Tools Distribution |
| Insecure.org: Home of Nmap, by Fyodor |
| Jane's C4I Systems 2004-2005: Giles Ebbutt (Editor) |
| Psychology of Intelligence Analysis: Richards J. Heuer, Jr. |
| Redefining the Enemy: Brian Michael Jenkins |
| ACIG Journal: Air Combat Information Group |
| New & Used C4I.org Gear For Sale : C4I.org Staff |
| Relearning Counterinsurgency Warfare: Robert T. Tomes |
| Military Battles and Campaigns: The Library of Congress |
| Visby Class Stealth Corvettes: Swedish Navy |
| Urban Sunrise: U.S.A.F. Research Laboratory |
| WiGLE : Wireless Geographic Logging Engine |
| Computer Crime Research Center: Daily updated news about computer crimes |
| Defeating Terrorists on the Waterfront: Commander James Pelkofski, U.S.N. |
| Hardening Your Computing Assets: Carlo Kopp |
| The U.S. Army in Operation Iraqi Freedom: Center for Army Lessons Learned |
| International Peace Operations Association (IPOA): Doug Brooks, Coley Hudgins |
| Operation Iraqi Children: Program bringing school supply kits to Iraqi children |
| The Joint Warrior Interoperability Demonstration: Department of Defense |
| Cybersecurity for Critical Infrastructure Protection: Government Accountability Office |
| Hostile Environment Training 101: Vincent Laforet, The New York Times |
| Cyber Adversary Characterization: Auditing the Hacker Mind: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost |
| Info from Iraq - From Someone who is Doing the Run and Gun: Ben Thomas |
| S2 Online: Resource for S2 professionals |
| What is C4I? : C4I.org Staff |
Added 11.15.2003 | Hacker Generations : Richard Thieme |
| Simple Nomad's DefCon 11 Rant : Simple Nomad |
| Angola Landmine Database: Norwegian Peoples Aid |
| Complete al Qaeda Training Manual: The Smoking Gun |
| Middle East Media Research Institute: Independent Research Group |
| Iraq Humanitarian and Reconstruction Assistance Updates: USAID |
| Partnership for Effective Peacekeeping Operations: A policy working group |
| BlackBerry Reveals Bank's Secrets: Kim Zetter |
| Real-Time Top Ten Vulnerabilities: Qualys Vulnerability Research Lab |
| Wireless Internet connectivity for developing nations: Larry Press |
| Dead Horses in the Sun: Larry A. Bell |
| SecurityDriver.com: Tony Scotti |
| Soldiers of good fortune: Barry Yeoman |
| The Dawn of the E-Bomb: Michael Abrams |
| The Myth of Homeland Security: Marcus Ranum |
| Jane's C4I Systems, 2003-2004: Giles Ebbutt (Editor) |
| Computer Co-location Facility Vulnerabilities: Jonathan Zdziarski |
| Real 802.11 Security: Wi-Fi Protected Access & 802.11i: Jon Edney & William A. Arbaugh |
| Annual Report on the Military Power of The Peoples's Republic of China [.pdf]: U.S. Department of Defense |
| Analysis of an Electronic Voting System: Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, & Dan S. Wallach |
Added 7.1.2003 | Iraq's Crash Course in Cyberwar: Brian McWilliams |
| Help Support C4I.org, Please Make a Donation: C4I.org Staff |
| Operation Iraqi Freedom - By The Numbers: Lt Gen. T. Michael Moseley, USAF |
| North Korean Tactics: Maj. James M. Minnich |
| No Outward Sign: Bill Neugent |
| Jane's C4I Systems, 2002-2003: Giles Ebbutt (Editor) |
| Dachb0den Labs: Southern California Security Group |
| Corporate Warriors: P. W. Singer |
| Intrusion Detection with Snort: Jack Koziol |
| In the Company of Heroes: Michael J. Durant |
| Nothing Learned from Black Hawk Down: Mike Sparks |
| Failing to Keep Up With the Information Revolution: Bruce Berkowitz |
| The Center for Open Source in Government: Tony Stanco |
| Planning for Survivable Networks: Annlee A. Hines |
| Joint Doctrine for Information Operations [.pdf]: Joint Chiefs of Staff |
| Stealing the Network: How to Own the Box: Ryan Russell, Ido Dubrawsky, FX |
| South Asia Analysis Group: Dr. S. Chandrasekharan |
| Space Imaging: One Meter Commerical Satellite Imagery |
| Secrets of Computer Espionage: Joel McNamara |
| The Mind of War: Grant Tedrick Hammond |
| Chinese Defence Today: Unofficial website of the Chinese defence affair |
| Network-centric warfare: Not there yet : Dan Caterinicchia with Matthew French |
| If We Run Out of Batteries, This War is Screwed. : Joshua Davis |
| The Influence Component of Counterterrorism : Paul K. Davis & Brian Michael Jenkins |
| Association of Old Crows : The Electronic Warfare & Information Operations Association |
| International Charter Incorporated of Oregon: Worldwide aviation, security, and logistics services |
Added 2.15.2002 | The Marine Corps Professional Reading Program List: United States Marine Corps |
| Black Hawk Down - A Story of Modern War: Mark Bowden |
| Information Assurance Technology Analysis Center: Department of Defense |
| Has Anyone Seen This Spy Plane?: Tom Mahood |
| Civilians, Spies, and Blue Suits: Jeffrey T. Richelson |
| Breakdown - How America's Intelligence Failures Led to 9/11: Bill Gertz |
| The Center for Internet Security: Not-For-Profit Security Organization |
| Terrorism Time Line: Claire B. Rubin & Associates |
| Internet Storm Center: The SANS Institute |
| Tracking Hackers: Resources & Links on Honeypots |
| DigitalGlobe: High-Res Commerical Satellite Imagery |
| FM 3-100.21 Contractors on the Battlefield : United States Army |
| Boyd - The Fighter Pilot Who Changed the Art of War: Robert Coram |
| Understanding Revolutionary Warfare: Major Dennis I. Merritt, USMC |
| Securing 802.11 with OpenBSD: Jarkko Turkulainen |
| SDSC Secure Syslog: San Diego Supercomputer Center |
| MacStumbler: OSX Wireless Scanning Tool |
| The Liberty Incident: A. Jay Cristol |
| Pattern Recognition: William Gibson |
| Maximum Wireless Security: Cyrus Peikari, Seth Fogie |
| Information Operations - The IFOR Experience : Larry K. Wentz |
| The Ten Commandments of Counterintelligence: James M. Olson |
| Strong Cryptography Links on the Internet: William Knowles |
| UCIA.org Domain For Sale : C4I.org Staff |
| The National Strategy to Secure Cyberspace [.pdf]: Department of Homeland Security |
| The Spread of the Sapphire/Slammer Worm: David Moore, Vern Paxson Stefan Savage, Colleen Shannon, Stuart Staniford, & Nicholas Weaver |
Added 11.15.2002 | Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet: Maura Conway |
| The Memorability and Security of Passwords: Jianxin Yan, Alan Blackwell, Ross Anderson, & Alasdair Grant |
| The Art of Deception: Controlling the Human Element of Security: Kevin D. Mitnick, William L. Simon |
| The Myth of Cyberterrorism: Joshua Green |
| Honeypots: Tracking Hackers: Lance Spitzner |
| Matrix of recently prosecuted computer intrusion cases: U.S. Department of Justice |
| Network Intrusion Detection: An Analyst's Handbook (2nd Edition): Stephen Northcutt |
| America Still Unprepared - America Still in Danger: Council on Foreign Relations |
| Managing Information Security Risks: The OCTAVE Approach: Christopher J. Alberts, Audrey J. Dorofee |
| IntelligenceCareers.com: Defense & intelligence employment opportunities |
| Inferring Internet Denial-of-Service Activity: David Moore, Geoffrey Voelker, & Stefan Savage |
| Protecting America's Freedom in the Information Age: The Markle Foundation |
| Command and Control Research Program: Office of the Assistant Secretary of Defense |
| Information-Age Psychological Operations [.pdf]: Commander Randall G. Bowdish, USN |
| Global Engagement: Building Castles On Sand?: Col. Carla D. Bass, USAF |
| C3I.org Domain For Sale: C4I.org Staff |
| Neohapsis Ports List: Most comprehensive listing of default TCP/UDP ports online |
| Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: James Bamford |
| Countering al Qaeda: Brian Jenkins |
| The Book of Five Rings: Miyamoto Musashi, William Scott Wilson (Translator) |
| Strange Attractors and TCP/IP Sequence Number Analysis : Michal Zalewski |
| Information Operations: U.S. Air Force Doctrine Document 2-5 |
| Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking: Sandor Vegh |
| Electronic Warfare for the Digitized Battlefield: Michael Frater, Michael Ryan |
| The International Crisis Group : Private, Multinational Organization to Prevent & Resolve Deadly Conflict. |
| Security Engineering: A Guide to Building Dependable Distributed Systems: Ross J. Anderson |
| Critical Infrastructure Protection - Commercial Satellite Security Should be More Fully Addressed [.pdf]: General Accounting Office |
| Espionage Against the United States by American Citizens [.pdf] : Katherine L. Herbig, Martin F. Wiskoff |
| Military Operations Research Society: Professional Association of Military and Civilian Defense Analysts, Planners, & Operators |
| Oklahoma City National Memorial Institute for the Prevention of Terrorism: Dedicated to preventing and reducing terrorism |
Added 8.15.2002 | Military Response to 4GW in Afghanistan: Greg Wilcox and Gary I. Wilson |
| Missed Messages: Seymour Hersh |
| The Art of War: Sun Tzu, Samuel B. Griffith (Translator) |
| How to Fight the Terror Networks: Francis Pisani |
| David H. Hackworth: Unique & Interesting Viewpoints on the U.S. Military |
| Espionage in Information Warfare: Commander Christopher D. Noble USN |
| Global Angst: Robert Adams |
| The End of Secrecy?: Lt. Col. Beth M. Kasper, USAF |
| Inside Al Qaeda: Global Network of Terror: Rohan Gunaratna |
| Envisioning Information: Edward R. Tufte |
| Homeland Insecurity: Charles Mann |
| Critical Infrastructure Protection - July 2002: General Accounting Office |
| The CIA in Somalia, 1993: Vernon Loeb |
| On War: Karl Von Clausewitz |
| Joint Unmanned Combat Air Systems (UCAV): DARPA |
| MicroPilot: Low Cost Autopilot Hardware & UAV's |
| Introduction to UAV Systems: Paul G. Fahlstrom, Thomas J. Gleason |
| LostPassword: The Web Source of Password Recovery Software |
| Trinux: Linux Security Toolkit |
| Realizing the Potential of C4I: Fundamental Challenges: National Research Council |
| Incident Analysis of Compromised OpenBSD 3.0 Honeypot: Michael Anuzis |
| Management Responsibility in Protecting Information Assets: An Australian Perspective: Adrian McCullagh |
| The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy: Richard Forno, Ronald Baklarz |
Added 4.30.2002 | Stay Safe Online: National Cyber Security Alliance |
| BECCA: William M. Johnson, Ph.D |
| CSI/FBI Computer Crime and Security Survey: Computer Security Institute |
| VulnWatch: Steve Manzuik |
| The New Mobile Infantry: Michael Behar |
| The Man Who Tried to Save the World : The Dangerous Life and Mysterious Disappearance of Fred Cuny: Scott Anderson |
| Electronic Crimes Task Force: United States Secret Service |
| The Open Channel Foundation: Open Source Software from Academic & Research Institutions |
| Textfiles.com: Jason Scott |
| High Speed Vessel (HSV) : Navy Warfare Development Command |
| The CIA Insider's Dictionary of U.S. and Foreign Intelligence, Counterintelligence & Tradecraft: Leo D. Carl |
| Red Thrust Star: U.S. forces Command OPFOR Training Program |
| Uncloaking Terrorist Networks: Valdis E. Krebs |
| Trusted Recovery and Defensive Information Warfare: Peng Liu & Sushil Jajodia |
| Intelligence Analysis for Internet Security: Ideas, Barriers and Possibilities: Timothy Shimeall, Phil Williams, & Casey Dunleavy |
| KGB Lexicon: The Soviet Intelligence Officer's Handbook: Vasiliy Mitrokhin |
| In Athena's Camp: Preparing for Conflict in the Information Age: John Arquilla |
| G2mil - Warfare Research Portal: Carlton Meyer |
| AlertNet: Reuters Foundation |
| Snort: Open Source Network Intrusion Detection System |
| An Analysis of Al-Qaida Tradecraft: Decision Support Systems, Inc. |
| Asymmetric Warfare and the Threat to the American Homeland: Joseph C. Cyrulik |
Added 2.15.2002 | Councils of War: James Fallows |
| w00w00 Security Development: Largest Private, Non-Profit Computer Security Group |
| Shadow Warriors: Inside the Special Forces: Tom Clancy & General Carl Stiner (Ret.) |
| SecureMac: Apple Macintosh Security Site |
| Terrorist Group Profiles - Index of Groups: Naval Postgraduate School |
| Minimanual of the Urban Guerrilla: Carlos Marighella |
| The Falling Leaf: The Journal of the Psywar Society |
| Dual Use Aspects of Commercial High-Resolution Imaging Satellites: Gerald Steinberg |
| Georgi Guninski Security Research: Georgi Guninski |
| Travel Warnings & Consular Information Sheets : U.S. Department of State |
| Fourth Generation Warfare: Defense & the National Interest |
Added 1.1.2002 | Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster! [.doc]: W. Scott Gureck |
| The Art of Naming Operations: Gregory C. Sieminski |
| The Creation and Dissemination of All Forms of Information in Support of Psychological Operations (PSYOP) in Time of Military Conflict [.pdf]: Department of Defense |
| Networks and Netwars: The Future of Terror, Crime, and Militancy: John Arquilla & David F. Ronfeldt |
| Working with the CIA: Garrett Jones |
| Nomad Mobile Research Centre: Simple Nomad |
| Cryptology in the 16th and 17th Centuries: Thomas Leary |
| Navajo Code Talkers' Dictionary: Department of the Navy |
| NIST National Vulnerability Database: National Institute of Standards & Technology |
| Information Warfare Principles and Operations: Edward Waltz |
| Joint Force Quarterly: National Defense University |
| The Nessus Project: Renaud Deraison |
| Information Warfare Tutorial: Robert F. Minehart, Jr. |
| Space & Electronic Warfare Lexicon: Joe Cyr |
| Warfare in the Third World: Robert E. Harkavy, Stephanie G. Neuman |
| An Unorthodox Soldier: Tim Spicer |
| Mines Advisory Group: Private Landmine Clearance Organization |
| Directed Energy Professional Society: Research and Development of Directed Energy |
| United States Response to CBW Terrorism and Domestic Preparedness: Center for Nonproliferation Studies |
| Urban Warfare: Options, Problems & the Future: Daryl G. Press |
| Hunter, the Hammer, and Heaven: Journeys to Three Worlds Gone Mad: Robert Young Pelton |
| Robotics at SPAWAR: Space and Naval Warfare Systems Center, San Diego |
| Ethereal: Free network protocol analyzer for Unix and Windows |
| WarDriving.com: Driving around looking for unsecured wireless networks |
| World Trade Center Damage Map: The City of New York, Urban Data Solutions & CNN |
| List of Business Offices, Tenants, and Companies in the World Trade Center: Gary Stock |
| C4i: The Essential Guide to the Technological Warfare Revolution: SMI Publishing Ltd |
| National Law Enforcement and Corrections Technology Center: National Institute of Justice |
Added 10.2.2001 | The Packetfactory : Clearinghouse for Free Network Security Software - Mike Schiffman |
| Internet Journal of Rescue and Disaster Medicine : Hope E. Morrow, Bruno Hersche, & Olivier C. Wenker |
| Fundamentals of Electronic Warfare: Sergei A. Vakin |
| Ew 101 : A First Course in Electronic Warfare: David L. Adamy |
| Talisker's List of Intrusion Detection Systems: Talisker |
| The International Policy Institute for Counter-Terrorism: Boaz Ganor |
| FM 90-10 Military Operations on Urbanized Terrain (MOUT): United States Army |
| Metal Storm: Revolutionary Electronic Ballistics Technology |
| Seismic Observations of the World Trade Center Disaster: Lamont-Doherty Earth Observatory of Columbia University |
| Information Technology & Operations Center: United States Military Academy |
| ANSER Institute for Homeland Security: Analytic Services, Inc. |
| Defense Security Service: Department of Defense |
| The Center for Strategic & International Studies: Strategic Insights on Current & Emerging Global Issues |
| GlobalContinuity.com: Portal for Business Risk and Continuity Planning |
Added 8.27.2001 | The Jamestown Foundation: Post Cold-War Think Tank |
| Airborne Laser Platform : USAF, TRW, Boeing |
| Defensive Information Warfare: David S. Alberts |
| Security-Enhanced Linux: National Security Agency |
| Information Security: An Integrated Collection of Essays: Edited by Marshall D. Abrams, Sushil Jajodia & Harold J. Podell |
| Computer Viruses in Electronic Warfare: Dr. Myron L. Cramer and Stephen R. Pratt |
| Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment: Alok Chaturvedi, Mukul Gupta, Shailendra Mehta & Lorenzo Valeri |
| The meaning of Eligible Receiver: The Crypt Newsletter |
| U.S.S. Liberty Homepage: Jim Ennes & Joe Meadors |
Added 6.27.2001 | The Multipurpose Security and Surveillance Mission Platform (MSSMP): D.W. Murphy, J.P. Bott, W.D. Bryan, J.L. Coleman, D.W. Gage, H.G. Nguyen & M.P. Cheatham |
| Information Operations [.pdf]: United States Marine Corps Warfighting Publication |
| Equipped To Survive: Douglas Ritter |
| ProMED-mail : The Global Electronic Reporting System for Outbreaks of Emerging Infectious Diseases & Toxins |
| Journal of Military and Strategic Studies : Centre for Military and Strategic Studies |
| Center for the Study of Chinese Military Affairs: National Defense University |
| Cyber Threat Trends and US Network Security : Lawrence K. Gershwin |
| DominoSecurity.org: Chuck Connell |
| Jane's C4I Systems 2001-2002: Edited by Clive Walker |
| The Cult of the Dead Cow: cDc Communications |
Added 5.1.2001 | Swarming and the Future of Conflict [.pdf]: John Arquilla & David F. Ronfeldt |
| Cornerstones of Information Warfare: United States Air Force |
| William L. Howard Technical Intelligence Museum : LTC William L. Howard (Ret.) |
| Blind Man's Bluff: The Untold Story of American Submarine Espionage: Sherry Sontag |
| The Spy Who Lost Me: Michelle Delio - Wired News |
| Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence: Maj. Robert D. Critchlow |
| The Ethics of Computer Network Attack: William J. Bayles |
Added 4.6.2001 | Information Warfare: Hype or Reality [.pdf]: E. Anders Eriksson |
| Asymmetric Threats and the next QDR : Kenneth McKenzie, Jr. |
| Anticipating the Nature of the Next Conflict: G.I. Wilson, F. Bunkers, & J.P. Sullivan |
| MobileMesh - Mobile Adhoc Networking: The MITRE Corporation |
Added 3.23.2001 | Microsoft, VeriSign Warn of Security Hole: Cameron Crouch, PCWorld.com |
Added 3.10.2001 | Horizontal or Vertical Take Off or Landing Unmanned Aerial Vehicle: Airborne Autonomous Systems |
Added 2.11.2001 | Remote Sensing Tutorial : NASA GSFC - GST - USAF Academy & FAS |
| Sources and Techniques of Obtaining National Defense Science and Technology Intelligence: Huo Zhongwen and Wang Zongxiao |
Added 1.29.2001 | Microsoft Admits Hack Attacks: Cameron Crouch, PCWorld.com |
Added 12.17.2000 | U.S. Is Relaxing Rules on Sale of Satellite Photos: Vernon Loeb - Washington Post |
Added 12.12.2000 | Job and volunteer openings in the global humanitarian community : ReliefWeb |
Added 11.28.2000 | Pentagon IG Report on Allegations of Breaches of Security by Dr. John M. Deutch: Federation of American Scientists |
Updated 3.20.2000 | Homepage of RADM Grace Murray Hopper USN (Ret.): Space and Naval Warfare Systems Center Charleston, Norfolk Office. |
Added 11.16.2000 | Checklist for the Future of Intelligence: Dr. John Hollister Hedley |
| Institute for Crisis, Disaster and Risk Management: George Washington University |
| Naval Intelligence Professionals: Furthering knowledge of the art of maritime intelligence. |
Added 11.14.2000 | Research Institute for European and American Studies: Non-profit institute for the analysis of security, intelligence, and policy issues. |
| Special Operations.Com: Information about U.S. and International Special Operations teams |
Added 11.6.2000 | Russian merchant ships used in spying: Bill Gertz - The Washington Times |
Added 10.30.2000 | Pings and E-Arrows Fly in Mideast Cyber-War: The Washington Post |
| Information Security in a Third Wave Society: William P. Crowell, Deputy Director, NSA |
Added 10.20.2000 | NSA Korean War Historical Papers: National Security Agency |
Added 10.16.2000 | SearchMil: Privately run search engine of U.S. Military sites. |
Updated 11.25.2002 | Photos of Sierra Leone: Doug Brooks |
Added 9.23.2000 | GlobeXplorer: Instantaneous supplier of Earth imagery |
Added 9.8.2000 | Managing the Information Security Program: U.S. Air Force |
Added 9.5.2000 | Privatizing Military Training: Deborah D. Avant |
Added 8.6.2000 | A Look at Spy Satellites and Hollywood: The Washington Post |
| Man Poses as Astronaut, Steals NASA Secrets : Reuters News Service |
| Soldiers of Fortune Ltd.: A Profile of Today's Private Sector Corporate Mercenary Firms: David Isenberg - CDI |
| Critics Blast MS Security: Declan McCullagh - Wired News |
Added 7.10.2000 | Possible Soviet Responses to the US Strategic Defense Initiative: Declassified Interagency Intelligence Assessment |
Added 6.25.2000 | WHY SPY? The Uses and Misuses of Intelligence: Stanley Kober - CATO Institute |
| The Complete, Unofficial TEMPEST Information Page: Joel McNamara |
| FIRST: Forum of Incident Response and Security Teams |
Added 6.21.2000 | The Common Vulnerabilities & Exposures (CVE) Project: The MITRE Corporation |
Added 6.14.2000 | May 2000 GAO Report on FAA Computer Security [.pdf]: General Accounting Office |
Added 6.9.2000 | Countering the Changing Threat Of International Terrorism: National Commission on Terrorism |
| The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments [.pdf]: Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, |
| Considerations for Allocating Resources for Information Security [.pdf]: Marshall D. Abrams, Carolyn M. Johnson, Jay J. Kahn, and Susan G. King - MITRE Corporation |
| NASA NPG 2810.1 - Security of Information Technology: NASA Chief Information Officer |
| National Plan for Information Systems Protection - Executive Summary: The White House |
| Rainbow Series Library: National Computer Security Center |
| NOT the Orange Book: Paul H. Merrill |
Added 4.22.2000 | Missing PC Held Trove of Secrets: The Washington Post |
Updated 1.1.2002 | It's Not What You Know, It's Who You Know: Work in the Information Age: First Monday |
Added 3.13.2000 | Toys for the U.S. Military?: Pros and Cons of laptops and Palm Pilots for the military. |
Added 2.18.2000 | Improper Handling of Classified Information by John M. Deutch: Central Intelligence Agency |
| Activism, Hacktivism, and Cyberterrorism: Dorothy E. Denning |
| Hostile Intelligence Threat [.pdf]: Department of Defense |
Added 5.15.2000 | NASA's Information Security Vulnerability: United States General Accounting Office |
| Strategic Information Warfare Rising: RAND Corporation |
| FM 34-8-2 Intelligence Officer's Handbook: United States Army |
| FM 34-60 Counterintelligence: United States Army |
| Humanitarian Assistance and Disaster Relief Assessments [.pdf]: United States Marine Corps Warfighting Laboratory |
| Jane's C4I Systems 1999-2000: Edited by Clive Walker |
Added 11.19.2000 | Zen and the Art of Hacking: Richard Thieme - Internet Underground |
Updated 11.15.2002 | Cutting Out The Hackers: Ted C. Fishman - Playboy.com |
Updated 10.2.2001 | The Economic Espionage Act of 1996: Department of Justice |
Updated 03.20.2007 | C4I.org Wish List: Stuff the C4I.org Staff are always looking for. |
Tidak ada komentar:
Posting Komentar