| Current Terrorism Threat Level: U.S. Department of Homeland Security |
| | Daily updated list of U.S. & Coalition Casualties in Iraq : CNN |
| | List of Iraq Coalition Contractor Casualties: Lunaville & iCasualties |
| | The Special Operations Warrior Foundation : The Warrior Foundation |
| | [ISN]: InfoSec News Mailing List : William Knowles (Moderator) |
| | RAND Voices of Jihad Database: RAND Corporation |
| | Packet Storm : Full Disclosure Computer Security Site |
| | The Small Wars Manual (1940 edition): U.S. Marine Corps |
| | Directory of Open Access Journals: Lund University Libraries |
| | Shadow Company: Nick Bicanic |
| | The Center for Contemporary Conflict: Naval Postgraduate School |
| | Jane's C4I Systems 2006 - 2007 : Giles Ebbutt |
| | Russian-Chechen Information Warfare 1994-2006: Major Dan Fayutkin - IDF |
| | Unrestricted Warfare Symposium 2007: The Johns Hopkins University |
| | Terrorist Capabilities for Cyberattack: John Rollins and Clay Wilson |
| | The Wider War: By Michael A. Ledeen - American Enterprise Institute |
| | The Militant Ideology Atlas: Dr. William McCants, Dr. Jarret Brachman, USMA |
| | Reflections from a Red Team Leader: Susan Craig |
| | Bastille Hardening System: Jon Lasser & Jay Beale |
| | Black Alchemy Fake AP: 53,000 False Generated Wireless Access Points |
| | Treachery Unlimited: Jay Dyson |
| | Blackwater's 'Little Birds' of Baghdad pack quite a sting: Joanne Kimberlin |
| | UCS Satellite Database: Union of Concerned Scientists |
| | Open Source Disaster Recovery: Calvert Jones and Sarai Mitnick |
| | Intellnet : Open Source Intelligence - Brooks Isoldi |
| | Heavens-Above (Satellite Predictions): Chris Peat |
| | 2007 CIA World Factbook : Central Intelligence Agency |
| | The Bunker : Ultra-Secure Data Colocation |
| | Joint Doctrine for Military Deception (Updated) [.pdf]: Joint Chiefs of Staff |
| | Send Care Packages to U.S. Military : AnySoldier.com |
| | Free Business Publications for Qualified Professionals: TradePub.com |
| | Licensed to Kill: Hired Guns in the War on Terror: Robert Young Pelton |
| | OSVDB: Independent, Unbiased Resource of Security Information |
| | Clandestine and Guerrilla Radio Stations : Daily Intelligence on Subversive TV & Radio |
| | Chinese Unrestricted Warfare [.pdf]: PLA Senior Colonels Qia Liang & Wang Xiangsui |
| | Link to C4I.org - Buttons & Propaganda: C4I.org Staff |
| Added 2.10.2006 | Information Operations Roadmap : Department of Defense |
| | Jane's C4I Systems 2005 - 2006 : Giles Ebbutt |
| | New Attrition Mailing Lists : Attrition.org Staff |
| | Chinese Military Power : The Project on Defense Alternatives |
| | Stealing the Network : FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale |
| | Teaching Intelligence: Getting Started : John Macartney |
| | Ambient Findability : Peter Morville |
| | Build Security In : DHS National Cyber Security Division |
| Basic Security Awareness [.pdf]: Geraint Jones |
| | Tor : Electronic Frontier Foundation, ONR & DARPA |
| | CISSP Exam & Study Information : William Knowles |
| | 10 GPS Vulnerabilities : LTC. Thomas K. Adams (Ret.) |
| | Hacking for a cause : Brian Still |
| | Rewards for Justice: Department of State, Diplomatic Security Service |
| | CERIAS Incident Response Database : Purdue University |
| | PandemicFlu.gov : U.S. Department of Health & Human Services |
| | Warnings of a Flu Pandemic : Nature Magazine |
| | Iraq: Learning the Lessons of Vietnam : Melvin R. Laird |
| | Redacting with Confidence : SNAC-IAD - National Security Agency |
| | China's Psychological Warfare : Laura K. Murray |
| | The World's Most Dangerous Places: 5th Edition : Robert Young Pelton |
| | Emergency Email Network : Free E-mail Notification Service |
| | Electronic Encyclopaedia of Civil Defense & Emergency Management : Walter Green |
| | Chronology of Data Breaches Reported Since the ChoicePoint Incident : Privacy Rights Clearinghouse |
| | Chiefs of State & Cabinet Members of Foreign Governments : Central Intelligence Agency |
| Added 7.4.2005 | The Dynamic Terrorist Threat : R. Kim Cragin, Sara A. Daly, RAND Corporation |
| | Encyclopedia of Intelligence and Counterintelligence : Edited by Rodney Carlisle |
| | An Incomplete Manifesto for Growth : Bruce Mau |
| | International Journal of Digital Evidence : Economic Crime Institute |
| | SecurityDocs : Directory of Network Security White Papers |
| | 2005 Terrorism Risk Map : Aon United |
| | Buzztracker : Visual Representations of News on the Internet |
| | Jihad Unspun : Interesting propaganda from another viewpoint. |
| | ProcessLibrary.com : Detailed information about every common process. |
| | Arms Control Wonk : Jeffrey Lewis, Paul Kerr |
| | C4I Forcast : Forcast International |
| | Open CRS Network : CRS Reports for the People |
| | Marine Corps Gazette : The Professional Journal of the U.S. Marines |
| | Air University Library Map Room : U.S. Air Force |
| | Electronic Warfare for the Digitized Battlefield : by Michael Frater, Michael Ryan |
| | Sun Tzu - The Art of War Strategy Site : Intelligent Approach to Competition |
| | Roadside Bombs and Armored Vehicles : Thomas Herlihy |
| | MIPT Terrorism Knowledge Base : National Memorial Institute for the Prevention of Terrorism |
| | Building Security: Handbook for Architectural Planning & Design : Barbara A. Nadel |
| | The Media's Portrayal of Hacking, Hackers, and Hacktivism Before & After 9/11 : Sandor Vegh |
| Added 8.15.2004 | Knoppix STD : Linux Security Tools Distribution |
| | Insecure.org: Home of Nmap, by Fyodor |
| | Jane's C4I Systems 2004-2005: Giles Ebbutt (Editor) |
| | Psychology of Intelligence Analysis: Richards J. Heuer, Jr. |
| | Redefining the Enemy: Brian Michael Jenkins |
| | ACIG Journal: Air Combat Information Group |
| | New & Used C4I.org Gear For Sale : C4I.org Staff |
| | Relearning Counterinsurgency Warfare: Robert T. Tomes |
| | Military Battles and Campaigns: The Library of Congress |
| | Visby Class Stealth Corvettes: Swedish Navy |
| | Urban Sunrise: U.S.A.F. Research Laboratory |
| | WiGLE : Wireless Geographic Logging Engine |
| | Computer Crime Research Center: Daily updated news about computer crimes |
| | Defeating Terrorists on the Waterfront: Commander James Pelkofski, U.S.N. |
| | Hardening Your Computing Assets: Carlo Kopp |
| | The U.S. Army in Operation Iraqi Freedom: Center for Army Lessons Learned |
| | International Peace Operations Association (IPOA): Doug Brooks, Coley Hudgins |
| | Operation Iraqi Children: Program bringing school supply kits to Iraqi children |
| | The Joint Warrior Interoperability Demonstration: Department of Defense |
| | Cybersecurity for Critical Infrastructure Protection: Government Accountability Office |
| | Hostile Environment Training 101: Vincent Laforet, The New York Times |
| | Cyber Adversary Characterization: Auditing the Hacker Mind: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost |
| | Info from Iraq - From Someone who is Doing the Run and Gun: Ben Thomas |
| | S2 Online: Resource for S2 professionals |
| | What is C4I? : C4I.org Staff |
| Added 11.15.2003 | Hacker Generations : Richard Thieme |
| | Simple Nomad's DefCon 11 Rant : Simple Nomad |
| | Angola Landmine Database: Norwegian Peoples Aid |
| | Complete al Qaeda Training Manual: The Smoking Gun |
| | Middle East Media Research Institute: Independent Research Group |
| | Iraq Humanitarian and Reconstruction Assistance Updates: USAID |
| | Partnership for Effective Peacekeeping Operations: A policy working group |
| | BlackBerry Reveals Bank's Secrets: Kim Zetter |
| | Real-Time Top Ten Vulnerabilities: Qualys Vulnerability Research Lab |
| | Wireless Internet connectivity for developing nations: Larry Press |
| | Dead Horses in the Sun: Larry A. Bell |
| | SecurityDriver.com: Tony Scotti |
| | Soldiers of good fortune: Barry Yeoman |
| | The Dawn of the E-Bomb: Michael Abrams |
| | The Myth of Homeland Security: Marcus Ranum |
| | Jane's C4I Systems, 2003-2004: Giles Ebbutt (Editor) |
| | Computer Co-location Facility Vulnerabilities: Jonathan Zdziarski |
| | Real 802.11 Security: Wi-Fi Protected Access & 802.11i: Jon Edney & William A. Arbaugh |
| | Annual Report on the Military Power of The Peoples's Republic of China [.pdf]: U.S. Department of Defense |
| | Analysis of an Electronic Voting System: Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, & Dan S. Wallach |
| Added 7.1.2003 | Iraq's Crash Course in Cyberwar: Brian McWilliams |
| | Help Support C4I.org, Please Make a Donation: C4I.org Staff |
| | Operation Iraqi Freedom - By The Numbers: Lt Gen. T. Michael Moseley, USAF |
| | North Korean Tactics: Maj. James M. Minnich |
| | No Outward Sign: Bill Neugent |
| | Jane's C4I Systems, 2002-2003: Giles Ebbutt (Editor) |
| | Dachb0den Labs: Southern California Security Group |
| | Corporate Warriors: P. W. Singer |
| | Intrusion Detection with Snort: Jack Koziol |
| | In the Company of Heroes: Michael J. Durant |
| | Nothing Learned from Black Hawk Down: Mike Sparks |
| | Failing to Keep Up With the Information Revolution: Bruce Berkowitz |
| | The Center for Open Source in Government: Tony Stanco |
| | Planning for Survivable Networks: Annlee A. Hines |
| | Joint Doctrine for Information Operations [.pdf]: Joint Chiefs of Staff |
| | Stealing the Network: How to Own the Box: Ryan Russell, Ido Dubrawsky, FX |
| | South Asia Analysis Group: Dr. S. Chandrasekharan |
| | Space Imaging: One Meter Commerical Satellite Imagery |
| | Secrets of Computer Espionage: Joel McNamara |
| | The Mind of War: Grant Tedrick Hammond |
| | Chinese Defence Today: Unofficial website of the Chinese defence affair |
| | Network-centric warfare: Not there yet : Dan Caterinicchia with Matthew French |
| | If We Run Out of Batteries, This War is Screwed. : Joshua Davis |
| | The Influence Component of Counterterrorism : Paul K. Davis & Brian Michael Jenkins |
| | Association of Old Crows : The Electronic Warfare & Information Operations Association |
| | International Charter Incorporated of Oregon: Worldwide aviation, security, and logistics services |
| Added 2.15.2002 | The Marine Corps Professional Reading Program List: United States Marine Corps |
| | Black Hawk Down - A Story of Modern War: Mark Bowden |
| | Information Assurance Technology Analysis Center: Department of Defense |
| | Has Anyone Seen This Spy Plane?: Tom Mahood |
| | Civilians, Spies, and Blue Suits: Jeffrey T. Richelson |
| | Breakdown - How America's Intelligence Failures Led to 9/11: Bill Gertz |
| | The Center for Internet Security: Not-For-Profit Security Organization |
| | Terrorism Time Line: Claire B. Rubin & Associates |
| | Internet Storm Center: The SANS Institute |
| | Tracking Hackers: Resources & Links on Honeypots |
| | DigitalGlobe: High-Res Commerical Satellite Imagery |
| | FM 3-100.21 Contractors on the Battlefield : United States Army |
| | Boyd - The Fighter Pilot Who Changed the Art of War: Robert Coram |
| | Understanding Revolutionary Warfare: Major Dennis I. Merritt, USMC |
| | Securing 802.11 with OpenBSD: Jarkko Turkulainen |
| | SDSC Secure Syslog: San Diego Supercomputer Center |
| | MacStumbler: OSX Wireless Scanning Tool |
| | The Liberty Incident: A. Jay Cristol |
| | Pattern Recognition: William Gibson |
| | Maximum Wireless Security: Cyrus Peikari, Seth Fogie |
| | Information Operations - The IFOR Experience : Larry K. Wentz |
| | The Ten Commandments of Counterintelligence: James M. Olson |
| | Strong Cryptography Links on the Internet: William Knowles |
| | UCIA.org Domain For Sale : C4I.org Staff |
| | The National Strategy to Secure Cyberspace [.pdf]: Department of Homeland Security |
| | The Spread of the Sapphire/Slammer Worm: David Moore, Vern Paxson Stefan Savage, Colleen Shannon, Stuart Staniford, & Nicholas Weaver |
| Added 11.15.2002 | Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet: Maura Conway |
| | The Memorability and Security of Passwords: Jianxin Yan, Alan Blackwell, Ross Anderson, & Alasdair Grant |
| | The Art of Deception: Controlling the Human Element of Security: Kevin D. Mitnick, William L. Simon |
| | The Myth of Cyberterrorism: Joshua Green |
| | Honeypots: Tracking Hackers: Lance Spitzner |
| | Matrix of recently prosecuted computer intrusion cases: U.S. Department of Justice |
| | Network Intrusion Detection: An Analyst's Handbook (2nd Edition): Stephen Northcutt |
| | America Still Unprepared - America Still in Danger: Council on Foreign Relations |
| | Managing Information Security Risks: The OCTAVE Approach: Christopher J. Alberts, Audrey J. Dorofee |
| | IntelligenceCareers.com: Defense & intelligence employment opportunities |
| | Inferring Internet Denial-of-Service Activity: David Moore, Geoffrey Voelker, & Stefan Savage |
| | Protecting America's Freedom in the Information Age: The Markle Foundation |
| | Command and Control Research Program: Office of the Assistant Secretary of Defense |
| | Information-Age Psychological Operations [.pdf]: Commander Randall G. Bowdish, USN |
| | Global Engagement: Building Castles On Sand?: Col. Carla D. Bass, USAF |
| | C3I.org Domain For Sale: C4I.org Staff |
| | Neohapsis Ports List: Most comprehensive listing of default TCP/UDP ports online |
| | Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: James Bamford |
| | Countering al Qaeda: Brian Jenkins |
| | The Book of Five Rings: Miyamoto Musashi, William Scott Wilson (Translator) |
| | Strange Attractors and TCP/IP Sequence Number Analysis : Michal Zalewski |
| | Information Operations: U.S. Air Force Doctrine Document 2-5 |
| | Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking: Sandor Vegh |
| | Electronic Warfare for the Digitized Battlefield: Michael Frater, Michael Ryan |
| | The International Crisis Group : Private, Multinational Organization to Prevent & Resolve Deadly Conflict. |
| | Security Engineering: A Guide to Building Dependable Distributed Systems: Ross J. Anderson |
| | Critical Infrastructure Protection - Commercial Satellite Security Should be More Fully Addressed [.pdf]: General Accounting Office |
| | Espionage Against the United States by American Citizens [.pdf] : Katherine L. Herbig, Martin F. Wiskoff |
| | Military Operations Research Society: Professional Association of Military and Civilian Defense Analysts, Planners, & Operators |
| | Oklahoma City National Memorial Institute for the Prevention of Terrorism: Dedicated to preventing and reducing terrorism |
| Added 8.15.2002 | Military Response to 4GW in Afghanistan: Greg Wilcox and Gary I. Wilson |
| | Missed Messages: Seymour Hersh |
| | The Art of War: Sun Tzu, Samuel B. Griffith (Translator) |
| | How to Fight the Terror Networks: Francis Pisani |
| | David H. Hackworth: Unique & Interesting Viewpoints on the U.S. Military |
| | Espionage in Information Warfare: Commander Christopher D. Noble USN |
| | Global Angst: Robert Adams |
| | The End of Secrecy?: Lt. Col. Beth M. Kasper, USAF |
| | Inside Al Qaeda: Global Network of Terror: Rohan Gunaratna |
| | Envisioning Information: Edward R. Tufte |
| | Homeland Insecurity: Charles Mann |
| | Critical Infrastructure Protection - July 2002: General Accounting Office |
| | The CIA in Somalia, 1993: Vernon Loeb |
| | On War: Karl Von Clausewitz |
| | Joint Unmanned Combat Air Systems (UCAV): DARPA |
| | MicroPilot: Low Cost Autopilot Hardware & UAV's |
| | Introduction to UAV Systems: Paul G. Fahlstrom, Thomas J. Gleason |
| | LostPassword: The Web Source of Password Recovery Software |
| | Trinux: Linux Security Toolkit |
| | Realizing the Potential of C4I: Fundamental Challenges: National Research Council |
| | Incident Analysis of Compromised OpenBSD 3.0 Honeypot: Michael Anuzis |
| | Management Responsibility in Protecting Information Assets: An Australian Perspective: Adrian McCullagh |
| | The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy: Richard Forno, Ronald Baklarz |
| Added 4.30.2002 | Stay Safe Online: National Cyber Security Alliance |
| | BECCA: William M. Johnson, Ph.D |
| | CSI/FBI Computer Crime and Security Survey: Computer Security Institute |
| | VulnWatch: Steve Manzuik |
| | The New Mobile Infantry: Michael Behar |
| | The Man Who Tried to Save the World : The Dangerous Life and Mysterious Disappearance of Fred Cuny: Scott Anderson |
| | Electronic Crimes Task Force: United States Secret Service |
| | The Open Channel Foundation: Open Source Software from Academic & Research Institutions |
| | Textfiles.com: Jason Scott |
| | High Speed Vessel (HSV) : Navy Warfare Development Command |
| | The CIA Insider's Dictionary of U.S. and Foreign Intelligence, Counterintelligence & Tradecraft: Leo D. Carl |
| | Red Thrust Star: U.S. forces Command OPFOR Training Program |
| | Uncloaking Terrorist Networks: Valdis E. Krebs |
| | Trusted Recovery and Defensive Information Warfare: Peng Liu & Sushil Jajodia |
| | Intelligence Analysis for Internet Security: Ideas, Barriers and Possibilities: Timothy Shimeall, Phil Williams, & Casey Dunleavy |
| | KGB Lexicon: The Soviet Intelligence Officer's Handbook: Vasiliy Mitrokhin |
| | In Athena's Camp: Preparing for Conflict in the Information Age: John Arquilla |
| | G2mil - Warfare Research Portal: Carlton Meyer |
| | AlertNet: Reuters Foundation |
| | Snort: Open Source Network Intrusion Detection System |
| | An Analysis of Al-Qaida Tradecraft: Decision Support Systems, Inc. |
| | Asymmetric Warfare and the Threat to the American Homeland: Joseph C. Cyrulik |
| Added 2.15.2002 | Councils of War: James Fallows |
| | w00w00 Security Development: Largest Private, Non-Profit Computer Security Group |
| | Shadow Warriors: Inside the Special Forces: Tom Clancy & General Carl Stiner (Ret.) |
| | SecureMac: Apple Macintosh Security Site |
| | Terrorist Group Profiles - Index of Groups: Naval Postgraduate School |
| | Minimanual of the Urban Guerrilla: Carlos Marighella |
| | The Falling Leaf: The Journal of the Psywar Society |
| | Dual Use Aspects of Commercial High-Resolution Imaging Satellites: Gerald Steinberg |
| | Georgi Guninski Security Research: Georgi Guninski |
| | Travel Warnings & Consular Information Sheets : U.S. Department of State |
| | Fourth Generation Warfare: Defense & the National Interest |
| Added 1.1.2002 | Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster! [.doc]: W. Scott Gureck |
| | The Art of Naming Operations: Gregory C. Sieminski |
| | The Creation and Dissemination of All Forms of Information in Support of Psychological Operations (PSYOP) in Time of Military Conflict [.pdf]: Department of Defense |
| | Networks and Netwars: The Future of Terror, Crime, and Militancy: John Arquilla & David F. Ronfeldt |
| | Working with the CIA: Garrett Jones |
| | Nomad Mobile Research Centre: Simple Nomad |
| | Cryptology in the 16th and 17th Centuries: Thomas Leary |
| | Navajo Code Talkers' Dictionary: Department of the Navy |
| | NIST National Vulnerability Database: National Institute of Standards & Technology |
| | Information Warfare Principles and Operations: Edward Waltz |
| | Joint Force Quarterly: National Defense University |
| | The Nessus Project: Renaud Deraison |
| | Information Warfare Tutorial: Robert F. Minehart, Jr. |
| | Space & Electronic Warfare Lexicon: Joe Cyr |
| | Warfare in the Third World: Robert E. Harkavy, Stephanie G. Neuman |
| | An Unorthodox Soldier: Tim Spicer |
| | Mines Advisory Group: Private Landmine Clearance Organization |
| | Directed Energy Professional Society: Research and Development of Directed Energy |
| | United States Response to CBW Terrorism and Domestic Preparedness: Center for Nonproliferation Studies |
| | Urban Warfare: Options, Problems & the Future: Daryl G. Press |
| | Hunter, the Hammer, and Heaven: Journeys to Three Worlds Gone Mad: Robert Young Pelton |
| | Robotics at SPAWAR: Space and Naval Warfare Systems Center, San Diego |
| | Ethereal: Free network protocol analyzer for Unix and Windows |
| | WarDriving.com: Driving around looking for unsecured wireless networks |
| | World Trade Center Damage Map: The City of New York, Urban Data Solutions & CNN |
| | List of Business Offices, Tenants, and Companies in the World Trade Center: Gary Stock |
| | C4i: The Essential Guide to the Technological Warfare Revolution: SMI Publishing Ltd |
| | National Law Enforcement and Corrections Technology Center: National Institute of Justice |
| Added 10.2.2001 | The Packetfactory : Clearinghouse for Free Network Security Software - Mike Schiffman |
| | Internet Journal of Rescue and Disaster Medicine : Hope E. Morrow, Bruno Hersche, & Olivier C. Wenker |
| | Fundamentals of Electronic Warfare: Sergei A. Vakin |
| | Ew 101 : A First Course in Electronic Warfare: David L. Adamy |
| | Talisker's List of Intrusion Detection Systems: Talisker |
| | The International Policy Institute for Counter-Terrorism: Boaz Ganor |
| | FM 90-10 Military Operations on Urbanized Terrain (MOUT): United States Army |
| | Metal Storm: Revolutionary Electronic Ballistics Technology |
| | Seismic Observations of the World Trade Center Disaster: Lamont-Doherty Earth Observatory of Columbia University |
| | Information Technology & Operations Center: United States Military Academy |
| | ANSER Institute for Homeland Security: Analytic Services, Inc. |
| | Defense Security Service: Department of Defense |
| | The Center for Strategic & International Studies: Strategic Insights on Current & Emerging Global Issues |
| | GlobalContinuity.com: Portal for Business Risk and Continuity Planning |
| Added 8.27.2001 | The Jamestown Foundation: Post Cold-War Think Tank |
| | Airborne Laser Platform : USAF, TRW, Boeing |
| | Defensive Information Warfare: David S. Alberts |
| | Security-Enhanced Linux: National Security Agency |
| | Information Security: An Integrated Collection of Essays: Edited by Marshall D. Abrams, Sushil Jajodia & Harold J. Podell |
| | Computer Viruses in Electronic Warfare: Dr. Myron L. Cramer and Stephen R. Pratt |
| | Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment: Alok Chaturvedi, Mukul Gupta, Shailendra Mehta & Lorenzo Valeri |
| | The meaning of Eligible Receiver: The Crypt Newsletter |
| | U.S.S. Liberty Homepage: Jim Ennes & Joe Meadors |
| Added 6.27.2001 | The Multipurpose Security and Surveillance Mission Platform (MSSMP): D.W. Murphy, J.P. Bott, W.D. Bryan, J.L. Coleman, D.W. Gage, H.G. Nguyen & M.P. Cheatham |
| | Information Operations [.pdf]: United States Marine Corps Warfighting Publication |
| | Equipped To Survive: Douglas Ritter |
| | ProMED-mail : The Global Electronic Reporting System for Outbreaks of Emerging Infectious Diseases & Toxins |
| | Journal of Military and Strategic Studies : Centre for Military and Strategic Studies |
| | Center for the Study of Chinese Military Affairs: National Defense University |
| | Cyber Threat Trends and US Network Security : Lawrence K. Gershwin |
| | DominoSecurity.org: Chuck Connell |
| | Jane's C4I Systems 2001-2002: Edited by Clive Walker |
| | The Cult of the Dead Cow: cDc Communications |
| Added 5.1.2001 | Swarming and the Future of Conflict [.pdf]: John Arquilla & David F. Ronfeldt |
| | Cornerstones of Information Warfare: United States Air Force |
| | William L. Howard Technical Intelligence Museum : LTC William L. Howard (Ret.) |
| | Blind Man's Bluff: The Untold Story of American Submarine Espionage: Sherry Sontag |
| | The Spy Who Lost Me: Michelle Delio - Wired News |
| | Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence: Maj. Robert D. Critchlow |
| | The Ethics of Computer Network Attack: William J. Bayles |
| Added 4.6.2001 | Information Warfare: Hype or Reality [.pdf]: E. Anders Eriksson |
| | Asymmetric Threats and the next QDR : Kenneth McKenzie, Jr. |
| | Anticipating the Nature of the Next Conflict: G.I. Wilson, F. Bunkers, & J.P. Sullivan |
| | MobileMesh - Mobile Adhoc Networking: The MITRE Corporation |
| Added 3.23.2001 | Microsoft, VeriSign Warn of Security Hole: Cameron Crouch, PCWorld.com |
| Added 3.10.2001 | Horizontal or Vertical Take Off or Landing Unmanned Aerial Vehicle: Airborne Autonomous Systems |
| Added 2.11.2001 | Remote Sensing Tutorial : NASA GSFC - GST - USAF Academy & FAS |
| | Sources and Techniques of Obtaining National Defense Science and Technology Intelligence: Huo Zhongwen and Wang Zongxiao |
| Added 1.29.2001 | Microsoft Admits Hack Attacks: Cameron Crouch, PCWorld.com |
| Added 12.17.2000 | U.S. Is Relaxing Rules on Sale of Satellite Photos: Vernon Loeb - Washington Post |
| Added 12.12.2000 | Job and volunteer openings in the global humanitarian community : ReliefWeb |
| Added 11.28.2000 | Pentagon IG Report on Allegations of Breaches of Security by Dr. John M. Deutch: Federation of American Scientists |
| Updated 3.20.2000 | Homepage of RADM Grace Murray Hopper USN (Ret.): Space and Naval Warfare Systems Center Charleston, Norfolk Office. |
| Added 11.16.2000 | Checklist for the Future of Intelligence: Dr. John Hollister Hedley |
| | Institute for Crisis, Disaster and Risk Management: George Washington University |
| | Naval Intelligence Professionals: Furthering knowledge of the art of maritime intelligence. |
| Added 11.14.2000 | Research Institute for European and American Studies: Non-profit institute for the analysis of security, intelligence, and policy issues. |
| | Special Operations.Com: Information about U.S. and International Special Operations teams |
| Added 11.6.2000 | Russian merchant ships used in spying: Bill Gertz - The Washington Times |
| Added 10.30.2000 | Pings and E-Arrows Fly in Mideast Cyber-War: The Washington Post |
| | Information Security in a Third Wave Society: William P. Crowell, Deputy Director, NSA |
| Added 10.20.2000 | NSA Korean War Historical Papers: National Security Agency |
| Added 10.16.2000 | SearchMil: Privately run search engine of U.S. Military sites. |
| Updated 11.25.2002 | Photos of Sierra Leone: Doug Brooks |
| Added 9.23.2000 | GlobeXplorer: Instantaneous supplier of Earth imagery |
| Added 9.8.2000 | Managing the Information Security Program: U.S. Air Force |
| Added 9.5.2000 | Privatizing Military Training: Deborah D. Avant |
| Added 8.6.2000 | A Look at Spy Satellites and Hollywood: The Washington Post |
| | Man Poses as Astronaut, Steals NASA Secrets : Reuters News Service |
| | Soldiers of Fortune Ltd.: A Profile of Today's Private Sector Corporate Mercenary Firms: David Isenberg - CDI |
| | Critics Blast MS Security: Declan McCullagh - Wired News |
| Added 7.10.2000 | Possible Soviet Responses to the US Strategic Defense Initiative: Declassified Interagency Intelligence Assessment |
| Added 6.25.2000 | WHY SPY? The Uses and Misuses of Intelligence: Stanley Kober - CATO Institute |
| | The Complete, Unofficial TEMPEST Information Page: Joel McNamara |
| | FIRST: Forum of Incident Response and Security Teams |
| Added 6.21.2000 | The Common Vulnerabilities & Exposures (CVE) Project: The MITRE Corporation |
| Added 6.14.2000 | May 2000 GAO Report on FAA Computer Security [.pdf]: General Accounting Office |
| Added 6.9.2000 | Countering the Changing Threat Of International Terrorism: National Commission on Terrorism |
| | The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments [.pdf]: Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, |
| | Considerations for Allocating Resources for Information Security [.pdf]: Marshall D. Abrams, Carolyn M. Johnson, Jay J. Kahn, and Susan G. King - MITRE Corporation |
| | NASA NPG 2810.1 - Security of Information Technology: NASA Chief Information Officer |
| | National Plan for Information Systems Protection - Executive Summary: The White House |
| | Rainbow Series Library: National Computer Security Center |
| | NOT the Orange Book: Paul H. Merrill |
| Added 4.22.2000 | Missing PC Held Trove of Secrets: The Washington Post |
| Updated 1.1.2002 | It's Not What You Know, It's Who You Know: Work in the Information Age: First Monday |
| Added 3.13.2000 | Toys for the U.S. Military?: Pros and Cons of laptops and Palm Pilots for the military. |
| Added 2.18.2000 | Improper Handling of Classified Information by John M. Deutch: Central Intelligence Agency |
| | Activism, Hacktivism, and Cyberterrorism: Dorothy E. Denning |
| | Hostile Intelligence Threat [.pdf]: Department of Defense |
| Added 5.15.2000 | NASA's Information Security Vulnerability: United States General Accounting Office |
| | Strategic Information Warfare Rising: RAND Corporation |
| | FM 34-8-2 Intelligence Officer's Handbook: United States Army |
| | FM 34-60 Counterintelligence: United States Army |
| | Humanitarian Assistance and Disaster Relief Assessments [.pdf]: United States Marine Corps Warfighting Laboratory |
| | Jane's C4I Systems 1999-2000: Edited by Clive Walker |
| Added 11.19.2000 | Zen and the Art of Hacking: Richard Thieme - Internet Underground |
| Updated 11.15.2002 | Cutting Out The Hackers: Ted C. Fishman - Playboy.com |
| Updated 10.2.2001 | The Economic Espionage Act of 1996: Department of Justice |
| Updated 03.20.2007 | C4I.org Wish List: Stuff the C4I.org Staff are always looking for. |
Tidak ada komentar:
Posting Komentar