Sabtu, 01 Januari 2011

C4I.org

Current Terrorism Threat Level: U.S. Department of Homeland Security
  Daily updated list of U.S. & Coalition Casualties in Iraq : CNN
  List of Iraq Coalition Contractor Casualties: Lunaville & iCasualties
  The Special Operations Warrior Foundation : The Warrior Foundation
  [ISN]: InfoSec News Mailing List : William Knowles (Moderator)
  RAND Voices of Jihad Database: RAND Corporation
  Packet Storm : Full Disclosure Computer Security Site
  The Small Wars Manual (1940 edition): U.S. Marine Corps
  Directory of Open Access Journals: Lund University Libraries
  Shadow Company: Nick Bicanic
  The Center for Contemporary Conflict: Naval Postgraduate School
  Jane's C4I Systems 2006 - 2007 : Giles Ebbutt
  Russian-Chechen Information Warfare 1994-2006: Major Dan Fayutkin - IDF
  Unrestricted Warfare Symposium 2007: The Johns Hopkins University
  Terrorist Capabilities for Cyberattack: John Rollins and Clay Wilson
  The Wider War: By Michael A. Ledeen - American Enterprise Institute
  The Militant Ideology Atlas: Dr. William McCants, Dr. Jarret Brachman, USMA
  Reflections from a Red Team Leader: Susan Craig
  Bastille Hardening System: Jon Lasser & Jay Beale
  Black Alchemy Fake AP: 53,000 False Generated Wireless Access Points
  Treachery Unlimited: Jay Dyson
  Blackwater's 'Little Birds' of Baghdad pack quite a sting: Joanne Kimberlin
  UCS Satellite Database: Union of Concerned Scientists
  Open Source Disaster Recovery: Calvert Jones and Sarai Mitnick
  Intellnet : Open Source Intelligence - Brooks Isoldi
  Heavens-Above (Satellite Predictions): Chris Peat
  2007 CIA World Factbook : Central Intelligence Agency
  The Bunker : Ultra-Secure Data Colocation
  Joint Doctrine for Military Deception (Updated) [.pdf]: Joint Chiefs of Staff
  Send Care Packages to U.S. Military : AnySoldier.com
  Free Business Publications for Qualified Professionals: TradePub.com
  Licensed to Kill: Hired Guns in the War on Terror: Robert Young Pelton
  OSVDB: Independent, Unbiased Resource of Security Information
  Clandestine and Guerrilla Radio Stations : Daily Intelligence on Subversive TV & Radio
  Chinese Unrestricted Warfare [.pdf]: PLA Senior Colonels Qia Liang & Wang Xiangsui
  Link to C4I.org - Buttons & Propaganda: C4I.org Staff
Added 2.10.2006 Information Operations Roadmap : Department of Defense
  Jane's C4I Systems 2005 - 2006 : Giles Ebbutt
  New Attrition Mailing Lists : Attrition.org Staff
  Chinese Military Power : The Project on Defense Alternatives
  Stealing the Network : FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale
  Teaching Intelligence: Getting Started : John Macartney
  Ambient Findability : Peter Morville
  Build Security In : DHS National Cyber Security Division

Basic Security Awareness [.pdf]: Geraint Jones
  Tor : Electronic Frontier Foundation, ONR & DARPA
  CISSP Exam & Study Information : William Knowles
  10 GPS Vulnerabilities : LTC. Thomas K. Adams (Ret.)
  Hacking for a cause : Brian Still
  Rewards for Justice: Department of State, Diplomatic Security Service
  CERIAS Incident Response Database : Purdue University
  PandemicFlu.gov : U.S. Department of Health & Human Services
  Warnings of a Flu Pandemic : Nature Magazine
  Iraq: Learning the Lessons of Vietnam : Melvin R. Laird
  Redacting with Confidence : SNAC-IAD - National Security Agency
  China's Psychological Warfare : Laura K. Murray
  The World's Most Dangerous Places: 5th Edition : Robert Young Pelton
  Emergency Email Network : Free E-mail Notification Service
  Electronic Encyclopaedia of Civil Defense & Emergency Management : Walter Green
  Chronology of Data Breaches Reported Since the ChoicePoint Incident : Privacy Rights Clearinghouse
  Chiefs of State & Cabinet Members of Foreign Governments : Central Intelligence Agency
Added 7.4.2005 The Dynamic Terrorist Threat : R. Kim Cragin, Sara A. Daly, RAND Corporation
  Encyclopedia of Intelligence and Counterintelligence : Edited by Rodney Carlisle
  An Incomplete Manifesto for Growth : Bruce Mau
  International Journal of Digital Evidence : Economic Crime Institute
  SecurityDocs : Directory of Network Security White Papers
  2005 Terrorism Risk Map : Aon United
  Buzztracker : Visual Representations of News on the Internet
  Jihad Unspun : Interesting propaganda from another viewpoint.
  ProcessLibrary.com : Detailed information about every common process.
  Arms Control Wonk : Jeffrey Lewis, Paul Kerr
  C4I Forcast : Forcast International
  Open CRS Network : CRS Reports for the People
  Marine Corps Gazette : The Professional Journal of the U.S. Marines
  Air University Library Map Room : U.S. Air Force
  Electronic Warfare for the Digitized Battlefield : by Michael Frater, Michael Ryan
  Sun Tzu - The Art of War Strategy Site : Intelligent Approach to Competition
  Roadside Bombs and Armored Vehicles : Thomas Herlihy
  MIPT Terrorism Knowledge Base : National Memorial Institute for the Prevention of Terrorism
  Building Security: Handbook for Architectural Planning & Design : Barbara A. Nadel
  The Media's Portrayal of Hacking, Hackers, and Hacktivism Before & After 9/11 : Sandor Vegh
Added 8.15.2004 Knoppix STD : Linux Security Tools Distribution
  Insecure.org: Home of Nmap, by Fyodor
  Jane's C4I Systems 2004-2005: Giles Ebbutt (Editor)
  Psychology of Intelligence Analysis: Richards J. Heuer, Jr.
  Redefining the Enemy: Brian Michael Jenkins
  ACIG Journal: Air Combat Information Group
  New & Used C4I.org Gear For Sale : C4I.org Staff
  Relearning Counterinsurgency Warfare: Robert T. Tomes
  Military Battles and Campaigns: The Library of Congress
  Visby Class Stealth Corvettes: Swedish Navy
  Urban Sunrise: U.S.A.F. Research Laboratory
  WiGLE : Wireless Geographic Logging Engine
  Computer Crime Research Center: Daily updated news about computer crimes
  Defeating Terrorists on the Waterfront: Commander James Pelkofski, U.S.N.
  Hardening Your Computing Assets: Carlo Kopp
  The U.S. Army in Operation Iraqi Freedom: Center for Army Lessons Learned
  International Peace Operations Association (IPOA): Doug Brooks, Coley Hudgins
  Operation Iraqi Children: Program bringing school supply kits to Iraqi children
  The Joint Warrior Interoperability Demonstration: Department of Defense
  Cybersecurity for Critical Infrastructure Protection: Government Accountability Office
  Hostile Environment Training 101: Vincent Laforet, The New York Times
  Cyber Adversary Characterization: Auditing the Hacker Mind: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost
  Info from Iraq - From Someone who is Doing the Run and Gun: Ben Thomas
  S2 Online: Resource for S2 professionals
  What is C4I? : C4I.org Staff
Added 11.15.2003 Hacker Generations : Richard Thieme
  Simple Nomad's DefCon 11 Rant : Simple Nomad
  Angola Landmine Database: Norwegian Peoples Aid
  Complete al Qaeda Training Manual: The Smoking Gun
  Middle East Media Research Institute: Independent Research Group
  Iraq Humanitarian and Reconstruction Assistance Updates: USAID
  Partnership for Effective Peacekeeping Operations: A policy working group
  BlackBerry Reveals Bank's Secrets: Kim Zetter
  Real-Time Top Ten Vulnerabilities: Qualys Vulnerability Research Lab
  Wireless Internet connectivity for developing nations: Larry Press
  Dead Horses in the Sun: Larry A. Bell
  SecurityDriver.com: Tony Scotti
  Soldiers of good fortune: Barry Yeoman
  The Dawn of the E-Bomb: Michael Abrams
  The Myth of Homeland Security: Marcus Ranum
  Jane's C4I Systems, 2003-2004: Giles Ebbutt (Editor)
  Computer Co-location Facility Vulnerabilities: Jonathan Zdziarski
  Real 802.11 Security: Wi-Fi Protected Access & 802.11i: Jon Edney & William A. Arbaugh
  Annual Report on the Military Power of The Peoples's Republic of China [.pdf]: U.S. Department of Defense
  Analysis of an Electronic Voting System: Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, & Dan S. Wallach
Added 7.1.2003 Iraq's Crash Course in Cyberwar: Brian McWilliams
  Help Support C4I.org, Please Make a Donation: C4I.org Staff
  Operation Iraqi Freedom - By The Numbers: Lt Gen. T. Michael Moseley, USAF
  North Korean Tactics: Maj. James M. Minnich
  No Outward Sign: Bill Neugent
  Jane's C4I Systems, 2002-2003: Giles Ebbutt (Editor)
  Dachb0den Labs: Southern California Security Group
  Corporate Warriors: P. W. Singer
  Intrusion Detection with Snort: Jack Koziol
  In the Company of Heroes: Michael J. Durant
  Nothing Learned from Black Hawk Down: Mike Sparks
  Failing to Keep Up With the Information Revolution: Bruce Berkowitz
  The Center for Open Source in Government: Tony Stanco
  Planning for Survivable Networks: Annlee A. Hines
  Joint Doctrine for Information Operations [.pdf]: Joint Chiefs of Staff
  Stealing the Network: How to Own the Box: Ryan Russell, Ido Dubrawsky, FX
  South Asia Analysis Group: Dr. S. Chandrasekharan
  Space Imaging: One Meter Commerical Satellite Imagery
  Secrets of Computer Espionage: Joel McNamara
  The Mind of War: Grant Tedrick Hammond
  Chinese Defence Today: Unofficial website of the Chinese defence affair
  Network-centric warfare: Not there yet : Dan Caterinicchia with Matthew French
  If We Run Out of Batteries, This War is Screwed. : Joshua Davis
  The Influence Component of Counterterrorism : Paul K. Davis & Brian Michael Jenkins
  Association of Old Crows : The Electronic Warfare & Information Operations Association
  International Charter Incorporated of Oregon: Worldwide aviation, security, and logistics services
Added 2.15.2002 The Marine Corps Professional Reading Program List: United States Marine Corps
  Black Hawk Down - A Story of Modern War: Mark Bowden
  Information Assurance Technology Analysis Center: Department of Defense
  Has Anyone Seen This Spy Plane?: Tom Mahood
  Civilians, Spies, and Blue Suits: Jeffrey T. Richelson
  Breakdown - How America's Intelligence Failures Led to 9/11: Bill Gertz
  The Center for Internet Security: Not-For-Profit Security Organization
  Terrorism Time Line: Claire B. Rubin & Associates
  Internet Storm Center: The SANS Institute
  Tracking Hackers: Resources & Links on Honeypots
  DigitalGlobe: High-Res Commerical Satellite Imagery
  FM 3-100.21 Contractors on the Battlefield : United States Army
  Boyd - The Fighter Pilot Who Changed the Art of War: Robert Coram
  Understanding Revolutionary Warfare: Major Dennis I. Merritt, USMC
  Securing 802.11 with OpenBSD: Jarkko Turkulainen
  SDSC Secure Syslog: San Diego Supercomputer Center
  MacStumbler: OSX Wireless Scanning Tool
  The Liberty Incident: A. Jay Cristol
  Pattern Recognition: William Gibson
  Maximum Wireless Security: Cyrus Peikari, Seth Fogie
  Information Operations - The IFOR Experience : Larry K. Wentz
  The Ten Commandments of Counterintelligence: James M. Olson
  Strong Cryptography Links on the Internet: William Knowles
  UCIA.org Domain For Sale : C4I.org Staff
  The National Strategy to Secure Cyberspace [.pdf]: Department of Homeland Security
  The Spread of the Sapphire/Slammer Worm: David Moore, Vern Paxson Stefan Savage, Colleen Shannon, Stuart Staniford, & Nicholas Weaver
Added 11.15.2002 Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet: Maura Conway
  The Memorability and Security of Passwords: Jianxin Yan, Alan Blackwell, Ross Anderson, & Alasdair Grant
  The Art of Deception: Controlling the Human Element of Security: Kevin D. Mitnick, William L. Simon
  The Myth of Cyberterrorism: Joshua Green
  Honeypots: Tracking Hackers: Lance Spitzner
  Matrix of recently prosecuted computer intrusion cases: U.S. Department of Justice
  Network Intrusion Detection: An Analyst's Handbook (2nd Edition): Stephen Northcutt
  America Still Unprepared - America Still in Danger: Council on Foreign Relations
  Managing Information Security Risks: The OCTAVE Approach: Christopher J. Alberts, Audrey J. Dorofee
  IntelligenceCareers.com: Defense & intelligence employment opportunities
  Inferring Internet Denial-of-Service Activity: David Moore, Geoffrey Voelker, & Stefan Savage
  Protecting America's Freedom in the Information Age: The Markle Foundation
  Command and Control Research Program: Office of the Assistant Secretary of Defense
  Information-Age Psychological Operations [.pdf]: Commander Randall G. Bowdish, USN
  Global Engagement: Building Castles On Sand?: Col. Carla D. Bass, USAF
  C3I.org Domain For Sale: C4I.org Staff
  Neohapsis Ports List: Most comprehensive listing of default TCP/UDP ports online
  Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: James Bamford
  Countering al Qaeda: Brian Jenkins
  The Book of Five Rings: Miyamoto Musashi, William Scott Wilson (Translator)
  Strange Attractors and TCP/IP Sequence Number Analysis : Michal Zalewski
  Information Operations: U.S. Air Force Doctrine Document 2-5
  Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking: Sandor Vegh
  Electronic Warfare for the Digitized Battlefield: Michael Frater, Michael Ryan
  The International Crisis Group : Private, Multinational Organization to Prevent & Resolve Deadly Conflict.
  Security Engineering: A Guide to Building Dependable Distributed Systems: Ross J. Anderson
  Critical Infrastructure Protection - Commercial Satellite Security Should be More Fully Addressed [.pdf]: General Accounting Office
  Espionage Against the United States by American Citizens [.pdf] : Katherine L. Herbig, Martin F. Wiskoff
  Military Operations Research Society: Professional Association of Military and Civilian Defense Analysts, Planners, & Operators
  Oklahoma City National Memorial Institute for the Prevention of Terrorism: Dedicated to preventing and reducing terrorism
Added 8.15.2002 Military Response to 4GW in Afghanistan: Greg Wilcox and Gary I. Wilson
  Missed Messages: Seymour Hersh
  The Art of War: Sun Tzu, Samuel B. Griffith (Translator)
  How to Fight the Terror Networks: Francis Pisani
  David H. Hackworth: Unique & Interesting Viewpoints on the U.S. Military
  Espionage in Information Warfare: Commander Christopher D. Noble USN
  Global Angst: Robert Adams
  The End of Secrecy?: Lt. Col. Beth M. Kasper, USAF
  Inside Al Qaeda: Global Network of Terror: Rohan Gunaratna
  Envisioning Information: Edward R. Tufte
  Homeland Insecurity: Charles Mann
  Critical Infrastructure Protection - July 2002: General Accounting Office
  The CIA in Somalia, 1993: Vernon Loeb
  On War: Karl Von Clausewitz
  Joint Unmanned Combat Air Systems (UCAV): DARPA
  MicroPilot: Low Cost Autopilot Hardware & UAV's
  Introduction to UAV Systems: Paul G. Fahlstrom, Thomas J. Gleason
  LostPassword: The Web Source of Password Recovery Software
  Trinux: Linux Security Toolkit
  Realizing the Potential of C4I: Fundamental Challenges: National Research Council
  Incident Analysis of Compromised OpenBSD 3.0 Honeypot: Michael Anuzis
  Management Responsibility in Protecting Information Assets: An Australian Perspective: Adrian McCullagh
  The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy: Richard Forno, Ronald Baklarz
Added 4.30.2002 Stay Safe Online: National Cyber Security Alliance
  BECCA: William M. Johnson, Ph.D
  CSI/FBI Computer Crime and Security Survey: Computer Security Institute
  VulnWatch: Steve Manzuik
  The New Mobile Infantry: Michael Behar
  The Man Who Tried to Save the World : The Dangerous Life and Mysterious Disappearance of Fred Cuny: Scott Anderson
  Electronic Crimes Task Force: United States Secret Service
  The Open Channel Foundation: Open Source Software from Academic & Research Institutions
  Textfiles.com: Jason Scott
  High Speed Vessel (HSV) : Navy Warfare Development Command
  The CIA Insider's Dictionary of U.S. and Foreign Intelligence, Counterintelligence & Tradecraft: Leo D. Carl
  Red Thrust Star: U.S. forces Command OPFOR Training Program
  Uncloaking Terrorist Networks: Valdis E. Krebs
  Trusted Recovery and Defensive Information Warfare: Peng Liu & Sushil Jajodia
  Intelligence Analysis for Internet Security: Ideas, Barriers and Possibilities: Timothy Shimeall, Phil Williams, & Casey Dunleavy
  KGB Lexicon: The Soviet Intelligence Officer's Handbook: Vasiliy Mitrokhin
  In Athena's Camp: Preparing for Conflict in the Information Age: John Arquilla
  G2mil - Warfare Research Portal: Carlton Meyer
  AlertNet: Reuters Foundation
  Snort: Open Source Network Intrusion Detection System
  An Analysis of Al-Qaida Tradecraft: Decision Support Systems, Inc.
  Asymmetric Warfare and the Threat to the American Homeland: Joseph C. Cyrulik
Added 2.15.2002 Councils of War: James Fallows
  w00w00 Security Development: Largest Private, Non-Profit Computer Security Group
  Shadow Warriors: Inside the Special Forces: Tom Clancy & General Carl Stiner (Ret.)
  SecureMac: Apple Macintosh Security Site
  Terrorist Group Profiles - Index of Groups: Naval Postgraduate School
  Minimanual of the Urban Guerrilla: Carlos Marighella
  The Falling Leaf: The Journal of the Psywar Society
  Dual Use Aspects of Commercial High-Resolution Imaging Satellites: Gerald Steinberg
  Georgi Guninski Security Research: Georgi Guninski
  Travel Warnings & Consular Information Sheets : U.S. Department of State
  Fourth Generation Warfare: Defense & the National Interest
Added 1.1.2002 Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster! [.doc]: W. Scott Gureck
  The Art of Naming Operations: Gregory C. Sieminski
  The Creation and Dissemination of All Forms of Information in Support of Psychological Operations (PSYOP) in Time of Military Conflict [.pdf]: Department of Defense
  Networks and Netwars: The Future of Terror, Crime, and Militancy: John Arquilla & David F. Ronfeldt
  Working with the CIA: Garrett Jones
  Nomad Mobile Research Centre: Simple Nomad
  Cryptology in the 16th and 17th Centuries: Thomas Leary
  Navajo Code Talkers' Dictionary: Department of the Navy
  NIST National Vulnerability Database: National Institute of Standards & Technology
  Information Warfare Principles and Operations: Edward Waltz
  Joint Force Quarterly: National Defense University
  The Nessus Project: Renaud Deraison
  Information Warfare Tutorial: Robert F. Minehart, Jr.
  Space & Electronic Warfare Lexicon: Joe Cyr
  Warfare in the Third World: Robert E. Harkavy, Stephanie G. Neuman
  An Unorthodox Soldier: Tim Spicer
  Mines Advisory Group: Private Landmine Clearance Organization
  Directed Energy Professional Society: Research and Development of Directed Energy
  United States Response to CBW Terrorism and Domestic Preparedness: Center for Nonproliferation Studies
  Urban Warfare: Options, Problems & the Future: Daryl G. Press
  Hunter, the Hammer, and Heaven: Journeys to Three Worlds Gone Mad: Robert Young Pelton
  Robotics at SPAWAR: Space and Naval Warfare Systems Center, San Diego
  Ethereal: Free network protocol analyzer for Unix and Windows
  WarDriving.com: Driving around looking for unsecured wireless networks
  World Trade Center Damage Map: The City of New York, Urban Data Solutions & CNN
  List of Business Offices, Tenants, and Companies in the World Trade Center: Gary Stock
  C4i: The Essential Guide to the Technological Warfare Revolution: SMI Publishing Ltd
  National Law Enforcement and Corrections Technology Center: National Institute of Justice
Added 10.2.2001 The Packetfactory : Clearinghouse for Free Network Security Software - Mike Schiffman
  Internet Journal of Rescue and Disaster Medicine : Hope E. Morrow, Bruno Hersche, & Olivier C. Wenker
  Fundamentals of Electronic Warfare: Sergei A. Vakin
  Ew 101 : A First Course in Electronic Warfare: David L. Adamy
  Talisker's List of Intrusion Detection Systems: Talisker
  The International Policy Institute for Counter-Terrorism: Boaz Ganor
  FM 90-10 Military Operations on Urbanized Terrain (MOUT): United States Army
  Metal Storm: Revolutionary Electronic Ballistics Technology
  Seismic Observations of the World Trade Center Disaster: Lamont-Doherty Earth Observatory of Columbia University
  Information Technology & Operations Center: United States Military Academy
  ANSER Institute for Homeland Security: Analytic Services, Inc.
  Defense Security Service: Department of Defense
  The Center for Strategic & International Studies: Strategic Insights on Current & Emerging Global Issues
  GlobalContinuity.com: Portal for Business Risk and Continuity Planning
Added 8.27.2001 The Jamestown Foundation: Post Cold-War Think Tank
  Airborne Laser Platform : USAF, TRW, Boeing
  Defensive Information Warfare: David S. Alberts
  Security-Enhanced Linux: National Security Agency
  Information Security: An Integrated Collection of Essays: Edited by Marshall D. Abrams, Sushil Jajodia & Harold J. Podell
  Computer Viruses in Electronic Warfare: Dr. Myron L. Cramer and Stephen R. Pratt
  Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment: Alok Chaturvedi, Mukul Gupta, Shailendra Mehta & Lorenzo Valeri
  The meaning of Eligible Receiver: The Crypt Newsletter
  U.S.S. Liberty Homepage: Jim Ennes & Joe Meadors
Added 6.27.2001 The Multipurpose Security and Surveillance Mission Platform (MSSMP): D.W. Murphy, J.P. Bott, W.D. Bryan, J.L. Coleman, D.W. Gage, H.G. Nguyen & M.P. Cheatham
  Information Operations [.pdf]: United States Marine Corps Warfighting Publication
  Equipped To Survive: Douglas Ritter
  ProMED-mail : The Global Electronic Reporting System for Outbreaks of Emerging Infectious Diseases & Toxins
  Journal of Military and Strategic Studies : Centre for Military and Strategic Studies
  Center for the Study of Chinese Military Affairs: National Defense University
  Cyber Threat Trends and US Network Security : Lawrence K. Gershwin
  DominoSecurity.org: Chuck Connell
  Jane's C4I Systems 2001-2002: Edited by Clive Walker
  The Cult of the Dead Cow: cDc Communications
Added 5.1.2001 Swarming and the Future of Conflict [.pdf]: John Arquilla & David F. Ronfeldt
  Cornerstones of Information Warfare: United States Air Force
  William L. Howard Technical Intelligence Museum : LTC William L. Howard (Ret.)
  Blind Man's Bluff: The Untold Story of American Submarine Espionage: Sherry Sontag
  The Spy Who Lost Me: Michelle Delio - Wired News
  Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence: Maj. Robert D. Critchlow
  The Ethics of Computer Network Attack: William J. Bayles
Added 4.6.2001 Information Warfare: Hype or Reality [.pdf]: E. Anders Eriksson
  Asymmetric Threats and the next QDR : Kenneth McKenzie, Jr.
  Anticipating the Nature of the Next Conflict: G.I. Wilson, F. Bunkers, & J.P. Sullivan
  MobileMesh - Mobile Adhoc Networking: The MITRE Corporation
Added 3.23.2001 Microsoft, VeriSign Warn of Security Hole: Cameron Crouch, PCWorld.com
Added 3.10.2001 Horizontal or Vertical Take Off or Landing Unmanned Aerial Vehicle: Airborne Autonomous Systems
Added 2.11.2001 Remote Sensing Tutorial : NASA GSFC - GST - USAF Academy & FAS
  Sources and Techniques of Obtaining National Defense Science and Technology Intelligence: Huo Zhongwen and Wang Zongxiao
Added 1.29.2001 Microsoft Admits Hack Attacks: Cameron Crouch, PCWorld.com
Added 12.17.2000 U.S. Is Relaxing Rules on Sale of Satellite Photos: Vernon Loeb - Washington Post
Added 12.12.2000 Job and volunteer openings in the global humanitarian community : ReliefWeb
Added 11.28.2000 Pentagon IG Report on Allegations of Breaches of Security by Dr. John M. Deutch: Federation of American Scientists
Updated 3.20.2000 Homepage of RADM Grace Murray Hopper USN (Ret.): Space and Naval Warfare Systems Center Charleston, Norfolk Office.
Added 11.16.2000 Checklist for the Future of Intelligence: Dr. John Hollister Hedley
  Institute for Crisis, Disaster and Risk Management: George Washington University
  Naval Intelligence Professionals: Furthering knowledge of the art of maritime intelligence.
Added 11.14.2000 Research Institute for European and American Studies: Non-profit institute for the analysis of security, intelligence, and policy issues.
  Special Operations.Com: Information about U.S. and International Special Operations teams
Added 11.6.2000 Russian merchant ships used in spying: Bill Gertz - The Washington Times
Added 10.30.2000 Pings and E-Arrows Fly in Mideast Cyber-War: The Washington Post
  Information Security in a Third Wave Society: William P. Crowell, Deputy Director, NSA
Added 10.20.2000 NSA Korean War Historical Papers: National Security Agency
Added 10.16.2000 SearchMil: Privately run search engine of U.S. Military sites.
Updated 11.25.2002 Photos of Sierra Leone: Doug Brooks
Added 9.23.2000 GlobeXplorer: Instantaneous supplier of Earth imagery
Added 9.8.2000 Managing the Information Security Program: U.S. Air Force
Added 9.5.2000 Privatizing Military Training: Deborah D. Avant
Added 8.6.2000 A Look at Spy Satellites and Hollywood: The Washington Post
  Man Poses as Astronaut, Steals NASA Secrets : Reuters News Service
  Soldiers of Fortune Ltd.: A Profile of Today's Private Sector Corporate Mercenary Firms: David Isenberg - CDI
  Critics Blast MS Security: Declan McCullagh - Wired News
Added 7.10.2000 Possible Soviet Responses to the US Strategic Defense Initiative: Declassified Interagency Intelligence Assessment
Added 6.25.2000 WHY SPY? The Uses and Misuses of Intelligence: Stanley Kober - CATO Institute
  The Complete, Unofficial TEMPEST Information Page: Joel McNamara
  FIRST: Forum of Incident Response and Security Teams
Added 6.21.2000 The Common Vulnerabilities & Exposures (CVE) Project: The MITRE Corporation
Added 6.14.2000 May 2000 GAO Report on FAA Computer Security [.pdf]: General Accounting Office
Added 6.9.2000 Countering the Changing Threat Of International Terrorism: National Commission on Terrorism
  The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments [.pdf]: Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor,
  Considerations for Allocating Resources for Information Security [.pdf]: Marshall D. Abrams, Carolyn M. Johnson, Jay J. Kahn, and Susan G. King - MITRE Corporation
  NASA NPG 2810.1 - Security of Information Technology: NASA Chief Information Officer
  National Plan for Information Systems Protection - Executive Summary: The White House
  Rainbow Series Library: National Computer Security Center
  NOT the Orange Book: Paul H. Merrill
Added 4.22.2000 Missing PC Held Trove of Secrets: The Washington Post
Updated 1.1.2002 It's Not What You Know, It's Who You Know: Work in the Information Age: First Monday
Added 3.13.2000 Toys for the U.S. Military?: Pros and Cons of laptops and Palm Pilots for the military.
Added 2.18.2000 Improper Handling of Classified Information by John M. Deutch: Central Intelligence Agency
  Activism, Hacktivism, and Cyberterrorism: Dorothy E. Denning
  Hostile Intelligence Threat [.pdf]: Department of Defense
Added 5.15.2000 NASA's Information Security Vulnerability: United States General Accounting Office
  Strategic Information Warfare Rising: RAND Corporation
  FM 34-8-2 Intelligence Officer's Handbook: United States Army
  FM 34-60 Counterintelligence: United States Army
  Humanitarian Assistance and Disaster Relief Assessments [.pdf]: United States Marine Corps Warfighting Laboratory
  Jane's C4I Systems 1999-2000: Edited by Clive Walker
Added 11.19.2000 Zen and the Art of Hacking: Richard Thieme - Internet Underground
Updated 11.15.2002 Cutting Out The Hackers: Ted C. Fishman - Playboy.com
Updated 10.2.2001 The Economic Espionage Act of 1996: Department of Justice
Updated 03.20.2007 C4I.org Wish List: Stuff the C4I.org Staff are always looking for.

Tidak ada komentar:

Posting Komentar

Free Download 4shared Premium Gratis

http://bengkelweb.co.de/4shared/

Valid CSS!

LinuxHQ LinuxHQ
Free Automatic Backlink Religion (Islam) - TOP.ORG Religion blogs powered by PRBbutton Religion Blogs - Blog Rankings rantop.com Saung Link SEO-Supreme Professional search tools for free Get Freebl Religion Blogs