ALL FEATURED TOPICS CYBER CRIME & NATIONAL SECURITY

Only 1/2! You are seeing results from the Public Collection, which is half the size of the Full Collection. Sign in to search everything (see eligibility).

Cyber Crime & National Security

Browsing featured resources (59)

Search general resources for Cyber Crime & National Security (86)

59 featured resources    updated Dec 27, 2016

 Jump to grouping:

Audits & Investigations

  • DHS Can Strengthen Its International Cybersecurity Programs (Redacted)
    "The borderless nature of threats to, and emanating from, cyberspace requires robust engagement and strong partnerships with countries around the world. International engagement is a key element of the Department of Homeland S… more
    2012-08
    1489KB
  • DHS Can Take Actions to Address Its Additional Cybersecurity Responsibilities
    "In 2010, the Office of Management and Budget designated the Department of Homeland Security (DHS) with the primary responsibilities of overseeing the Federal-wide information security program and evaluating its compliance wit… more
    2013-06
    1369KB
  • Electronic Warfare: DOD Actions Needed to Strengthen Management and Oversight, Report to the Committee on Armed Services, House of Representatives
    "DOD has committed billions of dollars to developing, maintaining, and employing warfighting capabilities that rely on access to the electromagnetic spectrum. According to DOD, electronic warfare capabilities play a critical a… more
    2012-07
    695KB
  • Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat (Redacted)
    The objectives of this Department of Justice (DOJ) Office of Inspector General (OIG) audit "were to: (1) evaluate FBI [Federal Bureau of Investigation] efforts in developing and operating the National Cyber Investigative Joint T… more
    2011-04
    42741KB
  • Federal Information Security: Agencies Need to Correct Weaknesses and Fully Implement Security Programs, Report to Congressional Committees
    "Since 1997, GAO [Government Accountability Office] has designated federal information security as a government-wide high risk area, and in 2003 expanded this area to include computerized systems supporting the nation's critic… more
    2015-09-29
    1318KB
  • Information Security: Agencies Need to Improve Cyber Incident Response Practices, Report to Congressional Requesters
    The number of cyber incidents reported by federal agencies increased in fiscal year 2013 significantly over the prior 3 years (see figure). An effective response to a cyber incident is essential to minimize any damage that mig… more
    2014-04
    11963KB
  • Review of the Department of Homeland Security's Capability to Share Cyber Threat Information (Redacted)
    "This report presents a snapshot of where Offices of Inspector General stand today regarding the use of new media. It also is an attempt to sensitize the Office of Inspector General community to the ways in which new media too… more
    2011-09
    21522KB

CRS Reports

  • Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws [December 27, 2010]
    "The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet… more
    Doyle, Charles
    2010-12-27
    825KB
  • Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement [January 15, 2015]
    "Twenty-first century criminals increasingly rely on the Internet and advanced technologies to further their criminal operations. These criminals can easily leverage the Internet to carry out traditional crimes such as distrib… more
    Finklea, Kristin M.; Theohary, Catherine A.
    2015-01-15
    411KB
  • Cybersecurity: Authoritative Reports and Resources, by Topic [May 7, 2015]
    "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecuri… more
    Tehan, Rita
    2015-05-07
    908KB
  • Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)- A Legal Analysis [January 28, 2013]
    "The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cybercrimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, pa… more
    Doyle, Charles
    2013-01-28
    332KB
  • Cybersecurity: Legislation, Hearings, and Executive Branch Documents [March 30, 2016]
    "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, a… more
    Tehan, Rita
    2016-03-30
    1001KB
  • Cybersecurity: Overview Reports and Links to Government, News, and Related Resources [March 2, 2016]
    "Much is written on the topic of cybersecurity. This CRS [Congressional Research Service] report and those listed below direct the reader to authoritative sources that address many of the most prominent issues. Included in the… more
    Tehan, Rita
    2016-03-02
    166KB
  • Cyberwarfare and Cyberterrorism: In Brief [March 27, 2015]
    "Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized as state-on-state action equivalent t… more
    Rollins, John; Theohary, Catherine A.
    2015-03-27
    311KB
  • Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement [January 17, 2013]
    Savvy criminals constantly develop new techniques to target U.S. persons, businesses, and interests. Individual criminals as well as broad criminal networks exploit geographic borders, criminal turf, cyberspace, and law enfo… more
    Finklea, Kristin M.
    2013-01-17
    521KB
  • Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability [December 9, 2010]
    "In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to th… more
    Theohary, Catherine A.; Kerr, Paul K.; Rollins, John
    2010-12-09
    187KB

DoD Reports

  • Cybersecurity Reference & Resource Guide
    "This document is intended to provide a useful reference for U.S. allies and partners. The resources compiled here are meant to support security cooperation and shared best practices. In this guide, readers will find open sour… more
    2013
    724KB
  • Department of Defense Strategy for Operating in Cyberspace
    "Along with the rest of the U.S. government, the Department of Defense (DoD) depends on cyberspace to function. It is difficult to overstate this reliance; DoD operates over 15,000 networks and seven million computing devices … more
    2011-07
    3487KB
  • DoD Cyber Strategy [April 2015]
    "The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American va… more
    2015-04
    6484KB
  • Resilient Military Systems and the Advanced Cyber Threat
    "After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a… more
    2013-01
    10683KB
  • Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry [2012]
    "Each year DSS [Defense Security Service] publishes 'Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry.' In this report, the 14th annual Targeting US Technologies, DSS provides a snapshot of its … more
    2012
    3584KB
  • United States Army's Cyberspace Operations Concept Capability Plan 2016-2028
    "The operational environment (OE) has changed dramatically. The technologic convergence of computer and telecommunication networks; astonishing rates of technologic advancements; global proliferation of information and communic… more
    2010-02-22
    2142KB

Executive Branch

  • Administration's Strategy on Mitigating the Theft of U.S. Trade Secrets
    "Emerging trends indicate that the pace of economic espionage and trade secret theft against U.S. corporations is accelerating. There appears to be multiple vectors of attack for persons and governments seeking to steal trade … more
    2013-02
    7098KB
  • Executive Order 13718: Commission on Enhancing National Cybersecurity
    "[I]n order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to tak… more
    Obama, Barack
    2016-02-09
    197KB

Hearings

  • Advanced Cyber Threats Facing Our Nation: Hearing Before the United States House of Representatives, Permanent Select Committee on Intelligence, One Hundred Thirteenth Congress, First Session, February 14, 2013
    This is the testimony compilation of the February 14, 2013 hearing, "Advanced Cyber Threats Facing Our Nation" before the United States House of Representatives, Permanent Select Committee on Intelligence. From the opening sta… more
    2013-02-14
    1751KB
  • Cybersecurity: The Evolving Nature of Cyper Threats Facing the Private Sector, Hearing Before the Committee on Oversight and Government Reform, Subcommittee on Information Technology, U.S. House of Representatives, One Hundred Fourteenth Congress, First Session, March 18, 2015
    This is a testimony compilation of the March 18, 2015 hearing "Cybersecurity: The Evolving Nature of Cyper Threats Facing the Private Sector," held before the House Committee on Oversight and Government Reform. From the testim… more
    2015-03-18
    3779KB
  • Global Perspective on Cyber Threats, Hearing Before the U.S. House of Representatives Committee on Appropriations, One Hundred and Fourteenth Congress, Second Session, June 16, 2015
    This testimony is from the July 16, 2015 hearing on "Global Perspective on Cyber Threats," before the U.S. House of Representatives, Committee on Appropriations. From the opening statement of Frank J. Cilluffo: "The U.S. finan… more
    2015-06-16
    1033KB
  • Serial No. 111-71: Cybersecurity: DHS' Role, Federal Efforts, and National Policy Hearing before the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, Second Session, June 16, 2010
    This testimony is from the June 16, 2010 hearing, "Cybersecurity: DHS' Role, Federal Efforts and National Policy," before the U.S. House of Representatives Committee on Homeland Security. From the opening statement of Chairman B… more
    2011
    294KB
  • Serial No. 112-101: Economic Espionage: A Foreign Intelligence Threat to American Jobs and Homeland Security, Hearing Before the Subcommittee on Counterterrorism and Intelligence of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, Second Session, June 28, 2012
    This is the June 28, 2012 hearing on "Economic Espionage: A Foreign Intelligence Threat to American Jobs and Homeland Security," held before the U.S. House Committee on Homeland Security, Subcommittee on Counterterrorism and I… more
    2013
    270KB
  • Serial No. 113-69: Assessing Persistent and Emerging Cyber Threats to the U.S. in the Homeland, Joint Hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, Second Session, May 21, 2014
    This is the May 21, 2014 hearing titled "Assessing Persistent and Emerging Cyber Threats to the U.S. in the Homeland." It was presented as a Joint Hearing before the U.S. House of Representatives Subcommittee on Counterterrori… more
    2014
    245KB
  • Serial No. 113-8: Cyber Attacks: An Unprecedented Threat to U.S. National Security, Hearing Before the Subcommittee on Europe, Eurasia, and Emerging Threats of the Committee on Foreign Affairs, House of Representatives, One Hundred Thirteenth Congress, Second Session, March 21, 2013
    From the opening statement of Dana Rohrbacher: "There have been several congressional hearings on cyber warfare, but most have concentrated on the technology involved and how we can devise defenses to block hackers from breaki… more
    2013
    1919KB
  • Strengthening Public-Private Partnerships to Reduce Cyber Risks to Our Nation's Critical Infrastructure: Hearing Before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, Second Session, March 26, 2014
    This is a compilation of the March 26, 2014 hearing on "Strengthening Public-Private Partnerships to Reduce Cyber Risks" held before the Senate Committee on Homeland Security and Governmental Affairs. From the opening statemen… more
    2014-03-26
    1869KB
  • United States Cybersecurity Policy and Threats, Hearing Before the Committee on Armed Services, U.S. Senate, One Hundred Fourteenth Congress, First Session, September 29, 2015
    This is a compilation of the September 29, 2015 hearing entitled "United States Cybersecurity Policy and Threats," held before the Senate Committee on Armed Services. From the opening statement of committee chairman John McCai… more
    2015-09-29
    8272KB

International Perspective

Research & Analysis

  • 2013 Internet Crime Report
    From the executive summary: "Now in its 14th year of operation, the Internet Crime Complaint Center (IC3) has firmly established its role as a valuable resource for both victims of Internet crime and law enforcement agencies i… more
    2014?
    2182KB
  • Information as Power: China's Cyber Power and America's National Security
    "The Information in Warfare Group of the U.S. Army War College is proud to publish 'China's Cyber Power and America's National Security' by Colonel Jayson M. Spade. This effort represents the first research paper published out… more
    Spade, Jayson M.
    2012-05
    1107KB

Theses

  • Attribution, Delayed Attribution and Covert Cyber-Attack: Under What Conditions Should the United States Publicly Acknowledge Responsibility for Cyber Operations?
    From the thesis abstract: "Self-attribution is a public declaration of responsibility for the conduct of an operation. It is distinguished from covert operations, where perpetrators provide no such acknowledgement and attempt … more
    McDade, Wylie
    2014-03
    469KB
  • Future of United States Cyber: Examining the Past to Posture the Future
    "The United States (U.S.) and its allies face an ever growing cyber threat. The emergence of the cyber domain has brought cyber threats and vulnerabilities to the forefront of U.S. national security. The ability to effectively… more
    Garrison, Joshua N.
    2013-02
    408KB
  • Nodes and Codes: The Reality of Cyber Warfare
    "'Nodes and Codes' explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain previously associated with information operations to bring about the physical, an… more
    Cobos, Mark A.
    2012-05-12
    410KB
  • What is NORAD's Role in Military Cyber Attack Warning?
    "For more than fifty years, North American Aerospace Defense Command (NORAD) has been responsible for conducting aerospace warning and control missions for the defense of North America. In accomplishing those operations, Comma… more
    DeGering, Randall R.
    2016-05
    582KB

Websites

  • Center for Internet Security [website]
    "The Center for Internet Security (CIS) is a non-profit enterprise whose mission is to help organizations reduce the risk of business and e-commerce disruptions resulting from inadequate technical security controls. The practi… more
    25KB
  • DHS: Office of Cybersecurity and Communications [website]
    "The Office of Cybersecurity and Communications (CS&C), within the National Protection and Programs Directorate, is responsible for enhancing the security, resilience, and reliability of the Nation's cyber and communications i… more
    39KB
  • United States Cyber Command Cyber Security [website]
    This website contains top news stories, press releases, videos, photos, and relevant links related to the area of cybersecurity in the United States.
    94KB