Books, Reports & Treatises: INTERNET

Rick
Rick
Last updated 

20YY - Preparing for War in the Robotic Age


20yy-preparing-war-robotic-age.pdf 3.14 MB View full-size Download

Certified Lies - Detecting and Defeating Government Interception Attacks Against SSL


certified_lies.pdf 602 KB View full-size Download


Content and Popularity Analysis of Tor Hidden Services


content-popularity-analysis-tor.pdf 222 KB View full-size Download


Department of Defense Strategy for Operating in Cyberspace


dod-operating-cyberspace.pdf 998 KB View full-size Download




Freedom on the Net 2016


freedom-net-2016-report.pdf 3.94 MB View full-size Download


Going for The Throat - 'Carnivore' in an Echelon World - Surveillance Systems


going-for-the-throat-carnivore-internet.pdf 275 KB View full-size Download


Homeland Security and Intelligence: Next Steps in Evolving the Mission


homeland-security-intelligence.pdf 68.3 KB View full-size Download

Information Operation Roadmap


operations_roadmap.pdf 2.21 MB View full-size Download


International Code of Conduct for Information Security - China, Russia and Other Countries Submit to...


int-code-conduct-information-security.pdf 71.8 KB View full-size Download

Korea's High-Tech Utopia, Where Everything Is Observed


Koreas_HighTech_Utopia.pdf 31 KB View full-size Download

Living in A Wireless World


wireless_world.pdf 30 KB View full-size Download

Mediterranean Council for Intelligence Studies - Yearbook 2012


mcis2012.pdf 1.19 MB View full-size Download


Pandora's Vox - On Community in Cyberspace


pandora-vox-on-community-cyberspace.pdf 72.1 KB View full-size Download


Persona Management Software


personamanagementsoftware.pdf 136 KB View full-size Download


Policy Challenges of Accelerating Technological Change - Security Policy and Strategy Implications...


policy-challenges-accelerating-technological-change.pdf 886 KB View full-size Download

Professors’ Letter in Opposition to "PROTECT-IP Act of 2011, S. 968"


protectip-letter-final.pdf 269 KB View full-size Download


Project 12 - Improving Protection of Privately Owned Critical Network Infrastructure Through Public-Private...


project12-report.pdf 348 KB View full-size Download

Shadows in The Cloud - Investigating Cyber Espionage


shadows_inthecloud.pdf 959 KB View full-size Download


Strategic Plan for the U.S. Integrated Earth Observation System


Team Themis - Corporate Information Reconnaissance Cell - November 3, 2010


team_themis.pdf 1.56 MB View full-size Download

The Electronic Police State - 2010 National Rankings


electronic_policestate.pdf 889 KB View full-size Download

The Implementation of The Communications Assistance for Law Enforcement Act


wiretaporders_us.pdf 1.18 MB View full-size Download

The Protect IP Act - Draft


protectipact.pdf 2.48 MB View full-size Download


The Spread of True and False News Online


spread-true-false-news-online.pdf 285 KB View full-size Download


The Strategic Significance of the Internet Commons


strategic-significance-internet-commons.pdf 74.7 KB View full-size Download


The Taking of the Internet


taking_internet.pdf 443 KB View full-size Download

The Web Never Forgets - Persistent Tracking Mechanisms in the Wild


web-never-forgets.pdf 715 KB View full-size Download


Tracking GhostNet - Investigating a Cyber Espionage Network


tracking_ghostnet.pdf 1020 KB View full-size Download
Unclassified Report on the President's Surveillance Program - Obama Administration


president_surveilprog.pdf 2.56 MB View full-size Download


Conspiracy Theories - White Paper by Cass R. Sunstein
Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers - by Andy Greenberg
The Internet of Things - A critique of Ambient Technology and The All-Seeing... - by Rob van Kranenburg
Understanding Media: The Extensions of Man - by Marshall McLuhan