Cyber spying

Results: 65



#Item
41Hacking / National security / Computer crimes / Military technology / Cyber-security regulation / Computer security / Cyber spying / Cyberwarfare in the United States / U.S. Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Cyberwarfare / Security

a report of the technology and public policy program Conflict and Negotiation in Cyberspace

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-02-08 15:53:29
42Computer crimes / Cyberwarfare / Social engineering / Computer network security / Hacking / Cyber spying / Industrial espionage / Malware / Computer security / Cybercrime / Security / Espionage

GAO-12-876T, INFORMATION SECURITY: Cyber Threats Facilitate Ability to Commit Economic Espionage

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-06-28 10:49:34
43Security / Hacking / Computer crimes / Electronic warfare / Military technology / United States Cyber Command / Cooperative Cyber Defence Centre of Excellence / Information warfare / Cyber spying / Cyberwarfare / Military science / National security

Sun Tzu and Cyber War Kenneth Geers Naval Criminal Investigative Service (NCIS) Cooperative Cyber Defence Centre of Excellence (CCD COE) Tallinn, Estonia

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:42
44National security / Hacking / Technology / Military technology / Cyberterrorism / Computer security / Smart grid / SCADA / Cyber spying / Computer crimes / Security / Cyberwarfare

2013 Cyber Security Expo Report A National Center of Academic Excellence in Information Assurance Education & Research (CAE/IAE-R) The University of Memphis Center for Information Assurance hosted the 6th Annual Cyber S

Add to Reading List

Source URL: cfia.memphis.edu

Language: English - Date: 2014-01-30 11:57:38
45Hacking / Electronic warfare / Espionage / China–United States relations / Industrial espionage / Operation Aurora / Cyber spying / Patent / Computer security / Cybercrime / Security / Cyberwarfare

INCA Letter to Speaker Boehner Opposing Patent Reform H. R. 1249

Add to Reading List

Source URL: democrats.judiciary.house.gov

Language: English - Date: 2011-06-10 15:30:24
46National security / Hacking / Electronic warfare / Espionage / Industrial espionage / United States Cyber Command / Cyber spying / Computer security / Chinese intelligence operations in the United States / Cyberwarfare / Security / Cybercrime

Cyber Naïveté First Washington ignored the al Qaeda threat. Now they’re doing the same with the cyber threat. It’s time to wake up.

Add to Reading List

Source URL: wolf.house.gov

Language: English - Date: 2014-01-03 10:07:42
47National security / Hacking / Crime / Military technology / Computer security / Cyber spying / Internet privacy / Cyber-security regulation / National Strategy to Secure Cyberspace / Security / Cyberwarfare / Computer crimes

CYBER SECURITY STRATEGY │AN OVERVIEW © Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior writ

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-08-07 22:14:05
48Cyberwarfare / Crime / Hacking / Computer security / Cyber spying / Internet privacy / Cyber-bullying / Cyber-security regulation / Cybercrime and countermeasures / Computer crimes / Security / National security

DOC Document

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-08-07 22:14:05
49Cyberwarfare / Computer crimes / Trade secrets / Hacking / Information sensitivity / Industrial espionage / Economic Espionage Act / Cyber spying / Intelligence agency / National security / Security / Espionage

COUNTERINTELLIGENCE O F F I C E October[removed]O F

Add to Reading List

Source URL: www.ncix.gov

Language: English - Date: 2012-01-11 12:53:19
50Cyberwarfare / Intelligence / Military intelligence / Industrial espionage / Central Intelligence Agency / Counterintelligence / United States Intelligence Community / Cyber spying / National Security Agency / National security / Espionage / Security

Michelle Van Cleave Senior Fellow, Homeland Security Policy Institute George Washington University Statement before the House Committee on Science, Space, and Technology

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2013-05-16 15:11:53
UPDATE