31 May 2018

Pentagon Lacking Accurate Property Inventory

While progress has been made towards updating inventory systems, the Defense Department is still unable to provide Congress with a sufficiently specific inventory to allow for a “practical analysis of where cost-saving cuts may be made,” according to a recent Government Accountability Office report. This inability is one of the leading

Read More
07 Jan 2015

DoD Cloud Computing Security Requirements Guide (SRG)

Cloud computing technology and services provide the Department of Defense (DoD) with the opportunity to deploy an Enterprise Cloud Environment aligned with Federal Department-wide Information Technology (IT) strategies and efficiency initiatives, including federal data center consolidation. Cloud computing enables the Department to consolidate infrastructure, leverage commodity IT functions, and eliminate

Read More
08 Mar 2013

Resilient Military Systems and the Advanced Cyber Threat

The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a “full spectrum” adversary). While this is also true for others (e.g. Allies, rivals,

Read More
22 Jul 2011

Open Source Exploitation: A Guide For Intelligence Analysts

This manual describes the basic concepts and devices used to exploit open sources of information. It presents an introduction to the subject and covers the most common tools and techniques. This manual also provides an understanding of the importance of effective dissemination of open source information. It concludes with a

Read More
20 Jul 2011

DoD Antiterrorism Handbook

This Handbook is reissued under the authority of DoD Directive 2000.12, “DoD Antiterrorism (AT) Program,” August 18, 2003 (reference (a)). It provides procedures and recommendations for reducing the risk and vulnerability of DoD personnel, their family members, facilities, and assets from acts of terrorism. DOD Anti-terrorism Handbook

Read More
01 Feb 2011

A Global Overview of Narcotics-Funded Terrorist and Other Extremist Groups

This global survey, based entirely on open sources, is intended to provide an assessment of the nexus between selected anti-U.S. terrorist and extremist groups in the world and organized crime, specifically drug trafficking, and how this relationship might be vulnerable to countermeasures. More specifically, the aim is to help develop

Read More
01 Feb 2011

Defense Science Board Task Force on Mobility

I am pleased to forward the final report of the Defense Science Board Task Force on Mobility. In this report the task force identifies the future mobility capabilities needed for rapid force projection (deploying joint forces to an operational area) and sustainment (supporting deployed forces and other entities that will

Read More