INSERT INTO sites(host) VALUES('') 1045: Access denied for user 'www-data'@'localhost' (using password: NO) Estimated Worth $162,411 - MYIP.NET Website Information
Welcome to!
 Set MYIP as homepage      


Web Page Information

Meta Description:
Meta Keywords:
sponsored links:
sponsored links:

Traffic and Estimation


Website Ranks

Alexa Rank:
Google Page Rank:
Sogou Rank:
Baidu Cache:

Search Engine Indexed

Search EngineIndexedLinks

Server Data

Web Server:
IP address:    

Registry information

ICANN Registrar:
Name Server:
Whois Server:

Alexa Rank and trends

Traffic: Today One Week Avg. Three Mon. Avg.
Unique IP:

More ranks in the world

Users from these countries/regions

Where people go on this site

Alexa Charts

Alexa Reach and Rank

Whois data

Who is at

Domain Name: C4I.ORG

Domain ID: D16351135-LROR

WHOIS Server:

Referral URL:

Updated Date: 2015-02-08T05:17:53Z

Creation Date: 2000-01-01T07:19:37Z

Registry Expiry Date: 2021-01-01T07:19:37Z

Sponsoring Registrar: GKG.NET, INC.

Sponsoring Registrar IANA ID: 93

Domain Status: clientTransferProhibited

Registrant ID: GKG-C000021783

Registrant Name: William Knowles

Registrant Organization:

Registrant Street: Post Office Box 24

Registrant City: Golf

Registrant State/Province: Illinois

Registrant Postal Code: 60029-0024

Registrant Country: US

Registrant Phone: +1.3127250425

Registrant Phone Ext:

Registrant Fax:

Registrant Fax Ext:

Registrant Email: 694bffb3fdaa466d27634a265963dbf6a38d9d05

Admin ID: GKG-C000021783

Admin Name: William Knowles

Admin Organization:

Admin Street: Post Office Box 24

Admin City: Golf

Admin State/Province: Illinois

Admin Postal Code: 60029-0024

Admin Country: US

Admin Phone: +1.3127250425

Admin Phone Ext:

Admin Fax:

Admin Fax Ext:

Admin Email: 694bffb3fdaa466d27634a265963dbf6a38d9d05

Tech ID: GKG-C000021783

Tech Name: William Knowles

Tech Organization:

Tech Street: Post Office Box 24

Tech City: Golf

Tech State/Province: Illinois

Tech Postal Code: 60029-0024

Tech Country: US

Tech Phone: +1.3127250425

Tech Phone Ext:

Tech Fax:

Tech Fax Ext:

Tech Email: 694bffb3fdaa466d27634a265963dbf6a38d9d05

Name Server:

Name Server:

Name Server:

Name Server:

DNSSEC: unsigned

>>> Last update of WHOIS database: 2016-09-19T19:26:35Z <<<

For more information on Whois status codes, please visit

Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest

Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances

will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) e

nable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Publi

c Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.

Front Page Thumbnail

sponsored links:

Front Page Loading Time

Keyword Hits (Biger,better)

Other TLDs of c4i

TLDs Created Expires Registered

Similar Websites


Search Engine Spider Emulation - Computer Security and Intelligence is a private open-source intelligence clearinghouse covering computer security, information engagement, and risk management based in Golf, Illinois. Our analysts have a backround in Risk Assessment, Intelligence, Information Strategy, C4I, EW, Electronic Commerce, Defensive Information Warfare, Peacekeeping, Hacking, Counter-Intelligence, Journalism, Surveillance, Counter-Terrorism, Cryptography, Information Warfare, Information Assurance and Special Operations
Keywords:Virtual, Intelligence, Counterintelligence, Information, Peacekeeping, International, Clearinghouse, Strategy, Infowar, Computer Security, data, RQ-4A, Information Security, Computer, Security, Firewall, Hackers, hacking, fascinator, Data mining, Mapping, network, Network Security, Attacks, Analysis, Exploits, Vulnerabilities, cybercrime, cyberlaw, Assurance, authentication, Axent, Back Orifice, BO2K, Books, Bookstore, cDc, Information Security Consulting, C2, C3I, C41, C4I, C4I Secure Solutions,,,, C4ISR, Cult Dead Cow, Civil, Compsec, comsec, Computer Security, cracking, C4ISR, C3CM,, Industrial Espionage, internet security, computer security, Slapper, CCTF, intrusion detection, information security, hackers, hacking, penetration testing, Grey Fox, Cyber, cyberterrorism, Cyberwar, Cyber-War, crypto, Defence, Defense, Defensive, Offensive, MQ-1B, digital signatures, e-commerce, Economic, Economic Espionage, Electronic, EMP, encryption, P2OG, Espionage, expert witness, expert witnesses, Firewalls, HERF Guns, identification, Industrial, AFCEA, DCS1000, Industrial Espionage, NACIC, InfoSec, John Boyd, OODA, nimda, Amerithrax, anthrax,,, IPOA, MSSMP, MOUT, OOTW, NMCI,, Special Operations, NCIX, Swarming, jihad, PLA, FBI, Unrestricted Warfare, Al-Qaeda, 1*, AOC, ANSIR, CIAO, CITAC, Cobra, COMINT, COTS, DIAP, G-2, GCCS, I3, IBDA, IBW, IMINT, INFINT, Info Ops, IWAAS, IW-C2W, IW-O, J-2, J3, J-6, JTF-CNO, MASINT, MOOTW, NIAP, NIPC, NIPCI, NISCC, NRO, OCIO, OOTW, OPSEC, OSINT, PENTTBOM, PCCIP, PDD-63, POTS, PSTN, PSYOPS, PSYW, RADINT, RII, SIGINT, TELINT, C3, SA-7, Dr. Eugene Fubini, Hacker, Crackers, Virus, Virii, Webpages, DOS, Denial of Service, files, encryption, spoofing, news, texts, password, port monitors, key logger, phreaking, boxes, RQ-1, IO, C$I, Private Security Contractors, Private Military Contractors, Private Intelligence, Strela, expert wardialers, patches, computer warfare, cyberwar, CALOW, crypto, INFOSEC, exploits, exploits, Command, Control, Communications, Computers, DCS1000, PDD-63, C2, EW 101, Surveillance, fixes, hot fixes, bugs, ILOVEYOU, cyber-crime, OPLAN 3600, cybercrime, c4iorg, KG-84A, 96B, 98C, 97B, 37F, 38A, 24Z, 24A, 30A, 35D, 35G, 3W, HIPAA, cyber-terrorism, CSIS, Proactive, Preemptive Operations Group, Preemption, Proaction, Interdiction, Disruption, MQ-9B, destruction, degradation, denial, disruption, deceit, exploitation, JTF2, Muntada al-Ansar, AL-Jazeera, increased chatter, NIMA, Counter-Strike, counterstrike, reach back,, deter, detect, defeat, disinformation, FRL - 86, chmod a+x binladen, DIA, Informaton Operations,
Body: - Computer Security and Intelligence
New Update Forthcoming
Home :
News :
Security Bookstore :
Security Jobs :
Added 3.20.2007
Terrorism Threat Level: U.S. Department of Homeland Security
Daily updated list of U.S. Coalition Casualties in Iraq
The Special Operations Warrior Foundation
: The Warrior Foundation
[ISN]: InfoSec News Mailing List
: William Knowles (Moderator)
Packet Storm
: Full Disclosure Computer Security Site
Directory of Open Access Journals: Lund University Libraries
Shadow Company: Nick Bicanic
The Center for Contemporary Conflict: Naval Postgraduate School
Jane's C4I Systems 2006 - 2007
: Giles Ebbutt
Terrorist Capabilities for Cyberattack: John Rollins and Clay Wilson
The Militant Ideology Atlas: Dr. William McCants, Dr. Jarret Brachman, USMA
Reflections from a Red Team Leader: Susan Craig
Black Alchemy Fake AP: 53,000 False Generated
Wireless Access Points
Treachery Unlimited: Jay Dyson
UCS Satellite Database: Union of Concerned Scientists
Open Source Disaster Recovery: Calvert Jones and Sarai Mitnick
Heavens-Above (Satellite Predictions): Chris Peat
The Bunker
: Ultra-Secure Data Colocation
Joint Doctrine for Military Deception (Updated) [.pdf]: Joint Chiefs of Staff
Send Care Packages to U.S. Military
Licensed to Kill: Hired Guns in the War on Terror:
Robert Young Pelton
OSVDB: Independent, Unbiased Resource of Security Information
Clandestine and Guerrilla Radio Stations
: Daily Intelligence on Subversive TV amp; Radio
Chinese Unrestricted Warfare [.pdf]: PLA Senior Colonels Qia Liang amp; Wang Xiangsui
Link to - Buttons amp;
Propaganda: Staff
Added 2.10.2006
Information Operations Roadmap
: Department of Defense
Jane's C4I Systems 2005 - 2006
: Giles Ebbutt
New Attrition Mailing Lists
: Staff
Chinese Military Power
: The Project on Defense Alternatives
Stealing the Network
: FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale
Teaching Intelligence: Getting Started
: John Macartney
Ambient Findability
: Peter Morville
Build Security In
: DHS National Cyber Security Division
Basic Security Awareness [.pdf]: Geraint Jones
: The Tor Project, Inc., EFF amp; ONR amp; DARPA
CISSP Exam amp; Study Information
: William Knowles
10 GPS Vulnerabilities
: LTC. Thomas K. Adams (Ret.)
Hacking for a cause
: Brian Still
Rewards for Justice: Department of State,
Diplomatic Security Service
CERIAS Incident Response Database
: Purdue University
Redacting with Confidence
: SNAC-IAD - National Security Agency
China's Psychological Warfare
: Laura K. Murray
The World's Most Dangerous Places: 5th Edition
: Robert Young Pelton
Electronic Encyclopaedia of Civil Defense amp; Emergency Management
: Walter Green
Chronology of Data Breaches Reported Since the ChoicePoint Incident
: Privacy Rights Clearinghouse
Chiefs of State amp; Cabinet Members of Foreign Governments
: Central Intelligence Agency
Added 7.4.2005
The Dynamic Terrorist Threat
: R. Kim Cragin, Sara A. Daly, RAND Corporation
Encyclopedia of Intelligence and Counterintelligence
: Edited by Rodney Carlisle
An Incomplete Manifesto for Growth
: Bruce Mau
2005 Terrorism Risk Map
: Aon United
: Visual Representations of News on the Internet
: Detailed information about every common process.
Arms Control Wonk
: Jeffrey Lewis, Paul Kerr
Open CRS Network
: CRS Reports for the People
Marine Corps Gazette
: The Professional Journal of the U.S. Marines
Air University Library Map Room
: U.S. Air Force
Electronic Warfare for the Digitized Battlefield
: by Michael Frater, Michael Ryan
Sun Tzu - The Art of War Strategy Site
: Intelligent Approach to Competition
Roadside Bombs and Armored Vehicles
: Thomas Herlihy
: National Consortium for the Study of Terrorism and Responses to Terrorism
Building Security: Handbook for Architectural Planning amp; Design
: Barbara A. Nadel
The Media's Portrayal of Hacking, Hackers, and
Hacktivism Before amp; After 9/11
: Sandor Vegh
Added 8.15.2004
Knoppix STD
: Linux Security Tools Distribution Home of Nmap, by Fyodor
Jane's C4I Systems 2004-2005: Giles Ebbutt (Editor)
Psychology of Intelligence Analysis: Richards J. Heuer, Jr.
ACIG Journal: Air Combat Information Group
Relearning Counterinsurgency Warfare: Robert T. Tomes
Military Battles and Campaigns: The Library of Congress

Urban Sunrise: U.S.A.F. Research Laboratory
: Wireless Geographic Logging Engine
Defeating Terrorists on the Waterfront: Commander James Pelkofski, U.S.N.
Hardening Your Computing Assets: Carlo Kopp
International Stability Operations Association (IPOA): Doug Brooks
Cybersecurity for Critical Infrastructure Protection: Government Accountability Office
Cyber Adversary Characterization: Auditing the Hacker Mind: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost
Info from Iraq - From Someone who is Doing the Run and Gun: Ben Thomas
What is C4I?
: Staff
Added 11.15.2003
Hacker Generations
: Richard Thieme
Simple Nomad's DefCon 11 Rant
: Simple Nomad
Angola Landmine Database: Norwegian
Peoples Aid
Middle East Media Research Institute:
Independent Research Group
Partnership for Effective Peacekeeping Operations: A policy working group
BlackBerry Reveals Bank's Secrets: Kim
Real-Time Top Ten Vulnerabilities: Qualys
Vulnerability Research Lab
Dead Horses in the Sun: Larry A.
Bell Tony
The Dawn of the E-Bomb: Michael Abrams
The Myth of Homeland Security: Marcus
Jane's C4I Systems, 2003-2004: Giles Ebbutt (Editor)
Real 802.11 Security: Wi-Fi Protected Access amp; 802.11i: Jon Edney amp; William A. Arbaugh
Annual Report on the Military Power of The Peoples's Republic of China
[.pdf]: U.S. Department of Defense
Analysis of an Electronic Voting System:
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, amp; Dan S. Wallach
Added 7.1.2003
Iraq's Crash Course in Cyberwar: Brian McWilliams
Help Support, Please Make a Donation: Staff
North Korean Tactics: Maj. James M. Minnich
No Outward Sign: Bill Neugent
Jane's C4I Systems, 2002-2003: Giles Ebbutt (Editor)
Intrusion Detection with Snort: Jack Koziol
In the Company of Heroes: Michael J. Durant
Nothing Learned from Black Hawk Down: Mike Sparks
Failing to Keep Up With the Information Revolution: Bruce Berkowitz
Planning for Survivable Networks: Annlee A. Hines
Joint Doctrine for Information Operations [.pdf]: Joint Chiefs of Staff
Stealing the Network: How to Own the Box: Ryan Russell, Ido Dubrawsky, FX
Secrets of Computer Espionage: Joel McNamara
The Mind of War: Grant Tedrick Hammond
Chinese Defence Today: Unofficial website of the Chinese defence affair
If We Run Out of Batteries, This War is Screwed.
: Joshua Davis
The Influence Component of Counterterrorism
: Paul K. Davis amp; Brian Michael Jenkins
Association of Old Crows
: The Electronic Warfare amp; Information Operations Association
International Charter Incorporated of Oregon: Worldwide aviation, security, and logistics services
The Marine Corps Professional Reading
Program List:
United States Marine Corps
Black Hawk Down - A Story of
Modern War:
Mark Bowden
Information Assurance Technology Analysis
Department of Defense
Civilians, Spies, and Blue Suits: Jeffrey T. Richelson
Breakdown - How America's
Intelligence Failures Led to 9/11: Bill Gertz
The Center for Internet Security: Not-For-Profit Security
Internet Storm Center: The SANS Institute
DigitalGlobe: High-Res Commerical Satellite Imagery
Boyd - The Fighter Pilot Who
Changed the Art of War: Robert Coram
Understanding Revolutionary
Major Dennis I. Merritt, USMC
Securing 802.11 with OpenBSD: Jarkko Turkulainen
The Liberty Incident: A. Jay Cristol
Pattern Recognition: William Gibson
Maximum Wireless Security: Cyrus Peikari, Seth Fogie
Information Operations - The IFOR Experience
: Larry K. Wentz
The Ten Commandments of
Counterintelligence: James M. Olson
Strong Cryptography Links on the
William Knowles Domain For Sale
: Staff
The Spread of the
Sapphire/Slammer Worm: David Moore, Vern Paxson Stefan Savage,
Colleen Shannon, Stuart Staniford, amp; Nicholas Weaver
Reality Bytes: Cyberterrorism
and Terrorist 'Use' of the Internet:
Maura Conway
The Memorability and Security of
Jianxin Yan, Alan Blackwell, Ross Anderson, amp;
Alasdair Grant
The Art of Deception:
Controlling the Human Element of Security: Kevin D. Mitnick, William L.
The Myth of Cyberterrorism: Joshua Green
Honeypots: Tracking Hackers: Lance Spitzner
Matrix of recently prosecuted computer
intrusion cases:
U.S. Department of Justice
Network Intrusion Detection: An
Analyst's Handbook (2nd Edition): Stephen Northcutt
America Still Unprepared -
America Still in Danger: Council on Foreign Relations
Managing Information Security
Risks: The OCTAVE Approach: Christopher J. Alberts, Audrey J.
Dorofee Defense amp; intelligence
employment opportunities
Inferring Internet
Denial-of-Service Activity: David Moore, Geoffrey Voelker, amp;
Stefan Savage
Command and Control Research Program: Office of the Assistant
Secretary of Defense
Information-Age Psychological Operations
Commander Randall G. Bowdish, USN
Global Engagement: Building
Castles On Sand?: Col. Carla D. Bass, USAF Domain For Sale: Staff
List of TCP and UDP port numbers: Wikipedia
Body of Secrets: Anatomy of the
Ultra-Secret National Security Agency: James Bamford
The Book of Five Rings: Miyamoto Musashi, William
Scott Wilson (Translator)
Information Operations: U.S. Air Force Doctrine
Document 2-5
Hacktivists or Cyberterrorists?
The Changing Media Discourse on Hacking: Sandor Vegh
Electronic Warfare for the
Digitized Battlefield: Michael Frater, Michael Ryan
The International Crisis Group
: Private, Multinational Organization to Prevent amp; Resolve Deadly Conflict.
Security Engineering: A Guide to
Building Dependable Distributed Systems: Ross J. Anderson
Critical Infrastructure
Protection - Commercial Satellite Security Should be More
Fully Addressed [.pdf]: General Accounting Office
Espionage Against the United States by American Citizens [.pdf]
: Katherine L. Herbig, Martin F. Wiskoff
Operations Research Society: Professional Association of Military
and Civilian Defense Analysts, Planners, amp; Operators
City National Memorial Institute for the Prevention of
Dedicated to preventing and reducing terrorism
Added 8.15.2002
Military Response to 4GW in
Greg Wilcox and Gary I. Wilson
The Art of War: Sun Tzu, Samuel B. Griffith
How to Fight the Terror Networks: Francis Pisani
David H. Hackworth: Unique amp; Interesting
Viewpoints on the U.S. Military
The End of Secrecy?: Lt. Col. Beth M. Kasper, USAF
Inside Al Qaeda: Global Network
of Terror:
Rohan Gunaratna
Envisioning Information: Edward R. Tufte
Homeland Insecurity: Charles Mann
Critical Infrastructure
Protection - July 2002: General Accounting Office
The CIA in Somalia, 1993: Vernon Loeb
On War: Karl Von Clausewitz
MicroPilot: Low Cost Autopilot Hardware amp; UAV's
Introduction to UAV Systems: Paul G. Fahlstrom, Thomas J.
Trinux: Linux Security Toolkit
Realizing the Potential of C4I:
Fundamental Challenges: National Research Council
Management Responsibility in
Protecting Information Assets: An Australian Perspective: Adrian McCullagh
The Art of Information Warfare:
Insight into the Knowledge Warrior Philosophy: Richard Forno, Ronald Baklarz
Added 4.30.2002
Safe Online:
National Cyber Security Alliance
BECCA: William M. Johnson, Ph.D
VulnWatch: Steve Manzuik
The New Mobile Infantry: Michael Behar
The Man Who Tried to Save the
World : The Dangerous Life and Mysterious Disappearance
of Fred Cuny:
Scott Anderson
The Open Channel Foundation: Open Source Software from
Academic amp; Research Institutions Jason Scott
The CIA Insider's Dictionary of
U.S. and Foreign Intelligence, Counterintelligence amp;
Leo D. Carl
Uncloaking Terrorist Networks: Valdis E. Krebs
Trusted Recovery and Defensive
Information Warfare: Peng Liu amp; Sushil Jajodia
Intelligence Analysis for
Internet Security: Ideas, Barriers and Possibilities: Timothy Shimeall, Phil
Williams, amp; Casey Dunleavy
KGB Lexicon: The Soviet
Intelligence Officer's Handbook: Vasiliy Mitrokhin
In Athena's Camp: Preparing for
Conflict in the Information Age: John Arquilla
- Warfare Research Portal: Carlton Meyer
AlertNet: Reuters Foundation
Snort: Open Source Network Intrusion
Detection System
An Analysis of Al-Qaida
Decision Support Systems, Inc.
Asymmetric Warfare and the
Threat to the American Homeland: Joseph C. Cyrulik
Added 2.15.2002
Councils of War: James Fallows
w00w00 Security Development: Largest Private, Non-Profit
Computer Security Group
Shadow Warriors: Inside the
Special Forces:
Tom Clancy amp; General Carl Stiner (Ret.)
SecureMac: Apple Macintosh Security Site
Terrorist Group Profiles - Index
of Groups:
Naval Postgraduate School
Minimanual of the Urban
Carlos Marighella
The Falling Leaf: The Journal of the Psywar
Dual Use Aspects of Commercial
High-Resolution Imaging Satellites: Gerald Steinberg
Added 1.1.2002
Network-Centric Warfare and
Complex Humanitarian Emergencies, Meet Napster! [.doc]: W. Scott Gureck
The Art of Naming Operations: Gregory C. Sieminski
The Creation and Dissemination of All
Forms of Information in Support of Psychological
Operations (PSYOP) in Time of Military Conflict [.pdf]: Department of Defense
Networks and Netwars: The Future
of Terror, Crime, and Militancy: John Arquilla amp; David F.
Working with the CIA: Garrett Jones
Mobile Research Centre: Simple Nomad
Cryptology in the 16th and 17th
Thomas Leary
Navajo Code Talkers' Dictionary: Department of the Navy
NIST National Vulnerability Database: National Institute of
Standards amp; Technology
Information Warfare Principles
and Operations:
Edward Waltz
Joint Force Quarterly: National Defense University
The Nessus Project: Renaud Deraison
Information Warfare Tutorial: Robert F. Minehart, Jr.
Warfare in the Third World: Robert E. Harkavy, Stephanie
G. Neuman
An Unorthodox Soldier: Tim Spicer
Advisory Group:
Private Landmine Clearance Organization
Directed Energy Professional
Research and Development of Directed Energy
Hunter, the Hammer, and Heaven:
Journeys to Three Worlds Gone Mad: Robert Young Pelton
Robotics at SPAWAR: Space and Naval Warfare
Systems Center, San Diego Driving around looking for
unsecured wireless networks
World Trade Center Damage Map: The City of New York, Urban
Data Solutions amp; CNN
List of Business Offices,
Tenants, and Companies in the World Trade Center: Gary Stock
Law Enforcement and Corrections Technology Center: National Institute of Justice
Added 10.2.2001
The Packetfactory
: Clearinghouse for Free Network Security Software - Mike Schiffman
Fundamentals of Electronic
Sergei A. Vakin
Ew 101 : A First Course in
Electronic Warfare: David L. Adamy
Talisker's List of Intrusion Detection
International Policy Institute for Counter-Terrorism: Boaz Ganor
FM 90-10 Military Operations on
Urbanized Terrain (MOUT): United States Army
Seismic Observations of the
World Trade Center Disaster: Lamont-Doherty Earth Observatory of
Columbia University
Information Technology amp; Operations
United States Military Academy
Defense Security Service: Department of Defense
Center for Strategic amp; International Studies: Strategic Insights on Current
amp; Emerging Global Issues
Added 8.27.2001
Security-Enhanced Linux: National Security Agency
Defensive Information Warfare: David S. Alberts
Information Security: An
Integrated Collection of Essays: Edited by Marshall D. Abrams,
Sushil Jajodia amp; Harold J. Podell
Computer Viruses in Electronic
Dr. Myron L. Cramer and Stephen R. Pratt
Fighting the Wily Hacker:
Modeling Information Security Issues for Online Financial
Institutions Using the SEAS Environment: Alok Chaturvedi, Mukul Gupta,
Shailendra Mehta amp; Lorenzo Valeri
The meaning of Eligible Receiver: The Crypt Newsletter
U.S.S. Liberty Homepage: Jim Ennes amp; Joe Meadors
Added 6.27.2001
Information Operations [.pdf]: United States Marine Corps
Warfighting Publication
Equipped To Survive: Douglas Ritter
: The Global Electronic
Reporting System for Outbreaks of Emerging Infectious
Diseases amp; Toxins
Journal of Military and Strategic Studies
: Centre for Military and Strategic Studies
Center for the Study of Chinese
Military Affairs: National Defense University
Cyber Threat Trends and US Network Security
: National Intelligence Council Chuck Connell
Jane's C4I Systems 2001-2002: Edited by Clive Walker
The Cult of the Dead Cow: cDc Communications
Added 5.1.2001
Swarming and the Future of
Conflict [.pdf]:
John Arquilla amp; David F. Ronfeldt
Cornerstones of Information Warfare: United States Air Force
Blind Man's Bluff: The Untold
Story of American Submarine Espionage: Sherry Sontag
The Spy Who Lost Me: Michelle Delio - Wired News
Whom the Gods Would Destroy: An
Information Warfare Alternative for Deterrence and
Maj. Robert D. Critchlow
The Ethics of Computer Network
William J. Bayles
Added 4.6.2001
Information Warfare: Hype or
Reality [.pdf]:
E. Anders Eriksson
Asymmetric Threats and the next QDR
: Kenneth McKenzie, Jr.

Added 3.23.2001
Microsoft, VeriSign Warn of
Security Hole:
Cameron Crouch,
Sources and Techniques of
Obtaining National Defense Science and Technology
Huo Zhongwen and Wang Zongxiao
Added 1.29.2001
Microsoft Admits Hack Attacks: Cameron Crouch,
U.S. Is Relaxing Rules on Sale of
Satellite Photos: Vernon Loeb - Washington Post
Pentagon IG Report on
Allegations of Breaches of Security by Dr. John M.
Deutch: Federation of American Scientists
Checklist for the Future of
Dr. John Hollister Hedley
Institute for Crisis, Disaster and Risk
George Washington University
Naval Intelligence Professionals: Furthering knowledge of the
art of maritime intelligence.
Institute for European and American Studies: Non-profit institute for the
analysis of security, intelligence, and policy issues.
Special Operations.Com: Information about U.S. and
International Special Operations teams
Added 11.6.2000
Russian merchant ships used in spying: Bill Gertz - The Washington
Pings and E-Arrows Fly in Mideast
The Washington Post
Information Security in a Third Wave
William P. Crowell, Deputy Director, NSA
NSA Korean War Commemoration: National Security Agency
SearchMil: Privately run search engine of U.S.
Military sites.
Photos of Sierra Leone: Doug Brooks
Added 9.8.2000
Managing the Information
Security Program: U.S. Air Force
Added 8.6.2000
A Look at Spy Satellites and Hollywood: The Washington Post
Man Poses as Astronaut, Steals NASA
Secrets :
Reuters News Service
Added 7.10.2000
Possible Soviet Responses to the
US Strategic Defense Initiative: Declassified Interagency
Intelligence Assessment
Added 6.25.2000
WHY SPY? The Uses and Misuses of
Stanley Kober - CATO Institute
The Complete, Unofficial TEMPEST
Information Page: Joel McNamara
FIRST: Forum of Incident Response and
Security Teams
Added 6.21.2000
Common Vulnerabilities amp; Exposures (CVE) Project: The MITRE Corporation
Added 6.14.2000
May 2000 GAO Report on FAA Computer
Security [.pdf]:
General Accounting Office
Added 6.9.2000
Countering the Changing Threat
Of International Terrorism: National Commission on Terrorism
The Inevitability of Failure: The Flawed
Assumption of Security in Modern Computing Environments
Peter A. Loscocco, Stephen D. Smalley, Patrick A.
Muckelbauer, Ruth C. Taylor,
Considerations for Allocating Resources
for Information Security [.pdf]: Marshall D.
Abrams, Carolyn M. Johnson, Jay J. Kahn, and Susan G.
King - MITRE Corporation
NASA NPG 2810.1 - Security of Information
NASA Chief Information Officer
Rainbow Series Library: National Computer Security
NOT the Orange Book: Paul H. Merrill
Added 4.22.2000
Missing PC Held Trove of Secrets: The Washington Post
It's Not What You Know,
It's Who You Know: Work in the Information Age: Bonnie Nardi
Added 3.13.2000
Toys for the U.S. Military?: Pros and Cons of laptops
and Palm Pilots for the military.
Added 2.18.2000
Improper Handling of
Classified Information by John M. Deutch: Central Intelligence
Activism, Hacktivism, and
Cyberterrorism: Dorothy E. Denning
Hostile Intelligence Threat
Department of Defense
Added 5.15.2000
NASA's Information Security
Vulnerability: United States General Accounting
Strategic Information
Warfare Rising: RAND Corporation
FM 34-8-2 Intelligence
Officer's Handbook: United States Army
FM 34-60
Counterintelligence: United States Army
Humanitarian Assistance and Disaster
Relief Assessments [.pdf]: United States Marine
Corps Warfighting Laboratory
Jane's C4I Systems
Edited by Clive Walker
Zen and the Art of Hacking: Richard Thieme - Internet
Cutting Out The Hackers: Ted C. Fishman -
The Economic Espionage Act
of 1996: Department of Justice - Computer
Security amp; Intelligence
Post Office Box 24 鈥 Golf Illinois
鈥 60029-0024
wk (at)
PGP KeySecurity amp; privacy notice
Spammers love this

Updated Time

Friend links: ProxyFire    More...
Site Map 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 200 250 300 350 400 450 500 550 600 610 620 630 640 650 660 670 680 690 700 710 720 730 740 750
TOS | Contact us
© 2009 Dev by MYIP Elapsed:32.960ms