Close
  • Cyber Crime
  • Cyber Security
  • Information Operations
  • Homeland Security
  • Key Documents
    • Homeland Security
    • Space Operations
    • Information Operations
  • Home
  • Tag Cloud
  • Mailing List
  • About
  • Contact
  • Welcome, Guest
  • Sign in

  • Register
Menu

IWS

  • Cyber Crime
  • Cyber Security
  • Information Operations
  • Homeland Security
  • Key Documents
    • Homeland Security
    • Space Operations
    • Information Operations
Search

Select Congressional Research Service (CRS) Reports

CRS Congress

National Security

Deep Fakes and National Security Report Version 4.0, June 08, 2021 

Defense Primer: Emerging Technologies Version 7.0, June 08, 2021

Department of Defense Counter-Unmanned Aircraft Systems Version 10, June 07, 2021

China’s Military: The People’s Liberation Army (PLA) Version 2.0, June 04, 2021

Defense Primer: U.S. Precision-Guided Munitions Version 10, June 04, 2021

National Security Implications of Fifth Generation (5G) Mobile Technologies Version 16, June 04, 2021


Terrorism

Al Qaeda: Background, Current Status, and U.S. Policy, June 2021

 

Recent Posts

  • CISA, FBI, NSA, and International Partners Issue Advisory on Demonstrated Threats and Capabilities of Russian State-Sponsored and Cyber Criminal Actors April 20, 2022
  • Lindy Cameron outlines importance of global allies to beat online threats at international conference July 20, 2021
  • CISA and Partners Hold Annual Election Security Exercise July 20, 2021
  • Safeguarding Critical Infrastructure against Threats from the People’s Republic of China July 19, 2021
  • COVID-19 fraudster guilty of cyber scam July 16, 2021

Key Documents

  • Information Operations (IO)
  • Homeland Security (HS)
  • Space Operations (SO)

INFOCON Mailing List

SUBSCRIBE to get the latest INFOCON Newsletter.

Check your inbox or spam folder to confirm your subscription.

Most Viewed Posts

  • Information Environment: DOD Operations Need Enhanced Leadership and Integration of Capabilities (7,115)
  • Science & Tech Spotlight:Deepfakes (6,979)
  • Defined Contribution Plans:Federal Guidance Could Help Mitigate Cybersecurity Risks in 401(k) and Other Retirement Plans (6,669)
  • Iranian Hackers Pose as UK Scholars to Target Experts (6,530)
  • Lindy Cameron outlines importance of global allies to beat online threats at international conference (6,367)

Tag Cloud

Business Email Compromise (4) Capitol Attack (4) China (4) CISA (16) Colonial Pipeline Incident (25) Crime (5) Critical Infrastructure (36) Cryptocurrency (11) Cyber (99) Cyber Attack (33) Cybercrime (50) Cyber Security (8) Cyberspace Operations (8) Cyber Threats (14) DarkSide (5) DHS (8) DOD (19) DOJ (25) Domestic Terrorism (7) Executive Order (4) FBI (44) Fraud (14) GAO (15) GCHQ (4) Hacking (7) Hearing (16) Homeland Security (7) Malware (7) National Security (7) NCSC (21) NSA (14) Phishing (5) Pipeline Network (13) Ransomware (43) Russia (6) Scammers (6) SolarWinds (7) Space Domain (4) Space Operations (3) Supply Chain Security (6) Terrorism (11) UK (7) Vulnerabilities (6) White House (17) Zero Trust (4)

Categories

  • Cyber Crime (75)
  • Cyber Security (70)
  • Homeland Security (26)
  • Information Operations (25)
  • Intelligence (1)
  • Space Operations (4)

Archive

  • April 2022
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • February 2020
  • May 2019
  • February 2019
  • July 2017
© 2025 IWS. All rights reserved.
scroll to top