xii Reader’s Guide to Related Documents Document 26: Mandiant APT1 Report: Exposing One of China’s Cyber Espionage Units (2013) Document 28: China and International Law in Cyberspace (2014) Document 29: Military and Security Developments Involving the People’s Republic of China (2014) Document 30: Cybersecurity Law of the People’s Republic of China (2016) Document 35: China Military Power (2019) Document 45: U.S. Charges Five Chinese Military Hackers for Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage (2014) Document 58: Unrestricted Warfare (1999) Document 68: People’s Republic of China National Cyberspace Security Strategy (2016) Documents Pertaining to the Democratic Peoples’ Republic of Korea Document 27: Military and Security Developments Involving the Democratic People’s Republic of Korea (2013) Document 34: Military and Security Developments Involving the Democratic People’s Republic of Korea (2017) Document 47: Executive Order 13687—Imposing Additional Sanctions with Respect to North Korea (2015) Documents Pertaining to the Russian Federation Document 31: Grizzly Steppe—Russian Malicious Cyber Activity (2016) Document 32: Assessing Russian Activities and Intentions in Recent U.S. Elections (2017) Document 33: Russia Military Power (2017) Document 69: Developments in the Field of Information and Communications Technology in the Context of International Security (2018) Executive Documents from the Office of the President of the United States Document 36: Presidential Decision Directive/NSC-63 (1998) Document 38: The Comprehensive National Cybersecurity Initiative (2009) Document 40: Executive Order 13636—Improving Critical Infrastructure Cybersecurity (2013) Document 42: National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience (2013) Document 43: Presidential Policy Directive 21—Critical Infrastructure Security and Resilience (2013) Document 48: Executive Order 13691—Promoting Private Sector Cybersecurity Information Sharing (2015) Document 51: Presidential Policy Directive 41: United States Cyber Incident Coordination (2016) Document 52: Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2017) U.S. Congressional Investigations and Testimony Document 37: Cyber Threat Source Descriptions (2005) Document 49: Cyberwarfare and Cyberterrorism: In Brief (2015) Document 53: Information Warfare: Issues for Congress (2018) Document 54: Cybersecurity: Selected Issues for the 115th Congress (2018) Document 73: Statement for the Record of Seán P. McGurk before the U.S. Senate Homeland Security and Governmental Affairs Committee (2010) Document 76: Statement of General Keith B. Alexander before the Senate Committee on Armed Services (2013) Document 78: Michael Rogers, “Testimony before the U.S. House Intelligence Committee” (2014) Document 80: Advance Policy Questions for the Honorable Ashton Carter (2015) Document 82: James Clapper, Testimony before the U.S. Senate Committee on Armed Services (2015) Documents Created by U.S. Government Agencies Document 39: Resilient Military Systems and the Advanced Cyber Threat (2013) Document 41: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented (2013) Document 44: Deterrence in the Age of Surprise (2014) Document 56: Developments in the Field of Information and Communications Technology in the Context of International Security (2018) U.S. Department of Defense Joint Publications and Doctrine Document 46: Joint Publication 3-13: Information Operations (2014)
Previous Page Next Page