Search

collationry

Tristram Shandy got a flash drive

The Church Committee

Bernstein, Carl, The CIA and the Media: How America’s Most Powerful News Media Worked Hand in Glove with the Central Intelligence Agency and Why the Church Committee Covered It Up, Rolling Stone, 1977: PDF Continue reading “The Church Committee”

Legal Tools to Deter Travel by Suspected Terrorists: A Brief Primer, CRS Reports & Analysis – Legal Sidebar, 16 Nov 2015: PDF

CIA Inspector General

Lists of investigations closed, 2013 – 2014: PDF | 2007 – 2011: PDF

Radicalization

Neurobiological Insights on Radicalization and Mobilization to Violence, Joint Chiefs of Staff, 7 Jun 2012: PDF

Preface: This concise review presents theories, findings, and techniques from the neurobiology and cognitive sciences, as well as insights from the operational community, to provide a current and comprehensive description of why individuals and groups engage in violent political behavior. This report is based primarily on recent findings from the academic community. It has been compiled with the policy, planning, and operational community as the primary audience.

Researching

Mansfield, Jerry W., Researching Current Federal Legislation and Regulations: A Guide to Resources for Congressional Staff, CRS, 9 Nov 2015: PDF

Most of the resources are publicly available on the open web or through most libraries.

Cell Phone Investigations

Edens, Aaron, Cell Phone Investigations, Police Publishing, 2014: HTML

A 46-page evaluation copy of a 338-page book by a retired law enforcement officer and mobile phone examiner.  Includes a discussion of the location histories — “one of the most intriguing and useful data sets collected by Google and obtainable with a search warrant” — referred to here.

Cell Phone Location Tracking Laws by State, ACLU, 2015: HTML

Winter, Jana, How Law Enforcement Can Use Google Timeline to Track Your Every Move, The Intercept, 6 Nov 2015: HTML (more…)

Cybersecurity

Mobile Device Security: Cloud & Hybrid Builds, Cybersecurity Practice Guide, National Institute of Standards and Technology, Special Publication 1800-4: Continue reading “Cybersecurity”

DOD and Uniformed Services Manuals

U.S. Army cryptologic linguist (MOS 98G) training manual, restricted, Dec 2003: PDF

DOD Special Access Program (SAP) Security Manual: Physical Security, 21 Sep 2015: PDF Continue reading “DOD and Uniformed Services Manuals”

Blog at WordPress.com.

Up ↑

Design a site like this with WordPress.com
Get started