Papers on Information Warfare and Related Subjects

"The more complex our security becomes, the more complex our enemy's efforts must be. The more we seek to shut him out, the better he must learn to become at breaking in. Each new level of security that we manage becomes no more than a stepping-stone for him who would surpass us, for he bases his next assault upon our best defenses." From This Alien Shore by C.S. Friedman

2000

07/24/00 Committee on the Judiciary - Perrine Statement, a timely piece on freedom and privacy.

Protecting Network Infrastructure at the Protocol Level

Recommendations for Improving the Security of Solaris 8.

The Intrusion Detection System Evaluation.

Forensics Frequently Asked Questions (FAQ)

Computer and Network Security: Best Practices

An Introduction to Intrusion Detection and Assessment


1999

Strategic Scanning and Assessments of Remote Hosts (SSARH)

Improving the Security of Your Site by Breaking Into It.

Hacker Mythology 101

A Hacker Taxonomy

Observations about Hackers and the Network Security Industry.

The Zenith Star (Eligible Receiver Redux)

The Internet Auditing Project (beta 1)


1998

Eligible Receiver (The Government takes Notice)


shrdlu AT deaddrop DOT org

Last modified: Sat Oct 30 23:13:15 PDT 2004