1. Alexander, K.
(2013), “Cybersecurity: preparing for and responding to the enduring threat”,
Statement Of General Keith B. Alexander, USA Commander, United States Cyber Command Director, National Security Agency Chief, Central Security Service Before The Senate Committee On Appropriations
, US Senate Committee On Appropriations, Washington, DC.
2. Borum, R.
,
Felker, J.
and
Kern, S.
(2014), “Cyber intelligence operations: more than just ones and zeroes”, Proceedings of the Marine Safety and Security Council: The US Coast Guard Journal of Safety and Security at Sea, Washington, DC, Vol. 71 No. 4, pp. 65-68.
3. Center for Strategic and International Studies
(2008), “Securing cyberspace for the 44th Presidency”, Center for Strategic and International Studies, Washington, DC, available at: http:csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf
4. Central Intelligence Agency
(2004),
Conference Report: Intelligence for a New Era in American Foreign Policy
, Central Intelligence Agency, Washington, DC, pp. 3-4.
5. Dennesen, K.
,
Felker, J.
,
Feyes, T.
and
Kern, S.
(2014), “Strategic cyber intelligence”, Cyber Intelligence Task Force, Intelligence and National Security Alliance (INSA) White Paper, INSA, Washington, DC.