Law Library Resources
Aviation Law
Bankruptcy Law
Business Law
Constitutional Law
Corporate Law
Criminal Law
Elder Care Law
Energy Laws and Legislation
Environmental Law
General Law Sites
Immigration Law
Intellectual Property Law
International Law
IPOs
Labor Law
Legal Reference
-
Acts
-
Codes
-
Decisions
-
Dictionaries
-
Directories
-
Encyclopedias
-
Periodicals
Legislation
Mergers & Acquistions
Miscellaneous Law
Parliamentary Procedures
Patent/Tradmark Law
Real Estate Law
Regulations
State Law & Directories
Taxes
-
Forms-Federal
-
Forms-State
-
Forms-General
-
Tax Law
Wills, Trusts & Estates
Office of the Director of National Intelligence Electronic Reading Room
|
|
DCI Directive 6/4 Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)
http://www.fas.org/irp/offdocs/dcid6-4/index.html
This is one of the best tools, government paid for and operated. What Is the ADR?
The Adjudicative Desk Reference (ADR) provides convenient access to the following information:
- Adjudicative Guidelines: This is the official U.S. Government policy that guides decisions on an individual�s eligibility for access to classified information, that is, eligibility for a security clearance.
- Supplemental Information to the Adjudicative Guidelines: This is a large compendium of background information and reference materials on the diverse human behaviors covered by the 13 issue areas of adjudicative concern. As noted below, Supplemental Information is not U.S. Government policy. It is a job aid to assist security personnel in making informed judgments to implement policy.
- Policy Documents: Executive Orders 12968 and 10450 and Director of Central Intelligence Directive 1/14 are the principal national-level policy documents that guide the U.S. Government personnel security program.
The Personnel Security Committee of the U.S. Government Security Policy Board considers this program ARD a valuable tool and encourages its use by all U.S. Government agencies that make personnel security decisions. The program was developed by the Security Research Center of the Defense Security Service. It has been reviewed by DoD Public Affairs and approved for public release. This is version 99.1-html dated January 1999.
|
Approved by the President March 24, 1997
|
Click here for full report!
The Internet Fraud Complaint Center (IFCC)
This is for all those people who get the hoaxes. Great links to check hoax virus and good deals.
http://www.symantec.com/avcenter/hoax.html
http://hoaxbusters.ciac.org/
http://kumite.com/myths
http://www.us-cert.gov/ For proper reporting.
http://www.cert.org/
Some good portals.IFyou are authorized
https://cybercop.esportals.com
https://us-cert.esportals.net/
DHS Threat Advisories, Bulletins, Memoranda (cleared for public release)
April 19, 2005 � Information Bulletin � Unauthorized Peer to Peer (P2P) Programs on Government Computers (PDF, 4 pages - 50 KB) ..
I am looking for links for cyber Intell.
Send to webmaster at this domain.
Dan W's Cyber Reference List This is really the only cyber list you need. It is now web page formatted. For additions, send which section your addition belongs, plus cut and paste the item above where your link should go. Then we can cut & paste it into the chart.
http://whois.net/
http://www.networksolutions.com/en_US/whois/index.jhtml
http://geektools.com/whois.php
http://geektools.com/tools.php
NETBLOCK information is available via ARIN�
http://www.arin.net/index.html
http://ws.arin.net/cgi-bin/whois.pl Just type in a valid IP�
Lumeta IPSONAR = www.lumeta.com
http://johnny.ihackstuff.com/
The Internet Fraud Complaint Center (IFCC)
2600 Computer Hacker Magazine Home Page
Symantec/Norton Anti-Virus Download Link, so you will not need the above links!
This is for all those people who get the hoaxes. Great links to check hoax virus and good deals.
http://www.symantec.com/avcenter/hoax.html
http://hoaxbusters.ciac.org/
http://kumite.com/myths
http://www.us-cert.gov/ For proper reporting.
http://www.cert.org/
DEFCON
DHS Threat Advisories, Bulletins, Memoranda(cleared for public release)
April 19, 2005 � Information Bulletin � Unauthorized Peer to Peer (P2P) Programs on Government Computers (PDF, 4 pages - 50 KB) ..
Back to Main/Home Page
|