Law Library Resources
Aviation Law
Bankruptcy Law
Business Law
Constitutional Law
Corporate Law
Criminal Law
Elder Care Law
Energy Laws and Legislation
Environmental Law
General Law Sites
Immigration Law
Intellectual Property Law
International Law
IPOs
Labor Law
Legal Reference
-
Acts
-
Codes
-
Decisions
-
Dictionaries
-
Directories
-
Encyclopedias
-
Periodicals
Legislation
Mergers & Acquistions
Miscellaneous Law
Parliamentary Procedures
Patent/Tradmark Law
Real Estate Law
Regulations
State Law & Directories
Taxes
-
Forms-Federal
-
Forms-State
-
Forms-General
-
Tax Law
Wills, Trusts & Estates
Office of the Director of National
Intelligence
Electronic Reading Room
|
|
DCI Directive 6/4
Personnel Security Standards and Procedures
Governing Eligibility for Access to Sensitive Compartmented
Information (SCI)
http://www.fas.org/irp/offdocs/dcid6-4/index.html
This
is one of the best tools, government paid for
and operated. What Is the ADR?
The
Adjudicative Desk Reference (ADR) provides convenient
access to the following information:
-
Adjudicative Guidelines: This is the official U.S.
Government policy that guides decisions on an individual’s
eligibility for access to classified information, that is,
eligibility for a security clearance.
-
Supplemental Information to the Adjudicative Guidelines:
This is a large compendium of background information and
reference materials on the diverse human behaviors covered by
the 13 issue areas of adjudicative concern. As noted below,
Supplemental Information is not U.S. Government policy. It is a
job aid to assist security personnel in making informed
judgments to implement policy.
- Policy
Documents: Executive Orders 12968 and 10450 and
Director of Central Intelligence Directive 1/14 are the
principal national-level policy documents that guide the U.S.
Government personnel security program.
The Personnel Security Committee of the U.S.
Government Security Policy Board considers
this program ARD a valuable tool and encourages
its use by all U.S. Government agencies that make
personnel security decisions. The program was
developed by the Security Research Center of the
Defense Security Service. It has been reviewed by
DoD Public Affairs and approved for public release.
This is version 99.1-html dated January 1999.
|
Approved by the President March 24, 1997
|
Click here
for full report!
The Internet Fraud Complaint
Center (IFCC)
This is for all those people who get the
hoaxes. Great links to check hoax virus and good deals.
http://www.symantec.com/avcenter/hoax.html
http://hoaxbusters.ciac.org/
http://kumite.com/myths
http://www.us-cert.gov/
For proper reporting.
http://www.cert.org/
Some good portals.IFyou are authorized
https://cybercop.esportals.com
https://us-cert.esportals.net/
DHS Threat Advisories, Bulletins, Memoranda
(cleared for public release)
April 19, 2005 – Information Bulletin –
Unauthorized Peer to Peer (P2P) Programs on Government
Computers (PDF, 4 pages - 50 KB) ..
I am looking for links for
cyber Intell. Send to
webmaster at this domain.
Dan W's Cyber Reference List
This is really the only cyber list you need. It is now web page
formatted. For additions, send which section
your addition belongs, plus cut and paste the item above where your
link should go. Then we can cut & paste it into the chart.
http://whois.net/
http://www.networksolutions.com/en_US/whois/index.jhtml
http://geektools.com/whois.php
http://geektools.com/tools.php
NETBLOCK
information is available via ARIN…
http://www.arin.net/index.html
http://ws.arin.net/cgi-bin/whois.pl Just type in a valid IP…
Lumeta IPSONAR =
www.lumeta.com
http://johnny.ihackstuff.com/
The Internet Fraud Complaint
Center (IFCC)
2600
Computer Hacker Magazine Home Page
Symantec/Norton Anti-Virus Download Link, so you will
not need the above links!
This is for all those people who get the hoaxes.
Great links to check hoax virus and good deals.
http://www.symantec.com/avcenter/hoax.html
http://hoaxbusters.ciac.org/
http://kumite.com/myths
http://www.us-cert.gov/
For proper reporting.
http://www.cert.org/
DEFCON
DHS Threat Advisories, Bulletins, Memoranda (cleared for public
release)
April 19, 2005 – Information Bulletin – Unauthorized
Peer to Peer (P2P) Programs on Government Computers (PDF, 4 pages - 50
KB) ..
Back
to Main/Home Page
|