Skip to main content Skip to search Skip to search results

Box 18

 Container

Contains 33 Collections and/or Records:

Effects of War on Production, 1977

 File — Box: 18, Folder: 1
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

War Termination and "How Much is Enough", 2005

 File — Box: 18, Folder: 2
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Preventing and Limiting the Impact of Economic Attacks, 2005-2006

 File — Box: 18, Folder: 3
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Defense Threat Reduction Agency: Attacks on Oil Production and Distribution, 2005-2006

 File — Box: 18, Folder: 4
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Iraq: Oil Infrastructure, 2006

 File — Box: 18, Folder: 5
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Modern Day Piracy and Economic Terrorism, 2002-2006

 File — Box: 18, Folder: 6
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Combating Nuclear Smuggling, 2005

 File — Box: 18, Folder: 7
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Combating Nuclear Smuggling, 2002-2006

 File — Box: 18, Folder: 8
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

National Power and National Security in the 20th Century, 1999

 File — Box: 18, Folder: 9
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

The National Information Systems Protection Plan Version 1.0, 1999

 File — Box: 18, Folder: 10
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Telecommunications Protection, 1999

 File — Box: 18, Folder: 11
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Meetings With Andrew Marshall, 1998

 File — Box: 18, Folder: 12
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Global Diffusion of the Internet Study, 1998

 File — Box: 18, Folder: 13
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Global Diffusion of the Internet Study, 1998

 File — Box: 18, Folder: 14
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Articles on Soviet Computing, 1979-1994

 File — Box: 18, Folder: 15
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Information Infrastructure Project, 1998-1999

 File — Box: 18, Folder: 16
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

The Information Technologies and Defense: A Demand-Pull Assessment, 1996

 File — Box: 18, Folder: 17
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century, 1998

 File — Box: 18, Folder: 18
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

An Examination of High-Performance Computing Export Control Policy in the 1990's, 1996

 File — Box: 18, Folder: 19
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Cross-Industry Working Team Papers, 1994-1998

 File — Box: 18, Folder: 20
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Science & Technology Review: Alert to Computer Security, 1998

 File — Box: 18, Folder: 21
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

National Defense University Catalogue, 1998

 File — Box: 18, Folder: 22
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

On the Internet Publication, 1999

 File — Box: 18, Folder: 23
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Fax to William J. Perry on Y2K Crisis, 1998

 File — Box: 18, Folder: 24
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Internet Security Articles, 1987-1999

 File — Box: 18, Folder: 25
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Harvard Journal of Law & Technology Articles, 1997

 File — Box: 18, Folder: 26
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Presentation from the Computer Security Session of the 11th International (Amaldi) Conference on the Problems of Global Security, 1998

 File — Box: 18, Folder: 27
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Lecture Notes Used at a Session on Information Security at the RAND Graduate Institute, 1999

 File — Box: 18, Folder: 28
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Some Security Principles and Their Application to Computer Security, 1977

 File — Box: 18, Folder: 29
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Commerce Department's New Point Man on the Net, 1998

 File — Box: 18, Folder: 30
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Embedded Systems and the Year 2000 Problem, 1998

 File — Box: 18, Folder: 31
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Business Plan for Secure Guard Development Using the Generic Trusted Intermediary (GTI) Software Framework, 1994

 File — Box: 18, Folder: 32
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.

Critical Foundations: The Report of the President's Commission on Critical Infrastructure Protection, 1997

 File — Box: 18, Folder: 33
Scope and Contents The collection includes reports and research files related to his professional endevors, and personal papers reflecting his scholastic training and personal interests. The records reflect his involvement in researching the Shroud of Turin, Information and Cyber security, Infrastructure and terrorism, and records related to his professional positions and research. The records are grouped roughly by topic, and is currently unprocessed.