Back to Main/Home Page


Ok for the politically correct, the new title should be Information Operations.

FYI, the new terms IAW the new JCS pubs are:

IW=IO ---- CI and Info Protection=Information Assurance

I got this info straight from the JCS OPSEC Officer!

All FREE Made Out of Individual's Dedication and Off Duty Time

Computer and Information Security Related Sites



Office of the Director of Information Systems for Command, Control, Communications, and Computers

Army DOIM Homepage

Computers, Communications and Information Dissemination for Army personnel

U.S. Army ODISC4 has computer-based training (CBT)

ISSO Certification Course

ISSO Course Recommended Websites, (Best list!)

Army-Wide Information Technology / Information Management Policy Update

Army Website Policy 30 Nov 98

DoD Web Policy

Department of Defense Instructions, Regulations, and Publications

Protection of Transmitted Sensitive But Unclassified (SBU) Information

Information Management - Personal Computer Guidance

Federal Information Processing Standards Publications FIPSPUB 140-1 and applies to SBU

Rainbow Publications at the National Computer Security Center 

DoD Computer Network Defense

GSA Office of Information Technology Virtual IT Library

Joint Information Operations Center


Marine Corps CIO

Use of Anti-Viral (AV) Software in Army Automated Information Systems (AIS)

Inappropriate Use of Electronic Mail Msg DTG 151106Z APR 98

Computer Software Piracy Message DTG 141315Z Dec 98

US Army Publishing Agency Bookshelves

Fleet Internet Security Handbook


NAVY Information Warfare-Protect Training Message 

Air Force Computer Emergency Response Team

The Required US Gov Warning

Computer Security Institute

National Computer Security Association

Institute of Electrical and Electronics Engineers (IEEE)

ARPA: Information Survivability

IW from Canada

Framework and Open Reference Model for Information Security (FORMIS)

Journal of Electronic Defense

Institute for the Advanced Study of Information Warfare

Fleet Intel Home Page

RAND Research Review

CADRE Air Chronicles

Glossary of Information Warfare Terms

PRC espionage handbook ("Sources and Techniques of Obtaining National Defense Science and Technology Intelligence," By Huo Zhongwen and Wang Zongxiao, 1991)

Security Information from Navy

Government INFOSEC Organizations

Informational and Data Warehouse Sites

Security Incident and Advisory Organizations


Click on picture for info on:


The mother of all INFOSEC/COMPUSEC Hotlists comes from COAST. Sometimes referred to as Spaford's hotlist, this web page URL is

Another Site Containing Current Info Regarding Virus Hoaxes

Computer Security Alerts Site

Infoworld Security Audit Resource Guide

Institute For The Advanced Study Of Information Warfare

Virtual World of Intelligence


Forum of Incident Response and Security Teams

Information Warfare (Infowar) Links Page - Wynn Schwartau's site

CIAC - the U.S. Department of Energy's Computer Incident Advisory Capability

Air Force Computer Emergency Response Team - AFCERT

Hackers: Friends or Foes?

Internet Sleuth -- Finding People:  Scroll down to the Reverse Lookup

CERT® Coordination Center Carnegie Melon Univ.

Forum of Incident Response and Security Teams (FIRST) -- Good starting point for any Information Systems Security research

2600 Computer Hacker Magazine Home Page

FBI National Computer Crime Squad

OSE Co  Sales and Consulting Company


This is for all those people who get the hoaxes.  Great links to check hoax virus and good deals.


The Army Counterintelligence Discussion Group mailing list is open to all active, reserve, former, and retired Army Counterintelligence Special Agents who held the MOS 97B, 351B, 35E, 36A or GS-0132 civilians who are graduates of the US Army CI Special Agent Course. This is a private moderated list. Membership requests will be approved by the Listowner after verification of a subscribers CI status. The primary purpose of the list is to discuss CI trends, news, current events, and history and serve as a general professional forum for current, former, and retired Army CI Special Agents to hold virtual discussions in a professional forum.

Subscribing is easy, if you qualify, and you can unsubscribe at any time.

Click here to subscribe to this list.

NEW!!!This was recently donated. Some of the older links have turned to porno for money.

Thanks to EJL for the below links from other kids! True Crackers!

Hacking, Warez, and Crackz

These hacker links courtesy Yahoo!
The New Hacker's Dictionary
B@cKaCiD's W@rEz PaLaCe
AOL Watch
Entrance to the Hideout
No Title
The Asylum
The Guide To Hacking - Beginner Version
The Jolly Rogers Cookbook ver. 4.14 (frames version)
Tret's Warez

This Week's Series from the NMIA Zgram

A lot of these sites also contain graphic adult material - so if that
offends you and/or your office policy maybe you should reconsider checking out some of these sites. For any of you who are in the business of
tracking such sites - well, you're already used to it. A buddy told me
that the reason so many of these sites take x-rated ads and links is so
that they will have funds to keep the sites going.

Remember that these sites often move from URL to URL. So if you are in the tracking business - visit them now. I've verfied the links for each site
listed. Verifying the links was no easy matter, many of the sites were so
busy that I had to try several times - that's an indicator of...

2600 Magazine
ZGram Suggested URL:

7th Sphere
ZGram Suggested URL:

Active Matrix's Hideaway
ZGram Suggested URL:

Anarchist Hacker Klan
ZGram Suggested URL:

Andy's Home Page
ZGram Suggested URL:

Axur05 ZGram Suggested URL:

Brian's Hacking Links and Files
ZGram Suggested URL:

CatMan's Lair
ZGram Suggested URL:

Corruption Now
ZGram Suggested URL:

Cosmos' Underground
ZGram Suggested URL:

Cryptulum, The
ZGram Suggested URL:

Cube's Territory
ZGram Suggested URL:

Cyborg's Place 2
ZGram Suggested URL:

ZGram Suggested URL:

Cyrus's Haven
ZGram Suggested URL:

Dark Dante Dot Com
ZGram Suggested URL:

Dark Dante'Z Warez and H/P/V/A/C Site
ZGram Suggested URL:

Darth's Place
ZGram Suggested URL:

Don't Call Me CYBER, Punk
ZGram Suggested URL:

18. Bokler's Site - Cryptographic tools for software development.
How well do the systems and software you use protect your data? The level
of security provided by much of the software in common use today is very
weak. This page illustrates the risks of entrusting your data to software
or systems which are cryptographically weak or logically flawed. The
"cracker software" listed on this page exploits these weaknesses. The
intent is not to low-rate anyone's products; the objectives are to:
a.provide a few datapoints on cryptographic strength, assess risk exposure in your environment, and developers avoid common mistakes in new implementations.
ZGram Suggested URL:

19. bsy's Security Related Net-pointers
Fine collection of links to conferences, books, papers, sites and more.
ZGram Suggested URL:

20. Encryption Privacy and Security Resource Web Site
Latest on the Encryption Policy status and resources.
ZGram Suggested URL:

21. The International PGP HomePage
The title says it all!
ZGram Suggested URL:

22. NetSafe Web Site
Techniques, news, and software - definitely worth a look.
ZGram Suggested URL:

From another Zgram!

Resources Computer Crime Resources on the WebS.

28. Computer Crime Laws by State

ZGram suggested URL:

29. Department of Justice Laws and Crime Statistics

ZGram suggested URL:

30. Canadian Security Establishment -- Information Technology Security Links

ZGram suggested URL:

31. The CERT Coordination Center

ZGram suggested URL:

32. International review of criminal policy - United Nations Manual on the

prevention and control of computer-related crime

ZGram suggested URL:

33. Computer and Internet Security Resources

ZGram suggested URL:

34. Computer Crime Research Resources

ZGram suggested URL:

*. Computer Security Institute

ZGram suggested URL:

*. Yahoo's Computer Security Page

ZGram suggested URL:


The Hacker Crackdown
by Bruce Sterling
ISBN 0-553-08058-X
formally catalogued by the Library of Congress as "1. Computer crimes -- United
States. 2. Telephone -- United States -- Corrupt practices. 3. Programming
(Electronic computers) -- United States -- Corrupt practices." 'Corrupt

The paperback is ISBN 0-553-56370-X

This book should be REQUIRED reading for anyone wanting to know anything about
hacking... amazingly comprehensive and illustrative. It's available free online, but is copyrighted.
Permission is granted to make and distribute verbatim copies of this booklet provided the copyright
notice and this permission notice are preserved on all copies.


14. More in our series on Hacker Sites.

nUcLeii's world
ZGram Suggested URL:

NuKeM - includes a software serial number database.
ZGram Suggested URL:

Orlok's Domain
ZGram Suggested URL:

Philadelphia Hackers
ZGram Suggested URL:

Poulsen, Kevin - Switch Room
ZGram Suggested URL:

Power Empire
ZGram Suggested URL:|HyBrIdX|.html

Pri$m's Domain - to get in just click on the prism (duh!)
ZGram Suggested URL:

Prince of Thieves! WareZ HeadQuarterZ ZGram Suggested URL:

ZGram Suggested URL:

QuiK_kOS House of Hack
ZGram Suggested URL:

Rastastugan wareZ
ZGram Suggested URL:

Riffer's House'o'Software - I love the explanation of why this page was "down" for a month.
ZGram Suggested URL:

Rsnake's Lair
ZGram Suggested URL:

Email me if you have other good links for this page!

Page Dated 08/18/07  and counter started 08/18/07Hit Counter.

To Subscribe to Security_Manager_Info:


To Subscribe to Security_Manager_Info:

WEBPAGE  Of info on Joining ACIDG

Webpage of 

If you do not fall into the ACIDG field of membership but desire to learn about CI, sign up at this web site 

Below is USMC CI Asso Link

Marine Corps Counterintelligence Association

Back to Main/Home Page

© 1993-2002 Omni Sys. Enterprises, Inc.