5 Results for:

June 19, 2018

Cybersecurity
The Theft and Reuse of Advanced Offensive Cyber Weapons Pose A Growing Threat

Almost exactly a year ago, North Korea and Russia reused a vulnerability stolen from the U.S. government to conduct the WannaCry and NotPetya ransomware attacks. Is the theft and reuse of vulnerabili…

NSA

February 16, 2005

Iraq
IRAQ: The Most Wanted

This publication is now archived. What is the status of the high-ranking Baathist leaders on the coalition’s most-wanted list?The majority of the 55 individuals pictured on a deck of cards distribute…

January 27, 2005

Iraq
IRAQ: Grand Ayatollah Ali al-Sistani

This publication is now archived. Who is the Grand Ayatollah Ali al-Sistani?He is the most important Shiite cleric in Iraq, where the population is about 60 percent Shiite. The reclusive, Iranian-bor…

February 2, 2005

Iraq
IRAQ: The Role of Tribes

This publication is now archived. What part can tribes play in Iraqi politics?Experts disagree. U.S. military officials have sought the cooperation of many local tribal leaders, but it is difficult t…

February 16, 2005

Iraq
IRAQ: Who’s in charge?

This publication is now archived. Who’s in charge of Iraq now?The U.S.-led occupation government has begun to gradually hand over power to the interim government named June 1, but it will remain the …