Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
5 sources · matching filters · sorted by citation density
Sort
ACybersecurity5 sources
01

Federal guidance on protecting GPS/GNSS-dependent infrastructure from spoofing and jamming. Resilient PNT executive order context, sector-specific resilience profiles.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
02

Expert analysis of how international law applies to cyber operations. Sovereignty, use of force, law of armed conflict in cyberspace. The primary reference for legal/policy questions in cyber warfare.

ResearchIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
03

NSA technical guidance on nation-state TTPs, hardening guidance for high-value targets, and joint advisories with CISA/FBI. Useful for advanced cyber-EW and military-adjacent questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
04
DoD Cyber Strategy (2023)U.S. Department of Defense

Defend forward, persistent engagement, building partner capacity. Context for military cyber operations questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
05

Joint doctrine for cyberspace operations: offensive/defensive cyberspace operations, DoDIN ops, command relationships. The U.S. military's authoritative cyber doctrine.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.