Here are entered works on tracking, analyzing, and countering digital security threats. Works on the collection and processing, for subsequent intelligence purposes, of information derived primarily from electronic signals that do not contain speech or text are entered under Electronic intelligence.
Here are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device.