|Submitted||Aug. 2, 2016|
MuckRock users can file, duplicate, track, and share public records requests like this one. Learn more.
To Whom It May Concern:
This is a request under the Freedom of Information Act. I hereby request the following records:
Please conduct a full-text case-insensitive search across agency emails, memos, policy guides, directives, and other relevant materials for the following pairs of terms, which represent a specific class of exaggerated threat, relevant to public interest in national critical infrastructure security:
"black swan" AND "hacker"
"lone wolf" AND "hacker"
"pearl harbor" AND "hacker"
"critical infrastructure" AND "hacker"
"scale free" AND "hacker"
"high-order chaotic" AND "hacker"
"graph theory" AND "hacker"
"sustained destruction" AND "hacker"
"decentralized autonomous" AND "hacker"
"existential threat" AND "hacker"
"state of emergency" AND "hacker"
"high-tech insurgent" AND "software"
"cyber terrorist" AND "hacker"
Please provide a count of materials withheld for any reason and a rationale for withholding them. Thank you!
The requested documents will be made available to the general public, and this request is not being made for commercial purposes.
In the event that there are fees, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM, DVD-R, BD-R if not.
Thank you in advance for your anticipated cooperation in this matter. I look forward to receiving your response to this request within 20 business days, as the statute requires.
There are no files associated with this request.