DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Matt Rhoades
Matt Rhoades
Agenda Document No. 18-43-A
Party Foul: Inside the Rise of Spies, Mercenaries, and Billionaire Moneymen -- Printout -- TIME
The Cybersecurity Campaign Playbook: European Edition
Lessons and Recommendations from the 2020 General Election
Putin, Trump and Democracy's Slippery Slope Toward Oligarchy
Carterand Rosenbach
December 19, 2017 Records, FOIA, and Privacy Branch Office of Environmental Information Environmental Protection Agency 1200
December 19, 2017 SUBMITTED ELECTRONICALLY Honorable Arthur A. Elkins Jr. Inspector General EPA Office of Inspector General 1
Securing America's Electoral Systems
States Are on Front Lines of 2020 Election-Security Efforts
Belfer Center Newsletter: Spring 2018
Securing America's Digital Democracy: Preparing for 2020 Prepared
January 23, 2020
Campaign Cybersecurity Playbook
The State and Local Election Cybersecurity Playbook
Stuart Stevens, Romney's Chief Strategist and Svengali, Was Driving to Oxford on a Warm Evening in Late April
Agenda Document 18-43-E
Manual Internacional De Ciberseguridad Para Campañas Electorales Edición En Español
Top View
Election Committee Strategic Plan
Immigration Policy Opinion and the 2016 Presidential Vote Issue Relevance in the Trump-Clinton Election
Download the Summer 2016 Issue (PDF)
The George Washington University Magazine Fall 2015
FOOD for THOUGHT CHEF JOSÉ ANDRÉS TEACHES Science, CULTURE, and Diplomacy in “THE WORLD on a PLATE.”
Election Security Hearing Select Committee on Intelligence United States Senate
Why Has a U.S. Republican Attack Operation Opened Shop in the UK?
GW Magazine/Summer 2011 12
Election Manipulation: Is America’S Voting System Secure?/John Allen
A Republican Firm Is Targeting EPA Staff Who Have Donated to Democrats
Selecting a Vice President: Advice for Presidential Candidates
Despite Changing Dynamics, Republicans Will Nominate the “Next in Line” Candidate for President in 2012
FEDERAL ELECTION COMMISSION Washington, DC 20463 April 25
The Cybersecurity Campaign Playbook