30+ Years of Freedom of Information Action

Key Cyber Vault Postings

 

Cybersecurity: When Hackers Went to the Hill — Revisiting the L0pht Hearings of 1998
Briefing Book 655
Jan 9, 2019

Landmark Senate Hearings Exposed Risks and Threats That Are Still Being Confronted


Joint Task Force ARES and Operation GLOWING SYMPHONY: Cyber Command’s Internet War Against ISIL
Briefing Book 637
Aug 13, 2018

Declassified documents allow preliminary assessment of anti-ISIL strategy


Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations
Briefing Book 634
Aug 1, 2018

Previously unknown third phase revealed in declassified NSA video and DOD documents


Cyber Vault Highlights: 40+ primary sources every cyber student needs
Briefing Book No. 590
May 3, 2017

From the seminal 1967 Prophecy to the latest 2017 Grizzly Steppe Hack Analysis



The United States and Cyberspace: Military Organization, Policies, and Activities
Briefing Book No. 539
January 20, 2016

The focus on cyberspace has increased dramatically in recent years – as illustrated by the increasing production of documents on the subject.



Cyberspace and U.S. National Security
Briefing Book No. 424
April 26, 2013

National Security Agency Tasked with Targeting Adversaries' Computers for Attack Since Early 1997, According to Declassified Documents.



The Secret Sentry Declassified
Briefing Book No. 278
June 19, 2009

Declassified Documents Reveal the Inner Workings and Intelligence Gathering Operations of the National Security Agency



The National Security Agency Declassified
Briefing Book No. 24
March 11, 2005

Internet wiretapping mixes "protected" and targeted messages, Info Age requires rethinking 4th Amendment limits and policies, National Security Agency told Bush administration