35+ Years of Freedom of Information Action

The Cyber Vault Project

An online resource documenting cyber activities of the U.S. and foreign governments as well as international organizations

 

Generous funding provided by
The William and Flora Hewlett Foundation

Featured Article

Secret

 

OVERCLASSIFICATION AND ITS IMPACT ON CYBER CONFLICT AND DEMOCRACY

As the Cyber Vault project continues to combat the issue of overclassification in the study of cyberspace, Jason Healey and Dr. Robert Jervis discuss the “consequences of one-sided knowledge,” and their impact on both cyber conflict and democracy. Read more…

 

Highlighted event

Michael Martelle

Cyber Operations in Context:
A Look at Joint Task Force Ares

Streamed live on Sep 16, 2019

This recorded panel focused on the 2017 declassification of key documents related to the conception, initial standup, and operation of JTF Ares and Operation Glowing Symphony, part of the counter-ISIL cyber effects campaign. One of the panelists, inaugural Cyber Vault Fellow Michael Martelle, discussed his findings and analysis of these documents, housed within the Cyber Vault.

Featured Posting

eligiblereceiver.jpg
Eligible Receiver 97, Part II: The Final Observation Report

Washington D.C., February 15, 2021 - Since...

Feb 15, 2021

CyberWar Map in the News

politico-morning-logo.jpg

By TIM STARKS, June 7, 2018

OOOH, PRETTY — If you’re looking for a database of state-sponsored cyberattacks, George Washington University’s National Security Archive has you covered. The website on Wednesday launched CyberWar Map, which offers a lovely map linking advanced persistent threats, or APTs, to the countries believed to sponsor them, the campaigns they’ve launched and the targets they’ve hit. The page for APT 29, for example, identifies it as a Russian-sponsored group that has participated in the Grizzly Steppe campaign of interfering in the U.S. election. Scrolling over to the left, meanwhile, will show that both China’s TempTick group and Russia’s Turla team have been spying on the negotiations around North Korea’s nuclear weapons program. “The complexity of the field makes it increasingly challenging to conceptualize a ‘bird’s eye view’ of the cyber-battlefield,” wrote Michael Martelle of the National Security Archive. “Therefore, the topic lends itself especially well to a dynamic graphic representation.”

More Tweets >>