Feb 20, 2019 | News br>
In February of 2016 thirty five fraudulent orders were sent over the SWIFT network, a telecommunications system linking financial institutions used to exchange information on transactions, to transfer a total of US $1 billion from the Bangladesh Bank’s account with the New York Federal Reserve Bank. Thirty of those orders were stopped for review and cancelled, but five orders totaling US $101 million were completed. US $20 million was transferred to a company in Sri Lanka while US $81 million was routed to the Rizal Commercial Banking Corporation (RCBC) in the Philippines.
Feb 14, 2019 | News br>
A Cyber Vault study of social media activity by the Internet Research Agency (IRA) during the violent Charlottesville protests in August 2017 demonstrates how the controversial Russia-based organization targeted social divisions in the United States at an extraordinarily tense political moment. Researchers with the Cyber Vault project at the nongovernmental National Security Archive used two publicly released datasets to bring into relief at least a part of the IRA’s operations, providing a level of clarity into that organization’s tactics.
Feb 6, 2019 | News br>
The Cyber Vault has gathered witness testimony and transcripts for hearings held by the 115th Congress during 2018. These documents are reflective of the scope of the legislative challenges and Congress’s priorities in the field. The list is ordered by committee, with hearings listed chronologically for each committee. Joint hearings appear at the end of the list for the Senate and the House. Similar resources will be produced at the end of each future session of Congress. SENATE COMMITTEES
Jan 30, 2019 | News br>
Election security has been a pressing issue since the 2016 elections due to concern over foreign interference in the election and possible cybersecurity risks. According to the U.S. Election Assistance Commission Web site:
Jan 24, 2019 | News br>
On January 17, 2019, the Democratic National Committee filed an amendment to their original lawsuit against the Russian Federation, the GRU, Wikileaks, the Trump Campaign, and several individuals related to the mentioned organizations. The amended complaint, the DNC's second in the case, alleges Russian attempts to hack the DNC through a spearfishing campaign soon after the conclusion of the 2018 midterm elections.
Jan 17, 2019 | News br>
On January 15, 2019, the US Defense Intelligence Agency released its latest edition of the China Military Power report. Among other points, the report discussed China’s reformed command-and-control structure built upon 21st Century information technology and the reorganization of its information warfare capabilities under the People’s Liberation Army Strategic Support Force. To accompany the DIA’s report, this posting highlights congressional testimony and official documents related to Chinese use of cyberspace.
Jan 9, 2019 | Briefing Book br>
Washington, D.C., January 9, 2019 – More than 20 years ago, in May 1998, seven hackers from the Boston-based “hacker think tank” L0pht Heavy Industries, appeared alongside Dr. Peter Neumann, a private sector expert on computer security, before the Senate Committee on Governmental Affairs for one of the first-ever Congressional hearings focusing specifically on cybersecurity.
Dec 4, 2018 | Briefing Book br>
Washington, D.C., December 4, 2018 - Five years ago, the National Security Agency (NSA) released 136 issues of its internal Cryptolog periodical spanning 1974 through 1997. The collection offered a look into the some of the discussions being held within one of America’s most secretive intelligence agencies. Today the GWU-based National Security Archive is providing a complete index of all 1,504 items in the declassified collection, including but not limited to articles, interviews, and puzzles.
Nov 7, 2018 | News br>
The Cyber Vault has gathered a selection of presidential orders related to communication and cyber policy. They are a complement to other compilations on our site consisting of cyber-related legislation and court orders. The list below is chronological. Many directives remain classified but the Cyber Vault is systematically requesting them under the Freedom of Information Act and will add them to this list as they are made available.
Cyber Brief: Opening a Window into a Critical CIA Vulnerability – the Vantage Point of a WhistleblowerNov 2, 2018 | News br>
Earlier today Zach Dorfman and Jenna McLaughlin reported on a "catastrophic" failure of a CIA communications system which resulted in the potential compromise of "close to 70 percent of operations" globally.