Targeting in Cyber Operations: FOIA release discusses considerations of US military targeting doctrineSep 5, 2019 | Briefing Book br>
Washington D.C., September 5, 2019 - Recently declassified materials from U.S. Cyber Command provide new details about an important component of cyber operations – the targeting process – as well as clues to considerations regarding the potential linkage between cyber and traditional military force in U.S. planning.
Aug 5, 2019 | News br>
The Olympic Games are being held in Tokyo, Japan, during the summer of 2020. In light of widespread concerns about a potential cyber threat from Russia, the Cyber Vault is posting a variety of primary-source documents and other materials that offer additional context to the issues.
Jun 29, 2019 | Briefing Book br>
After a series of events starting in the late 1980s gradually awakened the US Department of Defense to the seriousness of threats to computer networks, the US military assembled the first joint task force explicitly formed around the concept of cyber warfare
Jun 29, 2019 | News br>
In 2013, cybersecurity experts Jason Healey and Karl Grindal released A Fierce Domain, an edited volume covering major "wake-up calls" in cyber from 1986-2012. Thanks to a generous donation by Healey and Grindal, today the National Security Archive Cyber Vault is making available a collection of documents combining research from the "Realization" section of A Fierce Domain with previously released documents from the Eligible Receiver 97 exercise.
May 15, 2019 | News br>
The U.S.-Japan Security Consultative Committee convened last April for the first time since August 2017. The two governments agreed that a cyber attack could, in certain circumstances, constitute an armed attack for the purposes of Article V of the U.S.-Japan Security Treaty. A decision as to when a cyber attack would constitute an armed attack would be made on a case-by-case basis.
Preparing for Computer Network Operations: USCYBERCOM Documents Trace Path to Operational Cyber ForceMay 3, 2019 | News br>
Our present understanding of how USCYBERCOM conducts operations in cyberspace comes either through anecdotal examples such as JTF-ARES/OPERATION GLOWING SYMPHONY or through broad doctrine as communicated in publications like JP 3-12 Cyberspace Operations. Little has been revealed about processes linking broad doctrine and strategy to tactical operations. Today the National Security Archive publishes a collection of documents obtained via FOIA declassification regarding the process of building the Cyber Mission Force and Joint Force Headquarters – Cyber under USCYBERCOM.
May 1, 2019 | News br>
The National Security Agency (NSA) has formally recommended terminating its controversial phone and text surveillance program, according to the Wall Street Journal. The program has been frequently criticized for violating Fourth Amendment protections against warrantless search and seizure.
Apr 24, 2019 | News br>
Washington D.C., April 24, 2019 – The Tallinn Manual 2.0 is the second edition of NATO’s Cooperative Cyber Defence Centre of Excellence’s analysis on the application of international law to cyberspace. The analysis rests on the idea that cyber operations do not occur in a legal vacuum, and preexisting obligations under international law apply equally to the cyber domain. As such, the Tallinn Manual 2.0 is broken into four parts with twenty chapters total, each examining a different area of existing international law.
Apr 8, 2019 | News br>
Beginning in 1997 the Department of Defense Information Assurance Technology Analysis Center (IATAC) published quarterly newsletters on information assurance with the stated goal of supporting U.S. information superiority efforts in accordance with the Joint Chiefs of Staff’s Joint Vision 2010 (JV2010) warfighting concept.
Apr 3, 2019 | News br>
The foundations of today’s internet rest on Cold War-era research and development performed by the Defense Advanced Research Projects Agency and researchers associated with the Department of Defense’s ARPANET. ARPANET used a packet-switching approach pioneered by RAND’s Paul Baran, but was unable to interface with other networks being developed.