Jan 24, 2019 | News br>
On January 17, 2019, the Democratic National Committee filed an amendment to their original lawsuit against the Russian Federation, the GRU, Wikileaks, the Trump Campaign, and several individuals related to the mentioned organizations. The amended complaint, the DNC's second in the case, alleges Russian attempts to hack the DNC through a spearfishing campaign soon after the conclusion of the 2018 midterm elections.
Jan 17, 2019 | News br>
On January 15, 2019, the US Defense Intelligence Agency released its latest edition of the China Military Power report. Among other points, the report discussed China’s reformed command-and-control structure built upon 21st Century information technology and the reorganization of its information warfare capabilities under the People’s Liberation Army Strategic Support Force. To accompany the DIA’s report, this posting highlights congressional testimony and official documents related to Chinese use of cyberspace.
Jan 9, 2019 | Briefing Book br>
Washington, D.C., January 9, 2019 – More than 20 years ago, in May 1998, seven hackers from the Boston-based “hacker think tank” L0pht Heavy Industries, appeared alongside Dr. Peter Neumann, a private sector expert on computer security, before the Senate Committee on Governmental Affairs for one of the first-ever Congressional hearings focusing specifically on cybersecurity.
Dec 4, 2018 | Briefing Book br>
Washington, D.C., December 4, 2018 - Five years ago, the National Security Agency (NSA) released 136 issues of its internal Cryptolog periodical spanning 1974 through 1997. The collection offered a look into the some of the discussions being held within one of America’s most secretive intelligence agencies. Today the GWU-based National Security Archive is providing a complete index of all 1,504 items in the declassified collection, including but not limited to articles, interviews, and puzzles.
Nov 7, 2018 | News br>
The Cyber Vault has gathered a selection of presidential orders related to communication and cyber policy. They are a complement to other compilations on our site consisting of cyber-related legislation and court orders. The list below is chronological. Many directives remain classified but the Cyber Vault is systematically requesting them under the Freedom of Information Act and will add them to this list as they are made available.
Cyber Brief: Opening a Window into a Critical CIA Vulnerability – the Vantage Point of a WhistleblowerNov 2, 2018 | News br>
Earlier today Zach Dorfman and Jenna McLaughlin reported on a "catastrophic" failure of a CIA communications system which resulted in the potential compromise of "close to 70 percent of operations" globally.
Oct 29, 2018 | News br>
The Cyber Vault has gathered below selections from the US Code related to cyber security. These selections are key to understanding the complex delegation of legal authorities governing the actions of Federal agencies. The list is ordered according to title and section number.
Oct 19, 2018 | News br>
From 1949 until the late 1960s the Office of Naval Research (ONR) published the Digital Computer Newsletter to “provide a medium for the interchange among interested persons of information concerning recent developments in various digital computer products.” The newsletter initially focused primarily on technical developments for computers, providing short updates on design, construction, testing, and usage of various computers in the U.S.
Oct 9, 2018 | News br>
The United States Government Accountability Office has issued a report finding that the Department of Defense’s early adoption of computers and information technology but late prioritization of information security has resulted in cyber-vulnerabilities in weapon systems. Today’s brief includes the GAO report along with a series of documents demonstrating how the accelerated adoption of network technology by the US Military (under the concept of Network Centric Operations) coincided with, but did not incorporate, hard lessons learned about network and information security.
Oct 3, 2018 | News br>
Several recent attacks targeting major sea port operations have demonstrated the ability of a cyber-attack to stall maritime shipping: