30+ Years of Freedom of Information Action


Sep 26, 2018 | News
Last week the White House and the Defense Department issued new documents on cyberspace strategy. This posting includes the new issuances and presents them with current national security and strategy documents for immediate context as well as past White House and Department of Defense documents tracing the evolution of cyber strategy in the United States Government.  

Sep 19, 2018 | News
The Cyber Glossary is a compilation of specialized terms to help experts and the public alike navigate the complex field of cybersecurity. This resource combines definitions from a variety of government compilations.  Sources for each entry – often multiple definitions exist – are provided, as is a key to allow for further research.  This list will be expanded regularly. Reader suggestions are welcome. Click on the appropriate letter in the left column or type a word or phrase in the search box at the top right of this page.

Sep 6, 2018 | News
The United States Department of Justice today unsealed a criminal complaint (here) and arrest warrant for North Korean hacker Park Jin Hyok detailing his involvement in numerous cyber operations attributed to the Lazarus Group. Details in this document will likely advance the public’s understanding of how North Korea’s Reconnaissance General Bureau (RGB) conducts operations in cyberspace.

Aug 13, 2018 | Briefing Book
Washington, D.C., August 13, 2018 – U.S. Cyber Command’s strategy for curtailing ISIL’s ability to exploit the internet may at least partially be paying off, according to an analysis of recently declassified documents posted today by the nongovernmental National Security Archive. The new documents, obtained under the Freedom of Information Act (FOIA) by Motherboard and the Archive, center around Operation GLOWING SYMPHONY, a USCYBERCOM activity authorized in late 2016 to deny the Islamic State use of the internet.

Aug 1, 2018 | Briefing Book
Washington, D.C., August 1, 2018 – An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S.

Jul 18, 2018 | News
Robert Mueller, Special Counsel for the US Department of Justice, on Friday, July 13, 2018, indicted twelve Russian intelligence officers for “engaging in cyber operations that involved the staged release of documents stolen through computer intrusions.”  These cyber intrusions, known as Fancy Bear, have together with the Cozy Bear campaign come to be referred to as “Operation Grizzly Steppe.”  Today’s posting explores the US Government’s public conceptualization of Russian cyber operations and highlights the two GRU units suspected of being directly connected to the Fancy Bear intrusio

Jul 11, 2018 | News
The cyber threat to critical infrastructure (communication, transportation, energy, finance, and vital services) receives a sizeable volume of attention from researchers and policy analysts. This Cyber Brief looks at transportation security in isolation beginning with President Clinton’s Executive Order 13010 and continuing through recent Federal reports on emerging challenges and technologies.

Jun 27, 2018 | News
This month the Joint Chiefs of Staff issued an update to Joint Publication 3-12, first published on February 5th 2013. The following changes are prominent:

Jun 20, 2018 | News
The Department of Defense, GSA, and NASA have issued implementation guidance for the ban on Kaspersky products mandated in the 2018 NDAA. This Cyber Brief includes that guidance, the relevant section of the 2018 NDAA, a DHS directive to remove Kaspersky products from Federal systems, and court documents from a lawsuit in which Kaspersky alleges that the DHS unfairly blocked its software from Federal systems based on unsubstantiated evidence.   New to the Vault