30+ Years of Freedom of Information Action

Cyberspace

Oct 9, 2018 | News
The United States Government Accountability Office has issued a report finding that the Department of Defense’s early adoption of computers and information technology but late prioritization of information security has resulted in cyber-vulnerabilities in weapon systems. Today’s brief includes the GAO report along with a series of documents demonstrating how the accelerated adoption of network technology by the US Military (under the concept of Network Centric Operations) coincided with, but did not incorporate, hard lessons learned about network and information security.  

Oct 3, 2018 | News
Several recent attacks targeting major sea port operations have demonstrated the ability of a cyber-attack to stall maritime shipping:

Sep 26, 2018 | News
Last week the White House and the Defense Department issued new documents on cyberspace strategy. This posting includes the new issuances and presents them with current national security and strategy documents for immediate context as well as past White House and Department of Defense documents tracing the evolution of cyber strategy in the United States Government.  

Sep 19, 2018 | News
The Cyber Glossary is a compilation of specialized terms to help experts and the public alike navigate the complex field of cybersecurity. This resource combines definitions from a variety of government compilations.  Sources for each entry – often multiple definitions exist – are provided, as is a key to allow for further research.  This list will be expanded regularly. Reader suggestions are welcome. Click on the appropriate letter in the left column or type a word or phrase in the search box at the top right of this page.

Sep 6, 2018 | News
The United States Department of Justice today unsealed a criminal complaint (here) and arrest warrant for North Korean hacker Park Jin Hyok detailing his involvement in numerous cyber operations attributed to the Lazarus Group. Details in this document will likely advance the public’s understanding of how North Korea’s Reconnaissance General Bureau (RGB) conducts operations in cyberspace.

Aug 13, 2018 | Briefing Book
Washington, D.C., August 13, 2018 – U.S. Cyber Command’s strategy for curtailing ISIL’s ability to exploit the internet may at least partially be paying off, according to an analysis of recently declassified documents posted today by the nongovernmental National Security Archive. The new documents, obtained under the Freedom of Information Act (FOIA) by Motherboard and the Archive, center around Operation GLOWING SYMPHONY, a USCYBERCOM activity authorized in late 2016 to deny the Islamic State use of the internet.

Aug 1, 2018 | Briefing Book
Washington, D.C., August 1, 2018 – An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S.

Jul 18, 2018 | News
Robert Mueller, Special Counsel for the US Department of Justice, on Friday, July 13, 2018, indicted twelve Russian intelligence officers for “engaging in cyber operations that involved the staged release of documents stolen through computer intrusions.”  These cyber intrusions have come to be referred to as “Operation Grizzly Steppe.”  Today’s posting explores the US Government’s public conceptualization of Russian cyber operations and highlights the two GRU units suspected of being directly involved: Unit 26165 (a/k/a Cozy Bear, APT29) and Unit 74455 (a/k/a Fancy Bear, Pawn Storm,  AP

Jul 11, 2018 | News
The cyber threat to critical infrastructure (communication, transportation, energy, finance, and vital services) receives a sizeable volume of attention from researchers and policy analysts. This Cyber Brief looks at transportation security in isolation beginning with President Clinton’s Executive Order 13010 and continuing through recent Federal reports on emerging challenges and technologies.

Pages