Nov 7, 2018 | News br>
The Cyber Vault has gathered a selection of presidential orders related to communication and cyber policy. They are a complement to other compilations on our site consisting of cyber-related legislation and court orders. The list below is chronological. Many directives remain classified but the Cyber Vault is systematically requesting them under the Freedom of Information Act and will add them to this list as they are made available.
Cyber Brief: Opening a Window into a Critical CIA Vulnerability – the Vantage Point of a WhistleblowerNov 2, 2018 | News br>
Earlier today Zach Dorfman and Jenna McLaughlin reported on a "catastrophic" failure of a CIA communications system which resulted in the potential compromise of "close to 70 percent of operations" globally.
Oct 29, 2018 | News br>
The Cyber Vault has gathered below selections from the US Code related to cyber security. These selections are key to understanding the complex delegation of legal authorities governing the actions of Federal agencies. The list is ordered according to title and section number.
Oct 19, 2018 | News br>
From 1949 until the late 1960s the Office of Naval Research (ONR) published the Digital Computer Newsletter to “provide a medium for the interchange among interested persons of information concerning recent developments in various digital computer products.” The newsletter initially focused primarily on technical developments for computers, providing short updates on design, construction, testing, and usage of various computers in the U.S.
Oct 9, 2018 | News br>
The United States Government Accountability Office has issued a report finding that the Department of Defense’s early adoption of computers and information technology but late prioritization of information security has resulted in cyber-vulnerabilities in weapon systems. Today’s brief includes the GAO report along with a series of documents demonstrating how the accelerated adoption of network technology by the US Military (under the concept of Network Centric Operations) coincided with, but did not incorporate, hard lessons learned about network and information security.
Oct 3, 2018 | News br>
Several recent attacks targeting major sea port operations have demonstrated the ability of a cyber-attack to stall maritime shipping:
Sep 26, 2018 | News br>
Last week the White House and the Defense Department issued new documents on cyberspace strategy. This posting includes the new issuances and presents them with current national security and strategy documents for immediate context as well as past White House and Department of Defense documents tracing the evolution of cyber strategy in the United States Government.
Sep 19, 2018 | News br>
The Cyber Glossary is a compilation of specialized terms to help experts and the public alike navigate the complex field of cybersecurity. This resource combines definitions from a variety of government compilations. Sources for each entry – often multiple definitions exist – are provided, as is a key to allow for further research. This list will be expanded regularly. Reader suggestions are welcome. Click on the appropriate letter in the left column or type a word or phrase in the search box at the top right of this page.
Sep 6, 2018 | News br>
The United States Department of Justice today unsealed a criminal complaint (here) and arrest warrant for North Korean hacker Park Jin Hyok detailing his involvement in numerous cyber operations attributed to the Lazarus Group. Details in this document will likely advance the public’s understanding of how North Korea’s Reconnaissance General Bureau (RGB) conducts operations in cyberspace.
Aug 13, 2018 | Briefing Book br>
Washington, D.C., August 13, 2018 – U.S. Cyber Command’s strategy for curtailing ISIL’s ability to exploit the internet may at least partially be paying off, according to an analysis of recently declassified documents posted today by the nongovernmental National Security Archive. The new documents, obtained under the Freedom of Information Act (FOIA) by Motherboard and the Archive, center around Operation GLOWING SYMPHONY, a USCYBERCOM activity authorized in late 2016 to deny the Islamic State use of the internet.