Jul 11, 2018 | News br>
The cyber threat to critical infrastructure (communication, transportation, energy, finance, and vital services) receives a sizeable volume of attention from researchers and policy analysts. This Cyber Brief looks at transportation security in isolation beginning with President Clinton’s Executive Order 13010 and continuing through recent Federal reports on emerging challenges and technologies.
Jun 27, 2018 | News br>
This month the Joint Chiefs of Staff issued an update to Joint Publication 3-12, first published on February 5th 2013. The following changes are prominent:
Jun 20, 2018 | News br>
The Department of Defense, GSA, and NASA have issued implementation guidance for the ban on Kaspersky products mandated in the 2018 NDAA. This Cyber Brief includes that guidance, the relevant section of the 2018 NDAA, a DHS directive to remove Kaspersky products from Federal systems, and court documents from a lawsuit in which Kaspersky alleges that the DHS unfairly blocked its software from Federal systems based on unsubstantiated evidence. New to the Vault
Cyber Brief. FOIA Document: 2011 Execute Order to Incorporate Realistic Cyberspace Conditions into Major DOD ExercisesJun 13, 2018 | News br>
A National Security Archive FOIA request filed in January of 2016 produced, in late 2017, a Department of Defense memorandum encouraging department heads and combatant commanders to beat the deadline set by the Chairman of the Joint Chiefs of Staff for the incorporation of cyber into major military exercises. After receiving and publishing this document, National Security Archive researchers filed another request for the Chairman’s initial Execute Order (EXORD) which was provided with redactions.
Jun 6, 2018 | News br>
The National Security Archive’s Cyber Vault Project is announcing the launch of the CyberWar Map. This resource is both a visualization of state-sponsored cyberattacks and an index of Cyber Vault documents related to each topic (represented as nodes on the map). Clicking on each node will reveal hyperlinks and document descriptions. In some cases where key analysis was done under copyright, the link will direct readers to sources external to the National Security Archive. In a few other cases nodes do not yet have documents to display.
May 30, 2018 | News br>
The use of the internet by terrorist organizations has proven to be a vexing problem for policymakers.
May 22, 2018 | News br>
Israel’s national cyber proficiency goes largely unrecognized to those outside the field of cybersecurity. This week’s Cyber Brief highlights documents from the Vault related to Israel’s cybersecurity organization, policy, cooperation with the United States, and an FBI notice on a coordinated attack on Israeli and Jewish websites known as #OpIsrael.
May 16, 2018 | News br>
On May 13, President Trump announced on Twitter that he was working with President Xi Jinping of China to assist the Chinese telecommunications company ZTE. This announcement surprised many in the national security community as the US Government has in the past claimed that devices made by ZTE, as well as other Chinese telecom firms such as Huawei, are used by the Chinese Government to conduct surveillance.
May 9, 2018 | News br>
The Office of the Director of National Intelligence has released its report on the use of FISA orders and national security letters during calendar year 2017. This week’s Cyber Brief includes the most recent report as well as all previous reports back to statistics on calendar year 2013. These statistics are valuable in understanding the scope of and trends in government surveillance under national security authorities.
May 2, 2018 | News br>
In light of significant recent developments on the Korean Peninsula, this week’s brief highlights North Korean cyber-operations. While Pyongyang’s nuclear weapons program has drawn the most attention recently, North Korea’s cyber capabilities also represent a significant asymmetric capability that has been relied upon both to disrupt enemies of the Kim family as well as produce sources of funding through cyber-enabled crime.