HomeUSHomeland SecurityThink Tank Predicted Russian Cyberwar v. United States

Think Tank Predicted Russian Cyberwar v. United States

Washington, D.C., May 3, 2017 – A Rand Corporation 1967 paper predicted many of the cyber dilemmas faced by policy makers today, and a 2017 expanded analysis of the “GRIZZLY STEPPE” hacking by Russian cyber operators disclosed key findings about the techniques the hackers used and ways to mitigate them, according to the National Security Archive publication today of 40+ highlighted primary sources from the critically-praised “Cyber Vault” at http://nsarchive.gwu.edu/cybervault.

 

 

Compiled and edited by noted intelligence historian Dr. Jeffrey T. Richelson, the Cyber Vault collection of primary sources is growing by a dozen or more documents every week, and includes the declassified briefings provided by the National Security Agency to the George W. Bush and Barack Obama transition teams in 2000 and 2009, respectively.  The collection also includes a 2016 order from the U.S. Cyber Command to set up a unit with the mission of debilitating and destroying computer and communications operations of the terrorist group ISIS.

The Cyber Vault team obtained the 2016 order under the Freedom of Information Act (FOIA).  The project has filed scores of other FOIA and declassification requests as part of a multi-year documentation contribution to the growing field of cyber studies, with the support of the William and Flora Hewlett Foundation.

The 2000 transition briefing explicitly foreshadowed the Edward Snowden controversy, warning the new White House team that the 4th Amendment-protected communications of Americans were inextricably mixed with those of foreigners on the Internet.  The 2016 U.S. Cyber Command order established a joint task force designed to bring the resources of the Defense Department, Intelligence Community, and Justice Department to bear against the terrorist group that the Trump administration has since designated its top foreign policy priority.


Cyber Vault Highlights

By Jeffrey T. Richelson

On March 30, 2016, the National Security Archive opened its Cyber Vault, a repository of documents on all aspects of cyber activity – including computer network defense (and other other aspects of cybersecurity), computer network attack, and computer network exploitation. The more than 750 documents currently in the vault have been drawn from a variety of sources – Freedom of Information Act releases, websites of both U.S. federal and state government organizations, courts, foreign government organizations, NATO, government contractors, think-tanks, advocacy groups, and media websites (including Wikileaks and those that posted documents provided by Edward Snowden).

In addition to relying on a multitude of sources to populate the Cyber Vault, the Archive has sought to accumulate a diverse set of documents – which has guided its collection strategy. As a result, the Cyber Vault includes significant documents from the 1960s and each subsequent decade, on cyber organization, on policy and strategy, on domestic and foreign cyber activities, on cybersecurity requirements, and on cyber crimes and the related investigations. Also included are intelligence assessments and theses. The documents also represent a spectrum of classifications, from unclassified, to formerly classified, and – in the cases of Wikileaks and Snowden documents – currently classified documents. Many of the documents cut across a number of categories.

Among the documents represented from the 1960s and 1970s are two seminal papers.  One is Willis Ware’s 1967 effort, Secrecy and Privacy in Computer Systems (Document 1), written for the RAND Corporation, and one of the very first systematic approaches to information leakage, security, and privacy. The other (Document 2), produced by a staff member of Britain’s signals intelligence agency, the Government Communications Headquarters (GCHQ), represents the initial development of public key cryptography – although it was not declassified until years after the concept had been made public by American mathematicians.

That document is also one of several illustrating or concerning foreign government cyber efforts. A much more recent GCHQ product (Document 29) was one of the documents provided to Glenn Greenwald and Laura Poitras by Edward Snowden – a briefing on efforts to deanonymize users of The Onion Router (TOR) network, which had been developed by  members of the U.S. Naval Research Laboratory (Document 32) as a means of protecting online communications. Chinese cyber organization, policy, and operations are covered, collectively, by two documents – an unclassified paper (Document 36) produced under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence and a Top Secret codeword NSA briefing (Document 24) on the People Republic of China’s computer network exploitation activity. Current Russian cyber activities are discussed in an extract (Document 35) from the controversial “Trump Dossier,” written by a former British Secret Intelligence Service officer.

Other documents concern hostile cyber activities from an earlier era. One, from 1998  (Document 12) provides information to the then director of the FBI, Louis Freeh, concerning the SOLAR SUNRISE investigation concerning intrusions into at least 11 unclassified DoD Computer systems at various locations in the United States. Another FBI memo (Document 13), concerns a 1999 investigation into intrusions into computer systems in the United States, the United Kingdom, Canada, Brazil, and Germany – an investigation which took some of the investigators to Moscow. In a newly released portion, it discusses possible response to intrusions – including the creation of “honeypots” containing “beacon” files.

In addition to being the victim of intrusions, the U.S. has also debated and formulated policy, granted authority over, and conducted intrusions in pursuit of national security objectives. In March 1997, Secretary of Defense William Cohen assigned the responsibility for computer network attack and exploitation to the National Security Agency in a short memo (Document 10). During that Spring a senior NSA official addressed the issue of cyberwar in a Secret article (Document 11) in a NSA journal. Many years later, according to a number of accounts, U.S. and Israeli cyber personnel were able to penetrate industrial control systems associated with the Iranian nuclear program and damage centrifuges that could produce weapons-grade material. While there have been no publicly released executive branch documents concerning the “Stuxnet” operation, it has been the subject of reports by RAND and the Congressional Research Service. (Document 26).

Concern over possible Russian intrusion into U.S. computer systems related to elections became a significant subject of discussion in the 2016 presidential election. Apprehensions over the possibility of such intrusions go back at least a decade. A December 2007 report (Document 20) was commissioned by Ohio’s Secretary of State, and contained disturbing results about the vulnerability of Ohio’s electronic voting systems. In the wake of a poorly-received, brief analysis of alleged Russian cyber activity related to the 2016 election, the Department of Homeland Security’s National Cybersecurity and Communications Integration Center produced more detailed examination (Document 41) of the GRIZZLY STEPPE activity.

By the time the DHS report was issued, President Trump had been presented with a draft executive order on cybersecurity (Document 40 ), which would undoubtedly have been the first of a significant number of presidential actions on cybersecurity – just as President Obama had signed a number of cyber-related executive orders and presidential directives, including one (Document 34) that established a Cyber Threat Intelligence Integration Center. Ultimately, the Trump draft order became the first in a series of drafts, and no order has yet been signed.

Other highlight documents include:A 1979 exploration (Document 5) in an NSA journal on computer system vulnerabilities

 

    • A 1996 treatment (Document 9) of the threat to computer systems from human Intelligence operations.
    • A 2001 memo (Document 15) from the director of NSA concerning a major computer outage at the agency.
    • A 2008 Director of National Intelligence cyber counterintelligence plan (Document 21).
    • A 2016 USCYBERCOM order (Document 37) to establish a task force to combat ISIS in cyber space
    • A 2016 examination (Document 38) of cyber threats to nuclear weapons systems.
    • A 2016 DHS Office of Intelligence and Analysis briefing (Document 39) on cyber threats to the homeland

Most Popular

Recent Comments

Toddy Littman on Coronavirus & Dr. Rife
jimjfox on The Islamic Scam
USAPATRIOT✓ on Coronavirus & Dr. Rife
Dumb Bass Fisherman on The Disgrace of Benghazi
Dumb Bass Fisherman on Prosecute Biden the Crook!
Dumb Bass Fisherman on The Disgrace of Benghazi
Christan on Who is Nasim Aghdam?
FarvingStartist on
Swampmom on Stubborn Syria
OhSoGood on SHOCKING Media LIES
Pbranham on
Pbranham on
Fay Butler on Lawfare, living in fear
John Cunningham on The Media and Trump at 100 Days
steve smith on
Worried on
Insanity Personified on
no mo uro on
no mo uro on
Patriotjeff on
OhSoGood on
Steve on
lovelydestruction on
Val Cocora on
Jerry Kenney on
Merlinever on
Phill Crapidy on
Clifford Ishii on
Americanmommy on
Doctor Fine on
reggiec on
DeltamanH20 on
Ms. warrior4Christ on
Comrade Molotov on
reggiec on
JEANNIEMAC2 on
Average Punter on
shamm86 on
Rich on
ort on
Lee Sargeant on
Lee Sargeant on
jcarroll4415 on
Erroldean Andrews on
charles becker on
David Miller on
charles becker on
Sophia Emma on March4Trump
UR.carrion on The Islamic Scam
pbr90 on
John Cornel Kovach on Should Islam Be Banned from America?
Lane Wingham on Rituals of Islam
Lane Wingham on Rituals of Islam
Taylor Crystaloski on Rituals of Islam
lamarlamar on California Dreaming
usaok59 on Smearing Sessions
b.a. freeman on True Islam vs Pseudo Islam
b.a. freeman on True Islam vs Pseudo Islam
Randy McDaniels on True Islam vs Pseudo Islam
Mohammad Izzaterd on True Islam vs Pseudo Islam
Bikinis not Burkas on True Islam vs Pseudo Islam
John Cornel Kovach on Should Islam Be Banned from America?
paramore309 on
Anthony Duhe on
Anthony Duhe on
Dianna9490 on
Guest✓ᵛᵉʳᶦᶠᶦᵉᵈ on Dana Rohrabacher for Secretary of State
Guest✓ᵛᵉʳᶦᶠᶦᵉᵈ on Dana Rohrabacher for Secretary of State
Abu Mohamed on
wellilltellya on The Obama Era is Over
Dianna9490 on The Obama Era is Over
reggiec on Democratic Panic
Tony Donaldson on Why Trump Will Prevail
Charlotte W on Why Trump Will Prevail
Bubba Gump on Why Trump Will Prevail
bas h on
Dianna9490 on Weaponized Immigration
Dianna9490 on Charlotte Burning
Tony Donaldson on Hillary Clinton: Basket Case
SuperDave2 on The Islamic Scam
Truthorlie on Hillary’s Race War
Proud Amelekite on We are in the End of Days
EarthCitizenNumberOne on George Soros’s Open Border Foundations
EarthCitizenNumberOne on George Soros’s Open Border Foundations
Sgt Saunders on We are in the End of Days
Proud Amelekite on We are in the End of Days
Proud Amelekite on We are in the End of Days
Saputra 007 on We are in the End of Days
Kevan Massey on We are in the End of Days
Bonnie Wolf on We are in the End of Days
Bruce Peters on We are in the End of Days
David Collins on We are in the End of Days
Monte Noffsinger on We are in the End of Days
Proud Amelekite on We are in the End of Days
Eddie Clever on The Flying Clintons
jackcandobutwont on
TSM on
Tee Quake on Born in America
shamm86 on Born in America
seersuckerandapanama on The Coming US/Mexico War
Sgt Saunders on Would Jesus Bomb Hiroshima?
michaelhayes on Would Jesus Bomb Hiroshima?
Roberta Dzubow on MUST READ: The Twisting Noose
danstewart on Why Trump Chickened Out
Uzoozy on Paul Ryan's Hijra
JEANNIEMAC2 on Importing Terror
JEANNIEMAC2 on Insane Muslim Terrorists
"The Eastern Diamondback" on King Barack the Lawless Endangers Girls
Jeff Tangen on The Cults of Islam
Joe on
amyinnh on
David Gearhart on Sex Slavery by the Numbers
David Gearhart on Sex Slavery by the Numbers
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
Sgt Saunders on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
charles becker on American Outlaws!
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Uzoozy on The Cults of Islam
smacready on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
smacready on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
Uzoozy on The Cults of Islam
TheBucko on The Cults of Islam
TheBucko on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
smacready on The Cults of Islam
GregAbdul on The Cults of Islam
GregAbdul on The Cults of Islam
Robin Morgan on The Cults of Islam
bob250 on The Cults of Islam
SEARING JW TRUTH on The Cults of Islam
Uzoozy on The Cults of Islam
Winston Lawrence on The Satanic Bible's 'Golden Rule'
SEARING JW TRUTH on The Cults of Islam
smacready on The Cults of Islam
sherri palmer on
John Cunningham on Jihad in Brussels
Sebastian Medina on The Coming US/Mexico War
sherri palmer on
BobWhiteRevisited✓ᴺᵃᵗᶦᵒᶰᵃˡᶦˢᵗ on Why I Stump for Trump
sherri palmer on
Kevin Alfred Strom on Support for Trump Backfires on CPAC
marlene on
marlene on
DC on
DC on
Ike_Kiefer on
sherri palmer on
sherri palmer on
Christopher Strunk on Is Trump a Sleeper Agent for Moscow?
Christopher Strunk on Is Trump a Sleeper Agent for Moscow?
usaok59 on
Chris Palmer on
RobSez on
marlene on
MayPA on
spartan111 on
John Cunningham on
Weeping Man on
felix1999 on
felix1999 on
Virgil Cole on
Virgil Cole on
Virgil Cole on
Buzg on
usaok59 on
John Cunningham on
cfd_007 on
alfy on
D Guest on
marlene on
adbj102 on
JEANNIEMAC2 on
Hugh Jass on
JEANNIEMAC2 on
Uzoozy on
TexasOlTimer on
Uzoozy on
Uzoozy on
Waiting on
TexasOlTimer on
TexasOlTimer on
<-----MyFrontDoorBuddy on
<-----MyFrontDoorBuddy on
Sarfaraz A. on
Sarfaraz A. on
Alex Sheibani on
Uzoozy on
sherri palmer on
sviri finq on
No Corporate BS on
SumatraSue on
Ted Johnson on
Waiting on
Jason Woodworth on
Helmut Beintner on
Doug Sterling on
JEANNIEMAC2 on
jwmiller on
sickandtired on
sherri palmer on
VTrobert on
Fredrick Rehders on
usaok59 on
Waiting on
VTrobert on
cool-subzero90 on
michaelhayes on
danstewart on
reggiec on
John Cunningham on
Andrew on
John Cunningham on
Don P on
Britt Brooks on
John Cunningham on
Helmut Beintner on
Jim on
Spectrum on
danstewart on
Helmut Beintner on
Helmut Beintner on
Helmut Beintner on
John Cunningham on
missinger on
adbj102 on
noh1bvisas on
danstewart on
Jigsaw on
Jigsaw on
Patty Villanova on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
sherri palmer on
Weeping Man on
Frosty Wooldridge on
Hugh Jass on
danstewart on
Jr1776 on
JEANNIEMAC2 on
Fredrick Rehders on
JEANNIEMAC2 on
ort on
Jared on
dndgaddy on
Thunderbolt #1 on
JEANNIEMAC2 on
reggiec on
David Gearhart on
David Gearhart on
madgrandma on
David Gearhart on
David Gearhart on
John Wesley Bletsch on
Chopko on
LaineeTheCat Wallace on 10 Tips How to Counter Islam
LaineeTheCat ✔Trump on
LaineeTheCat ✔Trump on
danstewart on
marlene on
marlene on
felix1999 on
felix1999 on
felix1999 on
ort on
ort on
felix1999 on
felix1999 on
felix1999 on
<-----MyFrontDoorBuddy on
marlene on
Helmut Beintner on
Whynot be great again222 on
JEANNIEMAC2 on
ort on
michaelhayes on
John Wesley Bletsch on
missinger on
missinger on
missinger on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
Whynot be great again222 on
ort on
Allright Hamilton! on
ort on
Allright Hamilton! on
Allright Hamilton! on
TheBucko on
ort on
ort on
ZEPHANIAH54321 on
mzliberty2013 on
JEANNIEMAC2 on
Frosty Wooldridge on
Jim on
Frosty Wooldridge on
Whynot be great again222 on
Jawad Karim on
Tranqual on
Allright Hamilton! on
Whynot be great again222 on
Allright Hamilton! on
danstewart on
ort on
marlene on
satovey on The Islamic Scam
Tranqual on
Tranqual on
madgrandma on
durabo on
Warrior on
marlene on
reggiec on
reggiec on
marlene on
marlene on
marlene on
marlene on
marlene on
deanosslewis . on The Islamic Scam
asinnersavedbygrace on Top Bible Prophecy Stories of 2015
Jill Hasselbach Villalba on The New Terror Threat: Organized Rape
malaka_eneuresis on The Islamic Scam
TexasOlTimer on Trump Gets It: The Snake
maddog0311 on Trump Gets It: The Snake
John Cunningham on US Criminalizing Free Speech?
Michael Bluestein on Burns, Oregon, Is Not Bundy Ranch
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
John Cunningham on US Criminalizing Free Speech?
sherri palmer on What Muslims Really Believe
David Gearhart on What Muslims Really Believe
wildmanonearth on Sharia Law for the Non-Muslim
Vladsmom on
bruce on Chelm
John Cunningham on ISIS Campaign for Europe
John Cunningham on Being Thankful for the Left
marlene on  GOP Plot Thickens
Fredrick Neal Rehders on Media Darling Conservatives
Sgt Saunders on Red-Faced Fury
Fredrick Neal Rehders on America Isn’t Dead Yet
funk u zionist bedouin on Red-Faced Fury
Fredrick Neal Rehders on Empty the Prisons Bill Now on Fast Track
NetJobsOnline~~~~Earn $97/hour on The Obama Machine Takes Over Canada
NetJobsOnline~~~~Earn $97/hour on The Death of Europe
NetJobsOnline~~~~Earn $97/hour on A Big Stash of Campaign Cash in Marijuana for Paul
kunling on The Death of Europe
Richard N on The Death of Europe
Yours Truly on Sweden Close to Collapse
John Cunningham on Sweden Close to Collapse
michaelhayes on Sweden Close to Collapse
michaelhayes on Sweden Close to Collapse
Doc Eckleberg on Sweden Close to Collapse
John Cunningham on Legitimizing Hillary’s Crimes
John Cunningham on Sweden Close to Collapse
Enos Dapenis on The Coming US/Mexico War
Fucck your lies on The Coming US/Mexico War
BornAgainSouthernPride on Obama and a Doctrine of Dishonesty
GooglePostJobs:::GET $97/h on Chinese Government Runs Circles Around Obama
GooglePostJobs:::GET $97/h on JW Exposes Hillary Clinton Lie
John Cunningham on JW Exposes Hillary Clinton Lie
Yours Truly on I Am Mourning For America
Yours Truly on I Am Mourning For America
Prophetess Anya Kelly on Are We Living In The Last Days?
disqus_NSXp0ZCum6 on Should Christians Call God Allah?
Tee Quake on Nuclear Jihad
ort on
Jim on
Joel Spealman on Is Trump the Real Deal?
RobertLaity on
DENNIS J. MALONE on Is Trump the Real Deal?
ort on
Manorbier on
Bo Wetstone on The Banking Oligarchs
Dannie Poe on
JohnDiLiberto on The Banking Oligarchs
Herman Van Keer on Answering Muslims Conference
Mean Green Law on Donald Trump: American Patriot
Jigsaw on Trumping Trump
b keaton on Trumping Trump