35+ Years of Freedom of Information Action

The Cyber Vault Project

An online resource documenting cyber activities of the U.S. and foreign governments as well as international organizations


Generous funding provided by
The William and Flora Hewlett Foundation

Featured Article




As the Cyber Vault project continues to combat the issue of overclassification in the study of cyberspace, Jason Healey and Dr. Robert Jervis discuss the “consequences of one-sided knowledge,” and their impact on both cyber conflict and democracy. Read more…


Highlighted event

Michael Martelle

Cyber Operations in Context:
A Look at Joint Task Force Ares

Streamed live on Sep 16, 2019

This recorded panel focused on the 2017 declassification of key documents related to the conception, initial standup, and operation of JTF Ares and Operation Glowing Symphony, part of the counter-ISIL cyber effects campaign. One of the panelists, inaugural Cyber Vault Fellow Michael Martelle, discussed his findings and analysis of these documents, housed within the Cyber Vault.

Featured Posting

Colonial pipeline attack
This is Not a Drill: Ransoming American Security

Washington, D.C., May 12, 2021 — This week’s ransomware episode involving Colonial Pipeline has exposed deep cracks in America’s digital armor.  However, lost in the flurry of...

May 12, 2021

CyberWar Map in the News


By TIM STARKS, June 7, 2018

OOOH, PRETTY — If you’re looking for a database of state-sponsored cyberattacks, George Washington University’s National Security Archive has you covered. The website on Wednesday launched CyberWar Map, which offers a lovely map linking advanced persistent threats, or APTs, to the countries believed to sponsor them, the campaigns they’ve launched and the targets they’ve hit. The page for APT 29, for example, identifies it as a Russian-sponsored group that has participated in the Grizzly Steppe campaign of interfering in the U.S. election. Scrolling over to the left, meanwhile, will show that both China’s TempTick group and Russia’s Turla team have been spying on the negotiations around North Korea’s nuclear weapons program. “The complexity of the field makes it increasingly challenging to conceptualize a ‘bird’s eye view’ of the cyber-battlefield,” wrote Michael Martelle of the National Security Archive. “Therefore, the topic lends itself especially well to a dynamic graphic representation.”

More Tweets >>