National Security Archive: The United States and Cyberspace: Military Organization, Policies, and Activities

21 January 2016 — National Security Archive

The United States and Cyberspace: Military Organization, Policies, and Activities

National Security Archive Electronic Briefing Book No. 539

Edited by Jeffrey T. Richelson Posted January 20, 2016

For more information contact: The National Security Archive 202/944-7000,

Washington, DC, January 20, 2016 — U.S. military activities in cyberspace have been surprisingly widespread over the years, occurring mainly out of the public eye. Given the sensitivity of many of their operations, this is understandable to a point, but as the number of reported and unreported attacks on military and civilian infrastructure increases – along with the stakes – there is a corresponding public interest in how the Pentagon (and the U.S. government in general) has responded in the past and is preparing for future eventualities. Today, the National Security Archive is posting 27 documents that help illuminate various aspects of U.S. military operations in cyberspace. These materials are part of a unique and expanding educational resource of previously classified or difficult-to-obtain documentation the Archive is collecting and cataloguing on the critical issue of cybersecurity.

Today’s posting, including a number of records acquired through the Freedom of Information Act, can be grouped into six areas: the language of cyberspace, vision and strategy, military cyber organization, activities and responsibilities, computer network defense, and intelligence operations in cyberspace. Highlights include:

– The terminology of cyberspace (Document 1, Document 10) – The creation and responsibilities of the U.S. Cyber Command (Document 6, Document 8) – The role of the Cyber Command and other military cyber organizations in Operation Gladiator Shield – defense of the Global Information Grid (Document 12) – The Joint Chiefs of Staff-mandated process for computer network defense activities (Document 2) – The Department of Defense strategy for counterintelligence in cyberspace (Document 3) – DoD policy, responsibilities, and procedures with regard to human intelligence operations in cyberspace (Document 19)

Check out today’s posting at the National Security Archive –

Find us on Facebook –

Unredacted, the Archive blog –


THE NATIONAL SECURITY ARCHIVE is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C. The Archive collects and publishes declassified documents acquired through the Freedom of Information Act (FOIA). A tax-exempt public charity, the Archive receives no U.S. government funding; its budget is supported by publication royalties and donations from foundations and individuals.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.