{"id":2520,"date":"2016-04-08T15:34:36","date_gmt":"2016-04-08T15:34:36","guid":{"rendered":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/?p=2520"},"modified":"2024-11-26T17:49:57","modified_gmt":"2024-11-26T17:49:57","slug":"cybervault-how-is-the-us-government-involved-in-cyberhacking-defence-and-war","status":"publish","type":"post","link":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/2016\/04\/08\/cybervault-how-is-the-us-government-involved-in-cyberhacking-defence-and-war\/","title":{"rendered":"Cybervault- How is the US government involved in cyberhacking\/ defence and war?"},"content":{"rendered":"<p><span style=\"font-family: 'Times New Roman','serif';font-size: 12pt\"><span style=\"color: #000000\">National Security Archive based at George Washington University has just <\/span><a href=\"http:\/\/nsarchive.gwu.edu\/cybervault\/\"><span style=\"color: #0000ff\">launched this new specialist site<\/span><\/a><span style=\"color: #000000\"> to reveal and monitor the activities of the US government concerning cyberspace.\u00a0 This includes hacking, monitoring, defence and cyberwarfare.\u00a0 Access the text of several hundred documents, many released through Freedom of Information requests.<br \/>\nSee the <\/span><a href=\"https:\/\/nsarchive.wordpress.com\/2016\/03\/30\/the-national-security-archive-launches-the-cyber-vault\/\"><span style=\"color: #0000ff\">launch blog posting<\/span><\/a><span style=\"color: #000000\"> for details of key texts and rationale.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>National Security Archive based at George Washington University has just launched this new specialist site to reveal and monitor the activities of the US government concerning cyberspace.\u00a0 This includes hacking, monitoring, defence and cyberwarfare.\u00a0 Access the text of several hundred documents, many released through Freedom of Information requests. See the launch blog posting for details [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,12,13],"tags":[61,95],"class_list":["post-2520","post","type-post","status-publish","format-standard","hentry","category-criminology","category-media-and-communication","category-politics","tag-internet","tag-usa"],"_links":{"self":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/comments?post=2520"}],"version-history":[{"count":1,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2520\/revisions"}],"predecessor-version":[{"id":2521,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2520\/revisions\/2521"}],"wp:attachment":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/media?parent=2520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/categories?post=2520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/tags?post=2520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}