(2014-1059-F) Cyber Warfare and Kosovo

6 folders, approximately 278 pages

This collection consists of records related to cyber warfare operations in conjunction with Operation Allied Force in Kosvo from March 1999 to July 1999. Operation Allied Force was the North Atlantic Treaty Organization (NATO) led bombing campaign during the war in Kosovo. The United States Armed Forces refer to this same campaign as Operation Noble Anvil. Cyber warfare is something quite new in the history of international conflict. In 1998, the administration released Presidential Decision Directive 63 (PDD/NSC-63) which addressed the increasing vulnerability of computer networks and called for public and private partnerships to protect these systems. Following the release of PDD-63 and a number of successful attacks against American computer systems the administration was much more aware of the growing use of computers as a tool for terrorism or warfare. The collection contains press transcripts, press briefings, and press guidance.

The materials in FOIA 2014-1059-F are a selective body of documents responsive to the topic of the FOIA. Researchers should consult the archivist about related material. Freedom of Information Act (FOIA) request 2014-1059-F was for records related to cyber warfare operations in conjunction with Operation Allied Force in Kosovo from March 1999 to July 1999. Operation Allied Force was the North Atlantic Treaty Organization (NATO) led bombing campaign during the war in Kosovo. The United States Armed Forces refer to this same campaign as Operation Noble Anvil. Records in this collection include press transcripts, press briefings, and press guidance. Cyber warfare is something quite new in the history of international conflict. NATO noted on its website, “Cyber-The Good, The Bad and the Bug Free: The History of Cyber Attacks—A timeline,” that it was not until the Morris virus in 1988 that there was a large scale attack on the world’s computer systems. Many journalists, historians, and academics note though that work toward exploitation of computer systems began as early as the 1970s. The focus remained, even into the 1990s, on intelligence gathering or protection of computer networks not on attacking and disabling systems. This can be seen in the National Security Agency’s Cray Supercomputers, the National Bureau of Standards, data encryption standards; or in the development of the Cryptographic Keying Device (KOK-1). Some who have studied cyber warfare note that it was not until the discovery of the Stuxnet virus in 2010 that anyone knew of a malware virus that could subvert infected systems. Time magazine ran an article, “Onward Cyber Soldiers” (August 21, 1995), in which they introduced the United States Army’s Intelligence and Security Command (INSCOM). The article describes the efforts of the Army to deal with the “what ifs” of early cyber conflict. During the Clinton administration cyber activities and cyber warfare was all very new. This was, after all, the first administration to have widespread access by staff to e-mail and computers. The administration didn’t even have a common language, referring to cyber warfare as information warfare, critical infrastructure, or variations on cyber. In 1997, the U.S. held a military exercise, Operation Eligible Receiver, which was focused primarily on computer warfare. The National Security Agency, acting as the hostile team, was able to compromise a number of government computer networks. By 1998, the administration released Presidential Decision Directive 63 (PDD/NSC-63) which addressed the increasing vulnerability of computer networks and called for public and private partnerships to protect these systems. Following Eligible Receiver, the release of PDD-63, and a number of successful attacks against American computer systems the administration was much more aware of the growing use of computers as a tool for terrorism or warfare. Richard Clarke and George Tenet both spoke, in 1998, about information warfare or cyber warfare as a tool of both the United States and those who would act against the United States. During Kosovo, the NATO peacekeeping effort and the United States faced a number of number of attacks on computer networks from hacker groups who supported the Serbians. It was not until the final years of the administration that the White House began to think in earnest of the threat and possibility of cyber warfare.

Textual

Records that are responsive to this FOIA request were found in these collection areas— Clinton Presidential Records: White House Staff and Office Files, Clinton Presidential Records: ARMS Emails, Clinton Presidential Records: TRP Emails, and Clinton Presidential Records: NSC Cable, Email, and Records Management Systems. Staff and Office files were maintained at the folder level by staff members within their individual offices and document all levels of administration activity. The Automated Records Management System (ARMS) is a database that contains email records of the Executive Office of the President. This system maintained unclassified Presidential email. The ARMS database is comprised of six sub-series of email records called "buckets." The buckets generally represent a specific White House office. The buckets are titled: NPR for National Performance Review, OPD for Office of Policy Development, POTUS for President of the United States, WHO for White House Office, CEA for Council of Economic Advisers, and Default for emails not associated with an office. The Tape Restoration Project (TRP) is a database consisting of restored emails from the Automated Records Management System (ARMS) from July 1994 through June of 2000. The TRP is a database that contains email records of the Executive Office of the President. This system maintained unclassified Presidential record email. The TRP database is comprised of the same six sub-series of email as in ARMS. TRP email are arranged by topic, there-under by bucket, and there-under chronologically by creation date.

Collection is open to all researchers. Access to Clinton Presidential Records is governed by the Presidential Records Act (PRA) (44 U.S.C. Chapter 22, as amended) and the Freedom of Information Act (FOIA) (5 U.S.C. 552, as amended) and therefore records may be restricted in whole or in part in accordance with legal exemptions.

Official records of William Jefferson Clinton’s presidency are housed at the Clinton Presidential Library and administered by the National Archives and Records Administration (NARA) under the provisions of the Presidential Records Act (PRA).

Staff Archivist, 2016. Previously restricted materials are added as they are released.

The following is a list of documents and folders processed in response to FOIA 2014-1059-F.
Box 1
Clinton Presidential Records: White House Staff and Office Files
National Security Council
Transnational Threats
Kurtz, Paul/Montgomery, Mark
Yugoslavia – Cyber [OA/ID 3556]
Clinton Presidential Records: Automated Records Management System [Email]
NSC [OA/ID 1200000]
[Cyber, Kosovo]
[05/13/1999-07/28/1999]
Clinton Presidential Records: Tape Restoration Project [Email]
NSC [OA/ID 1200000]
[Cyber, Kosovo]
[05/24/1999-06/01/1999]
Clinton Presidential Records: NSC Cable, Email, and Records Management System
NSC Cables
Jan 1999-Dec 2000 [OA/ID 530000]
[Cyber, Kosovo]
[03/30/1999-07/01/1999]
[Information Warfare, Kosovo]
[03/31/1999-07/15/1999]
NSC Email
Exchange-Non-Record (Mar 97-Jan 01) [OA/ID 630000]
[Cyber, Kosovo]
[04/09/1999-06/24/1999]