Home : Research : Library : Media Coverage

MEDIA COVERAGE

ACI SPOTLIGHT
HOMELAND SECURITY THEATER
Dec. 7, 2022

Thwarting the social instabilities and political divisions created by bots and other manipulators of information requires creative countermeasures, including aesthetic ones. This belief describes the gameplan of the Department of Homeland Security, which is betting that aesthetics can help safeguard a democracy that has come to seem increasingly fragile.

READ MORE


West Point cadets see role of final frontier in defense
Oct. 28, 2022

WEST POINT, N.Y. – Cadets at the U.S. Military Academy are learning the importance of Army space from the Space and Missile Defense’s Space and High-Altitude Research Center.

Lt. Col. Craig Boucher, director of the SMDC Space and High-Altitude Research Center at West Point, said the center’s mission is to provide space and multi-domain operations education and training and provide operationally relevant space- and missile defense-related research projects for cadets. The center’s role is multi-faceted, but they focus on developing space-aware and space-smart leaders for the Army and the Army’s contribution to the joint force.

“Beyond that the vision is to inspire the next generation of Army leaders to pursue careers in space and missile defense,” he said. “On the training and education side of things we provide the space and multi-domain expertise along with the Army Cyber Institute to raise awareness across the corps of cadets on how space enables their tactical actions on the battlefield and reinforce why things like basic land navigation skills are so important when GPS is denied by an adversarial force.”

READ MORE


Virginia Guard, Partners Conduct Cyber Exercise
Oct. 26, 2022

RICHMOND, Va. – Approximately 20 Virginia National Guard Soldiers and Airmen took part in the Cyber Fortress exercise with public and private sector partners Sept. 21-30.

READ MORE


What a 1904 War Can Teach Vladimir Putin
June 23, 2022

When, in an expansionist mood, Russia embarked on an ill-judged war of territorial conquest against its neighbor, it did so with a grandiose sense of its conquering power. Russia’s leader, who ruled nearly as an absolute monarch and held his counterpart next door in contempt, believed that his country’s interests were threatened, that Russia deserved more influence and respect. He had envisioned a scenario in which his enemy would yield quickly in the face of overwhelming odds and accede to Russian territorial demands.

READ MORE


Why Hasn’t Russia Unleashed ‘Cybergeddon’ in Its War on Ukraine?
May 5, 2022

Russia’s war in Ukraine, now nearing its 10-week mark, has been devastating, killing thousands of civilians and forcing millions to flee their homes. Thus far, this devastation has been wrought primarily by conventional military means, without Moscow launching the “full-scale cyber assault” or “cybergeddon-scale attacks” feared early on. As various authors have pointed out, “Ukrainian air defense and aircraft didn’t appear to be affected by cyber disruptions, and there are no reports of critical infrastructure damage from cyberattacks”; “Ukraine’s electricity grid, its communications systems and other infrastructure are still largely up. Its president is streaming from his government office.” Why?

READ MORE


The Cyber-Escalation Fallacy: What the War in Ukraine Reveals About State-Backed Hacking
April 15, 2022

During a Senate Intelligence Committee hearing in March, Senator Angus King, an independent from Maine, pressed General Paul Nakasone, the head of U.S. Cyber Command and director of the National Security Agency, about the lack of significant cyber-operations in Russia’s war in Ukraine. After all, Russia has long been known for targeting Western countries, as well as Ukraine itself, with cyberattacks. Echoing the surprise of many Western observers, King said, “I expected to see the grid go down, communications too, and that hasn’t happened.” Indeed, although President Joe Biden and members of his administration have also warned of potential Russian cyberattacks against the United States, there were remarkably few signs of such activity during the first six weeks of the war.

READ MORE


Future is now
April 15, 2022

The danger is that America’s over-correction of its earlier stand on future threats may significantly undermine its capability to deal with the present global security scenario. Most 21st century conflicts are still being fought with conventional if advanced precision weapons by troops on the ground. Washington would do well to remember that.

READ MORE


WE NEED SENIOR CYBER LEADERS. SERVICE WAR COLLEGES CAN TRAIN THEM
April 1, 2022

With the White House warning of Russian cyber attacks, senior U.S. cyber leaders could soon be forced to make critical and unprecedented decisions in this battlespace. Now more than ever, the Department of Defense needs specifically trained senior officers who have both the technical and strategic education to confront this challenge. The department is currently focused on developing technically skilled people in the junior uniformed and civilian ranks. This, however, is insufficient.

In order to prepare a new generation of senior cyber leaders, the service war colleges should begin by implementing a “Cyberspace Strategic Studies” track. Although their student bodies vary, these colleges share similar goals: improving the professional education of the highest levels of military leadership and applying the lessons learned during war. This makes the war colleges ideally suited to prepare our future cyber generals and senior civilian leaders.

READ MORE


Putin’s invasion of Ukraine didn’t rely on cyberwarfare. Here’s why.
March 8, 2022

The ongoing conflict in Ukraine has perplexed observers expecting to see the cyber dimension unfold differently. When Russia began to mass troops along Ukraine’s borders, analysts predicted that cyber operations would be critical to Putin’s military strategy.

One headline offered that the Russian invasion could “redefine cyberwarfare.” Former White House cyber expert Jason Healey hypothesized that “it will be the first time a state with real capabilities is willing to take risks and put it all on the line.”

Despite these predictions, the expected “shock and awe” Russian cyber campaign in preparation of the invasion of Ukraine never emerged. Moreover, while the conflict will undoubtedly evolve, cyber operations don’t appear to be playing a decisive role on the battlefield.

READ MORE


Commander of U.S. Army Cyber Command to speak at The Citadel
Jan. 26, 2022

CHARLESTON, S.C. (WCBD) – The commanding general for U.S. Army Cyber Command (ARCYBER) will speak at a conference focusing on cyber resiliency for critical infrastructure, which is scheduled to take place February 24-25 at The Citadel.

Lt. General Stephen G. Fogarty will deliver a keynote address at the Jack Voltaic Cyber Conference.

The project was developed by the Army Cyber Institute to analyze weaknesses in critical infrastructure through "an innovative, bottom-up approach… focusing on cities and municipalities where critical infrastructure and populations are substantial."

READ MORE


Army to use science fiction to envision information warfare, WMD threats
Jan. 26, 2022

The Army Cyber Institute is turning to an unusual source to help leaders anticipate future threats: graphic novels. Three graphic novels based on research into information warfare and weapons of mass destruction are intended to “generate conversation within the Army, NATO and the broader community about the future threats in the environment and today’s actions to prepare for those threats,” according to a Jan. 24 notice ...

READ MORE


The Army wants someone to make comics about its information warfare doctrine
Jan. 26, 2022

WASHINGTON: It’s not unusual for the military to seek out specialized contractors with a unique set of skills. But a new solicitation has the Army looking for someone with a more artistic bent — someone who can take technical information about the service’s cyber and weapons of mass destruction strategies and turn them into comic books.

According to a SAM.gov notice, the Army Cyber Institute wants to use science-fiction prototyping (SFP) — science-fiction stories, graphic novels/comics, movies and animations to explore the implications of futuristic technologies — to support the service’s and NATO’s research about future operating environments.

READ MORE


Is the U.S. military’s futurism obsession hurting national security?
Jan. 19, 2022

This fascination with the future extends to the U.S. Department of Defense, which has been seeking science fiction writers to help predict the nature of tomorrow’s conflicts. Calls for proposals have asked consultants to imagine how artificial intelligence (AI) will “change how decisions are made on the battlefield.” NATO recently published a set of short stories on the future of warfare in 2036, and the Army Cyber Institute commissioned an “Invisible Force” graphic novel to explore the role of cyberattacks in a 2030 conflict scenario.


READ MORE


What do Russia’s cyber moves mean for the Ukraine crisis?
Jan. 13, 2022
Dr. Erica D. Lonergan (nee Borghard) discusses the current situation surrounding the Ukraine:

" U.S., European and Russian negotiators are meeting this week to discuss the security crisis over Ukraine, and the steady buildup of Russian troops along the Ukraine border. The United States and its European allies have threatened to impose additional sanctions on Russia if President Vladimir Putin invades its neighbor."

READ MORE


A Ranked Solution for Social Media Fact Checking Using Epidemic Spread Modeling
Jan. 7, 2022
Within the past decade, social media has become a primary platform for consumption of information and current events. Unlike with traditional news sources, however, social media posts do not have to go through a rigorous validation process prior to publication. The 2019 Mueller Report illustrates how malicious actors have taken advantage of these lax requirements to sway public opinion on topics from the #blacklivesmatter movement to the 2016 U.S. Presidential election.

READ MORE


Static Inertia: The Legal Challenges to Making Progress on an Effective Military Information Strategy
Jan. 4, 2022
The United States military is constantly reorganizing and retooling itself to address information operations in gray-zone competition. Unfortunately, forward progress is hard to come by, and operations in the information environment remain an Achilles’ heel, which adversaries use against us to great effect. There is no shortage of ideas and proposals to address the information operations problem, but no solution has been able to overcome the static inertia and impel progress.


READ MORE

Episode 3: 21st Century Propaganda: Understanding Today's Threats
Dec. 22, 2021
This podcast explores how threat actors are manipulating the British and American information environments and provides recommendations for how the government and citizenry might defend themselves. David V. Gioe and co-authors Daniel Dobrowolski and Alicia Wanless argue that enforcing heavy moderation of content is counterproductive and that civic education, transparency, media literacy and ongoing research into the methods that threat actors use are essential to guide an effective response.

LISTEN HERE


Cybersecurity Anomaly Detection in Adversarial Environments
Nov. 3, 2021
The proliferation of interconnected battlefield information-sharing devices, known as the Internet of Battlefield Things (IoBT), introduced several security challenges. Inherent to the IoBT operating environment is the practice of adversarial machine learning, which attempts to circumvent machine learning models.

READ MORE HERE!

Data Privacy and Security as a National Security Imperative
Oct. 30, 2023

Though some may see data privacy as a purely consumer issue, data in the hands of malicious actors and foreign adversaries who seek to exploit Americans’ personal information can present cybersecurity and national security risks. Key strategy documents like the 2023 National Cybersecurity Strategy and Annual Threat Assessment of the U.S. Intelligence Community illuminate the need to safeguard our data. They highlight how adversaries can use this data against us—whether collected through commercial data aggregation or cyber breaches, which can increase the success of their espionage, influence, kinetic and cyberattack operations, or disinformation campaigns.

Join the R Street Institute for a special virtual event exploring the nexus between data privacy and security. Panelists will explore threats and risks; responsible and practical approaches to protect Americans’ data while allowing responsible use; and possible paths forward, such as a federal comprehensive data privacy and security law and other legislative and non-legislative options.


Command by intent can ensure command post survivability
Aug. 29, 2023

In a changing operational environment, where command posts are increasingly vulnerable, intent can serve as a stealth enabler.

A communicated commander’s intent can serve as a way to limit electronic signatures and radio traffic, seeking to obfuscate the existence of a command post. In a mission command-driven environment, communication between command post and units can be reduced. The limited radio and network traffic increases command post survivability.

READ MORE


The Tipping Point for Army Distributed Command and Control
Aug. 1, 2023

For more than a year, the U.S. Army’s I Corps has been advancing a key initiative called distributed command and control (C2), allowing the service to communicate and fight with joint and allied partners across the vast Indo-Pacific region. The Corps is putting pieces into place, operationalizing their vision of a nodal-based C2 system, a resilient transport layer, hybrid cloud and data warriors, corps technology leaders report.

READ MORE


Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Department of Defense is failing to keep pace with current cyber domain demands, with a 25% vacancy rate across the department.

Though recruiters often target science, technology, engineering and math (STEM) students, panelists at the Homeland Security Conference proclaimed most everyday citizens can be trained in the field.

“I would argue that I can take anyone that has a passion and interest and good character and work ethic, and teach them the basic fundamentals of cybersecurity,” said Eric Scott, Information and Cybersecurity Department director at Georgia Tech Research Institute.

Metro Atlanta Representative Sebastian Barron spoke on behalf of the office of Gov. Brian Kemp to inform conference attendees of the vast shortage in cyber professionals in the state of Georgia. Nevertheless, there are more than 1.2 million kids in K-12 in Georgia who could take over as the next generation of cyber professionals.

READ MORE


The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

An electromagnetic pulse (EMP) may be naturally occurring or can be created from the detonation of a nuclear weapon high above the Earth’s surface. Various presidential administrations have grappled with how to best manage risks around EMP threats. As this paper explains, the nuclear EMP debate is unfortunately often framed between two extremes. Some administrations have focused on naturally occurring EMP threats, such as space weather events, whereas others have focused predominately on the nuclear EMP threat, or even taken a hybrid approach here. Despite this contretemps, protecting against one form of an EMP threat thankfully also serves to protect against the other. Thus, this paper recommends that the United States Government and private sector work together to harden the electric grid from both natural and man-made EMP incidents, and establish an EMP Manhattan Project to develop national contingency plans for such scenarios.

READ MORE


Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

A few years ago, the US Army Cyber Institute stated that one of the biggest security threats came in the form of disinformation. So keen were they to press their point, they commissioned a graphic novel to outline the scenarios in which military capability and communication could be degraded by enemy disinformation. The idea was that everyone – particularly soldiers – would read a comic, while the serious messages on topics such as ‘microtargeting’ and ‘post truth’ were tucked away as articles between the pictures.

READ MORE


West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023

The date was May 8, 2021, and the Colonial Pipeline Company announced it halted its operations due to a ransomware attack, which disrupted critical supplies of gasoline and other refined products throughout the east coast of the United States – most notably, the southeast part of the U.S.

In the previous three years from 2018-20, similar ransomware attacks shutdown pipelines and customer communications systems were interrupted at four of the nation’s largest natural gas pipeline companies.

These incidents, and specifically the Colonial Pipeline Company cyberattack, have elevated the concern of security of the nation’s energy pipelines and government programs to protect critical infrastructure.

It is incidents like these that provided Palo Alto Networks, Inc., the world’s largest and leader in cybersecurity protection and software, the inspiration to bring industry and government entities together to collaborate to defend against current and future cyber threats by leveraging the unique communities of the service academies.

READ MORE


Soldiers innovating technology, refining tactical concepts, and strengthening partnerships
April 11, 2023

SCHOFIELD BARRACKS, Hawaii – Soldiers from the 11th Cyber Battalion, 780th Military Intelligence (MI) Brigade (Cyber), U.S. Army Cyber Command (ARCYBER) refined tactical Cyber-Electromagnetic Activities (CEMA) concepts for the Army during an Operational Readiness Assessment here in late March 2023.

For the event the 11th Expeditionary CEMA Teams (ECTs) employed innovative technology with assistance from experts from the Army Cyber Institute (ACI) at the U.S. Military Academy at West Point, the Army Program Executive Office – Intelligence, Electronic Warfare and Sensors (PEO IEW&S) and industry partners, along with training with the Combat Mission Team, Detachment-Hawaii, 782nd MI Battalion (Cyber).

READ MORE

Army Cyber Institute
Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Institute
VIRIN: 191213-A-ZZ999-0001
Cyber Response is a Team Effort
July 27, 2020

Army Cyber Institute
Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Institute
VIRIN: 191213-A-ZZ999-0001
5th SFG(A) Cyber Detachment stays ready with virtual competition
April 17, 2020

Members of Team Black Jacks of the West Point Cyber Policy Cyber Policy team sweeps Texas Cyber 9/12 competition: Team make their policy recommendations to the judges during the Atlantic Council's Cyber 9/12 Student Strategy Challenge at the University of Texas at Austin Law School
Cyber Policy team sweeps Texas Cyber 9/12 competition
Members of Team Black Jacks of the West Point Cyber Policy Team make their policy recommendations to the judges during the Atlantic Council's Cyber 9/12 Student Strategy Challenge at the University of Texas at Austin Law School
Photo By: Army Cyber Institute
VIRIN: 190220-A-ZZ999-0001
Cyber Policy team sweeps Texas Cyber 9/12 competition
Jan. 30, 2020

Demonstrations in Iran last year and signs of the regime’s demise raise a question: What would the strategic outcome be of a massive cyber engagement with a foreign country or alliance?
Why Iran would avoid a major cyberwar
Demonstrations in Iran last year and signs of the regime’s demise raise a question: What would the strategic outcome be of a massive cyber engagement with a foreign country or alliance?
Photo By: Fifth Domain
VIRIN: 190220-A-ZZ999-0002
Why Iran would avoid a major cyberwar
Jan. 17, 2020

Army Cyber Institute
Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Institute
VIRIN: 191213-A-ZZ999-0001
Are you at greater risk of cyber attacks when international tensions climb?
Jan. 17, 2020
A new mindset for the Army: silent running. The Virginia-class attack submarine Indiana departs Newport News Shipbuilding to conduct sea trials. The Indiana is one of the last of the Block III Virginias. The Army may want to consider following the idea of "silent running" that many submarines use to operate.
A new mindset for the Army: silent running
The Virginia-class attack submarine Indiana departs Newport News Shipbuilding to conduct sea trials. The Indiana is one of the last of the Block III Virginias. The Army may want to consider following the idea of "silent running" that many submarines use to operate.
Photo By: Matt Hildreth
VIRIN: 191212-A-ZZ999-0001
A new mindset for the Army: silent running
Dec. 6, 2019

Cyber experts discuss data and sovereignty and how it pertains to Defending Forward during their panel at the International Conference on Cyber Conflict U.S.
CyCon U.S. brings cyber experts together
Cyber experts discuss data and sovereignty and how it pertains to Defending Forward during their panel at the International Conference on Cyber Conflict U.S.
Photo By: Army Cyber Institute
VIRIN: 191212-A-ZZ999-0002
CyCon U.S. brings cyber experts together
Dec. 5, 2019

Army Cyber Institute
Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Institute
VIRIN: 191213-A-ZZ999-0001
Cybersecurity expert offers tips for protecting the privacy and safety of children from internet-connected toys
Dec. 5, 2019

Jack Voltaic: Lt. Col. Doug Fletcher, Critical Infrastructure Key Resources team for the Army Cyber Institute at West Point, explains the importance of Jack Voltaic to more than 70 personnel from public and private sectors from the cities of Savannah and Charleston.
Jack Voltaic
Lt. Col. Doug Fletcher, Critical Infrastructure Key Resources team for the Army Cyber Institute at West Point, explains the importance of Jack Voltaic to more than 70 personnel from public and private sectors from the cities of Savannah and Charleston.
Photo By: Lisa Beum
VIRIN: 190828-A-BR833-292
Cybersecurity brought to the forefront at Jack Voltaic
Sept. 16, 2019

After a cyberattack, the waiting is the hardest part: U.S. Marines debark from an MV-22B Osprey at Al Asad Air Base, Iraq in June 2018. A cyberattack could slow how U.S. forces respond to a battlefield.
After a cyberattack, the waiting is the hardest part
U.S. Marines debark from an MV-22B Osprey at Al Asad Air Base, Iraq in June 2018. A cyberattack could slow how U.S. forces respond to a battlefield.
Photo By: Fifth Domain
VIRIN: 190916-A-ZZ999-0001
After a cyberattack, the waiting is the hardest part
Sept. 16, 2019

Cyber AIAD: Cadets visit the Joint Cyber Center, U.S. Army African Command in Stuttgart, Germany to hear about and discuss real-world issues within the cyber domain and how it affects military operations.
Cyber AIAD
Cadets visit the Joint Cyber Center, U.S. Army African Command in Stuttgart, Germany to hear about and discuss real-world issues within the cyber domain and how it affects military operations.
Photo By: Brandon OConnor
VIRIN: 190701-A-QG670-1004
Cadets build relationships, knowledge on Cyber AIAD
Sept. 16, 2019

Putting a value on the 50x coder, by Jan Kallberg: As an industrial nation transitioning to an information society with digital conflict, we tend to see the technology as the weapon. In the process, we ignore the fact that few humans can have a large-scale operational impact. 

But we underestimate the importance of applicable intelligence, the intelligence on how to apply things in the right order. Cyber and card games have one thing in common: the order you play your cards matters. In cyber, the tools are mostly publically available, anyone can download them from the Internet and use them, but the weaponization of the tools occur when they are used by someone who understands how to use the tools in the right order.
Putting a value on the 50x coder
As an industrial nation transitioning to an information society with digital conflict, we tend to see the technology as the weapon. In the process, we ignore the fact that few humans can have a large-scale operational impact. But we underestimate the importance of applicable intelligence, the intelligence on how to apply things in the right order. Cyber and card games have one thing in common: the order you play your cards matters. In cyber, the tools are mostly publically available, anyone can download them from the Internet and use them, but the weaponization of the tools occur when they are used by someone who understands how to use the tools in the right order.
Photo By: FifthDomain
VIRIN: 190816-A-ZZ999-0002
Putting a value on the 50x coder
Aug. 16, 2019

Ubiquitous Connections Depend Upon Additional Security Skills: Northeastern University and the Army Cyber Institute at West Point hosted a Cyber Day to bring subject matter experts within the civilian and military sectors to discuss cyber topics, including a capture-the-flag activity to identify talent, protection of critical infrastructure, augmented reality, and cyber talent and education.
Ubiquitous Connections Depend Upon Additional Security Skills
Northeastern University and the Army Cyber Institute at West Point hosted a Cyber Day to bring subject matter experts within the civilian and military sectors to discuss cyber topics, including a capture-the-flag activity to identify talent, protection of critical infrastructure, augmented reality, and cyber talent and education.
Photo By: The Cyber Edge
VIRIN: 190816-A-ZZ999-0001
Ubiquitous Connections Depend Upon Additional Security Skills
Aug. 16, 2019

USMA Faculty Building Cyber Bridges with NATO Allies and Partners
USMA Faculty Building Cyber Bridges with NATO Allies and Partners
Around 600 decision-makers, opinion-leaders, law and technology experts from the governments, military, academia and industry of nearly 50 countries meet at CyCon to address current cyber security challenges in an interdisciplinary manner.
Photo By: Army Cyber Institute
VIRIN: 190711-A-ZZ999-0001
USMA Faculty Building Cyber Bridges with NATO Allies and Partners
Aug. 16, 2019

Cyber Threat Report June 07, 2019
Cyber Threat Report June 07, 2019
Cyber Threat Report June 07, 2019
Photo By: Army Cyber Institute
VIRIN: 190607-A-ZZ999-0001
Cyber Threat Report June 07, 2019
June 11, 2019

Army Cyber Institute Cyber Threat Report

Tech Trends: Stories and Highlights:
'Blockchain Bandit' steals millions in Ethereum by guessing weak private keys, White House issues Executive Order on America's Cybersecurity Workforce, Tencent's Keen Security Lab gains Tesla steering control remotely and fools Autopilot, FBI and IC3 release annual Internet Crime Report
Cyber Threat Report May 06, 2019
Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights: 'Blockchain Bandit' steals millions in Ethereum by guessing weak private keys, White House issues Executive Order on America's Cybersecurity Workforce, Tencent's Keen Security Lab gains Tesla steering control remotely and fools Autopilot, FBI and IC3 release annual Internet Crime Report
Photo By: Army Cyber Institute
VIRIN: 190510-A-ZZ999-0001
Cyber Threat Report May 06, 2019
May 10, 2019

Lucand Camacho was one of the few selected nationally to attend the prestigious Army Cyber Institute Internship this summer from July 15 to August 11 at the West Point Military Academy in New York.
Guam son accepted into Army Cyber Institute internship at West Point
Lucand Camacho was one of the few selected nationally to attend the prestigious Army Cyber Institute Internship this summer from July 15 to August 11 at the West Point Military Academy in New York.
Photo By: Army Cyber Institute
VIRIN: 190508-A-ZZ999-001
Guam son accepted into Army Cyber Institute internship at West Point
May 8, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Jack Voltaic 2.0 Gives a Glimpse of Future Infrastructure Protection
April 9, 2019

Guang Niu / Reuters
Guang Niu / Reuters
https://www.cfr.org/blog/chinese-hackers-are-stealing-us-defense-secrets-here-how-stop-them
Photo By: Reuters
VIRIN: 190322-A-JZ122-1002
Chinese Hackers are Stealing U.S. Defense Secrets: Here is How to Stop Them
April 9, 2019

CyberCom
CyberCom
https://warontherocks.com/2019/03/what-a-u-s-operation-against-russian-trolls-predicts-about-escalation-in-cyberspace/
Photo By: War on the Rocks
VIRIN: 190322-A-JZ122-1001
What a U.S. Operation Against Russian Trolls Predicts About Escalation in Cyberspace
April 9, 2019

Cyber Threat Report 04 April 2019
Cyber Threat Report 04 April 2019
Cyber Threat Report 04 April 2019
Photo By: Army Cyber Institute
VIRIN: 190405-A-ZZ999-0001
Cyber Threat Report 04 April 2019
April 5, 2019

Cyber Threat Report 04 March 2019
Cyber Threat Report 04 March 2019
Cyber Threat Report 04 March 2019
Photo By: Army Cyber Institute
VIRIN: 190304-A-ZZ999-0001
Cyber Threat Report 04 March 2019
March 4, 2019

Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Insitute
VIRIN: 190221-A-ZZ999-0002
Improving student STEM skills
Feb. 21, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Coalitions Key to Successful Cyber Defense
Feb. 7, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Jack Voltaic 2.0: Threats to Critical Infrastructure
Feb. 6, 2019

Cyber Threat Report 02 February 2019
Cyber Threat Report 02 February 2019
Cyber Threat Report 02 February 2019
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0003
Cyber Threat Report 02 February 2019
Feb. 6, 2019

Cyber Threat Report January 03, 2019
Cyber Threat Report January 03, 2019
Tech Trends: Stories and Highlights:French data protection agency fines Uber €400k for a 2016 data breach, FCC fines satellite startup Swarm Technologies $900k over unauthorized launch, Amazon expands its fleet of Prime Air planes. Read more in the Cyber Threat Report
Photo By: Army Cyber Institute
VIRIN: 190104-A-ZZ999-1001
Cyber Threat Report 03 January 2019
Jan. 4, 2019
Cyber warrant officer leads West Point research program for protecting critical U.S. infrastructure
By U.S. Army Cyber Command | Nov. 1, 2018
A major project to explore employment of the total Army force to defend the nation's critical
Force of Nature: Settling A 250-Year-Old Statistics Puzzle
By Fox School of Business | Sept. 26, 2018
Research from Deep Mukhopadhyay, professor of statistical science, and Douglas Fletcher, a PhD
U.S. Army in Cyberspace
By U.S. Army Cyber Command | Sept. 25, 2018
The U.S. Army is engaged in the cyber domain every day to achieve and maintain superiority in
A look back at the winners of the cyber 9/12 student challenge 2018
By GCSP | Sept. 25, 2018
Team Black Knights of the US Military Academy at West Point were the winners of the Cyber 9/12
Protecting Financial Institutions Against Cyber Threats: A National Security Issue
By Erica Borghard | Sept. 24, 2018
The U.S. economy is susceptible to offensive operations carried out by national security adversaries
Cyberthreat Update: Efficiency Versus Security
By AFCEA.org | Jan. 17, 2018
Col. Andrew O. Hall, USA, director, Army Cyber Institute, opened AFCEA’s first Cyber Education,
West Point Shows Off Cyber Chops in Higher Ed Challenge
By edscoop | Nov. 3, 2017
"Four faculty members at the U.S. Military Academy in West Point have proven themselves to be among
Military Aims to Maintain Its Cyber Mission Force Roster
By GovTech Works | Oct. 19, 2017
What the U.S. military is trying to achieve in building its Cyber Mission Force is akin to building
Cybersecurity is becoming a problem people can't ignore, hackers say
By Chicago Tribune | Oct. 19, 2017
People often pay more attention to the benefits of modern technology than its problems — in part
Cyber Warfare: How the U.S. Military, Tech Companies Shield Themselves
By Chicago Tonight | Oct. 18, 2017
The past few years have taught us that no single entity is safe from hacks, leaks or data
Promise & Peril
By National Guard Magazine | Oct. 10, 2017
"By 2025, a wildly wired world will bring a wealth of convenience and efficiency. With it will come
Cyber Policy Team Wins Cyber Competition
By PointerView | Oct. 5, 2017
The U.S. Military Academy Cyber Policy team won the inaugural Indo-Pacific Cyber 9/12 Student
What the Heck Is Threatcasting?
By Slate | Sept. 15, 2017
"Threatcasting emerged in 2007 as a variation on the futurecasting process that one of us, Brian,
Fire, Maneuver - and FireChat
By Small Wars Journal | Aug. 26, 2017
"Tools such as FireChat, though impressive in their own right, are representative of emerging
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
By Combating Terrorism Center | Aug. 16, 2017
"Terrorist groups are increasingly using encryption to plan and coordinate terrorist acts, leading
Envisioning the Future to Empower Action
By IEEE Computer Society | Aug. 3, 2017
"At a threatcasting workshop, participants imagined tomorrow's threats and identified concrete steps
When the NSA Spots a Crack in Commercial Software – Should It Tell?
By The Cipher Brief | July 14, 2017
"One of the only tasks the U.S. Constitution declares that the federal government must do is to
Why can’t America reliably separate out fact, falsehood, opinion and reasoned analysis?
By The National Interest | July 1, 2017
"One commentator asserted that the purpose of fake news “is not to pose an alternative truth . . .
What Internet-Connected War Might Look Like
By Linux Insider | May 10, 2017
"During their talk, the institute's Major Natalie Vanatta and Captain Erick Waage mused on dramatic
Redefining the Battlefield: the Army Cyber Institute at West Point
By West Point Magazine | April 1, 2017
"The Army Cyber Institute was designed with the unique ability (not just within the Army and West
The Intelligence Costs of Underestimating Russia: A Warning from History
By War on the Rocks | March 31, 2017
"Questions over the extent and nature of the relationship between President Donald Trump’s
Terrorists use the Dark Web to hide
By USATODAY | March 27, 2017

 

The CyberWire Daily Podcast(Futurist Brian David Johnson explains Threatcasting)
By The CyberWire Daily Podcast | March 17, 2017
"The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and
Information Warfare Isn't Russian
By The Strategy Bridge | March 8, 2017
"Information warfare is not new, but developments in information technology have enabled it to
Intelligence Officers Won’t Exit En Masse During the Trump Administration
By Lawfare Blog | March 3, 2017
"Former intelligence analyst Edward Price dramatically resigned from CIA last week in an op-ed in
CIA service and sacrifice will continue, no matter who is sitting in the White House
By Foreign Policy | Feb. 17, 2017
"CIA officers are not a monolithic bunch. Some are introverts, some are extroverts. Some are
Expanding tech advantages, 'cyber resiliency'
By The Washington Times | Feb. 15, 2017
"The Army Cyber Command, the Army Cyber Institute at West Point and the Army Cyber Center of
U.S. no longer has geography as ally
By APNEWS | Jan. 18, 2017
"The United States has long relied on its borders and superior military might to protect against and
The Cyber Soldiers of the Future
By Cable News Network (CNN) | Jan. 13, 2017

 

How to Grow a Capable Cyber Officer
By AUSA | Dec. 13, 2016
"Given the rising number of military cyber activities between the U.S. and its adversaries over the
Why PPD-41 is evolutionary, not revolutionary
By FCW | Oct. 24, 2016
"The Obama administration released Presidential Policy Directive 41 in July to clarify roles and
Clinton’s encryption solution would require a ton of oversight
By Cyberscoop | Oct. 23, 2016
"Law enforcement taking advantage of zero day exploits is preferred to an overarching encryption
Warner: Procurement and personnel key for cyber
By Cyberscoop | Oct. 23, 2016
"Fixing the way the U.S. government buys technology and hires and deploys its workforce is the key
Army wants cyber capability everywhere
By FCW | Sept. 13, 2016
"The Army's new cyber director said the service is still struggling to make cyber, electronic
Strategic Broadening for Mid-Career Cyber Leaders
By Small Wars Journal | Sept. 13, 2016
"The purpose of this paper is to highlight the need for strategic broadening and policy education
We Took West Point Cadets to (Cyber) War
By War on the Rocks | June 21, 2016
"Several months ago, we — members of the Army Cyber Institute and Defense Innovation Unit
Palo Alto Networks CEO on cybersecurity vs. privacy
By Fox Business | April 22, 2016
"Palo Alto Networks CEO Mark McLaughlin on efforts to improve cybersecurity."
Wanted: talented cyber operators
By Army.mil | April 22, 2016
"Regarding cyber, "we are training in the dozens and our adversaries are training in the thousands,"
IoT attacks threaten national security, say cyber experts
By DVIDS | April 22, 2016
"Dams, the power grid and other such infrastructure were once closed network systems. Then they were
Former NSA Director: U.S. Needs Security, Privacy
By Fox Business | April 21, 2016
"Top military and industry leaders convened at a cyber-summit at West Point, New York Thursday to
Homeland Security Secretary: No imminent threat to U.S.
By Fox Business | April 21, 2016
"Department of Homeland Security Secretary Jeh Johnson talks exclusively with FBN’s Jo Ling Kent at
Critical Infrastructure Vulnerable to Attack, NSA Leader Says
By Defense.gov | April 21, 2016
"Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry,
Strategic Amnesia and ISIS
By The National Interest | April 21, 2016
"MARK TWAIN observed, “history doesn’t repeat itself, but it does rhyme.” The study of military
Apple's Dilemma: Customer Privacy or Help the Fed
By CNBC | Feb. 18, 2016
"West Point's Cyber Policy Fellow Dr. Aaron Brantly and U.C. Berkeley's James Dempsey debate Apple's
Task Force Green Dragon: Preparation of the Environment in New England Taverns
By War on the Rocks | Feb. 16, 2016
"Regardless of era, before active armed combat begins in a battlespace, commanders often have a
Cyber Resiliency: Bridging a Cyber Capability Gap in 2025
By Small Wars Journal | Feb. 5, 2016
"The United States Army must develop a holistic solution to Army-wide cyber resiliency and hardening
Going Native: A Career Pipeline For U.S. Military Success Out in Silicon Valley
By Foreign Policy | Jan. 14, 2016
"Just as we needed people who could interpret for us in Afghanistan and Iraq, so do we need soldiers
It is Time for the U.S. Military to Innovate Like Insurgents
By War on the Rocks | Oct. 28, 2015
"Amidst the sea of defense contractors at this year’s AUSA expo, we — three young new players in
As more devices go online, hackers hunt for vulnerabilities
By The Baltimore Sun | Oct. 24, 2015
"The hack was simple. Terry Dunlap tapped out a few commands on his laptop and within seconds a
The Army built a Wi-Fi "gun" that shoots drones from the sky
By Fortune | Oct. 19, 2015
"Looks like the U.S. armed forces have a few makers in their barracks who love playing with
This Tactical Cyber Rifle Is a Glimpse Into the Future of High-Tech Warfare
By Popular Mechanics | Oct. 15, 2015
"We've seen big, bulky Anti-UAV Defense Systems radio-jamming drones out of the sky before, but it
Phreaker, Maker, Hacker, Ranger: One Vision for Cyber Support to Corps and Below in 2025
By Small Wars Journal | Aug. 11, 2015
"The operationalization of the Cyberspace Domain at the tactical-level continues to exacerbate both
Secret cellphone tracking may get more scrutiny from Mecklenburg County courts
By The Charlotte Observer | Nov. 29, 2014
"Police likely will face more questions when they ask the court for permission to secretly track
Should Police Be Able To Keep Their Devices Secret?
By NPR | Oct. 22, 2014
"Officers use "Stingrays" to mimic a cell phone tower and intercept information from phones in a