Home : Library : Media Coverage

MEDIA COVERAGE

ACI SPOTLIGHT
Cyberthreat Update: Efficiency Versus Security
By AFCEA.org | Jan. 17, 2018
Col. Andrew O. Hall, USA, director, Army Cyber Institute, opened AFCEA’s first Cyber Education,
West Point Shows Off Cyber Chops in Higher Ed Challenge
By edscoop | Nov. 3, 2017
"Four faculty members at the U.S. Military Academy in West Point have proven themselves to be among
Military Aims to Maintain Its Cyber Mission Force Roster
By GovTech Works | Oct. 19, 2017
What the U.S. military is trying to achieve in building its Cyber Mission Force is akin to building
Cybersecurity is becoming a problem people can't ignore, hackers say
By Chicago Tribune | Oct. 19, 2017
People often pay more attention to the benefits of modern technology than its problems — in part
Cyber Warfare: How the U.S. Military, Tech Companies Shield Themselves
By Chicago Tonight | Oct. 18, 2017
The past few years have taught us that no single entity is safe from hacks, leaks or data
Promise & Peril
By National Guard Magazine | Oct. 10, 2017
"By 2025, a wildly wired world will bring a wealth of convenience and efficiency. With it will come
Cyber Policy Team Wins Cyber Competition
By PointerView | Oct. 5, 2017
The U.S. Military Academy Cyber Policy team won the inaugural Indo-Pacific Cyber 9/12 Student
What the Heck Is Threatcasting?
By Slate | Sept. 15, 2017
"Threatcasting emerged in 2007 as a variation on the futurecasting process that one of us, Brian,
Fire, Maneuver - and FireChat
By Small Wars Journal | Aug. 26, 2017
"Tools such as FireChat, though impressive in their own right, are representative of emerging
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
By Combating Terrorism Center | Aug. 16, 2017
"Terrorist groups are increasingly using encryption to plan and coordinate terrorist acts, leading
Envisioning the Future to Empower Action
By IEEE Computer Society | Aug. 3, 2017
"At a threatcasting workshop, participants imagined tomorrow's threats and identified concrete steps
When the NSA Spots a Crack in Commercial Software – Should It Tell?
By The Cipher Brief | July 14, 2017
"One of the only tasks the U.S. Constitution declares that the federal government must do is to
Why can’t America reliably separate out fact, falsehood, opinion and reasoned analysis?
By The National Interest | July 1, 2017
"One commentator asserted that the purpose of fake news “is not to pose an alternative truth . . .
What Internet-Connected War Might Look Like
By Linux Insider | May 10, 2017
"During their talk, the institute's Major Natalie Vanatta and Captain Erick Waage mused on dramatic
Redefining the Battlefield: the Army Cyber Institute at West Point
By West Point Magazine | April 1, 2017
"The Army Cyber Institute was designed with the unique ability (not just within the Army and West
The Intelligence Costs of Underestimating Russia: A Warning from History
By War on the Rocks | March 31, 2017
"Questions over the extent and nature of the relationship between President Donald Trump’s
Terrorists use the Dark Web to hide
By USATODAY | March 27, 2017

 

The CyberWire Daily Podcast(Futurist Brian David Johnson explains Threatcasting)
By The CyberWire Daily Podcast | March 17, 2017
"The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and
Information Warfare Isn't Russian
By The Strategy Bridge | March 8, 2017
"Information warfare is not new, but developments in information technology have enabled it to
Intelligence Officers Won’t Exit En Masse During the Trump Administration
By Lawfare Blog | March 3, 2017
"Former intelligence analyst Edward Price dramatically resigned from CIA last week in an op-ed in
CIA service and sacrifice will continue, no matter who is sitting in the White House
By Foreign Policy | Feb. 17, 2017
"CIA officers are not a monolithic bunch. Some are introverts, some are extroverts. Some are
Expanding tech advantages, 'cyber resiliency'
By The Washington Times | Feb. 15, 2017
"The Army Cyber Command, the Army Cyber Institute at West Point and the Army Cyber Center of
U.S. no longer has geography as ally
By APNEWS | Jan. 18, 2017
"The United States has long relied on its borders and superior military might to protect against and
The Cyber Soldiers of the Future
By Cable News Network (CNN) | Jan. 13, 2017

 

How to Grow a Capable Cyber Officer
By AUSA | Dec. 13, 2016
"Given the rising number of military cyber activities between the U.S. and its adversaries over the
Why PPD-41 is evolutionary, not revolutionary
By FCW | Oct. 24, 2016
"The Obama administration released Presidential Policy Directive 41 in July to clarify roles and
Clinton’s encryption solution would require a ton of oversight
By Cyberscoop | Oct. 23, 2016
"Law enforcement taking advantage of zero day exploits is preferred to an overarching encryption
Warner: Procurement and personnel key for cyber
By Cyberscoop | Oct. 23, 2016
"Fixing the way the U.S. government buys technology and hires and deploys its workforce is the key
Army wants cyber capability everywhere
By FCW | Sept. 13, 2016
"The Army's new cyber director said the service is still struggling to make cyber, electronic
Strategic Broadening for Mid-Career Cyber Leaders
By Small Wars Journal | Sept. 13, 2016
"The purpose of this paper is to highlight the need for strategic broadening and policy education
We Took West Point Cadets to (Cyber) War
By War on the Rocks | June 21, 2016
"Several months ago, we — members of the Army Cyber Institute and Defense Innovation Unit
Palo Alto Networks CEO on cybersecurity vs. privacy
By Fox Business | April 22, 2016
"Palo Alto Networks CEO Mark McLaughlin on efforts to improve cybersecurity."
Wanted: talented cyber operators
By Army.mil | April 22, 2016
"Regarding cyber, "we are training in the dozens and our adversaries are training in the thousands,"
IoT attacks threaten national security, say cyber experts
By DVIDS | April 22, 2016
"Dams, the power grid and other such infrastructure were once closed network systems. Then they were
Former NSA Director: U.S. Needs Security, Privacy
By Fox Business | April 21, 2016
"Top military and industry leaders convened at a cyber-summit at West Point, New York Thursday to
Homeland Security Secretary: No imminent threat to U.S.
By Fox Business | April 21, 2016
"Department of Homeland Security Secretary Jeh Johnson talks exclusively with FBN’s Jo Ling Kent at
Critical Infrastructure Vulnerable to Attack, NSA Leader Says
By Defense.gov | April 21, 2016
"Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry,
Strategic Amnesia and ISIS
By The National Interest | April 21, 2016
"MARK TWAIN observed, “history doesn’t repeat itself, but it does rhyme.” The study of military
Apple's Dilemma: Customer Privacy or Help the Fed
By CNBC | Feb. 18, 2016
"West Point's Cyber Policy Fellow Dr. Aaron Brantly and U.C. Berkeley's James Dempsey debate Apple's
Task Force Green Dragon: Preparation of the Environment in New England Taverns
By War on the Rocks | Feb. 16, 2016
"Regardless of era, before active armed combat begins in a battlespace, commanders often have a
Cyber Resiliency: Bridging a Cyber Capability Gap in 2025
By Small Wars Journal | Feb. 5, 2016
"The United States Army must develop a holistic solution to Army-wide cyber resiliency and hardening
Going Native: A Career Pipeline For U.S. Military Success Out in Silicon Valley
By Foreign Policy | Jan. 14, 2016
"Just as we needed people who could interpret for us in Afghanistan and Iraq, so do we need soldiers
It is Time for the U.S. Military to Innovate Like Insurgents
By War on the Rocks | Oct. 28, 2015
"Amidst the sea of defense contractors at this year’s AUSA expo, we — three young new players in
As more devices go online, hackers hunt for vulnerabilities
By The Baltimore Sun | Oct. 24, 2015
"The hack was simple. Terry Dunlap tapped out a few commands on his laptop and within seconds a
The Army built a Wi-Fi "gun" that shoots drones from the sky
By Fortune | Oct. 19, 2015
"Looks like the U.S. armed forces have a few makers in their barracks who love playing with
This Tactical Cyber Rifle Is a Glimpse Into the Future of High-Tech Warfare
By Popular Mechanics | Oct. 15, 2015
"We've seen big, bulky Anti-UAV Defense Systems radio-jamming drones out of the sky before, but it
Phreaker, Maker, Hacker, Ranger: One Vision for Cyber Support to Corps and Below in 2025
By Small Wars Journal | Aug. 11, 2015
"The operationalization of the Cyberspace Domain at the tactical-level continues to exacerbate both
Secret cellphone tracking may get more scrutiny from Mecklenburg County courts
By The Charlotte Observer | Nov. 29, 2014
"Police likely will face more questions when they ask the court for permission to secretly track
Should Police Be Able To Keep Their Devices Secret?
By NPR | Oct. 22, 2014
"Officers use "Stingrays" to mimic a cell phone tower and intercept information from phones in a
MEDIA RELATIONS

Lt. Col. Terence M. Kelley


Public Affairs Officer


If you are a member of the media and want to inquire about interviews, news highlights and broadcast events, please contact our Public Affairs Officer.