Home : Library : Media Coverage

MEDIA COVERAGE

The CyberWire Daily Podcast(Futurist Brian David Johnson explains Threatcasting)

By The CyberWire Daily Podcast | March 17, 2017

"The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts as well as our Academic and Research Partners. Each Friday, we provide the usual daily summary along with a look back at the news for the entire week. We publish each weekday afternoon (in time for US East Coast drive-time.)"
ACI SPOTLIGHT
Jack Voltaic: Lt. Col. Doug Fletcher, Critical Infrastructure Key Resources team for the Army Cyber Institute at West Point, explains the importance of Jack Voltaic to more than 70 personnel from public and private sectors from the cities of Savannah and Charleston.
Jack Voltaic
Lt. Col. Doug Fletcher, Critical Infrastructure Key Resources team for the Army Cyber Institute at West Point, explains the importance of Jack Voltaic to more than 70 personnel from public and private sectors from the cities of Savannah and Charleston.
Photo By: Lisa Beum
VIRIN: 190828-A-BR833-292
Cybersecurity brought to the forefront at Jack Voltaic
Sept. 16, 2019

After a cyberattack, the waiting is the hardest part: U.S. Marines debark from an MV-22B Osprey at Al Asad Air Base, Iraq in June 2018. A cyberattack could slow how U.S. forces respond to a battlefield.
After a cyberattack, the waiting is the hardest part
U.S. Marines debark from an MV-22B Osprey at Al Asad Air Base, Iraq in June 2018. A cyberattack could slow how U.S. forces respond to a battlefield.
Photo By: Fifth Domain
VIRIN: 190916-A-ZZ999-0001
After a cyberattack, the waiting is the hardest part
Sept. 16, 2019

Cyber AIAD: Cadets visit the Joint Cyber Center, U.S. Army African Command in Stuttgart, Germany to hear about and discuss real-world issues within the cyber domain and how it affects military operations.
Cyber AIAD
Cadets visit the Joint Cyber Center, U.S. Army African Command in Stuttgart, Germany to hear about and discuss real-world issues within the cyber domain and how it affects military operations.
Photo By: Brandon OConnor
VIRIN: 190701-A-QG670-1004
Cadets build relationships, knowledge on Cyber AIAD
Sept. 16, 2019

Putting a value on the 50x coder, by Jan Kallberg: As an industrial nation transitioning to an information society with digital conflict, we tend to see the technology as the weapon. In the process, we ignore the fact that few humans can have a large-scale operational impact. 

But we underestimate the importance of applicable intelligence, the intelligence on how to apply things in the right order. Cyber and card games have one thing in common: the order you play your cards matters. In cyber, the tools are mostly publically available, anyone can download them from the Internet and use them, but the weaponization of the tools occur when they are used by someone who understands how to use the tools in the right order.
Putting a value on the 50x coder
As an industrial nation transitioning to an information society with digital conflict, we tend to see the technology as the weapon. In the process, we ignore the fact that few humans can have a large-scale operational impact. But we underestimate the importance of applicable intelligence, the intelligence on how to apply things in the right order. Cyber and card games have one thing in common: the order you play your cards matters. In cyber, the tools are mostly publically available, anyone can download them from the Internet and use them, but the weaponization of the tools occur when they are used by someone who understands how to use the tools in the right order.
Photo By: FifthDomain
VIRIN: 190816-A-ZZ999-0002
Putting a value on the 50x coder
Aug. 16, 2019

Ubiquitous Connections Depend Upon Additional Security Skills: Northeastern University and the Army Cyber Institute at West Point hosted a Cyber Day to bring subject matter experts within the civilian and military sectors to discuss cyber topics, including a capture-the-flag activity to identify talent, protection of critical infrastructure, augmented reality, and cyber talent and education.
Ubiquitous Connections Depend Upon Additional Security Skills
Northeastern University and the Army Cyber Institute at West Point hosted a Cyber Day to bring subject matter experts within the civilian and military sectors to discuss cyber topics, including a capture-the-flag activity to identify talent, protection of critical infrastructure, augmented reality, and cyber talent and education.
Photo By: The Cyber Edge
VIRIN: 190816-A-ZZ999-0001
Ubiquitous Connections Depend Upon Additional Security Skills
Aug. 16, 2019

USMA Faculty Building Cyber Bridges with NATO Allies and Partners
USMA Faculty Building Cyber Bridges with NATO Allies and Partners
Around 600 decision-makers, opinion-leaders, law and technology experts from the governments, military, academia and industry of nearly 50 countries meet at CyCon to address current cyber security challenges in an interdisciplinary manner.
Photo By: Army Cyber Institute
VIRIN: 190711-A-ZZ999-0001
USMA Faculty Building Cyber Bridges with NATO Allies and Partners
Aug. 16, 2019

Cyber Threat Report June 07, 2019
Cyber Threat Report June 07, 2019
Cyber Threat Report June 07, 2019
Photo By: Army Cyber Institute
VIRIN: 190607-A-ZZ999-0001
Cyber Threat Report June 07, 2019
June 11, 2019

Army Cyber Institute Cyber Threat Report

Tech Trends: Stories and Highlights:
'Blockchain Bandit' steals millions in Ethereum by guessing weak private keys, White House issues Executive Order on America's Cybersecurity Workforce, Tencent's Keen Security Lab gains Tesla steering control remotely and fools Autopilot, FBI and IC3 release annual Internet Crime Report
Cyber Threat Report May 06, 2019
Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights: 'Blockchain Bandit' steals millions in Ethereum by guessing weak private keys, White House issues Executive Order on America's Cybersecurity Workforce, Tencent's Keen Security Lab gains Tesla steering control remotely and fools Autopilot, FBI and IC3 release annual Internet Crime Report
Photo By: Army Cyber Institute
VIRIN: 190510-A-ZZ999-0001
Cyber Threat Report May 06, 2019
May 10, 2019

Lucand Camacho was one of the few selected nationally to attend the prestigious Army Cyber Institute Internship this summer from July 15 to August 11 at the West Point Military Academy in New York.
Guam son accepted into Army Cyber Institute internship at West Point
Lucand Camacho was one of the few selected nationally to attend the prestigious Army Cyber Institute Internship this summer from July 15 to August 11 at the West Point Military Academy in New York.
Photo By: Army Cyber Institute
VIRIN: 190508-A-ZZ999-001
Guam son accepted into Army Cyber Institute internship at West Point
May 8, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Jack Voltaic 2.0 Gives a Glimpse of Future Infrastructure Protection
April 9, 2019

Guang Niu / Reuters
Guang Niu / Reuters
https://www.cfr.org/blog/chinese-hackers-are-stealing-us-defense-secrets-here-how-stop-them
Photo By: Reuters
VIRIN: 190322-A-JZ122-1002
Chinese Hackers are Stealing U.S. Defense Secrets: Here is How to Stop Them
April 9, 2019

CyberCom
CyberCom
https://warontherocks.com/2019/03/what-a-u-s-operation-against-russian-trolls-predicts-about-escalation-in-cyberspace/
Photo By: War on the Rocks
VIRIN: 190322-A-JZ122-1001
What a U.S. Operation Against Russian Trolls Predicts About Escalation in Cyberspace
April 9, 2019

Cyber Threat Report 04 April 2019
Cyber Threat Report 04 April 2019
Cyber Threat Report 04 April 2019
Photo By: Army Cyber Institute
VIRIN: 190405-A-ZZ999-0001
Cyber Threat Report 04 April 2019
April 5, 2019

Cyber Threat Report 04 March 2019
Cyber Threat Report 04 March 2019
Cyber Threat Report 04 March 2019
Photo By: Army Cyber Institute
VIRIN: 190304-A-ZZ999-0001
Cyber Threat Report 04 March 2019
March 4, 2019

Army Cyber Institute
Army Cyber Institute
Photo By: Army Cyber Insitute
VIRIN: 190221-A-ZZ999-0002
Improving student STEM skills
Feb. 21, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Coalitions Key to Successful Cyber Defense
Feb. 7, 2019

Jack Voltaic 2.0: Threats to Critical Infrastructure
Jack Voltaic 2.0: Threats to Critical Infrastructure
Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps.
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0004
Jack Voltaic 2.0: Threats to Critical Infrastructure
Feb. 6, 2019

Cyber Threat Report 02 February 2019
Cyber Threat Report 02 February 2019
Cyber Threat Report 02 February 2019
Photo By: Army Cyber Institute
VIRIN: 190206-A-ZZ999-0003
Cyber Threat Report 02 February 2019
Feb. 6, 2019

Cyber Threat Report January 03, 2019
Cyber Threat Report January 03, 2019
Tech Trends: Stories and Highlights:French data protection agency fines Uber €400k for a 2016 data breach, FCC fines satellite startup Swarm Technologies $900k over unauthorized launch, Amazon expands its fleet of Prime Air planes. Read more in the Cyber Threat Report
Photo By: Army Cyber Institute
VIRIN: 190104-A-ZZ999-1001
Cyber Threat Report 03 January 2019
Jan. 4, 2019
Cyber warrant officer leads West Point research program for protecting critical U.S. infrastructure
By U.S. Army Cyber Command | Nov. 1, 2018
A major project to explore employment of the total Army force to defend the nation's critical
Force of Nature: Settling A 250-Year-Old Statistics Puzzle
By Fox School of Business | Sept. 26, 2018
Research from Deep Mukhopadhyay, professor of statistical science, and Douglas Fletcher, a PhD
U.S. Army in Cyberspace
By U.S. Army Cyber Command | Sept. 25, 2018
The U.S. Army is engaged in the cyber domain every day to achieve and maintain superiority in
A look back at the winners of the cyber 9/12 student challenge 2018
By GCSP | Sept. 25, 2018
Team Black Knights of the US Military Academy at West Point were the winners of the Cyber 9/12
Protecting Financial Institutions Against Cyber Threats: A National Security Issue
By Erica Borghard | Sept. 24, 2018
The U.S. economy is susceptible to offensive operations carried out by national security adversaries
Cyberthreat Update: Efficiency Versus Security
By AFCEA.org | Jan. 17, 2018
Col. Andrew O. Hall, USA, director, Army Cyber Institute, opened AFCEA’s first Cyber Education,
West Point Shows Off Cyber Chops in Higher Ed Challenge
By edscoop | Nov. 3, 2017
"Four faculty members at the U.S. Military Academy in West Point have proven themselves to be among
Military Aims to Maintain Its Cyber Mission Force Roster
By GovTech Works | Oct. 19, 2017
What the U.S. military is trying to achieve in building its Cyber Mission Force is akin to building
Cybersecurity is becoming a problem people can't ignore, hackers say
By Chicago Tribune | Oct. 19, 2017
People often pay more attention to the benefits of modern technology than its problems — in part
Cyber Warfare: How the U.S. Military, Tech Companies Shield Themselves
By Chicago Tonight | Oct. 18, 2017
The past few years have taught us that no single entity is safe from hacks, leaks or data
Promise & Peril
By National Guard Magazine | Oct. 10, 2017
"By 2025, a wildly wired world will bring a wealth of convenience and efficiency. With it will come
Cyber Policy Team Wins Cyber Competition
By PointerView | Oct. 5, 2017
The U.S. Military Academy Cyber Policy team won the inaugural Indo-Pacific Cyber 9/12 Student
What the Heck Is Threatcasting?
By Slate | Sept. 15, 2017
"Threatcasting emerged in 2007 as a variation on the futurecasting process that one of us, Brian,
Fire, Maneuver - and FireChat
By Small Wars Journal | Aug. 26, 2017
"Tools such as FireChat, though impressive in their own right, are representative of emerging
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
By Combating Terrorism Center | Aug. 16, 2017
"Terrorist groups are increasingly using encryption to plan and coordinate terrorist acts, leading
Envisioning the Future to Empower Action
By IEEE Computer Society | Aug. 3, 2017
"At a threatcasting workshop, participants imagined tomorrow's threats and identified concrete steps
When the NSA Spots a Crack in Commercial Software – Should It Tell?
By The Cipher Brief | July 14, 2017
"One of the only tasks the U.S. Constitution declares that the federal government must do is to
Why can’t America reliably separate out fact, falsehood, opinion and reasoned analysis?
By The National Interest | July 1, 2017
"One commentator asserted that the purpose of fake news “is not to pose an alternative truth . . .
What Internet-Connected War Might Look Like
By Linux Insider | May 10, 2017
"During their talk, the institute's Major Natalie Vanatta and Captain Erick Waage mused on dramatic
Redefining the Battlefield: the Army Cyber Institute at West Point
By West Point Magazine | April 1, 2017
"The Army Cyber Institute was designed with the unique ability (not just within the Army and West
The Intelligence Costs of Underestimating Russia: A Warning from History
By War on the Rocks | March 31, 2017
"Questions over the extent and nature of the relationship between President Donald Trump’s
Terrorists use the Dark Web to hide
By USATODAY | March 27, 2017

 

Information Warfare Isn't Russian
By The Strategy Bridge | March 8, 2017
"Information warfare is not new, but developments in information technology have enabled it to
Intelligence Officers Won’t Exit En Masse During the Trump Administration
By Lawfare Blog | March 3, 2017
"Former intelligence analyst Edward Price dramatically resigned from CIA last week in an op-ed in
CIA service and sacrifice will continue, no matter who is sitting in the White House
By Foreign Policy | Feb. 17, 2017
"CIA officers are not a monolithic bunch. Some are introverts, some are extroverts. Some are
Expanding tech advantages, 'cyber resiliency'
By The Washington Times | Feb. 15, 2017
"The Army Cyber Command, the Army Cyber Institute at West Point and the Army Cyber Center of
U.S. no longer has geography as ally
By APNEWS | Jan. 18, 2017
"The United States has long relied on its borders and superior military might to protect against and
The Cyber Soldiers of the Future
By Cable News Network (CNN) | Jan. 13, 2017

 

How to Grow a Capable Cyber Officer
By AUSA | Dec. 13, 2016
"Given the rising number of military cyber activities between the U.S. and its adversaries over the
Why PPD-41 is evolutionary, not revolutionary
By FCW | Oct. 24, 2016
"The Obama administration released Presidential Policy Directive 41 in July to clarify roles and
Clinton’s encryption solution would require a ton of oversight
By Cyberscoop | Oct. 23, 2016
"Law enforcement taking advantage of zero day exploits is preferred to an overarching encryption
Warner: Procurement and personnel key for cyber
By Cyberscoop | Oct. 23, 2016
"Fixing the way the U.S. government buys technology and hires and deploys its workforce is the key
Army wants cyber capability everywhere
By FCW | Sept. 13, 2016
"The Army's new cyber director said the service is still struggling to make cyber, electronic
Strategic Broadening for Mid-Career Cyber Leaders
By Small Wars Journal | Sept. 13, 2016
"The purpose of this paper is to highlight the need for strategic broadening and policy education
We Took West Point Cadets to (Cyber) War
By War on the Rocks | June 21, 2016
"Several months ago, we — members of the Army Cyber Institute and Defense Innovation Unit
Palo Alto Networks CEO on cybersecurity vs. privacy
By Fox Business | April 22, 2016
"Palo Alto Networks CEO Mark McLaughlin on efforts to improve cybersecurity."
Wanted: talented cyber operators
By Army.mil | April 22, 2016
"Regarding cyber, "we are training in the dozens and our adversaries are training in the thousands,"
IoT attacks threaten national security, say cyber experts
By DVIDS | April 22, 2016
"Dams, the power grid and other such infrastructure were once closed network systems. Then they were
Former NSA Director: U.S. Needs Security, Privacy
By Fox Business | April 21, 2016
"Top military and industry leaders convened at a cyber-summit at West Point, New York Thursday to
Homeland Security Secretary: No imminent threat to U.S.
By Fox Business | April 21, 2016
"Department of Homeland Security Secretary Jeh Johnson talks exclusively with FBN’s Jo Ling Kent at
Critical Infrastructure Vulnerable to Attack, NSA Leader Says
By Defense.gov | April 21, 2016
"Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry,
Strategic Amnesia and ISIS
By The National Interest | April 21, 2016
"MARK TWAIN observed, “history doesn’t repeat itself, but it does rhyme.” The study of military
Apple's Dilemma: Customer Privacy or Help the Fed
By CNBC | Feb. 18, 2016
"West Point's Cyber Policy Fellow Dr. Aaron Brantly and U.C. Berkeley's James Dempsey debate Apple's
Task Force Green Dragon: Preparation of the Environment in New England Taverns
By War on the Rocks | Feb. 16, 2016
"Regardless of era, before active armed combat begins in a battlespace, commanders often have a
Cyber Resiliency: Bridging a Cyber Capability Gap in 2025
By Small Wars Journal | Feb. 5, 2016
"The United States Army must develop a holistic solution to Army-wide cyber resiliency and hardening
Going Native: A Career Pipeline For U.S. Military Success Out in Silicon Valley
By Foreign Policy | Jan. 14, 2016
"Just as we needed people who could interpret for us in Afghanistan and Iraq, so do we need soldiers
It is Time for the U.S. Military to Innovate Like Insurgents
By War on the Rocks | Oct. 28, 2015
"Amidst the sea of defense contractors at this year’s AUSA expo, we — three young new players in
As more devices go online, hackers hunt for vulnerabilities
By The Baltimore Sun | Oct. 24, 2015
"The hack was simple. Terry Dunlap tapped out a few commands on his laptop and within seconds a
The Army built a Wi-Fi "gun" that shoots drones from the sky
By Fortune | Oct. 19, 2015
"Looks like the U.S. armed forces have a few makers in their barracks who love playing with
This Tactical Cyber Rifle Is a Glimpse Into the Future of High-Tech Warfare
By Popular Mechanics | Oct. 15, 2015
"We've seen big, bulky Anti-UAV Defense Systems radio-jamming drones out of the sky before, but it
Phreaker, Maker, Hacker, Ranger: One Vision for Cyber Support to Corps and Below in 2025
By Small Wars Journal | Aug. 11, 2015
"The operationalization of the Cyberspace Domain at the tactical-level continues to exacerbate both
Secret cellphone tracking may get more scrutiny from Mecklenburg County courts
By The Charlotte Observer | Nov. 29, 2014
"Police likely will face more questions when they ask the court for permission to secretly track
Should Police Be Able To Keep Their Devices Secret?
By NPR | Oct. 22, 2014
"Officers use "Stingrays" to mimic a cell phone tower and intercept information from phones in a
MEDIA RELATIONS

CPT Lisa Beum


Public Affairs Officer


If you are a member of the media and want to inquire about interviews, news highlights and broadcast events, please contact our Public Affairs Officer.