An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
13
14
15
16
17
18
19
20
21
22
...
34
Cybersecurity is becoming a problem people can't ignore, hackers say
October 19, 2017
— People often pay more attention to the benefits of modern technology than its problems — in part because so far, the consequences have been tolerable, experts said during a Chicago Ideas Week event Thursday.“That’s changing,” said Joshua Corman, founder of I Am The Cavalry, a grassroots organization focused on computer security and how it impacts...
MORE
Cyber Warfare: How the U.S. Military, Tech Companies Shield Themselves
October 18, 2017
— The past few years have taught us that no single entity is safe from hacks, leaks or data breaches.That includes major corporations, credit reporting agencies and even the U.S. government.The United States Military Academy at West Point has a department called the Army Cyber Institute dedicated to predicting future weapons and defenses used on the...
MORE
Promise & Peril
October 10, 2017
— "By 2025, a wildly wired world will bring a wealth of convenience and efficiency. With it will come a whole lot of vulnerability..."
MORE
Cyber Policy Team Wins Cyber Competition
October 5, 2017
— The U.S. Military Academy Cyber Policy team won the inaugural Indo-Pacific Cyber 9/12 Student Challenge, Sept. 28-29 in Sydney. The Black Knights beat out 14 other teams from three different countries, including competitors enrolled in top graduate schools.
MORE
Cyber Threat Report 17 Sep - 02 Oct 2017
October 2, 2017
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights Infrared Signals In Cameras Lets Malware Jump Air Gaps. Facebook Hit by €1.2m Fine in Spain for Breaking Privacy Laws. Syrine Infusion Vulnerable to Remote Attackers. 'Blueborne': New, Unpatchable Bluetooth Vulnerability Affects Billions. Designing for Safety and Security...
MORE
What the Heck Is Threatcasting?
September 15, 2017
— "Threatcasting emerged in 2007 as a variation on the futurecasting process that one of us, Brian, created when working as a futurist and trying to imagine what individuals would expect from their technology products in the future. Threatcasting is also a descendent of scenario planning, a tool that allows organizations to image a range of possible...
MORE
Cyber Threat Report 29 Aug - 11 Sep 2017
September 11, 2017
— ACI Cyber Threat Report Tech Trends: Stories and Highlights Titan Security: How Google Combats Hardware Backdoors. Feds Outline Technical Evidence Against WannaCry Researcher. Leak of 1,700+ valid IOT passwords makes IoT mess worse. Intel AI Accelerator Capable of Trillion Ops Per Second Per Watt. India shut off the internet in an attempt to...
MORE
Fire, Maneuver - and FireChat
August 26, 2017
— "Tools such as FireChat, though impressive in their own right, are representative of emerging disruptive technologies that can be used to either enable or inhibit military operations. Cheap commercial technology, such as Unmanned Aerial Surveillance (UAS), and a revolution in supply chain paradigms like modern ecommerce platforms are relevant in...
MORE
The Flaw of Cyber Immediate Cyber Counter Strikes
August 21, 2017
— A dominant paradigm for militarized cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome...
MORE
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
August 16, 2017
— "Terrorist groups are increasingly using encryption to plan and coordinate terrorist acts, leading to calls for the banning or backdooring of encrypted messaging apps. This would be misguided. It would not remove the ability of terrorist groups to access this technology and may push them to communicate in ways that are more difficult for Western...
MORE
1
...
13
14
15
16
17
18
19
20
21
22
...
34