An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
14
15
16
17
18
19
20
21
22
23
...
34
Envisioning the Future to Empower Action
August 3, 2017
— "At a threatcasting workshop, participants imagined tomorrow's threats and identified concrete steps we can take today to mitigate them."
MORE
Traditional Military Thinking in Cyberspace: The Need for Adaptation
August 1, 2017
— Theories for conflict in the cyber world have not yet been developed, but the application of traditional military strategy and operational concepts in this realm can mislead, resulting in spurious assessments and unfavorable outcomes. Four tenets of the cyber world present profound challenges for the application of traditional military strategies...
MORE
When the NSA Spots a Crack in Commercial Software – Should It Tell?
July 14, 2017
— "One of the only tasks the U.S. Constitution declares that the federal government must do is to provide for the common defense. That is the government’s foundational truth and purpose; to protect American lives, liberty, and their pursuit of happiness from those that would disrupt it. So, the question on whether and when government should disclose...
MORE
Cyber Operational Considerations in Dense Urban Terrain
July 12, 2017
— Thirtieth Corps began its attack on the city of Metropolis and its 12 million inhabitants. The Corps planners had done their homework on urban operations and had studied many historical predecessors such as Stalingrad and Hue. Initially the attack proceeded well. Over time however, enemy indirect fire accuracy seemed to defy expectations given a...
MORE
Why can’t America reliably separate out fact, falsehood, opinion and reasoned analysis?
July 1, 2017
— "One commentator asserted that the purpose of fake news “is not to pose an alternative truth . . . but to destroy truth altogether, to set us adrift in a world of belief without facts, a world where there is no defense against lies.” Actually, the purpose of fake news isn’t to destroy truth; it is to manipulate, to weaponize information, made out...
MORE
Cyber Threat Reports 16 May - 05 June 2017
June 5, 2017
— Army Cyber Institute Cyber Threat ReportTech Trends: Stories and Highlights The Cost of IoT Hacks: 13% of revenue for smaller firms. Massive security breach at prominent Los Angeles clinic puts thousands at risk. The WannaCry Effect: Users Abandon Windows XP En-Masse. OneLogin Affected by Data Breach, Attacker May have Decrypted Data. How...
MORE
ACI Threat Trends and Predictions 2017 Report
May 22, 2017
— “The expanding attack surface enabled by technology innovations such as cloud computing and IoT devices, a global shortage of cyber-security talent, and regulatory pressures continue to be significant drivers of cyber-threats. The pace of these changes is unprecedented, resulting in a critical tipping point as the impact of cyber-attacks are felt...
MORE
Cyber Threat Reports 01 May - 15 May 2017
May 15, 2017
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights German Cybercrime rises 80%. Secure Execution Processor brings Protection to IoT devices. Invasion of the Hardware Snatchers. The Pentagon's Seek-and-Destroy mission for counterfeit electronics. Old Windows Server machines can still fend off hacks.READ MORE
MORE
What Internet-Connected War Might Look Like
May 10, 2017
— "During their talk, the institute's Major Natalie Vanatta and Captain Erick Waage mused on dramatic changes ahead. Conventional warfare soon may be shaped by computer networks, and the race to perfect techniques to infiltrate them has touched off an ambitious effort to bring experts in the public and private sectors together."
MORE
Can the U.S. Army's sci-fi fan fic save us from a dark future?
May 9, 2017
—
...
MORE
1
...
14
15
16
17
18
19
20
21
22
23
...
34