An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
16
17
18
19
20
21
22
23
24
25
...
34
Information Warfare Isn't Russian
March 8, 2017
— "Information warfare is not new, but developments in information technology have enabled it to deliver its payloads vaster and over a much wider network. Looking to Putin’s intelligence apparatus is not to witness the genesis of political information warfare. In fact, the United States was birthed in a stew of information, misinformation,...
MORE
Cyber Threat Reports 16 Feb - 06 Mar 2017
March 6, 2017
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights Botnets have infiltrated the Twitter verse. Open-source Attack tools Open Pandora's Box. Intel has a chip with 24 cores that costs $9k. The security impact of HTTPS interception in the wild. Researchers transmit 10 bits with a single photon.READ MORE
MORE
Stockpiling Zero-Day Exploits: The Next International Weapons Taboo
March 3, 2017
— In the current state of global affairs, a market exists for zero-day exploits where researchers, nation states, industry, academia, and criminal elements develop, buy, and sell these commodities. Whether they develop zero-days or purchase them, nation states commonly stockpile them for the future. They may then use them for purposes such as:...
MORE
Intelligence Officers Won’t Exit En Masse During the Trump Administration
March 3, 2017
— "Former intelligence analyst Edward Price dramatically resigned from CIA last week in an op-ed in the Washington Post—complete with a video critique that has gone viral on social media. Is Mr. Price’s departure the first crack in a dam of intelligence professionals flooding toward the exits? Or can he be viewed as a theatrical, but statistically...
MORE
Loop-Free Convergence With Unordered Updates
February 28, 2017
— This paper studies the feasibility of minimizing convergence delay and forwarding disruption without carrying any additional bits in the IP header, to provide high availability despite link failures in traditional IP networks. Previously proposed mechanisms achieve two of these three objectives by trading off the other objective. For instance, the...
MORE
CIA service and sacrifice will continue, no matter who is sitting in the White House
February 17, 2017
— "CIA officers are not a monolithic bunch. Some are introverts, some are extroverts. Some are Republicans and some are Democrats, although many or even most are fiercely independent like the Agency itself. They don’t care if they deliver unwelcome news; they care about what’s true."
MORE
Expanding tech advantages, 'cyber resiliency'
February 15, 2017
— "The Army Cyber Command, the Army Cyber Institute at West Point and the Army Cyber Center of Excellence have begun the work of developing a ready cyber force dedicated to offensive and defensive cyber operations. The Army — alongside its sister services — has devoted significant resources, starting with people. The skills required for those who...
MORE
Cyber Threat Reports 01 Feb - 15 Feb 2017
February 15, 2017
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights Net Neutrality uncertainty worries IT Pros. Ultra-compact positioning module. Hamas uses fake facebook profiles to target IDF with Cyber Attacks. Army & IBM head to the Cloud. Swedish forces exposed to extensive cyber attack.READ MORE
MORE
Innovation and Adaptation in Jihadist Digital Security
February 1, 2017
— The importance of the internet to contemporary jihadists as a tool for recruitment, propaganda and operational planning is well established. Less thoroughly studied are the ways in which jihadists work to keep this activity secure from monitoring and disruption, and in particular the ways in which they innovate and adapt to changes in the...
MORE
Cyber Threat Report 16 Jan - 31 Jan 2017
January 31, 2017
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights Symantec revokes faulty security certificates. Increased use of behavioral analytics. Driverless future won't start with driverless cars. GitHub secret key finder released to public. Mobile hacking firm Cellebrite confirms server breach. Read More in the READ MORE
MORE
1
...
16
17
18
19
20
21
22
23
24
25
...
34