An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
20
21
22
23
24
25
26
27
28
29
...
34
Tallinn Manual 2.0 Panel
December 20, 2016
—
...
MORE
Keynote Address - Dmitri Alperovitch
December 20, 2016
—
...
MORE
Cyber Threat Reports 13 Dec - 19 Dec 2016
December 19, 2016
— Army Cyber Institute Cyber Threat Report Tech Trends: Stories and Highlights North Korea's "Super-Secure Red Star OS" can be hacked. Guessing valid credit card numbers in six seconds? Priceless! Innovative Technique to curtail illegal copying. Engineers creates chip just 5 atoms thick. Technical roadmap for quantum computing.READ MORE
MORE
Day 1 Opening Remarks - COL Andrew O. Hall
December 19, 2016
—
...
MORE
Developing Cyber Officers As Operational Leaders
December 13, 2016
— Command relationships are important to establishing operational priorities and unity of effort. IN the cyber domain, these establish relationships that are necessary guides for policy and doctrine, essential to reducing the complexity of war. Admiral Rogers envisions cyber operational doctrine in which cyber forces will act as “supported sometimes”...
MORE
How to Grow a Capable Cyber Officer
December 13, 2016
— "Given the rising number of military cyber activities between the U.S. and its adversaries over the last several years, it is increasingly clear that cyberspace is now an intrinsic part of the current operating environment. As the fifth warfighting domain, it is a space in which we fight and win battles, and its criticality to mission success is...
MORE
Cyber Threat Reports 18 Nov - 12 Dec 2016
December 12, 2016
— Army Cyber InstituteCyber Threat Report Tech Trends: Stories and Highlights Hackers hunting Hackers. 48% of organizations have suffered ransomware attacks. ATM skimming hit NY hospitals. Mirai botnet attacks thousands of home routers. A new way to anonymize data might actually work.READ MORE
MORE
The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace
November 1, 2016
— Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a new story of a government, business, or individual, suffering from a serious hack. These hacks are often attributed to state...
MORE
Cognitive Engagement in Active CyberDefense
November 1, 2016
— Cybersecurity is traditionally seen as an asymmetrical relationship between adversaries and defenders, however recent research has attempted to reverse this trend by operationalizing cognitive engagement for the purpose of enhancing adversary attribution. In a traditional networked environment, adversaries have low risk (low chance of getting...
MORE
Disruptive Innovations to Help Protect against Future Threats
October 26, 2016
— This paper addresses the current U.S. Offset Strategy that focuses almost exclusively on breakthrough innovations to compensate for the smaller conventional military forces the U.S. has in relation to the size of the militaries of its potential adversaries. It explains the four different categories of innovation (breakthrough, disruptive,...
MORE
1
...
20
21
22
23
24
25
26
27
28
29
...
34