An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
22
23
24
25
26
27
28
29
30
31
...
34
Humanitarian Cyber Operations
September 9, 2016
— Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian operations utilizing the legal framework of responsibility to protect. The responsibility to protect doctrine will allow concerned states to interfere in the domestic affairs of foreign nations that jeopardize the welfare of its citizenry, and the...
MORE
A Holistic Approach to the Encryption Debate
September 1, 2016
— Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and...
MORE
Critical Infrastructure Exercise 16.2--A Transformative Cybersecurity Learning Experience
August 8, 2016
— With an increased awareness that the critical infrastructure which keeps our country running is surprisingly vulnerable—not just to physical attacks, but also to cyberattacks that can be initiated from anywhere in the world—the state of Indiana executed CRIT-EX 16.2 on the 18th and 19th of May, 2016, at the Muscatatuck Urban Training Center. This...
MORE
The Path Dependent Power of a Single Word: The Swedish Case of Bureaucratic Obstruction in the European Public Sector Information (PSI) Directive’s Implementation
August 6, 2016
— The translation of the word ‘document’ in the 2003/98/EC directive on the re-use of public sector information into Swedish had several alternative words but used the word ‘handling’. The administrative law precedence for the word ‘handling’ has embedded several assumptions of the actual document, and based on a precedence that started in the 1760s...
MORE
Just out "It's Too Complicated: Implications of IP-Based Communications..."
July 8, 2016
— For more than forty years, electronic surveillance law in the United States developed under constitutional and statutory regimes that, given the technology of the day, distinguished content from metadata with ease and certainty. The stability of these legal regimes and the distinctions they facilitated was enabled by the relative stability of these...
MORE
We Took West Point Cadets to (Cyber) War
June 21, 2016
— "Several months ago, we — members of the Army Cyber Institute and Defense Innovation Unit Experimental — built and wrote about a cyber-electromagnetic tool lovingly referred to as the “cyber capability rifle” (CCR) for about $150 and ten man-hours. Shortly after its debut at Cyber Talks, we tested it against a network-connected home automation...
MORE
West Point Cadets Are Shooting Down Drones With Cyber Rifles
June 15, 2016
—
...
MORE
The Value of a One Semester Exposure to the Institutional Review Board Process
June 1, 2016
— Genuinely considering the user experience is an important element of developing usable and acceptable hardware and software. When working outside of a simple classroom project, however, an Institutional Review Board (IRB) approval must be obtained before conducting user studies with human subjects. Obtaining IRB approval is often viewed as a...
MORE
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
June 1, 2016
— A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind — a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major “wake-up calls,” the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book...
MORE
You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?
May 31, 2016
— In recent years, many technology companies have enabled encryption by default in their products, thereby burdening law enforcement efforts to intercept communications content or access data stored on smartphones by traditional means. Even before such encryption technologies were widely used, however, the Federal Bureau of Investigation (“FBI”)...
MORE
1
...
22
23
24
25
26
27
28
29
30
31
...
34