Skip to main content (Press Enter).
Army Cyber Institute
At West Point
Army Cyber Institute
DoD Cyber Community
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Cyber Leader Development Program
ACI Digital Commons
Cyber Defense Review
Cyber Doctrine (PKI)
Intelligent Cyber-Systems and Analytics
Internet of Things (IoT)
Virtual and Augmented Reality
Work With Us
About the ACI
About West Point
Sort by Article Category
Article Category Search
...Military PME Journals
Technical Reports & White Papers
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Defining the role of intelligence in cyber: a hybrid push and pull
January 1, 2013
— This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive...
Why Your Intuition About Cyber Warfare is Probably Wrong
November 29, 2012
— Since the dawn of time, when one caveman first struck another, humans have relied on a natural understanding of their physical environment to conduct warfare. We have an inborn ability to understand the laws of the physical world. In order to shoot an artillery round farther, just add more powder; to provide cover for protection against bullets,...
The Case for Cyber
September 13, 2012
— Cyber warfare isn’t hype; it’s real. America’s decisive technological advantage now contains the seed of our undoing. Our technological dependence is woven into the fabric of our way of life and our national defense. GPS satellites guide troops and weapon systems, algorithms fly aircraft and allocate supplies, websites drive personnel assignments...
Systemic Government Access to Private-Sector Data in the United States
September 10, 2012
— This paper will explore the potential applications of systematic government access to data held by third-party private-sector intermediaries that would not be considered public information sources but, rather, data generated based on the role these intermediaries play in facilitating economic and business transactions. Systemic Government Access to...
Unintended, Malicious, and Evil Applications of Augmented Reality
September 1, 2012
— Most new products begin life with a marketing pitch that extols the product's cultures. A Similarly optimistic property holds in user-centered design, where most books and classes take for granted that interface designers are out to help the user. Users themselves are assumed to be good natured, upstanding citizens somewhere out of the Leave it to...
When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat
June 3, 2012
— Information security programs teach dangerous skills to their students. Despite our best efforts as instructors and mentors, some students will use these skills in inappropriate, and sometimes illegal, ways. As a result, students jeopardize their careers, hurt others, and put their institution’s entire information security program at risk. In this...
Can You See Me Now? Toward Reasonable Standards for Law Enforcement Access to Location Data That Congress Could Enact
April 21, 2012
— This Article proposes a legislative model for law enforcement access standards and downstream privacy protections for location information. This proposal attempts to (1) articulate clear rules for courts to apply and law enforcement agents and industry to follow; and (2) strike a reasonable balance among the interests of law enforcement, privacy,...
Preventing a Digital Pearl Harbor
April 2, 2012
— As our national infrastructure, economy, and military have become increasingly dependent on computers and networks, it is critical that the United States works to prevent what Defense Secretary Leon Panetta labeled a "Digital Pearl Harbor." To do this, the county needs leaders both with experience fighting on the cyber battlefield and with the...