An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
24
25
26
27
28
29
30
31
32
33
...
34
Strategic Amnesia and ISIS
April 21, 2016
— "MARK TWAIN observed, “history doesn’t repeat itself, but it does rhyme.” The study of military history teaches us valuable lessons that are applicable to today’s most intractable strategic problems; yet, these lessons are underappreciated in current American strategy formulation. Throughout the history of American armed conflict, the United States...
MORE
Cyber Defense as a part of Hazard Mitigation: Comparing High Hazard Potential Dam Safety Programs in the United States and Sweden
April 15, 2016
— Cyber security tends to only address the technical aspects of the information systems. The lack of considerations for environmental long-range implications of failed cyber security planning and measures, especially in the protection of critical infrastructure and industrial control systems, have created ecological risks that are to a high degree...
MORE
The Decision to Attack: Military and Intelligence Cyber Decision-Making
April 15, 2016
— The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.With The Decision to Attack, Aaron Franklin Brantly investigates how...
MORE
How Smartphones will Reshape the Modern Battlefield
April 10, 2016
— The single innovation that will truly reshape the modern battlefield in our lifetime is one that nearly every teenager in the U.S. already has in his or her possession—the portable smartphone. The smartphone already yields significant impact on civilian applications, providing personalized information and services at one’s request and linking...
MORE
Automated Metrics for Evaluating Adversarial Interfaces
March 1, 2016
— Contrary to the idealistic notion that human-computer interfaces are designed to actively help users accomplish their goals, millions of people who use the World Wide Web every day encounter a wide variety of interfaces that aggressively divert users toward the goals of the designer and away from those of the user. We label such strategies...
MORE
Sticks and Stones – Training for Tomorrow’s War Today
March 1, 2016
— Technology is great, when it works the way we want it to. Over the last couple years it seems the ever-mounting stream of hacks could leave even the most stoic of technologists cringing. As researchers at the Army Cyber Institute at West Point, our task is to be forward thinking and anticipate the hill after next. We are one part of the Army’s...
MORE
Apple's Dilemma: Customer Privacy or Help the Fed
February 18, 2016
— "West Point's Cyber Policy Fellow Dr. Aaron Brantly and U.C. Berkeley's James Dempsey debate Apple's moral dilemma."
MORE
Task Force Green Dragon: Preparation of the Environment in New England Taverns
February 16, 2016
— "Regardless of era, before active armed combat begins in a battlespace, commanders often have a voracious appetite for information, mostly to shape or prepare the environment for the future success of both non-lethal and lethal activities. These activities can range from information operations to surgical strikes. Today, operations that support...
MORE
Cyber Resiliency: Bridging a Cyber Capability Gap in 2025
February 5, 2016
— "The United States Army must develop a holistic solution to Army-wide cyber resiliency and hardening of its electronic systems in order to address our current cyber capability gap. Cyber resiliency goals must be achieved by anticipating vulnerabilities and disruptions before they occur, being trained to withstand the effect or disruption should one...
MORE
Cyber Talent for Unified Land Operations
January 19, 2016
— The Army is well on path to build their required portion of the US Cyber Command’s Cyber Mission Force to meet strategic objectives. It’s now time to address the impending need for cyber-enabled tactical operations and Service demands. Our strategy should be focused on the ways and means of creating an organization that allows the Army to lead in...
MORE
1
...
24
25
26
27
28
29
30
31
32
33
...
34