An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
25
26
27
28
29
30
31
32
33
34
Going Native: A Career Pipeline For U.S. Military Success Out in Silicon Valley
January 14, 2016
— "Just as we needed people who could interpret for us in Afghanistan and Iraq, so do we need soldiers who can do the same for us in Silicon Valley and other centers of technological innovation across the country. Headquartered in spacious office space adjacent to the Ames Research Center located in the heart of Silicon Valley, the DoD’s liaison...
MORE
Assessing India’s Cyber Resilience: Institutional Stability Matters
December 7, 2015
— A strategic cyberwar is a major conflict relying on heavy utilization of digital means, a form of conflict that we have not yet seen but that is likely to be a potential threat a few decades into the future. Even if technological breakthroughs, adaptations and software development are accelerating at an increasingly high rate, the delay is not a...
MORE
Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber Soldiers
November 16, 2015
— As noted in the 2013 DoD Cyberspace Workforce Strategy, not all cyberspace personnel will have a STEM background, but instead will come from a broad variety of backgrounds. The problem is trying to find personnel having the knowledge and aptitude for cyberspace operations. There are many instruments available to measure knowledge, but there few...
MORE
It is Time for the U.S. Military to Innovate Like Insurgents
October 28, 2015
— "Amidst the sea of defense contractors at this year’s AUSA expo, we — three young new players in this market — stood. We weren’t vendors, contractors or legislators, but rather active-duty Army captains, all members of the new cyber branch assigned to the Army Cyber Institute at West Point, the Army’s agent for change in cyberspace operations...
MORE
As more devices go online, hackers hunt for vulnerabilities
October 24, 2015
— "The hack was simple. Terry Dunlap tapped out a few commands on his laptop and within seconds a message popped on the screen: "Done!" With a few more keystrokes, he could see what the security camera could see and swivel it at will.The demonstration by Columbia-based Tactical Network Solutions illustrates an increasingly widespread problem: A...
MORE
The Army built a Wi-Fi "gun" that shoots drones from the sky
October 19, 2015
— "Looks like the U.S. armed forces have a few makers in their barracks who love playing with Raspberry Pis and soldering guns. The Army Cyber Institute at West Point has shown off a device the size of a rifle that can shoot a Parrot AR Quadcopter down from the sky by using an exploit created to hijack those particular drones."
MORE
Strategic Cyber Maneuver
October 17, 2015
— Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuver warfare dates back millennia and yet the fundamental goal of maneuver, to provide military advantage in tactical situations, has not changed. There are concrete and identifiable...
MORE
This Tactical Cyber Rifle Is a Glimpse Into the Future of High-Tech Warfare
October 15, 2015
— "We've seen big, bulky Anti-UAV Defense Systems radio-jamming drones out of the sky before, but it looks like the Army also has a much smaller version on its hands. At this year's Association of the United States Army Annual Meeting and Exposition (AUSA 2015), the Army Cyber Institute at West Point was demoing a rifle-sized device that can do the...
MORE
Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations
October 10, 2015
— Each strategy has a foundation—an overarching way of explaining why things are the way we see them and how to successfully reach our goals. Therefore, strategy is theory-based because theory provides an intellectual framework for predicting outcomes leading to the end goal the strategy pursues. This article will present the strategic cyberwar...
MORE
Cyber Education: A Multi-Level, Multi-Discipline Approach
October 1, 2015
— The purpose of this paper is to contribute to the emerging dialogue on the direction, content, and techniques involved in cyber education. The principle contributions of this work include a discussion on the definition of cyber and then a description of a multi-level, multi-discipline approach to cyber education with the goal of providing all...
MORE
1
...
25
26
27
28
29
30
31
32
33
34