An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
25
26
27
28
29
30
31
32
33
34
Aesop’s wolves: the deceptive appearance of espionage and attacks in cyberspace
September 15, 2015
— Appearances in cyberspace are deceptive and problematic. Deception in the cyber domain poses an immensely difficult challenge for states to differentiate between espionage activities in cyberspace and cyber attacks. The inability to distinguish between cyber activities places US cyber infrastructure in a perilous position and increases the...
MORE
Bringing Fear to the Perpetrators – Humanitarian Cyber Operations as Evidence Gathering and Deterrence
September 10, 2015
— Humanitarian cyber operations would allow democratic states to utilize cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on...
MORE
Phreaker, Maker, Hacker, Ranger: One Vision for Cyber Support to Corps and Below in 2025
August 11, 2015
— "The operationalization of the Cyberspace Domain at the tactical-level continues to exacerbate both tactical theorists and practitioners alike. For theorists, much of this stress and anxiety stems from a deficiency in unclassified historical examples and the abstractness of cyberspace as a warfighting domain. The lack of historical examples and...
MORE
Visualizing the Tactical Ground Battlefield in the Year 2050: Workshop Report
June 1, 2015
— This report describes the proceedings and outcomes of an Army-sponsored workshop that brought together a diverse group of intellectual leaders to envision the future of the tactical ground battlefield. The group identified and discussed the following 7 interrelated future capabilities that they felt would differentiate the battlefield of the future...
MORE
Implications of Quantum Information Processing On Military Operations
May 29, 2015
— This paper discusses the benefits and drawbacks of quantum computing and quantum cryptography, subsets of the field of Quantum Information Processing (QIP). This field uses quantum mechanics for information processing rather than classical mechanics and portends game-changing implications to technologies long-relied on by military organizations,...
MORE
Extremist Forums Provide Digital OpSec Training
May 28, 2015
— The average netizen has terrible digital hygiene. We click on random links, open emails from unknown individuals, use public WiFi hotspots, leave computers and devices unsecured, and often do not even use basic anti-virus packages. Most Chief Information Systems Officers’ largest problem is not a talented nation state, but rather lazy or ignorant...
MORE
Shaping the Army’s Cyber Operations Force: the Human Dimension
February 12, 2015
— By declaring cyberspace an operational domain, the Department of Defense (DoD) acknowledged the criticality for successfully projecting combat power in the domain, and therefore directed all services to create a component command subordinate to U.S. Cyber Command (USCYBERCOM).Since the declaration of this entirely new operational domain, the Army...
MORE
A Year of Cyber Professional Development
January 23, 2015
— This article discusses a leader development program that was instituted in the U.S. Army’s 509th Signal Battalion using reading and critical thinking as a foundation. This program focused on educating leaders (both military and civilian) about the future of our Army. It was a grass-roots effort to revive Army traditional formats of leader...
MORE
A Flexible Modeling Framework for Studying Quantum Key Distribution System Implementation Non-Idealities
January 15, 2015
— Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical...
MORE
Your Secret StingRay's No Secret Anymore
December 29, 2014
— During a 1993 congressional oversight hearing on the integrity of telephone networks, security researcher Tsutomu Shimomura used a “software hack” to turn an analog cellular phone into a scanner that enabled all present in the hearing room to hear the live conversations of nearby cellular phone users. Shimomura had been granted immunity to perform...
MORE
1
...
25
26
27
28
29
30
31
32
33
34