An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
25
26
27
28
29
30
31
32
33
34
Secret cellphone tracking may get more scrutiny from Mecklenburg County courts
November 29, 2014
— "Police likely will face more questions when they ask the court for permission to secretly track cellphones during their investigations, Mecklenburg County’s incoming senior judge says.Superior Court Judge Robert Bell told the Observer he believes recent media coverage will prompt local judges to ask police when they plan to use a surveillance...
MORE
Should Police Be Able To Keep Their Devices Secret?
October 22, 2014
— "Officers use "Stingrays" to mimic a cell phone tower and intercept information from phones in a whole neighborhood. The federal government and police have kept such devices under wraps for years.Now a question about the way police do their jobs. When is it OK for them to keep secrets about the tools they use - tools that can spy on us? That's...
MORE
West Point's Defense and Strategic Studies 'War Council' Series (Part II)
October 21, 2014
— Iran is in the headlines every day. The new Iranian President, Hassan Rouhani, has raised the possibility of diplomacy with the United States, providing hope for a deal on the nuclear front. At West Point, in class, instructors find cadets asking pointed questions about what American military intervention might look like. Many of these teachers, in...
MORE
Using the Discrete Event System Specification to model Quantum Key Distribution system components
October 17, 2014
— In this paper, we present modeling a Quantum Key Distribution (QKD) system with its components using the Discrete Event System Specification (DEVS) formalism. The DEVS formalism assures the developed component models are composable and exhibit well-defined temporal behavior independent of the simulation environment. These attributes enable users to...
MORE
Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification
September 18, 2014
— Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretical secure key exchange. QKD is suitable for use in applications that require high security such as those found in certain commercial, governmental, and military domains. As QKD is a new technology, there...
MORE
Towards A Career Path in Cyberspace
August 18, 2014
— In the past five years, the Department of Defense (DoD) recognized the emergence of cyberspace as an operational domain and created U.S. Cyber Command (USCYBERCOM). These events were the result of the realization that cyber operations are both a critical vulnerability and a massive opportunity. Within the Army, U.S. Army Cyber Command (ARCYBER) was...
MORE
Deconstructing the Relationship Between Privacy and Security
July 1, 2014
— From a government or law-enforcement perspective, one common model of privacy and security postulates that security and privacy are opposite ends of a single continuum. While this model has appealing properties, it is overly simplistic. The relationship between privacy and security is not a binary operation in which one can be traded for the other...
MORE
What the StingRay Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities
June 25, 2014
— In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the...
MORE
Key terrain in cyberspace: Seeking the high ground
June 3, 2014
— In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. By...
MORE
The Cyber Losers
May 22, 2014
— National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists. We often think of the cyber arms race from the perspective of states and corporations; however, the real losers are activists who seek to promote democracy,...
MORE
1
...
25
26
27
28
29
30
31
32
33
34