An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Our Work
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
2
3
4
5
6
7
8
9
10
11
...
34
A Ranked Solution for Social Media Fact Checking Using Epidemic Spread Modeling
January 7, 2022
— Within the past decade, social media has become a primary platform for consumption of information and current events. Unlike with traditional news sources, however, social media posts do not have to go through a rigorous validation process prior to publication. The 2019 Mueller Report illustrates how malicious actors have taken advantage of these lax requirements to sway public opinion on topics from the #blacklivesmatter movement to the 2016 U.S. Presidential election.
READ MORE
...
MORE
Static Inertia: The Legal Challenges to Making Progress on an Effective Military Information Strategy
January 4, 2022
— The United States military is constantly reorganizing and retooling itself to address information operations in gray-zone competition. Unfortunately, forward progress is hard to come by, and operations in the information environment remain an Achilles’ heel, which adversaries use against us to great effect. There is no shortage of ideas and proposals to address the information operations problem, but no solution has been able to overcome the static inertia and impel progress.
READ MORE
...
MORE
Episode 3: 21st Century Propaganda: Understanding Today's Threats
December 22, 2021
— This podcast explores how threat actors are manipulating the British and American information environments and provides recommendations for how the government and citizenry might defend themselves. David V. Gioe and co-authors Daniel Dobrowolski and Alicia Wanless argue that enforcing heavy moderation of content is counterproductive and that civic education, transparency, media literacy and ongoing research into the methods that threat actors use are essential to guide an effective response.
LISTEN HERE
...
MORE
Cybersecurity Anomaly Detection in Adversarial Environments
November 3, 2021
— The proliferation of interconnected battlefield information-sharing devices, known as the Internet of Battlefield Things (IoBT), introduced several security challenges. Inherent to the IoBT operating environment is the practice of adversarial machine learning, which attempts to circumvent machine learning models.
READ MORE HERE!
...
MORE
Cyber Response is a Team Effort
July 27, 2020
—
READ MORE
MORE
5th SFG(A) Cyber Detachment stays ready with virtual competition
April 17, 2020
—
READ MORE
MORE
High Frequency Communications Features Highs and Lows
February 1, 2020
—
READ MORE
MORE
Cyber Policy team sweeps Texas Cyber 9/12 competition
January 30, 2020
—
READ MORE
MORE
Why Iran would avoid a major cyberwar
January 17, 2020
—
READ MORE
MORE
Are you at greater risk of cyber attacks when international tensions climb?
January 17, 2020
—
READ MORE
MORE
1
...
2
3
4
5
6
7
8
9
10
11
...
34