Critical Infrastructure Resilience
Focus on improving cyber resiliency for critical infrastructure and their communities through understanding and researching the interdependencies between critical infrastructure sectors at all levels; improving public-private partnerships; informing DOD, DA, and other agencies of the impacts of cyber incidents on critical infrastructure and how those impacts influence Army operations; and providing an opportunity for local municipalities to exercise cyber incident response.
The Jack Voltaic Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point, this research assembles critical infrastructure partners to study cybersecurity and protection gaps.
Serve as the integrator of civilian and military research in the information warfare space, specifically focused on the intersection between the social and the psychological domains. Seek to leverage partnerships with military, civilian researchers, lawmakers, and practitioners in the IW space and synthesize interdisciplinary research in order to shape Army leadership and influence emerging policy/doctrine for a whole of nation approach in the Information Warfare environment.
Narrative Warfare - Understanding what culturally significant stories are important to Americans that foreign adversaries may use to elicit an emotional response and behavioral change.
Mementic Warfare - The use of images and text have become synonymous with online social media culture. These simple images can be weaponized to add humor to serious political themes to make them more palatable to a general audience.
Social Network Analysis - How are groups connected online to pass information and ideas, cause certain items to become viral, and jump from platform to platform?
Algorithmic Confounding - How are social media recommendation systems being used to target specific members of a populace to relay ideas both organically and through manipulation of those systems?
Legal Aspects of Information Warfare - The intersection of social media and the Law of War and the extent to which misinformation/disinformation amounts to an unlawful intervention into the affairs of another State (nation) in violation of international law.
Cyber Operations Research (CORE)
The Cyber Operations research team focuses is on advancing the Army’s understanding of the Cyber domain and its role in military operations through operations support, original research, education, and organizational partnerships.
This is accomplished through:
- Support to units across the Army and DoD
- Exploration and research into electromagnetic manipulation and sensing
- Analysis of platform and sensor quality and trust
- Drawing attention to new avenues of development and operation through publication and discussion
The Data Science research team provides research, advisement, engagement and education on all aspects of data science in support of the cyber and information domain spanning the Army, Department of Defense and the Intelligence Community.
They do this by:
- Conducting basic and applied research and development in data science, operations research, artificial intelligence, cognitive science, statistical computing, applied mathematics, and advanced analytics.
- Providing data science analytical support to the ACI research teams and staff.
- Managing the ACI’s data science infrastructure, platform, tooling and pipelines for data engineering and management, advanced analytics, algorithm and model development, modeling and simulation, and testing and evaluation.
- Providing science and technology advisory support and reach-back operational data science support to external stakeholders in the cyber and information domain.
- Establishing partnerships and leverages expertise from Academia, Industry, and Government for collaboration on data science innovation.
The Data Science research team looks to create holistic and integrated solutions leveraging novel approaches for all aspects of data science, to include data management, data engineering, data discovery, data fusion, data visualization, and data analytics. Their goal is to create, develop and apply novel computational, mathematical and statistical methods, algorithms, software, data curation, analysis, visualization and mining tools to address large-scale simulations and analysis of large and heterogeneous collections of data. They seek key developments that would improve the modeling of systems under dynamic conditions, achieve effective instrumentation management, and architect control of dynamic and heterogeneous resources. Their research explores new ways of conceiving of and executing Army data science capabilities with greater reliability, performance, and scalability.
Their research aims to provide the Army and the Army Cyber Enterprise new capabilities to:
Their research has the potential to: cope with various complex disparate data/information types; bridge correlational with causal discovery; determine solutions or obstructions to local-to-global data fusion problems; and yield provably efficient procedures to enable or facilitate data analytics.
- Address challenges in the Army’s capability to rapidly collect and analyze operational data, then securely distribute results and information to operational decision makers.
Determine appropriate high-throughput applications and large-scale data storage and processing that support the Army’s requirement to operate in multiple environments (both cyber and physical) and meet performance and energy objectives for applications ranging from very low-power sensors to high-performance computing systems.
Generate data that will improve algorithms overall performance and their resistance to adversarial attacks.
Securely collect, store, manage, and share various complex disparate data and information types.
Work with massive high-dimensional datasets in a secure, efficient, and accurate manner with provable performance.
The Emerging Technologies research team focuses on advancing the Army’s understanding of current and bleeding edge technologies to enable insightful advice. Not just looking at a single technology, but exploring how a constellation of these technologies will affect future military operations in different geographies, geo-political climates, organizational structures, and against different adversaries.
This is accomplished through:
- Exploratory research into future digital and cyber trends that might impact military operations.
- Research into how AI/ML can improve or degrade cybersecurity
- Research into how quantum technologies may impact cyber systems and their security
- Exploratory research into next generation cryptography schemes that would protect military data and information
- Applied research in autonomous platforms that enable obstacle avoidance, navigation in GPS-denied, dark, and/or underground environments
- Establishing partnerships and leveraging expertise from Academia, Industry, and Government for collaboration on emerging technologies
Law & Policy
- The Law and Policy research team focuses on developing legal, policy and ethical frameworks that guide and assist cyber operators in carrying out their missions. As authorities continues to be one of the primary issues raised by cyber leadership, the research team seeks to help improve the policies, legal authorities and ethical frameworks in order to improve timely and effective cyber operations that are guided by appropriate legal, policy and ethical constraints.