Home : Research : ACI Research

ACI RESEARCH

   

The ACI focuses on exploring the challenges facing the Army (and likewise the Nation) within the cyber domain in the next 3-10 years.



Using our multi-disciplinary, mission focused team of professionals as well as leveraging the United States Military Academy faculty and our various partners, we expand the body of knowledge and advise senior military and government officials.

 

ACI RESEARCH INITIATIVES

Critical Infrastructure Resilience

Focus on improving cyber resiliency for critical infrastructure and their communities through understanding and researching the interdependencies between critical infrastructure sectors at all levels; improving public-private partnerships; informing DOD, DA, and other agencies of the impacts of cyber incidents on critical infrastructure and how those impacts influence Army operations; and providing an opportunity for local municipalities to exercise cyber incident response.

The Jack Voltaic Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point, this research assembles critical infrastructure partners to study cybersecurity and protection gaps.

Information Warfare

Serve as the integrator of civilian and military research in the information warfare space, specifically focused on the intersection between the social and the psychological domains. Seek to leverage partnerships with military, civilian researchers, lawmakers, and practitioners in the IW space and synthesize interdisciplinary research in order to shape Army leadership and influence emerging policy/doctrine for a whole of nation approach in the Information Warfare environment.

Narrative Warfare - Understanding what culturally significant stories are important to Americans that foreign adversaries may use to elicit an emotional response and behavioral change. Mementic Warfare - The use of images and text have become synonymous with online social media culture. These simple images can be weaponized to add humor to serious political themes to make them more palatable to a general audience. Social Network Analysis - How are groups connected online to pass information and ideas, cause certain items to become viral, and jump from platform to platform? Algorithmic Confounding - How are social media recommendation systems being used to target specific members of a populace to relay ideas both organically and through manipulation of those systems? Legal Aspects of Information Warfare - The intersection of social media and the Law of War and the extent to which misinformation/disinformation amounts to an unlawful intervention into the affairs of another State (nation) in violation of international law.

Cyber Operations Research (CORE)

The Cyber Operations research team focuses is on advancing the Army’s understanding of the Cyber domain and its role in military operations through operations support, original research, education, and organizational partnerships.

This is accomplished through:

  • Support to units across the Army and DoD
  • Exploration and research into electromagnetic manipulation and sensing
  • Analysis of platform and sensor quality and trust
  • Drawing attention to new avenues of development and operation through publication and discussion

Data Science

The Data Science research team provides research, advisement, engagement and education on data and decision sciences to support the cyber and information domain spanning the Army, Department of Defense, Intelligence Community, and Nation.

They do this by:

  • Conducting basic and applied research in data and decision sciences, to include operations research, artificial intelligence, machine learning, statistics, scientific computing, applied mathematics, and cognitive science.
  • Providing data and decision science analytical support to the ACI research teams and staff.
  • Managing the ACI’s data science infrastructure, platform, tooling and pipelines for data engineering and management, advanced analytics, algorithm and model development, modeling and simulation, and testing and evaluation.
  • Directing and overseeing the ACI’s Intelligent Cyber-Systems and Analytics Research Lab (ICSARL) and Data Science Workbench (WIRE), as well as cloud and high-performance computing capabilities, resources and services.
  • Providing science and technology advisory support, technology scouting and evaluation service, and reach-back operational data and decision science support to external stakeholders.
  • Establishing partnerships and leveraging expertise from Academia, Industry, and Government for collaboration on data and decision science innovation, education and outreach.

Their research looks to create holistic and integrated solutions leveraging novel approaches for data engineering, data discovery, data fusion, data processing, data visualization, and data analytics for data-driven decision making. Their goal is to develop and apply novel computational, mathematical, statistical and cognitive methods, algorithms, software, and decision-support tools to analyze large and heterogeneous collections of data to generate actionable insights that enable decision advantage and information dominance. Their research explores new ways of conceiving of and executing data and decision science capabilities with greater reliability, performance, and scalability. Specifically, their research aims to provide new capabilities to:

  • Address technical and behavioral challenges in the capability to rapidly collect, curate and analyze operational data, then securely distribute results and information to operational decision makers.
  • Determine appropriate high-throughput applications and large-scale data storage and processing that support the requirement to operate in multiple environments (both cyber and physical) and meet performance and energy objectives for applications ranging from very low-power sensors to high-performance computing systems.
  • Generate data that will improve algorithms overall performance and their resistance to adversarial attacks.
  • Securely collect, store, manage, and share various complex disparate data and information types.
  • Work with massive high-dimensional datasets in a secure, efficient, and accurate manner with provable performance.

Their research has the potential to: cope with various complex disparate data and information types; bridge correlational with causal discovery; determine solutions or obstructions to local-to-global data fusion/processing problems; and yield provably efficient procedures to enable or facilitate data-driven decision making.

Emerging Technologies

The Emerging Technologies research team focuses on advancing the Army’s understanding of current and bleeding edge technologies to enable insightful advice. Not just looking at a single technology, but exploring how a constellation of these technologies will affect future military operations in different geographies, geo-political climates, organizational structures, and against different adversaries.

This is accomplished through:

  • Exploratory research into future digital and cyber trends that might impact military operations.
  • Research into how AI/ML can improve or degrade cybersecurity
  • Research into how quantum technologies may impact cyber systems and their security
  • Exploratory research into next generation cryptography schemes that would protect military data and information
  • Applied research in autonomous platforms that enable obstacle avoidance, navigation in GPS-denied, dark, and/or underground environments
  • Establishing partnerships and leveraging expertise from Academia, Industry, and Government for collaboration on emerging technologies

Law & Policy

 
The Law and Policy research team focuses on developing legal, policy and ethical frameworks that guide and assist cyber operators in carrying out their missions. As authorities continues to be one of the primary issues raised by cyber leadership, the research team seeks to help improve the policies, legal authorities and ethical frameworks in order to improve timely and effective cyber operations that are guided by appropriate legal, policy and ethical constraints.