A non-exhaustive archive of Threatcasting reports and sci-fi prototypes (graphic novellas) available to the public and created by various institutions in partnership with the U.S. Army Cyber Institute and others as indicated.
REPORTS.
Sci-fi
Prototypes.
Science Fiction Prototypes are works of fiction, intended to spur individuals to think about potential future digital / cyber capabilities that could effect us. They are plausible science fiction futures that are based on our Threatcasting research that allow the creator(s) and reader to explore the ethical, cultural, policy and security impacts on people. The specific events depicted exist only in the imagination of the authors. The locations were selected merely to dramatize the story-lines and could just as easily be any city or democratic nation confronting external threats. For more information about the Army Cyber Institute's Threatcasting work click here.
DID YOU KNOW? Graphic novellas are a medium with a rich tradition of use by the U.S. Army. For generations, the Army has successfully used this medium for conveying important messages across the force.
Storiesallow us to understand and navigate a strange and alien world by rehearsing situations, problems, conflicts, and emotions in fictional form. We grow more adept at understanding, coping with, and resolving them in real life too.
- from Into the Woodsby John Yorke
This story is about microtargeting. It does not shy away from a dystopian vision of tomorrow. The threat from microtargeting isn’t a massive open wound. Instead, it’s death by a thousand cuts from an unseen knife.
This is the story of the Great Attack. Where various EDTs (sometimes working together and sometimes singularly) were paired with traditional kinetic weapons in an attempt to create WMD-like effects. Adversaries staying away from WMD payloads kept themselves under the radar. Yet, they still created the three devastating phases (not with a singular bomb drop but in a series of actions designed to bring a country to its knees).
As it has always been thoughout history, any technology that can be used to better the world, can also be used to do harm to people. In our future, nefarious actors have figured out ways to use these emerging technologies to disrupt the entire world order.
The year is 2030. Large swaths of the world are destabilized. Famine is rampant due to the aftermath of the long legacy of failed globalization. Citizens from poorer countries are migrating to escape famine, war, climate change, and lack of opportunity created by failed states.
In the year 2027, things have gone from bad to worse on the Han Chiu Peninsula. Karta is under attack. While the east of the city falls quickly, the U.S. and West Han Chiu forces hold their ground on the west banks of the Tan River.
A concerned serviceman observes his counterpart acting erratically – plotting to cripple or contaminate the entire water system of a U.S. Army base. Suspicious behaviors observed over the course of a year point to a potential insider threat.
Adversaries have beaten the U.S. to the punch, acquiring quantum computing capabilities well ahead of the technological world’s expectations. The ramifications of the enemy’s advantage in computational power are felt by a team of U.S. Army technical soldiers during a tactical mission.
A foreign criminal organization has taken advantage of known vulnerabilities in network devices and online services comprising the global Internet of things.
The year is 2028. Amid chemical attacks and global conflict, a rumored summit is about to convene in a secret location. Tensions are high. Rumors are rampant. A terror cell has infiltrated the summit and an attack is imminent. Who can gather the crucial information needed and disarm the threat?
In the year 2027, Yugaria and Novistrana have united, crossing a red line for Razkavia. Tensions are high as both NATO and Razkavia conduct training missions on each side of the border.
The shipments from Fort Lewis were delayed two days, leaving Lt. Jenkins and her skeleton crew to supervise the load at the docks on Thanksgiving day. Without a second thought, one of them tweets, “Finally … looks like I will get some turkey! #hatemylife” … and the attack begins.
CPT Jake Roberts had always wanted to serve his country. In college, he was the only student in his engineering program to be commissioned as a U.S. Army Second Lieutenant in the Corps of Engineers...
For decades, we have imagined the future through the eyes of comic book heroes — from boy-next-door Peter Parker’s Spider-Man to Amazon princess Wonder Woman.
Cisco Hyperinnovation Living Labs is built on the notion that we must first imagine, and then create, the future together.
We know that we can no longer innovation in isolation.