{"501381":{"#nid":"501381","#data":{"type":"news","title":"Army Shows Commanders What Cyber Capabilities Are Possible","body":[{"value":"\u003Cp\u003EThe Army\u0027s cyber branch is using pilot programs and training center rotations to show commanders at a variety of echelons what cyber capabilities can be brought to the table and, at the same time, refine how cyber will be a part of tactical operations both on the defensive and offensive side, leaders said Tuesday\u0026nbsp;at an Association of the US Army forum. Georgia Tech\u0027s J.D. McCreary explains.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.defensenews.com\/story\/defense\/land\/army\/2015\/11\/10\/army-learning-how-cyber-support-plays-role-in-tactical-operations\/75545442\/\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in Defense News.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Army\u0027s cyber branch is using pilot programs and training center rotations to show commanders what cyber capabilities can be used on the defensive and offensive side. Georgia Tech\u0027s J.D. McCreary explains.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Army\u0027s cyber branch is using pilot programs to show commanders what cyber capabilities can be used."}],"uid":"27490","created_gmt":"2016-02-16 21:17:31","changed_gmt":"2016-10-08 03:20:16","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-10-10T00:00:00-04:00","iso_date":"2015-10-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"340941":{"id":"340941","type":"image","title":"Research Horizons - Tackling Cyber Threats -Army","body":null,"created":"1449245595","gmt_created":"2015-12-04 16:13:15","changed":"1475895057","gmt_changed":"2016-10-08 02:50:57","alt":"Research Horizons - Tackling Cyber Threats -Army","file":{"fid":"200719","name":"cybersecurity_threats_8.jpg","image_path":"\/sites\/default\/files\/images\/cybersecurity_threats_8_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cybersecurity_threats_8_0.jpg","mime":"image\/jpeg","size":659156,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cybersecurity_threats_8_0.jpg?itok=0sC3RAdP"}}},"media_ids":["340941"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"130751","name":"Military Cyberdefense"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}