top of page
inject-blog-service_1737593248279.png

Library

A non-exhaustive archive of Threatcasting reports and sci-fi prototypes (graphic novellas) available to the public and created by various institutions in partnership with the U.S. Army Cyber Institute and others as indicated.

REPORTS.

LASSO- LandAirSeaSpaceOccupations_edited.jpg
Asset 9_2x.png

Sci-fi
Prototypes
.

Science Fiction Prototypes are works of fiction, intended to spur individuals to think about potential future digital / cyber capabilities that could effect us. They are plausible science fiction futures that are based on our Threatcasting research that allow the creator(s) and reader to explore the ethical, cultural, policy and security impacts on people. The specific events depicted exist only in the imagination of the authors. The locations were selected merely to dramatize the story-lines and could just as easily be any city or democratic nation confronting external threats. For more information about the Army Cyber Institute's Threatcasting work click here

DALL·E 2024-03-19 17.06.00 - In the heart of Kansas City, amid a backdrop of urban crisis,
Futuristic City

DID YOU KNOW? Graphic novellas are a medium with a rich tradition of use by the U.S. Army. For generations, the Army has successfully used this medium for conveying important messages across the force.

Stories allow us to understand and navigate a strange and alien world by rehearsing situations, problems, conflicts, and emotions in fictional form. We grow more adept at understanding, coping with, and resolving them in real life too.

- from Into the Woods by John Yorke

Screenshot 2024-06-13 184524_edited

This story is about microtargeting. It does not shy away from a dystopian vision of tomorrow. The threat from microtargeting isn’t a massive open wound. Instead, it’s death by a thousand cuts from an unseen knife.

The Great Attack: Survivors' Tales

This is the story of the Great Attack. Where various EDTs (sometimes working together and sometimes singularly) were paired with traditional kinetic weapons in an attempt to create WMD-like effects. Adversaries staying away from WMD payloads kept themselves under the radar. Yet, they still created the three devastating phases (not with a singular bomb drop but in a series of actions designed to bring a country to its knees).

Material Loss

As it has always been thoughout history, any technology that can be used to better the world, can also be used to do harm to people. In our future, nefarious actors have figured out ways to use these emerging technologies to disrupt the entire world order.

Invisible Force

The year is 2030. Large swaths of the world are destabilized. Famine is rampant due to the aftermath of the long legacy of failed globalization. Citizens from poorer countries are migrating to escape famine, war, climate change, and lack of opportunity created by failed states.

Dark Hammer

In the year 2027, things have gone from bad to worse on the Han Chiu Peninsula. Karta is under attack. While the east of the city falls quickly, the U.S. and West Han Chiu forces hold their ground on the west banks of the Tan River.

Insider Threat

A concerned serviceman observes his counterpart acting erratically – plotting to cripple or contaminate the entire water system of a U.S. Army base. Suspicious behaviors observed over the course of a year point to a potential insider threat.

Quantum Winter

Adversaries have beaten the U.S. to the punch, acquiring quantum computing capabilities well ahead of the technological world’s expectations. The ramifications of the enemy’s advantage in computational power are felt by a team of U.S. Army technical soldiers during a tactical mission.

1000 Cuts

A foreign criminal organization has taken advantage of known vulnerabilities in network devices and online services comprising the global Internet of things.

Hero 2028

The year is 2028. Amid chemical attacks and global conflict, a rumored summit is about to convene in a secret location. Tensions are high. Rumors are rampant. A terror cell has infiltrated the summit and an attack is imminent. Who can gather the crucial information needed and disarm the threat?

Silent Ruin

In the year 2027, Yugaria and Novistrana have united, crossing a red line for Razkavia. Tensions are high as both NATO and Razkavia conduct training missions on each side of the border.

11-25-2027

The shipments from Fort Lewis were delayed two days, leaving Lt. Jenkins and her skeleton crew to supervise the load at the docks on Thanksgiving day. Without a second thought, one of them tweets, “Finally … looks like I will get some turkey! #hatemylife” … and the attack begins.

Engineering a Traitor

CPT Jake Roberts had always wanted to serve his country. In college, he was the only student in his engineering program to be commissioned as a U.S. Army Second Lieutenant in the Corps of Engineers...

The Future of Work

For decades, we have imagined the future through the eyes of comic book heroes — from boy-next-door Peter Parker’s Spider-Man to Amazon princess Wonder Woman.

Two Days After Tuesday

Cisco Hyperinnovation Living Labs is built on the notion that we must first imagine, and then create, the future together. We know that we can no longer innovation in isolation.

VIDEOS.

Invisible Force: Information Warfare and the Future of Conflict - Motion Comic Teaser
01:50

© 2025 by Threatcasting.ai. All rights reserved. This site and the domain are registered to and managed by Connexions Global Matrix, Inc.

 

Content contributors retain rights to their original work. View the full policies and disclaimers here.

Asset 9_2x.png

THREATCASTING.AI

bottom of page