Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 65

Full-Text Articles in Engineering

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky Nov 2021

Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky

The US Army War College Quarterly: Parameters

The June 2020 clash between the People’s Republic of China and India in the disputed Ladakh border area resulted from the strategic expansions of both powers. Like two bubbles expanding in a contained space, these expansions were bound to collide and cause friction. This article explains how the expansions precipitated the incident and might exacerbate border disputes in the future. In pondering implications, it recommends Washington pursue a Eurasia-focused policy embracing the disputed region.


The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco Nov 2021

The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco

The US Army War College Quarterly: Parameters

Assessing threats to the air littoral, the airspace between ground forces and high-end fighters and bombers, requires a paradigm change in American military thinking about verticality. This article explores the consequences of domain convergence, specifically for the Army and Air Force’s different concepts of control. It will assist US military and policy practitioners in conceptualizing the air littoral and in thinking more vertically about the air and land domains and the challenges of domain convergence.


Book Reviews, Usawc Press Aug 2021

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Assessing Risk At The National Strategic Level: Visualization Tools For Military Planners, Wade A. Germann, Heather S. Gregg Aug 2021

Assessing Risk At The National Strategic Level: Visualization Tools For Military Planners, Wade A. Germann, Heather S. Gregg

The US Army War College Quarterly: Parameters

The reemergence of great power competition, conflict with near-peer competitor states below the level of armed conflict, and persisting threats from nonstate actors with transnational ambitions and global reach pose challenges for strategists planning, executing, and assessing military operations and strategy. Building on current visualization tools, two proposed models—the National Strategic Risk Abacus and the National Strategic Risk Radar Chart—address these challenges and better depict how the US military may inadvertently contribute to risk at the national strategic level.


The Battalion Commander Effect, Everett Spain, Gautam Mukunda, Archie Bates Aug 2021

The Battalion Commander Effect, Everett Spain, Gautam Mukunda, Archie Bates

The US Army War College Quarterly: Parameters

Statistical evidence suggests Army battalion commanders are significant determinants of the retention of their lieutenants—especially high-potential lieutenants. Further, this so-called Battalion Commander Effect should be included in brigadier general promotion board assessments and used to inform officer professional military education curricula.


Samuel Huntington, Professionalism, And Self-Policing In The Us Army Officer Corps, Brian Mcallister Linn Aug 2021

Samuel Huntington, Professionalism, And Self-Policing In The Us Army Officer Corps, Brian Mcallister Linn

The US Army War College Quarterly: Parameters

Drawing on Samuel P. Huntington’s three phases of self-regulation used to determine if an occupation qualifies as a profession, this article focuses on the third phase of policing and removing those who fail to uphold the standards set forth in the first two phases. It reviews how the US Army implemented this phase following the Civil War through the post–Vietnam War years and the implications for the officer corps.


The Evolution Of Hybrid Warfare: Implications For Strategy And The Military Profession, Ilmari Käihkö Aug 2021

The Evolution Of Hybrid Warfare: Implications For Strategy And The Military Profession, Ilmari Käihkö

The US Army War College Quarterly: Parameters

The concept of hybrid war has evolved from operational-level use of military means and methods in war toward strategic-level use of nonmilitary means in a gray zone below the threshold of war. This article considers this evolution and its implications for strategy and the military profession by contrasting past and current use of the hybrid war concept and raising critical questions for policy and military practitioners.


Great (Soft) Power Competition: Us And Chinese Efforts In Global Health Engagement, Michael W. Wissemann Aug 2021

Great (Soft) Power Competition: Us And Chinese Efforts In Global Health Engagement, Michael W. Wissemann

The US Army War College Quarterly: Parameters

Global health engagement, an underutilized strategy rooted in the strengths of soft power persuasion, can lead to more military-to-military cooperation training, help establish relationships that can be relied on when crises develop, stabilize fragile states, and deny violent extremist organizations space for recruiting and operations. Examining Chinese efforts worldwide to curry favor and influence and the challenges posed by the COVID-19 pandemic, this article shows health as a medium is a very compelling and advantageous whole-of-government approach to national security policy concerns.


Hope Versus Reality: The Efficacy Of Using Us Military Aid To Improve Human Rights In Egypt, Gregory L. Aftandilian Aug 2021

Hope Versus Reality: The Efficacy Of Using Us Military Aid To Improve Human Rights In Egypt, Gregory L. Aftandilian

The US Army War College Quarterly: Parameters

Using US military aid as a lever to achieve human rights reforms has proven only marginally effective. This article examines the approaches employed by the Obama and Trump administrations to US military aid to Egypt and proposes practical steps that can be taken by policymakers and the military personnel on the ground to advance US human rights values.


Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam Jun 2018

Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam

International Journal of Nuclear Security

The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.

This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area (AA), the Protected …


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo Apr 2018

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework is used effectively to …


The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska Mar 2018

The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska

International Journal of Nuclear Security

There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known for its …


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté Dec 2017

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of …


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf Dec 2017

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel Nov 2017

Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel

International Journal of Nuclear Security

In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring …


Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D. Jan 2017

Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.

Journal of Aviation/Aerospace Education & Research

Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …