Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (6)
- Training (5)
- Nuclear security (4)
- Education (3)
- Nuclear Security (3)
-
- Security (3)
- China (2)
- Cold War (2)
- Cyber (2)
- Nuclear security culture (2)
- Russia (2)
- Safety (2)
- Security culture (2)
- Terrorism (2)
- Vulnerability (2)
- 1920 National Defense Act (1)
- 9/11 (1)
- AF/African Union (1)
- Ad hoc network (1)
- Ad hoc networks (1)
- Afghanistan (1)
- Air littoral; verticality; US military; domain convergence; air domain; General Raymond Thomas; US Special Operations Forces; drones; air space; Iraq; Iraqi soldiers; ground forces; high-end fighters; bombers; autonomous drones; air control; Air Forces; US Air Force; Army; US Army; air superiority; Russia; China; tactical drones; tactical firepower; swarm attacks; miniature aerial munitions; kamikaze drones; Key West Agreement; vertical reciprocity; US Air Force Chief of Staff General Charles (1)
- Airbus 300 (1)
- Airline (1)
- Airport (1)
- Al Qaeda (1)
- Al-Sisi (1)
- And Labor (1)
- Anocracy (1)
- Aramco (1)
Articles 1 - 30 of 65
Full-Text Articles in Engineering
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky
Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky
The US Army War College Quarterly: Parameters
The June 2020 clash between the People’s Republic of China and India in the disputed Ladakh border area resulted from the strategic expansions of both powers. Like two bubbles expanding in a contained space, these expansions were bound to collide and cause friction. This article explains how the expansions precipitated the incident and might exacerbate border disputes in the future. In pondering implications, it recommends Washington pursue a Eurasia-focused policy embracing the disputed region.
The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco
The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco
The US Army War College Quarterly: Parameters
Assessing threats to the air littoral, the airspace between ground forces and high-end fighters and bombers, requires a paradigm change in American military thinking about verticality. This article explores the consequences of domain convergence, specifically for the Army and Air Force’s different concepts of control. It will assist US military and policy practitioners in conceptualizing the air littoral and in thinking more vertically about the air and land domains and the challenges of domain convergence.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Assessing Risk At The National Strategic Level: Visualization Tools For Military Planners, Wade A. Germann, Heather S. Gregg
Assessing Risk At The National Strategic Level: Visualization Tools For Military Planners, Wade A. Germann, Heather S. Gregg
The US Army War College Quarterly: Parameters
The reemergence of great power competition, conflict with near-peer competitor states below the level of armed conflict, and persisting threats from nonstate actors with transnational ambitions and global reach pose challenges for strategists planning, executing, and assessing military operations and strategy. Building on current visualization tools, two proposed models—the National Strategic Risk Abacus and the National Strategic Risk Radar Chart—address these challenges and better depict how the US military may inadvertently contribute to risk at the national strategic level.
The Battalion Commander Effect, Everett Spain, Gautam Mukunda, Archie Bates
The Battalion Commander Effect, Everett Spain, Gautam Mukunda, Archie Bates
The US Army War College Quarterly: Parameters
Statistical evidence suggests Army battalion commanders are significant determinants of the retention of their lieutenants—especially high-potential lieutenants. Further, this so-called Battalion Commander Effect should be included in brigadier general promotion board assessments and used to inform officer professional military education curricula.
Samuel Huntington, Professionalism, And Self-Policing In The Us Army Officer Corps, Brian Mcallister Linn
Samuel Huntington, Professionalism, And Self-Policing In The Us Army Officer Corps, Brian Mcallister Linn
The US Army War College Quarterly: Parameters
Drawing on Samuel P. Huntington’s three phases of self-regulation used to determine if an occupation qualifies as a profession, this article focuses on the third phase of policing and removing those who fail to uphold the standards set forth in the first two phases. It reviews how the US Army implemented this phase following the Civil War through the post–Vietnam War years and the implications for the officer corps.
The Evolution Of Hybrid Warfare: Implications For Strategy And The Military Profession, Ilmari Käihkö
The Evolution Of Hybrid Warfare: Implications For Strategy And The Military Profession, Ilmari Käihkö
The US Army War College Quarterly: Parameters
The concept of hybrid war has evolved from operational-level use of military means and methods in war toward strategic-level use of nonmilitary means in a gray zone below the threshold of war. This article considers this evolution and its implications for strategy and the military profession by contrasting past and current use of the hybrid war concept and raising critical questions for policy and military practitioners.
Great (Soft) Power Competition: Us And Chinese Efforts In Global Health Engagement, Michael W. Wissemann
Great (Soft) Power Competition: Us And Chinese Efforts In Global Health Engagement, Michael W. Wissemann
The US Army War College Quarterly: Parameters
Global health engagement, an underutilized strategy rooted in the strengths of soft power persuasion, can lead to more military-to-military cooperation training, help establish relationships that can be relied on when crises develop, stabilize fragile states, and deny violent extremist organizations space for recruiting and operations. Examining Chinese efforts worldwide to curry favor and influence and the challenges posed by the COVID-19 pandemic, this article shows health as a medium is a very compelling and advantageous whole-of-government approach to national security policy concerns.
Hope Versus Reality: The Efficacy Of Using Us Military Aid To Improve Human Rights In Egypt, Gregory L. Aftandilian
Hope Versus Reality: The Efficacy Of Using Us Military Aid To Improve Human Rights In Egypt, Gregory L. Aftandilian
The US Army War College Quarterly: Parameters
Using US military aid as a lever to achieve human rights reforms has proven only marginally effective. This article examines the approaches employed by the Obama and Trump administrations to US military aid to Egypt and proposes practical steps that can be taken by policymakers and the military personnel on the ground to advance US human rights values.
Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam
Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam
International Journal of Nuclear Security
The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.
This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area (AA), the Protected …
Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo
Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo
International Journal of Nuclear Security
Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework is used effectively to …
The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska
The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska
International Journal of Nuclear Security
There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known for its …
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté
Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté
International Journal of Nuclear Security
The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of …
The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf
The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf
International Journal of Nuclear Security
Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.
This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.
Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel
Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel
International Journal of Nuclear Security
In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring …
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Journal of Aviation/Aerospace Education & Research
Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …