Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 22 of 22

Full-Text Articles in Engineering

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener Jul 2020

Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener

Liberty University Journal of Statesmanship & Public Policy

Biological warfare is a national security concern that transcends centuries. In the current international climate, biowarfare is of particular interest due to the COVID-19 pandemic. This article seeks to follow historical cases of biological warfare and international response to these cases in order to understand the implications of COVID-19, if it were to be weaponized. Also covered is the current capabilities that Russia, China, and Iran are assessed to possess.


Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg Apr 2016

Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg

Jan Kallberg

Traditional military theory applied in cyber struggles with four challenges – anonymity, object permanence, measurable results, and rapid digital execution. In a Clausewitzian world, these challenges were non-existent. The enemy was clearly marked, the battle field was fixed, the results of the battle was visible, and it occurred not at computational speed but instead in a pace that allowed human leadership to act. Traditional military thinking does not support decisive action in a future nation state cyber conflict. The utility of cyber attacks is dependent on the institutional design of the targeted society. Strategic cyberwar theory utilizes ‘Occam’s Razor’ to …


Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell Sep 2015

Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell

Professor Katina Michael

What's your strategy for keeping all the passwords in your life both readily available and secure? Do you replace letters with numbers in words you won't forget? Do you cycle through days of the week? Months of the year? Seasons? Pets you once had? What if it was possible to live in a world without passwords? There are many new ways to verify your identity that don't require passwords: wearables, tokens, epidermal electronic, implantables and biometrics. So what might our lives look like without passwords? And is that reality even desirable?


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Are We Ready To Live In An Uberveillance Society?, Uow Media Unit, Alexander Hayes, Katina Michael Jun 2015

Are We Ready To Live In An Uberveillance Society?, Uow Media Unit, Alexander Hayes, Katina Michael

Alexander Hayes Mr.

When Google Glass hits stores later this year, not only will it transform sunglasses from fashion accessory to wearable technology, it will cause a social revolution, says IEEE Technology & Society Magazine editor in chief, Associate Professor Katina Michael.

The Sci-Fi-looking, internet-connected eyewear can do everything a mobile phone can do (and more) with a simple voice command.

Beyond the obvious functions – snapping photos, recording video, send text messages and searching the internet – some of the most exciting uses include biofeedback (monitor your heart rate on your morning run), instruction (stream step-by-step video tutorials) and navigation (map out …


The Packbots Are Coming, Katina Michael, M.G. Michael Jun 2014

The Packbots Are Coming, Katina Michael, M.G. Michael

Professor Katina Michael

High-tech robots called PackBots will be unleashed during the 2014 FIFA World Cup in Brazil to help boost security and examine suspicious objects. The Brazilian government purportedly spent US$7.2 million to buy 30 military-grade robots from designers iRobot that will police the stadiums throughout Brazil’s 12 host cities during soccer matches. PackBot is a hunk of metal with an extendable arm and tactile claw, jam-packed on-board sensors and a computer with overheat protection, nine high-resolution cameras and lasers and two-way audio. But is it overkill to implement wartime robots to a sporting event?


Why The Cyber Bill Matters, Jan Kallberg Jun 2014

Why The Cyber Bill Matters, Jan Kallberg

Jan Kallberg

The separation between private sphere and the federal government matters more than we might think. The bill will create a funnel for industries, enterprises, local government, and state agencies to share information with the federal government. The bill separates the federal government and these other entities – by a traditional but validated approach – by the surrender to federal government for protection by bargaining away the “right” to self-protection. It is important because the federal government will maintain its legitimacy and authority over defending the nation – and by doing so we avoid a chaotic cyber environment where everyone is …


Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk Jul 2013

Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk

Jan Kallberg

Key in the critique of the likelihood of cyber conflict has been the assumption that cyber does not lead to long-term and irrevocable effects – therefore it cannot be fought as a war. This might be true if cyber attacks are constrained to specific functions of a computer system or set of client computers, however, a failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences and risks. The environmental aspect of cyberdefense has not drawn attention as a national security matter. We all, as people, react to threats to our living space and natural environment. …


Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston Jan 2013

Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston

Professor Katina Michael

Australia's national emergency warning system alerts. Radio program in Greek.


Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes Jan 2013

Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes

Professor Katina Michael

Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


Implementing An Architectural Framework To Define And Deliver Net-Centric Capability To Legacy Military Air Assets Operating Within A System Of Systems, Mark S. Anderson, S. M. Martin, Cihan H. Dagli, Ann K. Miller Jan 2008

Implementing An Architectural Framework To Define And Deliver Net-Centric Capability To Legacy Military Air Assets Operating Within A System Of Systems, Mark S. Anderson, S. M. Martin, Cihan H. Dagli, Ann K. Miller

Engineering Management and Systems Engineering Faculty Research & Creative Works

The United States Air Force (USAF) is implementing an integrated net-centric system of systems for airborne operations in support of the global war on terror (GWOT). The GWOT demands that a successful architecture framework transforms and delivers net-centric assets to the war-fighter in a timely manner. A critical component of this implementation is the transformation of legacy strategic air platforms into net-centric air power assets operating within a system of systems. The System Architectural (SA) framework, and the Department of Defense Architectural Framework (DoDAF) are ways of managing complexity and organizing information within a system of systems network. This paper …


Trends. Nuclear Power Plants And Homeland Security And Defense: The Views Of Representative Markey, Ibpp Editor Mar 2002

Trends. Nuclear Power Plants And Homeland Security And Defense: The Views Of Representative Markey, Ibpp Editor

International Bulletin of Political Psychology

The author discusses US Representative Edward J. Markey, and his public discourse about the "safety and security of the nuclear power industry.