Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1713 Full-Text Articles 1475 Authors 677665 Downloads 106 Institutions

All Articles in National Security Law

Faceted Search

1713 full-text articles. Page 5 of 57.

Recent Decision: Constitutional Law - Restriction Of American Citizens’ Right Of Access To Information And Ideas In The Court Of Government Control Of Immigration Is Not Unconstitutional When Supported By A Facially Legitimate Reason, W. P. Bishop, Joseph C. Vanzant 2016 University of Georgia School of Law

Recent Decision: Constitutional Law - Restriction Of American Citizens’ Right Of Access To Information And Ideas In The Court Of Government Control Of Immigration Is Not Unconstitutional When Supported By A Facially Legitimate Reason, W. P. Bishop, Joseph C. Vanzant

Georgia Journal of International & Comparative Law

No abstract provided.


Comment: Blocked Assets And Private Claims: The Initial Barriers To Trade Negotiations Between The United States And China, John J. Fitzpatrick Jr., Toby B. Prodgers 2016 University of Georgia School of Law

Comment: Blocked Assets And Private Claims: The Initial Barriers To Trade Negotiations Between The United States And China, John J. Fitzpatrick Jr., Toby B. Prodgers

Georgia Journal of International & Comparative Law

No abstract provided.


Terrorism: The Proposed United States Draft Convention, William T. Bennett 2016 University of Georgia School of Law

Terrorism: The Proposed United States Draft Convention, William T. Bennett

Georgia Journal of International & Comparative Law

No abstract provided.


Application Of The Law Of War To Internal Conflicts, James E. Bond 2016 Washington & Lee School of Law

Application Of The Law Of War To Internal Conflicts, James E. Bond

Georgia Journal of International & Comparative Law

No abstract provided.


Complexity Analysis: A Preliminary Step Toward A General Systems Theory Of International Law, James L. Hildebrand 2016 Harvard Law School

Complexity Analysis: A Preliminary Step Toward A General Systems Theory Of International Law, James L. Hildebrand

Georgia Journal of International & Comparative Law

No abstract provided.


Erdos V. United States: Expansion Of Extraterritoriality And Revival Of Exterritoriality, Gary I. Strausberg 2016 George Washington University

Erdos V. United States: Expansion Of Extraterritoriality And Revival Of Exterritoriality, Gary I. Strausberg

Georgia Journal of International & Comparative Law

No abstract provided.


The One Exhibition The Roots Of The Lgbt Equality Movement One Magazine & The First Gay Supreme Court Case In U.S. History 1943-1958, Joshua R. Edmundson 2016 California State University - San Bernardino

The One Exhibition The Roots Of The Lgbt Equality Movement One Magazine & The First Gay Supreme Court Case In U.S. History 1943-1958, Joshua R. Edmundson

Electronic Theses, Projects, and Dissertations

The ONE Exhibition explores an era in American history marked by intense government sponsored anti-gay persecution and the genesis of the LGBT equality movement. The study begins during World War II, continues through the McCarthy era and the founding of the nation’s first gay magazine, and ends in 1958 with the first gay Supreme Court case in U.S. history.

Central to the story is ONE The Homosexual Magazine, and its founders, as they embarked on a quest for LGBT equality by establishing the first ongoing nationwide forum for gay people in the U.S., and challenged the government ...


Terrorism, Defensive Torture And The Crisis In International Rights Law, R. Mary Hayden Lemmons 2016 University of St. Thomas, Minnesota

Terrorism, Defensive Torture And The Crisis In International Rights Law, R. Mary Hayden Lemmons

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Jaded No More: Renewing Moral Idealism In Nation-Building And Global Affairs, Robert Osburn 2016 University of St. Thomas, Minnesota

Jaded No More: Renewing Moral Idealism In Nation-Building And Global Affairs, Robert Osburn

University of St. Thomas Journal of Law and Public Policy

No abstract provided.


Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman 2016 PayPal Inc.

Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman

Annual Conference on Digital Forensics, Security and Law

Phishing has become one of the most recognized words associated with cybercrime. As more organizations are being targeted by phishing campaigns, there are more options within the industry to deter such attacks. However, there is little research into how much damage these campaigns are causing organizations. This paper will show how financial organizations can be impacted by phishing and present a method for accurately quantifying resultant monetary losses. The methodology presented in this paper can be adapted to other organizations in order to quantify phishing losses across industries.

Keywords: phishing, cybercrime, economics


Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar AlFandi 2016 Zayed University, College of Technological Innovation

Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi

Annual Conference on Digital Forensics, Security and Law

With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in ...


Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu 2016 REU Student Fellow, Department of Biological Science, Morton College

Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu

Annual Conference on Digital Forensics, Security and Law

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the ...


Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian 2016 Department of Computer Science and Information Systems, Mike Cottrell College of Business

Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian

Annual Conference on Digital Forensics, Security and Law

Web browser vendors offer a portable web browser option which is considered as one of the features that provides user privacy. Portable web browser is a browser that can be launched from a USB flash drive without the need for its installation on the host machine. Most popular web browsers have portable versions of their browsers as well. Portable web browsing poses a great challenge to computer forensic investigators who try to reconstruct the past browsing history, in case of any computer incidence. This research examines various sources in the host machine such as physical memory, temporary, recent, event files ...


Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky 2016 University of Nebraska at Kearney

Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky

Annual Conference on Digital Forensics, Security and Law

This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary files and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the ...


Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf 2016 Coventry University, School of Computing, Electronics and Maths

Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf

Annual Conference on Digital Forensics, Security and Law

Smartphone and tablets are personal devices that have diffused to near universal ubiquity in recent years. As Smartphone users become more privacy-aware and -conscious, research is needed to understand how “leakage” of private information (personally identifiable information – PII) occurs. This study explores how leakage studies in Droid devices should be adapted to Apple iOS devices. The OWASP Zed Attack Proxy (ZAP) is examined for 50 apps in various categories. This study confirms that: (1) most apps transmit unencrypted sensitive PII, (2) SSL is used by some recipient websites, but without corresponding app compliance with SSL, and (3) most apps in ...


Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker 2016 Coventry University, School of Computing, Electronics and Maths

Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker

Annual Conference on Digital Forensics, Security and Law

exploit smartphone operating systems has exponentially expanded. Android has become the main target to exploit due to having the largest install base amongst the smartphone operating systems and owing to the open access nature in which application installations are permitted. Many Android users are unaware of the risks associated with a malware infection and to what level current malware scanners protect them. This paper tests how efficient the currently available malware scanners are. To achieve this, ten representative Android security products were selected and tested against a set of 5,560 known and categorized Android malware samples. The tests were ...


Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White 2016 George Mason University, Fairfax, Virginia, United States

Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White

Annual Conference on Digital Forensics, Security and Law

In this paper, we present an approach and experimental results to suggest the past presence of an application after the application has been uninstalled and the system has remained in use. Current techniques rely on the recovery of intact artifacts and traces, e.g., whole files, Windows Registry entries, or log file entries, while our approach requires no intact artifact recovery and leverages trace evidence in the form of residual partial files. In the case of recently uninstalled applications or an instrumented infrastructure, artifacts and traces may be intact and complete. In most cases, however, digital artifacts and traces are ...


One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown 2016 Embry-Riddle Aeronautical University, Daytona Beach, FL

One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown

Annual Conference on Digital Forensics, Security and Law

In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.

Keywords ...


Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio 2016 Department of Computer and Information Technology, Purdue University

Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio

Annual Conference on Digital Forensics, Security and Law

Covert channels are any communication channel that can be exploited to transfer information in a manner that violates the system’s security policy. Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite have been susceptible to covert channels, which could be exploited to leak data or be used for anonymous communications. With the introduction of IPv6, researchers are acutely aware that many vulnerabilities of IPv4 have been remediated in IPv6. However, a proof of concept covert channel system was demonstrated in 2006. A decade later, IPv6 and its related protocols have ...


Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley 2016 Faculty of Technology, De Montfort University

Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley

Annual Conference on Digital Forensics, Security and Law

Deciding on a suitable research methodology is challenging for researchers. In this paper, grounded theory is presented as a systematic and comprehensive qualitative methodology in the emergent field of digital forensics research. This paper applies grounded theory in a digital forensics research project undertaken to study how organisations build and manage digital forensics capabilities. This paper gives a step-by-step guideline to explain the procedures and techniques of using grounded theory in digital forensics research. The paper gives a detailed explanation of how the three grounded theory coding methods (open, axial, and selective coding) can be used in digital forensics research ...


Digital Commons powered by bepress