Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2,706 Full-Text Articles 1,929 Authors 777,753 Downloads 110 Institutions

All Articles in Defense and Security Studies

Faceted Search

2,706 full-text articles. Page 1 of 113.

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth 2018 Technology Research Centre, DPG

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang 2018 Embry-Riddle Aeronautical University

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua MacMonagle 2018 East Central University, Ada Oklahoma

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D 2018 GJ Software Forensics

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang 2018 Purdue University

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac 2018 University of Texas at San Antonio

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik 2018 Sam Houston State University

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Human Trafficking: Flying Under The Radar, Amber L. Hulsey 2018 Middle Tennessee Sate University

Human Trafficking: Flying Under The Radar, Amber L. Hulsey

Dissertations

The global hegemon, the United States encompasses roughly 57,000 to 63,000 of the roughly 45.8 million slaves present across the world today (Walk Free Foundation 2016a). This dissertation research uses the theoretical lens of Human Security as a unique approach in that it is people-centered, focusing on the individual, rather than the more traditional theories in international relations that emphasize the state as the central actor. This dissertation focuses on the understudied area of human trafficking into and within the United States. More specifically, the objective of this research examines the movement of trafficked persons via air ...


Safety In Sanctuaries: A Threat Assessment Of Omaha Churches, Matthew Spicka 2018 University of Nebraska at Omaha

Safety In Sanctuaries: A Threat Assessment Of Omaha Churches, Matthew Spicka

Theses/Capstones/Creative Projects

Churches are a soft target for people with malicious intentions. They are filled with a large amount of people, including large groups of children and elderly folk. Religions also encourage people to be friendlier towards outsiders, which could result in the church goers lowering their defenses and being more vulnerable to attacks. Church security teams are also primarily composed of volunteers, which means there is limited experience in security protocol and that could lead to limited incentive to perform security tasks thoroughly. Churches are a crucial part of the spiritual wellness of a community. All these factors make churches a ...


The Controversial F-35 Joint Strike Fighter: America's Most Expensive Weapons System And Its Global Impact, Bert Chapman 2018 Purdue University

The Controversial F-35 Joint Strike Fighter: America's Most Expensive Weapons System And Its Global Impact, Bert Chapman

Libraries Faculty and Staff Creative Materials

Provides an overview on the F-35 Joint Strike Fighter (JSF) program involving the U.S. and many allied countries. Describes the costs of this program, the technical problems it has experienced, its economic impact on the U.S. and allied countries, the JSF's operational capabilities, potential combat scenarios in which it could be used, and the campaign finance impact aerospace companies and unions have in the electoral process.


The Dilemma Of Responsibility To Protect In The Great Lakes Region, Ruth B. Aluoch 2018 King's College London; International Peace Support Training Centre-Karen

The Dilemma Of Responsibility To Protect In The Great Lakes Region, Ruth B. Aluoch

Journal of African Conflicts and Peace Studies

This paper examines the underlying complexities that constitute a dilemma for the responsibility to protect in Africa most specifically the Great Lakes Region. I argue that clarifying the meaning and intention of the doctrine in any given context is predicated on understanding the distinct and complex environment in which the doctrine is invoked. These complexities and their differentiation on a case by case basis construe the doctrine as progressive; with political, legal and moral significance making it fit for its purpose. On the other hand the variation of prevention and protection amounts to the denunciation of it as being selective ...


Boko Haram's Covert Front, Akali Omeni 2018 None

Boko Haram's Covert Front, Akali Omeni

Journal of African Conflicts and Peace Studies

Waging a highly irregular war — an insurgency — in Northeast Nigeria since September 2010, Boko Haram over the years has escalated as a threat form. By 2014, this threat extended beyond Nigeria’s borders; and by 2017, thousands of people had become casualties of the conflict; with millions displaced in Northeast Nigeria. Boko Haram however did not necessarily achieve this threat escalation by fighting and defeating the Nigerian military on the battlefield. A large part of Boko Haram’s calculations, rather, have been focused on its covert front and on war avoidance altogether. Indeed, covert tactics have been the main vehicle ...


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo 2018 Department of Physics, University of Nairobi, Kenya

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework ...


A Question Of Triumph: Effectively Measuring The Success Of Intelligence Against Terrorism, Whitney W. Gibbs 2018 University of North Georgia

A Question Of Triumph: Effectively Measuring The Success Of Intelligence Against Terrorism, Whitney W. Gibbs

International Social Science Review

As intelligence programs continue to be expanded in order to combat the growing threat of terrorism seen around the globe, many critics have questioned whether the success of intelligence against terrorism can be effectively measured. Through the implementation of the United States PATRIOT Act and the mass data collection programs which it created, intelligence programs have gained access to the private interactions and intentions of government officials, civilians, and businesses, foreign and domestic, while terror acts continue to occur on a, seemingly, daily basis. This article seeks to show how the success of intelligence against terrorism can, in fact, be ...


The Operational And Administrative Militaries, Mark P. Nevitt 2018 University of Pennsylvania Law School

The Operational And Administrative Militaries, Mark P. Nevitt

Faculty Scholarship

This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the ...


The Personality Profile Of North Korean Supreme Leader Kim Jong Un, Aubrey Immelman 2018 St. John's University / College of St. Benedict

The Personality Profile Of North Korean Supreme Leader Kim Jong Un, Aubrey Immelman

Psychology Faculty Publications

This working paper presents the results of an indirect assessment of the personality of Kim Jong-un, supreme leader of the Democratic People’s Republic of Korea, conducted 2013–2018 from the conceptual perspective of personologist Theodore Millon.

Psychodiagnostically relevant data about Kim was collected from open-source media reports and synthesized into a personality profile using the Millon Inventory of Diagnostic Criteria (MIDC), which yields 34 normal and maladaptive personality classifications congruent with DSM–III–R, DSM–IV, and DSM–5.

The personality profile yielded by the MIDC was analyzed in accordance with interpretive guidelines provided in the MIDC and Millon ...


Legacies Of War: How The Commercialization Of Plastics In The United States Contribute To Cycles Of Violence, Karis Johnston 2018 SIT Graduate Institute

Legacies Of War: How The Commercialization Of Plastics In The United States Contribute To Cycles Of Violence, Karis Johnston

Capstone Collection

Plastic manufacturing practices developed and justified during World War II transitioned into the commercial space, entered our homes, and became part of everyday life. This proliferation was due in large part to the consolidation of manufacturing processes organized and subsidized by government contracts and the plastics industry leaders’ marketing dynamism. Plastics are in the cars we drive, the way we package our food, and are invaluable throughout the medical field. Moreover, the use of plastics has tangible environmental and health ramifications. The plastics industry and consumption patterns in the United States contribute significantly to hydrocarbon emissions, ecological violence, and the ...


Us Advocacy For Azerbaijani Press Freedom And Democracy, Danny Burns 2018 SIT Graduate Institute

Us Advocacy For Azerbaijani Press Freedom And Democracy, Danny Burns

Capstone Collection

This study sought to determine best practices for policy advocates who promote press freedom, freedom of expression, and democracy in Azerbaijan to influence policymakers in the United States of America. Results from other studies, the literature on the topics of Azerbaijan and policy advocacy, and expert interviews were used for this study. Its goal is to increase the amount of influence the average policy advocate has in the US by analyzing current advocates' experiences and synthesizing concrete suggestions for actions to effectively enact desired policy changes. The interviews and literature clearly support the premise that the regime in Azerbaijan is ...


Maritime Governance: How State Capacity Impacts Piracy And Sea Lane Security, Yuito Ishikawa 2018 College of William and Mary

Maritime Governance: How State Capacity Impacts Piracy And Sea Lane Security, Yuito Ishikawa

Undergraduate Honors Theses

Maritime piracy varies from place to place and from age to age. This thesis aims to explain the variation of piracy across time and space by exploring the capability of establishing maritime governance against piracy. The spatial variation in the number of piratical attacks is explained by calculating the state capacity for governing the surrounding seas called Sea Power Index. The thesis argues that pirates particularly target waters near a state with “medium” levels of sea power because such states are not capable of enforcing strict regulations on piracy but can provide enough infrastructure and economy for pirates to have ...


Digital Commons powered by bepress