Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,830 Full-Text Articles 2,126 Authors 777,753 Downloads 120 Institutions

All Articles in Defense and Security Studies

Faceted Search

3,830 full-text articles. Page 4 of 117.

International Energy Geopolitics, Bert Chapman 2018 Purdue University

International Energy Geopolitics, Bert Chapman

Libraries Faculty and Staff Presentations

Overview of international energy geopolitical trends. Emphasizes the importance of the Persian Gulf, South China Sea, East China Sea, Russia, and the Arctic to U.S. and international economic and strategic developments. Stresses the continuing importance of fossil fuels in domestic and international energy consumption, the variety of energy sources being used by various global regions, the potential for military conflict over access to natural resources, and how emerging energy leaders will determine global energy, environmental, and international security developments.


Winning The Disinformation War: Suturing The Soul, Editor 2018 Embry-Riddle Aeronautical University

Winning The Disinformation War: Suturing The Soul, Editor

International Bulletin of Political Psychology

In a world of false facts and fake news, what is the crucial psychology underlying what people believe?


Conducting Nuclear Security Culture Self-Assessments In Nuclear Research Facilities Using The Iaea Methodology, Anhar Riza Antariksawan, Khairul Khairul, Heru Umbara, Endang Kristuti, Bayu Purnomo 2018 National Nuclear Energy Agency of Indonesia (BATAN)

Conducting Nuclear Security Culture Self-Assessments In Nuclear Research Facilities Using The Iaea Methodology, Anhar Riza Antariksawan, Khairul Khairul, Heru Umbara, Endang Kristuti, Bayu Purnomo

International Journal of Nuclear Security

The National Nuclear Energy Agency of Indonesia (BATAN) has promoted the culture and assessment of nuclear security in Indonesia since 2010. After conducting a successful trial assessment in 2012, BATAN performed a second self-assessment in 2015 in three nuclear facilities. The assessment's methodology followed the guidelines set by the International Atomic Energy Agency (IAEA). The objective of this paper is to demonstrate the techniques used in applying the IAEA methodology and to discuss the primary outcomes of the assessment. The data collection consisted of surveys, interviews, document reviews, and observations. A total of about 50% of the three facilities ...


Enhancing Your Intelligence Agency Information Resource Iq: Pt. 2: The Central Intelligence Agency, Bert Chapman 2018 Purdue University

Enhancing Your Intelligence Agency Information Resource Iq: Pt. 2: The Central Intelligence Agency, Bert Chapman

Libraries Faculty and Staff Presentations

Provides an overview of information resources produced by the Central Intelligence Agency (CIA) including popular reference works like World Factbook and Chiefs of State and Cabinet Leaders of Foreign Governments. Additional content describes the CIA's origins and development, descriptions of current organizational components, information about it's directors, and the text of historical National Intelligence Estimates (NIE) and the President's Daily Brief covering topics as varied as North Korea, the 1973 Yom Kippur War, and NIE's on Soviet ballistic missile forces and numerous other topics. Features artifacts from the CIA Museum.


The Leadership Style Of North Korean Supreme Leader Kim Jong Un, Aubrey Immelman 2018 St. John's University / College of St. Benedict

The Leadership Style Of North Korean Supreme Leader Kim Jong Un, Aubrey Immelman

Psychology Faculty Publications

This working paper presents a personality-based analysis of the likely leadership style of Chairman Kim Jong-un, supreme leader of the Democratic People’s Republic of Korea, in negotiations with U.S. president Donald Trump, inferred from the results of indirect personality assessments conducted 2013–2018 from the conceptual perspective of personologist Theodore Millon.

Kim’s primary personality patterns were found to be Outgoing/gregarious and Dominant/controlling, supplemented by secondary Accommodating/cooperative, Ambitious/confident, and Dauntless/adventurous features.

Outgoing individuals are dramatic attention‑getters who thrive on being the center of social events, go out of their way to be ...


Will The Trump-Kim Meeting Go Nuclear? The Role Of First Impressions, Editor 2018 Embry-Riddle Aeronautical University

Will The Trump-Kim Meeting Go Nuclear? The Role Of First Impressions, Editor

International Bulletin of Political Psychology

How might the upcoming meeting of U.S. President Donald Trump and D.R.N.K Kim Jong-un be affected by their first impressions of each other? This article describes some findings and implications of relevant psychological research.


Management Of Residual Explosive Remnants Of War In Cambodia Report, GICHD . 2018 James Madison University

Management Of Residual Explosive Remnants Of War In Cambodia Report, Gichd .

Global CWD Repository

In post-conflict countries, there will always be some risk from residual ERW threats when construction is undertaken, as witnessed by ongoing efforts to manage risk from UXO in Europe. Investing in Infrastructure (3i)6 is a development project funded by Australia’s Department of Foreign Affairs and Trade (DFAT) and managed by Palladium International, to provide support for the development of small-scale infrastructure in Cambodia. It is a private-public partnership that seeks to incentivise the Cambodian private sector in the provision of such infrastructure, through the provision of “output-based grants, currently for the provision of electricity and drinking water networks ...


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Security Dilemma In U.S.-China Relations: A Non-Traditional Security Studies Perspective, Jessica Tran 2018 University of San Francisco

Security Dilemma In U.S.-China Relations: A Non-Traditional Security Studies Perspective, Jessica Tran

Master's Theses

Since Former President Barack Obama’s announcement of the Pacific Pivot in 2011, the security dilemma in U.S.-China relations have worsened considerably. Under President Donald Trump’s administration, the shifting of U.S. military focus to the Asia-Pacific region is expected to continue. As the U.S. moves forward with increasing its military presence in the Pacific to counter a perceived “aggressive” China, it may lead to serious consequences. This thesis presents the argument that China’s conception of national security includes the defense of the state from both foreign and domestic threats. Therefore, China’s military developments ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth 2018 Technology Research Centre, DPG

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang 2018 Embry-Riddle Aeronautical University

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua MacMonagle 2018 East Central University, Ada Oklahoma

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


'Geaux Guard' And The Shift To The All-Volunteer Force: The Economics Of The Louisiana Army National Guard, 1973-1991, Titus L. Firmin 2018 University of New Orleans

'Geaux Guard' And The Shift To The All-Volunteer Force: The Economics Of The Louisiana Army National Guard, 1973-1991, Titus L. Firmin

University of New Orleans Theses and Dissertations

After the Vietnam War, increased defense funds assigned to the Army National Guard stimulated and supported small communities in Louisiana. Recruits from economically depressed regions lined up to join the Guard because of the competitive pay and the generous education benefits it offered. In the mid-1980s, when a state budgetary shortfall threatened to limit the stream of federal funds and close local armories, communities in Louisiana rallied to keep the doors of their armories open. This paper examines how the readiness efforts of the Louisiana Army National Guard affected the economies of small communities as defense dollars increased following the ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D 2018 GJ Software Forensics

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang 2018 Purdue University

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac 2018 University of Texas at San Antonio

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik 2018 Sam Houston State University

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Human Trafficking: Flying Under The Radar, Amber L. Hulsey 2018 Middle Tennessee Sate University

Human Trafficking: Flying Under The Radar, Amber L. Hulsey

Dissertations

The global hegemon, the United States encompasses roughly 57,000 to 63,000 of the roughly 45.8 million slaves present across the world today (Walk Free Foundation 2016a). This dissertation research uses the theoretical lens of Human Security as a unique approach in that it is people-centered, focusing on the individual, rather than the more traditional theories in international relations that emphasize the state as the central actor. This dissertation focuses on the understudied area of human trafficking into and within the United States. More specifically, the objective of this research examines the movement of trafficked persons via air ...


Digital Commons powered by bepress