Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5,509 Full-Text Articles 3,402 Authors 2,236,468 Downloads 144 Institutions

All Articles in Defense and Security Studies

Faceted Search

5,509 full-text articles. Page 7 of 182.

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik 2022 Purdue University

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik 2022 Purdue University

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow 2022 The University of Hong Kong, Department of Computer Science

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk 2022 Edith Cowan University

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang 2022 School of Science, Edith Cowan University

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia 2022 Montclair State University

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett 2022 Virginia Commonwealth University

Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett

Theses and Dissertations

Nuclear terrorism has been a risk since the dawn of the first atomic bomb. Though state sponsored nuclear weapons development is of concern for countries, non-state sponsored terrorism with radiological material can be of even greater concern. This stems from the fact that the material is under less stringent or no safeguards and can readily change hands between different terrorist groups or innocent civilians may accidently come into contact with the material.

Within this paper an analysis of previous accidents using orphan radiological sources, malicious use of orphan radiological sources, and how these sources could be used by terrorists is …


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight 2022 Wilfrid Laurier University

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


Gift Baskets For South Asia: Nuclear Risk Reduction And Crisis Management, Amber Jamil, Megan Goyette 2022 Atlantic Council

Gift Baskets For South Asia: Nuclear Risk Reduction And Crisis Management, Amber Jamil, Megan Goyette

International Journal of Nuclear Security

Gift Basket diplomacy is an interest-based approach to negotiation that encourages voluntary commitments as incentives for cooperation. International diplomats used this approach during the Nuclear Security Summits (NSS), and it is the new standard for international cooperation. This model was successfully replicated in climate talks and led to a global effort to combat climate change. The use of house presents, and gift baskets encourages leadership and team building, to excel beyond intractable consensus-based stalemates. The Gift Basket Diplomacy model may reduce South Asia’s nuclear risk and enhance crisis management by increasing diplomatic efforts during regional party talks and cooperative engagements, …


Us Strategic Culture, Homeland Ballistic Missile Defense, And Mutual Vulnerability, Jacob T. Blank 2022 Missouri State University

Us Strategic Culture, Homeland Ballistic Missile Defense, And Mutual Vulnerability, Jacob T. Blank

MSU Graduate Theses

Strategic scholars have long understood the indispensable linkage between culture and security policymaking. By shaping the perceptions through which decision-makers formulate security policy, strategic culture analysis adds vital context to the perilously difficult science of understanding and predicting state security outputs. One area where this analytical framework fails to generate the expected result is American missile defense policy. Salient themes of US strategic culture, including an optimistic and problem-solving mindset, positive role of machines, and ahistorical exceptionalism, are reflected in the American way of war – a technologically driven, leadership casualty averse, moralistic, apolitical, and firepower focused enterprise. These factors …


The São Paulo Forum’S Armed Forces Agenda: Examining Venezuela And Brazil, David J. Guenni Bravo 2022 Missouri State University

The São Paulo Forum’S Armed Forces Agenda: Examining Venezuela And Brazil, David J. Guenni Bravo

MSU Graduate Theses

The São Paulo Forum (SPF) is a resilient ideological alliance that provides extremist public policy recommendations to formal political parties, social movements, and insurgent groups throughout the Western Hemisphere. Based on substantial evidence, this research project asserts that the SPF has successfully influenced the national security and defense policies of states in the Latin America & Caribbean (LAC) region. Analysis of two significant cases in South America shows that, after being elected to high office, SPF affiliates and their political parties/platforms sought transformation of their countries’ national security and defense sectors to conform to SPF positions. Given its extensive influence …


A Program Evaluation Of The Town Of Woodside, Plumas County Fire Safe Council, And Mountain Communities’ Fire Safe Council Defensible Space Projects, Mandeep Gill 2022 San Jose State University

A Program Evaluation Of The Town Of Woodside, Plumas County Fire Safe Council, And Mountain Communities’ Fire Safe Council Defensible Space Projects, Mandeep Gill

Master's Projects

California is one of the most fire-prone regions in the world, with every passing year becoming more hazardous. With a tremendous amount of loss and damage occurring every year due to wildfires, property owners must prepare their homes and structures to withstand fires as much as possible. The best way to achieve this is by building and retrofitting homes with fire-resistant materials and creating defensible space around the property (Cal Fire, n.d.). Although it is the best way to protect one’s property, it is often times difficult for property owners to do so because of financial or physical limitations, or …


Delegating Climate Authorities, Mark P. Nevitt 2022 Emory University School of Law

Delegating Climate Authorities, Mark P. Nevitt

Faculty Articles

The science is clear: the United States and the world must take dramatic action to address climate change or face irreversible, catastrophic planetary harm. Within the U.S.—the world’s largest historic emitter of greenhouse gas emissions—this will require passing new legislation or turning to existing statutes and authorities to address the climate crisis. Doing so implicates existing and prospective delegations of legislative authority to a large swath of administrative agencies. Yet congressional climate decision-making delegations to any executive branch agency must not dismiss the newly resurgent nondelegation doctrine. Described by some scholars as the “most dangerous idea in American law,” the …


The Strategic Use Of External Threat In The Shaping Of Russian Domestic And Foreign Policies, Roman Voytovych 2022 CUNY City College

The Strategic Use Of External Threat In The Shaping Of Russian Domestic And Foreign Policies, Roman Voytovych

Dissertations and Theses

The state of Russia has experienced multiple shifts during various phases of its development and, along with that, it has influenced the world of international diplomacy on a grand scale. From being the world`s second superpower with huge military and political capabilities to becoming a disintegrated regional power, there definitely has been a certain degree of change which has impacted both the Russian political establishment as well as ordinary people. The slow process of the degradation of the “big empire” actually had its roots during Soviet times when the Soviet Union faced the Chernobyl catastrophe, the war in Afghanistan, the …


Change Management In The Irish Defence Forces During Technological Change, Paul Hegarty Lt Cdr 2021 Irish Defence Forces

Change Management In The Irish Defence Forces During Technological Change, Paul Hegarty Lt Cdr

Irish Business Journal

Extant literature fails to address change management in the military during technological change. Few researchers have examined how military organisations, undergo change and what, if any, processes do they use to manage this change. As such, whether change management processes are found to have a positive impact on military organisations or not, the extant literature in the sociology and military domains are being added to by the findings of this research.

The aim of this paper is to determine if the Irish Defence Forces would benefit from the introduction of change management processes when implementing new technological systems. The extant …


Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman 2021 Purdue University

Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."


Captivity As Crisis Response: Migration, The Pandemic, And Forms Of Confinement, Eleanor Paynter 2021 Cornell University

Captivity As Crisis Response: Migration, The Pandemic, And Forms Of Confinement, Eleanor Paynter

Conference: The Social Practice of Human Rights

During Europe’s recent “refugee crisis,” Italy responded to increased migrant arrivals by sea with progressively restrictive border and asylum policies. While crisis-response restrictions are perhaps unsurprising, those implemented since 2014 have produced a set of situations that appear, at least initially, paradoxical: Following Interior Minister Matteo Salvini’s 2018 “Closed Ports” campaign, independently-operated rescue ships continue to be blocked from disembarking the migrants they have rescued. At the same time, asylum officials have rejected claims for protection at higher rates, while border officials deport a minority of those whose claims are rejected. Thus, under the guise of crisis management, some migrants …


Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag 2021 Embry-Riddle Aeronautical University

Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag

Publications

COVID-19 response experience around the world has demonstrated that it is indispensable to understand the public understanding of, and needs during, risk, hazards, and crisis in public policy, in particular related to the security of society as a whole. The ultimate goal of homeland security and broader civil (or sometimes referred to as societal) security alike, as well as of related security science research, is to accomplish resilient societies through a culture of preparedness. Civic security culture is a necessary ingredient to such a culture of preparedness. The security culture perspective also helps understand how a resilient society and nation …


Improving Veteran Access; Status Of Operations Of The United States Department Of Veteran Affairs Work-Study Program, Kirk Allen 2021 California State University, San Bernardino

Improving Veteran Access; Status Of Operations Of The United States Department Of Veteran Affairs Work-Study Program, Kirk Allen

Electronic Theses, Projects, and Dissertations

The usage status of The U.S. Department Veterans Affairs Work-Study Program is examined. Beneficiary numbers from the Global, Unites States, State, and Local/County perspective are reviewed. While of essential value, the program suffers from a lack of scholarly research and government oversight, and is further hindered by restrictive administrative rules lived first-hand. Research suggests that the program is operating outside of accountability to the taxpayer, presents as unnecessarily/overly-restrictive in accessibility, and is underutilized. The program appears to not be serving all veterans to full potential.

The Work-Study Program is codified in Veterans Benefits', Title 38 United States Code, Part III, …


Islands In The Sun: Lawfare And Great-Power Competition In The Indo-Pacific, Clayton T. Russo 2021 Missouri State University

Islands In The Sun: Lawfare And Great-Power Competition In The Indo-Pacific, Clayton T. Russo

MSU Graduate Theses

This thesis examines the U.S.-Japan Mutual Defense Treaty and its future considering the recent developments in the international security environment. The 2018 National Defense Strategy brought back an emphasis on Great Power Competition, fundamentally transforming the role of U.S. alliances to address new challenges. In the 2021 budget, the Pacific Deterrence Initiative (PDI) has prioritized the People’s Republic of China as the number one pacing threat to theUnited States, drastically shifting international focus away from the Middle East and towards East Asia. In conjunction with funding new capabilities through the PDI, the U.S. will need to conceive new legal doctrines …


Digital Commons powered by bepress