Seditious Conspiracy Charges In The American Terrorism Study (Ats),
2022
University of Arkansas, Fayetteville
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Research Projects
In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.
To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av,
2022
Bachelor of Information Security, MEPhI; Moscow, Russia
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties,
2022
Montclair State University
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Human-Controlled Fuzzing With Afl,
2022
Bachelor of Information Security, MEPhI; Moscow, Russia
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study,
2022
University of New Haven
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Timestamp Estimation From Outdoor Scenes,
2022
Department of Computer Information Technology, Purdue University
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Annual ADFSL Conference on Digital Forensics, Security and Law
The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics,
2022
Purdue University
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud,
2022
Purdue University
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices,
2022
Purdue University
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
A Lightweight Reliably Quantified Deepfake Detection Approach,
2022
The University of Hong Kong, Department of Computer Science
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective,
2022
Edith Cowan University
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation,
2022
School of Science, Edith Cowan University
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Gift Baskets For South Asia: Nuclear Risk Reduction And Crisis Management,
2022
Atlantic Council
Gift Baskets For South Asia: Nuclear Risk Reduction And Crisis Management, Amber Jamil, Megan Goyette
International Journal of Nuclear Security
Gift Basket diplomacy is an interest-based approach to negotiation that encourages voluntary commitments as incentives for cooperation. International diplomats used this approach during the Nuclear Security Summits (NSS), and it is the new standard for international cooperation. This model was successfully replicated in climate talks and led to a global effort to combat climate change. The use of house presents, and gift baskets encourages leadership and team building, to excel beyond intractable consensus-based stalemates. The Gift Basket Diplomacy model may reduce South Asia’s nuclear risk and enhance crisis management by increasing diplomatic efforts during regional party talks and cooperative engagements, …
Delegating Climate Authorities,
2022
Emory University School of Law
Delegating Climate Authorities, Mark P. Nevitt
Faculty Articles
The science is clear: the United States and the world must take dramatic action to address climate change or face irreversible, catastrophic planetary harm. Within the U.S.—the world’s largest historic emitter of greenhouse gas emissions—this will require passing new legislation or turning to existing statutes and authorities to address the climate crisis. Doing so implicates existing and prospective delegations of legislative authority to a large swath of administrative agencies. Yet congressional climate decision-making delegations to any executive branch agency must not dismiss the newly resurgent nondelegation doctrine. Described by some scholars as the “most dangerous idea in American law,” the …
The São Paulo Forum’S Armed Forces Agenda: Examining Venezuela And Brazil,
2022
Missouri State University
The São Paulo Forum’S Armed Forces Agenda: Examining Venezuela And Brazil, David J. Guenni Bravo
MSU Graduate Theses
The São Paulo Forum (SPF) is a resilient ideological alliance that provides extremist public policy recommendations to formal political parties, social movements, and insurgent groups throughout the Western Hemisphere. Based on substantial evidence, this research project asserts that the SPF has successfully influenced the national security and defense policies of states in the Latin America & Caribbean (LAC) region. Analysis of two significant cases in South America shows that, after being elected to high office, SPF affiliates and their political parties/platforms sought transformation of their countries’ national security and defense sectors to conform to SPF positions. Given its extensive influence …
Analysis Of Non-Conventional Radiological Terrorism,
2022
Virginia Commonwealth University
Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett
Theses and Dissertations
Nuclear terrorism has been a risk since the dawn of the first atomic bomb. Though state sponsored nuclear weapons development is of concern for countries, non-state sponsored terrorism with radiological material can be of even greater concern. This stems from the fact that the material is under less stringent or no safeguards and can readily change hands between different terrorist groups or innocent civilians may accidently come into contact with the material.
Within this paper an analysis of previous accidents using orphan radiological sources, malicious use of orphan radiological sources, and how these sources could be used by terrorists is …
Us Strategic Culture, Homeland Ballistic Missile Defense, And Mutual Vulnerability,
2022
Missouri State University
Us Strategic Culture, Homeland Ballistic Missile Defense, And Mutual Vulnerability, Jacob T. Blank
MSU Graduate Theses
Strategic scholars have long understood the indispensable linkage between culture and security policymaking. By shaping the perceptions through which decision-makers formulate security policy, strategic culture analysis adds vital context to the perilously difficult science of understanding and predicting state security outputs. One area where this analytical framework fails to generate the expected result is American missile defense policy. Salient themes of US strategic culture, including an optimistic and problem-solving mindset, positive role of machines, and ahistorical exceptionalism, are reflected in the American way of war – a technologically driven, leadership casualty averse, moralistic, apolitical, and firepower focused enterprise. These factors …
Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters,
2022
Wilfrid Laurier University
Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight
Theses and Dissertations (Comprehensive)
In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …
The Strategic Use Of External Threat In The Shaping Of Russian Domestic And Foreign Policies,
2022
CUNY City College
The Strategic Use Of External Threat In The Shaping Of Russian Domestic And Foreign Policies, Roman Voytovych
Dissertations and Theses
The state of Russia has experienced multiple shifts during various phases of its development and, along with that, it has influenced the world of international diplomacy on a grand scale. From being the world`s second superpower with huge military and political capabilities to becoming a disintegrated regional power, there definitely has been a certain degree of change which has impacted both the Russian political establishment as well as ordinary people. The slow process of the degradation of the “big empire” actually had its roots during Soviet times when the Soviet Union faced the Chernobyl catastrophe, the war in Afghanistan, the …
A Program Evaluation Of The Town Of Woodside, Plumas County Fire Safe Council, And Mountain Communities’ Fire Safe Council Defensible Space Projects,
2022
San Jose State University
A Program Evaluation Of The Town Of Woodside, Plumas County Fire Safe Council, And Mountain Communities’ Fire Safe Council Defensible Space Projects, Mandeep Gill
Master's Projects
California is one of the most fire-prone regions in the world, with every passing year becoming more hazardous. With a tremendous amount of loss and damage occurring every year due to wildfires, property owners must prepare their homes and structures to withstand fires as much as possible. The best way to achieve this is by building and retrofitting homes with fire-resistant materials and creating defensible space around the property (Cal Fire, n.d.). Although it is the best way to protect one’s property, it is often times difficult for property owners to do so because of financial or physical limitations, or …