Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Law

PDF

University of South Florida

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 298

Full-Text Articles in Entire DC Network

Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese May 2024

Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese

Genocide Studies and Prevention: An International Journal

In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt Feb 2024

“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt

Genocide Studies and Prevention: An International Journal

This article exposes the political underpinnings of the term “genocide of the Soviet people,” introduced and actively promoted in Russia since 2019. By reclassifying mass crimes committed by the Nazis and their accomplices against the civilian population—specifically Slavic—as genocide, Russian courts effectively engage in adjudication of the history of the Second World War. In the process, genocide trials, ongoing in twenty-five Russian provinces and five occupied Ukrainian territories, present no new evidence or issue new indictments, thus fulfilling none of the objectives of a standard criminal investigation. The wording of the verdicts, and a comprehensive political project put in place …


Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu Jan 2024

Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu

Journal of African Conflicts and Peace Studies

The structure of the Nigerian police has overtime depicted a centralized composition that negate principles of power sharing in a federal system of government. The complexities and diverse nature of policing in Nigeria remains the bane to effective and virile administration and management of the organization. The office of the Commissioner of Police vis-à-vis those of State Governors spell contradictions in power configuration from both the Constitution and the Police Act. The enactment of vigilante services and neighbourhood watches by state governments are indicative of a failing security system especially at the component units of the Nigerian federation. The hinterlands …


The Quick And The Dead (And The Transported), Manushag N. Powell Dec 2023

The Quick And The Dead (And The Transported), Manushag N. Powell

ABO: Interactive Journal for Women in the Arts, 1640-1830

In most nations that still execute prisoners—including the U.S.—it is illegal to execute a pregnant person. In English common law, women have been permitted to “plead the belly” in one form or another since the 14th century, and this fact is sometimes misconstrued by anti-choice and forced-birth advocates as evidence of a long legal tradition of protection for the lives of fetuses. In fact, it is merely evidence of a long history of legal inconsistencies in the ways laws were applied and sentences carried out against women, for whom there were fewer options for clemency than for men. This …


Book Review: Kings, Conquerors, Psychopaths: From Alexander To Hitler To The Corporation, Tim Bakken Nov 2023

Book Review: Kings, Conquerors, Psychopaths: From Alexander To Hitler To The Corporation, Tim Bakken

Genocide Studies and Prevention: An International Journal

The book Kings, Conquerors, Psychopaths is a survey of a vast amount of human wrongdoing. It lays bare the motivations of aggressors who wish to subjugate nations or groups of people and corporate executives and government bureaucrats who make discretionary decisions that harm people. Along with cataloging mass killings by despots and soldiers, the book includes stories about Ponzi-schemers and the deaths of automobile drivers and passengers who were killed by vehicle defects known to the manufacturer. The book posits that “[p]owerful, elite forces are trying to force us backward toward a non-democratic state, one where power, wealth, and prerogative …


Organizing And Communicating Health: A Culture-Centered And Necrocapitalist Inquiry Of Groundwater Contamination In Rural West Bengal, Parameswari Mukherjee Jun 2023

Organizing And Communicating Health: A Culture-Centered And Necrocapitalist Inquiry Of Groundwater Contamination In Rural West Bengal, Parameswari Mukherjee

USF Tampa Graduate Theses and Dissertations

As a discursive point of praxis, this dissertation project seeks to record knowledge from below around the overlaps between health, water and health interventions emerging from rural communities located in North 24 Parganas and Purulia in West Bengal that are disproportionately impacted by water-insecurity. My dissertation also documents how multiple-stakeholders such as local NGOs, international NGOs, non-profits, and donor agencies organize access to safe water and health interventions for the water-insecure communities located in North 24 Parganas and Purulia. The integration of the CCA and necrocapitalism afford theoretical and methodological guidance in this dissertation to help document the localocentric stories …


Identity Boundaries Construction And Its Effects On Vulnerability In The Case Of A Historically Marginalized People (Hmp) In Rwanda: An Examination Of Their Access To Human Rights., Jean Baptiste Ndikubwimana, Kathleen A. Anangwe, Oriare Oriare Nyarwath, Mwimali Jack, Charles Mulinda Kabwete Jun 2023

Identity Boundaries Construction And Its Effects On Vulnerability In The Case Of A Historically Marginalized People (Hmp) In Rwanda: An Examination Of Their Access To Human Rights., Jean Baptiste Ndikubwimana, Kathleen A. Anangwe, Oriare Oriare Nyarwath, Mwimali Jack, Charles Mulinda Kabwete

Journal of African Conflicts and Peace Studies

This paper contextualises the vulnerability of a Historically Marginalized people (HMP) referred to as the Batwa to explain how their moral inferiority resulting from the constructed microaggressions and attitudinal prejudices, jeopardize their full enjoyment and appreciation of human rights. The dilemmas experienced by the Batwa in Rwanda have until recently received little theoretical and empirical attention thereby disregarding ontological and epistemological distinction. This paper contributes to this lacuna by reviewing colonial discourse of histories and hegemonies and investigating ethnic socio-cultural practices and other mythical tales. The foregoing indicates a genuine need for the application of human rights approach to recognize …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Land Use/Land Cover Uncertainty Analysis Using Hydrological Modeling In The Northern Watershed Of Lake Okeechobee, Andres Lora Santos Mar 2023

Land Use/Land Cover Uncertainty Analysis Using Hydrological Modeling In The Northern Watershed Of Lake Okeechobee, Andres Lora Santos

USF Tampa Graduate Theses and Dissertations

Over the past 150 years, Florida has undergone a major land-form transformation, transitioning from a natural to a primarily built environment. The state's population has grown exponentially, from less than 50,000 residents in the 1850s to approximately 22 million residents today. This population growth has led to significant changes in land use, including urbanization, mining, and agriculture. This trend is expected to continue, with projections indicating an increase in urbanization across the state. 2070 land use/land cover projections were used as input for the Watershed Assessment Model (WAM) to analyze the potential impact of these changes on flow, total nitrogen …


Round Table (Part 5): What’S Raphaël Lemkin Got To Do With Genocide Studies?, Douglas Irvin-Erickson Oct 2022

Round Table (Part 5): What’S Raphaël Lemkin Got To Do With Genocide Studies?, Douglas Irvin-Erickson

Genocide Studies and Prevention: An International Journal

No abstract provided.


Mass Violence, Environmental Harm, And The Limits Of Transitional Justice, Rachel Killean, Lauren Dempster Jul 2022

Mass Violence, Environmental Harm, And The Limits Of Transitional Justice, Rachel Killean, Lauren Dempster

Genocide Studies and Prevention: An International Journal

The relationship between the environment and mass violence is complex and multi-faceted. The effects of environmental degradation can destabilize societies and cause conflict. Attacks on the environment can harm targeted groups, and both mass violence and subsequent transitions can have harmful environmental legacies. Given this backdrop, it is notable that the field of transitional justice has paid relatively little attention to the intersections between mass violence and environmental degradation. This article interrogates this inattention and explores the limitations and possibilities of transitional justice as a means of addressing the environmental harms associated with mass violence. The article makes four key …


Death By A Thousand Cuts? Green Tech, Traditional Knowledge, And Genocide, Regina Menachery Paulose Jul 2022

Death By A Thousand Cuts? Green Tech, Traditional Knowledge, And Genocide, Regina Menachery Paulose

Genocide Studies and Prevention: An International Journal

Traditional Knowledge is a system of knowledge that is passed down through generations of Indigenous and Ethnic Minority Peoples throughout the world. A subset of Traditional Knowledge is Traditional Ecological Knowledge. These knowledge systems are incorporated throughout various international instruments and are considered vital to ways of life for Indigenous and Ethnic Minority Peoples. The author examines the elimination of Traditional Knowledge as a result of green technology. With discussions surrounding ways to obtain “net zero” in response to climate change, the author (re)introduces the notion that the irresponsible push for carbon zero technologies has a horrendous impact on the …


Book Review: Armed Conflict, Women And Climate Change, Shelly Clay-Robison Jul 2022

Book Review: Armed Conflict, Women And Climate Change, Shelly Clay-Robison

Genocide Studies and Prevention: An International Journal

No abstract provided.


Book Review: Postgenocide: Interdisciplinary Reflections On The Effects Of Genocide, Aldo Zammit Borda Jul 2022

Book Review: Postgenocide: Interdisciplinary Reflections On The Effects Of Genocide, Aldo Zammit Borda

Genocide Studies and Prevention: An International Journal

No abstract provided.


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work May 2022

Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work

Military Cyber Affairs

Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Dossier: The Stateless Rohingya—Practical Consequences Of Expulsion, Fiza Lee-Winter, Tonny Kirabira Oct 2021

Dossier: The Stateless Rohingya—Practical Consequences Of Expulsion, Fiza Lee-Winter, Tonny Kirabira

Genocide Studies and Prevention: An International Journal

The international community has been called upon to ramp up efforts to end statelessness and provided with a guiding framework of 10 Actions. This dossier presents the practical consequences of expulsion, both direct and indirect outcomes of collective violence, directed towards the Rohingyas. Touching upon the nexus between children's rights, human trafficking, and practical challenges associated on-the-ground, the dossier also discusses the imperative need for the Association of Southeast Asian Nations (ASEAN) states—collectively as a region—to take steps in fulfilling Action 7 of the Global Action Plan through the birth registration of Rohingya children as part of their existing efforts …


Quantitative Literacy And Guns, William Briggs Jul 2021

Quantitative Literacy And Guns, William Briggs

Numeracy

Briggs, William. 2017. How America Got Its Guns: A History of the Gun Violence Crisis; (Albuquerque, University of New Mexico Press). 352 pp. Paperback: ISBN 978-0-8263-5813-4. E-book ISBN 978-0-8263-5814-1.

Quantitative literacy and statistics are just two of many disciplines required to understand the problem of gun violence in America. However, it’s also useful to appreciate their limitations in an issue that is so complex.


The Facets Of Transitional Justice And 'Red Terror' Mass Trials Of Derg Officials In Post-1991 Ethiopia: Reassessing Its Achievements And Pitfalls, Kinkino Kia Legide Feb 2021

The Facets Of Transitional Justice And 'Red Terror' Mass Trials Of Derg Officials In Post-1991 Ethiopia: Reassessing Its Achievements And Pitfalls, Kinkino Kia Legide

Journal of African Conflicts and Peace Studies

At the end of the state perpetrated largescale violence, two important puzzling questions need to be addressed by post-conflict states. The first one chiefly concern how to ensure accountability or fight impunity, and the second is concerned with how to transform a society wrecked by prolonged conflicts into a durable peace in a non-violent means (Jarstad & Sisk, 2008). One such effort to deal with these questions was implementation of a transitional justice measures which evolved to encompass broader themes in addition to criminal accountability and it has shown a considerable relevance and expansion since the end of Cold War. …


Nutrition Risk And Validation Of An Hiv Disease-Specific Nutrition Screening Tool In Ghana, Lauri Wright, Maxwell Bisala Konlan, Laurene Boateng, James B. Epps Jan 2021

Nutrition Risk And Validation Of An Hiv Disease-Specific Nutrition Screening Tool In Ghana, Lauri Wright, Maxwell Bisala Konlan, Laurene Boateng, James B. Epps

Mental Health Law & Policy Faculty Publications

Objectives: The objectives of this study were to assess the nutritional status and the most commonly reported nutrition-related factors contributing to nutritional risk in people living with HIV/AIDS (PLWHA) in Ghana and the specificity and sensitivity of the Rapid Nutrition Screening for HIV disease tool (RNS-H) in this population.

Design: A cross-sectional design was utilised. Patients were screened for nutritional status during a one-week period by clinic nurses using the RNS-H. Results were compared with a comprehensive nutritional assessment by a dietitian.

Setting: The research was conducted in a public health clinic at the University of Ghana Hospital, Legon.

Subjects: …