Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work May 2022

Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work

Military Cyber Affairs

Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield Dec 2020

Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield

Military Cyber Affairs

Humans rely on machines in accomplishing missions while machines need humans to make them more intelligent and more powerful. Neither side can go without the other, especially in complex environments when autonomous mode is initiated. Things are becoming more complicated when law and ethical principles should be applied in these complex environments. One of the solutions is human-machine teaming, as it takes advantage of both the best humans can offer and the best that machines can provide. This article intends to explore ways of implementing law and ethical principles in artificial intelligence (AI) systems using human-machine teaming. It examines the …


Black Lives Matter In Engineering, Too! An Environmental Justice Approach Towards Equitable Decision-Making For Stormwater Management In African American Communities, Maya Elizabeth Carrasquillo Jul 2020

Black Lives Matter In Engineering, Too! An Environmental Justice Approach Towards Equitable Decision-Making For Stormwater Management In African American Communities, Maya Elizabeth Carrasquillo

USF Tampa Graduate Theses and Dissertations

The United States and the world have recently been challenged with the disparate effects of COVID-19 and the continual killings of unarmed Black men and women across the nation. A history of anti-black racism has led to systemic structures of inequity that thread throughout institutions and communities across the nation. This environmental engineering research comes at a time when understanding how to effectively engage in, and with Black communities is at the forefront of discourse in academia, utilities and private sector.

In 2018 the Brookings Institute published a report on workforce in the water sector demonstrating the lack of diversity …


Regulatory Methodology And Unmitigated Wetland Loss In Southwest Florida, Kathleen B. Castor Jun 2018

Regulatory Methodology And Unmitigated Wetland Loss In Southwest Florida, Kathleen B. Castor

USF Tampa Graduate Theses and Dissertations

This research used Geographical Information System (GIS) data to estimate the acreage of wetland loss due to small-scale activities (taking into account exempt, permitted, and unauthorized activities) in the Southwest District of the Department of Environmental Protection (DEP) between 2006 and 2011 and compared that net loss with the unmitigated wetland net loss that DEP documented during that time for authorized activities and violations that were discovered. The comparison allowed an estimation of the extent of undocumented small-scale unmitigated wetland loss that occurred during those six years. DEP records show that 88% of non-compliance cases remain unresolved, and the net …


Understanding The Linkages Between Urban Transportation Design And Population Exposure To Traffic-Related Air Pollution: Application Of An Integrated Transportation And Air Pollution Modeling Framework To Tampa, Fl, Sashikanth Gurram Nov 2017

Understanding The Linkages Between Urban Transportation Design And Population Exposure To Traffic-Related Air Pollution: Application Of An Integrated Transportation And Air Pollution Modeling Framework To Tampa, Fl, Sashikanth Gurram

USF Tampa Graduate Theses and Dissertations

Rapid and unplanned urbanization has ushered in a variety of public health challenges, including exposure to traffic pollution and greater dependence on automobiles. Moreover, vulnerable population groups often bear the brunt of negative outcomes and are subject to disproportionate exposure and health effects. This makes it imperative for urban transportation engineers, land use planners, and public health professionals to work synergistically to understand both the relationship between urban design and population exposure to traffic pollution, and its social distribution. Researchers have started to pay close attention to this connection, mainly by conducting observational studies on the relationship between transportation, urban …


Building Codes To Minimize Cover Collapses In Sinkhole-Prone Areas, George Veni, Connie Campbell Brashear, Andrew Glasbrenner Oct 2015

Building Codes To Minimize Cover Collapses In Sinkhole-Prone Areas, George Veni, Connie Campbell Brashear, Andrew Glasbrenner

Sinkhole Conference 2015

Cover- collapse sinkholes are forming with increasing frequency under buildings. Analyses of sinkhole distribution in Beacon Woods, Florida, preliminarily indicate their occurrence is an order of magnitude greater in urban versus undeveloped areas, suggesting the structures themselves are enhancing the collapse process. The most likely causes are induced recharge via at least one of two sources. First, runoff and drainage from roads, structures, and impoundments that is not adequately dispersed will promote sinkhole development. Second, leaking water, sewer, and septic systems beneath or adjacent to a structure will also promote collapse. The process of cover-collapse from induced recharge is well …