Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
University of Miami Inter-American Law Review
To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …
Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder
Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder
Dickinson Law Review (2017-Present)
Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.
In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Indiana Journal of Global Legal Studies
A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Indiana Law Journal
The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Hey America! Let's Get Smart: The Need For A Reliable Modern Smart Electrical Grid Resistance To Cyberattacks, Richard J. Kisielowski Ii
Hey America! Let's Get Smart: The Need For A Reliable Modern Smart Electrical Grid Resistance To Cyberattacks, Richard J. Kisielowski Ii
Catholic University Journal of Law and Technology
No abstract provided.
Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah
Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah
Journal of Business & Technology Law
No abstract provided.
Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher
Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher
Michigan Law Review
Cyberattacks are capable of penetrating and disabling vital national infrastructure, causing catastrophic economic harms, and approximating the effects of war, all from remote locations and without the use of conventional weapons. They can be nearly impossible to attribute definitively to their sources and require relatively few resources to launch. The United States is vulnerable to cyberattacks but also uniquely capable of carrying out cyberattacks of its own. To do so effectively, the United States requires a legal regime that is well suited to cyberattacks' unique attributes and that preserves executive discretion while inducing the executive branch to coordinate with Congress. …