Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

2024

Discipline
Keyword
Publication

Articles 1 - 10 of 10

Full-Text Articles in Law

Genocide Memorialization Through Law In Bosnia And Herzegovina: Reconciling The Irreconcilable?, Carna Pistan Jun 2024

Genocide Memorialization Through Law In Bosnia And Herzegovina: Reconciling The Irreconcilable?, Carna Pistan

Genocide Studies and Prevention: An International Journal

This article focuses on the law banning genocide denial and other war crimes and the glorification of convicted war criminals imposed in Bosnia and Herzegovina by the former High Representative Valentin Inzko in mid-2021 to facilitate the country’s reconciliation process. It first positions the genocide denial ban into the vast category of memory laws by examining its content and scope, as well as the reactions and consequences it has provoked up to now. The article maintains that an internationally imposed memory law cannot create reconciliation in a deeply divided society. It shows, on the contrary, that the imposed legislation has …


Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese May 2024

Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese

Genocide Studies and Prevention: An International Journal

In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt Feb 2024

“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt

Genocide Studies and Prevention: An International Journal

This article exposes the political underpinnings of the term “genocide of the Soviet people,” introduced and actively promoted in Russia since 2019. By reclassifying mass crimes committed by the Nazis and their accomplices against the civilian population—specifically Slavic—as genocide, Russian courts effectively engage in adjudication of the history of the Second World War. In the process, genocide trials, ongoing in twenty-five Russian provinces and five occupied Ukrainian territories, present no new evidence or issue new indictments, thus fulfilling none of the objectives of a standard criminal investigation. The wording of the verdicts, and a comprehensive political project put in place …


Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu Jan 2024

Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu

Journal of African Conflicts and Peace Studies

The structure of the Nigerian police has overtime depicted a centralized composition that negate principles of power sharing in a federal system of government. The complexities and diverse nature of policing in Nigeria remains the bane to effective and virile administration and management of the organization. The office of the Commissioner of Police vis-à-vis those of State Governors spell contradictions in power configuration from both the Constitution and the Police Act. The enactment of vigilante services and neighbourhood watches by state governments are indicative of a failing security system especially at the component units of the Nigerian federation. The hinterlands …