Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 109

Full-Text Articles in Social and Behavioral Sciences

Navigating The Threat Posed By The Chinese Communist Party, Adam Opp Apr 2024

Navigating The Threat Posed By The Chinese Communist Party, Adam Opp

Helm's School of Government Conference - American Revival: Citizenship & Virtue

For decades, the Chinese Communist Party (CCP) and the economic growth of China has become a threat to the United States. Beginning in 1978, the CCP issued a series of economic, market-oriented reforms which led to a period of economic growth and productivity increase in China. The CCP turned to diplomacy with the United States and other nations to increase foreign investment and implemented the Belt and Road initiative. The impressive scale of Chinese economic growth poses an economic and hegemonic threat to the United States, as China’s economy is projected to outpace the United States and the CCP has …


Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore Apr 2024

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …


The Unyielding Menace: Investigating The Global Impact Of The Islamic State (Is) And The Rise Of Non-State Actors In Modern Security, Sohail Ahmad, Maria Jawad Khan Nov 2023

The Unyielding Menace: Investigating The Global Impact Of The Islamic State (Is) And The Rise Of Non-State Actors In Modern Security, Sohail Ahmad, Maria Jawad Khan

CBER Conference

This research paper delves into the profound impact of the Islamic State on global terrorism and security dynamics. By exploring the origins, ideology, organization, recruitment methods, and operational strategies of the Islamic State, this research unravel the intricate web that fuels its rise. Through a case study approach, the research sheds light on the global reach of the Islamic State, its vast networks, and the powerful motivations behind its actions.


The Future Of Integrated Air And Missile Defense (Iamd) Against China, Carl Rehberg May 2023

The Future Of Integrated Air And Missile Defense (Iamd) Against China, Carl Rehberg

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Over the last two decades, China's People's Liberation Army Rocket Force (PLARF) and other PLA entities have provided the Chinese Communist Party (CCP) with a complex array of offensive capabilities, focused primarily on the U.S., allies, and partners in the Pacific. There has been explosive growth in ballistic missiles, cruise missiles, supersonic cruise missiles, hypersonic weapons, HGVs, and other threats. These salvo attacks are explicitly designed to attack theater air bases, seaports, and other facilities critical to U.S. military operations. These PLA weapon systems undermine U.S. security assurances with its allies and partners. They could incentivize China to strike first …


Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps May 2023

Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Defense organization in the Middle East North Africa (MENA) region has been historically fraught with instability and conflict, rooted in tensions ranging from centuries-old religious disputes to modern geopolitical power struggles. However, two years ago deep-seated status quos in the area were challenged and successfully overcome through the drafting and signage of agreements in which Arab nations normalized ties with the nation of Israel, popularly known as the Abraham Accords. The Accords emphasized the mutual desire for peace and prosperity in MENA between signees with a pointed reference to maintaining security in the traditionally volatile region. These pivotal feats of …


Non-State Actors And International Crisis Outcomes, 1987-2017, Taylor Schubert Apr 2023

Non-State Actors And International Crisis Outcomes, 1987-2017, Taylor Schubert

Undergraduate Research Competition

This study examines the way non-state actor involvement affects the outcome of international crises. This was tested by looking at a set of international crises from 1987 through 2017. We find that the involvement of a non-state actor in an international crisis is associated with a greater likelihood of the crisis terminating via agreement or unilateral act, and a reduced likelihood of a crisis fading away. Additionally, we find that non-state actors who engage in direct fighting as a part of the crisis are further associated with negotiated and unilaterally-imposed outcomes, but that non-state actors who control territory are less …


A Look Into Dhs-Sponsored Community Programs, Daniel Cook Mar 2023

A Look Into Dhs-Sponsored Community Programs, Daniel Cook

UNO Student Research and Creative Activity Fair

The Center for Prevention Partnership and Programs (CP3) is the arm of the Department of Homeland Security (DHS) that works to prevent acts of targeted violence and terrorism (TVT). This is accomplished through partnering with local and state organizations, law enforcement agencies, and universities to construct prevention frameworks, best practice reviews, and innovative solutions to attempt to make the United States safer from individuals who are at risk for radicalizing toward violence. For these organizations, CP3 provides technical, financial, and educational assistance. Beyond that, community partners work to find develop programs and execute solutions that are specific to the needs …


International Intrigue In The American Colonies, Arianna Vicinanza Feb 2023

International Intrigue In The American Colonies, Arianna Vicinanza

Graduate Research Conference (GSIS)

Spies have always been a subject of intrigue, nowadays we are surrounded by films, tv series, and books based on undercover business. Usually espionage is associated with WW2 or the Cold War, two periods of times in which espionage and secret agencies were essential in order to gather critical information about the enemy. Despite common belief that secret services developed one century ago, espionage and Spy Rings are as old as time. Espionage is the oldest profession in the world, kings used spies to monitor the enemy or to discover plots going around the royal court. In the American Revolution, …


Ddr, Cassandra Jagroop Feb 2023

Ddr, Cassandra Jagroop

Graduate Research Conference (GSIS)

Disarmament, Demobilisation and Reintegration (DDR) has been a facet of post-conflict resolution since the 1980s. DDR seeks to address a wide range of issues varying from security to human rights, law, elections, and governance. One of the major issues arising from a conflict region are armed groups involved in the fighting and how to handle them. These armed groups represent the deep insecurity and lack of faith the population has in the state mechanism (Rondeau 2011, 654), thus in order to move ahead in the post-conflict situation the issue of armed groups needs to be tackled. The evolution of warfare …


Russia-Ukrainian War 2022: Battle Of Hostomel, Arthur Borsuk Feb 2023

Russia-Ukrainian War 2022: Battle Of Hostomel, Arthur Borsuk

Graduate Research Conference (GSIS)

On February 24, 2022, the Russian Federation began the active phase of a full-scale invasion of the territory of sovereign Ukraine. This invasion was preceded by the recognition of the independence of the quasi-republics in the occupied territories of the Donetsk and Luhansk regions (located in the east of Ukraine) and the introduction of a large group of troops into their territory. The invasion began with a massive missile and air strike against critical infrastructure, military units, civilian facilities and air defense positions. At the same time, the ground troops of the Russian Federation crossed the border in all border …


Addressing Money Laundering In The United States Real Estate Sector, Hunter Mccormick Jan 2023

Addressing Money Laundering In The United States Real Estate Sector, Hunter Mccormick

Posters-at-the-Capitol

The United States faces threats to economic stability and legal integrity from money laundering practices in the real estate market. Legislative loopholes, complicit enablers, and aging technological systems used by government agencies allow individuals to flow ill-gotten wealth into the United States with little effort. As a result of these factors, local economies suffer job loss, once-inhabited properties lie empty in decay, and public trust in government weakens. Illegal wealth is transformed into protected assets in the form of property and can be stored to later fund terrorist organizations or influence the American people. Approximately $2.3 billion was laundered through …


The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt Jan 2023

The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt

Posters-at-the-Capitol

Current legislation and policies are not effective enough to fight human trafficking as it continues to change and evolve worldwide. Human trafficking is not just sex trafficking; labor trafficking, organ trafficking, people smuggling, and forced criminal activities. This evolving and changing global issue continues to grow into a highly profitable "business." Overseas, many countries struggle to handle this issue, and some countries do not handle it at all. The United States has a major human trafficking problem that will continue to worsen unless there is a change in the government. The U.S. Congress should be more focused on the growing …


How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler Apr 2022

How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


China Containment In East Asia: Preventative Or Provocative?, Rachel Solsman Apr 2022

China Containment In East Asia: Preventative Or Provocative?, Rachel Solsman

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Since the end of World War II, the United States has developed and maintained its strategic alliances with Japan, South Korea, the Philippines, and Taiwan, and has worked to contain China through bolstering its deterrence strategy. However, after a century of humiliation, China is modernizing its military capabilities, improving in trade, and increasing political cohesion to become a regional hegemon. In light of these changes to the international order, the United States must re-evaluate its East Asian alliances and its current military and economic deterrence strategy against China. This paper will discuss the history of these alliances, the rise of …


Allow Them To Take The Reins: Why Central Asian States Need To Lead In Afghanistan, Brandon Angel Apr 2022

Allow Them To Take The Reins: Why Central Asian States Need To Lead In Afghanistan, Brandon Angel

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Current United States Security Strategy: Underestimation Of Afghanistan’S State Of Affairs And Resulting Impacts On American Freedom, Hannah Crosby Apr 2022

Current United States Security Strategy: Underestimation Of Afghanistan’S State Of Affairs And Resulting Impacts On American Freedom, Hannah Crosby

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The intent of this paper is to analyze the current state of the United States Security Strategy and the volatile condition of Afghanistan. Due to the shifting focus of the current administration, the United States has been left unprepared for the cultural, social, and political impacts of the American withdrawal from Afghanistan. With a critical assessment of the current security strategy and a profound shift in American political and militaristic goals, the United States can develop proper prevention and containment tactics to combat the reconstitution of Afghanistan as a terrorist haven and deter possible actions that might be taken against …


Vietnam And Afghanistan: Intelligence And Ethical Failures That Doomed Two Wars, Jamison Finnamore Apr 2022

Vietnam And Afghanistan: Intelligence And Ethical Failures That Doomed Two Wars, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

A comparison of America's two longest wars and the similarities of the poor policy and leadership that ultimately led to failure and defeat.


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Captivity As Crisis Response: Migration, The Pandemic, And Forms Of Confinement, Eleanor Paynter Dec 2021

Captivity As Crisis Response: Migration, The Pandemic, And Forms Of Confinement, Eleanor Paynter

Biennial Conference: The Social Practice of Human Rights

During Europe’s recent “refugee crisis,” Italy responded to increased migrant arrivals by sea with progressively restrictive border and asylum policies. While crisis-response restrictions are perhaps unsurprising, those implemented since 2014 have produced a set of situations that appear, at least initially, paradoxical: Following Interior Minister Matteo Salvini’s 2018 “Closed Ports” campaign, independently-operated rescue ships continue to be blocked from disembarking the migrants they have rescued. At the same time, asylum officials have rejected claims for protection at higher rates, while border officials deport a minority of those whose claims are rejected. Thus, under the guise of crisis management, some migrants …


Trading Camouflage For Kalashnikovs: The Radicalization Of U.S. Military Members Into Salafi-Jihadist Organization And Their Insider Threat, Lauren Zimmerman Mar 2021

Trading Camouflage For Kalashnikovs: The Radicalization Of U.S. Military Members Into Salafi-Jihadist Organization And Their Insider Threat, Lauren Zimmerman

UNO Student Research and Creative Activity Fair

This study examines those identified as homegrown violent extremists within the U.S. who also had experience with the U.S. military and the possible pathways to extremism they took. This research relies on the Salafi Jihadist Inspired Profiles and Radicalization Clusters (SPARC) study. By applying Kruglanski’s 3N theory of radicalization to a sample of 23 subjects who had joined, or attempted to join, the U.S. military, this study finds that most of those with military experience are radicalized by formal, organization-led networks and are motivated by social significance loss, suggesting that they have moved their personal identification from the U.S. military …


Washington Dc Model North Atlantic Treaty Organization, Mackenzie Creighton, Kaylee Coffman, Kevin Lundquist, Cameron Zarnich, Colin Molitor, Marc Rego, Stefan Johnson, Robert Belz-Templeman, Takashi Quinlan, Niklas Becker-Brown Apr 2020

Washington Dc Model North Atlantic Treaty Organization, Mackenzie Creighton, Kaylee Coffman, Kevin Lundquist, Cameron Zarnich, Colin Molitor, Marc Rego, Stefan Johnson, Robert Belz-Templeman, Takashi Quinlan, Niklas Becker-Brown

Discovery Day - Prescott

Model North Atlantic Treaty Organization (NATO) consists of several committees, each of whom draft policy relevant to their respective topics of discussion. The Committees debate for the course of the conference, drafting NATO policy to solve a multitude of issues. During this time, a simulated crisis also occurs, and each committee must respond to the updates from the crisis as well as focus on their original goals. After the final committee sessions of the conference, the final resolutions passed by each committee are sent to the North Atlantic Council (NAC), who works to approve all of them unanimously. The end …