4,083 research outputs found

    The Fault Is Not in Our Stars: Avoiding an Arms Race in Outer Space

    Get PDF
    The world is on the precipice of a new arms race in outer space, as China, Russia, the United States, and others undertake dramatic new initiatives in anti-satellite weaponry. These accelerated competitive efforts at space control are highly destabilizing because developed societies have come to depend so heavily upon satellite services to support the entire civilian economy and the modern military apparatus; any significant threat or disruption in the availability of space assets would be massively, and possibly permanently, disruptive. International law regarding outer space developed with remarkable rapidity in the early years of the Space Age, but the process of formulating additional treaties and norms for space has broken down over the past several decades; no additional legal instruments have emerged that could cope with today’s rising threats. This Article therefore proposes three initiatives. Although none of them can suffice to solve the emerging problems, they could, perhaps, provide additional diplomacy, reinvigorating the prospects for rapprochement in space. Importantly, each of these three ideas has deep roots in other sectors of arms control, where they have served both to restore a measure of stability and to catalyze even more ambitious agreements in the longer term. The first proposal is for a declaratory regime of “no first use” of specified space weapons; this would do little to directly alter states’ capabilities for space warfare, but could serve as a “confidence-building measure,” to temper their most provocative rhetoric and practices. The second concept is a “limited test ban,” to interdict the most dangerous debris-creating developmental tests of new space weapons. Third is a suggestion for shared “space situational awareness,” which would create an international apparatus enabling all participants to enjoy the benefits of greater transparency, reducing the possibilities for secret malign or negligent behavior. In each instance, the Article describes the proposal and its variations, assesses its possible contributions to space security, and displays the key precedents from other arms-control successes. The Article concludes by calling for additional, further-reaching space diplomacy, in the hope that these relatively modest initial measures could provoke more robust subsequent negotiations

    What Constitutes an Act of War in Cyberspace

    Get PDF
    In December 2005 a new mission statement was released by the Air Force Leadership, to deliver sovereign options for the defense of the United States of America and its global interests...to fly and fight in Air, Space and Cyberspace. (Wynne & Mosley, 2005) With the stand up of the AFCYBER command and the use of cyberspace to carry out our daily mission the U.S. needs to have a clear understanding of what war in cyberspace looks like and what the laws are governing war in cyberspace. This research and it\u27s resulting data analysis is intended to provide a better understanding of what the current laws of war are and how they translate to cyber war and the complexities that exist, along with recommendation on future revisions of the laws

    A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System

    Get PDF
    The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general

    A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System

    Get PDF
    The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general

    Dynamic Context Awareness of Universal Middleware based for IoT SNMP Service Platform

    Get PDF
    This study focused on the Universal Middleware design for the IoT (Internet of Things) service gateway for the implementation module of the convergence platform. Recently, IoT service gateway including convergence platform could be supported on dynamic module system that is required mounting and recognized intelligent status with the remote network protocol. These awareness concepts support the dynamic environment of the cross-platform distributed computing technology is supported by these idea as a Universal Middleware for network substitution. Distribution system commonly used in recent embedded systems include CORBA (Common Object Request Broker Architecture), RMI (Remote Method Invocation), DCE (Distributed Computing Environment) for dynamic service interface, and suggested implementations of a device object context. However, the aforementioned technologies do not support each standardization of application services, communication protocols, and data, but are also limited in supporting inter-system scalability. In particular, in order to configure an IoT service module, the system can be simplified, and an independent service module can be configured as long as it can support the standardization of modules based on hardware and software components. This paper proposed a design method for Universal Middleware that, by providing IoT modules and service gateways with scalability for configuring operating system configuration, may be utilized as an alternative. This design could be a standardized interface provisioning way for hardware and software components as convergence services, and providing a framework for system construction. Universal Middleware Framework could be presented and dynamic environment standardization module of network protocols, various application service modules such as JINI (Apache River), UPnP (Universal Plug & Play), SLP (Service Location Protocol) bundles that provide communication facilities, and persistence data module. In this IoT gateway, management for based Universal Middleware framework support and available for each management operation, application service component could be cross-executed over SNMP (Simple Network Management Protocol) version 1, version 2, and version 3. The way of SNMP extension service modules are conducted cross-support each module and independent system meta-information that could be built life cycle management component through the MIB (Management Information Base) information unit analysis. Therefore, the MIB role of relation with the Dispatcher applied to support multiple concurrent SNMP messages by receiving incoming messages and managing the transfer of PDU (Protocol Data Unit) between the RFC 1906 network in this study. Results of the study revealed utilizing Universal Middleware that dynamic situations of context objects with mechanisms and tools to publish information could be consisted of IoT to standardize module interfaces to external service clients as a convergence between hardware and software platforms

    The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

    Get PDF
    The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Fifteen papers were submitted from Australia and overseas, of which ten were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conferences. To our sponsors also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Handbook for New Actors in Space

    Get PDF
    Driven by Cold War tensions between the US and the Soviet Union, the space race began almost 60 years ago. Each power was racing to accomplish new feats in space and demonstrate its superiority. In 2017, while much remains the same, much has changed. Space actors comprise a wide variety of national and non-governmental entities comprising diverse rationales, goals, and activities. More than 70 states, commercial companies, and international organizations currently operate more than 1,500 satellites in Earth orbit. Driven largely by the commoditization of space technology and the lowering of barriers to participation, the number of space actors is growing. This broadening of space has both advantages and disadvantages. On the positive side, it is leading to greatly increased technological innovations, lower costs, and greater access to the beneficial capabilities and services offered by satellites. However, the accelerated growth in space activities and the influx of new actors has the potential to exacerbate many of the current threats to the long-term sustainable use of space. These threats include on-orbit crowding, radio-frequency interference, and the chances of an incident in space sparking or escalating geopolitical tensions on Earth. Michael K. Simpson, Ph.D. - Executive Director, Secure World Foundatio

    Towards a Benchmark for Fog Data Processing

    Full text link
    Fog data processing systems provide key abstractions to manage data and event processing in the geo-distributed and heterogeneous fog environment. The lack of standardized benchmarks for such systems, however, hinders their development and deployment, as different approaches cannot be compared quantitatively. Existing cloud data benchmarks are inadequate for fog computing, as their focus on workload specification ignores the tight integration of application and infrastructure inherent in fog computing. In this paper, we outline an approach to a fog-native data processing benchmark that combines workload specifications with infrastructure specifications. This holistic approach allows researchers and engineers to quantify how a software approach performs for a given workload on given infrastructure. Further, by basing our benchmark in a realistic IoT sensor network scenario, we can combine paradigms such as low-latency event processing, machine learning inference, and offline data analytics, and analyze the performance impact of their interplay in a fog data processing system

    Handbook for New Actors in Space

    Get PDF
    Driven by Cold War tensions between the US and the Soviet Union, the space race began almost 60 years ago. Each power was racing to accomplish new feats in space and demonstrate its superiority. In 2017, while much remains the same, much has changed. Space actors comprise a wide variety of national and non-governmental entities comprising diverse rationales, goals, and activities. More than 70 states, commercial companies, and international organizations currently operate more than 1,500 satellites in Earth orbit. Driven largely by the commoditization of space technology and the lowering of barriers to participation, the number of space actors is growing. This broadening of space has both advantages and disadvantages. On the positive side, it is leading to greatly increased technological innovations, lower costs, and greater access to the beneficial capabilities and services offered by satellites. However, the accelerated growth in space activities and the influx of new actors has the potential to exacerbate many of the current threats to the long-term sustainable use of space. These threats include on-orbit crowding, radio-frequency interference, and the chances of an incident in space sparking or escalating geopolitical tensions on Earth. Michael K. Simpson, Ph.D. - Executive Director, Secure World Foundatio
    • …
    corecore