207 research outputs found

    Brandishing Our Air, Space, and Cyber Swords: Recommendations for Deterrence and Beyond

    Get PDF
    This article examines how the nation could better prepare to deter aggressive action in space and cyberspace, and if necessary, prevail should deterrence fail. The key themes throughout this article include a strong need for space and cyber situational awareness, the need for an international attribution and escalation framework, and a national investment in space and cyber education, along with an updated national strategy and military doctrine. Although related, this article focuses on deterrence and avoids the topic of cyber coercion

    Forging Tomorrow\u27s Air, Space, and Cyber War Fighters: Recommendations for Integration and Development

    Get PDF
    Today’s Airmen operate in contested environments, and years of technical-data spillage, coupled with policies emphasizing commercial-off-the-shelf acquisition, ensure that the immediate future will remain contested as our adversaries seek to exploit level playing fields. Long gone are the days of Operation Desert Storm and Enduring Freedom when air superiority dominated and the supporting elements of space, communications, and computers were largely out of reach for many nation-states. Since then, technology has become ubiquitously intertwined in weapon systems and today largely turns the gears of warfare, allowing a range of actors to erode national instruments of power

    Searching System Call Information for Clues: The Effects of Intrusions of Processes

    Get PDF
    The United States Air Force extensively uses information systems as a tool managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection front threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be useful for detecting intrusions. This thesis effort investigate the effectiveness of anomaly-based intrusion detection using system call information from a computational process. Previous work uses sequences of system calls to identity anomalies in processes. Instead of sequences of system calls, information associated with each system call is used to build a profile of normality that may be used to detect a process deviation. Such information includes parameters passed, results returned and the instruction pointer associated with the system call. Three methods of detecting deviations are evaluated for this problem. These include direct matching, relaxed matching and artificial immune system matching techniques. The test data used includes stack-based buffer overflows, heap-based buffer overflows and file binding race conditions. Results from this effort show that although attempted exploits were difficult to detect, certain actual exploits were easily detectable from system call information. In addition, each of the matching approaches provides some indication of anomalous behavior, however each has strengths and limitations. This effort is considered a piece of the defense-in- depth model of intrusion detection

    Cyber War and Deterrence: Applying a General Theoretical Framework

    Get PDF
    There is a saying that politicians and generals are always fighting the last war, which is emphasized when the weapons and characteristics of warfare are changing rapidly. However, if this is true, it is often not due to an inability to learn lessons from previous conflicts, but to “overlearn” or overcompensate for the failures and experiences of the past. In reality, this is not a learning problem but one of forming poor implications from historical events, which leads to poor applications of doctrine the next time around. The DOD now acknowledges that warfare has extended into cyberspace, and it is my central thesis that the military often suffers from a lack of meaningful conversation concerning the problems it faces in that domain. The lack of discourse is due partly to poorly adopted metaphors and analogies pulled from other domains of warfare and historical examples, and in general to a lack of rigorous strategic framing of the problem and its potential solutions

    Data Supporting Research on Personalized Learning Paths

    Get PDF
    Personalized Learning Paths (PLPs) are a key application of Artificial Intelligence in E-Learning. In contrast to regular Learning Paths, they return a unique sequence of learning materials identified as meeting the individual needs of the students. In the literature, PLPs are often created from knowledge graphs, which assist with ordering topics and their associated learning materials. Knowledge graphs are typically directed and acyclic, to capture prerequisite relationships between topics, though they can also have bidirectional edges when these prerequisite relationships are not necessary. This data package provides a primarily un-directed knowledge graph, with associated repository of open-source learning materials that provide AI education, along with student profile data. These data are intended to support the automatic creation of PLPs for students and to enable the comparison of PLP design approaches. This technical data package is associated with the paper listed below

    Shifting Satellite Control Paradigms: Operational Cybersecurity in the Age of Megaconstellations

    Get PDF
    The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of control automation and promote cybersecurity in an increasingly competitive, contested, and congested space domain. To ensure the continued safety and security of on-orbit satellite systems, both the defense and commercial space sectors must adapt to the rapidly changing digital landscape of future space operations

    Domain Restriction Zones: An Evolution of the Military Exclusion Zone

    Get PDF
    Since the early part of the twenty-first century, US adversaries have expanded their military capabilities within and their access to new warfighting domains. When faced with the growth of adversaries’ asymmetric capabilities, the means, tactics, and strategies previously used by the US military lose their proportional effectiveness. To avoid such degradation of capability, the operational concept of the military exclusion zone (MEZ) should be revised to suit the modern battlespace while also addressing the shifts in national policy that encourage diplomacy over military force. The concept and development of domain restriction zones (DRZs) increase the relevancy of traditional MEZs in the modern battlespace, allowing them to address problems associated with cross-domain and multidomain capabilities. The growth of adversary capabilities provides a clear rationale for the implementation of DRZs through all levels of force application within the competition continuum

    Battlespace Next™: Developing a Serious Game to Explore Multi-domain Operations

    Get PDF
    Changes in the geopolitical landscape and increasing technological complexity have prompted the U.S. Military to coin the terms Multi-Domain Operations (MDO) and Joint All-Domain Command and Control (JADC2) as over-arching strategy to frame the complexity of warfare across both traditional and emerging warfighting domains. Teaching new concepts associated with these terms requires both innovation as well as distinct education and training tools in order to realize the cultural change advocated by senior military leaders. Battlespace Next™ (BSN) is a serious game designed to teach concepts integral to MDO and initiate discussion on military strategy while conserving time, money, and manpower. BSN, a Collectable Card Game (CCG), is engineered to provide an engaging learning tool that educates on capabilities in a multi-domain conflict. This paper proposes an extensible game framework for modeling and reasoning about MDO concepts and presents our empirical feedback from over 120 military play testers evaluating a moderate to difficult version of the game. Results reveal the game teaches MDO concepts and delivers an engaging, hands-on learning experience. Specifically, we provide evidence it improved military readiness in seven areas of MDO in at least 62% of participants and 76% of respondents reported they enjoyed playing the game

    Intentional Technology For Teaching Practice

    Get PDF
    In today’s era, where educational technology is in a near-constant state of evolution, the imperative is not just to adopt technology, but to do so with a defined purpose and strategy. As educators within military education there is a growing need to discern which technological tools and practices align best with our mission and the goals we set for our students. Teaching is more than just transferring knowledge—it’s about fostering environments conducive to growth, critical thinking, and lifelong learning. This e-book contains collective insights, experiences, and reflections from faculty participating in a Faculty Learning Community (FLC) a yearlong, structured, community of practice, engaged in the thoughtful exploration of educational technology topics during the academic year of 2022-2023 at the Air Force Institute of Technology. Whether by leveraging social annotation tools to engage students in reading, formulating effective methods to produce and utilize educational content, innovating with game-based learning, or seamlessly integrating multiple applications for meaningful classroom experiences, our aim is to provide you with insights and actionable guidance for use within your own classrooms

    Extensive remodeling of DC function by rapid maturation-induced transcriptional silencing

    Get PDF
    The activation, or maturation, of dendritic cells (DCs) is crucial for the initiation of adaptive T-cell mediated immune responses. Research on the molecular mechanisms implicated in DC maturation has focused primarily on inducible gene-expression events promoting the acquisition of new functions, such as cytokine production and enhanced T-cell-stimulatory capacity. In contrast, mechanisms that modulate DC function by inducing widespread gene-silencing remain poorly understood. Yet the termination of key functions is known to be critical for the function of activated DCs. Genome-wide analysis of activation-induced histone deacetylation, combined with genome-wide quantification of activation-induced silencing of nascent transcription, led us to identify a novel inducible transcriptional-repression pathway that makes major contributions to the DC-maturation process. This silencing response is a rapid primary event distinct from repression mechanisms known to operate at later stages of DC maturation. The repressed genes function in pivotal processes—including antigen-presentation, extracellular signal detection, intracellular signal transduction and lipid-mediator biosynthesis—underscoring the central contribution of the silencing mechanism to rapid reshaping of DC function. Interestingly, promoters of the repressed genes exhibit a surprisingly high frequency of PU.1-occupied sites, suggesting a novel role for this lineage-specific transcription factor in marking genes poised for inducible repressio
    • …
    corecore