Browsing Applied Research Laboratory for Intelligence and Security (ARLIS) Research Works by Title
Now showing 1 - 5 of 5
Results Per Page
- ItemCompromised Additive Manufacturing Supply Chain Workshop Report(University of Maryland, 2021-06-16) Sandborn, Peter; Lucyshyn, William; Boyd, Marcus; Das, Diganta; Akhavantaheri, Hirbod; Hedberg, Thomas JrThe potential widespread adoption of additive manufacturing (AM) technology represents a marked shift in the production value chain. This shift represents a transition from value residing within the physical parts and structures, built from traditional designs and fabricated using conventional manufacturing to systems and components produced via additive manufacturing processes, wherein the value resides in the digital technical designs themselves, e.g., technical data packages (TDPs). While the ability to produce parts and structures anywhere there are appropriate facilities and personnel provides great flexibility in the production process, the increasing reliance on digital data creates new challenges and complications (and new opportunities for malicious actors). Breaches of the data systems exchanging proprietary technical data packages enable anyone with access to the data and the appropriate equipment, to manufacture copies of the proprietary parts or structures and steal the intellectual property associated with the data package. Moreover, with the advent of affordable laser scanners, parts can be more readily reverse engineered to replicate the geometry (form & fit), but not necessarily function. These compromised parts could, in turn, be introduced into the supply chain, either for financial gain or other malicious purposes, without the requisite production controls (materials and processes), testing, evaluation, and qualification, leading to potential safety and liability issues. This Workshop focused on the unique issues posed by compromised AM parts and components and how they can be mitigated.
- ItemDecorative, Evocative, and Uncanny: Reactions on Ambient-to-Disruptive Health Notifications via Plant-Mimicking Shape-Changing Interfaces(Association for Computer Machinery (ACM), 2023-04-23) Lee, Jarrett G.W.; Lee, Bongshin; Choe, Eun KyoungAmbient Information Systems (AIS) have shown some success when used as a notification towards users’ health-related activities. But in the actual busy lives of users, ambient notifications might be forgotten or even missed, nullifying the original notification. Could a system use multiple levels of noticeability to ensure its message is received, and how could this concept be effectively portrayed? To examine these questions, we took a Research through Design approach and created plant-mimicking Shape-Changing Interface (S-CI) artifacts, then conducted interviews with 10 participants who currently used a reminder system for health-related activities. We report findings on acceptable scenarios to disrupting people for health-related activities, and participants’ reactions to our design choices, including how using naturalistic aesthetics led to interpretations of the uncanny and morose, and which ways system physicality affected imagined uses. We offer design suggestions in health-related notification systems and S-CIs, and discuss future work in ambient-to-disruptive technology.
- ItemEmotions in Polish and Lithuanian Social Media(2023) Paletz, Susannah B. F.; Rytting, C. Anton; Johns, Michael A.; Pandža, Nick B.; Golonka, Ewa M.; Murauskaite, Egle E.; Buntain, CodyWe applied modern psychology theory of emotions and cross-cultural psychology methods to a range of issues surrounding emotions and social media. We developed an annotation guide for three languages and identified 365 Polish and 188 Lithuanian sociopolitical entities, and we developed a consensus annotated corpus for over 3,000 Polish and over 1,500 Lithuanian Facebook posts for emotional content, primary topic, post shares, and more. This corpus represents data we intend to have as sharable that was used in papers we hope to publish. More detail can be gained by reading the methodology description and by contacting the study PI, Susannah Paletz, at email@example.com.
- ItemEnterprise Network Models for Counterfeit Part Supply Chains Workshop Report(University of Maryland, 2021-08-05) Sandborn, Peter; Lucyshyn, William; Boyd, Marcus; Das, Diganta; Akhavantaheri, Hirbod; Hedberg, Thomas JrCounterfeit electronic products have been a reality for many years. Nearly all of the treatment of this problem to date has focused on the detection of counterfeits, which is necessary, but a purely defensive step. Without a network model of the supply chain, disruptions can be haphazard and inadequately targeted. A network model that includes business strategies of distributors of obsolete parts, the ability of laboratories to detect counterfeit parts, impacts of buyback, and return policies is needed. The implications of enforcement (e.g., administrative, legal, or reputational) of anti-counterfeiting policies and the levels of penalties for supplying and accepting counterfeit parts also need to be accommodated in network models. The objective of the workshop is to examine enterprise network modeling as a tool for understanding and disrupting counterfeit electronics supply chains. Participants in the workshop included electronics supply-chain members from OCMs to users, supply-chain monitoring technology developers, academics, policymakers, legal and law enforcement, and other stakeholders.
- ItemIntersections of Illicit Trafficking and Counterfeit Parts Workshop Report(University of Maryland, 2021-10-28) Sandborn, Peter; Lucyshyn, William; Boyd, Marcus; Das, Diganta; Akhavantaheri, Hirbod; Hedberg, Thomas JrThe project that sponsored this workshop focuses on the disruption of the supply chains for counterfeit hardware used in critical systems. “Critical systems,” in the context of this project are defined as systems associated with human safety (e.g. transportation, medical), the delivery of critical services (infrastructure, energy generation), important humanitarian and military missions, and global economic stability. These systems are costly to procure, are generally expected to have a long service life, and as a result, they must be supported for long periods of time. However, counterfeit parts are only a single thread of a larger illicit trafficking tapestry. While the world’s largest firms have cracked down on illicit and illegal labor practices, illicit and illegal labor remains a key part of innumerable supply chains. Narcotics production is a hazardous criminal enterprise, but increased professionalization and the availability of quality parts and chemical precursors from China have allowed narcotrafficking cartels to manufacture massive quantities of fentanyl. Weapons traffickers and criminal entities now use additive manufacturing for weapons development and modification. Trafficking of wildlife, agricultural products, and animal parts present various serious concerns including the introduction of invasive species to the spread, and novel development, of viruses. Often, these differing types of criminal behavior are siloed, but as transnational criminal entities continue to replicate neoliberal business practices, they are agglomerating into polycrime entities. These polycrime entities bridge different lines of the trafficking business. Humans are trafficked for forced or illegal labor. People have been trafficked and forced to serve as caretakers of illegal cannabis plants. Mexican drug cartels have purchased 3D printers and hired engineers to develop weapons modifications, uparmor vehicles, and developed manufacturing techniques that increase the potency of various narcotics. This workshop sought to bring together social scientists, engineers, law enforcement, policymakers, and industry to push us out of our comfort zones to build connections and identify gaps. Individual sessions focused on modalities of trafficking: arms trafficking and construction, wildlife trafficking, labor trafficking, and narcotics manufacturing and trafficking.