Abstract
Additive manufacturing, also referred to as 3D printing, has become viable for manufacturing functional parts. For example, the U.S. Federal Aviation Administration recently approved General Electric jet engine fuel nozzles that are produced by additive manufacturing. BecUniversity of South Alabama, Mobile, Alabama with cyber technology, a number of security concerns have been raised. This chapter specifically considers attacks that deliberately sabotage the mechanical properties of functional parts produced by additive manufacturing; the feasibility of these attacks has already been discussed in the literature.
Investments in security measures directly depend on cost-benefit analyses conducted by the participants involved in additive manufacturing processes. This chapter discusses the entities that can be considered to be financially liable in the event of a successful sabotage attack. The analysis employs a model that distinguishes between the levels at which the additive manufacturing process has been sabotaged. Specifically, it differentiates between the additive manufacturing service provider and the various commodity suppliers. For each possible combination of injured party and level of attack, the involved parties that may face liability exposure are identified. This is accomplished by analyzing the necessary components that establish liability. The analysis reveals that liability potential exists at all levels of the additive manufacturing process in the event of a sabotage attack. For this reason, it is imperative that the involved actors conduct or re-evaluate their cost-benefit analyses and invest in security measures.
Chapter PDF
Similar content being viewed by others
References
M. Albakri, L. Sturm, C. Williams and P. Tarazaga, Non-destructive evaluation of additively-manufactured parts via impedance-based monitoring, Proceedings of the Twenty-Sixth International Solid Freeform Fabrication Symposium, pp. 1475–1490, 2015.
American Society for Testing and Materials, Standard Terminology for Additive Manufacturing Technologies, ASTM F2792-12a, West Conshohocken, Pennsylvania, 2012.
P. Anderson, Cyber attack exception to the Foreign Sovereign Immunities Act, Cornell Law Review, vol. 102(4), pp. 1087–1114, 2017.
S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin and Y. Elovici, dr0wned – Cyber-physical attack with additive manufacturing, Proceedings of the Eleventh USENIX Workshop on Offensive Technologies, 2017.
N. Berkowitz, Strict liability for individuals? The impact of 3-D printing on products liability law, Washington University Law Review, vol. 92(4), pp. 1019–1053, 2015.
S. Brenner, At light speed: Attribution and response to cybercrime/terrorism/warfare, Journal of Criminal Law and Criminology, vol. 97(2), pp. 379–476, 2007.
C. Brown, Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice, International Journal of Cyber Criminology, vol. 9(1), pp. 55–119, 2015.
L. Columbus, 2015 roundup of 3D printing market forecasts and estimates, Forbes, March 31, 2015.
P. Comerford and E. Belt, 3DP, AM, 3DS and products liability, Santa Clara Law Review, vol. 55(4), pp. 821–836, 2015.
C. Doyle, Corporate Criminal Liability: An Overview of Federal Law, Congressional Research Service, Washington, DC, 2013.
N. Engstrom, 3-D printing and products liability: Identifying the obstacles, University of Pennsylvania Law Review Online, vol. 162, pp. 35–41, 2013.
W. Frazier, Metal additive manufacturing: A review, Journal of Materials Engineering and Performance, vol. 23(6), pp. 1917–1928, 2014.
A. Geraghty, Criminal Corporate Liability, Seventeenth Survey of White Collar Crime, American Criminal Law Review, vol. 39, pp. 327–354, 2002.
J. Gill, Disaster prosecution is, well, a disaster, The New Orleans Advocate, March 12, 2016.
S. Gilmore, Suing the surveillance states: The (cyber) tort exception to the Foreign Sovereign Immunities Act, Columbia Human Rights Law Review, vol. 46(3), pp. 227–287, 2014.
T. Kellner, An epiphany of disruption: GE additive chief explains how 3D printing will upend manufacturing, GE Reports, November 13, 2017.
M. Koch and B. Stansbury, 3-D printing: Innovation, opportunities and risk, Law360, February 24, 2016.
C. Krauss and J. Schwartz, BP will plead guilty and pay over \$4 billion, The New York Times, November 15, 2012.
E. Malloy, Three-dimensional printing and a laissez-faire attitude towards the evolution of the products liability doctrine, Florida Law Review, vol. 68(4), pp. 1199–1226, 2016.
Markets and Reports, 3D Printing Market Trends: Global Market Growth and Forecasting 2015–2020, DART Consulting, Bangalore, India, October 10, 2015.
S. Moore, P. Armstrong, T. McDonald and M. Yampolskiy, Vulnerability analysis of desktop 3D printer software, Proceedings of the IEEE Resilience Week, pp. 46–51, 2016.
S. Moore, W. Glisson and M. Yampolskiy, Implications of malicious 3D printer firmware, Proceedings of the Fiftieth Hawaii International Conference on System Sciences, pp. 6089–6098, 2017.
H. Nielson, Manufacturing consumer protection for 3-D printed products, Arizona Law Review, vol. 57(2), pp. 609–622, 2015.
L. Osborn, Regulating three-dimensional printing: The converging worlds of bits and atoms, San Diego Law Review, vol. 51, pp. 553–621, 2014.
E. Podgor, Cybercrime: National, transnational or international? Wayne Law Review, vol. 50, pp. 97–108, 2004.
G. Pope and M. Yampolskiy, A hazard analysis technique for additive manufacturing, presented at the Better Software East Conference, 2016.
P. Reddy, The legal dimension of 3D printing: Analyzing secondary liability in additive layer manufacturing, Columbia Science and Technology Law Review, vol. XVI, pp. 222–247, 2014.
C. Robertson and C. Krauss, Gulf spill is the largest of its kind, scientists say, The New York Times, August 2, 2010
C. Robertson, J. Schwartz and R. Perez-Pena, BP to pay \$18.7 billion for Deepwater Horizon oil spill, The New York Times, July 2, 2015.
A. Slaughter, M. Yampolskiy, M. Matthews, W. King, G. Guss and Y. Elovici, How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective, Proceedings of the Twelfth International Conference on Availability, Reliability and Security, article no. 78, 2017.
L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems, Proceedings of the Twenty-Fifth International Solid Freeform Fabrication Symposium, pp. 951–963, 2014
L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects, Journal of Manufacturing Systems, vol. 44(1), pp. 154–164, 2017.
Technovelgy, Plastic Constructor (3D Printer) (www.technovelgy.com/ct/content.asp?Bnum=2445), 2017.
A. Thierer and A. Marcus, Guns, limbs and toys: What future for 3D printing? Minnesota Journal of Law, Science and Technology, vol. 17(2), pp. 805–854, 2016.
Thomson Reuters Editorial Staff, § 87 Battery, American Jurisprudence Second, vol. 6, 2017.
Thomson Reuters Editorial Staff, § 90 Causing apprehension, American Jurisprudence Second, vol. 6, 2017.
Thomson Reuters Editorial Staff, § 631 Express warranties, American Jurisprudence Second, vol. 63, 2017.
Thomson Reuters Editorial Staff, § 676 Implied warranties, American Jurisprudence Second, vol. 63, 2017.
Thomson Reuters Editorial Staff, § 676 Implied warranty of fitness for particular purpose, American Jurisprudence Second, vol. 63, 2017.
Thomson Reuters Editorial Staff, § 37 Intentional infliction of emotional distress, American Jurisprudence Second, vol. 74, 2017.
Thomson Reuters Editorial Staff, § 1 Negligence, American Jurisprudence Second, vol. 57A, 2017.
Thomson Reuters Editorial Staff, § 207 Negligence liability, American Jurisprudence Second, vol. 63, 2017.
Thomson Reuters Editorial Staff, § 508 Strict liability in tort, American Jurisprudence Second, vol. 63, 2017.
Thomson Reuters Editorial Staff, § 11 Trespass to chattel, American Jurisprudence Second, vol. 75, 2017.
S. Wang, When classical doctrines of products liability encounter 3D printing: New challenges in the new landscape, Houston Business and Tax Law Journal, vol. 16, pp. 104–126, 2016.
Wohlers Associates, Wohlers Report 2017: 3D Printing and Additive Manufacturing State of the Industry, Annual Worldwide Progress Report, Fort Collins, Colorado, 2017.
M. Yampolskiy, W. King, J. Gatlin, S. Belikovetsky, A. Brown, A. Skjellum and Y. Elovici, Security of additive manufacturing: Attack taxonomy and survey, Additive Manufacturing, vol. 21, pp. 431–457, 2018.
M. Yampolskiy, W. King, G. Pope, S. Belikovetsky and Y. Elovici, Evaluation of additive and subtractive manufacturing from the security perspective, in Critical Infrastructure Protection XI, M. Rice and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 23–44, 2017.
M. Yampolskiy, L. Schutzle, U. Vaidya and A. Yasinsac, Security challenges of additive manufacturing with metals and alloys, in Critical Infrastructure Protection IX, M. Rice and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 169–183, 2015.
M. Yampolskiy, A. Skjellum, M. Kretzschmar, R. Overfelt, K. Sloan and A. Yasinsac, Using 3D printers as weapons, International Journal of Critical Infrastructure Protection, vol. 14, pp. 58–71, 2016.
S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, Manufacturing and security challenges in 3D printing, Journal of the Minerals, Metals and Materials Society, vol. 68(7), pp. 1872–1881, 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 IFIP International Federation for Information Processing
About this paper
Cite this paper
Graves, L., Yampolskiy, M., King, W., Belikovetsky, S., Elovici, Y. (2018). Liability Exposure when 3D-Printed Parts Fall from the Sky. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XII. ICCIP 2018. IFIP Advances in Information and Communication Technology, vol 542. Springer, Cham. https://doi.org/10.1007/978-3-030-04537-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-04537-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04536-4
Online ISBN: 978-3-030-04537-1
eBook Packages: Computer ScienceComputer Science (R0)