Gary Kessler Associates
- "Job Aids"
- Maritime Cybersecurity
- Armenzoni, A., Pili, G., & Kessler, G.C. (2024, June 13). Red Flags: Russian Oil Tradecraft in the Mediterranean Sea. Proceedings of the U.S. Naval Institute, 150(6), 1456. https://www.usni.org/magazines/proceedings/2024/june/red-flags-russian-oil-tradecraft-mediterranean-sea
- Armenzoni, A., Pili, G., & Kessler, G.C. (2024, June 5). Mass AIS Spoofing Event "Moves" Dozens of Ships to Crimean Airport. The Maritime Executive. https://www.maritime-executive.com/editorials/mass-ais-spoofing-event-moves-dozens-of-ships-to-crimean-airport
- Zorri, D.M., & Kessler, G.C. (2024, March 11). Position, Navigation, and Timing Weaponization in Maritime Domain: Orientation in the Era of Great Systems Conflict - Analysis. Eurasia Review. https://www.eurasiareview.com/11032024-position-navigation-and-timing-weaponization-in-maritime-domain-orientation-in-era-of-great-systems-conflict-analysis/
- Zorri, D.M., & Kessler, G.C. (2024, 1st Quarter). Position, Navigation, and Timing: Weaponization in the Maritime Domain Orientation in the Era of Great Systems Conflict. Joint Forces Quarterly, 112, 12-21. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-112/jfq-112.pdf
- Kessler, G.C. (2024, January 1). AI, Cybersecurity, and the Maritime Transportation System. The Maritime Executive. https://www.maritime-executive.com/editorials/ai-cybersecurity-and-the-maritime-transport-system
- AIS Research Using a Raspberry Pi (2023, September 11)
- Meadors, T.B., & Kessler, G.C. (2023, January 25). Improving the Speed of Cyberdefense: Seven Key Metrics. The Maritime Executive. https://www.maritime-executive.com/editorials/improving-the-speed-of-cyberdefense-seven-key-metrics-to-know
- Kessler, G.C. (2022, May 11). Cybersecurity as a Team Sport: Resiliency, Agility and Cooperation. The Maritime Executive. https://www.maritime-executive.com/editorials/cybersecurity-as-a-team-sport-resiliency-agility-and-cooperation
- Kessler, G.C. (2022, April 19). Information Security, the MTS of the Future, and the New Convergence. The Maritime Executive. https://www.maritime-executive.com/editorials/information-security-the-mts-of-the-future-and-the-new-convergence
- Loomis, W., Singh, V.V., Kessler, G.C., & Bellekens, X. (2021, October). RAISING THE COLORS: Signaling for Cooperation on Maritime Cybersecurity. Cyber Statecraft Initiative, Scowcroft Center for Strategy and Security, Atlantic Council. https://www.atlanticcouncil.org/wp-content/uploads/2021/10/Raising-the-colors-Signaling-for-cooperation-on-maritime-cybersecurity.pdf
- Zorri, D.M., & Kessler, G.C. (2021, September 8). Cyber Threats and Choke Points: How Adversaries are Leveraging Maritime Cyber Vulnerabilities for Advantage in Irregular Warfare. Modern War Institute at West Point. https://mwi.usma.edu/cyber-threats-and-choke-points-how-adversaries-are-leveraging-maritime-cyber-vulnerabilities-for-advantage-in-irregular-warfare/
- Kessler, G.C. (2021, September). The CAN Bus in the Maritime Environment - Technical Overview and Cybersecurity Vulnerabilities. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 531-540. DOI: 10.12716/1001.15.03.05
- Kessler, G.C., & Zorri, D. (2021). Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF. Joint Special Operations University (JSOU) Report 21-4. MacDill Air Force Base (FL): The JSOU Press.
- Kessler, G.C., & Shepard, S.D. (2020). Maritime Cybersecurity: A Guide for Leaders and Managers.
- Kessler, G.C. (2020, June). Protected AIS: A Demonstration of Capability Scheme to Provide Authentication and Message Integrity. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 14(2), 279-286. DOI: 10.12716/1001.14.02.02.
- Mraz, R., Kessler, G.C., Gold, E., & Cline, J.G. (2020, April). Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use. International Journal of Transport and Vehicle Engineering, 14(4).
- Kessler, G.C. (2019, Spring). Cybersecurity in the Maritime Domain. Proceedings of the USCG Marine Safety & Security Council, 76(1), 34-39.
Retrieved from https://www.dco.uscg.mil/Portals/9/DCO%20Documents/Proceedings%20Magazine/Archive/2019/Vol76_No1_Spring2019.pdf
- Kessler, G.C. (2018, October 12). Cybersecurity and the Return-on-Negligence. The Maritime Executive Online. Retrieved from https://www.maritime-executive.com/editorials/cybersecurity-and-the-return-on-negligence
- Kessler, G.C., Craiger, J.P., & Haass, J.C. (2018, September). A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 12(3), 429-437. DOI: 10.12716/1001.12.03.01
- Kessler, G.C. (2017, November 8). Web Site Security for Seaports and Shipping Lines. The Maritime Executive Online. Retrieved from https://www.maritime-executive.com/editorials/web-site-security-for-seaports-and-shipping-lines
- Information Security (Also see GCK's Information Security-related URLs)
- An Overview of Cryptography (Handbook on Local Area Networks, Auerbach, 1998 and continuously updated...)
- Lone Operator Cyberterrorism. (Journal of Information Warfare, 2016).
- A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students (HICSS-47, 2014; GCK & J. Ramsay)
- Paradigms for Cybersecurity Education in a Homeland Security Program (Journal of Homeland Security Education, 2013; GCK & J. Ramsay)
- Information Security: New Threats or Familiar Problems? (IEEE Computer Magazine, February 2012)
- Bluetooth Hacking: A Case Study. (In G. Dardick (Ed.), Proceedings of the Conference on Digital Forensics, Security and Law, May 2009 and Journal of Digital Forensics, Security and Law; D. Browning & GCK).
- Diversity A Best Practice for Security (Ashton, Metzler & Associates and Webtorials.com IT Business Brief, March 2003)
- Cable Modems and the Internet: Securing the SOHO (Information Security Magazine, July 2000)
- Defenses Against Distributed Denial of Service Attacks (November 2000)
- Firewall Routers and Packet Filtering (Network VAR, June 1995)
- Musings About Computer and Network Security (Champlain Business Journal, November 2002)
- Passwords Strengths and Weaknesses
(Internet and Internetworking Security, Auerbach, 1997)
- Port Scanning: It's Not Just an Offensive Tool Anymore (Information Security Magazine, June 2001)
- Security at the Speed of Thought (Information Security Magazine, November 2000)
- Will Loveletter Ultimately Do Any Good? (Security Perspectives Column, Security Wire Digest, Vol. 2, No. 18, 5/15/2000)
- Why Security Policies are so Hard to Implement (IEEE ITPro Magazine, March/April 2001)
See also Webtorials presentations below.
- Cyberforensics (Also see GCK's Cybercrime and Cyberforensics-related URLs)
- An Overview of Steganography for the Computer Forensics Examiner (FBI Forensic Science Communications, 6(3), July 2004)
- The Impact of MD5 File Hash Collisions on Digital Forensic Imaging (Journal of Digital Forensics, Security & Law, 11(4), 129-138, 2016).
- The Impact of SHA-1 File Hash Collisions on Digital Forensic Imaging: A Follow-Up Experiment (Journal of Digital Forensics, Security & Law, 11(4), 139-148, 2016).
- Are mobile device examinations practiced like "forensics"? (Digital Evidence and Electronic Signature Law Review, 12, 2015. DOI: http://dx.doi.org/10.14296/deeslr.v12i0.2210.)
- Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory. (Journal of Digital Forensics, Security and Law, 8(4), 57-63, 2014.)
- An Analysis of Forensic Imaging in the Absence of Write-Blockers. (Journal of Digital Forensics, Security and Law, 9(3), 51-58, 2014; GCK & G.H. Carlton.)
- Android Forensics: Simplifying Cell Phone Examinations. (Small Scale Digital Device Forensics Journal, 2010; J. Lessard & GCK).
- Anti-Forensics and the Digital Investigator. (Proceedings of the 5th Australian Digital Forensics Conference, December 2007)
- The Case for Teaching Network Protocols to Computer Forensics Examiners. (Proceedings of the Conference on Digital Forensics, Security and Law, April 2007; GCK & M. Fasulo)
- Computer Forensics: The Issues and Current Books in the Field (Information Security Magazine, April 2002; GCK & M. Schirling)
- The Design of an Undergraduate Degree Program in Computer & Digital Forensics (Journal of Digital Forensics, Security and Law, 2006; GCK & M.E Schirling)
- Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online. (Proceedings of CFET 2007: 1st International Conference on Cybercrime Forensics Education & Training, September 2007)
- Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials. (Proceedings of CFET 2008: 2nd International Conference on Cybercrime Forensics Education & Training, September 2008; GCK, R. Simpson, & J. Fry)
- Multidisciplinary Learning Using Mock Trials. (International Journal of Electronic Security and Digital Forensics, 2009; GCK, R. Simpson, & J. Fry)
- Online Education in Computer and Digital Forensics: A Case Study (Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS-40), January 2007)
- An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview. (Journal of Digital Forensic Practice, 2010; GCK & D. Haggerty)
- Pedagogy and Overview of a Graduate Program in Digital Investigation Management. (Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS-41), January 2008; GCK & D. Haggerty)
- The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty. (Proceedings of the 12th Colloquium for Information Systems Security Education, June 2008; GCK & J. Hoag)
- The Role of Computer Forensics in Law Enforcement (OFFICER.com, January 2005)
- Sam Spade: A Multifunction Information Toolkit (Information Security Magazine, September 2001)
- Steganography: Hiding Data in Data (Windows & .NET Magazine, April 2002)
- Steganography: Implications for the Prosecutor and Computer Forensics Examiner (American Prosecutors Research Institute Child Sexual Exploitation Program UPDATE, Summer 2004)
- On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. (Journal of Digital Forensic Practice, March 2008).
- Book Review: Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility (Journal of Digital Forensic Practice, 2010)
- Book Review: Challenges to Digital Forensic Evidence (Journal of Digital Forensics, Security and Law, 2008)
- Book Review: Computer Evidence: Collection & Preservation (Journal of Digital Forensic Practice, March 2006; N. Beebe, GCK, & M. Rogers)
- Book Review: Conquest in Cyberspace: National Security and Information Warfare (Journal of Digital Forensics, Security and Law, 2007)
- Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Journal of Digital Forensics, Security and Law, 2009)
- Book Review: Digital Crime and Forensic Science in Cyberspace (Journal of Digital Forensics, Security and Law, 2006)
- Book Review: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 2nd ed. (Criminal Justice Review, September, 2007)
- Book Review: Digital Forensic Evidence Examination, 2nd ed. (Journal of Digital Forensics, Security and Law, 2010)
- Book Review: The dotCrime Manifesto: How to Stop Internet Crime (Journal of Digital Forensics, Security and Law, 2008)
- Book Review: Guide to Computer Forensics and Investigations (FBI Forensic Science Communications, Jan. 2004)
- Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit (Journal of Digital Forensics, Security and Law, 2008)
- Book Review: No Place To Hide (Journal of Digital Forensics, Security and Law, 2007)
- Book Review: Windows Forensic Analysis DVD Toolkit, 2/e (Journal of Digital Forensic Practice, 2010)
- The Internet and TCP/IP
- An Overview of TCP/IP Protocols and the Internet (Originally posted at the InterNIC, August 1994 and continuously updated...)
- IPv6: The Next Generation Internet Protocol (Handbook on Local Area Networks, Auerbach, 1997)
- A Primer on Internet and TCP/IP Tools and Utilities (FYI 30/RFC 2151) (GCK & Steve Shepard) [ASCII text | PDF]
- Setting Up Your Own Domain Name System (DNS) (Network VAR, July 1996)
- Binary Numbers and Subnet Masks (Windows 2000 Magazine, January 2001)
- The Dynamic Host Configuration Protocol (DHCP) and Windows NT (Windows NT Magazine, May 1999; GCK & Carol Monaghan)
- Routing, RIP, and Windows NT (Windows NT Magazine, August 23, 1999 Web exclusive; GCK & Carol Monaghan)
- Legislation and Public Policy
- Network Technologies
- Miscellaneous Articles/Papers
|
- On-line Presentations at Webtorials.com
- The Nimda Worm, a Webtorials webcast, September 2001.
- An Update on Code Red, a Webtorials webcast, August 2001.
- Securing a Small Office/Home Office LAN, a Webtorials webcast, March 2001.
- Special Report: "Love Letter" and Related E-mail Viruses, a Webtorials webcast, 5 May 2000.
- Denial of Services (DoS) Attacks, a Webtorials webcast, 10 February 2000.
- The Internet, Intranet, Extranets -- and VPNs, a talk given at the ICA Network Technology Institute, Boulder, CO, August, 1999.
- Network Security Overview, a talk given at the ICA Network Technology Institute, Boulder, CO, August, 1999.
|
All material on this site © 1996-, Gary C. Kessler. All rights reserved. Permission to use the material on this site is extended for individual personal use and for non-commercial distribution, as long as appropriate attribution is provided and the information is not altered in any way without express written permission from the author.
|
|