CURRICULUM VITAE
Gary Craig Kessler
Technical Specialties:
Course development, teaching, consulting, and research in the areas of maritime cybersecurity, Automatic Identification System (AIS) protocols, and computer and network security.
Education:
- B.A., Mathematics (cum laude), Humboldt State University, Arcata, CA, 1975
- Graduate study in Computer Science, University of Arizona, Tucson, AZ, 1975-1976
- M.S., Computer Science, University of Vermont, Burlington, VT, 1980
- Ph.D., Computing Technology in Education, Nova Southeastern University, Ft. Lauderdale, FL, 2010
- Industry certifications held: (ISC)2 CISSP
- Security clearance information provided upon request
- Additional qualifications: PADI Master SCUBA Diver Trainer, USCG Merchant Mariner Credential (50 GT/Tow assist), USCG Auxiliary coxswain
Work Experience (since 1999):
Principal Consultant, Fathom5, 02/2021-Present. Work on special projects, research, training, and curriculum development related to maritime and industrial control system cybersecurity.
President, Gary Kessler Associates, Ormond Beach, FL, 8/2012-present. Providing training, consulting, and research services related to cybersecurity, with a focus on maritime issues, digital forensics, and communications networks.
Professor of Cybersecurity, Embry-Riddle Aeronautical University, Daytona Beach, FL, 8/2012-12/2020. Responsible for curriculum design and development of cybersecurity courses as a minor within the Homeland Security program, as well as development of a masters degree in cybersecurity management.
Visiting Professor, U.S. Coast Guard Academy, New London, CT, 8-12/2019. Responsible for teaching and developing introductory information security course as part of new Cyber Systems program, lead seminar in Maritime Cybersecurity, and collaborated on Automatic Identification System (AIS) projects. (This activity during sabbatical from Embry-Riddle.)
Department Chair and Professor of Cybersecurity, Embry-Riddle Aeronautical University, Daytona Beach, FL, 7/2015-7/2019. Responsible for managing more than a dozen faculty members, two undergraduate and two graduate programs, and budget for the Security Studies & International Affairs Dept.
Program Director and Associate Professor, Norwich University, Northfield, VT, 9/2011-6/2012. Responsible for curriculum design and development, recruitment and retention of faculty, and student admissions for the M.S. in Information Assurance (MSIA) program.
President, Gary Kessler Associates, Burlington, VT, 7/2010-7/2012. Develop and deliver training, consulting, and services related to computer forensics and information security.
Assoc. Professor and Program Director, Champlain College, Burlington, VT, 7/2000-6/2010. Responsible for coordinating course offerings, hiring and managing full-time and adjunct faculty, designing and teaching courses, and updating the curriculum for the Computer Networking, Computer & Digital Forensics, and Information Security majors. Director, Champlain College Center for Digital Investigation. Led team preparing successful application for college's designation as a National Center of Academic Excellence in Information Assurance Education (CAEIAE). Developer and director of the M.S., Digital Investigation Management program.
Senior Network Security Analyst, SymQuest Group, South Burlington, VT, 7/1999-6/2000. Manage and helped build the company's consulting practices in the network security, Internet access, and WAN space. Involved in all aspects of the practice, from sales, recruitment, RFP response, needs assessment, training, and implementation.
Other Related Information:
Co-author of Maritime Cybersecurity: A Guide for Leaders and Managers, 2/e (2022), https://www.garykessler.net/MaritimeCybersecurityBook/.
Non-Resident Senior Fellow, Cyber Statecraft Initiative, Scowcroft Center for Strategy and Security, The Atlantic Council (2021-present).
Editorial review board, TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation (2018-present).
USCG Auxiliary, 7th District, Flotilla 44, Daytona Beach, FL (2017-present) Flotilla Staff Officer, Finance; Flotilla Staff Officer, Navigation Systems; Chief, Cybersecurity Prevention Operations Division, Auxiliary Cybersecurity Augmentation Program (AUXCYBER).
Captain, Marine Discovery Center, New Smyrna Beach, FL (2015-present).
Editor-in-chief (2011-2012) and member of editorial board (2005-2019), Journal of Digital Forensics, Security and Law.
Public Outreach Coordinator, mobile device examiner, and advisory board member of the Vermont Internet Crimes Against Children (ICAC) and Internet Crimes Task Forces (1999-2012); mobile device examiner, North Florida ICAC (2012-2015).
Numerous training and consulting activities in computing and data communications within the telecommunications industry, to both technical and non-technical audiences; have also taught and/or consulted in Australia, Brazil, Canada, Mexico, and the U.K. Have provided instruction or advice to numerous community groups, including testifying to the Vermont Legislature about the need for computer crime and digital signature legislation, and defining the role of digital forensics examiners.
Instructor with the U.S. Department of State, Diplomatic Security Service, Anti-Terrorism Assistance Cybertraining program (2008-2011).
Author or co-author of more than 100 articles, peer-reviewed papers, and book chapters; lead author of ISDN: Concepts, Facilities, and Services (4/e, 1998) and METROPOLITAN AREA NETWORKS: Concepts, Standards, and Services (1992).
Frequent speaker at industry and academic conferences throighout the world.
Past and current participant in numerous standards activities, including those related to maritime electronics, computer forensics education and practitioner certification, and networking technologies.
Personal Information:
- Life Member (and former chief) of Colchester Rescue Squad, past member of (and current Webmaster for) the Green Mountain Critical Incident Stress Management Team, and past member of Malletts Bay Fire Department and Malibu Mountain Rescue Team.
- Hobbies include reading, playing the guitar, SCUBA diving, boating, walking, and hiking.
DETAILED RESUME
Gary Craig Kessler
(This resume only includes activity since 2000 except for a few major items before that. A complete resume dating back to the 1970s can be provided upon request.)
EDUCATION AND CERTIFICATIONS:
|
1975 |
Humboldt State University, Arcata, California
B.A., Mathematics (cum laude)
(Computer and Statistics options)
|
|
1975-1976 |
University of Arizona, Tucson, Arizona
Graduate study in Computer Science
|
|
1980 |
University of Vermont, Burlington, Vermont
M.S., Computer Science
Thesis title: A Computer Model of Hypoxic Man
|
|
2010 |
Nova Southeastern University, Ft. Lauderdale, Florida
Ph.D., Computing Technology in Education
Research title: Judges' Awareness, Understanding, and Application of Digital Evidence
|
|
Professional Certifications:
- International Information Systems Security Certification Consortium [(ISC)2] Certified Information Systems Security Professional (CISSP), March 2005-present
- The International Society of Forensic Computer Examiners (ISFCE) Certified Computer Examiner (CCE), June 2007-present
|
|
Security clearance information provided upon request.
|
|
SCUBA and Mariner Certifications:
- Open Water Diver, Professional Association of Diving Instructors (PADI), 1991
- Divemaster, PADI, 2009
- Open Water SCUBA Instructor, PADI, 2009
- Master SCUBA Diver Trainer, PADI, 2011
- U.S. Coast Guard Captain's license (50GT Master/Tow Assist), 2012
|
WORK EXPERIENCE:
February 2021- present |
Principal Consultant
Fathom5 |
Provide technical research support on special projects, provide external consulting services, and support training and curriculum development initiatives related to maritime and industrial control system cybersecurity.
July 2010- present |
PRESIDENT
Gary Kessler Associates
Ormond Beach, Florida |
Provide consulting, training, and practitioner services related to computer forensics, mobile device forensics, and information security, with a particular focus on maritime cybersecurity. Have worked with U.S. Department of State, Diplomatic Security Service, Anti-Terrorism Assistance Cybertraining program, Vermont Internet Crimes Against Children (ICAC) Task Force, Teel Technologies, Champlain College Center for Workforce Development, Hudson Analytix, and Fathom5.
August 2019- December 2019 |
VISITING PROFESSOR
U.S. Coast Guard Academy
New London, Connecticut |
Visiting professor at USCGA during sabbatical from Embry-Riddle. Assigned to coordinate and develop "Foundations of Information Security" course for the new Cyber Systems program, as well as help advise program leaders regarding the overall development of the major. Also taught a special topics course in "Maritime Cybersecurity." Collaborated with several projects regarding Advanced Identification System (AIS) protocols, including an automated iceberg reporting software project. Provided liaison to several projects at the USCG Research & Development Center. (This activity during sabbatical from Embry-Riddle.) The "Maritime Cybersecurity" seminar was also offered in fall 2021, and I remain on the USCGA Cyber Council.
August 2012- December 2020 |
DEPARTMENT CHAIR (7/2015-7/2019)
PROFESSOR OF CYBERSECURITY (7/2014-12/2020)
ASSOCIATE PROFESSOR OF CYBERSECURITY (8/2012-6/2014)
SECURITY STUDIES & INTERNATIONAL AFFAIRS DEPARTMENT
Embry-Riddle Aeronautical University
Daytona Beach, Florida |
Teach courses in the Homeland Security undergraduate program. Responsible for curriculum design and development of a cybersecurity minor within the program, as well as develop and chair the graduate online cybersecurity program. Provide student advising and public outreach services. As department chair, oversaw day-to-day operations of the SSIA Dept., including more than a dozen full-time faculty, two B.S. and two M.S. programs, budget, and several adjunct faculty and student workers; provided mentoring for faculty and staff, led strategic planning efforts, and managed staffing and curriculum. Research interests include aviation cybersecurity, maritime cybersecurity, and Automatic Identification System (AIS).
March 2011- June 2012 |
INTERIM ASSOCIATE PROGRAM DIRECTOR (ACADEMICS) (3/2011-8/2011)
PROGRAM DIRECTOR/ASSOCIATE PROFESSOR (9/2011-6/2012)
MASTER OF SCIENCE IN INFORMATION ASSURANCE (MSIA) PROGRAM
Norwich University
Northfield, Vermont |
Responsible for curriculum design and development, recruitment and retention of faculty, and student admissions for the graduate program. Initial task was to lead redesign of the program curricula to meet the evolving needs of the students, potential employers, and the marketplace.
July 2000- June 2010 |
ASSOCIATE PROFESSOR (2000-2010)
PROGRAM DIRECTOR, COMPUTER NETWORKING (2000-2007)
PROGRAM DIRECTOR, COMPUTER & DIGITAL FORENSICS (2003-2007)
PROGRAM DIRECTOR, INFORMATION SECURITY (2005-2007)
DIRECTOR, CENTER FOR DIGITAL INVESTIGATION (2006-2009)
PROGRAM DIRECTOR, M.S. IN DIGITAL INVESTIGATION MANAGEMENT (2009-2010)
Champlain College
Burlington, Vermont |
Initial primary role was to manage courses in the Computer Networking A.S. degree and professional certificate programs, and coordinate curriculum with other programs within the department, particularly Telecommunications. Responsible for staffing, and the hiring and management of full-time and adjunct faculty. Updated the curriculum to address information assurance and other up-to-date industry requirements, including the design of a 4-year B.S. Computer Networking degree commencing in 2002. Course development in the areas of Internet and Web architecture, TCP/IP, routers, computer and network security, and computer forensics. Primary developer of the Computer & Digital Forensics curriculum leading to a B.S. degree, commencing in 2003 (and becoming an online program in 2004); principal investigator on Dept. of Justice (DOJ) grant to design and coordinate e-crime curriculum in cooperation with the National Institute of Justice (NIJ) Electronic Crime Partnership Initiative (ECPI). Led effort to develop Information Security B.S. degree program, commencing in 2005, and teamwork leading to designation as a National Center of Academic Excellence in Information Assurance Education (CAEIAE) in 2007. Work with various industry groups to identify educational requirements for future workers in all of these fields. Led proposal for M.S. program in Digital Investigation Management (2005-07), participated in application for initial program approval by regional accreditation board (2007-08), was named program director (2009), managed and coordinated course development (2009-10), and led efforts for final accreditation of the program (2010). In 2006, assumed role of director of Champlain College Center for Digital Investigation (C3DI), a DOJ-funded grant project and partnership between the college, Vermont Internet Crimes Against Children (ICAC) Task Force, and several law enforcement training organizations. Additional work within the college community includes the development of college-wide educational competencies for undergraduates, member and co-chair of the Curriculum Committee (2002-2005), and information security instructor in college's Managing Innovation in Information Technology M.S. program. Also spearhead information security projects for the Vermont Information Technology Center (VITC), a collaboration between the Vermont Technology Council and Champlain College.
CONFERENCE ACTIVITIES:
- Presented "An Introduction to Cryptography, Certificates, and PKI" at SANS 2000, Monterey, October 2000.
- Presented "Introduction to TCP/IP for Intrusion Detection" tutorial at SANS D.C., December 2000.
- Presented "An Introduction to TCP/IP" tutorial at COMNET D.C. 2001, January 2001.
- Presented an "Overview of Telecommunications Technologies" to the Vermont Legislature, January 2001.
- Presented "Security and ISPs" talk at New York State Telecom Association and Telecommunications Association of New England (NYSTA/TANE) Annual Meeting, February 2001, Albany, NY.
- Co-presented "The Future of Infosec" at The 2001 e-protectIT Conference offered by Norwich University and the Vermont Army National Guard, March 2001, Northfield, VT.
- Webmaster and member of organizing committee, 26th IEEE Local Computer Networks Conference, November 2001.
- Presented updated "Security and ISPs" talk at Telecommunications Association of New England (TANE) Meeting, September 2001, Albany, NY.
- Presented "Recommended Security Practices" and "Ethics, the Internet, and Teenagers" at VITA-Learn, November 2001, Killington, VT.
- Presented "An Overview of the Global Analysis and Response Initiative at incidents.org" at The 4th e-protectIT Conference, Norwich University, March 2002, Northfield, VT.
- Presented "Recommended Security Practices" and "Ethics, the Internet, and Teenagers" at Dynamic Landscapes Symposium, May 2002, Burlington, VT.
- Presented "Recommended Security Practices" and "Ethics, the Internet, and Teenagers" at Vermont Library Conference, May 2002, Burlington, VT.
- Presented "Introduction to Computers and the Internet" at SAFETY NET: Multidisciplinary Approach to Investigating and Prosecuting Computer-Facilitated Crimes Against Children, sponsored by the National District Attorneys Association, June 2002, Burlington, VT. Hosted and organized this event on behalf of Champlain College.
- Presented cryptography sessions at the Information Technology Institute, Champlain College, part of the Governor's Institutes of Vermont, June 2002, Burlington, VT.
- Presented "Ethics, the Internet, and Teenagers" at VITA-Learn, November 2002, Killington, VT.
- Presented "Introduction to Computers and the Internet" and "Cryptography and Steganography" at Computer Crimes Basic Investigative Techniques courses, sponsored by the Vermont Internet Crimes Against Children Task Force and Vermont State Police, August 2002 and January 2003, Burlington, VT.
- Webmaster and member of organizing committee, 27th IEEE Local Computer Networks Conference, November 2002.
- Presented "Cyber Forensics" talk at ESCC/Internet2 Techs Workshop, February 2003.
- Presented "Computer Forensics: An Investigative Overview" to the annual meeting of the Vermont Chapter of the FBI National Academy Associates, March 2003, Rutland, VT.
- Presented "Cyberethics and K-12 Education" and "Applying Computer & Network Security to the K-12 Environment" at Dynamic Landscapes Symposium, May 2002, Castleton, VT.
- Webmaster and member of organizing and program committees, 28th IEEE Local Computer Networks Conference, October 2003.
- Presented "Cyberethics and K-12 Education" and "Computer Forensics" at VITA-Learn, November 2003, Killington, VT.
- Presented lectures on cryptography, steganography, and TCP/IP at HTCIA Annual Conference, September 2004.
- Keynote speaker on computer forensics education at Computer Forensics Symposium 2004, Metropolitan State University, St. Paul, MN, October 2004.
- Webmaster and member of organizing and program committees, 29th-32nd IEEE Local Computer Networks Conference, November 2004, November 2005, November 2006, and October 2007.
- Presented lectures on TCP/IP at Southeast Cybercrime Summit, March 2005.
- Presented lectures on cryptography, steganography, and TCP/IP at HTCIA Annual Conference, August 2005.
- Taught portions of Internet technology and investigations as part of CyberSleuth course for National District Attorneys Association, January 2006 and January 2007.
- Presented lectures on cryptography and TCP/IP at DoD Cyber Crime Conference, January 2006.
- Presented lectures on steganography and TCP/IP at Southeast Cybercrime Summit, March 2006.
- Participated in panel session on The Future of Digital Forensics, representing the academic perspective, at the Colloquium for Information Systems Security Education, June 2006.
- Presented lecture on online computer forensics training and education at the International Association of Directors of Law Enforcement Standards and Training (IADLEST) Annual Conference, June 2006.
- Presented lecture on academia's role in information security and digital forensics at the Cyber Security Summit, October 2006.
- Presented lectures on cell phone forensics and TCP/IP at the HTCIA Annual Conference, October 2006.
- Presented paper on online undergraduate digital forensics education and pedagogy at the 40th Hawaii International Conference on System Sciences (HICSS-40), January 2007.
- Presented lecture on cell phone forensics at DoD Cyber Crime Summit, January 2007.
- Presented lectures on cryptography and TCP/IP at the Southeast Cybercrime Summit, March 2007.
- Presented paper on network forensics and member of program committee, Conference on Digital Forensics, Security and Law, April 2007.
- Presented lectures on cell phone forensics, cryptography, TCP/IP protocol analysis, and Internet tools at the HTCIA Annual Conference, August 2007.
- Gave paper on experience with hands-on exercises in online computer forensics courses and participated on panel session, at CFET 2007: 1st International Conference on Cybercrime Forensics Education & Training, September 2007.
- Gave talk on the role of digital forensics at the Vermont Association of Investigative & Security Services Annual Meeting, October 2007.
- Presented keynote address ("The Acceptability of Digital Evidence") and paper on anti-forensics at the 5th Australian Digital Forensics Conference, December 2007.
- Presented paper on the pedagogy and design of an M.S. degree program in digital investigation management at the Digital Forensics Mini-Track, 41st Hawaii International Conference on System Sciences (HICSS-41), January 2008. Best Paper nominee.
- Gave talk on network forensics at The Computer Forensics Show, February 2008.
- Gave talk on the role of digital forensics at the Vermont Paralegal Association Annual Meeting, April 2008.
- Led workshop titled "Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate" at the Conference on Digital Forensics, Security and Law, April 2008.
- Gave talk on cell phone forensics at Mobile Forensics World, May 2008.
- Presented paper on hands-on digital forensics exercises and chaired paper session at Colloquium for Information Systems Security Education, June 2008. Received Best Paper award.
- Presented paper on mock trials in undergraduate digital forensics education and participated on panel session, at CFET 2008: 2nd International Conference on Cybercrime Forensics Education & Training, September 2008.
- Presented talk on TCP/IP investigative tools and led lab on TCP/IP protocol analysis and packet sniffing at the HTCIA Annual Conference, October 2008.
- Presented talk on computer forensics at Dartmouth College's Securing the eCampus 2.0 conference, November 2008.
- Led tutorial on computer forensics at the 42nd Hawaii International Conference on System Sciences (HICSS-42) (January 2009).
- Presented talk on the value and effectiveness of digital forensic evidence at the meeting of the New England chapter of the HTCIA, March 2009.
- Host and conference chair, Conference on Digital Forensics, Security and Law, Burlington, VT (May 2009)
- Presented talk on the process of mobile device forensics and participated in panel on standardization and certification of the mobile forensics process at Mobile Forensics World, May 2009.
- Presented talk on challenges of digital forensic evidence at TechnoSecurity, June 2009.
- Presented talk on future issues for digital forensics at the Annual Meeting of the New England Chapter of the FBI National Academy Associates, June 2009.
- Participate in panel session on Forensic Challenges in the Court Room at SANS Forensics & Incident Response Summit, July 2009.
- Presented talks on the challenges of digital evidence and the relationship between training, education, certification, and PI licensure at the HTCIA Annual Conference, August 2009.
- Led Webinar about Tracing IP Addresses on behalf of Vere Software, October 2009.
- Presented talk about cryptography and steganography to the Vermont Anti-Terrorism/Law Enforcement Coordination Committee, November 2009.
- Presented talks about cryptography, TCP/IP protocol analysis, and a jihadist cryptosystem at the DoD Cybercrime Conference, January 2010.
- Presented talk on steganography at Victim's Rights: Emerging Issues in the Criminal Justice System Conference, April 2010.
- Presented talk on mobile device forensics process at Mobile Forensics World, May 2010.
- Member of the "Curriculum Design and Implementation in Computer Forensics Education" panel at the Conference of Digital Forensics, Security and Law, May 2010.
- Presented talk on cryptography at TechnoSecrity, June 2010.
- Presented talk on "Computer Forensics for Judges" at Vermont Judicial College, June 2010.
- Presented talk on challenges to digital evidence at the 4th International Conference on Cyberlaw, August 2010.
- Presented talks on TCP/IP protocol analysis and cryptography at the 2010 HTCIA Annual Conference, September 2010.
- Presented keynote speech about information security and talks on cell phone analysis and TCP/IP investigative tools at the 2010 Wisconsin Association of Computer Crime Investigators (WACCI) Conference, October 2010.
- Presented talks on TCP/IP protocol analysis and tracing IP addresses tools at the 2011 Computer and Enterprise Investigations Conference (CEIC), May 2011.
- Presented talks on the process of mobile device forensics and Cryptography and Steganography Apps on the iPhone at the TechnoSecurity/Mobile Forensics Conference, June 2011.
- Presented talk on cryptography at the DoD Cyber Crime Conference, January 2012.
- Presented talks on the process of mobile device forensics and cryptography at the National Cyber Crime Conference, April/May 2012.
- Presented talk on challenges to digital forenic evidence at The Evidence Conference, October 2012.
- Presented talks on on tracing IP address and report writing, and moderated judges panel at the National Cyber Crime Conference, April 2013.
- Presented talk about cryptography and steganography, Florida High Technology Crime Investigation Association (HTCIA) Chapter meeting, Ft. Lauderdale, FL, December 2013.
- Presented TCP/IP packet sniffing and IP address tracing tutorials at Florida Internet Crimes Against Children (ICAC) Annual Conference, Orlando, FL, December 2013.
- Presented "Cybersecurity Education in a Homeland Security Curriculum" and co-chaired IS Education and Training mini-track, 47th Hawaii International Conference on System Sciences (HICSS-47), Waikoloa, HI, January 2014.
- Presented report writing talk and moderated judges' panel on digital evidence at the National Cyber Crime Conference (NCCC), Boston, MA, April 2014.
- Presented "Report Writing" and "Tracing IP Addresses" at the Appalachian Institute of Digital Evidence (AIDE) 2014 Conference, Marshall University Forensic Science Center, Huntington, WV, April 2014.
- Invited speaker: "Is Cell Phone Forensics Really Forensics?" at the NIST Mobile Forensics Workshop and Webcast, Gaithersburg, MD, June 2014.
- Invited speaker: "Lone Wolf Cyberterrorism" at the NATO Advanced Research Workshop Lone Actors -- An Emerging Security Threat, Jerusalem, Israel, November 2014.
- Presented TCP/IP packet sniffing and IP address tracing tutorials at the Florida Internet Crimes Against Children (ICAC) Annual Conference, Orlando, FL, December 2014.
- Presented "Exploring Myths in Digital Forensics" at the American Academy of Forensic Sciences Annual Meeting, February 2015.
- Presented "Solid State Device Forensics," "Tracing IP Addresses," "Report Writing," and "Mobile Device Forensics" at the National Cyber Crime Conference (NCCC), Boston, MA, April 2015.
- Presented "Lone Operator Cyberterrorism" and "Myths of Digital Forensics" at the Appalachian Institute of Digital Evidence (AIDE) 2015 Conference, Marshall University Forensic Science Center, Huntington, WV, April 2015.
- Presented IP address tracing, mobile device forensics, solid state devices, and wireless network fundamentals tutorials at Florida Internet Crimes Against Children (ICAC) Annual Conference, Orlando, FL, December 2015.
- Presented SSD forensics, tracing IP addresses, and mobile device forensics at the National Law Enforcement Training on Child Exploitation Annual Conference, Atlanta, GA, April 2016.
- Presented "IP Address Tracing," "Mobile Device Forensics," "Overview of Wireless Networks," and "Report Writing" at the National Cyber Crime Conference, April 2016.
- Invited speaker: "Identification of Potential Terrorists and Adversary Planning" session at the NATO Advanced Research Workshop on Emerging Technologies and New Counter-Terror Strategies, Washington, D.C., July 2016.
- Presented "Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education," 50th Hawaii International Conference on System Sciences (HICSS-50), January 2017.
- Panelist at President's Forum on Data -- "The New Game in Cyber Security: Security Analytics," University at Albany, New York, March 2017.
- Presented talks on on tracing IP addresses, IP version 6, router forensics, and report writing at the National Cyber Crime Conference, Boston, April 2017.
- Led "Cryptography," "Tracing IP Addresses," and "TCP/IP and Packet Sniffing" at Crimes Against Children Conference, Dallas, August 2017.
- Presented talk on Aviation Cybersecurity at Safeskies Australia, Canberra, ACT, October 2017.
- Presented talks on on tracing IP addresses, NTFS, mobile device forensics, and report writing at the National Cyber Crime Conference, Boston, April 2018.
- Participated in panel session on human factors in cybersecurity sponsored by Human Factors & Ergonomics Society, July 2018, with talk titled "Human Factors and the Computer Interface: Does Easier to Use Improve Understanding?"
- Presented "Aviation Cybersecurity" talk as part of Technology in Aviation panel at 31st National Training Aircraft Symposium, Daytona Beach, August 2018.
- Presented "Air & Space Information Sharing and Analysis Organization (AS-ISAO)" at the International Association of Certified ISAOs (IACI) Cyber Summit, Cape Canaveral, November 2018.
- Presented "Cyber Attacks and Physical Property Damage" at ASTM F25 Workshop on Autonomous Shipping, Vessel Automation and Maritime Cyber Security, Washington, D.C., December 2018.
- Presented talk on "Passwords, Cryptography, Privacy, and the Fifth Amendment" at the Interdisciplinary Conference on Cybercrime, Michigan State University, E. Lansing, MI, April 2019.
- Presented talks on tracing IP addresses, router forensics, wireless technologies, and VPNs and the Dark Web at the National Cyber Crime Conference, Boston, April 2019.
- Keynote presentation on "Passwords, Cryptography, Privacy, and the Fifth Amendment" at the ADFSL Conference of Digital Forensics, Security and Law, Embry-Riddle Aeronautical University, Daytona Beach, May 2019.
- Presented talk on maritime cybersecurity at National Marine Electronics Association (NMEA) 2019 Conference & Expo, September 2019.
- Presented talks on tracing IP addresses, router forensics, wireless technologies, and crypto/privacy/5th Amendment at the National Cyber Crime Conference, Boston, July 2020.
- Presented talks on AIS security at DEF CON/Hack The Sea Village, August 2020 and August 2021.
- Presented talks on "Cyberterrorism" and "Maritime Cybersecurity" as part of the Naval Education and Training Security Assistance Field Activity (NETSAFA) course on International Anti-terrorism/Anti-piracy (IATP) course, December 2016-present.
OTHER PROFESSIONAL ACTIVITIES:
- Internet Crimes Against Children (ICAC)
- Technical adviser to Vermont ICAC (1999-2012). Helped organize and deliver computer and network first responder training to police officers in the region, and hosted courses from other organizations.
- Participated in computer and network investigations. Lead mobile device examiner for the Vermont ICAC (2006-2012).
- Public awareness outreach coordinator, Vermont ICAC (2008-2012).
- Have presented webinars and training videos for the National ICAC training program (2011-present).
- Member of the North Florida ICAC (2012-pressent) and Hawaii ICAC (2013-present).
- Originated the Vermont Information Security Coordination Center at Champlain College (2000) leading to the formation of the Vermont InfraGard chapter, (2001). Chapter Chair, (2000-2005), Webmaster (2000-2012), Secretary (2006-2012).
- Board member of Vermont Telecom Advancement Center (http://www.vtac.org), 2001-2004.
- Member of SANS faculty, 2000-2002. Primary focus on TCP/IP, security essentials, and cryptography.
- Teach about cryptography and steganography for the Information Operations training taught to U.S. National Guard units by the Vermont National Guard, 2001-2011.
- Security Technology chair for the IEEE Technical Committee on Computer Communications (TCCC), 2002-2005.
- Adjunct member of graduate faculty in the Master of Science in Information Assurance (MSIA) program at Norwich University, Northfield, VT, 2002-2003.
- Taught computer forensics course for educators, Boston Area Advanced Technological Education Center (BATEC), July 2005 and July 2006.
- Editorial board member (2005-2006) and Associate Editor (2007-2010), Journal of Digital Forensic Practice.
- Editorial board member (2005-present), Associate Editor (2009-2010), Book Review Editor (2006-2010), and Editor-in-Chief (2011-2013), Journal of Digital Forensics, Security and Law.
- International Board of Referees (2006-present), Digital Investigation.
- Certified Computer Examiner (CCE) Bootcamp® instructor (2007-2013).
- Member of Forensic Education Program Accreditation Committee (FEPAC) (2008-2010).
- U.S. Department of State, Diplomatic Security Service, Anti-Terrorism Assistance Cybertraining program instructor (2008-2011).
- Member of the Digital Forensics Certification Board (DFCB), Certification and Testing Committee (2008-2010).
- Editorial review board, International Journal of Digital Crime and Forensics (2008-present).
- Member of program committee, Symposium on Applied Computing (SAC), Computer Forensics track (2008-present).
- Board member, Consortium of Digital Forensic Specialists (CDFS) (2010-2017); Treasurer (2011-2017).
- Member of program committee, The 4th International Conference on Cyberlaw (2010).
- Member of program committee, The 5th International Conference on Digital Forensics & Cyber Crime, Moscow, September 2013 (Sponsored by European Alliance for Innovation).
- Member of program committee, ADFSL Conference on Digital Forensics, Security and Law, June 2013.
- Co-chair of Information Systems Education and Training mini-track for the Hawaii International Conference on System Sciences, January 2014.
- International Society for Forensic Computing Examiners (ISFCE) Certified Computer Examiner (CCE) Appeals Committee (July 2013-present).
- Lecturer on cyberterrorism and maritime cybersecurity, International Anti-Terrorism/Anti-Piracy program, NAS Pensacola (December 2016-present).
- Advisory board to Maritime & Port Security Information Sharing and Analysis Orgnaization (MPS-ISAO) (November 2017-present).
- Pre-processor/user interface and NMEA sentence unpacker code contributed to TrendMicro AIS BlackToolkit.
PUBLICATIONS:
- METROPOLITAN AREA NETWORKS: Concepts, Standards, and Services. New York: McGraw-Hill, 1992. (GCK & D.A. Train).
- "An Overview of TCP/IP Protocols and the Internet." Originally written and posted on the Internet, August 1994; continuously updated. URL: http://www.garykessler.net/library/tcpip.html.
- ISDN: Concepts, Facilities, and Services, 4th ed. New York: McGraw-Hill, 1998. (GCK & P.V. Southwick)
- Kessler, G.C., Dayvie, R.J., & Martin, C.T. (2000, January). The Power of Packet Filtering. Windows NT Magazine.
- Kessler, G.C. (2000, February). Roaming PKI. Information Security Magazine.
- Kessler, G.C. (2000, April). Web of Worries. Information Security Magazine.
- Hamilton, A., & Kessler, G.C. (2000). Real-World Routing: Advice from the Field. In C. Brenton, Mastering Cisco Routers. San Francisco: SYBEX.
- Kessler, G.C. (2000, June). How DNS Works: What It Means to the Customer Getting Connected. Windows 2000 Magazine.
- Kessler, G.C. (2000, July). Securing Cable Modems. Information Security Magazine.
- Kessler, G.C., & Pritsky, N.T. (2000, October). Cache on Demand: An Update on SSL, SET, and IOTP. Information Security Magazine.
- Kessler, G.C. (2000, November). Security at the Speed of Thought. Information Security Magazine.
- Kessler, G.C. (2001, January). Binary Numbers and Subnet Masks. Windows 2000 Magazine.
- Kessler, G.C. (2001, March/April). Some Non-Technical Hurdles to Implementing Effective Security Policies. IEEE ITPro Magazine, 3(2), 49-52.
- Kessler, G.C. (2001, April). Norton Internet Security Provides a Total Solution for the Home. Information Security Magazine.
- Kessler, G.C. (2001, June). Plugging Leaky Holes. Information Security Magazine.
- Kessler, G.C. (2001, August). IDS-in-Depth. Information Security Magazine.
- Kessler, G.C. (2001, September). Sam Spade, Systems Detective. Information Security Magazine.
- Kessler, G.C. (2002, February). Security Expressions. Information Security Magazine.
- Kessler, G.C. (2002, April). Steganography: Hiding Data in Data. Windows & .NET Magazine.
- Kessler, G.C., & Schirling, M.E. (2002, April). Cracking the Books, Cracking the Case: A Review of Computer Forensics Texts. Information Security Magazine.
- Levine, D.E., & Kessler, G.C. (2002). Denial of Service Attacks. In M. Kabay, & S. Bosworth (Eds.). Computer Security Handbook, 4th ed. New York: John Wiley & Sons.
- Kessler, G.C., & Pritsky, N.T. (2002). Local Area Network Security. In M. Kabay, & S. Bosworth (Eds.). Computer Security Handbook, 4th ed. New York: John Wiley & Sons.
- Kessler, G.C., & Pritsky, N.T. (2002). Local Area Network Topologies and Design. In M. Kabay, & S. Bosworth (Eds.). Computer Security Handbook, 4th ed. New York: John Wiley & Sons.
- Kessler, G.C. (2003). Contributed to "Fundamentals of Routers and Routing" and "Introduction to Cryptography" chapters. In E. Cole et al. (Ed.). SANS Security Essentials with CISSP CBK, Version 2.1. SANS Institute.
- Kessler, G.C. (2004, January). Book Review: Guide to Computer Forensics and Investigations (Nelson et al.). FBI Forensic Science Communications, 6(1).
- Kessler, G.C. (2004, July). An Overview of Steganography for the Computer Forensics Examiner. FBI Forensic Science Communications, 6(3).
- Kessler, G.C. (2004, Summer). Steganography: Implications for the Prosecutor and Computer Forensics Examiner. American Prosecutors Research Institute Child Sexual Exploitation Program UPDATE, I(1).
- Kessler, G.C. (2006, January 31). The Role of Computer Forensics in Law Enforcement. OFFICERS.com Web site.
- Kessler, G.C. (2006). Special Feature: Computer Forensics. In G.B. Shelly, T.J. Cashman, & M.E. Vermaat, Discovering Computers 2006: A Gateway to Information. Boston: Thomson Course Technology.
- Kessler, G.C. (2006, First quarter). Book Review: Cognition, Education, and Communication Technology (Gardenfors & Johansson). The Internet and Higher Education, 9(1).
- Beebe, N., Kessler, G.C., & Rogers, M. (2006, March). Book Review: Computer Evidence: Collection & Preservation (Brown). Journal of Digital Forensic Practice, 1(1), 71-72.
- Kessler, G.C., & Schirling, M.E. (2006). The Design of an Undergraduate Degree Program in Computer & Digital Forensics. Journal of Digital Forensics, Security and Law, 1(3), 37-50.
- Beebe, N., & Kessler, G.C. (2006, December). Book Review: Real Digital Forensics: Computer Security and Incident Response (Jones, Bejtlich, & Rose). Journal of Digital Forensic Practice, 1(4), 325-326.
- Kessler, G.C. (2006). Book Review: Digital Crime and Forensic Science in Cyberspace (Kanellis, Kiountouzis, Kolokotronis, & Martakos). Journal of Digital Forensics, Security and Law, 1(4), 67-69.
- Kessler, G.C. (2007). Special Feature: Computer Forensics. In G.B. Shelly, T.J. Cashman, & M.E. Vermaat, Discovering Computers 2007: A Gateway to Information. Boston: Thomson Course Technology.
- Kessler, G.C. (2007, January). Online Education in Computer and Digital Forensics: A Case Study. In R. Sprague (ed.), Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS-40), IEEE Computer Society.
- Kessler, G.C. (2007). Book Review: No Place to Hide (O'Harrow). Journal of Digital Forensics, Security and Law, 2(1), 93-95.
- Kessler, G.C., & Fasulo, M. (2007, April). The Case for Teaching Network Protocols to Computer Forensics Examiners. In G. Dardick (Ed.), Proceedings of the Conference on Digital Forensics, Security and Law, pp. 115-137.
- Kessler, G.C. (2007, August/September). The Role of Computer Forensics for the Paralegal Community. Paralegal Focus (Newsletter of the Vermont Paralegal Organization), 4(3), 8-11.
- Kessler, G.C. (2007, September). Book Review: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 2nd ed. (Casey). Criminal Justice Review, 32(3), 280-282.
- Kessler, G.C. (2007, September). Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online. In D. Edgar-Nevill (Ed.), Proceedings of CFET 2007: 1st International Conference on Cybercrime Forensics Education & Training. Canterbury, UK: Canterbury Christ Church University.
- Kessler, G.C. (2007). Book Review: Conquest in Cyberspace: National Security and Information Warfare (Libicki). Journal of Digital Forensics, Security and Law, 2(2), 67-70.
- Kessler, G.C. (2007, December). Anti-Forensics and the Digital Investigator. In C. Valli & A. Woodward (Ed.), Proceedings of the 5th Australian Digital Forensics Conference. Mt. Lawley, Western Australia: Edith Cowan University.
- Kessler, G.C., & Haggerty, D. (2008, January). Pedagogy and Overview of a Graduate Program in Digital Investigation Management. In R. Sprague (ed)., Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS-41), IEEE Computer Society. HICSS Best Paper nominee.
- Kessler, G.C. (2008). Special Feature: Computer Forensics. In G.B. Shelly, T.J. Cashman, & M.E. Vermaat, Discovering Computers 2008: A Gateway to Information. Boston: Thomson Course Technology.
- Kessler, G.C. (2008, March). On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. Journal of Digital Forensic Practice, 2(1), 43-53.
- Kessler, G.C. (2008). Book Review: Challenges to Digital Forensic Evidence (Cohen). Journal of Digital Forensics, Security and Law, 3(1), 57-59.
- Kessler, G.C., & Hoag, J. (2008, June). The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty. In R. Dodge (Ed.), Proceedings of the 12th Colloquium for Information Systems Security Education. Best Colloquium Paper Award.
- Kessler, G.C., Simpson, R., & Fry, J. (2008, September). Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials. In D. Edgar-Nevill (Ed.), Proceedings of CFET 2008: 2nd International Conference on Cybercrime Forensics Education & Training. Canterbury, UK: Canterbury Christ Church University.
- Kessler, G.C. (2008). Book Review: The dotCrime Manifesto: How to Stop Internet Crime (Hallam-Brown). Journal of Digital Forensics, Security and Law, 3(2), 71-73.
- Kessler, G.C. (2008). Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit (Varsalone, Kubasiak, Morrissey et al.). Journal of Digital Forensics, Security and Law, 3(4), 59-62.
- Kessler, G.C., & Levine, D.E. (2009). Chapter 18: Denial-of-Service Attacks. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 5th ed. New York: John Wiley & Sons.
- Kessler, G.C. & Pritsky, N.T. (2009). Chapter 6: Network Topologies, Protocols, and Design. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 5th ed. New York: John Wiley & Sons.
- Kessler, G.C. & Pritsky, N.T. (2009). Chapter 25: Local Area Networks. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 5th ed. New York: John Wiley & Sons.
- Kessler, G.C., Simpson, R., & Fry, J. (2009). Multidisciplinary Learning Using Mock Trials. International Journal of Electronic Security and Digital Forensics, 2(2), 141-155.
- Browning, D., & Kessler, G.C. (2009, May). Bluetooth Hacking: A Case Study. In G. Dardick (Ed.), Proceedings of the Conference on Digital Forensics, Security and Law, May 20-22, 2009, Burlington, VT.
- Browning, D., & Kessler, G.C. (2009). Bluetooth Hacking: A Case Study. Journal of Digital Forensics, Security and Law, 4(2), 57-71.
- Kessler, G.C. (2009). Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Knapp, ed.). Journal of Digital Forensics, Security and Law, 4(3), 57-59.
- Kessler, G.C., & Haggerty, D.A. (2010, January). An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview. Journal of Digital Forensic Practice, 3(1), 11-22.
- Kessler, G.C. (2010, January). Book Review: Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility (Jones & Valli). Journal of Digital Forensic Practice, 3(1), 62-63.
- Kessler, G.C. (2010, January). Book Review: Windows Forensic Analysis DVD Toolkit, 2/e (Carvey). Journal of Digital Forensic Practice, 3(1), 64-66.
- Mislan, R.P., Casey, E., & Kessler, G.C. (2010). The Growing Need for On-Scene Triage of Mobile Devices. Digital Investigation, 6(3-4), 112-124.
- Kessler, G.C. (2010). Book Review: Digital Forensic Evidence Examination, 2nd ed. (Cohen). Journal of Digital Forensics, Security and Law, 5(2), 85-88.
- Kessler, G.C. (2010). Judges' Awareness, Understanding, and Application of Digital Evidence. Doctoral dissertation, Nova Southeastern University (Ft. Lauderdale, FL).
- Lessard, J., & Kessler, G.C. (2010, September). Android Forensics: Simplifying Cell Phone Examinations. Small Scale Digital Device Forensics Journal, 4(1).
- Kessler, G.C. (2011, February). Client Virtualization and the Impact on Computer Forensics. STATETECH Magazine.
- Kessler, G.C., & Hosmer, C. (2011). An Overview of Steganography. In M.V. Zelkowitz (ed.), Advances in Computers, Volume 83 (pp. 51-107). Burlington (MA): Academic Press.
- Kessler, G.C. (2011). Judges' Awareness, Understanding, and Application of Digital Evidence. Journal of Digital Forensics, Security and Law, 6(1), 55-72.
- Kessler, G.C. (2012, February). Information Security: New Threats or Familiar Problems? IEEE Computer Magazine, 45(2), 59-65.
- Carlton, G.H., & Kessler, G.C. (2012). Identifying Trace Evidence from Target-Specific Data Wiping Application Software. Journal of Digital Forensics, Security and Law, 7(2), 113-146.
- Kessler, G.C. (2012, December). Guest Editor's Introduction: Advancing the Science of Digital Forensics. Computer, 45(12), 25-27.
- Kessler, G.C., & Mislan, R.P. (2013). Cellular Phones. In J.A. Siegel & P.J. Saukko (eds.), Encyclopedia of Forensic Sciences, 2nd ed., pp. 298-302. Waltham: Academic Press.
- Kessler, G.C., & Ramsay, J. (2013). Paradigms for Cybersecurity Education in a Homeland Security Program. Journal of Homeland Security Education, 2, 35-44.
- Kessler, G.C. (2014). Impact of cyber security on critical infrastructure -- The Advanced Persistent Threat. In J.D. Ramsay & L. Kiltz (Eds.), Case Studies in Homeland Security. New York: Perseus Books.
- Kessler, G.C., & Ramsay, J.D. (2014). A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students. In R. Sprague (ed)., Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS-47), IEEE Press, pp. 4932-4937.
- Kessler, G.C. (2014). Chapter 6: Network Topologies, Protocols, and Design. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 6th ed. New York: John Wiley & Sons.
- Kessler, G.C. (2014). Chapter 18: Denial-of-Service Attacks. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 6th ed. New York: John Wiley & Sons.
- Pritsky, N.T., Bumblis, J., & Kessler, G.C. (2014). Chapter 25: Local Area Networks. In S. Bosworth, M.E. Kabay, & E. Whyne (Eds.). Computer Security Handbook, 5th ed. New York: John Wiley & Sons.
- Kessler, G.C. (2014). Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory. Journal of Digital Forensics, Security and Law, 8(4), 57-63.
- Kessler, G.C., & Carlton, G.H. (2014). An Analysis of Forensic Imaging in the Absence of Write-Blockers. Journal of Digital Forensics, Security and Law, 9(3), 51-58.
- Kessler, G.C. (2015). Are mobile device examinations practiced like 'forensics'? Digital Evidence and Electronic Signature Law Review, 12. DOI: http://dx.doi.org/10.14296/deeslr.v12i0.2210
- Kessler, G.C. (2015). Lone Operator Cyberterrorism From The Perspective of a Hacker. In A. Richman & Y. Sharan (eds.), Lone Actors - An Emerging Security Threat, NATO Science for Peace and Security Series - E: Human and Societal Dynamics, 123 (pp. 45-50). Amsterdam: IOS Press.
- Kessler, G.C. (2016, Winter). Lone Operator Cyberterrorism. Journal of Information Warfare, 15(1), 15-28.
- Pelosi, M.J., Kessler, G.C., & Brown, M.S. (2016). One-Time Pad Encryption Steganography System. In G. Dardick (ed.), Proceedings of the ADFSL Conference on Digital Forensics, Security and Law.
- Kessler, G.C. (2016, Fall). The Wrecks of Lake Champlain. MAHSnews, The Newsletter of the Maritime Archaeological and Historical Society, 27(2), 5-8.
- Kessler, G.C. (2016). The Impact of MD5 File Hash Collisions on Digital Forensic Imaging. Journal of Digital Forensics, Security & Law, 11(4), 129-138.
- Kessler, G.C. (2016). The Impact of SHA-1 File Hash Collisions on Digital Forensic Imaging: A Follow-Up Experiment. Journal of Digital Forensics, Security & Law, 11(4), 139-148.
- Ab Rahman, N.H., Kessler, G.C., & Choo, K.-K.R. (2017). Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory. In K.-K.R. Choo & A. Dehghantanha (Eds.). Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 131-146. Cambridge (MA): Syngress/Elsevier. DOI: 10.1016/B978-0-12-805303-4.00009-5
- Kessler, G.C., Dardick, G.S., & Holton, D.L. (2017). Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education. In T. Bui & R. Sprague (eds.), Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), IEEE Press. DOI: http://hdl.handle.net/10125/41172.
- Kessler, G.C. (2017). Technologies in Cyberspace: A Context of Threats and Defenses. In T.J. Gordon, E. Florescu, J.C. Glenn, & Y. Sharan (eds.), Identification of Potential Terrorists and Adversary Planning, NATO Science for Peace and Security Series - E: Human and Societal Dynamics, 132 (pp. 60-74). Amsterdam: IOS Press.
- Kessler, G.C. & Carlton, G.H. (2017, October-December). Exploring Myths in Digital Forensics: Separating Science From Ritual. International Journal of Interdisciplinary Telecommunications and Networking, 9(4), 1-9.
- Kessler, G.C. (2017, November 8). Web Site Security for Seaports and Shipping Lines. The Maritime Executive Online. Retrieved from https://www.maritime-executive.com/editorials/web-site-security-for-seaports-and-shipping-lines
- Kessler, G.C. (2017, Fall). Aviation Cybersecurity. Contrails, 3(4), 26-27.
- Pelosi, M., Poudel, N., Lamichhane, P., Lam, D., Kessler, G., & MacMonagle, J. (2018, May). Positive Identification of LSB Image Steganography Using Cover Image Comparisons. In G. Dardick (ed.), Proceedings of the 2018 ADFSL Conference on Digital Forensics, Security and Law.
- Carlton, G.H. & Kessler, G.C. (2018, June). A Study of Forensic Imaging to Evaluate "Unsanitized" Destination Storage Media. International Journal of Interdisciplinary Telecommunications and Networking, 10(3), 55-61. DOI: 10.4018/IJITN.2018070105
- Carlton, G.H. & Kessler, G.C. (2018, June). Disconnects of Specialized Mobile Digital Forensics within the Generalized Field of Digital Forensic Science. International Journal of Interdisciplinary Telecommunications and Networking, 10(3), 62-65. DOI: 10.4018/IJITN.2018070106
- Haass, J., Craiger, J.P., and Kessler, G.C. (2018). A Framework and Taxonomy for Aviation Cybersecurity. In Proceedings of the 2018 IEEE National Aerospace & Electronics Conference (NAECON) 2018, July 23-26, 2018, Dayton, Ohio.
- Craiger, J.P., Kessler, G.C., & Rose, W.E. (2018). sUAS Cybersecurity Threats, Vulnerabilities, and Exploits: A Case Study. In Proceedings of the 31st National Training Aircraft Symposium (NTAS), August 13-15, 2018, Embry-Riddle Aeronautical University, Daytona Beach, Florida.
- Kessler, G.C., Craiger, J.P., & Haass, J.C. (2018, September). A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 12(3), 429-437. DOI: 10.12716/1001.12.03.01
- Kessler, G.C. (2018, October 12). Cybersecurity and the Return-on-Negligence. The Maritime Executive Online. https://www.maritime-executive.com/editorials/cybersecurity-and-the-return-on-negligence
- Craiger, J.P. & Kessler, G.C. (2019, Winter). Drone Cybersecurity. Contrails, 5(1), 43-46.
- Kessler, G.C. (2019, Spring). Cybersecurity in the Maritime Domain. Proceedings of the USCG Marine Safety & Security Council, 76(1), 34-39. https://www.dco.uscg.mil/Portals/9/DCO%20Documents/Proceedings%20Magazine/Archive/2019/Vol76_No1_Spring2019.pdf
- Craiger, J.P, & Kessler, G.C. (2019). Cybersecurity. In J.R. Rudolph, Jr. & W.J. Lahneman, Eds., Combating Terrorism in the 21st Century: American Laws, Strategies, and Agencies. Santa Barbara, California: ABC-CLIO.
- Craiger, J.P, & Kessler, G.C. (2019). Cyberterrorism, Cyberwarfare, Cybercrime, Cyberespionage, and Hacktivism. In J.R. Rudolph, Jr. & W.J. Lahneman, Eds., Combating Terrorism in the 21st Century: American Laws, Strategies, and Agencies. Santa Barbara, California: ABC-CLIO.
- Mraz, R., Kessler, G.C., Gold, E., & Cline, J.G. (2020). Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use. International Journal of Transport and Vehicle Engineering, 14(4).
- Kessler, G.C. (2020, June). Protected AIS: A Demonstration of Capability Scheme to Provide Authentication and Message Integrity. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 14(2), 279-286. DOI: 10.12716/1001.14.02.02.
- Kessler, G.C. & Phillips, A.M. (2020). Cryptography, Passwords, Privacy, and the Fifth Amendment. Journal of Digital Forensics, Security & Law, 15(2), article 2. https://commons.erau.edu/jdfsl/vol15/iss2/2/
- Kessler, G.C. & Shepard, Steve D. (2020). Maritime Cybersecurity: A Guide for Leaders and Managers. Kindle Direct Publishing. https://www.garykessler.net/MaritimeCybersecurityBook/
- Kessler, G.C. (2021, Winter). Aviation and Attacks on GPS. TBM, 11(1), 13-20. https://publications.southdata.com/TBM/Winter2021/13/
- Kessler, G.C., & Zorri, D.M. (2021). Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF. Joint Special Operations University (JSOU) Report 21-4. MacDill Air Force Base (FL): The JSOU Press. https://jsouapplicationstorage.blob.core.windows.net/press/12/21-4.pdf
- Zorri, D.M., & Kessler, G.C. (2021, September 8). Cyber Threats and Choke Points: How Adversaries are Leveraging Maritime Cyber Vulnerabilities for Advantage in Irregular Warfare. Modern War Institute at West Point.
- Kessler, G.C. (2021, September). The CAN Bus in the Maritime Environment - Technical Overview and Cybersecurity Vulnerabilities. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 531-540. DOI: 10.12716/1001.15.03.05.
- Loomis, W., Singh, V.V., Kessler, G.C., & Bellekens, X. (2021, October). RAISING THE COLORS: Signaling for Cooperation on Maritime Cybersecurity. Cyber Statecraft Initiative, Scowcroft Center for Strategy and Security, Atlantic Council.
- Kessler, G.C. & Shepard, Steve D. (2022). Maritime Cybersecurity: A Guide for Leaders and Managers, 2nd. ed. Kindle Direct Publishing. https://www.garykessler.net/MaritimeCybersecurityBook/
- Kessler, G.C. (2022, April 19). Information Security, the MTS of the Future, and the New Convergence. The Maritime Executive. https://www.maritime-executive.com/editorials/information-security-the-mts-of-the-future-and-the-new-convergence
- Meadors, T.B., & Kessler, G.C. (2023, January 25). Improving the Speed of Cyberdefense: Seven Key Metrics. The Maritime Executive.. https://www.maritime-executive.com/editorials/improving-the-speed-of-cyberdefense-seven-key-metrics-to-know
SELECT COMMUNITY ACTIVITIES:
- U.S. Coast Guard Auxiliary, Flotilla 44, Daytona Beach, 2017-present.
- Volusia County Reef Report, 2016-present.
- Volusia County Reef Research Dive Team, 2013-2016.
- Volusia County Sheriff's Office/N. Florida ICAC, 2012-2014.
- Southwind Condominium Association Board, 2005-2012; Board President, 2009-2012.
- American Heart Association Cardiopulmonary Resuscitation (CPR) instructor, 1999-2002.
- Member of Green Mountain Critical Incident Stress Management Team, 1997-2012; Webmaster, 2015-present.
- Vermont Emergency Medical Technician (EMT), 1979-2006.
- Malletts Bay Fire Department, Colchester, Vermont, 1979-1981, 1984-1986.
- Colchester Rescue Squad, Colchester, Vermont, 1978-1981, 1984-1999, 2002-2005. Positions held include Chief (1987-1994, 1995-1996) and Assistant Chief (1986-1987, 1995). Also statistician (1979-1999) and Webmaster (1996-2005). Elected Life Member, 1999.