Gary Kessler Associates
  
 
 
 
- "Job Aids"
 
 
 - Maritime Cybersecurity
 
- Kessler, G.C., & Zorri, D.M. (2024, October). AIS Spoofing: A Tutorial for Researchers. 2nd International Special Track on Maritime Communication and Security (MarCaS), 2024 IEEE 49th Conference on Local Computer Networks (LCN), Caen, France, 8-10 October 2024. DOI:  10.1109/LCN58197.2023.10223402. Also, here.
 
- Armenzoni, A., Pili, G., & Kessler, G.C. (2024, June 13). Red Flags: Russian Oil Tradecraft in the Mediterranean Sea. Proceedings of the U.S. Naval Institute, 150(6), 1456.  https://www.usni.org/magazines/proceedings/2024/june/red-flags-russian-oil-tradecraft-mediterranean-sea
  
- Armenzoni, A., Pili, G., & Kessler, G.C. (2024, June 5). Mass AIS Spoofing Event "Moves" Dozens of Ships to Crimean Airport. The Maritime Executive.  https://www.maritime-executive.com/editorials/mass-ais-spoofing-event-moves-dozens-of-ships-to-crimean-airport
  
- Zorri, D.M., & Kessler, G.C. (2024, March 11). Position, Navigation, and Timing Weaponization in Maritime Domain: Orientation in the Era of Great Systems Conflict - Analysis. Eurasia Review.  https://www.eurasiareview.com/11032024-position-navigation-and-timing-weaponization-in-maritime-domain-orientation-in-era-of-great-systems-conflict-analysis/
 
- Zorri, D.M., & Kessler, G.C. (2024, 1st Quarter). Position, Navigation, and Timing: Weaponization in the Maritime Domain Orientation in the Era of Great Systems Conflict. Joint Forces Quarterly, 112, 12-21.  https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-112/jfq-112.pdf
 
- Kessler, G.C. (2024, January 1). AI, Cybersecurity, and the Maritime Transportation System. The Maritime Executive.  https://www.maritime-executive.com/editorials/ai-cybersecurity-and-the-maritime-transport-system
 
-  AIS Research Using a Raspberry Pi (2023, September 11)
 
- Meadors, T.B., & Kessler, G.C. (2023, January 25). Improving the Speed of Cyberdefense: Seven Key Metrics. The Maritime Executive.  https://www.maritime-executive.com/editorials/improving-the-speed-of-cyberdefense-seven-key-metrics-to-know
 
- Kessler, G.C. (2022, May 11). Cybersecurity as a Team Sport: Resiliency, Agility and Cooperation. The Maritime Executive.  https://www.maritime-executive.com/editorials/cybersecurity-as-a-team-sport-resiliency-agility-and-cooperation
 
- Kessler, G.C. (2022, April 19). Information Security, the MTS of the Future, and the New Convergence. The Maritime Executive.  https://www.maritime-executive.com/editorials/information-security-the-mts-of-the-future-and-the-new-convergence
 
- Loomis, W., Singh, V.V., Kessler, G.C., & Bellekens, X. (2021, October). RAISING THE COLORS: Signaling for Cooperation on Maritime Cybersecurity. Cyber Statecraft Initiative, Scowcroft Center for Strategy and Security, Atlantic Council.  https://www.atlanticcouncil.org/wp-content/uploads/2021/10/Raising-the-colors-Signaling-for-cooperation-on-maritime-cybersecurity.pdf
 
- Zorri, D.M., & Kessler, G.C. (2021, September 8). Cyber Threats and Choke Points: How Adversaries are Leveraging Maritime Cyber Vulnerabilities for Advantage in Irregular Warfare. Modern War Institute at West Point.  https://mwi.usma.edu/cyber-threats-and-choke-points-how-adversaries-are-leveraging-maritime-cyber-vulnerabilities-for-advantage-in-irregular-warfare/
 - Kessler, G.C. (2021, September). The CAN Bus in the Maritime Environment - Technical Overview and Cybersecurity Vulnerabilities. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 531-540. DOI:  10.12716/1001.15.03.05
 
-  Kessler, G.C., & Zorri, D. (2021). Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF. Joint Special Operations University (JSOU) Report 21-4. MacDill Air Force Base (FL): The JSOU Press.
 
-  Kessler, G.C., & Shepard, S.D. (2020). Maritime Cybersecurity: A Guide for Leaders and Managers.
 
-  Kessler, G.C. (2020, June). Protected AIS: A Demonstration of Capability Scheme to Provide Authentication and Message Integrity. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 14(2), 279-286. DOI: 10.12716/1001.14.02.02.
 
-  Mraz, R., Kessler, G.C., Gold, E., & Cline, J.G. (2020, April).  Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use. International Journal of Transport and Vehicle Engineering, 14(4).
 
- Kessler, G.C. (2019, Spring). Cybersecurity in the Maritime Domain. Proceedings of the USCG Marine Safety & Security Council, 76(1), 34-39.
  Retrieved from  https://www.dco.uscg.mil/Portals/9/DCO%20Documents/Proceedings%20Magazine/Archive/2019/Vol76_No1_Spring2019.pdf
- Kessler, G.C. (2018, October 12). Cybersecurity and the Return-on-Negligence. The Maritime Executive Online. Retrieved from  https://www.maritime-executive.com/editorials/cybersecurity-and-the-return-on-negligence
 
- Kessler, G.C., Craiger, J.P., & Haass, J.C. (2018, September). A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System. TransNav, The International Journal on Marine Navigation and Safety of Sea Transportation, 12(3), 429-437. DOI: 10.12716/1001.12.03.01
 
- Kessler, G.C. (2017, November 8). Web Site Security for Seaports and Shipping Lines. The Maritime Executive Online. Retrieved from  https://www.maritime-executive.com/editorials/web-site-security-for-seaports-and-shipping-lines
 
 
 
- Information Security (Also see  GCK's Information Security-related URLs)
 
-   An Overview of Cryptography (Handbook on Local Area Networks, Auerbach, 1998 and continuously updated...)
 
- Lone Operator Cyberterrorism. (Journal of Information Warfare, 2016).
 
-   A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students (HICSS-47, 2014; GCK & J. Ramsay)
 
-   Paradigms for Cybersecurity Education in a Homeland Security Program (Journal of Homeland Security Education, 2013; GCK & J. Ramsay)
 
-   Information Security: New Threats or Familiar Problems? (IEEE Computer Magazine, February 2012)
 
-  Bluetooth Hacking: A Case Study. (In G. Dardick (Ed.), Proceedings of the Conference on Digital Forensics, Security and Law, May 2009 and Journal of Digital Forensics, Security and Law; D. Browning & GCK).
 
-  Diversity  A Best Practice for Security (Ashton, Metzler & Associates and Webtorials.com IT Business Brief, March 2003)
 
-   Cable Modems and the Internet: Securing the SOHO (Information Security Magazine, July 2000)
 
 
-   Defenses Against Distributed Denial of Service Attacks (November 2000)
 
-   Firewall Routers and Packet Filtering (Network VAR, June 1995)
 
-  Musings About Computer and Network Security (Champlain Business Journal, November 2002)
 
-   Passwords  Strengths and Weaknesses
 (Internet and Internetworking Security, Auerbach, 1997)
 
-  Port Scanning: It's Not Just an Offensive Tool Anymore (Information Security Magazine, June 2001)
 
-  Security at the Speed of Thought (Information Security Magazine, November 2000)
 
-  Will Loveletter Ultimately Do Any Good? (Security Perspectives Column,  Security Wire Digest, Vol. 2, No. 18, 5/15/2000)
 
-  Why Security Policies are so Hard to Implement (IEEE ITPro Magazine, March/April 2001)
 
 
 
See also Webtorials presentations below.
  
- Cyberforensics (Also see  GCK's Cybercrime and Cyberforensics-related URLs)
 
-  An Overview of Steganography for the Computer Forensics Examiner (FBI Forensic Science Communications, 6(3), July 2004)
 
- The Impact of MD5 File Hash Collisions on Digital Forensic Imaging (Journal of Digital Forensics, Security & Law, 11(4), 129-138, 2016).
 
- The Impact of SHA-1 File Hash Collisions on Digital Forensic Imaging: A Follow-Up Experiment (Journal of Digital Forensics, Security & Law, 11(4), 139-148, 2016).
 
-  Are mobile device examinations practiced like "forensics"? (Digital Evidence and Electronic Signature Law Review, 12, 2015. DOI:  http://dx.doi.org/10.14296/deeslr.v12i0.2210.)
 
-  Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory. (Journal of Digital Forensics, Security and Law, 8(4), 57-63, 2014.)
 
-  An Analysis of Forensic Imaging in the Absence of Write-Blockers. (Journal of Digital Forensics, Security and Law, 9(3), 51-58, 2014; GCK & G.H. Carlton.)
 
-  Android Forensics: Simplifying Cell Phone Examinations. (Small Scale Digital Device Forensics Journal, 2010; J. Lessard & GCK).
 
- Anti-Forensics and the Digital Investigator. (Proceedings of the 5th Australian Digital Forensics Conference, December 2007)
 
-  The Case for Teaching Network Protocols to Computer Forensics Examiners. (Proceedings of the Conference on Digital Forensics, Security and Law, April 2007; GCK & M. Fasulo)
 
-  Computer Forensics: The Issues and Current Books in the Field (Information Security Magazine, April 2002; GCK & M. Schirling)
 
-  The Design of an Undergraduate Degree Program in Computer & Digital Forensics (Journal of Digital Forensics, Security and Law, 2006; GCK & M.E Schirling)
 
-  Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online. (Proceedings of CFET 2007: 1st International Conference on Cybercrime Forensics Education & Training, September 2007)
 
- Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials. (Proceedings of CFET 2008: 2nd International Conference on Cybercrime Forensics Education & Training, September 2008; GCK, R. Simpson, & J. Fry)
 
-  Multidisciplinary Learning Using Mock Trials. (International Journal of Electronic Security and Digital Forensics, 2009; GCK, R. Simpson, & J. Fry)
 
-  Online Education in Computer and Digital Forensics: A Case Study (Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS-40), January 2007)
 
- An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview. (Journal of Digital Forensic Practice, 2010; GCK & D. Haggerty)
 
- Pedagogy and Overview of a Graduate Program in Digital Investigation Management. (Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS-41), January 2008; GCK & D. Haggerty)
 
-  The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty. (Proceedings of the 12th Colloquium for Information Systems Security Education, June 2008; GCK & J. Hoag)
 
-  The Role of Computer Forensics in Law Enforcement (OFFICER.com, January 2005)
 
-  Sam Spade: A Multifunction Information Toolkit (Information Security Magazine, September 2001)
 
-  Steganography: Hiding Data in Data (Windows & .NET Magazine, April 2002)
 
-  Steganography: Implications for the Prosecutor and Computer Forensics Examiner (American Prosecutors Research Institute Child Sexual Exploitation Program UPDATE, Summer 2004)
 
- On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. (Journal of Digital Forensic Practice, March 2008).
 
 
- Book Review: Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility (Journal of Digital Forensic Practice, 2010)
 
-  Book Review: Challenges to Digital Forensic Evidence (Journal of Digital Forensics, Security and Law, 2008)
 
- Book Review: Computer Evidence: Collection & Preservation (Journal of Digital Forensic Practice, March 2006; N. Beebe, GCK, & M. Rogers)
 
-  Book Review: Conquest in Cyberspace: National Security and Information Warfare (Journal of Digital Forensics, Security and Law, 2007)
 
- Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Journal of Digital Forensics, Security and Law, 2009)
 
- Book Review: Digital Crime and Forensic Science in Cyberspace (Journal of Digital Forensics, Security and Law, 2006)
 
- Book Review: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 2nd ed. (Criminal Justice Review, September, 2007)
 
- Book Review: Digital Forensic Evidence Examination, 2nd ed. (Journal of Digital Forensics, Security and Law, 2010)
 
- Book Review: The dotCrime Manifesto: How to Stop Internet Crime (Journal of Digital Forensics, Security and Law, 2008)
 
-  Book Review: Guide to Computer Forensics and Investigations (FBI Forensic Science Communications, Jan. 2004)
 
- Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit (Journal of Digital Forensics, Security and Law, 2008)
 
- Book Review: No Place To Hide (Journal of Digital Forensics, Security and Law, 2007)
 
- Book Review: Windows Forensic Analysis DVD Toolkit, 2/e (Journal of Digital Forensic Practice, 2010)
 
 
  
- The Internet and TCP/IP
-   An Overview of TCP/IP Protocols and the Internet (Originally posted at the InterNIC, August 1994 and continuously updated...)
 
-   IPv6: The Next Generation Internet Protocol (Handbook on Local Area Networks, Auerbach, 1997)
 
- A Primer on Internet and TCP/IP Tools and Utilities (FYI 30/RFC 2151) (GCK & Steve Shepard) [ASCII text | PDF]
 
-   Setting Up Your Own Domain Name System (DNS) (Network VAR, July 1996)
 
-  Binary Numbers and Subnet Masks (Windows 2000 Magazine, January 2001)
 
-   The Dynamic Host Configuration Protocol (DHCP) and Windows NT (Windows NT Magazine, May 1999; GCK & Carol Monaghan)
 
-   Routing, RIP, and Windows NT (Windows NT Magazine, August 23, 1999 Web exclusive; GCK & Carol Monaghan)
 
 
 
 - Legislation and Public Policy
 
 - Network Technologies
 
 - Miscellaneous Articles/Papers
 
 
 | 
- On-line Presentations at Webtorials.com
 
-   The Nimda Worm, a Webtorials webcast, September 2001.
 
-   An Update on Code Red, a Webtorials webcast, August 2001.
 
-   Securing a Small Office/Home Office LAN, a Webtorials webcast, March 2001.
 
-  Special Report: "Love Letter" and Related E-mail Viruses, a Webtorials webcast, 5 May 2000.
 
-   Denial of Services (DoS) Attacks, a Webtorials webcast, 10 February 2000.
 
-   The Internet, Intranet, Extranets -- and VPNs, a talk given at the ICA Network Technology Institute, Boulder, CO, August, 1999.
 
-   Network Security Overview, a talk given at the ICA Network Technology Institute, Boulder, CO, August, 1999.
 
 
 
 |   
  
 
All material on this site © 1996-, Gary C. Kessler. All rights reserved. Permission to use the material on this site is extended for individual personal use and for non-commercial distribution, as long as appropriate attribution is provided and the information is not altered in any way without express written permission from the author. 
 
 
  
 |  
 
 |