Si Vis Pacem, Para Bellum


Creating a Network Model for the Integration of a Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment

Since 9/11 protecting our critical infrastructure has become a national priority. Presidential Decision Directive 63 mandates and lays a foundation for ensuring all aspects of our nation's critical infrastructure remain secure. Key in this debate is the fact that much of our electrical power grid fails to meet the spirit of this requirement. My research leverages the power afforded by Electric Power and Communication Synchronizing Simulator (EPOCHS) developed with the assistance of Dr. Hopkinson, et al. The power environment is modeled in an electrical simulation environment called PowerWorld . The network is modeled in OPNET and populated with self-similar network and Supervisory Control and Data Acquisition (SCADA). The two are merged into one working tool that can realistically model and provide a dynamic network environment coupled with a robust communication methodology. This new suite of tools will enhance the way we model and test hybrid SCADA networks. By combining the best of both worlds we get an effective and robust methodology that correctly predicts the impact of SCADA traffic on a LAN and vice versa. This ability to properly assess data flows will allow professionals in the power industry to develop tools that effectively model future concepts for our critical infrastructure.


TPB AFK: The Pirate Bay Away From Keyboard


China’s Cyberwarfare Capability (China in the 21st Century)

China's Cyberwarfare Capability (China in the 21st Century)The government of the People’s Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China‘s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.

Price: $43.00

Click here to buy from Amazon


High Power USB-Yagi Plug and Play directional WiFi Antenna 802.11n 2200mW

The 007GTi NextG USB-Yagi antenna is designed to connect your desktop computer or laptop easily to any Wireless-B or Wireless-G or Wireless-N network via a USB connection. The award winning TurboTenna Hi-Gain Antenna technology extends the wireless connection. The perfectly tuned directional Yagi antenna is driven by the new USB WiFi power amplifier that provides higher sensitivity and better speeds than other wireless adapters in the market. This handy antenna delivers a remarkable horse power at a top speed of 300Mbps, which can also be adjusted for various applications. It works within minutes. Simply plug in the USB cable of the NextG USB-Yagi antenna to the laptop or desktop PC and follow a few simple clicks for CD-ROM driver installation – there is absolutely no need to worry about the cable compatibility issue. Simply faster and more powerful! Note*: Use ONLY the USB extender cable with low DC resistance and low power loss such as B00IATB8CW Contact us if in doubt.


Tiger Trap: America’s Secret Spy War with China

For decades, while America obsessed over Soviet spies, China quietly penetrated the highest levels of government. Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars.Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years, even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, and sophisticated cyberspying. The story takes us up to the present, with a West Coast spy ring whose members were sentenced in 2010—but it surely will continue for years to come, as China faces off against America. David Wise’s history of China’s spy wars in America is packed with eye-popping revelations.