Network Centric Warfare: Coalition Operations in the Age of US Military Primacy (Adelphi series)

Amazon Price: N/A (as of June 19, 2018 07:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Since its emergence in 1998, the concept of Network Centric Warfare (NCW) has become a central driver behind America’s military ‘transformation’ and seems to offer the possibility of true integration between multinational military formations. Even though NCW, or variations on its themes, has been adopted by most armed services, it is a concept in operational and doctrinal development. It is shaping not only how militaries operate, but, just as importantly, what they are operating with, and potentially altering the strategic landscape.

This paper examines how the current military dominance of the US over every other state means that only it has the capacity to sustain military activity on a global scale and that other states participating in US-led coalitions must be prepared to work in an ‘interoperable’ fashion. It explores the application of computer networks to military operations in conjunction with the need to secure a network’s information and to assure that it accurately represents situational reality. Drawing on an examination of how networks affected naval operations in the Persian Gulf during 2002 and 2003 as conducted by America’s Australian and Canadian coalition partners, the paper warns that in seeking allies with the requisite technological capabilities, but also those that it can trust with its information resources, the US may be heading towards a very secure digital trap.

Distributed Password Cracking

Amazon Price: N/A (as of September 25, 2016 21:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Password cracking requires significant processing power which in today’s world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the
conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structure supports any system that requires large amounts of data to be processed
without changing significant portions of the structure. John the Ripper is a password cracking program that takes a password file and attempts to determine the password by a guess and check method.
The merger of these two programs enables companies and diverse groups to verify the strength of their password security policy. This thesis goes into detail on the inner workings of BOINC, John the Ripper, and the merger of the two programs. It also details the work required to test the system to its full capability.

Understanding Copyright: Intellectual Property in the Digital Age

Amazon Price: N/A (as of June 19, 2018 10:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Digital technology has forever changed the way media is created, accessed, shared and regulated, raising serious questions about copyright for artists and fans, media companies and internet intermediaries, activists and governments. Taking a rounded view of the debates that have emerged over copyright in the digital age, this book:

Looks across a broad range of industries including music, television and film to consider issues of media power and policy.
Features engaging examples that have taken centre stage in the copyright debate, including high profile legal cases against Napster and The Pirate Bay, anti-piracy campaigns, the Creative Commons movement, and public protests against the expansion of copyright enforcement.
Considers both the dominant voices, such as industry associations, and those who struggle to be heard, including ordinary media users, drawing on important studies into copyright from around the world.
Continue reading “Understanding Copyright: Intellectual Property in the Digital Age”

Vanished (A Black Hat Thriller)

Rating: 
Amazon Price: N/A (as of June 19, 2018 08:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer hacker Tina Adler heads to Paris, France in search of the truth ? but discovers that someone is close on her trail in this tense and twisting thriller.

With a price on her head, computer hacker Tina Adler is determined to stay offline. Only one person knows how to reach her ? and he?s in as much danger as she is.
Continue reading “Vanished (A Black Hat Thriller)”

Detection and Defeating Distributed Denial of Service (DDoS) Attacks

Amazon Price: N/A (as of June 18, 2018 21:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Distributed Denial of Service (DDoS) attack is one of the most disruptive attacks in computer networks. It utilizes legitimate requests from hundreds or thousands of computers to specific targets to occupy targets' bandwidth and deplete targets' resource. In this work, we have attempted to not only mitigate DDoS attacks but also identify the source of attacks even behind Network Address Translation (NAT). This is followed by remedial actions such as denying further access or informing them that they have participated in the attacks.

This report presents a new algorithm to prevent servers from DDoS attacks. This algorithm requires that network routers or gateways collaborate with each other in order to detect suspicious traffic. The algorithm initiates a peer-to-peer communication among network routers or gateways to increase the probability of detecting unwanted traffic. We derive mathematical proofs based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. This implementation is to prevent the attacker from sending spam traffic to the server which can lead to DDoS attacks. The effectiveness of our implementation is evidenced in our experimental results.