7 research outputs found

    Redefining intelligence support in a resource constrained environment

    Get PDF
    2011 Special Operations Essay, 1st place winner. “Captain Carrick Longley is a U.S. Marine Corps Intelligence Officer. He submitted this paper while attending the Naval Postgraduate School for a Master of Science in Information Warfare Systems Engineering and working towards completing his Joint Professional Military Education Phase I at the Naval War College Distance Education Program. He is currently assigned to the Naval Postgraduate School where he is pursuing a Doctorate in Information Sciences.”The intelligence community must embrace technology and an organizational restructuring to provide more accurate, effective, and efficient intelligence while reducing its resource footprint. With the establishment of permanent intelligence fusion centers stateside, reporters, analysts, linguists and watch officers can focus their energy on training a more professional, capable force while providing increasingly complex and sophisticated analysis to support operators on the ground

    Lighthouse: A handheld intelligence support platform

    Get PDF
    Presented at the Miltary Wireless Communications ConferenceMWC sponsore

    Deception using an SSH honeypot

    Get PDF
    The number of devices vulnerable to unauthorized cyber access has been increasing at an alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a system; studying their interactions with vulnerable networks helps better understand their tactics. We connected an SSH honeypot responding to secure-shell commands to the Naval Postgraduate School network, bypassing the firewall. During four phases of testing, we altered the login credential database and observed the effects on attackers using the honeypot. We used different deception techniques during each phase to encourage more interaction with the honeypot. Results showed that different attackers performed different activities on the honeypot. These activities differed in total login attempts, file downloads, and commands used to interact with the honeypot. Attackers also performed TCP/IP requests from our honeypot to direct traffic to other locations. The results from this experiment confirm that testing newer and updated tools, such as honeypots, can be extremely beneficial to the security community by helping to prevent attackers from quickly identifying a network environment.http://archive.org/details/deceptionusingns1094556156Second Lieutenant, United States ArmyApproved for public release; distribution is unlimited

    Information sharing for computing trust metrics on COTS electronic components

    Get PDF
    The Department of Defense (DoD) has become highly reliant on commercial-off-the-shelf (COTS) technology in mission-critical unclassified systems to reduce both the cost time to acquire a system, and standardize support for deployed systems. It is challenging for the DoD to determine whether and how much to trust in COTS components, given uncertainty and incomplete information about the developers and suppliers of COTS components as well as the capabilities provided by COTS components. The purpose of this thesis is to explore the current landscape of DoD information assurance (IA) as it pertains to COTS components, show how Jøsang's trust model can be used to calculate trust based on opinions provided by multiple government and non-government services, and explore the need for cross-domain sharing of information to support populating, maintaining, and using the trust models.http://archive.org/details/informationshari109453951US Navy (USN) author.Approved for public release; distribution is unlimited

    Porifera (Sponges)-5

    No full text
    corecore