67 research outputs found

    Cyber Supply Chain Risk Management: Implications for the SOF Future Operating Environment

    Get PDF
    The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of those vulnerabilities and risks

    Current Trends in Small Unmanned Aircraft Systems: Implications for U.S. Special Operations Forces

    Get PDF
    This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the unmanned aircraft systems (UAS) technology and their applicability to SOF, this paper analyzes the definition and classification of sUAS, their major applications, and characteristics. In the military context, UAS are principally used for intelligence, surveillance, and reconnaissance (ISR), border security, counterinsurgency, attack and strike, target identification and designation, communications relay, electronic attack, remote sensing, and aerial mapping. As technology improves, smaller versions of sUAS will be used by both friendly operators and maligned actors (insurgents, terrorists, VEOs, nation states) as force multipliers for military operations. As armed forces around the world continue to invest in research and development of sUAS technologies, there will be tremendous potential to revolutionize warfare, particularly in context of special operations. Consequently, the use of sUAS technology by SOF is likely to escalate over the next decade, as is the likelihood of sUAS countermeasures due to the availability of the technology within nefarious organizations

    Creating a Forensic Image

    No full text
    In this video Dr. Craiger demonstrates how to use Linux to create a forensic image

    Acquiring Volatile Data with FTK Imager

    No full text
    In this video, Dr. Cariger demonstrates how to capture volatile data, RAM, and the swap file, with FTK imager

    Calculating and Verifying Cryptographic One-Way Hashes

    No full text
    Dr. Craiger demonstrates a simple way to calculate MD5 hashes and verify them

    Network Scanning and Fingerprinting

    No full text
    Dr.Craiger demonstrates how to conduct a network scan using Zenmap and Nmap

    sUAS Cybersecurity: Threats, Vulnerabilities, and Exploits (2 of 3)

    No full text
    Theoretical and actual cybersecurity threats, vulnerabilities, and exploits to small unmanned aerial systems (part 2 of 3

    Running Traceroute

    No full text
    In this video Dr.Craiger demonstrates how to run and interpret the results of traceroute

    Vulnerability Scanning with Nessus

    No full text
    Dr. Craiger demonstrates how to use Nessus to conduct a vulnerability scan

    Installing and Configuring Snort

    No full text
    Dr. Craiger demonstrates how to install and configure the open-source software Snort
    • …
    corecore