economic decade 2000-2010

For Milestone One, you will research three sections of your final project as they relate to the 10-year historical period that you chose in Module One: gross domestic product, unemployment/inflation, and interest rate fluctuations. You will then create your first 46 presentation slides. Be sure to read the Milestone One Guidelines and Rubric to ensure you are covering the critical elements Milestone Two, you will research government fiscal policies as they relate to the 10-year historical period that you chose in Module One, and present the information in 35 new slides for your presentation. Be sure to read the Milestone Two Guidelines and Rubric to ensure you are covering the critical elements of this assignment.nts of this assignment.

Lab 7

For Lab 7, we’re crack the WPA/WPA2 wireless network key using oclHashcat on Windows. Instead of using CPU power to brute force the password were going to use the GPUs, short for Graphics Processing Unit. The benefit of using the GPU instead of the CPU for brute forcing is the huge increase in cracking speed. A GPU is designed to perform repetitive tasks very fast because it has many more cores than a CPU that can be used to process tasks in parallel. Because of the number of cores in a GPU even an older GPU can outperform a modern CPU by using heavy parallelism. The difference between older and newer graphics cards and GPUs is even larger. The older Radeon 7670M video card in a 2012 laptop does an average of 20kh (20.000 attempts) per second where an AMD HD7970 videocard can do 142kh (142.000 attempts) per second and 8 x NVidea Titan X cards can do 2.233 kh per second. This makes brute forcing routers with easy default passwords, like the TP-LINK (default WPS PIN) or the standard UPC broadband routers (8 capital letters), a piece of cake and just a matter of time. In the first part of the tutorial we created 26 different wordlists which allows us to distribute the wordlist over multiple PCs with multiple GPUs. Of course you can and have to question the cost effectiveness of this setup to crack a password because GPUs dont come cheap and require massive amounts of power when performing at top speed. Nevertheless it gives us a good understanding of what passwords are strong and what passwords arent when using GPUs to brute force them.  Here’s some vids to help.

https://hashcat.net/wiki/doku.php?id=oclhashcat

https://www.youtube.com/watch?v=1hoGVUAo7xA&feature=youtu.be

https://youtu.be/WFncxKlmw2A

As with the previous assignment, use screenshots to describe your process.

Lab 6

Performing an Wifi adapter packet injection test to see whether your Wifi adapter is capable of injection can be done easily with Aireplay-ng. Aireplay-ng is great tool to generate traffic for cracking WEP and WPA keys. Another great feature is the Deauthentication option.  Take a look and document how this happens on your own personal router.  Use screenshots and describe the process.

Intelligence Operation of the Gulf War

This is the proposal that was written for this paper a few months ago.  Now what we need to do is conduct the research and write the paper.  You also listen some possible sources for this paper that you could use.  Please add to these sources as well.  Make a bibliography for this paper at the end of the paper and also make sure to use footnotes within the paper as well.

The topic that will be focused on and fully researched for the seminar paper this semester will be the intelligence operations of the Gulf War which began in the year 1990 upon the invasion of Kuwait by the country of Iraq.  The paper will also discuss the role of the CIA within the time period of this war and how the organization was involved.  It will also discuss various ethical issues that were involved within this war that has to do with intelligence as well as the support that was provided by the intelligence obtained and how several threats were uncovered during this time of war. How intelligence also assisted in monitoring political developments and military deployments during the period preceding the war will also be examined as well as how intelligence was used strategically to guide US policy an actions during the times of the war.  Finally, the paper will also examine whether or not the intelligence that played a role within the war provided factual and accurate information.

References:

Budahl, B.  (2019).  Counterintelligence operations in the Persian Gulf War and the Iran-contra operation.  Modern Diplomacy.  Retrieved from https://moderndiplomacy.eu/2019/08/12/counterintelligence-operations-in-the-persian-gulf-war-and-the-iran-contra-operation/

Coia, R.  (1995).  The critical analysis of the I MEF intelligence performance in the 1991 Persian Gulf War.  Retrieved from https://fas.org/irp/eprint/coia.htm

The George Washington University.  (2001).  Operation Desert Storm:  10 years later.  The National Security Archive.  Retrieved from https://nsarchive2.gwu.edu/NSAEBB/NSAEBB39/

Quinn, R.  (2014).  Intelligence center provides support to Desert Shield/Desert Storm. US Army.  Retrieved from https://www.army.mil/article/118182/intelligence_center_provides_support_to_desert_shielddesert_storm

Ball, D.  (1991).  The intelligence war in the Gulf.  Strategic and Defence Study Centre.  Retrieved from http://sdsc.bellschool.anu.edu.au/sites/default/files/publications/attachments/2016-03/078_The_intelligence_war_in_the_gulf_%28Canberra_papers_on_strategy_and_defence%29_Desmond_Ball_105p_0731512065.pdf