Cybersecurity Fundamentals 1st Edition Kutub Thakur All Chapters Instant Download
Cybersecurity Fundamentals 1st Edition Kutub Thakur All Chapters Instant Download
com
https://textbookfull.com/product/cybersecurity-
fundamentals-1st-edition-kutub-thakur/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/cybersecurity-fundamentals-a-real-
world-perspective-kutub-thakur/
textboxfull.com
https://textbookfull.com/product/no-time-like-now-1st-edition-naz-
kutub/
textboxfull.com
https://textbookfull.com/product/approaching-almost-any-machine-
learning-problem-1st-edition-abhishek-thakur/
textboxfull.com
https://textbookfull.com/product/management-education-in-india-
perspectives-and-practices-1st-edition-manish-thakur/
textboxfull.com
Work Education Gandhiji s Nai Talim And Community
Engagement 1st Edition Veera Thakur
https://textbookfull.com/product/work-education-gandhiji-s-nai-talim-
and-community-engagement-1st-edition-veera-thakur/
textboxfull.com
https://textbookfull.com/product/sustainable-food-waste-management-
concepts-and-innovations-monika-thakur/
textboxfull.com
https://textbookfull.com/product/cybersecurity-for-dummies-1st-
edition-joseph-steinberg/
textboxfull.com
https://textbookfull.com/product/cybersecurity-analytics-1st-edition-
rakesh-m-verma/
textboxfull.com
https://textbookfull.com/product/cybersecurity-and-applied-
mathematics-1st-edition-leigh-metcalf/
textboxfull.com
Cybersecurity Fundamentals
Taylor & Francis
Taylor & Francis Group
http://taylorandfrancis.com
Cybersecurity Fundamentals
A Real-World Perspective
Dr Kutub Thakur
Dr Al-Sakib Khan Pathan
First edition published 2020
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
The authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information storage
or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.
co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Typeset in Times
by codeMantra
“To my Father and Mother, Billal Thakur and Nurunnahar Parul”
Kutub Thakur
“To my Father, Abdus Salam Khan Pathan, and my Mother, Delowara Khanom”
Preface xiii
About the Authors xv
vii
viii Contents
1.8.5 Switches 21
1.8.6 Hubs 21
1.8.7 Servers 22
1.8.8 Connectivity 22
1.8.9 Hosts 23
1.9 Internet Software Infrastructure & Protocols 23
1.9.1 IP Address 24
1.9.2 DNS Server 25
1.9.3 TCP/IP Protocol 26
1.9.4 HTTP 27
1.9.5 World Wide Web (WWW) 27
Sample Questions and Answers for What We Have Learned in Chapter 1 28
Sources 29
2.1 Introduction 31
2.2 Importance of Cybersecurity 32
2.3 Introduction to Cyberattacks 34
2.4 Objectives of Cyberattacks 35
2.4.1 Confidentiality Breach 36
2.4.2 Availability Breach 37
2.4.3 Integrity Breach 37
Sample Questions and Answers for What We Have Learned in Chapter 2 38
Sources 39
3 Types of Cyberattacks 41
3.1 Introduction 41
3.2 Denial of Service (DoS) 42
3.3 Distributed Denial of Service (DDoS) 43
3.4 Man-in-the-Middle (MITM) Attacks 44
3.5 Cryptojacking 45
3.6 SQL Injection 46
3.7 Spamming 47
3.8 Cyberterrorism 48
3.9 Digital Property Misappropriation 49
3.10 Zero-Day Exploitation 50
3.11 Phishing 51
3.12 Digital Vandalism 52
3.13 Cyberstalking 53
3.14 Cyber Frauds and Forgery 54
Sample Questions and Answers for What We Have Learned in Chapter 3 55
Sources 56
4.1 Introduction 59
4.2 Equifax Data Theft 60
Contents ix
5.1 Introduction 77
5.2 Viruses 78
5.3 Trojan Horse 80
5.4 Rootkit 82
5.5 Spyware 85
5.6 Worms 87
5.7 Adware 90
5.8 Scareware 92
5.9 Browser Hijacker 94
Sample Questions and Answers for What We Have Learned in Chapter 5 95
Sources 96
7.4.1
Strong Password 127
7.4.2 Use of Biometrics 128
7.4.3 Two-Factor
Authentication 129
7.4.4 Multi-Factor Authentication 131
7.4.4.1 What you know 132
7.4.4.2 What you are 132
7.4.4.3 What you have 132
7.4.5 One-Time Password (OTP) 132
7.4.6 Using Password Managers 133
7.4.6.1 Main reasons to use a password manager 135
7.5 Password Manager Tools 135
7.5.1 Dashlane 135
7.5.2 LastPass 137
7.5.3 ZOHO Vault 138
7.5.4 KeePass 140
7.5.5 RoboForm 141
Sample Questions and Answers for What We Have Learned in Chapter 7 143
Sources 144
Index 281
Preface
This book describes the detailed concepts of computer networks and cybersecurity.
It talks about the types of major computer malware programs and the major
cybersecurity attacks that shook the cyber world in recent years. The details of the
major attacks and their impacts on the global economy are analyzed. The details of
the malware codes that help the hacker initiate hacking attacks on networks are also
described in length.
A few chapters are fully dedicated to high-tech cybersecurity programs, devices,
and mechanisms that are extensively adopted in modern security systems. The exam-
ples of those systems include intrusion detection systems (IDS), intrusion prevention
systems (IPS), and security firewalls. The general prevention mechanisms from the
cyberattacks are detailed in a couple of dedicated chapters.
Password management with modern technologies that help to create and manage
passwords more effectively is described in full detail. This book also covers aspects of
wireless networks and their security mechanisms. Details of commonly used wired and
Wi-Fi routers are provided with step-by-step procedures to configure and secure them
more efficiently.
This book is designed for users to benefit from the following major issues related to
the computer and network security:
xiii
xiv Preface
We hope that this book will offer great benefits to the students of graduate and under-
graduate classes, researchers, and practitioners. This could be a suitable textbook for
even non-CS (computer science) students or students who want to learn about basic
computer networking, security issues, and cybersecurity issues.
xv
xvi About the Authors
Korea, from September 2005 to August 2009, where he completed his MS leading
to PhD. His research interests include wireless sensor networks, network security,
cloud computing, and e-services technologies. Currently, he is also working on some
multidisciplinary issues. He is a recipient of several awards/best paper awards and has
several notable publications in these areas. So far, he has delivered over 20 keynotes
and invited speeches at various international conferences and events. He has served as
a General Chair, Organizing Committee Member, and Technical Program Committee
(TPC) member in numerous top-ranked international conferences/workshops such as
INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP,
IWCMC, VTC, HPCC, and SGIoT. He was awarded the IEEE Outstanding Leadership
Award for his role in the IEEE GreenCom’13 conference. He is currently serving as
the Editor-in-Chief of International Journal of Computers and Applications, Taylor
& Francis; Associate Technical Editor of IEEE Communications Magazine; Editor of
Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal
of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer
Science; an Associate Editor of International Journal of Computational Science and
Engineering, Inderscience; Area Editor of International Journal of Communication
Networks and Information Security; Guest Editor of many special issues of top-ranked
journals; and Editor/Author of 21 books. One of his books has been included twice in
Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st
half of 2014; three books were included in IEEE Communications Society’s (IEEE
ComSoc) Best Readings in Communications and Information Systems Security, 2013;
two other books were indexed with all the titles (chapters) in Elsevier’s acclaimed
abstract and citation database, Scopus, in February 2015; and a seventh book is trans-
lated to simplified Chinese language from English version. Also, two of his journal
papers and one conference paper were included under different categories in IEEE
Communications Society’s (IEEE ComSoc) Best Readings Topics on Communications
and Information Systems Security, 2013. He also serves as a referee of many presti-
gious journals. He has received awards for his reviewing activities, including one of
the most active reviewers of IAJIT several times and Elsevier Outstanding Reviewer
for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is
a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
Computers and
Networks 1
• Firmware
• Operating system or OS software
1
2 Cybersecurity Fundamentals
• Device drivers
• Application software
Every software and hardware component can consist of many other small hardware and
software items, which altogether form a modern computer machine that we use for our
day-to-day activities.
started in the present decade. This generation includes the new computers such as IBM
Watson, multicore processing machines, distributed processing machines, and the latest
AI-enabled mobile devices and tablets.
1.3.1 Input Devices
The input devices of a computer are those components that are connected to the com-
puter to insert raw data in different formats for processing purpose. A few major input
and output devices are shown in Figure 1.3.
The major input devices for our modern computers include the following:
• Keyboard
• Microphone
• Barcode reader
• Camera
• Electronic pen
• Joystick
1.3.2 Output Devices
The output devices of a computer are those components that are connected to the
computer for producing meaningful information processed from the raw data inserted
through input devices. The major output devices of a modern computer include the
following:
• Monitor
• Printer
• Speaker
• Headphone
• Projector
• Plotter
• Computer Output Microfilm (COM)
1.3.4 Storage Components
The storage component of a computer is the data storage bank to keep the data saved
on the secondary location, where the data can be easily accessed and managed
(Figure 1.5).
The storage components include the following:
1.3.5 Software Components
A computer is the combination of hardware and software components. All hardware
components mentioned above are dumb and deaf without the power of software
components of a computer. Figure 1.6 shows some of the software running on a
computer.
The major software components of a computer include the following:
• OS software
• Component drivers
• Application software
• Utility software
• Firmware
8 Cybersecurity Fundamentals
1.4.1 Artificial Intelligence
AI has been in the field for quite some time, but this technology will impact the com-
puter heavily in the time to come. With the help of augmented reality and virtual reality
(AR/VR), voice recognition, text interpretation, image processing, motion detection,
and other technologies based on AI technologies, the future of computers looks even
smarter and more exciting. The conceptual image of AI is shown in Figure 1.8.
1.4.2 Quantum Computing
The quantum computing idea is not a new one, but its practical existence is still in
infancy. There is no high level of quantum information processing, which has yet been
completed (at the time of writing this book). Only a few small-scale projects of process-
ing of quantum information in quantum bits (qbits) were successful. When this new
field of computing kick starts, the existing binary processing in our modern computers
will be heavily impacted with the quantum information processing. The virtual image
of quantum computing is shown in Figure 1.9.
1.4.3 Nanotechnology
The size of the hardware, especially in electronics and computer technology, is decreas-
ing exponentially. The size of first data storage based on 18,000 vacuum tubes was
about 1,800 ft2 to keep that tube tank cool. Can you imagine how much data could that
huge area store? Yes, that could store up to 18,000 bits of data only.
10 Cybersecurity Fundamentals
One vacuum tube could store one bit of data for computer processing and storage.
The size of the hardware has got reduced to hundreds of thousands of times by this
time. Just a small flash of less than a nail size can store billions of bytes of data! The size
of the electronic hardware is expected to get reduced even more in the time to come.
The processing of matter to the level of 100th part of a nanometer is referred to as
nanotechnology (Figure 1.10). The partnership of nanotechnology and quantum physics
will work well in the future, once the technology progresses. The success of quantum
and nanotechnology will revolutionize the modern computers to a new level.
1.4.4 Parallel Processing
The distribution of computer processing in multiple components comprehensively
coordinated with each other has already been extensively used in computer science to
increase the processing power of a computer. The virtualization, cloud computing, and
distributed processing systems are examples of parallel processing. The implementa-
tion of parallel processing at a large scale is going to rock the computer field in the near
future. Schematic diagram of parallel processing is shown in Figure 1.11.
1.5 INTRODUCTION TO
COMPUTER NETWORKS
Computer network is the combination of two or more computers connected with each
other to share their resources, establish communication, and exchange data electroni-
cally based on some pre-agreed rules and protocols. The end devices or computers are
also known as hosts.
A computer network consists of networking devices (e.g., switches, hubs, routers),
computer hosts, wired media (copper or fiber cables), wireless media, connectors, and
software protocols. Multiple computers are connected with each other through different
configurations (physical and logical) known as network topologies. Those computers
can be connected through wired or wireless media with the help of media connectors.
Figure 1.12 shows the image of a computer network.
This entire hardware configuration is governed by the communication protocols that
control the communication rules and patterns in a network. There are many communi-
cation topologies, protocols, and network types commonly used in computer networks.
12 Cybersecurity Fundamentals
1.5.1 Network Topologies
Network topology is a type of computer connectivity in which the computers or devices
are connected with each other to form a network. These topologies are normally physical
references of network connectivity. Figure 1.13 shows the major network topologies
used in the modern computer networking.
Major network topologies used in the computer network communication are listed
below:
“I little thought, Captain Greig, ever to see this day; but I will
bring relief to you and young Mr. Alexander, if I perish in the
attempt. If I never see you again, sir, God bless you for your
kindness to me during the years we have been shipmates.”
In the punt with the cook went five volunteers, three able
seamen, the gunner, and the sail-maker, but not one of the ship’s
officers. These six fine fellows were ready to risk their lives for
others, but the quarter-deck failed to share in the splendid action.
The punt hoisted sail, the cook and his comrades shouted three
cheers, and they stood out from the lee of the island to face a heavy
sea. This was the last ever seen of them. They must have perished
soon after.
The castaways waited week after week, desperately hungry and
wholly discouraged. Meanwhile the carpenter had finished his boat,
but delayed his voyage until certain of fine weather, and wasted
much time in skirting the island in the hope of finding some trace of
the cook. It was late in October, almost three months after the loss
of the Blenden Hall, before the carpenter attempted to reach Tristan.
Nine men were with him, five able seamen, the boatswain, the
steward, a boatswain’s mate, and a carpenter’s mate. Again the list
was conspicuous for the absence of an officer.
On the following day two boats were seen approaching
Inaccessible Island. They were stanch whale-boats, in one of which
was the ruler of Tristan da Cunha, Corporal William Glass, late of the
Royal Artillery. He brought provisions and a warm welcome to his
kingdom. It was found that more than one trip would be necessary
to transport the castaways to Tristan. In the first boat-load were
Mrs. Lock and Mrs. Painter, whose animosities were lulled by the
blessed fact of rescue. It was an armistice during which they wept
on each other’s necks and mingled their prayers of thanksgiving
while the crew of the Blenden Hall sang “God Save the King.”
All hands were safely landed at Tristan where they found a neat
hamlet of stone cottages thatched with straw, and green fields of
grain and potatoes. Mrs. Glass was the only woman of the colony in
which there were five Englishmen and two American sailors. To
provide for eighty shipwrecked people severely taxed their resources
but the spirit of hospitality was most cordially displayed. The captain
and the passengers signed an agreement to pay Governor Glass at
the rate of two shillings and sixpence per day for board and lodging,
which was no more than fair, but nothing was said about the sailors.
They were expected to pay for their keep by working as farm-hands.
This rubbed the long-suffering tars the wrong way, and as the diary
explains it:
and that he would some day reveal it to the man of the garrison
who pleased him most, thus insuring good treatment from the
men, each hoping to be favored. But one day after drinking
immoderately of liquor he was taken suddenly ill and expired
before he could explain to his comrades where his treasure was
concealed.
Governor William Glass ruled over the island for thirty-five years,
until his death in 1853. By that time the population had increased to
a hundred souls, and a flourishing trade was carried on in
provisioning the fleet of American whalers out of New Bedford and
Nantucket which cruised in those waters. A few years later, twenty-
five of the younger men and women emigrated to the United States,
stirred by a natural ambition to see more of the world. At the death
of Governor Glass, an old man-of-war’s-man, William Cotton, who
had been for three years one of Napoleon’s guards at St. Helena,
became the head of the community.
To-day the settlement consists of a hundred people or so, most
of them of the old British strain, and many of them descended from
the families of Corporal William Glass of the Royal Artillery and the
young seaman Stephen White and his devoted Peggy who were
wrecked in the Blenden Hall, East Indiaman, a century ago. They
manage their own affairs without any written laws, and are
described by recent visitors as religious, hospitable to strangers,
industrious, healthy, and long-lived.
The British Government has kept a paternal eye on them, and
from time to time a minister of the Church of England has served in
the stone chapel and the trim little school-house. Their worldly
wealth is in cattle, sheep, apple and peach orchards, and they are
unvexed by politics, the League of Nations, or the social unrest.
Enviable people of Tristan da Cunha! And peace to the memories of
old William Glass and Jonathan Lambert, and the faithful
sweethearts of the stately old Blenden Hall!
CHAPTER V
THE ADVENTURES OF DAVID WOODARD,
CHIEF MATE
LONG before the art of Joseph Conrad created Lord Jim to follow the
star of his romantic destiny to the somber, misty coast of Patusan,
an American sailor lived and dared amazingly among the sullen
people of those same mysterious islands of the Far East. He was of
the race of mariners whose ships were first to display the Stars and
Stripes in those far-distant waters and to challenge the powerful
monopolies of the British and Dutch East India companies. Only
seven years earlier, in fact, the American ship Empress of China had
ventured on the pioneering voyage to Canton. The seas still
swarmed with pirates and every merchantman carried a heavy
battery of guns and a crew which knew to use them. Amid such
conditions were trained the sailors who were to man the Constitution
and the other matchless frigates of 1812.
The American ship Enterprise sailed from Batavia for Manila on
the twentieth of January, 1793, and laid a course to pass through
the Straits of Macassar. Head winds and currents kept her beating to
and fro in this torrid passage for six weeks on end, and the
grumbling crew began to wonder if they had signed in another
Flying Dutchman. Food was running short, for this protracted voyage
had not been expected, and while the Enterprise drifted becalmed
on the greasy tide, another ship was sighted about five miles distant.
Captain Hubbard ordered the chief mate, David Woodard, to
take a boat and five seamen and row off to this other vessel and try
to buy some stores. The men were William Gideon, John Cole,
Archibald Miller, Robert Gilbert, and George Williams. Expecting to be
gone only a few hours, they took no food or water, and all they
carried with them was an ax, a boat-hook, two pocket-knives, a
disabled musket, and forty dollars.
It was sunset when they pulled alongside the other ship, which
was China bound and had no provisions to spare. A strong squall
and heavy rains prevented them from returning to the Enterprise
that night, and they stayed where they were until next morning.
Then the wind shifted and blew fresh from the southward to sweep
the Enterprise on her course, and she had already vanished hull
down and under. Stout-hearted David Woodard guessed he could
find her again, confident that Captain Hubbard would not desert
him, and his men cheerfully tumbled into the boat after him.
The skipper of the China ship, a half-caste with a crew of
Lascars, was a surly customer who seemed anxious to be rid of his
visitors. As a friend in need he was a glaring failure. Protesting that
he had no fresh water to spare, all that their money could buy of
him was a bottle of brandy and twelve musket-cartridges. The
Yankee sailors tugged at the oars all day long, but caught never a
glimpse of the missing Enterprise. At nightfall they landed on an
island and found water fit to drink, but nothing to eat. A large fire
was built on the beach in the hope of attracting the attention of their
ship, but there was no responsive signal.
It was the land of Conrad’s magic fancies, where “the swampy
plains open out at the mouth of rivers, with a view of blue peaks
beyond the vast forests. In the offing a chain of islands, dark,
crumbling shapes, stand out in the everlasting sunlit haze like the
remnants of a wall broached by the sea.”
The chief mate and his five hardy seamen tightened their leather
belts another hole and shoved off again in the small open boat. For
six days they sailed the Straits, blown along by one rain squall after
another, until they were within sight of the coast of Celebes. Hunger
and thirst then compelled them to seek the land and risk death at
the hands of the savage Malays. It was their hope to proceed by sea
to Macassar, which they reckoned lay about three degrees to the
southward.
They must have had a little water during these six days, but
David Woodard’s statement that the rations were a few cocoanuts is
entirely credible. Many a boat-load of castaways has died or gone
mad after privations no more severe, while on the other hand a crew
of toughened seamen, in the prime of their youth, is exceedingly
hard to kill.
Toward a cove on this unknown, hostile shore of Celebes the
gaunt sailors wearily steered their boat and beached it in the languid
ripple of surf. They had no sooner crawled ashore than two proas
skimmed in from seaward, dropping anchor and making ready to
send off a canoe filled with armed Malays. Woodard shouted to his
men, and they pushed the boat out and scrambled into it before
they were discovered. Skirting a bight of the shore, they headed for
the open sea and dodged away from the proas.
Four miles beyond, after they had rounded a green point of land,
a feathery cocoanut-grove ran to the water’s-edge, and they could
go no farther. The mate left two men to guard the boat, and the
three others went with him; but they were too weak to climb the
trees, and had to hack away at the trunks with an ax. Two of them
were mere lads who made such bungling work of it that Woodard
sent for a couple of the stronger men in the boat, leaving Archibald
Miller alone with it. They were busy gathering cocoanuts to carry to
sea with them when poor Miller was heard to “scream aloud in the
bitterest manner.” The mate ran to the beach and saw his precious
boat filled with Malays, who were just shoving off in it. On the sand
lay Miller, who had been hacked to death with creeses.
David Woodard and four sailors were therefore marooned with
no resources whatever, but they talked it over and agreed to try to
get to Macassar by land. Leaving the swampy coast, they slowly
toiled toward the blue mountains and, afraid of discovery, concluded
to hide themselves in the jungle until night. Then with a star for
their guide they bore south, but progress was almost impossible,
and they lost their bearings in the dense growth. After blundering
about in this manner for several nights, they turned toward the sea
again in the hope of finding some kind of native boat. They had
existed for thirteen days since losing their ship, and it is evident that
the indomitable spirit of the mate kept the other men going.
“Woodard was himself stout in person,” explains the narrative,
“and much accustomed to fatigue and exercise, whence he felt less
exhausted, particularly from keeping up his spirits and having his
mind constantly engaged.”
At length they came to a deep bay between the mountains, and
lay hidden all day in a leafy ambush while they watched the Malay
fishermen in their canoes. Three of the sailors were taken
desperately ill after eating some yellow berries and thought they
were about to die; but the mate could not tolerate this kind of
behavior, “although his comrades now resembled corpses more than
living men.” He used rough language, damned them as worthless
swabs if a stomach-ache was to make them lie down and quit, and
then went in search of water for them until he found some in a
hollow tree. But his strength and courage could haul them along no
farther and reluctantly he admitted that they would have to
surrender themselves to the natives.
WOODARD RAISED HIS EMPTY HANDS TO ASK FOR PEACE AND
MERCY
They went down to the beach of the bay, wondering what their
fate might be, John Cole, who was a stripling lad of seventeen,
blubbering that he would sooner die in the woods than be killed by
the Malays. The canoes had gone away, but three brown-skinned
girls were fishing in a brook, and they fled when they saw the
tattered castaways. Presently a group of men came down a forest
path, and Woodard walked forward to meet them, raising his empty
hands to ask for peace and mercy.
The Malays stood silent for a long time, and then the chief
advanced to lay down his creese and ceremoniously accept the
strangers as captives. They were given food and conducted to a little
town of bamboo huts, there to await the pleasure of the rajah in
what Woodard called the judgment hall, while all the villagers
gathered about them.
Soon the rajah strode in, tall and straight and warlike, a long,
naked creese in his hand. These were the first white men that had
ever been seen in his wild domain. He gazed admiringly at the
stalwart chief mate, who looked him straight in the eyes, while the
people murmured approval of the captive’s bearing, for “he was six
feet and an inch high, strong in proportion, and the largest-boned
person they had ever beheld.”
These were two bold, upstanding men who stood face to face in
the judgment hall, and the rajah, after consultation with his chiefs,
gave each of the five American sailors a betel-nut to chew as a
token of his gracious inclination to spare their lives.
For twenty days they were closely held as prisoners in this forest
settlement, during which time two old men arrived from another
town and displayed a lively interest in the situation. They toddled off
into the jungle, but came again with a Mahomedan priest called
Tuan Hadjee, who was a bit of a linguist in that he spoke a few
words of English, some Portuguese, and a smattering of the Moorish
tongue. He was a man of the world, having journeyed to Bombay
and Bengal on his way to Mecca, and displayed a letter from the
British governor of Balambangan, on the island of Borneo, to show
that he was a good and trustworthy person and was empowered to
assist all distressed Englishmen.
This Tuan Hadjee lived up to his credentials, for he offered the
rajah a hundred dollars in golddust as ransom for the five seamen,
which price was haughtily refused, and the kindly priest went away
to see what else could be done about it. Nothing more was seen of
this amiable pilgrim, and the Americans were set to work in the
forest to clear the fields or to gather sago. After two months they
were left unguarded by day, but shut up in a house at night. Week
after week dragged by in this wearisome drudgery, but they kept
alive, and their spirit was unbroken, although the food was poor and
scanty and the tropical heat scorched the very souls out of them.
At the end of half a year of this enslavement another rajah who
seems to have been a kind of overlord of the region summoned
them into his presence at a town on the sea-coast. There Woodard
almost died of fever, but a woman befriended him and greatly
helped to save his life. The episode suggests a romance, and this
viking of a sailor who drifted in so strangely from an unknown world
was a man to win the love of women. In this respect, however, he
was discreetly silent when it came to relating the story of his
wanderings in Celebes, and the interest which he inspired is sedately
described as follows:
At her first visit she looked at him some time in silence, then
went to the bazaar and bought some tobacco and bananas
which she presented to him, as also a piece of money. Seeing
him scantily clothed, she asked whether he had no more
clothing and whether he would have some tea. Then carrying
one of the other sick men home with her, she gave him tea and
a pot to boil it in. She likewise sent rice and some garments,
with a pillow and two mats. This good woman was of royal blood
and married to a Malay merchant. These were not her only gifts,
for she proved a kind friend to the seamen while they were at
that place.
Another house being provided for the five men, Woodard,
unable to walk, was carried thither accompanied by a great
concourse of young females who immediately on his arrival
kindled a fire and began to boil rice. His fever still continued
very severe and on the morning of the fourth day of his
residence an old woman appeared with a handful of boughs,
announcing that she was come to cure him and that directly. In
the course of a few minutes four or five more old women were
seen along with her, according to the custom of the country in
curing the sick. They spent the day in brushing him with the
boughs of the trees and used curious incantations. The
ceremony was repeated in the evening and he was directed to
go and bathe in the river. Although he put little faith in the
proceedings, the fever abated and he speedily began to recover.
THE veterans of the Revolution of ’76, who had won a war for
freedom, were still young men when American sailors continued to
be bought and sold as slaves for a few dollars a head on the farther
side of the Atlantic. It was a trade which had flourished during the
colonial period, and was unmolested even after the Stars and Stripes
proclaimed the sovereign pride and independence of this Union of
States. Indeed, while hundreds of American mariners were held in
this inhuman bondage, their Government actually sent to the Dey of
Algiers a million dollars in money and other gifts, including a fine
new frigate, as humble tribute to this bloody heathen pirate in the
hope of softening his heart.
It was the bitterest touch of humiliation that this frigate, the
Crescent, sailed from the New England harbor of Portsmouth, whose
free tides had borne a few years earlier the brave keels of John Paul
Jones’s Ranger and America.
The Christian nations of Europe deliberately granted immunity to
these nests of sea-robbers in Algiers, Morocco, Tunis, and Tripoli in
order that they might prey upon the ships and sailors of weaker
countries and destroy their commerce. This ignoble spirit was
reflected in a speech of Lord Sheffield in Parliament in 1784.
“It is not now probable that the American States will have a
very free trade in the Mediterranean. It will not be to the
interest of any of the great maritime powers to protect them
from the Barbary States. If they know their interests, they will
not encourage the Americans to be ocean carriers. That the
Barbary States are advantageous to maritime powers is certain.”
It was not until 1803 that the United States, a feeble nation with
a little navy, resolved that these shameful indignities could no longer
be endured. While Europe cynically looked on and forbore to lend a
hand, Commodore Preble steered the Constitution and the other
ships of his squadron into the harbor of Tripoli, smashed its
defenses, and compelled an honorable treaty of peace. Of all the
wars in which the American Navy had won high distinction, there is
none whose episodes are more brilliant than those of the bold
adventure on the coast of Barbary.
The spirit of it was typical of Preble, the fighting Yankee
commodore, who fell in with a strange ship one black night in the
Straits of Gibraltar. From the quarterdeck of the Constitution he
trumpeted a hail, but the response was evasive, and both ships
promptly manœuvered for the weather gage.
“I hail you for the last time. If you don’t answer, I’ll fire into
you,” roared Preble. “What ship is that?”
“His Britannic Majesty’s eighty-four gun ship-of-the-line
Donegal,” came back the reply. “Send a boat on board.”
Without an instant’s hesitation the commodore thundered from
his Yankee frigate:
“This is the United States forty-four-gun ship Constitution,
Captain Edward Preble, and I’ll be damned if I send a boat aboard
any ship. Blow your matches, boys!”
Until the hordes of Moorish and Arab cutthroats and slavers were
taught by force to respect the flag flown by American merchantmen,
there was no fate so dreaded by mariners as shipwreck on the
desert coast of northern Africa. For a hundred and fifty years they
risked the dreadful peril of enslavement under taskmasters incredibly
inhuman, who lashed and starved and slew them. In the
seventeenth century it was no uncommon sight in the ports of Salem
and Boston to see an honest sailor trudging from house to house to
beg money enough to ransom or buy his shipmates held in Barbary.
The old records note many such incidents, as that in 1700:
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com