Cyber-security
The digital arms trade
Just a dozen years ago the buying and selling of illicit exploits was so rare that India’s Central Bureau of Investigation had not yet identified any criminal syndicates involved in the trade, says R.K. Raghavan, a former director of the bureau. Underground markets are now widespread, he says. Exploits empower criminals to steal data and money. Worse still, they provide cyber-firepower to hostile governments that would otherwise lack the expertise to attack an advanced country’s computer systems, worries Colonel John Adams, head of the Marine Corps’ Intelligence Integration Division in Quantico, Virginia.
Exploits themselves are generally legal. Several legitimate businesses sell them. A Massachusetts firm called Netragard last year sold more than 50 exploits to businesses and government agencies in America for prices ranging from $20,000 to more than $250,000. Adriel Desautels, Netragard’s founder, describes some of the exploits sold as “weaponised”. The firm buys a lot from three dozen independent hackers who, like clients, are carefully screened to make sure they are not selling code to anyone else, and especially not to a criminal group or unfriendly government.
More than half of exploits sold are now bought from bona fide firms rather than from freelance hackers, says Roy Lindelauf, a researcher at the Netherlands Defence Academy. He declines to say if Dutch army or intelligence agencies buy exploits, noting that his government is still figuring out “what we’re allowed to do offensively”.
Laws to ban the trade in exploits are being mooted. Marietje Schaake, a Dutch member of the European Parliament, is spearheading an effort to pass export-control laws for exploits. It is gathering support, she says, because they can be used as “digital weapons” by despotic regimes. For example, they could be used to monitor traffic on a dissident’s smartphone. However, for a handful of reasons, new laws are unlikely to be effective.
Exploits are a form of knowledge, expressed in computer code. Attempting to stop people from generating and spreading knowledge is futile, says Dave Aitel, a former computer scientist at America’s National Security Agency (NSA) who went on to found Immunity, a computer-security firm in Florida. He says that legal systems would not even agree on which code is good and which is bad. Many legal experts say code should be protected by free-speech laws—it is, after all, language expressed as strings of zeros and ones.
Moreover, tracking down exploits is hard. Hackers keep them secret so that the intended victim doesn’t identify and fix the vulnerability, thereby rendering the exploit worthless. As a French exploit developer puts it, those liable to be rapidly detected are about as useful as a “disposable gun” that can be fired just once. Secrecy surrounding the design, sale and use of exploits makes protecting computer networks from them akin to finding “unknown unknowns”, says Kenneth Geers, a cyber-security specialist at America’s Naval Criminal Investigative Service.
Several governments want firms to develop exploits. In 2010 a computer worm called Stuxnet was revealed to have attacked Iran’s nuclear kit. It used four main exploits to get in; at least one appears to have been bought rather than developed in-house by the government that launched the attack (presumably America or Israel), says David Lindahl, an IT expert at the Swedish Defence Research Agency, a government body in Stockholm. An unprecedented weapon, Stuxnet remained undetected for years by quietly erasing its tracks after “planting sabotage charges at exactly the right place” in Iran’s uranium-enrichment centrifuges, Mr Lindahl says.
Nearly all well-financed intelligence agencies buy exploits, says Eric Filiol, a lieutenant-colonel in computer intelligence for France’s army until 2009. Computer experts who years ago would reveal software vulnerabilities for mere prestige have realised that they were treating “diamonds as pebbles”, says Mr Filiol, now head of the Operational Cryptography and Computer Virology Lab in Laval. His lab is partly financed by France’s defence ministry to provide it with exploits.
Finding holes in the firewall
Software firms also buy exploits to identify and repair vulnerabilities in their products before others take advantage of them. A small Vancouver firm called Tarsnap, for example, has paid 30 people who pointed out flaws in its encryption software for online PC backups. To develop better defences for its clients’ computer systems, HP, an American giant, has spent more than $7m since 2005 buying hundreds of “zero days”, as undiscovered exploits are also known in hacker slang. (Once discovered, an exploit’s days are numbered, literally: it becomes a “one day”, then a “two day”, and so on until the vulnerability it exploits is patched.)
Such “bug bounty” schemes, however, will struggle to compete with buyers who want to exploit rather than seal vulnerabilities. Tarsnap’s biggest payout was just $500. Last year Google offered Vupen, a French firm, $60,000 for an exploit that burrowed into its Chrome browser. Vupen’s boss, Chaouki Bekrar, balked, noting that he could get more elsewhere.
Other reputable customers, such as Western intelligence agencies, often pay higher prices. Mr Lindelauf reckons that America’s spies spend the most on exploits. Vupen and other exploit vendors decline to name their clients. However, brisk sales are partly driven by demand from defence contractors that see cyberspace as a “new battle domain”, says Matt Georgy, head of technology at Endgame, a Maryland firm that sells most of its best exploits for between $100,000 and $200,000. He laments a rise in sales by unscrupulous vendors to dangerous groups.
On March 12th the head of the Pentagon’s Cyber Command, General Keith Alexander, warned the Senate Armed Services Committee that state-sponsored groups are stepping up efforts to steal and destroy data using “cybertools” purchased in illicit online markets. As an American military-intelligence official points out, governments that buy exploits are “building the black market”, thereby bankrolling dangerous R&D. For this reason, governments appear increasingly keen to develop exploits in-house. Paulo Shakarian, a cyberwar expert at West Point, an American military academy, says China appears to be moving in this direction.
Developing exploits in-house reduces the risk that a double-dealing vendor will resell code meant to be exclusive. Even so, the trade isn’t likely to fade away. When developers work out a trick that gives them control over the targeted software, they like to yell out a celebratory “who’s your daddy?” notes Pierre Roberge, boss of Arc4dia, a Quebec firm that sells exploits to spy agencies. Exploit trading will continue as long as people pay big money for the opportunity to utter the same joke—this time at the expense of a victim who has been hacked..... The Economist.
========================================================================================== The Secret to Getting Really Good at Promoting Referral Items: Join, Promote, Earn cash
1. You’ve got to have a website or a blog, of course the easiest and most practical Way to Promote Referral Items.
2. With this in place, join various network sites hosting merchants' products/services. There's usually no charge. You join; you get your own referral link code, so that you can send people to the destination with your own code branded into it. This way, the merchant can determine that the sale was originated by you and you earn a commission.
3. Choose from the more popular sites for information and/or hard products or services. Many of the products or services offer very generous commissions.
4. You can also examine the links that appear on this page and join the sites. We have spent the time and put in much effort to create for you something extraordinary! Go to the websites, relax, watch the videos, and get ready...they Can Easily Make you Financially Independent and many more!. You will have more reliable ones as you continue to hang on with http://fortunefair.blogspot.com
5. Once you joined, just do a search in the network company to find your favorite product/service.
6. Grab your code and promotional creative, text, banners, etc.
7. Place the link on your website.
8. Go ahead and promote your website. You should get many visitors to your website in order to be able to get enough sales.
9. Do a review of the product/service of your website and make a recommendation. A very good way is to review products/services and point out their pros and cons and rate them according to their quality.
10. Even better is to have your own experience with that product/service and share it with your visitors.
11. Only a small number of your visitors are likely to follow your advice and buy and this also provided that you've done an honest and good job promoting it.
12. You should take a look from time to time in the stats in your account at the network company to see how you perform. The good thing is that you don't necessarily have to deal with the merchants. You can just join a reliable and reputable network hosting the products/services and doing all the work for you.
Are you interested in generating income from Transport Partnership? Click this link: http://transitcare.blogspot.com/2013/03/make-perfect-start-in-2013.html
So what are the risks? With any new start up company you are at risk if the company doesn’t make it. Plain and simple. If you focus on promoting only one product, service, affiliate program or business opportunity and it doesn’t sell or the company goes down – you have nothing! But when you create multiple streams of income – if one of the streams dries up – it’s a bummer but not catastrophic.
Here, http://fortunefair.blogspot.com,
Here, http://fortunefair.blogspot.com, we will always preach the power of PRODUCTIVE LIVING and of creating MULTIPLE STREAMS OF INCOME as a way to help you make for yourself a large, stable, diverse, passive residual income with less effort and less cost. Earn instant multiple income streams daily.
Keep coming back to the blog as we keep on identifying the best methods, unique strategies, effective techniques to earn unlimited income from paid to click, surf, read, promote and sign up excellent passive income sources. These are revolutionary ways to make money online. We select, review and recommend to our associates the best PTC paying sites.
In a nutshell, we are helping thousands of people worldwide become their own boss from their own home. The best part is No matter how much experience you have online you can make money month after month! So, Stay subscribed for more-make-money tips & tricks...
SHARE/Tag your friends. Join our Facebook
Community Page: http://www.facebook.com/pages/Fortune-Links/155312721282026?ref=ts&fref=tsIn a nutshell, we are helping thousands of people worldwide become their own boss from their own home. The best part is No matter how much experience you have online you can make money month after month! So, Stay subscribed for more-make-money tips & tricks...
No comments:
Post a Comment