An Analysis on the Regulation of Grey Market Cyber Materials

By Kelsey Annu-Essuman
Cornell International Affairs Review
2014, Vol. 8 No. 1 | pg. 1/1

Executive Summary

This paper analyzes the grey market for cyber materials by evaluating the current nature of transactions within the market. This paper claims that vendors ought to be required to disclose information (to companies) on the vulnerabilities, exploits, and botnets that are sold. Analyses include:
a) Historical cases of weaponized cyber materials
b) Statistics on the costs associated with the grey market
c) Explanation of risks associated with unregulated grey market activity.

Limitations to mandatory disclosure outlined in the paper include the:
a) Culture of anonymity within the market
b) Appeal of lucrative job prospects for hackers who rely on the secretiveness of the market
c) Perception of risks.

Another overarching, key argument presented for non-regulation is the need for government agencies to preserve their access to tools of offensive warfare that are bought on the grey market.

In response to limitations, this paper finds that mandatory disclosure would, at minimum, allow software companies the opportunity to further pursue the protection of their systems and limit the risks of an unregulated market. This paper finds that enabling software companies best serves the interest of overall security and does not completely undermine the ability for government agencies to purchase offensive mechanisms.

Introduction

The creation of the computer network system and its spread throughout the international realm has opened doors for new ways of gathering information as well as manipulating this information for both protective and malicious purposes. While the material stored within computer systems is often thought of as being privy to the user of that system and whomever the user decides to share their data with, the rise in cyberattacks has proven otherwise. Cyber "crime" or "attacks"─the exploitation of Internet and, more generally, computer vulnerabilities in order to access and use private information ─rose as personal data began being stored on system networks since the nascent years of the internet.1

Policies such as the Computer Fraud and Abuse Act of 19862 and the proposed National Defense Authorization Act for 20143 have establish(ed) guidelines for unauthorized tapping into the systems of the U.S. government as well as financial and commerce institutions. While cyber-attacks were initially thought of as a method used by individual or small bands of hackers attempting to access information for personal use4, discussions of cyber-crime have shifted to the offensive mechanisms of hacking employed by governmental organizations. With large-scale attacks such as the Morris worm replicated in UNIX systems across the globe in 19885 and, more recently, the infection of 30,000 Saudi Aramco (world's largest oil producer) networks with a self-replicating Shamoon virus in 2012,6 it has become clear that the title of "hacker" is no longer reserved for individuals but extends to governments as well.

WITH THE ONSET OF LARGE-SCALE CYBER ATTACKS, IT HAS BECOME CLEAR THAT THE TITLE OF

With the onset of large-scale cyber attacks, it has become clear that the title of "hacker" is no longer reserved for individuals but extends to governments as well.

The rise in government probes into both domestic and foreign security systems reveals that while there is a significant amount of information to be gathered for important national security purposes, there is also a significant level of risk in the methodology of information gathering.7 Risks are exacerbated by the types of markets available for purchasing exploits and botnets or merely the information on system vulnerabilities that can be crafted into an exploit.

The three forms of markets – the white market, grey market, and black market – all pose significant dangers in that they compromise the information of buyers, purchasers, and those who will be affected by the use of the cyber material being sold. This paper focuses on the clandestine and unregulated grey market where government authorities, defense organizations, and other pseudo-political groups are able to purchase their cyber material. Given the market's secrecy, this paper argues that regulatory measures ought to be imposed on grey market transactions.

More specifically, vendors should be required to disclose the vulnerabilities and exploits to computer software companies (in this essay, synonymous with the term "manufacturers") prior to making the information marketable to purchasers. Provisions for providing this information ought to be mandatory in an effort to ensure that companies have been given ample ability to secure their data and the data of their users. This suggestion is based on the notion that defensive measures of securing information ought to be prioritized over the potential to create offensive attacks using holes, or "vulnerabilities," in security.

The monetary incentive for hackers to sell cyber materials and information is related to the changing nature of the cyber realm

I begin by outlining the general functions of the grey market. Here, I explain the uses of the cyber materials─namely for offensive security tactics by government authorities and defense contractors. In describing the buyer-seller dynamic, I outline the effects of anonymity and monetary incentives on vendors within the market. I remark on the limitation these dynamics place on regulation.

Following this, I explore the possibility of regulation through a previously advocated technique, professionalization, and the mandatory disclosure. In exploring regulation, I discuss the types weapons sold in the market and types of buyers. I narrow my analysis to the type of cyber-material predominately bought and sold in the market: zero-day exploits. My explanation of zero-day exploits includes the risks associated with cyber materials being indiscriminately made available to all types of actors. Throughout my analysis, I consider concerns of feasibility. In discussing the merits of market regulation, I hope to demonstrate that regulation is essential to ensuring security for the systems vulnerabilities infect.

The Grey Market Allure

A description of the grey market yields three features key to its function as an unregulated space: the culture of anonymity, the potential for large monetary gains, and (most relevant to government and defense agencies) the potential for gaining information necessary for offensive attacks. Anonymity─the confidentiality of actors and specific materials on the grey market─is a particularly important issue to both sellers, and most especially buyers. Understandably, agencies prefer to keep their purchases unknown to the general public, as their activity within the grey markets is part of national security intelligence and defense informational tactics.8

For example, the Grugq ─an exploit broker─faced immense pressure and backlash in the form of decreased demand for his informational products after exposing in an interview9 the payments and customers he receives for cyber exploits. The nature of the market means that the threat of backlash and subsequently lost revenue undermines efforts to expose information and reinforces the culture of anonymity. Secondly, individual hackers who discover system holes─be it at hacking conferences amongst colleagues and potential buyers or within the privacy of their home─can make upwards of 15% from their sales.10 The monetary incentive for hackers to sell cyber materials and information is related to the changing nature of the cyber realm. Perlroth and Sanger note, "Ten years ago, hackers would hand knowledge of such flaws to Microsoft and Google free, in exchange for a T-shirt or perhaps for an honorable mention on a company's Web site".11

As cyber security is becoming more and more part of the U.S.'s national security discourse12, authorities are seeking assistance from those with intimate knowledge of the hacking community. As a result of the changing face of cyber attacks, hackers are now being sought out by reputable states agencies such as the National Security Agency13 who have become "open advocates [of the hacker community], willing to buy technology, and fund research",14 as their work is being demanded by the shifting nature of warfare and the intelligence agency. Initially, infiltrating the hacker community had its own challenges, particularly in the area of trustworthiness amongst hackers and governments. To mollify suspicions, transactions were based on a level of anonymity.

This was necessary for hackers who had previously been targeted by government agencies and for governments who did not yet have the intelligence and expertise to verify information retrieved from hacking communities. Currently, individuals who were once stigmatized as criminals are parts of a lucrative market that reinforces the specificity of their work. This also means agencies are willing to pay more in order to remain atop of the demands of the shifting cyber tools, thereby reinforcing the effects of anonymity and monetary incentives.

CURRENTLY, INDIVIDUALS WHO WERE ONCE STIGMATIZED AS CRIMINALS ARE PARTS OF A LUCRATIVE MARKET THAT REINFORCES THE SPECIFICITY OF THEIR WORK

Currently, individuals who were once stigmatized as criminals are parts of a lucrative market that reinforces the specificity of their work.

While supply and demand in competitive markets would predict that the lucrative market for hackers would create an opposing market for researchers seeking to patch loopholes, this is not currently the case. Despite the work that some researchers do to uncover vulnerabilities and forewarning software companies of future breaches, these individuals are oftentimes not compensated for their work─even by large corporations such as Adobe and Apple15.

In fact, independent hackers who sell their findings to grey market vendors make close to "10 or even 100 times" more than what researchers can receive for providing information to companies such as Facebook and Microsoft16, thereby creating an indisputable disincentive to assist companies. Efforts such as the "Hacker One" initiative by Facebook and Microsoft as well as the Texas─based Zero Day Initiative17 have attempted to amend the problems of compensation for disclosure by paying researchers $300 to $5,00018 for their knowledge of any malware, vulnerabilities, or exploits that will later be sold.

On Hacker One, discussions of vulnerabilities or "bugs" are made open on feeds that also list who have earned certain compensations or "bounties" for their contributions.19 Hackers can even ban together forming "teams" for exploring holes in systems and reporting back to Hacker One.20 Yet, it is clear that any effort to require disclosure by hackers to companies would have to offer comparable monetary incentives to promote cooperation and avoid the risk of merely driving transactions even further underground into deeper spaces of anonymity such as the black market for cyber materials. Hence, international regulation within the hacker and cyber researcher communities is limited.

Mandatory Disclosure as Regulation: A Possibility?

Within the grey market is a culture of indiscriminate transactional practices, which pose difficulties for requiring disclosure, beyond concerns of monetary incentives. Buyers and sellers that are not held accountable by outside standards are susceptible to equipping organizations with malicious intent with the products they need to carry out their actions. One suggestion to rectify this risk is to make the grey market sellers "official" by professionalizing their practices. Although this suggestion is more focused on changing the perception or connotation associated with the clandestine sale of cyber materials, professionalization would involve setting normalized standards for the industry. The goal of professionalization would be to "regulate workers…enhance public trust…and enable compliance with regulatory requirement" among other goals.21

Presumably, this would involve standardizing requirements on the levels of schooling needed to enter the cyber security field, assessment of skills related to the industry and general career preparation/ etiquette when handling personable, vulnerable information. Not only would standardizing the players of the market entail requirements for credentials such as certifications for hackers and required training for properly handling sensitive information, but it would also affect the way vendors presently operate by not screening their buyers. The wellknown French organization Vupen, which specializes in identifying vulnerabilities to be sold for large sums (sometimes $1 million),22 refuse to reveal their clientele.23 By not screening buyers, Vupen and companies like it create the potential for maliciously intended agencies to gain access to their vulnerabilities without any pushback from regulatory practices.

As a result of the changing face of cyber attacks, hackers are now being sought out by reputable states agencies such as the national security agency

Professionalization seems to be a more attractive option to naturally regulate grey markets because it involves altering the culture of the market. Yet, determining hiring practices, specifying types of skill sets, and giving guidelines for the type of education necessary to enter into these markets as a vendor or identifier of vulnerability are difficult tasks. In this way, the capricious and blanketed nature of discovering vulnerabilities and creating exploits hinders professionalization. Hence, what works in one instance of uncovering and creating a potential exploit to be sold may not be sufficient or necessary to effectively identify holes in another scenario. The consistency of professionalized standards is, in fact inconsistent with the market itself.

Another suggestion, the one advocated in this paper, is to make transactions a liability for the seller.24 If the seller is required to demonstrate proof (either via documentation or exchanges between the vendor and company) that the vulnerabilities and exploits being sold have also been given to the manufactures of the systems that the holes are within, then the risk of those vulnerabilities being given to anonymous buyers is mitigated, if not eliminated.

The most salient issue surrounding anonymity, as mentioned before, is that the intention of the buyer is unknown. In the case where a company has been made aware that their systems could be compromised, the company could now be held liable for breaches and have the responsibility of pursuing measures to mend the breach. Intentions of buyers are then made irrelevant, since, regardless of who knows the vulnerability, the company is well informed on how to protect themselves and their users.

While the approach of liability is most beneficial in cases where the intentions are unclear, the viability of requiring disclosure of information from sellers of vulnerabilities is complicated by situations where the vulnerabilities can be used for preventative (offensive) purposes. Perhaps the most salient issue related to feasibility is the need to preserve avenues for cyber information gathering to be used in offensive activities. Government and defense agencies typically purchase cyber materials as tools for espionage and claim these practices as legitimate forms of warfare and, more benignly, national security.

The offensive nature of espionage relies on the fact that the exploit is used to obtain information to help promote other security initiatives. Claims to the necessity of offensive attacks are difficult to counteract since the idea of offensive tools is not foreign to the realm of warfare. The case of Stuxnet illuminates a concern in providing governments with access to vulnerabilities on a private marketplace. Stuxnet, a zeroday weaponized computer program discovered in June 2010 by VirusBlokAda, was developed from codes exposing vulnerabilities in Windows systems.25 The United States and Israel were later revealed as being the initiators of the cyber-attack, with 60,000 computers26 in various countries such as the United Kingdom, Germany, South Korea, China, and India being infected and over 60% of the worm infections taking place in Iran.27

The sheer scale and global nature of the attack was not the sole reason for concern. Stuxnet disrupted the frequencies within centrifuges of Iran's nuclear facilities, thereby becoming the "first industrial-sized" attack using malware. The intention was to isolate systems within Iran; however, the fact that 40% of the worm was replicated in other nations exposed risks related to collateral damage.

THE UNITED STATES AND ISRAEL WERE LATER REVEALED AS BEING THE INITIATORS OF THE CYBER-ATTACK, WITH 60,000 COMPUTERS IN VARIOUS COUNTRIES AROUND THE WORLD

The United States and Israel were later revealed as being the initiators of the cyber-attack, with 60,000 computers in various countries around the world.

The concern, related to the idea of intentionality and anonymity, is that two subsets of users of the grey market─terrorist organizations and "rogue" governments – may have (or already do have) the same information as more favorable (or trustworthy) buyers.

Furthermore, regulation, as during prohibition, can cause otherwise visibly detrimental actions to become less visible and transactions to occur in the "underground" black market. Having exploits and vulnerabilities in that market is potentially even more risky since knowledge of where these markets are and who is partaking in transactions is kept secretive, in addition to what is being sold. And, even more starkly different from the grey market, black-market cyber materials (oftentimes counterfeit)28 are sold at cheap prices to attract purchasers who would be more inclined to buy from more secure vendors at the same price. Furthermore, materials are oftentimes counterfeit.

The Trajectory of Cyber Warfare and Perception of Risks

Thus far, the focus of this paper has been on the actors of the grey market and the risks associated with their participation. The question of the necessity of regulation cannot focus solely on concerns of who is selling and who is purchasing. Rather, there is also a question to be considered about what is being sold; and the main product on the line is one that has been linked to growing discussions on the future of cyber warfare: exploits.

Zeroday exploits are known as the most detrimental compromises of software because they are classified as "unknown threats". Thereby, zerodays cannot be mended by anti-spyware or malware protections already in place within a system.29 Sold on the "high-end" level of the gray market at "up to $250,000,"30 once a zero-day has infiltrated a system, the effects are immediate and system managers do not have time ("zero days") to reverse and patch the holes within the system.31

Zero-days are considered to be "weaponized" once they are used "to disrupt, disable, or destroy computer networks and their components."32 While zero-days are the most prevalent types of exploits to be weaponized, the information needed to transform a system into a botnet can also be found in the grey market. Specifically, a botnet is when hackers use malware to control systems remotely, thereby being able to access private documents and information stored on systems, as well as control commands with the computer(s).33 These controls can be used for espionage or fraudulent purposes.

The question of the necessity of regulation cannot focus solely on concerns of who is selling and who is purchasing

Cyber war has become more of a catch phrase because of the prevalence of interconnected informational and communications technologies; yet, the perception of risk is a limiting factor in how willing individuals are or will be to abide by disclosure requirements. Currently, many still believe that cyber war is not imminent and that the manipulation of systems technology is confined to the realm of personal theft, such as identity thieves or clandestine government activity that ought to remain privy to the Department of Defense and National Security Association.

Yet, the real concern surrounding cyber materials purchased in the grey market by ill-intended actors lies in the ability for information and communications technologies now to be used for targeting "electrical grids, food distribution systems, [and] any essential infrastructure that runs on computers."34 Perceptions of risk matter in so far as hackers are individual members of these communities. They are also the ones who can create a culture within the hacking industry of either ambivalence towards the growing potential to cause physical damage or activism for safer methods of utilizing information for the sake of all those involved.

Companies who sell informational and technological material face enormous costs once their information is compromised. The International Criminal Police Organization (INTERPOL) acknowledges these large costs in their 2007 and 2008 estimates of sums paid to retroactively rectify attacks against gaps in software. INTERPOL notes, "The cost of cybercrime worldwide was estimated at approximately USD 8 billion. As for corporate cyber espionage, cyber criminals have stolen intellectual property from businesses worldwide worth up to USD 1 trillion" ─ larger than the budget of INTERPOL itself.35 Similarly, Intel reports that the "US government alone spent $25 million purchasing code vulnerabilities"36 making it the largest spender on material for potentially offensive exploits in comparison to states such as Russia, China, and North Korea.

While the U.S. government justifies their purchases through claims of using information for offensive attacks, it is unclear whether the same discretion can be trusted in the hands of other actors within the grey market, as mentioned above. Terrorist organizations are also able to purchase exploits and vulnerabilities, and the absence of external checks on their purchases means that they are unregulated in the most extreme sense and have the ability to weaponize vulnerabilities. Essentially, mandatory disclosure has the potential to minimize these costs by creating a safety net for software companies who have the human capital to invest in finding solutions to patch the holes in their software, but do not necessarily have information on where these holes are located.

Conclusion

At the beginning of this paper, I hoped to demonstrate the necessity for regulating the grey market of cyber materials. The value in regulating the grey market was based in the idea that informational security ought to be prioritized over offensive security measures that could be pursued by access to system vulnerabilities. Throughout this paper, it has become clear that these two intentions ─ securing information and pursuing offensive attacks ─ are not mutually exclusive. With cases such as Stuxnet, government agencies have used the vulnerabilities and zero-day exploits purchased from grey market vendors as a means of preventative action. Yet, the feasibility of requiring sellers to disclose information of their "products" is limited by the attractiveness of lucrative jobs in hacking as well as the willingness of buyers and sellers in the grey market to impose regulations on their practices, as demonstrated by the stance of organizations like Vupen.

Despite these limitations, it is necessary to consider mandatory disclosure as an option because of the real risks associated with maintaining a secretive market for cyber materials. These risks are amplified by the types of materials primarily sold in the grey market (zero-day exploits) and the types of buyers attracted to the market's clandestine nature (organizations with potentially malicious intent). While government agencies argue the necessity of the grey market for purchasing offensive warfare material, the necessity to protect individuals ought to be valued over protecting an interest in maintaining a wide array of national security tools. Requiring the disclosure of vulnerabilities would enable companies to pursue security measures while not fully hindering buyers from purchase exploits and vulnerabilities on the grey market.


References

Bronk, Christopher and Eneken Tikk-Ringas, “The Cyber Attack on Saudi Aramco.” Survival: Global Politics and Strategy. Vol 55 no.2 April-May 2013, Pg 81-82. <http://www.tandfonline.com/doi/pdf/10.1080/00396338.2013.784468>

Farwell, James P. and Rafal Rohozinski, “Stuxnet and the Future of Cyber War.” Survival: Global Politics and Strategy. Vol 53 no.1, February-March 2011.Routledge. Pg 23-30. <http://www.tandfonline.com/doi/pdf/10.1080/00396338.2011.555586>

Goldsmith, Jack. “Regulation of the Internet: Three Persistent Fallacies.” Chicago-Kent Law Review, Vol 73, Issue 4, Symposium on the Internet and Legal Theory. 11 Oct. 2013. Web. 1 March. 2014. <http://scholarship.kentlaw.iit.edu/cgi/viewcontent.cgi?article=3143&context=cklawreview>

Greenberg, Andy, “Meet the Hackers Who Sell Spies the Tools to Crack Your PC (And Get Paid Six Figure Fees),” Forbers, March 12, 2012, <http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/>

H.R. 1960: National Defense Authorization Act for Fiscal Year 2014, 113th Congress, 2013-2015. Text as of Jul 08, 2013. <https://www.govtrack.us/congress/bills/113/hr1960/text> [Internet accessed on March 2nd 2014]

HackerOne <https://hackerone.com/feed> [Internet Accessed on February 27, 2014] International Criminal Police Organization. <http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime> [Internet accessed on March 1st 2014]

Langer, Ralph, “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEEXplore, Focus. May/June 2011. Web. 1 March 2014. <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5772960&tag=1>

Menn, Joseph, “Special Report: U.S. Cyberwar Strategy Stokes Fear of Blowback,” Reuters, May 10, 2013, <http://in.reuters.com/article/2013/05/10/usa-cyberweapons-idINDEE9490AX-20130510?type=economicNews>

Microsoft Safety and Security Center, “What is a botnet?,” http://www.microsoft.com/security/resources/botnet-whatis.asp.x[Internet accessed on February 27, 2014]

National Academies of Sciences, “Professionalizing the Nation’s Cybersecurity Workforce?: Criteria for Decision-Making.” The National Academies Press. (2013).Web. 7 Feb. 2014. Pg 16-18. <https://classesv2.yale.edu/access/content/group/plsc125_s14/Readings%20-%20Week%205/2013%20-%20Professionalising%20the%20Nations%20Cybersecurity%20Workforce.pdf>

Nato Review Magazine, <http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm> [Internet accessed on February 24, 2014]

PcTools by Symantec, “What is a Zero-Day Vulnerability?,” http://www.pctools.com/securitynews/zero-day-vulnerability/ [Internet Accessed on February 27, 2014]

Pereloth, Nicole and David E. Sanger, “Nations Buying as Hackers Sell Flaws in Computer Code,” 13 July 2013, The New York Times, <http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html?_r=0>

Riley, Michael and Ashlee Vance. “Cyber Weapons: The New Arms Race,” Bloomberg BusinessWeek, 20 July 2011. Web. 3 March 2014. <http://www.businessweek.com/printer/articles/540-cyber-weapons-the-new-arms-race>

Rosenquist, Matthew, “How Offensive Cybersecurity is Changing the Industry,” Intel, 8 Oct 2013. Web. 1 March 2014. <https://communities.intel.com/community/itpeernetwork/blog/2013/10/08/how-offensive-cyber-security-is-changing-the-industry>

Stockton, Paul and Michele Golabek-Goldman. “Curbing the Market for Cyber Weapons.” (2013). Pg 2-12. <https://classesv2.yale.edu/access/content/group/plsc125_s14/Readings%20-%20Week%205/2013%20-%20Golabek-Goldman%20_%20Stockton%20-%20Curbing%20the%20Market%20for%20Cyber%20Weapons.pdf>

The White House, “Launch of the Cybersecurity Framework,” <http://www.whitehouse.gov/thepress-office/2014/02/12/launch-cybersecurity-framework>12 Feb. 2014. [Internet Accessed 17 Feb 2014]

U.S. Code § 1030 - Fraud and related activity in connection with computers. <http://www.law.cornell.edu/uscode/text/18/1030> [Internet accessed on March 2nd 2014]

Verizon, “2013 Data Breach Investigations Report,” Pg. 6, <file:///Users/kelseyannu-essuman/Downloads/rp_data-breach-investigations-report-2013_en_xg.pdf>. 2013. Web. 2 March 2014.

Zero Day Initiative <http://www.zerodayinitiative.com/about/> [Internet Accessed on March 2nd 2014]


Endnotes

  1. Interpol, <http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime>
  2. 18 U.S. Code 1030 Fraud and Related Activity in Connection with Computers, <http://www.law.cornell.edu/uscode/text/18/1030>
  3. Subtitle D: Cyber-Related Matters, National Defense Authorization Act for Fiscal Year 2014, <https://www.govtrack.us/congress/bills/113/hr1960/text>
  4. See note 1
  5. Cyber Timeline, <http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm>
  6. Page 81-83, The Cyber Attack on Saudi Aramco, <http://www.tandfonline.com/doi/pdf/10.1080/00396338.2013.784468>
  7. Pg 5-6, 2013 Data Breach and Investigation Report, <file:///Users/kelseyannu-essuman/Downloads/rp_data-breach-investigations-report-2013_en_xg.pdf>
  8. Perlroth and Sanger, “Nations Buying as Hackers Sells Flaws in Security Code,” <http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computerflaws.html?_r=0>
  9. Greenderg, Andy,”Meet the Hackers Who Sell Spies the Tools to Crack Your PC” <http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-thetools-to-crack-your-pc-and-get-paid-six-figure-fees/>
  10. Ibid
  11. See note 8
  12. The White House, Launch of the Cybersecurity Framework, http://www.whitehouse.gov/thepress-office/2014/02/12/launch-cybersecurity-framework
  13. See note 8
  14. Rosenquist, “How Offensive Cyber Security is Changing the Industry” <”https://communities.intel.com/community/itpeernetwork/blog/2013/10/08/how-offensive-cyber-security-is-changing-the-industry>
  15. Menn, “U.S. Cyber strategy stokes fear of blowback,” <http://in.reuters.com/article/2013/05/10/usa-cyberweapons-idINDEE9490AX20130510?type=economicNews>
  16. Stockton and Golabek-Goldman. “Curbing the Market for Cyber Weapons,” Pg 2-12 <https://classesv2.yale.edu/access/content/group/plsc125_s14/Readings%2-%2Week%25/2013%20-%20Golabek-Goldman%20_%20Stockton%20-%20Curbing%20the%20Market%20for%20Cyber%20Weapons.pdf>
  17. Zero Day Initiative, <http://www.zerodayinitiative.com/about/>
  18. See note 16
  19. Hacker One, <https://hackerone.com/feed>
  20. Ibid
  21. Pg 16-18, National Academies of Sciences, “Professionalizing the Nation’s Cybersecurity Workforce?: Criteria for Decision-Making,” <https://classesv2.yale.edu/access/content/groupplsc125_s14/Readings%20-%20Week%205/2013%20-%20Professionalising%20the%20Nations%20Cybersecurity%20Workforce.pdf>
  22. See note 9
  23. Ibid
  24. See note 21
  25. Langer, <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5772960>
  26. Farewell and Rohozinski, Pg 23-30, "Stuxnet and the future of Cyber War" <http://www.tandfonline.com/doi/pdf/10.1080/00396338.2011.555586>
  27. Ibid
  28. See note 1
  29. PcTools by Symantec, “What is a Zero-Day Vulnerability” <http://www.pctools.com/security-news/zero-day-vulnerability/>
  30. Riley and Vance, “Cyber Weapons: The New Arms Race,” <http://www.businessweek.com/printer/articles/540-cyber-weapons-the-new-arms-race>
  31. See note 29
  32. See note 16
  33. See note 30
  34. Ibid
  35. See note 1
  36. Rosenquist, “How Offensive Cyber Security is Changing the Industry” <https://communities.intel.com/community/itpeernetwork/blog/2013/10/08/how-offensive-cyber-security-is-changing-the-industry>

Image Attributions

“Cyber Security at the Ministry of Defence MOD” by Harland Quarrington. Licensed under the Open Government Licence v1.0 via Wikimedia Commons.

“Computer-Police” by Stijn.Berghmans-Own Work. Licensed under the Creative Commons CC0 1.0 Universal Public Domain Dedication via Wikimedia Commons.

“Defense.gov Photo Essay” by U.S. Air Force Master Sgt. Jerry Morrison. Work of employee or official in U.S. Federal Government, permission in public domain via Wikimedia Commons.

Suggested Reading from Inquiries Journal

In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger's then soon to be released book entitled Confront and Conceal was published in the New York Times.2 This piece, purportedly based on the testimony of several current and former American, European and... MORE»
Advertisement
There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as... MORE»
In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of "cyberwar", previously formulated in an article of the same name2 published in January 2012. His chief point is that "cyber war has never happened in the past, it does not occur in the present, and it is unlikely that it will disturb... MORE»
Cyber security is a compelling problem for scholars of International Politics. Internet technology is so thoroughly integrated into civil society, commerce, governance, critical infrastructures, intelligence collection and law enforcement that the stakeholders necessary to cyber security practices and policies are diverse and complex... MORE»
Submit to Inquiries Journal, Get a Decision in 10-Days

Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.

Representing the work of students from hundreds of institutions around the globe, Inquiries Journal's large database of academic articles is completely free. Learn more | Blog | Submit

Follow SP

Latest in International Affairs

2017, Vol. 10 No. 2
In recent decades, Japan and South Korea have become hosts to ethnic return migrants who have returned to their ancestral homeland after once emigrating overseas. Since the 1980s, the Brazilian nikkeijin, or members of the Japanese diaspora, have... Read Article »
2017, Vol. 10 No. 2
In December 1948, the United Nations adopted the Universal Declaration of Human Rights, which recognized the universal human right to food. Most recently in July 2010, the U.N. General Assembly adopted resolution 64/292 that recognized the human... Read Article »
2017, Vol. 10 No. 2
The global network of the Islamic State of Iraq and Syria (ISIS), also known as Daesh,2 is expanding rapidly. Southeast Asia is especially vulnerable because of its large Muslim population and its history of extremist groups. In fact, some experts... Read Article »
2017, Vol. 10 No. 2
It is often thought that great military strategists do not engage in simple, frontal assaults, but instead devise complex plans meant to deceive, manipulate, and surprise their enemies. However, do such strategies always lead to victory? If not,... Read Article »
2017, Vol. 9 No. 05
This article explores the role that the Responsibility to Protect (R2P) played in the 2011 intervention in Libya. It examines the R2P legal framework in coordination with events on the ground in Libya during the early part of 2011 in order to thoroughly... Read Article »
2012, Vol. 1 No. 1
Published by Clocks and Clouds
Despite a proliferation of non-governmental organizations (NGOs) and community-based organizations (CBOs) in Kibera, the largest informal settlement in Kenya, conditions for residents remain bleak. CBOs are uniquely positioned to catalyze change... Read Article »
2012, Vol. 1 No. 1
Published by Clocks and Clouds
Missionary work has been an integral part of community development in Latin America. However, does missionary work actually impact community development in Latin America today? While missionary methods, particularly holistic missiology, were significant... Read Article »

What are you looking for?

FROM OUR BLOG

7 Big Differences Between College and Graduate School
How to Read for Grad School
How to Manage a Group Project (Video)