亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? theft of computer software-a national security threat.txt

?? a collection of mega hacking tools
?? TXT
字號:
December 1989FBI 1.       THEFT OF COMPUTER SOFTWARE:  A NATIONAL SECURITY THREAT                               By                         William J. Cook                     Assistant U.S. Attorney                          Chicago, IL     -- Between July and September 1987, a Chicago        youth attacked AT&T computers at Bell Labs in        Illinois and New Jersey, at a NATO missile        support site in North Carolina, and at Robbins        Air Force Base in Georgia, stealing software        worth $1.2 million and causing $174,000 worth        of damage. (1)     -- In October 1988, Scotland Yard arrested an        English attacker who had broken into over 200        military, corporate, and university computers        in the United States and Europe.  The        indication was that he planned to extort money        from one of the victim corporations. (2)     -- In November 1988, a college undergraduate        planted a computer virus that temporarily        disabled 6,000 computers on the U. S. Army        research computer network (ARPANET). (3)     As evident by these accounts of computer piracy, computer-aidedattacks on Government and corporate networks are becoming morenumerous and sophisticated.  While estimates vary, computer industrysources indicate that computer-related crime (including softwaretheft) annually costs U.S. companies as much as $5 billion per year,with each incident costing approximately $450,000. (4)  Moreimportantly, however, the infiltration and theft of computer files isa growing Federal crime problem, since many such actions jeopardizethe security and defense of the United States.     This article gives a brief overview of the theft and illegalexport of computer software.  It also details steps taken by the U.S.Government to protect national security and defense information withthe intent of curtailing and hopefully eliminating the occurrence ofsuch actions in the future.INTERNATIONAL COMPUTER HACKERS     While most computer attacks are committed by hackers who are notagents of foreign government, the growing attention of Eastern Blocgovernments to hackers indicates that these nations clearly recognizethe benefits of using them to expose openings in U.S.  computernetworks.     In March 1989, it was disclosed that West German hackerssponsored by Eastern Bloc intelligence agencies had beensystematically searching for classified information on Governmentcomputers throughout the United States through a weakness in acomputer network at a California university. (5)  The followingmonth, Canada expelled 19 Soviet diplomats for wide-ranging espionageoperations to obtain Canadian defense contractor information formilitary and commercial purposes. (6)  And in December 1988, a searchwarrant filed by U.S. Customs agents in Chicago disclosed that aconfederate of the Yugoslav Consul- General in Chicago was using ahacker to attack defense contractors by remote access in order tosteal computerized information.  According to the affidavit, theinformation obtained by the hacker was subsequently smuggled out ofthe United States in diplomatic pouches with the help of the Counsel-General.     Public access information and published reports reflect thatSoviet efforts to obtain technical information are not an illusion.A major daily newspaper reported that the Soviet Union was activelyfostering hacker-to-hacker ties between the Soviet internationalcomputer club and computer firms and hackers in the United States,Britain, and France. (7) Another newspaper account told of the SovietUnion setting up programmers in Hungary and India for the purpose oftranslating and converting U.S. origin software to the format ofSoviet and Warsaw Pact country machines. (8)  Then in March 1989, amember of the Soviet military mission in Washington, DC, was arrestedand expelled from the United States for attempting to obtaintechnical information about how U.S. Government classifiedinformation is secured in computers. (9)     The Soviet's main targets are U.S. Government agencies, defensecontractors, and high-tech companies and are purportedly backed by a$1.5 billion annual "procurement" budget.  Further, Soviet satellitecountries have become very active in the Soviet high technologyprocurement effort.   For the past several years, Hungarian,Bulgarian, Yugoslavian, and Polish intelligence officers and theiragents have participated in the high-tech theft effort, along withagents from Vietnam, North Korea, and India. (10)  Also, Cuban andNicaraguan intelligence officers are using front companies in Panamato obtain U.S. technology. (11)     News accounts suggest that these efforts are successful; 60-70%of the technology is obtained, while 90% of nonclassified hightechnology data is acquired.  More than 60% of the stolen technologycomes from the United States. (12)     As a result, the U.S. technological "lead" over the Soviets hasgone from 10-12 years in 1975 to 4-6 years in 1985. (13)  And thesavings to the Soviets has been impressive.  In 1978 it has beenestimated that the Soviet Union saved $22 million in research anddevelopment costs by stealing U.S. technology; the following year,they saved $50 million. (14)  Between 1976 and 1980, the Sovietaviation industry alone saved $256 million in research anddevelopment because of stolen U.S. technology. (15)  Moresignificantly, much of the stolen technology is critical to thenational security and defense of the United States.PROTECTING TECHNICAL DATA     In 1984, the U.S. Department of Commerce placed expanded exportcontrols on computer software as part of its general protection oftechnical data deemed vital to the national defense and security ofthe United States.  However, export control in this realm is anenormous challenge since modern technology allows the criminal tosteal restricted software stored on Government and corporatecomputers by remote access from a personal computer anywhere in theworld.  Literally, an international border becomes established wherea telephone line plugs into the computer modem.OBSERVATIONS     Several observations can be reached from this mosaic.Obviously, U.S. taxpayers are subsidizing the modernization of theSoviet military establishment.  And it is more economical for theSoviets to steal U.S. technology than to fund and develop their ownresearch and development capabilities.  More importantly, however,the United States needs to do a better job protecting its technology.     As noted previously, in response to the Soviet "tech-threat,"the United States and other countries expanded controls onhigh-technology computer software by placing them on the CommodityControl List or Munitions List.  Commerce Department and StateDepartment licensing officers require that validated export licensesand end-user assurances are obtained before software named on theselists are exported.  Both the Commerce and State Departmentsroutinely call in Defense Department personnel to analyze theseexport requests.     Prosecution for illegally exporting computer data and softwarecan be brought under several sections of the U.S. Code. (16)However, before prosecution under these sections can be successful,several areas must be developed in the computer industry and the lawenforcement community.     o  Corporations should consider placing export        control warnings on sensitive software        programs, which would clearly assist U.S.        efforts to enforce national export laws that        require defendants have specific knowledge of        export restrictions when they export the        computer data.     o  Federal agents need to become oriented to the        computer industry and computers to overcome        computerphobia.     o  Corporate and Government hiring must be done        with great care when the employees will have        access to computer networks or trash from        computer centers.     o  Computer security specialists and systems        administrators must be alert to internal        unauthorized access and external hacker        attacks and the potential ramifications of        activities.  They must also be aware that the        modem plug-in on one of their computers could        be the international border in the export        violation and that computerized log records        may be the only evidence of espionage of        "tech-theft."     o  Federal agents and computer security        professionals must recognize the need for        rapid mutual cooperation and communication,        with security professionals providing        background information on the attacked        computer network and assisting with Federal        investigations and search warrant efforts.CONCLUSION     It is folly to assume that U.S. industry can continue to makesufficient research and development advances each year to ensure thatthe United States keeps an edge on Warsaw Pact countries. Thesecountries continue to rob the United States of advanced technologicalinformation critical to the defense and security of this country.The taxpayers and consumers writing the checks for Government andprivate sector technological research and development deserve acoordinated Federal law enforcement and computer industry responsethat recognizes software and computer-related engineering as one ofour country's greatest resources.FOOTNOTES(1) ComputerWorld, February 20, 1989.(2) Sunday Telegraph, October 23, 1988.(3) The Boston Globe, November 14, 1988.(4) ComputerWorld, April 3, 1989.(5) Hamburg Ard Television Network, March 2, 1989; see also, CliffStoll, "Stalking the Wiley Hacker," Communications of the ACM, May1988.(6) Reuters, June 28, 1988.(7) The Washington Post, January 2, 1989.(8) The New York Times, January 29, 1988.(9) Reuters, March 9, 1989.(10) "Soviet Acquisition of Militarily Significant WesternTechnology: An Update," published by the Central Intelligence Agency,1985.(11) The Los Angeles Times, November 21, 1988.(12) Supra note 10.(13) Ibid.(14) Ibid.(15) Ibid.(16) 118 U.S.C.  sec. 1029 (fraudulent activity in connection withusing accessing devices in interstate commerce); 18 U.S.C. sec. 1030(remote access with intent to defraud in connection with Federalinterest computers and/or Government-owned computers); 18 U.S.C. sec.1343 (use of interstate communications systems to further a scheme todefraud); 18 U.S.C.  sec. 2512 (making, distributing, possessing, andadvertising communication interception devices and equipment);  18U.S.C. sec. 2314 (interstate transportation of stolen property valuedat over $5,000);  17 U.S.C.  sec. 506 (Copyright infringementviolations);  22 U.S.C. sec 2778 (illegal export of Department ofDefense controlled software); 18 U.S.C.  sec. 793 (espionage,including obtaining and/or copying information concerning telegraph,wireless, or signal station, building, office, research laboratory orstations for a foreign government or to injure the United States); 18U.S.C. sec. 2701 (unlawful access to electronically storedinformation);  18 U.S.C.  sec.  1362 (malicious mischief involvingthe willful interference with military communications systems); 18U.S.C.  sec. 1962 (RICO--20 years/$25,000/forfeiture of property forcommitting two violations of wire fraud and/or transportation ofstolen property).================================================================The EPIC Project, a nonprofit public benifit corporation foundedlast year by a handful of college students, is advising theChairman of the American Bar Association Technology and the Courts(Sundevil) Subcommittee looking into federal court rule changes.These proposed rule changes are a direct result of actions taken bythe Seceret Service, FBI and other enforcement agents in OperationSun Devil.  Rules of evidence, warrants, et al, are in drastic needof change to address the constitutional and civil rights issues atodds with technology.I would very much like to hear from anyone with constructive inputor suggestions for needed changes.                                               9-18-90Jeff Aldrich                    Fax: (707) 425-9811The EPIC Project              Voice: (707) 425-6813P.O. Box 5080-341              Data: 1:212/105@fido.orgFairfield, CA 94533                  jefrich@well.sf.ca.us

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区三区加勒比av| 在线观看欧美黄色| 欧美三级视频在线| 午夜不卡av免费| 日韩女优视频免费观看| 久久激情综合网| 国产亚洲一区二区三区在线观看| 精品在线你懂的| 国产精品久久久久四虎| 欧日韩精品视频| 在线看国产一区二区| 色久优优欧美色久优优| 精品在线播放免费| 国产大陆亚洲精品国产| 日韩中文字幕亚洲一区二区va在线| 精品久久久久av影院| 972aa.com艺术欧美| 亚洲成av人片| 国产精品日产欧美久久久久| 欧美一区二区三区公司| 国产精品一级片| 亚洲一区二区三区自拍| 欧美激情自拍偷拍| 日韩欧美国产综合| 中文字幕欧美国产| 亚洲午夜一区二区| 亚洲欧美日韩国产一区二区三区 | caoporen国产精品视频| 秋霞影院一区二区| 亚洲精品国产一区二区精华液| 久久精品夜色噜噜亚洲a∨| 亚洲国产经典视频| 石原莉奈在线亚洲三区| 国产资源在线一区| 精品在线你懂的| 色婷婷久久久久swag精品| 精品在线观看视频| 色乱码一区二区三区88| 欧美一卡在线观看| 亚洲欧洲日韩在线| 国产精品卡一卡二| 七七婷婷婷婷精品国产| 一本在线高清不卡dvd| 日韩一区二区三区在线观看| 91精品免费在线观看| 欧美丝袜第三区| 在线观看区一区二| 国产日韩欧美精品综合| 久久久亚洲午夜电影| 国产日产欧美一区二区三区| 亚洲成av人片在线| 色综合激情久久| 欧美激情一区二区三区不卡 | 色综合天天综合在线视频| 成人看片黄a免费看在线| 国产成人在线视频免费播放| 欧美挠脚心视频网站| 日韩一区二区精品葵司在线| 亚洲精品videosex极品| 成人激情av网| 91成人国产精品| 日韩一区有码在线| 精品在线你懂的| 日韩一区二区麻豆国产| 亚洲成人动漫在线观看| 在线免费观看日本欧美| 亚洲色图清纯唯美| 视频一区二区不卡| 欧美三级资源在线| 一区二区三区日韩在线观看| 不卡的电视剧免费网站有什么| 久久先锋影音av鲁色资源网| 亚洲天堂免费看| 成人免费黄色大片| 国产精品丝袜一区| 国产成人夜色高潮福利影视| 国产亚洲精品精华液| 国产一区高清在线| 色婷婷综合中文久久一本| 国产精品久久午夜夜伦鲁鲁| 成人福利视频在线| 中文字幕色av一区二区三区| 成人精品鲁一区一区二区| 国产女同性恋一区二区| 99久久精品国产精品久久 | 在线观看亚洲一区| 亚洲国产日韩av| 91精品国产综合久久久久| 天天操天天干天天综合网| 91精品国产91久久综合桃花| 蜜臀av性久久久久蜜臀av麻豆| 99re这里只有精品首页| 亚洲天堂福利av| 欧美日韩亚洲综合一区二区三区| 石原莉奈在线亚洲二区| 久久一区二区三区国产精品| 成人国产精品免费观看视频| 亚洲欧美日韩国产中文在线| 欧美日韩你懂得| 国产精品一区二区在线播放| 中文字幕在线不卡视频| 欧美日韩日日骚| 国产91丝袜在线播放| 日韩欧美国产电影| eeuss国产一区二区三区| 日欧美一区二区| 中文字幕av一区二区三区高| 欧美性色黄大片手机版| 麻豆久久久久久| 亚洲色图欧洲色图婷婷| 日韩欧美久久久| av资源网一区| 日韩va亚洲va欧美va久久| 欧美一a一片一级一片| 日本视频免费一区| 欧美激情综合五月色丁香小说| 精品视频色一区| 国产一区二区在线影院| 午夜国产精品一区| 亚洲欧洲99久久| 日韩美女视频在线| 欧美日韩精品二区第二页| 国产成人免费在线| 美女免费视频一区| 亚洲资源在线观看| 国产精品国产三级国产aⅴ无密码| 欧美日韩中文国产| 色一区在线观看| 国产成人在线视频网站| 麻豆国产欧美一区二区三区| 夜夜爽夜夜爽精品视频| 国产精品久久久久一区二区三区| 亚洲精品一区二区三区99| 国产精品综合av一区二区国产馆| 亚洲午夜久久久| 自拍偷拍亚洲综合| 国产欧美日韩三区| 精品免费日韩av| 欧美一级一级性生活免费录像| 色香蕉久久蜜桃| 99久久99久久精品免费看蜜桃| 久久精品久久99精品久久| 同产精品九九九| 亚洲柠檬福利资源导航| **性色生活片久久毛片| 久久久亚洲高清| 国产网站一区二区三区| 26uuu亚洲| 欧美sm美女调教| 欧美一卡2卡三卡4卡5免费| 在线日韩一区二区| 欧美在线免费观看亚洲| 色婷婷av一区二区三区大白胸 | 欧美日本一道本| 欧美性生活影院| 91精品国产综合久久久蜜臀图片 | 欧美优质美女网站| 91久久精品日日躁夜夜躁欧美| 99久久伊人久久99| 99久久99久久综合| 在线国产亚洲欧美| 欧美日韩一区国产| 日韩免费视频一区| 久久色中文字幕| 国产精品久久久久一区二区三区| 亚洲视频免费观看| 亚洲电影一级片| 蜜桃久久av一区| 日韩成人一级大片| 国产尤物一区二区| 成人av集中营| 欧美日韩国产综合视频在线观看| 在线电影欧美成精品| 国产成人精品午夜视频免费| 成人免费av网站| 在线免费观看日本欧美| 精品日产卡一卡二卡麻豆| 中文字幕巨乱亚洲| 亚洲图片欧美一区| 国产最新精品免费| 99久久99久久免费精品蜜臀| 91.com在线观看| 国产欧美精品一区| 五月天丁香久久| 成人免费毛片高清视频| 欧美日韩久久久| 日本一区二区三级电影在线观看| 亚洲综合免费观看高清在线观看| 日韩av一级片| www.日韩精品| 日韩午夜在线观看| 亚洲三级免费电影| 国产精品中文欧美| 在线不卡一区二区| 国产精品久久久久精k8| 蜜臀av亚洲一区中文字幕| 日本韩国欧美三级| 国产视频亚洲色图| 蜜臀a∨国产成人精品| 99久久99久久综合|