亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? theft of computer software-a national security threat.txt

?? 黑客培訓(xùn)教程
?? TXT
字號:
December 1989FBI 1.       THEFT OF COMPUTER SOFTWARE:  A NATIONAL SECURITY THREAT                               By                         William J. Cook                     Assistant U.S. Attorney                          Chicago, IL     -- Between July and September 1987, a Chicago        youth attacked AT&T computers at Bell Labs in        Illinois and New Jersey, at a NATO missile        support site in North Carolina, and at Robbins        Air Force Base in Georgia, stealing software        worth $1.2 million and causing $174,000 worth        of damage. (1)     -- In October 1988, Scotland Yard arrested an        English attacker who had broken into over 200        military, corporate, and university computers        in the United States and Europe.  The        indication was that he planned to extort money        from one of the victim corporations. (2)     -- In November 1988, a college undergraduate        planted a computer virus that temporarily        disabled 6,000 computers on the U. S. Army        research computer network (ARPANET). (3)     As evident by these accounts of computer piracy, computer-aidedattacks on Government and corporate networks are becoming morenumerous and sophisticated.  While estimates vary, computer industrysources indicate that computer-related crime (including softwaretheft) annually costs U.S. companies as much as $5 billion per year,with each incident costing approximately $450,000. (4)  Moreimportantly, however, the infiltration and theft of computer files isa growing Federal crime problem, since many such actions jeopardizethe security and defense of the United States.     This article gives a brief overview of the theft and illegalexport of computer software.  It also details steps taken by the U.S.Government to protect national security and defense information withthe intent of curtailing and hopefully eliminating the occurrence ofsuch actions in the future.INTERNATIONAL COMPUTER HACKERS     While most computer attacks are committed by hackers who are notagents of foreign government, the growing attention of Eastern Blocgovernments to hackers indicates that these nations clearly recognizethe benefits of using them to expose openings in U.S.  computernetworks.     In March 1989, it was disclosed that West German hackerssponsored by Eastern Bloc intelligence agencies had beensystematically searching for classified information on Governmentcomputers throughout the United States through a weakness in acomputer network at a California university. (5)  The followingmonth, Canada expelled 19 Soviet diplomats for wide-ranging espionageoperations to obtain Canadian defense contractor information formilitary and commercial purposes. (6)  And in December 1988, a searchwarrant filed by U.S. Customs agents in Chicago disclosed that aconfederate of the Yugoslav Consul- General in Chicago was using ahacker to attack defense contractors by remote access in order tosteal computerized information.  According to the affidavit, theinformation obtained by the hacker was subsequently smuggled out ofthe United States in diplomatic pouches with the help of the Counsel-General.     Public access information and published reports reflect thatSoviet efforts to obtain technical information are not an illusion.A major daily newspaper reported that the Soviet Union was activelyfostering hacker-to-hacker ties between the Soviet internationalcomputer club and computer firms and hackers in the United States,Britain, and France. (7) Another newspaper account told of the SovietUnion setting up programmers in Hungary and India for the purpose oftranslating and converting U.S. origin software to the format ofSoviet and Warsaw Pact country machines. (8)  Then in March 1989, amember of the Soviet military mission in Washington, DC, was arrestedand expelled from the United States for attempting to obtaintechnical information about how U.S. Government classifiedinformation is secured in computers. (9)     The Soviet's main targets are U.S. Government agencies, defensecontractors, and high-tech companies and are purportedly backed by a$1.5 billion annual "procurement" budget.  Further, Soviet satellitecountries have become very active in the Soviet high technologyprocurement effort.   For the past several years, Hungarian,Bulgarian, Yugoslavian, and Polish intelligence officers and theiragents have participated in the high-tech theft effort, along withagents from Vietnam, North Korea, and India. (10)  Also, Cuban andNicaraguan intelligence officers are using front companies in Panamato obtain U.S. technology. (11)     News accounts suggest that these efforts are successful; 60-70%of the technology is obtained, while 90% of nonclassified hightechnology data is acquired.  More than 60% of the stolen technologycomes from the United States. (12)     As a result, the U.S. technological "lead" over the Soviets hasgone from 10-12 years in 1975 to 4-6 years in 1985. (13)  And thesavings to the Soviets has been impressive.  In 1978 it has beenestimated that the Soviet Union saved $22 million in research anddevelopment costs by stealing U.S. technology; the following year,they saved $50 million. (14)  Between 1976 and 1980, the Sovietaviation industry alone saved $256 million in research anddevelopment because of stolen U.S. technology. (15)  Moresignificantly, much of the stolen technology is critical to thenational security and defense of the United States.PROTECTING TECHNICAL DATA     In 1984, the U.S. Department of Commerce placed expanded exportcontrols on computer software as part of its general protection oftechnical data deemed vital to the national defense and security ofthe United States.  However, export control in this realm is anenormous challenge since modern technology allows the criminal tosteal restricted software stored on Government and corporatecomputers by remote access from a personal computer anywhere in theworld.  Literally, an international border becomes established wherea telephone line plugs into the computer modem.OBSERVATIONS     Several observations can be reached from this mosaic.Obviously, U.S. taxpayers are subsidizing the modernization of theSoviet military establishment.  And it is more economical for theSoviets to steal U.S. technology than to fund and develop their ownresearch and development capabilities.  More importantly, however,the United States needs to do a better job protecting its technology.     As noted previously, in response to the Soviet "tech-threat,"the United States and other countries expanded controls onhigh-technology computer software by placing them on the CommodityControl List or Munitions List.  Commerce Department and StateDepartment licensing officers require that validated export licensesand end-user assurances are obtained before software named on theselists are exported.  Both the Commerce and State Departmentsroutinely call in Defense Department personnel to analyze theseexport requests.     Prosecution for illegally exporting computer data and softwarecan be brought under several sections of the U.S. Code. (16)However, before prosecution under these sections can be successful,several areas must be developed in the computer industry and the lawenforcement community.     o  Corporations should consider placing export        control warnings on sensitive software        programs, which would clearly assist U.S.        efforts to enforce national export laws that        require defendants have specific knowledge of        export restrictions when they export the        computer data.     o  Federal agents need to become oriented to the        computer industry and computers to overcome        computerphobia.     o  Corporate and Government hiring must be done        with great care when the employees will have        access to computer networks or trash from        computer centers.     o  Computer security specialists and systems        administrators must be alert to internal        unauthorized access and external hacker        attacks and the potential ramifications of        activities.  They must also be aware that the        modem plug-in on one of their computers could        be the international border in the export        violation and that computerized log records        may be the only evidence of espionage of        "tech-theft."     o  Federal agents and computer security        professionals must recognize the need for        rapid mutual cooperation and communication,        with security professionals providing        background information on the attacked        computer network and assisting with Federal        investigations and search warrant efforts.CONCLUSION     It is folly to assume that U.S. industry can continue to makesufficient research and development advances each year to ensure thatthe United States keeps an edge on Warsaw Pact countries. Thesecountries continue to rob the United States of advanced technologicalinformation critical to the defense and security of this country.The taxpayers and consumers writing the checks for Government andprivate sector technological research and development deserve acoordinated Federal law enforcement and computer industry responsethat recognizes software and computer-related engineering as one ofour country's greatest resources.FOOTNOTES(1) ComputerWorld, February 20, 1989.(2) Sunday Telegraph, October 23, 1988.(3) The Boston Globe, November 14, 1988.(4) ComputerWorld, April 3, 1989.(5) Hamburg Ard Television Network, March 2, 1989; see also, CliffStoll, "Stalking the Wiley Hacker," Communications of the ACM, May1988.(6) Reuters, June 28, 1988.(7) The Washington Post, January 2, 1989.(8) The New York Times, January 29, 1988.(9) Reuters, March 9, 1989.(10) "Soviet Acquisition of Militarily Significant WesternTechnology: An Update," published by the Central Intelligence Agency,1985.(11) The Los Angeles Times, November 21, 1988.(12) Supra note 10.(13) Ibid.(14) Ibid.(15) Ibid.(16) 118 U.S.C.  sec. 1029 (fraudulent activity in connection withusing accessing devices in interstate commerce); 18 U.S.C. sec. 1030(remote access with intent to defraud in connection with Federalinterest computers and/or Government-owned computers); 18 U.S.C. sec.1343 (use of interstate communications systems to further a scheme todefraud); 18 U.S.C.  sec. 2512 (making, distributing, possessing, andadvertising communication interception devices and equipment);  18U.S.C. sec. 2314 (interstate transportation of stolen property valuedat over $5,000);  17 U.S.C.  sec. 506 (Copyright infringementviolations);  22 U.S.C. sec 2778 (illegal export of Department ofDefense controlled software); 18 U.S.C.  sec. 793 (espionage,including obtaining and/or copying information concerning telegraph,wireless, or signal station, building, office, research laboratory orstations for a foreign government or to injure the United States); 18U.S.C. sec. 2701 (unlawful access to electronically storedinformation);  18 U.S.C.  sec.  1362 (malicious mischief involvingthe willful interference with military communications systems); 18U.S.C.  sec. 1962 (RICO--20 years/$25,000/forfeiture of property forcommitting two violations of wire fraud and/or transportation ofstolen property).================================================================The EPIC Project, a nonprofit public benifit corporation foundedlast year by a handful of college students, is advising theChairman of the American Bar Association Technology and the Courts(Sundevil) Subcommittee looking into federal court rule changes.These proposed rule changes are a direct result of actions taken bythe Seceret Service, FBI and other enforcement agents in OperationSun Devil.  Rules of evidence, warrants, et al, are in drastic needof change to address the constitutional and civil rights issues atodds with technology.I would very much like to hear from anyone with constructive inputor suggestions for needed changes.                                               9-18-90Jeff Aldrich                    Fax: (707) 425-9811The EPIC Project              Voice: (707) 425-6813P.O. Box 5080-341              Data: 1:212/105@fido.orgFairfield, CA 94533                  jefrich@well.sf.ca.us

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲.国产.中文慕字在线| 国产日韩欧美在线一区| 色网综合在线观看| eeuss鲁片一区二区三区| 国产成人福利片| 国产传媒久久文化传媒| 国产一区二区美女诱惑| 国产精品88888| 国产成人av在线影院| 成人aa视频在线观看| 成人高清视频在线观看| 99久久精品国产导航| 91久久精品网| 精品视频色一区| 精品久久久久久无| 中文字幕av一区 二区| 国产精品久久久久久久久搜平片| 亚洲欧洲无码一区二区三区| 综合自拍亚洲综合图不卡区| 亚洲最新视频在线观看| 日韩av中文字幕一区二区| 老汉av免费一区二区三区| 成人丝袜视频网| 在线国产亚洲欧美| 日韩欧美国产一二三区| 欧美国产丝袜视频| 亚洲123区在线观看| 国产成人免费高清| 欧美日韩一区二区三区免费看| 日韩一级完整毛片| 欧美激情在线一区二区| 亚洲国产精品久久人人爱蜜臀| 久久精品国产**网站演员| 成人99免费视频| 日韩午夜av电影| 亚洲欧美电影一区二区| 蜜臀av亚洲一区中文字幕| av中文一区二区三区| 欧美高清视频不卡网| 中文字幕av资源一区| 日韩国产欧美在线观看| 91视频.com| 久久久美女艺术照精彩视频福利播放| 亚洲人成小说网站色在线 | 亚洲免费观看在线视频| 日韩成人免费看| 色久综合一二码| 日本一区二区视频在线| 日韩精品一级中文字幕精品视频免费观看| 国产一区二区三区黄视频 | 美女一区二区三区在线观看| 99久久精品国产观看| 久久日韩精品一区二区五区| 首页国产欧美日韩丝袜| 在线观看日韩av先锋影音电影院| 日本一区二区成人在线| 精品一区二区av| 欧美日韩久久不卡| 亚洲精选一二三| 东方aⅴ免费观看久久av| 精品免费日韩av| 午夜一区二区三区视频| 在线免费亚洲电影| 亚洲免费电影在线| 99久久婷婷国产精品综合| 国产丝袜在线精品| 国产成+人+日韩+欧美+亚洲| 日韩美一区二区三区| 麻豆精品久久精品色综合| 欧美日韩综合在线免费观看| 亚洲午夜一区二区| 91在线porny国产在线看| 国产精品女人毛片| 成人精品在线视频观看| 中文字幕va一区二区三区| 懂色av一区二区在线播放| 国产欧美一区二区在线| 成人综合日日夜夜| 国产精品狼人久久影院观看方式| 国产精品91xxx| 国产精品久久免费看| 成人精品在线视频观看| 日韩毛片视频在线看| 91欧美一区二区| 亚洲国产视频直播| 91麻豆精品国产91久久久久久久久| 性做久久久久久免费观看欧美| 欧美日韩国产免费一区二区| 亚洲观看高清完整版在线观看| 911国产精品| 精品一区二区三区在线视频| 国产日韩欧美在线一区| 91网站最新网址| 亚洲va天堂va国产va久| 日韩欧美精品三级| 波多野结衣在线aⅴ中文字幕不卡| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 日韩天堂在线观看| 国模一区二区三区白浆| 国产精品美女一区二区三区| 一本到不卡免费一区二区| 日韩电影在线免费| 国产欧美一二三区| 欧美性感一区二区三区| 久久国产精品色婷婷| 国产精品电影一区二区| 欧美色综合网站| 国产在线国偷精品免费看| 国产精品国模大尺度视频| 欧美日韩小视频| 国产传媒欧美日韩成人| 婷婷综合在线观看| 国产拍揄自揄精品视频麻豆| 欧美日韩视频第一区| 国内精品伊人久久久久av一坑| 《视频一区视频二区| 欧美久久久久久久久久| 成人网页在线观看| 免费不卡在线观看| 亚洲国产精品成人久久综合一区 | 热久久一区二区| 亚洲丝袜美腿综合| 久久综合国产精品| 欧美丰满少妇xxxbbb| 99精品国产热久久91蜜凸| 久久成人麻豆午夜电影| 亚洲午夜精品网| 国产亚洲一本大道中文在线| 欧美日韩中文精品| 93久久精品日日躁夜夜躁欧美| 久久国产夜色精品鲁鲁99| 亚洲永久免费av| ㊣最新国产の精品bt伙计久久| 精品国产乱码久久| 91精品国产色综合久久不卡电影| av一本久道久久综合久久鬼色| 激情五月播播久久久精品| 日本免费新一区视频| 亚洲最新视频在线播放| 中文字幕一区二区三区精华液| 精品国内二区三区| 精品日韩欧美一区二区| 日韩一级片在线观看| 欧美日韩国产另类不卡| 欧美日韩国产首页| 欧洲精品在线观看| 色综合婷婷久久| 91黄视频在线| 色综合天天综合| 一本大道av一区二区在线播放| 成人精品一区二区三区四区| 国产精品亚洲成人| 国产精品99久| 成年人国产精品| 丁香亚洲综合激情啪啪综合| 国产一区二区h| 丁香网亚洲国际| 成人高清免费观看| 91免费观看国产| 在线观看网站黄不卡| 在线亚洲免费视频| 精品视频1区2区3区| 欧美日韩国产天堂| 日韩久久久久久| 亚洲精品在线网站| 欧美韩日一区二区三区四区| 国产精品欧美极品| 亚洲免费大片在线观看| 亚洲一级二级三级| 日本sm残虐另类| 激情图片小说一区| 成人永久aaa| 欧美亚洲自拍偷拍| 日韩欧美一区二区视频| 久久综合久久久久88| 亚洲欧洲www| 天天av天天翘天天综合网| 激情都市一区二区| av成人免费在线| 欧美喷水一区二区| 久久精品一二三| 亚洲最大的成人av| 麻豆视频观看网址久久| 成人h动漫精品| 91麻豆精品国产91久久久资源速度 | 亚洲风情在线资源站| 秋霞av亚洲一区二区三| 国产成人av一区二区三区在线| 91色porny| 精品福利视频一区二区三区| 国产精品日日摸夜夜摸av| 亚州成人在线电影| 粉嫩av一区二区三区在线播放| 色www精品视频在线观看| 精品美女被调教视频大全网站| 亚洲色图另类专区| 国内成人精品2018免费看| 在线免费视频一区二区| 欧美国产日韩在线观看| 久久精品99国产精品日本|