Nusikaltimai Elektroninėje Erdvėje Ir Jų Tyrimo Metodikos Nikolaj Goranin Dalius Mažeika

Total Page:16

File Type:pdf, Size:1020Kb

Nusikaltimai Elektroninėje Erdvėje Ir Jų Tyrimo Metodikos Nikolaj Goranin Dalius Mažeika Nikolaj Goranin Dalius Mažeika NUSIKALTIMAI elektroninėje erDvėje ir jų tyriMo MetoDikos Nikolaj Goranin Dalius Mažeika NUSIKALTIMAI ELEKTRONINĖJE ERDVĖJE IR JŲ TYRIMO METODIKOS MOKOMOJI KNYGA Projektas „Aukštojo mokslo I ir II pakopų informatikos ir informatikos inžinerijos krypčių studijų programų atnaujinimas bei naujų sukūrimas ir įgyvendinimas (AMIPA)“, kodas VP1–2.2–ŠMM–09–V–01–003, finansuojamas iš Europos socialinio fondo ir Lietuvos valstybės biudžeto lėšų. Recenzavo: prof. dr. V. Jusas doc. dr. K. Driaunys © N. Goranin, D. Mažeika, 2011 © KTU Informatikos fakultetas, 2011 © VGTU Fundamentaliųjų mokslų fakultetas, 2011 © UAB TEV, 2011 ISBN 978-609-433-055-1 TURINYS ĮVADAS ........................................................................................................................7 1. NUSIKALTIMAI ELEKTRONINĖJE ERDVĖJE ...................................................9 1.1. Nusikaltimų elektroninėje erdvėje apibrėžimas ir jų tipai ................................9 1.2. Informacinis karas ...........................................................................................11 1.3. Savikontrolės klausimai ..................................................................................14 2. NEE TEISINIAI ASPEKTAI ..................................................................................15 2.1. Teisinė nusikaltimų elektroninėje erdvėje samprata .......................................15 2.2. Elektroninių nusikaltimų kategorijos ..............................................................17 2.3. Tarptautiniai teisės aktai ir Konvencija dėl elektroninių nusikaltimų .............18 2.4. Nusikaltimų elektroninėje erdvėje reglamentavimas Lietuvoje......................23 2.5. Savikontrolės klausimai ..................................................................................27 3. POREIKIS TYRIMAMS IR JŲ TIPAI ...................................................................29 3.1. Formalus ir neformalus metodai .....................................................................30 3.2. „Gyvų“ ir „negyvų“ sistemų tyrimo metodai ..................................................31 3.3. Savikontrolės klausimai ..................................................................................33 4. PIRMINĖ REAKCIJA Į NEE .................................................................................34 4.1. Reagavimas į incidentus, jų sulaikymas bei incidentų valdymo apibrėžimas 34 4.2. Reagavimo į incidentus etapai ........................................................................35 4.3. Incidentų tipai .................................................................................................42 4.4. Savikontrolės klausimai ir praktiniai darbai ...................................................43 5. NEE TYRIMŲ PRINCIPAI IR TYRIMO EIGA ....................................................45 5.1. Bendri NEE tyrimo principai ir etapai ............................................................45 5.2. Klausimai tyrėjui ir užsakovui tyrimo eigoje ..................................................46 5.3. Savikontrolės klausimai ..................................................................................49 6. ELEKTRONINIŲ ĮKALČIŲ TIPAI IR SAVYBĖS ...............................................50 6.1. Įkalčių savybės ................................................................................................51 6.2. Įkalčių kategorijos ir šaltiniai ..........................................................................52 6.3. Savikontrolės klausimai ..................................................................................55 7. ĮKALČIŲ IŠĖMIMO PROCESAS.........................................................................56 7.1. Įkalčių išėmimo proceso etapai .......................................................................56 7.2. Alternatyvūs įkalčių išėmimo metodai ............................................................59 7.3. Savikontrolės klausimai ..................................................................................60 8. ĮKALČIŲ RINKIMO BŪDAI IR ĮRANKIAI ........................................................61 8.2. Nestabilių įkalčių surinkimas ..........................................................................61 8.2. Stabilių įkalčių surinkimas ..............................................................................69 8.3. Įrankai ir priemonės NEE įkalčių paieškai kompiuterių tinkle .......................77 8.4. Savikontrolės klausimai ir praktiniai darbai ...................................................81 3 9. SUNAIKINTŲ ĮKALČIŲ ATSTATYMAS ............................................................83 9.1. Saugomų duomenų naikinimo būdai ..............................................................83 9.2. Sunaikintų ir sugadintų duomenų atstatymas .................................................87 9.3. Savikontrolės klausimai ir praktiniai darbai ...................................................89 10. ĮKALČIŲ RINKIMAS VIEŠOJE ERDVĖJE ......................................................90 10.1. Įkalčių paiešką interneto svetainėse ..............................................................90 10.2. Įkalčių paieška kitose įtariamajam neprieinamose sistemose .......................92 10.3. Savikontrolės klausimai ................................................................................93 11. NEE TYRIMO SKIRTINGOSE OPERACINĖSE SISTEMOSE YPATUMAI ...94 11.1. NEE tyrimo Windows OS ypatumai .............................................................94 11.2. NEE tyrimo Linux OS ypatumai ...................................................................96 11.3. Savikontrolės klausimai ................................................................................98 12. ĮKALČIŲ VIENTISUMO IŠSAUGOJIMAS ......................................................99 12.1. Įkalčių vientisumo išsaugojimo metodai ......................................................99 12.2. Įkalčių grandinė ..........................................................................................103 12.3. Savikontrolės klausimai ir praktiniai darbai ...............................................103 13. ĮKALČIŲ ANALIZĖS BŪDAI IR ĮRANKIAI ..................................................105 13.1. Įkalčių analizės būdai ..................................................................................105 13.2. Įkalčių analizės įrankiai ..............................................................................107 13.3. Savikontrolės klausimai ir praktiniai darbai ...............................................113 14. TYRIMO ATASKAITOS PARENGIMAS .........................................................114 14.1. Tyrimo ataskaitų tipai ..................................................................................114 14.2. Reikalavimai tyrimų ataskaitai ...................................................................115 14.3. Ataskaitos struktūra .....................................................................................117 14.4. Savikontrolės klausimai ..............................................................................118 15. PROFESINĖ KARJERA ....................................................................................119 15.1. Rolės ir pareigos tyrimo metu .....................................................................119 15.2. NEE tyrėjo profesinė etika ..........................................................................121 15.3. Sertifikacija .................................................................................................122 15.4. Savikontrolės klausimai ..............................................................................126 16. NUSIKALTIMŲ TYRIMAS: ATVEJŲ ANALIZĖ............................................127 16.1. NEE plačiąja prasme tyrimo atvejų analizė ................................................127 16.2. NEE siaurąja prasme tyrimo atvejų analizė ................................................128 16.3. Savikontrolės klausimai ir praktiniai darbai ...............................................129 SANTRUMPOS ........................................................................................................131 TERMINŲ ŽODYNĖLIS .........................................................................................132 LIETUVIŲ-ANGLŲ TERMINŲ ŽODYNAS .........................................................133 REKOMENDUOJAMA LITERATŪRA ..................................................................135 NAUDOTA LITERATŪRA ......................................................................................137 4 LENTELIŲ SĄRAŠAS 4.1 lentelė. Skirtingų CSIRT grupių tipų lyginamoji analizė ......................................35 6.1 lentelė. Elektroninių įkalčių kategorijos ...............................................................53 6.2 lentelė. Elektroniniai įkalčių šaltiniai ir juose aptinkami įkalčiai .........................54 9.1 lentelė. Sunaikintų duomenų atstatymo įrankiai ...................................................88 10.1 lentelė. Interneto svetainėse randami įkalčiai .....................................................91 11.1 lentelė. „Windows“ OS duomenų objektai ir jų panaudojimas NEE tyrimo metu .95 11.2 lentelė. „Linux“ OS duomenų objektai ir jų panaudojimas NEE tyrimo metu ...97 12.1 lentelė. Komandos ir įrankiai nestabiliems įkalčiams išsaugoti .......................100 14.1 lentelė. Pavyzdinis NEE tyrimo ataskaitos turinys ...........................................117 5 PAVEIKSLĖLIŲ SĄRAŠAS 4.1 pav. Reagavimo
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Effective Malicious Features Extraction and Classification for Incident Handling Systems
    EFFECTIVE MALICIOUS FEATURES EXTRACTION AND CLASSIFICATION FOR INCIDENT HANDLING SYSTEMS CHO CHO SAN UNIVERSITY OF COMPUTER STUDIES, YANGON OCTOBER, 2019 Effective Malicious Features Extraction and Classification for Incident Handling Systems Cho Cho San University of Computer Studies, Yangon A thesis submitted to the University of Computer Studies, Yangon in partial fulfillment of the requirements for the degree of Doctor of Philosophy October, 2019 Statement of Originality I hereby certify that the work embodied in this thesis is the result of original research and has not been submitted for a higher degree to any other University or Institution. …..…………………………… .…………........………………………… Date Cho Cho San ACKNOWLEDGEMENTS First of all, I would like to thank Hist Excellency, the Minister for the Ministry of Education, for providing full facilities support during the Ph.D. course at the University of Computer Studies, Yangon. Secondly, my profound gratitude goes to Dr. Mie Mie Thet Thwin, Rector of the University of Computer Studies, Yangon, for allowing me to develop this research and giving me general guidance during the period of my study. I would like to express my greatest pleasure and the deepest appreciation to my supervisor, Dr. Mie Mie Su Thwin, Professor, the University of Computer Studies, Yangon, for her excellent guidance, caring, patient supervision, and providing me with excellent ideas throughout the study of this thesis. I would also like to extend my special appreciation to Dr. Khine Moe Nwe, Professor and Course-coordinator of the Ph.D. 9th Batch, the University of Computer Studies, Yangon, for her useful comments, advice, and insight which are invaluable through the process of researching and writing this dissertation.
    [Show full text]
  • Chapter 3: Viruses, Worms, and Blended Threats
    Chapter 3 Chapter 3: Viruses, Worms, and Blended Threats.........................................................................46 Evolution of Viruses and Countermeasures...................................................................................46 The Early Days of Viruses.................................................................................................47 Beyond Annoyance: The Proliferation of Destructive Viruses .........................................48 Wiping Out Hard Drives—CIH Virus ...................................................................48 Virus Programming for the Masses 1: Macro Viruses...........................................48 Virus Programming for the Masses 2: Virus Generators.......................................50 Evolving Threats, Evolving Countermeasures ..................................................................51 Detecting Viruses...................................................................................................51 Radical Evolution—Polymorphic and Metamorphic Viruses ...............................53 Detecting Complex Viruses ...................................................................................55 State of Virus Detection.........................................................................................55 Trends in Virus Evolution..................................................................................................56 Worms and Vulnerabilities ............................................................................................................57
    [Show full text]
  • A Highly Immersive Approach to Teaching Reverse Engineering Golden G
    A Highly Immersive Approach to Teaching Reverse Engineering Golden G. Richard III Department of Computer Science University of New Orleans New Orleans, LA 70148 Email: [email protected] Abstract most operating systems courses, but for reverse engi- neering, the devil really is in the details. For example, While short training courses in reverse engineering are to understand an offensive technique like Shadow frequently offered at meetings like Blackhat and Walker [13], which relies on de-synchronization of the through training organizations such as SANS, there are data and instruction TLBs in Intel’s split-TLB design virtually no reverse engineering courses offered in aca- to hide code and data, it’s not enough to have seen a demia. This paper discusses possible reasons for this Powerpoint slide depicting the abstract functionality of situation, emphasizes the importance of teaching re- a TLB—that’s a good start, but both more details and verse engineering (and applied computer security edu- hands-on experience are needed. Furthermore, assem- cation in general), and presents the overall design of a bler language courses, if they exist at all as independ- semester-long course in reverse engineering malware, ent courses in a modern computing curriculum, tend to recently offered by the author at the University of New be much weaker than in the past, often emphasizing the Orleans. use of High Level Assembler (HLA) [4] and develop- 1 Introduction ment of toy applications. In many curricula, the as- sembler language course of old has been folded into the Reverse engineering of software involves detailed undergraduate architecture class.
    [Show full text]
  • Malware Primer Malware Primer
    Malware Primer Malware Primer Table of Contents Introduction Introduction ...........................................................................................................................................................................2 In The Art of War, Sun Tzu wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” This certainly applies Chapter 1: A Brief History of Malware—Its Evolution and Impact ..............................3 to cyberwarfare. This primer will help you get to know cybercriminals by providing you with a solid foundation in one of their principle weapons: Chapter 2: Malware Types and Classifications ....................................................................................8 malware. Chapter 3: How Malware Works—Malicious Strategies and Tactics ........................11 Our objective here is to provide a baseline of knowledge about the different types of malware, what malware is capable of, and how it’s distributed. Chapter 4: Polymorphic Malware—Real Life Transformers .............................................14 Because effectively protecting your network, users, data, and company from Chapter 5: Keyloggers and Other Password Snatching Malware ...............................16 malware-based attacks requires an understanding of the various ways that the enemy is coming at you. Chapter 6: Account and Identity Theft Malware ...........................................................................19 Keep in mind, however, that we’re only able here
    [Show full text]
  • CS 3700 Networks and Distributed Systems
    CS 3700 Networks and Distributed Systems Lecture 20: Malware/Botnets Slides stolen from Vern Paxson (ICSI) and Stefan Savage (UCSD) Motivation 2 Internet currently used for important services ! Financial transactions, medical records Increasingly used for critical services ! 911, surgical operations, water/electrical system control, remote controlled drones, etc. Networks more open than ever before ! Global, ubiquitous Internet, wireless Malicious Users 3 Miscreants, e.g. LulzSec ! In it for thrills, street cred, or just to learn ! Defacing web pages, spreading viruses, etc. Hacktivists, e.g. Anonymous ! Online political protests ! Stealing and revealing classified information Organized Crime ! Profit driven, online criminals ! Well organized, divisions of labor, highly motivated Network Security Problems 4 Host Compromise ! Attacker gains control of a host ! Can then be used to try and compromise others Denial-of-Service ! Attacker prevents legitimate users from gaining service Attack can be both ! E.g., host compromise that provides resources for denial-of- service Definitions 5 Virus ! Program that attaches itself to another program Worm ! Replicates itself over the network ! Usually relies on remote exploit (e.g. buffer overflow) Rootkit ! Program that infects the operating system (or even lower) ! Used for privilege elevation, and to hide files/processes Trojan horse ! Program that opens “back doors” on an infected host ! Gives the attacker remote access to machines Botnet ! A large group of Trojaned machines, controlled
    [Show full text]
  • Leading International University Squashes Threats from Modern Malware with Palo Alto Networks
    PALO ALTO NETWORKS: Customer Profile Leading International University Squashes Threats from Modern Malware with Palo Alto Networks “Palo Alto Networks gives us true insight into what’s really going on in our network to ensure that risky traffic and activity is blocked. The control, visibility and threat prevention capabilities of the PA-4000 Series are unmatched. The cost was right and the ORGANIZATION: benefits quickly justified the cost.” University of Groningen – Mente Heemstra, Network Specialist, University of Groningen INDUSTRY: Education BACKGROUND CHALLENGE: Founded in 1614, the University of Groningen enjoys an international reputation Gain visibility into network to improve as one of the oldest and leading educational and research universities in Europe. security and control while maintaining a Located in the north of the Netherlands, the university offers degree programs policy of application access for all users. at Bachelor’s, Master’s and Ph.D. levels in virtually every field, many of them SOLUTION: completely taught in English. Research and knowledge, combined with an Replace legacy firewalls and Intrusion interdisciplinary approach, form the basis of the school’s programs. Research and Prevention System (IPS) managing traffic education at the University of Groningen is internationally oriented, as students between the university and its Internet from every continent prepare themselves for international career paths. Groningen Service Provider with Palo Alto Networks PA Series next-generation firewall with is an ideal, safe city with a flourishing student life. IPS for granular visibility of threats and better control of suspect Internet FILE SHARING AND MALWARE ON CAMPUS applications. Approximately 28,000 students study at the acclaimed University of Groningen.
    [Show full text]
  • SAFE SQL Slammer Worm Attack Mitigation
    White Paper SAFE SQL Slammer Worm Attack Mitigation Introduction further amplified because of ICMP This document discusses the recently unreachable messages returned by routers released SQL Slammer worm and its effects for nonexistent hosts. on the network and its hosts. Today The SQL Slammer worm apparently does numerous technologies are available for not contain malicious payload beyond the use in Cisco products that mitigate the buffer overflow to gain access to the host detrimental effects of the worm. These running the SQL Server Resolution Service include not only security technologies and then to set up the worm. Multiple such as intrusion detection and packet instances of the worm can infect a host filtering, but also virtual LAN (VLAN) because the worm does not check for segmentation, packet classification, and previous infections of the target system. content services. In addition to these technologies the SAFE blueprint from Cisco Cisco Recommendations for combines security best practices and secure Mitigating SQL Slammer network design to mitigate worms and The SQL Slammer worm has been identified viruses like SQL Slammer and other and analyzed by several groups, including network attacks. This paper contains much analysts from eEye Digital Security. Their of the same information discussed in the analysis can be found at: Code-Red and Nimda white papers posted http://www.eeye.com/html/Research/Flash/ at www.cisco.com/go/safe. This is AL20030125.html. important to note because the core This worm appears to be based on the mitigation techniques stay the same as Microsoft SQL Server 2000 exploit noted in new worms are released.
    [Show full text]
  • ABSTRACT Slammer: Before, During and After Marc-André Laverdière
    ABSTRACT Slammer: Before, During and After Marc-André Laverdière The internet was built to provide flexibility and easy connectivity. However, these qualities of the Internet raise major security concerns that they could be exploited to disrupt our daily lives. One such disruption was the spread of the Slammer/Sapphire worm, which happened on January 25th, 2003. During the spread of the worm, many lost their internet connection, were not able to use ATMs, or saw their flights delayed directly due to the worm’s activity. In this report, we will study the Slammer worm in this ‘natural’ environment: the Internet. We will study Slammer itself, the situation before the attack of the worm, the damage caused by its spread, as well as the lessons learned from this outbreak. We will approach this study mainly from a computer security point of view, while still presenting perspectives from the IT industry’s and the public’s viewpoint. Key Words: Computer Worms, Network Security, Slammer Slammer: Before, During and After by Marc-André Laverdière ma_laver at cs dot concordia dot ca TABLE OF CONTENTS 1. PREFACE............................................................................................................. 1 2. INTRODUCTION................................................................................................ 2 3. BEFORE THE ATTACK..................................................................................... 3 3.1. The Vulnerability 3 3.2. The State of the Security Community 5 4. THE WORM ........................................................................................................ 6 4.1. Buffer Overflow Exploits and Their Development 6 4.2. Worm Body 7 5. DURING THE ATTACK................................................................................... 13 5.1. Propagation of the Worm 13 5.2. Damage Caused 15 5.3. Security Response and Remedying to the Attack 16 5.3.1. Removing Slammer Howto................................................................... 16 5.3.2.
    [Show full text]
  • Fortinet Threat Landscape Report Q4 2016
    THREAT LANDSCAPE REPORT Q4 2016 TABLE OF CONTENTS TABLE OF CONTENTS Foreword . 3 Q4 2016 Highlights and Key Findings . 4 Sources and Measures . .5 Infrastructure Trends . 7 Global Threat Landscape . 10 Exploits . 11 Mini Focus: IoT . 13 Malware . 14 Mini Focus: Mobile Malware . 16 Botnets . 17 Mini Focus: Ransomware . 19 Regional Threat Landscapes . 20 Industry Threat Landscapes . 23 Exploratory Analysis: Holiday Threat Trends . 26 Conclusion and Recommendations . 28 2 FOREWORD FOREWORD Everything worth doing involves some degree of risk, and this is especially true when it comes to commerce. From ancient expeditions into uncharted territories to modern forays into digital connections and clicks, fame and fortune go to those who understand the risks and manage them well. But at the edge of the unknown, understanding tends to be a scarce commodity and is often replaced with fear, uncertainty, and doubt—a trio so intertwined they’re better known simply as “FUD.” This tendency is illustrated beautifully in the “monster maps” of This report seeks to draw an accurate representation of the cyber old, such as the famous Carta Marina shown here. Real dangers threat landscape in Q4 2016 leveraging the vast information experienced at land and sea were often represented as fantastical resources and expertise of FortiGuard Labs. We seek to share beasts as a warning to fellow travelers. It offers an excellent our perspective on the threats that exist, how often they occur, example of how FUD can lead to a mythical view of legitimate what differs across sectors and regions, and what’s changing over threats. Before chalking this tendency up to primitive ignorance, time.
    [Show full text]
  • Rešerše Informačních Zdrojů Světa K Informační a Kybernetické
    AMBIS vysoká škola a.s. Regionální rozvoj REŠERŠE INFORMAČNÍCH ZDROJŮ SVĚTA K INFORMAČNÍ A KYBERNETICKÉ BEZPEČNOSTI Bakalářská práce Autor: Martin Šilhánek Bezpečnostní management v regionech Vedoucí práce: Ing. Vladimír Šulc, Ph.D. Praha 2020 Prohlášení: Prohlašuji, že jsem bakalářskou práci zpracoval samostatně a v seznamu uvedl veškerou použitou literaturu. Svým podpisem stvrzuji, že odevzdaná elektronická podoba práce je identická s její tištěnou verzí, a jsem seznámen se skutečností, že se práce bude archivovat v knihovně VŠ AMBIS a dále bude zpřístupněna třetím osobám prostřednictvím interní databáze elektronických vysokoškolských prací. V Praze, dne 24. 10. 2020 Martin Šilhánek ANOTACE A KLÍČOVÁ SLOVA Anotace: Tato bakalářská práce se zabývá základními principy ochrany informací v jejich digitální podobě, následované navržením implementací a řízením bezpečnostního systému v souladu s mezinárodně uznávanými standardy. Práce obsahuje znalosti shromážděné ze vzdělávacích materiálů publikovaných státními orgány, mezinárodními firmami a dalšími autory zabývající se konstantně vyvíjející se problematikou kybernetické bezpečnosti. Poznatky obsažené v této práci jsou přínosné pro malé organizace a každého, kdo se chce obohatit o vědomosti jak ochránit své informace. Klíčová slova CZ: Kybernetická bezpečnost, informační bezpečnost, řízení kvality, protiopatření, riziko Annotation: This bachelor thesis deals with the basic principles of information security in their digital form, followed by the implementation and management of security
    [Show full text]
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine.
    [Show full text]