7Rslfv &Ryhuhg

Total Page:16

File Type:pdf, Size:1020Kb

7Rslfv &Ryhuhg &RPSXWHU9LUXV 7RSLFV &RYHUHG ͻͻͻͻͻŽŵƉƵƚĞƌ sŝƌƵƐ DĂůǁĂƌĞ ͲŵĂŝů sŝƌƵƐ ZĂŶƐŽŵǁĂƌĞ sŝƌƵƐ ŶƚŝǀŝƌƵƐ WƌŽŐƌĂŵ ͻ WƌĞĐĂƵƚŝŽŶƐ ĂŐĂŝŶƐƚ ŽŵƉƵƚĞƌsŝƌƵƐ &RPSXWHU9LUXV s/Zh^ ƐƚĂŶĚƐ ĨŽƌ sŝƚĂů /ŶĨŽƌŵĂƚŝŽŶ ZĞƐŽƵƌĐĞƐ hŶĚĞƌ ^ĞŝnjĞ͘ sŝƌƵƐĞƐ ĂƌĞ ƉƌŽŐƌĂŵƐ ǁŚŝĐŚ ĂƌĞ ĐƌĞĂƚĞĚ ĚĞůŝďĞƌĂƚĞůLJ ƚŽ ĚĂŵĂŐĞ ĐƌŝƚŝĐĂů ŝŶĨŽƌŵĂƚŝŽŶ ĂŶĚ ĚĂƚĂ͘ ǀŝƌƵƐ ĐĂŶ ďĂĚůLJ ĂĨĨĞĐƚ Žƌ ŝŶĨĞĐƚ LJŽƵƌ ĐŽŵƉƵƚĞƌ ǁŝƚŚŽƵƚ LJŽƵƌ ŬŶŽǁůĞĚŐĞ ĂŶĚ ĐĂŶ ĂůƚĞƌ ŝƚƐ ǁŽƌŬŝŶŐ͘ŶŐ KŶĐĞ ĂǀŝƌƵƐŝƐŝŶLJŽƵƌĐŽŵƉƵƚĞƌ͕LJŽƵƌĨŝůĞƐĂŶĚŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵŵĂLJŐĞƚĞŵŵĂLJ ĚĂŵĂŐĞĚ͘ ŽŵƉƵƚĞƌ ǀŝƌƵƐĞƐ ĚŽ ŶŽƚ ŐĞŶĞƌĂƚĞ ďLJ ĐŚĂŶĐĞ͘ dŚĞŚĞ ƉƌŽŐƌĂŵŵĞƌ ŽĨ ĂĂ ǀŝǀŝƌƵƐ͕ ŬŶŽǁŶ ĂƐ Ă ǀŝƌƵƐ ĂƵƚŚŽƌ͕ ŝŶƚĞŶƚŝŽŶĂůůLJ ǁƌŝƚĞƐ Ă ǀŝƌƵƐ ƉƌŽŐƌĂŵ ǁŝƚŚ Ă ŵŽƚŝǀĞ ƚŽ ĚĂĚĂŵĂŐĞĚĂƚĂĚĂŵĂŐĞ ĚĂƚĂ Žƌ ƉƌŽŐƌĂŵƐ ƌĞƐŝĚŝŶŐ ŝŶƚŚĞĐŽŵƉƵƚĞƌ͘tƌŝƚŝŶŐĂǀŝƌƵƐƉƌŽŐƌĂŵƵƐƵĂůůLJƌĞƋƵŝƌĞƐƐŝŐŶŝƐƵĂůůLJƌĞƋƵŝƌĞƐƐŝŐŶŝĨŝĐĂŶƚƉƌŽŐĂůůLJƌĞƋƵŝƌĞƐƐŝŐŶ ĨŝĐĂŶƚƉƌŽŐƌĂŵŵŝŶŐƐŬŝůůƐ͘ sĞƌLJĨĞǁǀŝƌƵƐĞƐĂƌĞŚĂƌŵůĞƐƐ͘dŚĞLJĚŝƐƉůĂLJŽŶůLJĂƐŝŵƉůĞŵĞƐƐĂƐƉůĂLJŽŶůLJĂƐŝŵƉůĞŵĞƐƐĂŐĞ͘ůLJĂƐŝŵƉůĞŵĞƐƐĂŐŐĞ͘ƵƚŵŽƐƚŽĨƚŚĞǀŝƌƵƐĞƐĂƌĞ ǀĞƌLJ ŚĂƌŵĨƵů͘ dŚĞLJ ĚĞƐƚƌŽLJ ĚĂƚĂ Žƌƌ ĞǀĞŶ ƚŚĞ ĞŶƚŝƌĞ ŚĂƌĚ ĚŝƐŬ͘P sŝƌƵƐĞƐ ĂƚƚĂĐŚ ƚŚĞŵƐĞůǀĞƐ ƚŽ ƉƌŽŐƌĂŵ ĨŝůĞƐ ĂŶĚ ŵŽǀĞ ǁŝƚŚ ƚŚĞŵŵ ĨƌŽŵ ĚŝƐŬ ƚŽ ĚŝƐŬ͘ ^ŽŵĞ ǀŝǀŝƌƵƐĞƐ ĂƚƚĂĐŚ ƚŚĞŵƐĞůǀĞƐ ƚŽ Ă ĨŝůĞ ĂŶĚ ůŝĞ ĚŽƌŵĂŶƚ͘ Ƶƚ ǁŚĞŶ Ă ĐĞƌƚĂŝŶĂŝŶ ĚĂƚĞ Žƌ ĞǀĞŶƚ ŽĐĐƵƌƐ͕ƚŚĞLJŐĞƚƚƌŝŐŐĞƌĞĚĂŶĚďĞĐŽŵĞƐŽĐĐƵƌƵƌ ĂĐƚŝǀĞ͘ KŶĞ ƐƵĐŚ ŶŽƚŽƌŝŽƵƐ ǀŝƌƵƐ ŝƐ ĐĂůůĞĚ &ƌŝĚĂLJ͕ ƚŚĞ ϭϯƚŚϭ sŝƌƵƐ͘ /ƚ ŝƐ ĂůƐŽ ĐĂůůĞĚ :ĞƌƵƐĂůĞŵ sŝƌƵƐ ďĞĐĂƵƐĞ ŝƚ ǁĂƐ ĨŝƌƐƚƐƚ ĚŝƐĐŽǀĞƌĞĚ Ăƚ ƚŚĞ hŶŝǀĞƌƐŝƚLJhŶŝǀĞƌƐŝƚ ŽĨ :ĞƌƵƐĂůĞŵ ŝŶ ϭϵϴϳ͘ /ƚ ŐĞƚƐ ĂĐƚŝǀĂƚĞĚ ĞǀĞƌLJ&ƌŝĚĂLJƚŚĂƚŽĐĐƵƌƐŽŶƚŚĞϭϯƚŚŽĨĂŵŽŶƚŚ͘ƌƐŽŶƚŚĞϭϯƚŚŽĨĂŵŽŶƚŚ͘ 7<3(62)9,586(6 &ŝůĞ/ŶĨĞĐƚŽƌ͗ dŚŝƐ ŝƐ ƚŚĞƚŚĞ ŵŽƐƚŵŽƐƚ ĐŽŵŵŽŶ ƚLJƉĞ ŽĨ ǀŝƌƵƐ͘ /ƚ ĂĚĚƐ ǀŝƌƵƐ ĐŽĚĞ ƚŽƚŚĞ ƌĞŐƵůĂƌƉƌŽŐƌĂƉƌŽŐ ƉƌŽŐƌĂŵŵŝŶŐ ĐŽĚĞ ǁŝƚŚŝŶ ƚŚĞ ƉƌŽŐƌĂŵ ĨŝůĞƐ͘ ^Ž͕ ǁŚĞŶ ƚŚĞ PMP ,73/$1(7 3(7$%<7( ŝŶĨĞĐƚĞĚ ƉƌŽŐƌĂŵ ŝƐ ĞdžĞĐƵƚĞĚ͕ ŽƚŚĞƌ ƉƌŽŐƌĂŵ ĨŝůĞƐ ĂůƐŽ ŐĞƚ ŝŶĨĞĐƚĞĚ͘ dŚŝƐ ǀŝƌƵƐ ĐĂŶ ĐĂƵƐĞ ŝƌƌĞǀĞƌƐŝďůĞ ĚĂŵĂŐĞ ƚŽ ĨŝůĞƐ ďLJ ƉĞƌŵĂŶĞŶƚůLJ ĚĞƐƚƌŽLJŝŶŐƚŚĞĐŽŶƚĞŶƚ͘ ŽŽƚ^ĞĐƚŽƌsŝƌƵƐ͗ dŚŝƐ ǀŝƌƵƐ ĂƚƚĂĐŚĞƐ ŝƚƐĞůĨ ƚŽ ƚŚĞ ƚ ƐĞĐƚŽƌ ŽĨ ƚŚĞ ĚŝƐŬ͘ dŚŝƐ ƐĞĐƚŽƌ ŝƐ ƚŚĞ ƉĂƌƚ ŽĨ ƚŚĞ ĚŝƐŬ ǁŚĞƌĞ ƐƚĂƌƚͲƵƉ ŝŶƐƚƌƵĐƚŝŽŶƐ ĂŶĚ ƚŚĞ ĨŝůĞͲĂůůŽĐĂƚŝŽŶ ƚĂďůĞƐ ĂƌĞ ŬĞƉƚ͘ dŚŝƐ ƐĞĐƚŽƌ ŝƐ ƌĞĂĚ ĂŶĚ ůŽĂĚĞĚ ŝŶƚŽ ƚŚĞ ŵĞŵŽƌLJ ĞǀĞƌLJ ƚŝŵĞƚŚĞĚŝƐŬŝƐƚĞĚ͘ǀŝĚĞŶƚůLJ͕ƚŚŝƐǀŝƌƵƐŝƐĂůƐŽǀĞƌLJĚĂŶŐĞƌŽƵƐ͘ džĞĐƵƚĂďůĞ&ŝůĞsŝƌƵƐ͗ dŚŝƐ ǀŝƌƵƐ ƐƚŽƌĞƐ ŝƚƐĞůĨ ŝŶ ĂŶ ĞdžĞĐƵƚĂďůĞ ĨŝůĞ ĂŶĚ ŝŶĨĞĐƚƐ ŽƚŚĞƌĨŝůĞƐĞĂĐŚ ƚŝŵĞƚŚĞĨŝůĞŝƐƌƵŶŽƌĞdžĞĐƵƚĞĚ͘ DĂĐƌŽsŝƌƵƐ͗ dŚŝƐ ǀŝƌƵƐ ŝŶĨĞĐƚƐ ĨŝůĞƐ ƚŚĂƚ ĂƌĞ ĐƌĞĂƚĞĚ ƵƐŝŶŐ ĐĞƌƚĂŝŶ ĂƉƉůŝĐĂƚŝŽŶƐ Žƌ ƉƌŽŐƌĂŵƐ ƚŚĂƚ ĐŽŶƚĂŝŶ ŵĂĐƌŽƐ͘ dŚĞƐĞ ŵŝŶŝͲƉƌŽŐƌĂŵƐ ŵĂŬĞ ŝƚ ƉŽƐƐŝďůĞ ƚŽ ĂƵƚŽŵĂƚĞ ƐĞƌŝĞƐ ŽĨ ŽƉĞƌĂƚŝŽŶƐ ƐŽ ƚŚĂƚ ƚŚĞLJ ĂƌĞ ƉĞƌĨŽƌŵĞĚ ĂƐ Ă ϱ ƐŝŶŐůĞ ĂĐƚŝŽŶ͕ ƚŚĞƌĞďLJ ƐĂǀŝŶŐ ƚŚĞ ƵƐĞƌ ĨƌŽŵ ŚĂǀŝŶŐ ƚŽ ĐĂƌƌLJ ƚŚĞŵ ŽƵƚ ŽŶĞͲďLJͲŽŶĞ͘ (;$03/(62)9,586(6 tŽƌŵ͗ tŽƌŵŝƐ Ă ŚĂƌŵůĞƐƐ ǀŝƌƵƐ ƚŚĂƚ ƐŝŵƉůLJ ƌĞƉůŝĐĂƚĞƐ ŝƚƐĞůĨ͘ Ƶƚ ŝŶ ƚŚĞ ůŽŶŐ ƌƵŶ͕ ŝƚ ƚĂŬĞƐ ŽǀĞƌ Ăůů ƚŚĞ ƌĞƐŽƵƌĐĞƐ ŽĨ ƚŚĞ ĐŽŵƉƵƚĞƌ ƐLJƐƚĞŵ͕ ĂŶĚ ĞǀĞŶƚƵĂůůLJ ƚŚĞ ĐŽŵƉƵƚĞƌ ďĞĐŽŵĞƐ ƵƐĞůĞƐƐ͘ tŽƌŵƐ ŚĂǀĞ ƚŚĞ ĐĂƉĂĐŝƚLJ ƚŽ ƚƌĂǀĞů ĨƌŽŵ ƐLJƐƚĞŵ ƚŽƐLJƐƚĞŵǀĞƌLJĞĂƐŝůLJ͘ dƌŽũĂŶ ,ŽƌƐĞ͗ dƌŽũĂŶ ŚŽƌƐĞ͕ ĂĐĐŽƌĚŝŶŐ ƚŽ 'ƌĞĞŬ ŵLJƚŚŽůŽŐLJ͕ ǁĂƐ Ă ŚƵŐĞ ŚŽůůŽǁ ǁŽŽĚĞŶ ŚŽƌƐĞ ĐŽŶƐƚƌƵĐƚĞĚ ďLJ ƚŚĞ 'ƌĞĞŬƐ ƚŚĂƚ ŚŝĚ Ă ƐĞůĞĐƚ ĨŽƌĐĞ ŽĨ ŵĞŶ ŝŶƐŝĚĞ͘ dŚĞLJ ƵƐĞ ƚŚŝƐ ŚŽƌƐĞ ƚŽ ŐĂŝŶ ĨƌŝĞŶĚůLJĞŶƚƌĂŶĐĞŝŶƚŽdƌŽLJĚƵƌŝŶŐƚŚĞdƌŽũĂŶtĂƌ͘ /Ŷ ĐŽŵƉƵƚŝŶŐ͕ dƌŽũĂŶ ŚŽƌƐĞ ǀŝƌƵƐ ĐŽŵĞƐ ĂƐ Ă ĨƌŝĞŶĚůLJ ƉƌŽŐƌĂŵ ;ĂƐ Ă ŐĂŵĞ͕ ĂƉƉůŝĐĂƚŝŽŶ͕ ĞƚĐ͘Ϳ͖ ŚŽǁĞǀĞƌ͕ ŝƚ ŝƐ ǀĞƌLJ ĚĂŶŐĞƌŽƵƐ ĂƐ ŝƚ ĚĞƐƚƌŽLJƐ Ăůů ƚŚĞ ĚĂƚĂ ŽŶ LJŽƵƌ ƐLJƐƚĞŵ͘ dƌŽũĂŶ ŚŽƌƐĞƐ ĚŽ ŶŽƚ ƌĞƉůŝĐĂƚĞ ƚŚĞŵƐĞůǀĞƐ ďƵƚ ƚŚĞLJ ĐĂŶ ďĞ ǀĞƌLJ ĚĞƐƚƌƵĐƚŝǀĞ͘ dŚĞ dƌŽũĂŶ ŚŽƌƐĞ ĐĂŶ ďĞ ƐƉƌĞĂĚ ƚŚƌŽƵŐŚ Ă ŶƵŵďĞƌ ŽĨ ǁĂLJƐ͕ďƵƚƚŚĞĐŽŵŵŽŶŵĞĂŶƐŽĨŝŶĨĞĐƚŝŽŶŝƐĂƚƚĂĐŚŵĞŶƚŽĨŵĂŝů͘ŝŽŶ ZŽŽƚŬŝƚ͗ ZŽŽƚŬŝƚ ŝƐ Ă ƉƌŽŐƌĂŵ ƚŚĂƚ ŚŝĚĞƐ ŝŶĂ ĐŽŵƉƵƚĞƌĐŽŵƉƵƚĞĐŽŵƉƵƚĞƌ ĂŶĚ ĂůůŽǁƐ ƐŽŵĞŽŶĞ ĨƌŽŵ Ă ƌĞŵŽƚĞ ůŽĐĂƚŝŽŶ ƚŽ ƚĂŬĞ ĨƵůů ĐŽŶƚƌŽůŶƚƌŽů ŽĨ ƚŚĞ ĐŽŵƉƵƚĞƌ͘ĐŽŵĐŽ KŶĐĞ ƚŚĞ ZŽŽƚŬŝƚ ŝƐ ŝŶƐƚĂůůĞĚ͕ ƚŚĞ ZŽŽƚŬŝƚ ĂƵƚŚŽƌŽƌĐĂŶĞdžĞĐƵƚĞƉƌŽŐƌƌ ĐĂŶ ĞdžĞĐƵƚĞ ƉƌŽŐƌĂŵƐ͕ ĐŚĂŶŐĞ ƐĞƚƚŝŶŐƐ͕ ŵŽŶŝƚŽƌĂĐƚŝǀŝƚŝĞƐ͕ĂŶĚĂĐĐĞƐƐĨŝůĞƐĨƌŽŵĂƌĞŵŽƚĞĐŽŵƉƵƚĞƌ͘ĞƐƐĨŝůĞƐĨƌŽŵĂƌĞŵŽƚĞĐŽŵĞƐƐĨŝůĞƐĨƌŽŵĂƌĞŵ ^ǁĞĞƉĞƌ͗ ^ǁĞĞƉĞƌ ŝƐ Ă ĨĂŬĞ ĂŶƚŝǀŝƌƵƐ͕ǀŝƌƵƐ͕ƌƵƐ͕ ĂůƐŽ ŬŶŽǁŶ ĂƐ ƌŽŐƵĞ͘͘ /ƚ ŝƐ ĚĞƐŝŐŶĞĚ ŝŶ ƐƵĐŚ Ă ǁĂLJ ƚŚĂƚ ŝƚ ůŽŽŬƐ ůŝŬĞŝŬĞ ĂŶ ĂŶƚŝǀŝƌƵƐ ƐŽĨƚǁĂƌĞƐŽĨƚǁĂƌ ďƵƚ͕ďƵ ŝŶ ƌĞĂůŝƚLJ͕ ŝƚ ŝƐ Ă ǀŝƌƵƐ͘ WĞŽƉůĞ ĚŽǁŶůŽĂĚĚ ŝƚ ƵŶŝŶƚĞŶƚŝŽŶĂůůLJ͕ ĂŶĚ ƚŚĞ ƐǁĞĞƉĞƌƐ ǀŝƌƵƐ ĞŶƚĞƌƐ ŝŶ ƚŚĞŝƌ ĐŽŵƉƵƚĞƌĂŶĚĐŚĂŶŐĞƐLJƐƚĞŵĨĐŚĂŶŐĞƐLJƐƚĞŵĨŝůĞƐ͕ďƌŽǁƐŝŶŐĂĐƚŝǀŝƚLJ͕ĞƚĐ͘ŝůĞƐ͕ďƌŽǁƐŝŶŐŝůĞƐ͕ďƌŽǁƐ ^ůĞĞƉĞƌ͗ dŚĞƐůĞĞƉĞƌĞƌǀŝƌƵƐŝƐŬŶŽǁŶƚŽƐƚĞĂůLJŽƵƌƉĞƌƐŽŶĂůĂŶĚĨŝŶĂŶĐŝĂůŝŶĨŽƌŵĂƚŝŽŶǀŝƌƵƐŝƐŬŶŽǁŶƚŽƐƚĞĂůLJŽƵƌƐŝƐŬŶŽǁŶƚŽƐƚĞĂůLJŽƵƌ ͘ dŚŝƐ ǀŝƌƵƐƌƵƐ ŝƐ ƉƌŽŐƌĂŵŵĞĚ ƚŽ ƚĂƌŐĞƚƚĂƌŐĞƚƚĂƌŐ ůĂƌŐĞ ŶĞƚǁŽƌŬƐ ŽŶůLJ͘ dŚŝƐ ǀŝƌƵƐ ŚĂƐ ŝŶĨĞĐƚĞĚŵŝůůŝŽŶƐŽĨŵĂĐŚŝŶĞƐƐŽĨĂƌ͘ƚĞĚŵŝůůŝŽŶƐŽĨŵĂĐŚŝŶĞƐƐŽĨĂ ůĂďĂŵĂ͗ ůĂďĂŵĂĂďĂŵĂĂďĂŵ ŝƐĂĐŽŵƉƵƚĞƌǀŝƌƵƐǁŝƐĂĐŽŵƉƵƚĞƌǀŝƌƵƐǁŚŝĐŚŝŶĨĞĐƚƐĐŽŵƉƵƚĞƌǀŝƌƵƐǁ ĞdžĞĐƵƚĂďůĞ;͘ĞdžĞͿĨŝůĞƐ͘dŚĞǀŝƌƵƐŝƐ ůŽĂĚĞĚĚĞĚ ŝŶƚŽ ƚŚĞ ŵĞŵŽƌLJ ďLJďLJ ĞdžĞĐƵƚŝŶŐ ĂŶ ŝŶĨĞĐƚĞĚ ƉƌŽŐƌĂŵ ĂŶĚ ƚŚĞŶ ĂĨĨĞĐƚƐ ƚŚĞ ĐŽŵƉƵƚĞƌŵƉƵƚĞƌŵƉƵƚĞƌ ƌƵŶƚŝŵĞ ŽƉĞƌĂƚŝŽŶ͕Ž ĐŽƌƌƵƉƚƐ ƚŚĞ ƉƌŽŐƌĂŵ Žƌ ŽǀĞƌůĂLJ ĨŝůĞƐ͘ dŚĞ ǀŝƌƵƐ ŵĂŶŝƉƵůĂƚĞƐŝƉƵůĂƚĞƐŝƉƵůĂƚĞ ƚŚĞ &ŝůĞ ůůŽĐĂƚŝŽŶ dĂďůĞ ĂŶĚ ƐǁĂƉƐ ĨŝůĞŶĂŵĞƐ ƐŽ ƚŚĂƚ ĨŝůĞƐ ŐĞƚůŽƐƚƐůŽǁůLJ͘ǁůLJ͘PMP >ŽŐŝĐŽŵď͗ůŽŐŝĐ ďŽŵď ŝƐ Ă ƉƌŽŐƌĂŵ͕ Žƌ ƉŽƌƚŝŽŶ ŽĨ Ă ƉƌŽŐƌĂŵ͕ ǁŚŝĐŚ ůŝĞƐ ĚŽƌŵĂŶƚ ƵŶƚŝůĂƐƉĞĐŝĨŝĐƉŝĞĐĞŽĨƉƌŽŐƌĂŵůŽŐŝĐŝƐĂĐƚŝǀĂƚĞĚ͘/ŶƚŚŝƐǁĂLJ͕ĂůŽŐŝĐďŽŵď ŝƐ ǀĞƌLJ ĂŶĂůŽŐŽƵƐ ƚŽ Ă ƌĞĂůͲǁŽƌůĚ ůĂŶĚ ŵŝŶĞ͘ dŚĞ ŵŽƐƚ ĐŽŵŵŽŶ ĂĐƚŝǀĂƚŽƌ ĨŽƌ Ă ůŽŐŝĐ ďŽŵď ŝƐ Ă ĚĂƚĞ͘ dŚĞ ůŽŐŝĐ ďŽŵď ĐŚĞĐŬƐ ƚŚĞ ƐLJƐƚĞŵ ĚĂƚĞ ĂŶĚ ĚŽĞƐ ŶŽƚŚŝŶŐ ƵŶƚŝů Ă ƉƌĞͲƉƌŽŐƌĂŵŵĞĚ ĚĂƚĞ ĂŶĚ ƚŝŵĞ ŝƐ ƌĞĂĐŚĞĚ͘ ƚ ƚŚĂƚ ƉŽŝŶƚ͕ƚŚĞůŽŐŝĐďŽŵďĂĐƚŝǀĂƚĞƐĂŶĚĞdžĞĐƵƚĞƐŝƚƐĐŽĚĞ͘ ŚƌŝƐƚŵĂƐsŝƌƵƐ͗ ŚƌŝƐƚŵĂƐ ǀŝƌƵƐ ŝƐ ĂŶ ĞŵĂŝů ǁŽƌŵ ƚŚĂƚ ƐƉƌĞĂĚƐ ǀŝĂ ĞŵĂŝů ĂƐ Ă ƐŵĂůů͕ ĞdžĞĐƵƚĂďůĞ ĨŝůĞ ǁŝƚŚ Ă ǀĂƌŝĞƚLJ ŽĨ ŶĂŵĞƐ ĂŶĚ ĞdžƚĞŶƐŝŽŶƐ͘ dŚĞ ǁŽƌŵ ŝƐ ƉƌŽƉĂŐĂƚĞĚ ďLJ ĐŽƉLJŝŶŐ ŝƚƐĞůĨ ŽŶƚŽ ůŽĐĂů ĂŶĚ ŶĞƚǁŽƌŬĞĚ ĚƌŝǀĞƐ͕ ĂƐ ǁĞůů ĂƐ 30 38%/,6+(56 /7' 397 ĞŵĂŝůŝŶŐ ŝƚƐĞůĨ ĂƐ ĂŶ ĂƚƚĂĐŚŵĞŶƚ ƚŽ ĂŶLJ ĂĚĚƌĞƐƐ͘ /ƚ ĐŽƵůĚ ďƌĞĞĚ ĨƌŽŵ ƚŚĞ ĂĚĚƌĞƐƐ Ŭ ĂŶĚ ĨŝůĞƐ ƐƚŽƌĞĚ ŽŶ ƚŚĞ ŝŶĨĞĐƚĞĚ ŵĂĐŚŝŶĞ͘ /ŶĨĞĐƚĞĚĞŵĂŝů ϲ ŵĞƐƐĂŐĞƐ ĂƌƌŝǀĞ ǁŝƚŚ ƚŚĞ ƐƵďũĞĐƚ ͞DĞƌƌLJ ŚƌŝƐƚŵĂƐ͊͟ ĂŶĚ ďŽĚLJ ͞,ĂƉƉLJ ,ŽůŝĚĂLJƐ͊͘͟ dŚĞ ĂƚƚĂĐŚŵĞŶƚ ŚĂƐ ƚŚĞ ŶĂŵĞ ͞ƉŽƐƚĐĂƌĚ͟ ĨŽůůŽǁĞĚ ďLJ ĂŶ ĞdžĞĐƵƚĂďůĞĞdžƚĞŶƐŝŽŶ͘ ĚǁĂƌĞ͗ĚǁĂƌĞ ŝƐ Ă ƉƌŽŐƌĂŵ ƚŚĂƚ ĚŝƐƉůĂLJƐ ĂŶ ƵŶǁĂŶƚĞĚ ĂĚǀĞƌƚŝƐĞŵĞŶƚ ŝŶ Ă ďĂŶŶĞƌ͕ ƉŽƉͲƵƉ ǁŝŶĚŽǁ ŽŶ ǁĞď ƉĂŐĞƐ͕ ĞŵĂŝů ŵĞƐƐĂŐĞƐ͕ Žƌ ŽŶ ŽƚŚĞƌ /ŶƚĞƌŶĞƚƐĞƌǀŝĐĞƐ͘/ĨLJŽƵĐůŝĐŬŽŶƚŚĞĂĚǀĞƌƚŝƐĞŵĞŶƚ͕ƐŽŵĞƚŝŵĞƐŝƚǁŝůůƚĂŬĞ LJŽƵƚŽĂǀŝƌƵƐĐŽŶƚĂŝŶĞĚƐŝƚĞ͕ĂŶĚǀŝƌƵƐǁŝůůŝŶƐƚĂůůŽŶLJŽƵƌĐŽŵƉƵƚĞƌ͘ ^ƉLJǁĂƌĞ͗ ƐƉLJǁĂƌĞ ŝƐ Ă ƉƌŽŐƌĂŵ ƉůĂĐĞĚ ŽŶ Ă ĐŽŵƉƵƚĞƌ Žƌ ŵŽďŝůĞ ĚĞǀŝĐĞ ǁŝƚŚŽƵƚ ƚŚĞ ƵƐĞƌ͛Ɛ ŬŶŽǁůĞĚŐĞ ƚŚĂƚ ƐĞĐƌĞƚůLJ ĐŽůůĞĐƚƐ ŝŶĨŽƌŵĂƚŝŽŶ ĂďŽƵƚ ƚŚĞ ƵƐĞƌ ĂŶĚ ƚŚĞŶ ĐŽŵŵƵŶŝĐĂƚĞƐ Žƌ ƐĞŶĚƐ ƚŚĞ ƐĂŵĞ ŝŶĨŽƌŵĂƚŝŽŶ ƚŽ ƐŽŵĞ ŽƵƚƐŝĚĞ ƐŽƵƌĐĞǁŚŝůĞƚŚĞƵƐĞƌŝƐŽŶůŝŶĞ͘ 6285&(62)9,586(6 sŝƌƵƐĞƐĂƌĞĂĐƚŝǀĂƚĞĚŽŶLJŽƵƌĐŽŵƉƵƚĞƌŝŶŵĂŶLJĚŝĨĨĞƌĞŶƚǁĂLJƐ͗ ͲD/>͗ ͲŵĂŝů ǀŝƌƵƐĞƐ ĂƌĞ ƐƉƌĞĂĚ ďLJ ĨŝůĞƐ ĂƚƚĂĐŚĞĚ ƚŽ ĞͲŵĂŝů ŵĞƐƐĂŐĞƐ͘ zŽƵ ĐĂŶŶŽƚ ŐĞƚ ĂŶ ĞͲ ŵĂŝů ǀŝƌƵƐ ĨƌŽŵ Ă ŵĞƐƐĂŐĞ ƚŚĂƚ ĐŽŶƚĂŝŶƐ ŽŶůLJ ƚĞdžƚ͘ tŚĞŶ LJŽƵ ŽƉĞŶ ĂŶ ĞͲŵĂŝů ĂƚƚĂĐŚŵĞŶƚ ƚŚĂƚ ĐŽŶƚĂŝŶƐ Ă ǀŝƌƵƐ͕ ƚŚĞ ǀŝƌƵƐ ƐƉƌĞĂĚƐ ƚŽ LJŽƵƌ ĐŽŵƉƵƚĞƌ͘ /Ĩ LJŽƵ ĨŽƌǁĂƌĚ ƚŚĞ ĂƚƚĂĐŚŵĞŶƚ ƚŽ ŽƚŚĞƌ ƉĞŽƉůĞ͕ƚŚĞŝƌĐŽŵƉƵƚĞƌƐǁŝůůĂůƐŽŐĞƚĂĨĨĞĐƚĞĚǁŚĞŶƚŚĞLJŽƉĞŶƚƉĞŶ ŚĞĂƚƚĂĐŚŵĞŶƚ͘ /EdZEdKtE>K͗ dŚĞƌĞ ŝƐ Ă ůŽƚ ŽĨ ƐƚƵĨĨ ƚŽ ĚŽǁŶůŽĂĚůŽĂĚĨƌŽŵ ĨƌŽŵ ƚŚĞ /ŶƚĞƌŶĞƚ͘ Ƶƚ ŝĨ ƐŽŵĞƚŚŝŶŐ ŝŶƚŚĞƐƚƵĨĨ͕LJŽƵǁĂŶƚƚŽĚŽǁŶůŽĂĚ͕ŝƐŝŶĨĞĐƚĞĚďLJǀŝƌƵƐ͕ƚŚĞŶƌƵƐ͕ƚŚĞŶƚŚĞǀŝƌƵƌƵƐ͕ƚŚĞŶƚŚĞǀƚŚĞǀŝƌƵƐĐŽŵĞƐƚŽLJŽƵƌĐŽŵƉƵƚĞƌ ƐLJƐƚĞŵ͘ EŽǁ ǀŝƌƵƐ ƌĞƉůŝĐĂƚĞƐ ŝƚƐĞůĨ ĂŶĚ ŝŶĨĞĐƚƐ ŽƚŚĞƌŚĞƌĨŝůĞƐŽŶLJŽƵƌĐŽŵƉĞƌĨŝůĞƐŽŶLJŽƵƌ ĨŝůĞƐŽŶLJŽƵƌĐŽŵƉƵƚĞƌ͘dŚŝƐŵĞĂŶƐŝĨLJŽƵƌ ĐŽŵƉƵƚĞƌŝƐŝŶĨĞĐƚĞĚďLJǀŝƌƵƐƚŚĞŶǁŚĂƚĞǀĞƌĨŝůĞLJŽƵƐŚĂƌĞǁŝƚŚĞLJŽƵƐŚĂƌĞǁŝƚŚŽƚŚĞƌƐĐŽƵĞLJŽƵƐŚĂƌĞǁŝƚŚŽŽƚŚĞƌƐĐŽƵůĚĐŽŶƚĂŝŶƚŚĞǀŝƌƵƐ͘ /^dZ/hd/KE K& ^K&dtZ͗ /Ĩ LJŽƵƌ ĐŽŵƉƵƚĞƌƉƵƚĞƌƵƚĞƌŝƐǀŝƌƵƐͲŝŶĨĞĐ ŝƐ ǀŝƌƵƐͲŝŶĨĞĐƚĞĚ ĂŶĚ LJŽƵLJŽ ĐŽƉLJ Ă ƐŽĨƚǁĂƌĞ ŽŶ Ă Žƌ ƉĞŶĚƌŝǀĞ ƚŽ ĚŝƐƚƌŝďƵƚĞ ƚŽ ƐŽŵĞŽŶĞ͕Ğ͕ ƚŚĞ ǀŝƌƵƐ ŽĨ LJŽƵƌ ĐŽŵƉĐŽŵĐŽŵƉƵƚĞƌƵƚĞƌ ŵŝŐŚƚ ĂůƐŽ ŐĞƚ ĐŽƉŝĞĚ ŽŶ ƚŚĞ Žƌ ƉĞŶĚƌŝǀĞ͘ dŚĞ ƉĞƌƐŽŶ͕ ǁŚŽŽ ŝŶƐƚĂůůƐ ƚŚŝƐŚŝƐ ƐŽĨƚǁĂƌĞ ŽŶP ŚŝƐŚŝŚŝƐ ĐŽŵƉƵƚĞƌ͕ ƵŶŬŶŽǁŝŶŐůLJ ŐĞƚƐ ŚŝƐĐŽŵƉƵƚĞƌŝŶĨĞĐƚĞĚďLJƚŚĞǀŝƌƵƐ͘ 0DOZDUH DĂůǁĂƌĞ ;ƐŚŽƌƚ ĨŽƌ ŵĂůŝĐŝŽƵƐŝĐŝŽƵƐ ƐŽĨƚǁĂƌĞͿ ŝƐ Ă ƚĞƌŵ ƵƐĞĚƵƐ ĨŽƌ ĐŽŵƉƵƚĞƌ ǀŝƌƵƐĞƐ͕ ǁŽƌŵƐ͕ ƚƌŽũĂŶ ŚŽƌƐĞƐ͕ ĂŶĚ ƌŽŽƚŬŝƚƐ͘/ƚ ŝƐ Ă ƉƌŽŐƌĂŵ ƚŚĂƚ ĂĐƚƐ ǁǁŝƚŚŽƵƚ Ă ƵƐĞƌ͛Ɛ ŬŶŽǁůĞĚŐĞ ĂŶĚ ĚĞůŝďĞƌĂƚĞůLJ ĂůƚĞƌƐ ƚŚĞ ĐŽŵƉƵƚĞƌ ŽƉĞƌĂƚŝŽŶƐ͘ ^ŽŵĞ^Žŵ ĐŽƌƌƵƉƚ ƉƌŽŐƌĂŵŵĞƌƐŽƌǀŝƌƵƐ ĂƵƚŚŽƌƐ ǁƌŝƚĞ ŵĂůǁĂƌĞ ĂŶĚƚŚĞŶƚĞƐƚŝƚƚŽĞŶƐƵƌĞŝƚĐĂŶĚĞůŝǀĞƌŝƚƐƉĂLJůŽĂĚ͘ĞŝƚĐĂŶĚĞůŝǀĞƌŝƚƐƉĂĞŝƚĐĂŶĚ ƉĂLJůŽĂĚŝƐĂĚĞƐƚƌƵĐƚŝǀĞĞǀĞŶƚĂƉƌŽŐƌĂŵ ŝƐŝŶƚĞŶĚĞĚƚŽĚĞůŝǀĞƌ͘ DĂůǁĂƌĞĚĞůŝǀĞƌƐŝƚƐƉĂLJůŽĂĚŽŶĂĐŽŵƉƵƚĞƌŝŶĂǀĂƌŝĞƚLJŽĨǁĂLJƐŶĂĐŽŵƉŶĂĐŽŵ ͗ PMP ,73/$1(7 3(7$%<7( ;ϭͿ tŚĞŶĂƵƐĞƌŽƉĞŶƐĂŶŝŶĨĞĐƚĞĚĨŝůĞ ;ϮͿ tŚĞŶĂƵƐĞƌƌƵŶƐĂŶŝŶĨĞĐƚĞĚƉƌŽŐƌĂŵ ;ϯͿ tŚĞŶĂƵƐĞƌƚƐƚŚĞĐŽŵƉƵƚĞƌǁŝƚŚŝŶĨĞĐƚĞĚŽƌƉĞŶĚƌŝǀĞ ;ϰͿ tŚĞŶĂƵƐĞƌĐŽŶŶĞĐƚƐĂŶƵŶƉƌŽƚĞĐƚĞĚĐŽŵƉƵƚĞƌƚŽĂŶĞƚǁŽƌŬ ;ϱͿ ŽǁŶůŽĂĚŝŶŐĂŶŝŶĨĞĐƚĞĚĨŝůĞĨƌŽŵƚŚĞ/ŶƚĞƌŶĞƚ 6<0372062)0$/:$5(259,586(6 /ĨLJŽƵƌĐŽŵƉƵƚĞƌǁŽƌŬƐĚŝĨĨĞƌĞŶƚůLJĨƌŽŵƵƐƵĂů͕ŝƚŵĂLJŚĂǀĞďĞĞŶŝŶĨĞĐƚĞĚďLJĂǀŝƌƵƐ͘ĐŽŵƉƵƚĞƌ͕ ŝŶĨĞĐƚĞĚ ďLJ Ă ǀŝƌƵƐ͕ ǁŽƌŵ͕ ƚƌŽũĂŶ ŚŽƌƐĞ͕ Žƌ ƌŽŽƚŬŝƚ͕ ŽĨƚĞŶ ŚĂƐ ŽŶĞ Žƌ ŵŽƌĞ ŽĨ ƚŚĞ ĨŽůůŽǁŝŶŐ ƐLJŵƉƚŽŵƐ͗ ŽŵƉƵƚĞƌƌƵŶƐŵƵĐŚƐůŽǁĞƌƚŚĂŶƵƐƵĂů͘ ϳ DĞŵŽƌLJŽĨĐŽŵƉƵƚĞƌďĞĐŽŵĞƐůĞƐƐƚŚĂŶĞdžƉĞĐƚĞĚ͘ &ŝůĞƐďĞĐŽŵĞĐŽƌƌƵƉƚĞĚ͘ ^ĐƌĞĞŶĚŝƐƉůĂLJƐƵŶƵƐƵĂůŵĞƐƐĂŐĞŽƌŝŵĂŐĞ͘ DƵƐŝĐŽƌƵŶƵƐƵĂůƐŽƵŶĚƉůĂLJƐƌĂŶĚŽŵůLJ͘ džŝƐƚŝŶŐƉƌŽŐƌĂŵƐĂŶĚĨŝůĞƐĚŝƐĂƉƉĞĂƌ͘ WƌŽŐƌĂŵƐŽƌĨŝůĞƐĚŽŶŽƚǁŽƌŬƉƌŽƉĞƌůLJ͘ hŶŬŶŽǁŶƉƌŽŐƌĂŵƐŽƌĨŝůĞƐŵLJƐƚĞƌŝŽƵƐůLJĂƉƉĞĂƌ͘ ^LJƐƚĞŵƉƌŽƉĞƌƚŝĞƐĐŚĂŶŐĞ͘ KƉĞƌĂƚŝŶŐƐLJƐƚĞŵĚŽĞƐŶŽƚƐƚĂƌƚƵƉ͘ KƉĞƌĂƚŝŶŐƐLJƐƚĞŵƐŚƵƚƐĚŽǁŶƵŶĞdžƉĞĐƚĞĚůLJ͘ ())(&762)0$/:$5(259,586(6 /ƚĐĂŶĚĂŵĂŐĞŽƌƌĞŶĂŵĞƚŚĞŝŵƉŽƌƚĂŶƚĨŝůĞƐ͘ /ƚĐĂŶĚĂŵĂŐĞŽƌĚĞƐƚƌŽLJƚŚĞŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵ͘ /ƚĐĂŶĚĞĐƌĞĂƐĞƚŚĞƐƉĞĞĚŽĨƚŚĞĐŽŵƉƵƚĞƌ͘ /ƚĐĂŶƌĞĚƵĐĞƚŚĞŵĞŵŽƌLJŽƌŚĂƌĚĚŝƐŬƐƉĂĐĞ͘ /ƚĐĂŶŝŶĨĞĐƚƚƌĞĐŽƌĚƐ͘ /ƚĐĂŶŝŶĨĞĐƚĞdžĞĐƵƚĂďůĞĨŝůĞƐ͘ (PDLO9LUXV ͲŵĂŝů ǀŝƌƵƐĞƐ ĂƌĞ ƐƉƌĞĂĚ ďLJ ƚŚĞ ĨŝůĞƐ ĂƚƚĂĐŚĞĚƚƚĂĐŚĞĚĚ ƚŽ ĞͲŵĂŝů ŵĞƐƐĂŐĞƐ͘ Ɛ ĞͲŵĂŝů ĂƚƚĂĐŚŵĞŶƚƐŚŵĞŶƚƐ ŚĂǀĞ P ďĞĐŽŵĞ ŵŽƌĞ ĐŽŵŵŽŶ͕ ƚŚĞ ŶƵŵďĞƌŵďĞƌ ŽĨ ĞͲŵĂŝů ǀŝƌƵƐĞƐ ŚĂƐ ĂůƐŽ ŝŶĐƌĞĂƐĞĚ͘ zŽƵƵ ĐĂŶŶŽƚŶŶŽƚ ŐĞƚ ĂŶ ĞĞͲ ŵĂŝůǀŝƌƵƐĨƌŽŵĂŵĞƐƐĂŐĞƚŚĂƚĐŽŶƚĂŝŶƐŽŶůLJƚĞdžƚ͘ŚĂƚĐŽŶƚĂŝŶƐŽŶůLJƚĞdžƚ͘ĂƚĐŽŶƚĂŝŶƐŽŶůLJƚĞdžƚ͘ 635($',1*2)(0$,/9,586(60$,/9,586(60$,/9,586( MPM tŚĞŶ LJŽƵ ŽƉĞŶ ĂŶ ĞͲŵĂŝůŵĂŝů ĂƚƚĂĐŚŵĞŶƚĂƚƚĂĐ ƚŚĂƚƚŚĂ ĐŽŶƚĂŝŶƐ Ă ǀŝƌƵƐ͕ ƚŚĞ ǀŝƌƵƐ ƐƉƌĞĂĚƐ ƚŽ LJŽƵƌ ĐŽŵƉƵƚĞƌ͘ /Ĩ LJŽƵ ĨŽƌǁĂƌĚƚŚĞ ĂƚƚĂĐŚŵĞŶĂĂƚƚĂĐŚŵĞŶƚ ƚŽ ŽƚŚĞƌ ƉĞŽƉůĞ͕ ƚŚĞŝƌ ĐŽŵƉƵƚĞƌƐ ǁŝůů ĂůƐŽ ŐĞƚ ĂĨĨĞĐƚĞĚ ǁŚĞŶ ƚŚĞLJ ŽƉĞŶ ƚŚĞĞ ĂƚƚĂĐŚŵĞŶƚ͘ĂƚƚĂĐŚŵĂƚƚĂĐ DĂŶLJ ĞͲŵĂŝů ǀŝƌƵƐĞƐ ĐĂŶ ĂůƐŽ ĂĐĐĞƐƐ LJŽƵƌ ĞͲŵĂŝů ĂĚĚƌĞƐƐŬĂŶĚĂƵƚŽŵĂƚŝĐĂůůLJƐĞŶĚƚŚĞŵƐĞůǀĞƐƚŽƚŚĞĞͲŵĂŝůĂĚĞŶĚĞŶĚPMPĚƌĞƐƐĞƐƐƚŽƌĞĚƚŚĞƌĞ͘
Recommended publications
  • Trojan Vs Rat Vs Rootkit Mayuri More1, Rajeshwari Gundla2, Siddharth Nanda3 1U.G
    IJRECE VOL. 7 ISSUE 2 (APRIL- JUNE 2019) ISSN: 2393-9028 (PRINT) | ISSN: 2348-2281 (ONLINE) Trojan Vs Rat Vs Rootkit Mayuri More1, Rajeshwari Gundla2, Siddharth Nanda3 1U.G. Student, 2 Senior Faculty, 3Senior Faculty SOE, ADYPU, Lohegaon, Pune, Maharashtra, India1 IT, iNurture, Bengaluru, India2,3 Abstract - Malicious Software is Malware is a dangerous of RATs completely and prevent confidential data being software which harms computer systems. With the increase leaked. So Dan Jiang and Kazumasa Omote researchers in technology in today’s days, malwares are also increasing. have proposed an approach to detect RAT in the early stage This paper is based on Malware. We have discussed [10]. TROJAN, RAT, ROOTKIT in detail. Further, we have discussed the adverse effects of malware on the system as III. CLASSIFICATION well as society. Then we have listed some trusted tools to Rootkit vs Trojan vs Rat detect and remove malware. Rootkit - A rootkit is a malicious software that permits a legitimate user to have confidential access to a system and Keywords - Malware, Trojan, RAT, Rootkit, System, privileged areas of its software. A rootkit possibly contains Computer, Anti-malware a large number of malicious means for example banking credential stealers, keyloggers, antivirus disablers, password I. INTRODUCTION stealers and bots for DDoS attacks. This software stays Nowadays, this world is full of technology, but with the hidden in the computer and allocates the remote access of advantages of technology comes its disadvantages like the computer to the attacker[2]. hacking, corrupting the systems, stealing of data etc. These Types of Rootkit: malpractices are possible because of malware and viruses 1.
    [Show full text]
  • Metahunt: Towards Taming Malware Mutation Via Studying the Evolution of Metamorphic Virus
    MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus Li Wang Dongpeng Xu Jiang Ming [email protected] [email protected] [email protected] The Pennsylvania State University University of New Hampshire University of Texas at Arlington University Park, PA 16802, USA Durham, NH 03824, USA Arlington, TX 76019, USA Yu Fu Dinghao Wu [email protected] [email protected] The Pennsylvania State University The Pennsylvania State University University Park, PA 16802, USA University Park, PA 16802, USA ABSTRACT KEYWORDS As the underground industry of malware prospers, malware de- Malware detection, metamorphic virus, binary diffing, binary code velopers consistently attempt to camouflage malicious code and semantics analysis undermine malware detection with various obfuscation schemes. ACM Reference Format: Among them, metamorphism is known to have the potential to Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu. 2019. Meta- defeat the popular signature-based malware detection. A meta- Hunt: Towards Taming Malware Mutation via Studying the Evolution of morphic malware sample mutates its code during propagations so Metamorphic Virus. In 3rd Software Protection Workshop (SPRO’19), Novem- that each instance of the same family exhibits little resemblance to ber 15, 2019, London, United Kingdom. ACM, New York, NY, USA, 12 pages. another variant. Especially with the development of compiler and https://doi.org/10.1145/3338503.3357720 binary rewriting techniques, metamorphic malware will become much easier to develop and outbreak eventually. To fully under- stand the metamorphic engine, the core part of the metamorphic 1 INTRODUCTION malware, we attempt to systematically study the evolution of me- The malicious software (malware) underground market has evolved tamorphic malware over time.
    [Show full text]
  • Adware-Searchsuite
    McAfee Labs Threat Advisory Adware-SearchSuite June 22, 2018 McAfee Labs periodically publishes Threat Advisories to provide customers with a detailed analysis of prevalent malware. This Threat Advisory contains behavioral information, characteristics and symptoms that may be used to mitigate or discover this threat, and suggestions for mitigation in addition to the coverage provided by the DATs. To receive a notification when a Threat Advisory is published by McAfee Labs, select to receive “Malware and Threat Reports” at the following URL: https://www.mcafee.com/enterprise/en-us/sns/preferences/sns-form.html Summary Detailed information about the threat, its propagation, characteristics and mitigation are in the following sections: Infection and Propagation Vectors Mitigation Characteristics and Symptoms Restart Mechanism McAfee Foundstone Services The Threat Intelligence Library contains the date that the above signatures were most recently updated. Please review the above mentioned Threat Library for the most up to date coverage information. Infection and Propagation Vectors Adware-SearchSuite is a "potentially unwanted program" (PUP). PUPs are any piece of software that a reasonably security- or privacy-minded computer user may want to be informed of and, in some cases, remove. PUPs are often made by a legitimate corporate entity for some beneficial purpose, but they alter the security state of the computer on which they are installed, or the privacy posture of the user of the system, such that most users will want to be aware of them. Mitigation Mitigating the threat at multiple levels like file, registry and URL could be achieved at various layers of McAfee products. Browse the product guidelines available here (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described in the Characteristics and symptoms section.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Towards Next-Generation Intrusion Detection
    rd 2011 3 International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within C. Czosseck, E. Tyugu, T. Wingfield (Eds.) NATO, and for personal or educational use done for non-profit or non-commercial purpose is granted providing that copies bear this notice and a full citation on the first Tallinn, Estonia, 2011 © CCD COE Publications page. Any other reproduction or transmission requires prior written permission. Towards Next-Generation Intrusion Detection Robert Koch Institut für Technische Informatik (ITI) Universität der Bundeswehr Munich, Germany [email protected] Abstract- Today, Intrusion Detection Systems (IDS) are integral components of larger networks. Even so, security incidents are on a day-to-day basis: Numerous data leakage scandals arouse public interest in the recent past and also other attacks like Stuxnet are discussed in the general public. On the one side, the commercial success of the Internet and the possibilities to carry out attacks from a relatively safe distance attracts criminals and made e-Crime to a multi-billion dollar market over the past years. On the other side, more and more services and systems migrate to the Internet, for example Voice over IP (VoIP) or Video on Demand (VoD). This enables new and potential attack vectors. With the steadily increasing use of encryption technology, State-of-the-Art Intrusion- as well as Extrusion Detection technologies can hardly safeguard current networks to the full extend. Furthermore, they are not able to cope with the arising challenges of the fast growing network environments. The paper gives an overview of up-to-date security systems and investigates their shortcomings.
    [Show full text]
  • 1.Computer Virus Reported (1) Summary for This Quarter
    Attachment 1 1.Computer Virus Reported (1) Summary for this Quarter The number of the cases reported for viruses*1 in the first quarter of 2013 decreased from that of the fourth quarter of 2012 (See Figure 1-1). As for the number of the viruses detected*2 in the first quarter of 2013, W32/Mydoom accounted for three-fourths of the total (See Figure 1-2). Compared to the fourth quarter of 2012, however, both W32/Mydoom and W32/Netsky showed a decreasing trend. When we looked into the cases reported for W32/Netsky, we found that in most of those cases, the virus code had been corrupted, for which the virus was unable to carry out its infection activity. So, it is unlikely that the number of cases involving this virus will increase significantly in the future As for W32/IRCbot, it has greatly decreased from the level of the fourth quarter of 2012. W32/IRCbot carries out infection activities by exploiting vulnerabilities within Windows or programs, and is often used as a foothold for carrying out "Targeted Attack". It is likely that that there has been a shift to attacks not using this virus. XM/Mailcab is a mass-mailing type virus that exploits mailer's address book and distributes copies of itself. By carelessly opening this type of email attachment, the user's computer is infected and if the number of such users increases, so will the number of the cases reported. As for the number of the malicious programs detected in the first quarter of 2013, Bancos, which steals IDs/Passwords for Internet banking, Backdoor, which sets up a back door on the target PC, and Webkit, which guides Internet users to a maliciously-crafted Website to infect with another virus, were detected in large numbers.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Crimeware on the Net
    Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan BlackHat Europe, Amsterdam 2008 Who Am I ? (iamit) • Iftach Ian Amit – In Hebrew it makes more sense… • Director Security Research @ Finjan • Various security consulting/integration gigs in the past – R&D – IT • A helping hand when needed… (IAF) 2 BlackHat Europe – Amsterdam 2008 Today’s Agenda • Terminology • Past vs. Present – 10,000 feet view • Business Impact • Key Characteristics – what does it look like? – Anti-Forensics techniques – Propagation methods • What is the motive (what are they looking for)? • Tying it all up – what does it look like when successful (video). • Anything in it for us to learn from? – Looking forward on extrusion testing methodologies 3 BlackHat Europe – Amsterdam 2008 Some Terminology • Crimeware – what we refer to most malware these days is actually crimeware – malware with specific goals for making $$$ for the attackers. • Attackers – not to be confused with malicious code writers, security researchers, hackers, crackers, etc… These guys are the Gordon Gecko‟s of the web security field. The buy low, and capitalize on the investment. • Smart (often mislead) guys write the crimeware and get paid to do so. 4 BlackHat Europe – Amsterdam 2008 How Do Cybercriminals Steal Business Data? Criminals’ activity in the cyberspace Federal Prosecutor: “Cybercrime Is Funding Organized Crime” 5 BlackHat Europe – Amsterdam 2008 The Business Impact Of Crimeware Criminals target sensitive business data
    [Show full text]
  • Bots and Botnets: Risks, Issues and Prevention
    EMEA MSSD The Journey, So Far: Trends, Graphs and Statistics Martin Overton, IBM UK 20th September 2007 | Author: Martin Overton © 2007 IBM Corporation EMEA MSSD Agenda . The ‘First’ IBM PC Virus . Statistics, 80’s . Statistics, 90’s . Statistics, 00’s . Malware Myth-busting . Putting it all Together . Conclusions . Questions The Journey, So Far: Trends, Graphs and Statistics | Martin Overton © 2007 IBM Corporation EMEA MSSD Disclaimer . Products or services mentioned in this presentation are included for information only. Products and/or services listed, mentioned or referenced in any way do not constitute any form of recommendation or endorsement by IBM or the presenter. All trademarks and copyrights are acknowledged. The Journey, So Far: Trends, Graphs and Statistics | Martin Overton © 2007 IBM Corporation EMEA MSSD Brain . The very first malware written for the IBM PC [and clones] used ‘stealth’ to hide its presence[1]: . Here is a short extract from the description of Brain from F-Secure explaining how the stealth function it used works: . “The Brain virus tries to hide from detection by hooking into INT 13. When an attempt is made to read an infected boot sector, Brain will just show you the original boot sector instead. This means that if you look at the boot sector using DEBUG or any similar program, everything will look normal, if the virus is active in memory. This means the virus is the first "stealth" virus as well.” [1] Source : http://www.research.ibm.com/antivirus/timeline.htm [2] More data can be found here : http://www.f-secure.com/v-descs/brain.shtml
    [Show full text]
  • SMM Rootkits
    SMM Rootkits: A New Breed of OS Independent Malware Shawn Embleton Sherri Sparks Cliff Zou University of Central Florida University of Central Florida University of Central Florida [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION The emergence of hardware virtualization technology has led to A rootkit consists of a set of programs that work to subvert the development of OS independent malware such as the Virtual control of an Operating System from its legitimate users [16]. If Machine based rootkits (VMBRs). In this paper, we draw one were asked to classify viruses and worms by a single defining attention to a different but related threat that exists on many characteristic, the first word to come to mind would probably be commodity systems in operation today: The System Management replication. In contrast, the single defining characteristic of a Mode based rootkit (SMBR). System Management Mode (SMM) rootkit is stealth. Viruses reproduce, but rootkits hide. They hide is a relatively obscure mode on Intel processors used for low-level by compromising the communication conduit between an hardware control. It has its own private memory space and Operating System and its users. Secondary to hiding themselves, execution environment which is generally invisible to code rootkits are generally capable of gathering and manipulating running outside (e.g., the Operating System). Furthermore, SMM information on the target machine. They may, for example, log a code is completely non-preemptible, lacks any concept of victim user’s keystrokes to obtain passwords or manipulate the privilege level, and is immune to memory protection mechanisms.
    [Show full text]