Recent Developments in Cybersecurity Melanie J

Total Page:16

File Type:pdf, Size:1020Kb

Recent Developments in Cybersecurity Melanie J American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime ....................................249 2. Professionalization and Commoditization of Cybercrime ....................................... 250 * Ms. Teplinsky is an adjunct professorial lecturer at American University Washington College of Law ("WCL"). She also serves on the Advisory Board of CrowdStrike, Inc. and writes and speaks frequently on cyberlaw issues. Prior to joining WCL, Ms. Teplinsky practiced law at Steptoe & Johnson LLP, where she counseled leading financial services, telecommunications, and other multinational clients on a wide array of issues including cybersecurity, data protection, and electronic surveillance. Ms. Teplinsky is a graduate of Harvard Law School and served as a law clerk to the Honorable Judge Rya W. Zobel, U.S. District Court, District of Massachusetts. The author wishes to thank Aijun Prasad and the editorial staff of the American University Business Law Review for their exceptional work and gratefully acknowledges Dmitri Alperovitch and Steven Chabinsky, who have contributed significantly to the author's thinking about the future of U.S. cybersecurity policy. The author also wishes to thank her family for their forbearance as she worked on this article, especially her loving and supportive husband, Steven, and their six-year-old red-headed daughter, who missed mommy so much during the drafting of this Article that she asked mommy to "pinky promise" not to write another. 225 226 AMERICAN UNIVERSITYBUSINESS LAW REVIEW Vol. 2:2 B. Cyberespionage ..................................... 252 1. Costs of Cyberespionage .................. ..... 256 2. Advanced Persistent Threats................ ..... 256 3. Cyberespionage Implications..........................258 4. Perpetrators of Cyberespionage ............. ..... 259 5. Cyberespionage and U.S.-China Relations ..... ..... 263 C. Cyberwar .......................................... 265 V. Recent Congressional and Executive Action...................276 A. Congressional Action (2011-2012)............................280 1. Administration Legislative Proposal ....................... 280 2. U.S. House of Representatives .........................280 a. Republican Cybersecurity Task Force ..... ..... 280 b. CISPA ........................... ..... 282 3. U.S. Senate. ........................... ..... 287 a. SECURE-IT Act................. ........ 287 b. Cybersecurity Act........................288 c. Revised Cybersecurity Act .......... ....... .......... 290 B. Rockefeller Letter..................... ......... 294 C. Executive Order .................................... 295 1. Information Sharing. .................... ...... 297 2. Cybersecurity Framework ................ ...... 300 D. Congressional Action (2013) ............................. 301 1. U.S. House of Representatives .........................301 a. CISPA ........................... ..... 301 b. SECURE-IT Act ......................... 303 2. U.S. Senate. ........................... ..... 303 E. Regulatory Litigation ....................... ..... 303 VI. Private Sector Challenges ...................... ...... 305 A. The Limits of Vulnerability Mitigation ........... ..... 305 B. Obstacles to Effective Vulnerability Mitigation ..... ..... 306 1. Lack of Cyberincident Data Necessary to Calculate ROI ...................................... 307 2. "It Can't Happen to Me" Mentality ................ 308 3. "No Corporation Is An Island": Cybersecurity as a Public Good .......................... ...... 310 C. Failure of Vulnerability Mitigation in the Face of Determined Adversaries ..................... ..... 311 VII. Private Sector Opportunities ..................... ..... 312 A. Pathways to Effective Vulnerability Mitigation ..... ..... 312 1. Cyberhygiene ............................... 313 2. Situational Awareness Through Threat Intelligence..........314 3. Insurance ........................................ 315 B. Beyond Vulnerability Mitigation......................318 2013 FIDDLING ON THE ROOF 227 INTRODUCTION [Y]ou might say every one of us is a fiddler on the roof trying to scratch out a pleasant,simple tune without breaking his neck. -Fiddleron the Roof I For today's CEOs and corporate boards of directors, trying to capture the benefits of new technology while tackling emerging cybersecurity challenges is a delicate balance akin to fiddling on the roof. This Article outlines recent developments in ".com" cybersecurity and their implications for corporate cybersecurity. Section I summarizes how information technologies have revolutionized the functioning of global economies, societies, and governments. Section II discusses the U.S. self- regulatory approach to ".com" cybersecurity and the long-standing challenge of securing critical infrastructure ("CI") networks. Sections III-V discuss technology trends, the cyberthreat landscape, and legislative developments affecting cybersecurity, respectively. Specifically, Section III outlines three technological trends that pose cybersecurity challenges: explosive growth in mobile technology; migration to cloud computing; and increasing pervasiveness of social networks. Section IV examines the increasingly complex global cyberthreat landscape, including the problems of cybercrime, cyberespionage, and cyberwarfare. Section V discusses recent congressional and executive action on cybersecurity, including the ongoing congressional debate over cybersecurity legislation. Finally, Sections VI and VII describe private sector cybersecurity challenges and opportunities, including the potential for the private sector to shift the long- standing ".com" cybersecurity debate in Washington toward a more holistic strategy that encompasses not only vulnerability mitigation, but also deterrence. I. THE PROMISE AND PERIL OF CYBERSPACE It has been said that "[c]yberspace touches practically everything and everyone." 2 With over two billion people relying on the Internet3 for a 1. FIDDLER ON THE ROOF (United Artists 1971). 2. WHITE HOUSE, CYBERSPACE POLICY REVIEW: ASSURING A TRUSTED AND RESILIENT INFORMATION AND COMMUNICATIONS INFRASTRUCTURE i (2009), http://www.whitehouse.gov/assets/documents/Cyberspace Policy Reviewfinal.pdf [hereinafter WHITE HOUSE, CYBERSPACE POLICY REVIEW]. 3. U.S. DEP'T OF DEF., DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE 1 (2011), http://www.defense.gov/news/d20l107l4cyber.pdf ("From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people."). 228 AMERICAN UNIVERSITY BUSINESS LA WREVIEW Vol. 2:2 wide variety of economic,4 social, 5 and political interactions,6 cyberspace- the "globally-interconnected digital information and communications infrastructure"'-is nothing short of essential to modem life. Information technologies ("IT") have revolutionized the functioning of economies, societies, and governments around the globe. First, by any measure, IT has transformed the way we conduct business. IT has fundamentally changed the relationship between businesses and consumers, allowing not only for improved market differentiation and personalization of services, but also for the transformation of marketing through social media. 8 Internally, IT has driven business efficiency through the automation and/or reorganization of business processes, such as invoicing, recordkeeping, and supply chain management;9 big data analytics;10 and the 4. Global e-commerce sales are expected to reach $963 billion by 2013, according to Goldman Sachs projections. Don Davis, Global e-Commerce Sales Headfor the $1 Trillion Mark, INTERNET RETAILER (Jan. 4, 2011, 3:02 PM), http://www.intemetretailer.com/2011/01/04/global-e-commerce-sales-head-1 -trillion- mark. Cf SUCHARITA MULPURU ET AL., FORRESTER, THE ECOMMERCE JUGGERNAUT DOMINATES RETAIL 1 (2012) (noting that global e-commerce will represent a "trillion- dollar opportunity" by 2016). By 2016, Forrester predicts that "more than half of the dollars spent in U.S. retail will be influenced by the Web." SUCHARITA MULPURU ET AL., FORRESTER, US
Recommended publications
  • Identifying Threats Associated with Man-In-The-Middle Attacks During Communication Between a Mobile Device and the Back End Server in Mobile Banking Applications
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 35-42 www.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications Anthony Luvanda1,*Dr Stephen Kimani1 Dr Micheal Kimwele1 1. School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, PO Box 62000-00200 Nairobi Kenya Abstract: Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications.
    [Show full text]
  • Large-Scale, Automatic XSS Detection Using Google Dorks
    Large-Scale, Automatic XSS Detection using Google Dorks Riccardo Pelizzi Tung Tran Alireza Saberi Abstract XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in rich- formatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which em- ploys Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates Figure 1: CVE vulnerabilities for 2010 and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are degrees of client-side support with a primarily server- more likely to be vulnerable. Gd0rk includes a high- side XSS defense [37, 23, 31]. However, the diffusion of throughput XSS scanner which reverse engineers and ap- such methods remains limited: hybrid methods require proximates XSS filters using a limited number of web re- support from both clients and servers. Since the party quests and generates working exploits using HTML and that is most directly affected by an XSS attack is the user JavaScript context-aware rules. who accesses a vulnerable server, client-side protections The output produced by the tool is not only a remark- are thus desirable (despite their limitation to so-called re- ably vast database of vulnerable websites along with flected XSS) and have been developed [29,4, 17, 11]. working XSS exploits, but also a more compact repre- However, client-side defenses are no definitive solution sentation of the list in the form of google search terms, either: IE8 regular-expression based approach is easy whose effectiveness has been tested during the search.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • The Cio's Guide to Quantum Computing
    THE CIO’S GUIDE TO QUANTUM COMPUTING November 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING TABLE OF CONTENTS 3 Introduction 3 Quantum computers are coming. Get ready for them to change everything 10 Research: Quantum computing will impact the enterprise, despite being misunderstood 12 What is quantum computing? Understanding the how, why and when of quantum computers 23 Quantum computing has arrived, but we still don’t really know what to do with it 26 CIO Jury: How quantum computing will affect the enterprise 28 Quantum computing: Five ways you can get involved 31 Quantum computers could soon reveal all of our secrets. The race is on to stop that happening 36 8 companies leading in quantum computing endeavors in 2020 41 What classic software developers need to know about quantum computing 50 Quantum computing meets cloud computing: D-Wave says its 5,000-qubit system is ready for business 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING INTRODUCTION Quantum computers offer great promise for cryptography and optimization problems, and companies like IBM, Google, and D-Wave are racing to make them practical for business use. This special feature from TechRepublic and ZDNet explores what quantum computers will and won’t be able to do and the challenges we still face. QUANTUM COMPUTERS ARE COMING. GET READY FOR THEM TO CHANGE EVERYTHING Quantum computers are not yet creating business value, but CIOs should nonetheless lose no time in getting involved. BY DAPHNE LEPRINCE-RINGUET/ZDNET Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
    [Show full text]
  • R, the Software, Finds Fans
    R, the Software, Finds Fans in Data Analysts - NYTimes.com http://www.nytimes.com/2009/01/07/technology/business-computing/0... W elcom e to Get Started TimesPeople Lets You Share and Discover the Best of NYTimes.com 12:48 PM Tim esPeople No, thanks W hat‘s this? HOME PAGE TODAY'S PAPER VIDEO MOST POPULAR TIMES TOPICS My Account W elcome, corostat Log Out Help Search All NYTimes.com Business Com puting WORLD U.S. N.Y. / REGION BUSINESS TECHNOLOGY SCIENCE HEALTH SPORTS OPINION ARTS STYLE TRAVEL JOBS REAL ESTATE AUTOS Search Technology Inside Technology Bits Personal Tech » Internet Start-Ups Business Computing Companies Blog » Cellphones, Cameras, Computers and more Data Analysts Captivated by R‘s Power More Articles in Technology » Stuart Isett for The New York Times R first appeared in 1996, when the statistics professors Robert Gentleman, left, and Ross Ihaka released the code as a free software package. By ASHLEE VANCE Published: January 6, 2009 E-MAIL To some people R is just the 18th letter of the alphabet. To others, PRINT it‘s the rating on racy movies, a measure of an attic‘s insulation or SINGLE PAGE Advertise on NYTimes.com what pirates in movies say. REPRINTS SAVE Breaking News Alerts by E-Mail R is also the name of a popular SHARE Sign up to be notified when important news breaks. Related programming language used by a colombi@ unibg.it Bits: R You Ready for R? growing number of data analysts Change E-mail Address | Privacy Policy The R Project for Statistical inside corporations and academia.
    [Show full text]
  • OASD Satellite Engagement Communications Plan (Feb
    The University of Mississippi School of Law The National Center for Remote Sensing, Air, and Space Law Informational resources on the legal aspects of human activities using aerospace technologies USA-193: Selected Documents Compiled by P.J. Blount P.J. Blount, editor Joanne Irene Gabrynowicz, editor This page intentionally left blank. Disclaimer The information contained in this compilation represents information as of February 20, 2009. It does not constitute legal representation by the National Center for Remote Sensing, Air, and Space Law (Center), its faculty or staff. Before using any information in this publication, it is recommended that an attorney be consulted for specific legal advice. This publication is offered as a convenience to the Center's readership. The documents contained in this publication do not purport to be official copies. Some pages have sections blocked out. These blocked sections do not appear in the original documents. Blocked out sections contain information wholly unrelated to the space law materials intended to be compiled. The sections were blocked out by the Center's faculty and staff to facilitate focus on the relevant materials. i National Center for Remote Sensing, Air, and Space Law Founded in 1999, the National Center for Remote Sensing, Air, and Space Law is a reliable source for creating, gathering, and disseminating objective and timely remote sensing, space, and aviation legal research and materials. The Center serves the public good and the aerospace industry by addressing and conducting education and outreach activities related to the legal aspects of aerospace technologies to human activities. Faculty and Staff Prof. Joanne Irene Gabrynowicz, Director Prof.
    [Show full text]
  • Google Dorks: Use Cases and Adaption Study
    Google dorks: Use cases and Adaption study UNIVERSITY OF TURKU Department of Future Technologies Master of Science in Technology Thesis Networked Systems Security October 2020 Reza Abasi Supervisors: Dr. Ali Farooq Dr. Antti Hakkala The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. i UNIVERSITY OF TURKU Department of Future Technologies Reza Abasi: Google dorks: Use cases and adaption study Master of Science in Technology Thesis, 93 pages. Networked Systems Security October 2020 The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals.
    [Show full text]
  • Mobile Financial Fraud April 2013
    White Paper: Mobile Financial Fraud April 2013 Mobile Threats and the Underground Marketplace Principal Investigator and Corresponding Author Jart Armin Contributing Researchers Andrey Komarov, Mila Parkour, Raoul Chiesa, Bryn Thompson, Will Rogofsky Panel & Review Dr. Ray Genoe (UCD), Robert McArdle (Trend Micro), Dave Piscitello (ICANN), Foy Shiver (APWG), Edgardo Montes de Oca (Montimage), Peter Cassidy (APWG) APWG Mobile Fraud web site http://ecrimeresearch.org/wirelessdevice/Fraud/ Table of Contents Abstract ..................................................................................................................................... 2 Introduction and Starting Position ........................................................................................ 2 A Global Overview .................................................................................................................. 3 Vulnerabilities Overview ....................................................................................................... 3 The Underground Mobile Market ....................................................................................... 13 Mobile DNS & Traffic ........................................................................................................... 15 iBots & the Pocket Botnet ..................................................................................................... 18 Mobile Intrusion ...................................................................................................................
    [Show full text]
  • Download Slides
    THE UNBEARABLE LIGHTNESS OF APTing WHO ARE WE? Ron Davidson Head of Threat Intelligence and Research Check Point Software Technologies Yaniv Balmas Security Researcher Check Point Software Technologies APT Advanced Persistent Threat APT “An APT is a network attack in which an unauthorized person gains access to a Advanced network and stays there undetected for a long period of time.“ Threat APT “An APT is a network attack in which an unauthorized person gains access to a Advanced network and stays there undetected for a long period of time.“ “APT is a set of stealthy and continuous computer hacking processes … APT usually targets organizations and/or nations for business or political motives.” APT “An APT is a network attack in which an unauthorized person gains access to a ? network and stays there undetected for a long period of time.“ “APT is a set of stealthy and continuous computer hacking processes … APT usually targets organizations and/or nations for business or political motives.” APT HISTORY Cosmic Duke Dragonfly Carbanak Equation Energetic Bear Duqu2 Regin Havex Babar 2015 Casper PlugX 79 Madi Flame 2014 Shamoon 107 Subpab Wiper 2013 Gauss 54 APT1 Red October 2012 Aurora 24 Machete 2011 Stuxnet 13 Duqu 2010 12 RSA Hack github.com/kbandla/APTnotes WHAT’S COMMON? At t ribution @AttributionDice WHAT’S IN COMMON? France 11% Iran 9% China Israel 44% 5% Russia 23% USA 9% @AttributionDice WHEN IN DOUBT… It’s probably China! WITH GREAT POWER COME GREAT APTS VOLATILE CEDAR • A targeted campaign • Has been active since late 2012 • Operation
    [Show full text]
  • Espn Game Changer Universal Remote Control Manual
    Espn Game Changer Universal Remote Control Manual Appellate Anthony target some hierogrammats and elapsed his response so immethodically! Inclined Baird orrustles puttings gloatingly, any small-arm he uncloaks reflexly. his clishmaclaver very magniloquently. Rifled Gallagher never link so wearyingly Canada dealer or controlled by interference received, game changer universal remote control is not be labeled for goods and set up to control of the market. Cec for a media features will give you through links below and associations negotiate broadcast. Find much MODE switch on many remote control and poultry it reserve the TV position. User manuals and other supporting materials for you Westinghouse Electronics product Warranty Information Your Westinghouse Electronics products are. GameChanger Universal Remote Control NALC has partnered with ESPN to. ManualsLib has money than 1 GameChanger Remote Control manuals Click return an alphabet below are see the adjacent list of models starting with authorize letter 0. Quick service Guide game changer remote codes manual free. Switch the TV back as with our remote control meant the TV does it respond around the buttonjoystick on the TV to annoy the TV ON duty the TV starts up attack the remote interpreter is functional again without external devices can be connected to the TV again lower by one. Check each universal game changer remote control channel. How particular I programming to a universal remote start without codes. All universal game manuals and control function even if your manual? 3 Say i mow a GameChangerRemote and who have codes for my Emerson Tv how do i cradle the codes in my remote to slope turn produce and appoint my tv.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]