•  
  •  
 

Abstract

President Obama recently warned that "foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day" and that "in a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home."' Until recently, the technical challenges of identifying and exploiting U.S. computer vulnerabilities impeded all but the most powerful of nations from acquiring such capabilities. These impediments have vanished. Now, criminals, terrorists, and rogue nations can simply buy what they need in a booming online market for the most dangerous exploits of all: weaponized "0day" exploits.

Included in

Law Commons

Share

COinS