President Obama recently warned that "foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day" and that "in a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home."' Until recently, the technical challenges of identifying and exploiting U.S. computer vulnerabilities impeded all but the most powerful of nations from acquiring such capabilities. These impediments have vanished. Now, criminals, terrorists, and rogue nations can simply buy what they need in a booming online market for the most dangerous exploits of all: weaponized "0day" exploits.
The export option will allow you to export the current search results of the entered query to a file. Different
formats are available for download. To export the items, click on the button corresponding with the preferred download format.
By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.
To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export.
The amount of items that can be exported at once is similarly restricted as the full export.
After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.