Show simple item record

dc.contributor.authorStockton, Paul
dc.contributor.authorGolabek-Goldman, Michele
dc.date2021-11-25T13:36:31.000
dc.date.accessioned2021-11-26T12:30:10Z
dc.date.available2021-11-26T12:30:10Z
dc.date.issued2015-12-15T08:56:21-08:00
dc.identifierylpr/vol32/iss1/11
dc.identifier.contextkey7947486
dc.identifier.urihttp://hdl.handle.net/20.500.13051/17206
dc.description.abstractPresident Obama recently warned that "foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day" and that "in a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home."' Until recently, the technical challenges of identifying and exploiting U.S. computer vulnerabilities impeded all but the most powerful of nations from acquiring such capabilities. These impediments have vanished. Now, criminals, terrorists, and rogue nations can simply buy what they need in a booming online market for the most dangerous exploits of all: weaponized "0day" exploits.
dc.titleCurbing the Market for Cyber Weapons
dc.source.journaltitleYale Law & Policy Review
refterms.dateFOA2021-11-26T12:30:10Z
dc.identifier.legacycoverpagehttps://digitalcommons.law.yale.edu/ylpr/vol32/iss1/11
dc.identifier.legacyfulltexthttps://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1660&context=ylpr&unstamped=1


Files in this item

Thumbnail
Name:
12_32YaleL_PolyRev239_2013_201 ...
Size:
1.584Mb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record