Search results for "black market"
showing 5 items of 5 documents
The dark side of European immigration policy
2011
More than ten years after the Treaty of Amsterdam came into force and after the programmes of Tampere and Aia, the Stockholm Programme , adopted last December 2009 for the period 2010-2014, has settled for the third time the area of "justice, freedom and security" with which EU presents itself. In relation to the Immigration policy the Stockholm Programme seals the term of security. Now Europe considers its area as a territory that withdraws into itself, through a security logic that caused the disappearance of the traces of the "freedom area". In fact, as it was affirmed in Tampere, this area can't be considered as a mere prerogative of the European citizens. In the name of security, prote…
A Study of a Social Behavior inside the Online Black Markets
2010
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…
Dynamic Modeling of the Cyber Security Threat Problem
2009
This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult to collect statistics about BMs for vulnerabilities and their associated transactions, as they are hidden from general view. We conduct a disguised observation of online BM trading sites to identify causal models of the ongoing viability of BMs. Our observation results are expressed as a system dynamic model. We implement simulations to observe the effects of possible actions to disrupt BMs. The results suggest that without interventions the number and size of BMs is likely to increase. A simulation scenario with a policy to halt BM operations re…
ECONOMIC CRISIS SUSTAINS BLACK MARKET
2012
The purpose of this research is to bring out the fact that during the periods of economic crisis, the black market finds a warm place to develop and even to diversify the ways of expressing. Based on some data of the National Institute of Statistics and the Organization for Economic Co-operation and Development (OECD1 ) , I’m trying to prove the fact that during the last two years while the world economic crisis has occurred, the black market has been increasing and there have been new forms of expressing this phenomenon. Although there are some positive ways of this phenomenon, on the whole, the increasing of the black market percent of GDP represents a wound within a healthy economy, whic…