Markets for cybercrime tools and stolen data: hackers' bazaar
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, California ; Washington, District of Columbia
RAND Corporation
[2014]
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "RR-610-JNI."--Page 4 of cover. - "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Verso of title page Online resource; title from PDF title page (ebrary, viewed April 22, 2014) |
Beschreibung: | 1 online resource (xv, 65 pages) illustrations |
ISBN: | 012415817X 0833085417 0833085743 9780124158177 9780833085412 9780833085740 9780833087119 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043038232 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2014 |||| o||u| ||||||eng d | ||
020 | |a 012415817X |9 0-12-415817-X | ||
020 | |a 0833085417 |9 0-8330-8541-7 | ||
020 | |a 0833085743 |9 0-8330-8574-3 | ||
020 | |a 9780124158177 |9 978-0-12-415817-7 | ||
020 | |a 9780833085412 |9 978-0-8330-8541-2 | ||
020 | |a 9780833085740 |9 978-0-8330-8574-0 | ||
020 | |a 9780833087119 |9 978-0-8330-8711-9 | ||
035 | |a (OCoLC)880459501 | ||
035 | |a (DE-599)BVBBV043038232 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.168 |2 23 | |
100 | 1 | |a Ablon, Lillian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Markets for cybercrime tools and stolen data |b hackers' bazaar |c Lillian Ablon, Martin C. Libicki, Andrea A. Golay |
264 | 1 | |a Santa Monica, California ; Washington, District of Columbia |b RAND Corporation |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (xv, 65 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "RR-610-JNI."--Page 4 of cover. - "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Verso of title page | ||
500 | |a Online resource; title from PDF title page (ebrary, viewed April 22, 2014) | ||
505 | 8 | |a Introduction and Research Methodology -- Characteristics of the Black Market -- The Black Market and Botnets -- Zero-Day Vulnerabilities in the Black and Gray Markets -- Are Hacker Black Markets Mature? -- Projections and Predictions for the Black Market -- Conclusions -- For Future Research -- Appendix A: Text of the Black Market Timeline -- Appendix B: Glossary | |
505 | 8 | |a Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 4 | |a Computer crimes |x Economic aspects | |
650 | 4 | |a Black market | |
650 | 4 | |a Data protection | |
650 | 4 | |a Hacking | |
700 | 1 | |a Libicki, Martin C. |e Sonstige |4 oth | |
700 | 1 | |a Golay, Andrea A. |e Sonstige |4 oth | |
710 | 2 | |a Rand Corporation |e Sonstige |4 oth | |
710 | 2 | |a Acquisition and Technology Policy Center |e Sonstige |4 oth | |
710 | 2 | |a Juniper Networks, Inc. |e Sonstige |4 oth | |
710 | 2 | |a Rand Corporation |b National Security Research Division |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Ablon, Lillian |t Markets for cybercrime tools and stolen data |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028462879 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175400030437376 |
---|---|
any_adam_object | |
author | Ablon, Lillian |
author_facet | Ablon, Lillian |
author_role | aut |
author_sort | Ablon, Lillian |
author_variant | l a la |
building | Verbundindex |
bvnumber | BV043038232 |
collection | ZDB-4-EBA |
contents | Introduction and Research Methodology -- Characteristics of the Black Market -- The Black Market and Botnets -- Zero-Day Vulnerabilities in the Black and Gray Markets -- Are Hacker Black Markets Mature? -- Projections and Predictions for the Black Market -- Conclusions -- For Future Research -- Appendix A: Text of the Black Market Timeline -- Appendix B: Glossary Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks) |
ctrlnum | (OCoLC)880459501 (DE-599)BVBBV043038232 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04716nmm a2200601zc 4500</leader><controlfield tag="001">BV043038232</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012415817X</subfield><subfield code="9">0-12-415817-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833085417</subfield><subfield code="9">0-8330-8541-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833085743</subfield><subfield code="9">0-8330-8574-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158177</subfield><subfield code="9">978-0-12-415817-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833085412</subfield><subfield code="9">978-0-8330-8541-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833085740</subfield><subfield code="9">978-0-8330-8574-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833087119</subfield><subfield code="9">978-0-8330-8711-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880459501</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043038232</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ablon, Lillian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Markets for cybercrime tools and stolen data</subfield><subfield code="b">hackers' bazaar</subfield><subfield code="c">Lillian Ablon, Martin C. Libicki, Andrea A. Golay</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, California ; Washington, District of Columbia</subfield><subfield code="b">RAND Corporation</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 65 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RR-610-JNI."--Page 4 of cover. - "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Verso of title page</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed April 22, 2014)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Introduction and Research Methodology -- Characteristics of the Black Market -- The Black Market and Botnets -- Zero-Day Vulnerabilities in the Black and Gray Markets -- Are Hacker Black Markets Mature? -- Projections and Predictions for the Black Market -- Conclusions -- For Future Research -- Appendix A: Text of the Black Market Timeline -- Appendix B: Glossary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Black market</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Golay, Andrea A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Acquisition and Technology Policy Center</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Juniper Networks, Inc.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="b">National Security Research Division</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Ablon, Lillian</subfield><subfield code="t">Markets for cybercrime tools and stolen data</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028462879</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043038232 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:15:41Z |
institution | BVB |
isbn | 012415817X 0833085417 0833085743 9780124158177 9780833085412 9780833085740 9780833087119 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028462879 |
oclc_num | 880459501 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (xv, 65 pages) illustrations |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | RAND Corporation |
record_format | marc |
spelling | Ablon, Lillian Verfasser aut Markets for cybercrime tools and stolen data hackers' bazaar Lillian Ablon, Martin C. Libicki, Andrea A. Golay Santa Monica, California ; Washington, District of Columbia RAND Corporation [2014] © 2014 1 online resource (xv, 65 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "RR-610-JNI."--Page 4 of cover. - "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Verso of title page Online resource; title from PDF title page (ebrary, viewed April 22, 2014) Introduction and Research Methodology -- Characteristics of the Black Market -- The Black Market and Botnets -- Zero-Day Vulnerabilities in the Black and Gray Markets -- Are Hacker Black Markets Mature? -- Projections and Predictions for the Black Market -- Conclusions -- For Future Research -- Appendix A: Text of the Black Market Timeline -- Appendix B: Glossary Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks) COMPUTERS / Internet / Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Computer crimes Economic aspects Black market Data protection Hacking Libicki, Martin C. Sonstige oth Golay, Andrea A. Sonstige oth Rand Corporation Sonstige oth Acquisition and Technology Policy Center Sonstige oth Juniper Networks, Inc. Sonstige oth Rand Corporation National Security Research Division Sonstige oth Erscheint auch als Druck-Ausgabe Ablon, Lillian Markets for cybercrime tools and stolen data http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898 Aggregator Volltext |
spellingShingle | Ablon, Lillian Markets for cybercrime tools and stolen data hackers' bazaar Introduction and Research Methodology -- Characteristics of the Black Market -- The Black Market and Botnets -- Zero-Day Vulnerabilities in the Black and Gray Markets -- Are Hacker Black Markets Mature? -- Projections and Predictions for the Black Market -- Conclusions -- For Future Research -- Appendix A: Text of the Black Market Timeline -- Appendix B: Glossary Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks) COMPUTERS / Internet / Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Computer crimes Economic aspects Black market Data protection Hacking |
title | Markets for cybercrime tools and stolen data hackers' bazaar |
title_auth | Markets for cybercrime tools and stolen data hackers' bazaar |
title_exact_search | Markets for cybercrime tools and stolen data hackers' bazaar |
title_full | Markets for cybercrime tools and stolen data hackers' bazaar Lillian Ablon, Martin C. Libicki, Andrea A. Golay |
title_fullStr | Markets for cybercrime tools and stolen data hackers' bazaar Lillian Ablon, Martin C. Libicki, Andrea A. Golay |
title_full_unstemmed | Markets for cybercrime tools and stolen data hackers' bazaar Lillian Ablon, Martin C. Libicki, Andrea A. Golay |
title_short | Markets for cybercrime tools and stolen data |
title_sort | markets for cybercrime tools and stolen data hackers bazaar |
title_sub | hackers' bazaar |
topic | COMPUTERS / Internet / Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Computer crimes Economic aspects Black market Data protection Hacking |
topic_facet | COMPUTERS / Internet / Security SOCIAL SCIENCE / Criminology Computer crimes Economic aspects Black market Data protection Hacking |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=755898 |
work_keys_str_mv | AT ablonlillian marketsforcybercrimetoolsandstolendatahackersbazaar AT libickimartinc marketsforcybercrimetoolsandstolendatahackersbazaar AT golayandreaa marketsforcybercrimetoolsandstolendatahackersbazaar AT randcorporation marketsforcybercrimetoolsandstolendatahackersbazaar AT acquisitionandtechnologypolicycenter marketsforcybercrimetoolsandstolendatahackersbazaar AT junipernetworksinc marketsforcybercrimetoolsandstolendatahackersbazaar AT randcorporationnationalsecurityresearchdivision marketsforcybercrimetoolsandstolendatahackersbazaar |