<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do we combat this, if the illicit bad community are making more money than legal companies? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9943#M850</link>
    <description>&lt;P&gt;(&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/416071361"&gt;@vt100&lt;/a&gt;)&amp;nbsp;Vladimir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I apologize.&amp;nbsp; I did set my reading settings to be “Thread based” so I can see the replies in the context of the message it replies to.&amp;nbsp; I’ll try to use quotes more judiciously.&amp;nbsp; You are correct, I’m replying to your suggestion to place exploits on a munitions list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Stockpiled and undisclosed 0 day exploits&lt;/STRONG&gt;&lt;/U&gt;, on the other hand, &lt;STRONG&gt;outside of the generally accepted grace periods given by finders to the vendors&lt;/STRONG&gt;, have no other use but as a weapon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Weather someone extorts money from you by holding a gun to your head or encrypting data necessary to provide life-saving treatment, the outcome of not complying with with perpetrator's demands may well be the same. Similarly, if it is used to cripple vital infrastructure services (as was the case in Saudi Arabia, Ukraine and Atlanta).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The added scare factor is that every time those tools are used, the opposing side is automatically getting their hands on it. It may take some time to reverse engineer, modify the payload and repurpose, but so long as the original is kept secret, the blowback may be worth than the original intended use case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the numbers of people affected by this, how could we not treat these threats as WMDs?&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I believe I understand the distinction that you are trying to make here in the word use of exploit vs a vulnerability.&amp;nbsp; Specifically, you are looking to make it illegal to possess the generic definition of a (here’s my best whack at this) “&lt;EM&gt;&lt;STRONG&gt;payload consisting of instructions, signals, or program code; that takes advantage of a vulnerability in the software or hardware running on a computer or telecommunication system; that would either (1) render it inaccessible to a legitimate user; or (2) allow an unauthorized person to obtain or alter information stored therein.&lt;/STRONG&gt;&lt;/EM&gt;”&amp;nbsp; Correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that law were enacted, I would be guilty simply by having a keyboard.&amp;nbsp; Because I possess an “&amp;amp;” I therefore have the code to perform URI parameter tampering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see the problem?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore we have to criminalize the act of use of an exploit rather than it's possession..&amp;nbsp; Even further, we have to restrict that criminalization to intentional use to avoid someone just being sloppy or having fat fingers when they’re typing.&amp;nbsp; Or the code being illegitimate in one place, but legitimate in another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Apr 2018 17:06:50 GMT</pubDate>
    <dc:creator>Baechle</dc:creator>
    <dc:date>2018-04-30T17:06:50Z</dc:date>
    <item>
      <title>How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9679#M815</link>
      <description>&lt;P&gt;According to a new report coming out of the RSA Conference 2018:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/vulnerabilities---threats/cybercrime-economy-generates-$15-trillion-a-year/d/d-id/1331613?elq_mid=84437&amp;amp;elq_cid=23392365&amp;amp;_mc=NL_DR_EDT_DR_daily_20180423&amp;amp;cid=NL_DR_EDT_DR_daily_20180423&amp;amp;elqTrackId=5bbb195f772d4e2487fa4dc6d732582d&amp;amp;elq=23ba019a8acc4ba089ba1b3206ae0005&amp;amp;elqaid=84437&amp;amp;elqat=1&amp;amp;elqCampaignId=30497" target="_blank"&gt;https://www.darkreading.com/vulnerabilities---threats/cybercrime-economy-generates-$15-trillion-a-year/d/d-id/1331613?elq_mid=84437&amp;amp;elq_cid=23392365&amp;amp;_mc=NL_DR_EDT_DR_daily_20180423&amp;amp;cid=NL_DR_EDT_DR_daily_20180423&amp;amp;elqTrackId=5bbb195f772d4e2487fa4dc6d732582d&amp;amp;elq=23ba019a8acc4ba089ba1b3206ae0005&amp;amp;elqaid=84437&amp;amp;elqat=1&amp;amp;elqCampaignId=30497&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"The $1.5 trillion that cybercriminals generate each year includes $860 billion in illicit online markets, $500B in theft of trade secrets and intellectual property, $160B in data trading, $1.6B in crimeware-as-a-service, and $1B in ransomware. Evidence indicates cybercrime often generates more revenue than legitimate companies: large multi-national operations can earn more than $1B; smaller ones typically make between $30k-$50K."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do we combat this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 20:28:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9679#M815</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-04-23T20:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9687#M816</link>
      <description>&lt;P&gt;I will suggest the best way to combat this is begging with education the potential victims.&amp;nbsp; I believe if proper awareness/education is given it will reduce the amount of attacks thus reducing the revenue generate through these illicit acts.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 20:51:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9687#M816</guid>
      <dc:creator>ekloh</dc:creator>
      <dc:date>2018-04-23T20:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9696#M817</link>
      <description>&lt;P&gt;Although&amp;nbsp;awareness is a primary&amp;nbsp;&amp;amp; critical factor, it can't&amp;nbsp;make a difference on its own. Let's look at a potential scenario&amp;nbsp;for this...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;: A company 'XYZ' has developed an extremely potent&amp;nbsp;psychedelic drug and strives to make money out of it. It&amp;nbsp;can't market this legitimately --- at least not immediately --- so a great&amp;nbsp;way to do it&amp;nbsp;is through social media. (Nothing complicated here, just create fake personal profiles,&amp;nbsp;befriend&amp;nbsp;users &amp;amp;&amp;nbsp;lure&amp;nbsp;them into trying it.) Assuming the drug is addictive, in no time there'll be a whole lot of customers &amp;amp;&amp;nbsp;much&amp;nbsp;profit for the company.&amp;nbsp;Even if any action is&amp;nbsp;taken and the site compelled to disable accounts / stop activity, it won't help if all this happens&amp;nbsp;&lt;EM&gt;after&lt;/EM&gt;&amp;nbsp;the damage&amp;nbsp;is&amp;nbsp;done&amp;nbsp;&amp;amp;&amp;nbsp;illegitimate profits are made.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For&amp;nbsp;a qualitative risk analysis, we can look at this as: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Risk&lt;/STRONG&gt;: People getting addicted to a psychedelic drug ---&amp;nbsp;negatively impacting&amp;nbsp;both them&amp;nbsp;&amp;amp; their economy.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Threat&lt;/STRONG&gt;:&amp;nbsp;Marketing of the drug.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Threat Agent&lt;/STRONG&gt;: Posts / blogs / promotions on social media sites.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Putting it all into a risk matrix yields the following: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Probability&lt;/STRONG&gt;:&amp;nbsp;Almost certain&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Impact&lt;/STRONG&gt;: Catastrophic&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Level&lt;/STRONG&gt;: Extreme&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;To address the risk,&amp;nbsp;any of&amp;nbsp;following approaches may be used: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Acceptance&lt;/STRONG&gt;: This requires no effort --- but a lot of hope. Just ignore the threat, and&amp;nbsp;assume that people won't&amp;nbsp;be impacted.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Avoidance&lt;/STRONG&gt;: This would require stopping the use of social media, so it isn't likely to be effected.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Transfer&lt;/STRONG&gt;:&amp;nbsp;This would only be feasible if&amp;nbsp;insurance policies cover&amp;nbsp;drug abuse --- which I'll assume isn't the case.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Risk Mitigation&lt;/STRONG&gt;: This requires taking measures to reduce the risk. It&amp;nbsp;would seem like the best thing to do.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;To mitigate this risk, 2 of the main options are: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Awareness&lt;/STRONG&gt;:&amp;nbsp;Communicate the&amp;nbsp;risk&amp;nbsp;to potential victims and&amp;nbsp;regulatory authorities&amp;nbsp;via proper means --- taking into cosiderarion the target audience, environment, and other factors. (Receptiveness will play a major role here.)&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Regulation&lt;/STRONG&gt;:&amp;nbsp;Ensure strong enforcement of regulations&amp;nbsp;---&amp;nbsp;holding social media sites liable for securing user data as well as controlling&amp;nbsp;the posting of material by users, based on content.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Neither of these would&amp;nbsp;work well by itself --- effective risk mitigation would depend on them being combined,&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 07:01:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9696#M817</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-04-24T07:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9715#M819</link>
      <description>&lt;P&gt;What usually happens is that government gets involved and tries to regulate it and make new laws (see GDPR, FISMA, etc.). Or companies get smarter about trying to protect it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an alternate universe&amp;nbsp;some people may go to those companies to gain experience and then when the salaries become commensurate with the experience required to combat it, they will switch sides and go to protect the companies they once hacked.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 14:07:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9715#M819</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-04-24T14:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9717#M820</link>
      <description>&lt;P&gt;As a security community we can combat this by increasing our skills and outreach opportunities. We can look for budding cyber talent and nurture and mentor them into the nextgen cyber warriors. In previous civilizations the older generations made sure to pass on their knowledge to the younger generations, however we seem to be losing that ability. I keep preaching to my daughters that the world they live in is so amazing. They have more power in the palm of their hands than I did at their age. When I was young you had to go to where the information was at, i.e. a library, a school, a mentor/sensei, etc. Now the power of the Internet brings it to the palm of your hands, although that can be modified/restricted/controlled by the powers that be (Google, etc). Still the amount of information out there is amazing and they need to take advantage of it before it gets controlled and restricted by censorship.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is amazing that the book "1984" by George Orwell seems to be coming true....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we combat this by looking to train up the next generation of cyber warriors.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 14:14:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9717#M820</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-04-24T14:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9720#M821</link>
      <description>&lt;P&gt;More keyboard and less whiteboard.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 14:23:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9720#M821</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-04-24T14:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9753#M822</link>
      <description>&lt;P&gt;First, we need to work toward introducing ways to effectively democratize threat intelligence data and share more.&amp;nbsp; Instead you see more hiding of threat data to avoid litigation, competitive advantage, and reputation damage.&amp;nbsp; Second, fostering even more security education is key.&amp;nbsp; The best explanation that I have heard thus far is presented in a TED TALK from Caleb Barlow.&amp;nbsp; See link below.&amp;nbsp; Just my thoughts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?utm_campaign=tedspread&amp;amp;utm_medium=referral&amp;amp;utm_source=tedcomshare" target="_blank"&gt;https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?utm_campaign=tedspread&amp;amp;utm_medium=referral&amp;amp;utm_source=tedcomshare&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2018 00:44:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9753#M822</guid>
      <dc:creator>canLG0501</dc:creator>
      <dc:date>2018-04-25T00:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9766#M823</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;effectively democratize threat intelligence data and share more.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just curious...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What specifically does this mean... meaning examples of what "democratization" would do?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hear this over and over again at conferences too but it's always a problem statement rarely a solution statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's a lot of sources of threat data/intelligence out there which is publicly available, no?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gov't&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;CVEs&lt;/P&gt;&lt;P&gt;CWEs&lt;/P&gt;&lt;P&gt;US-CERT/&lt;SPAN&gt;NCCIC&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;NIST&lt;/P&gt;&lt;P&gt;DISA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commercial&lt;/P&gt;&lt;P&gt;=========&lt;/P&gt;&lt;P&gt;Symantec&lt;/P&gt;&lt;P&gt;Verisign&lt;/P&gt;&lt;P&gt;Cisco&lt;/P&gt;&lt;P&gt;FireEye&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others&lt;/P&gt;&lt;P&gt;=====&lt;/P&gt;&lt;P&gt;exploit-db&lt;/P&gt;&lt;P&gt;Hak5&lt;/P&gt;&lt;P&gt;Rapid7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...and literally hundreds of blogs and twitter feeds on the topic.&amp;nbsp; I'm sure the forum could go on about sources other folks here use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's missing?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 16:15:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9766#M823</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-04-26T16:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9889#M837</link>
      <description>&lt;P&gt;Leaked 0 day NSA exploits that were used in multiple waves of the ransomware were missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Exploits should be treated on par with biological or chemical weapons. Stockpiling them without disclosure to security community should be&amp;nbsp; outlawed&amp;nbsp;internationally.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 15:51:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9889#M837</guid>
      <dc:creator>vt100</dc:creator>
      <dc:date>2018-04-27T15:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9938#M846</link>
      <description>&lt;P&gt;(&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;)&amp;nbsp;John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first thing that I would like to do is deconstruct the statistics that Ms. Sheridan used in her article so that we can understand what the problem actually is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ms. Sheridan compares the value of the entire universe of cybercrime to individual businesses.&amp;nbsp; I would venture to say this borders on the Logical Reasoning error known as, “Lying with Statistics.”&amp;nbsp; If you want to look at scale, compare the entire universe of online criminal business to the entire universe of legitimate business; or compare large criminal enterprises to large legitimate businesses, and small criminal enterprises to small legitimate businesses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The second thing that I would like to recommend is that instead of concentrating on all the failures, let’s balance the successes, and ensure that we’re not shouldering too much of the burden.&amp;nbsp; The best analogy that I have is the responsible use and maintenance of an automobile.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We expect, first of all that if we drive to a bad neighborhood get out with the engine running and the keys in the car that your house will probably be cleaned out and your car lit on fire under the freeway by the time you hitchhike or Lift/Uber your way back home.&amp;nbsp; You can tell people to act responsibly with their computers, but you will always have the equivalent to the person that gets carjacked, mugged, and burglarized after getting lightly rear ended in the middle of the night on a street with no lights in the inner city.&amp;nbsp; The analogy to this is the "Your Computer is Infected" pop up with the number to a barely-English speaking operator that offers to remotely fix your system while browsing a dubious web site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also expect the licensed operator of heavy machinery to be familiar with it enough to recognize safety concerns such as odd noises and smells, and to stop driving it and get the car looked at.&amp;nbsp; We expect basic maintenance tasks like changing the oil and windshield wipers, inspecting and changing the tires and brakes, and updating the operating system and antimalware definition files to be performed.&amp;nbsp; How often do you think mechanics see cars come in where the brakes are completely worn away, or a multi-thousand dollar engine rebuild problem could have been prevented a couple of months earlier by replacing a $25 sensor when the Engine Light came on?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In conclusion, I would like to claim that the problem isn’t as bad as the article makes it seem.&amp;nbsp; In my opinion, instead of shouldering a failure to protect people through “IT” means, we should be educating users on the responsibility they are undertaking by purchasing and using this equipment using analogy and language they can understand.&amp;nbsp; Finally, we have to accept that even though there are resources available, some people are going to ignore the “check engine light” and "drive" into a bad digital neighborhood with their computers… at least it makes for good “You Tube” videos and shock-news articles.&amp;nbsp; So, we should be planning on identifying, isolating, mitigating, and recovering from these scenarios rather than reacting to them by surprise every time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 15:43:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9938#M846</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-04-30T15:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9939#M847</link>
      <description>&lt;P&gt;(&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/416071361"&gt;@vt100&lt;/a&gt;)&amp;nbsp;Vladimir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I respectfully disagree!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There was a time in recent history that certain types computer network “packets” were actually listed as munitions under United States laws (the International Traffic in Arms Regulations or ITAR).&amp;nbsp; Other than the hilarity of the guy that tattooed the code for RSA on himself (&lt;A href="https://www.wired.com/1996/04/strong-arm/" target="_blank"&gt;https://www.wired.com/1996/04/strong-arm/&lt;/A&gt;) leading to this concept being declared Unconstitutional, this creates all kinds of legal problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, when you use TOR or another anonymizer and your traffic flows through another country.&amp;nbsp; In this context literally and legally (by definition, not legally as in authorization) fired a weapon through that country’s critical infrastructure.&amp;nbsp; Think about the political, military, and legal issues that brings up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 15:59:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9939#M847</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-04-30T15:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9941#M849</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/723530429"&gt;@Baechle&lt;/a&gt;&amp;nbsp;Sorry, there is no way in this forum to see the replies in the context of the previous posts, which makes it difficult to determine what post you are disagreeing with. If it is the one where I compare exploits to the chemical and biological weapons, then the parallel you are drawing with certain crypto tech being listed as "munition" is, in my opinion, not apt. Nor is the use of anonymizers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, use of anonymizers may violate some country laws and, tangentially used for other illicit activities, but it is not destructive in nature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Stockpiled and undisclosed 0 day exploits&lt;/STRONG&gt;&lt;/U&gt;, on the other hand, &lt;STRONG&gt;outside of the generally accepted grace periods given by finders to the vendors&lt;/STRONG&gt;, have no other use but as a weapon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Weather someone extorts money from you by holding a gun to your head or encrypting data necessary to provide life-saving treatment, the outcome of not complying with with perpetrator's demands may well be the same. Similarly, if it is used to cripple vital infrastructure services (as was the case in Saudi Arabia, Ukraine and Atlanta).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The added scare factor is that every time those tools are used, the opposing side is automatically getting their hands on it. It may take some time to reverse engineer, modify the payload and repurpose, but so long as the original is kept secret, the blowback may be worth than the original intended use case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the numbers of people affected by this, how could we not treat these threats as WMDs?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 16:39:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9941#M849</guid>
      <dc:creator>vt100</dc:creator>
      <dc:date>2018-04-30T16:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9943#M850</link>
      <description>&lt;P&gt;(&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/416071361"&gt;@vt100&lt;/a&gt;)&amp;nbsp;Vladimir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I apologize.&amp;nbsp; I did set my reading settings to be “Thread based” so I can see the replies in the context of the message it replies to.&amp;nbsp; I’ll try to use quotes more judiciously.&amp;nbsp; You are correct, I’m replying to your suggestion to place exploits on a munitions list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Stockpiled and undisclosed 0 day exploits&lt;/STRONG&gt;&lt;/U&gt;, on the other hand, &lt;STRONG&gt;outside of the generally accepted grace periods given by finders to the vendors&lt;/STRONG&gt;, have no other use but as a weapon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Weather someone extorts money from you by holding a gun to your head or encrypting data necessary to provide life-saving treatment, the outcome of not complying with with perpetrator's demands may well be the same. Similarly, if it is used to cripple vital infrastructure services (as was the case in Saudi Arabia, Ukraine and Atlanta).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The added scare factor is that every time those tools are used, the opposing side is automatically getting their hands on it. It may take some time to reverse engineer, modify the payload and repurpose, but so long as the original is kept secret, the blowback may be worth than the original intended use case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the numbers of people affected by this, how could we not treat these threats as WMDs?&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I believe I understand the distinction that you are trying to make here in the word use of exploit vs a vulnerability.&amp;nbsp; Specifically, you are looking to make it illegal to possess the generic definition of a (here’s my best whack at this) “&lt;EM&gt;&lt;STRONG&gt;payload consisting of instructions, signals, or program code; that takes advantage of a vulnerability in the software or hardware running on a computer or telecommunication system; that would either (1) render it inaccessible to a legitimate user; or (2) allow an unauthorized person to obtain or alter information stored therein.&lt;/STRONG&gt;&lt;/EM&gt;”&amp;nbsp; Correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that law were enacted, I would be guilty simply by having a keyboard.&amp;nbsp; Because I possess an “&amp;amp;” I therefore have the code to perform URI parameter tampering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see the problem?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore we have to criminalize the act of use of an exploit rather than it's possession..&amp;nbsp; Even further, we have to restrict that criminalization to intentional use to avoid someone just being sloppy or having fat fingers when they’re typing.&amp;nbsp; Or the code being illegitimate in one place, but legitimate in another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 17:06:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9943#M850</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-04-30T17:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9945#M851</link>
      <description>&lt;P&gt;Wording of definitions is of paramount importance, as it defines grounds for legal interpretations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would prepend the "&lt;SPAN&gt;&amp;nbsp;“&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;payload consisting of instructions, signals, or program code; that takes advantage of a vulnerability in the software or hardware running on a computer or telecommunication system; that would either (1) render it inaccessible to a legitimate user; or (2) allow an unauthorized person to obtain or alter information stored therein.&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;”&amp;nbsp; with&amp;nbsp;&lt;STRONG&gt;Stockpiled and undisclosed 0 day &lt;/STRONG&gt;resulting in:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;"Stockpiled and undisclosed, previously unknown&amp;nbsp;payload consisting of instructions, signals, or program code; that takes advantage of a vulnerability in the software or hardware running on a computer or telecommunication system; that would either (1) render it inaccessible to a legitimate user; or (2) allow an unauthorized person to obtain or alter information stored therein. When the attribution of the use for the above mentioned purposes is conclusive.”&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 18:01:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9945#M851</guid>
      <dc:creator>vt100</dc:creator>
      <dc:date>2018-04-30T18:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9947#M852</link>
      <description>&lt;P&gt;I think the recent RSA Conference 2018, indicates the same direction - hardening and getting down to some really hard work with honesty to resolve the current situation.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 19:16:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9947#M852</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-04-30T19:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9948#M853</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/416071361"&gt;@vt100&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate you trying to work through this.&amp;nbsp; You should have the law named after you if you figure it out!&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You hit the nail on the head ... we’re not writing the law for IT pro’s… we’re writing it for lawyers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/416071361"&gt;@vt100&lt;/a&gt;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;"Stockpiled and undisclosed, previously unknown&amp;nbsp;payload consisting of instructions, signals, or program code; that takes advantage of a vulnerability in the software or hardware running on a computer or telecommunication system; that would either (1) render it inaccessible to a legitimate user; or (2) allow an unauthorized person to obtain or alter information stored therein. When the attribution of the use for the above mentioned purposes is conclusive.”&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you define what &lt;U&gt;stockpiled&lt;/U&gt; is?&amp;nbsp; Who must it be &lt;U&gt;disclosed&lt;/U&gt; to?&amp;nbsp; Leaving the term &lt;U&gt;previously unknown&lt;/U&gt; hanging means that if the “hacker” has it, then they obviously know about it and therefore the law is self negating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 19:41:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9948#M853</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-04-30T19:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9949#M854</link>
      <description>&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; But I am afraid that being security specialist with self-evident Russian descent is not in vogue at the moment, so the likelihood of that is slim.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 19:52:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9949#M854</guid>
      <dc:creator>vt100</dc:creator>
      <dc:date>2018-04-30T19:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9961#M859</link>
      <description>&lt;P&gt;Perceiving a threat is one thing,&amp;nbsp;but how you can act on it&amp;nbsp;largely depends on what you're empowered to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vladimir's question was&amp;nbsp;&lt;STRONG&gt;How do we combat this, if the illicit bad community are making more money than legal companies?&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before&amp;nbsp;answering that, pose the&amp;nbsp;counter-question&amp;nbsp;&lt;STRONG&gt;Who&amp;nbsp;/ what does&amp;nbsp;'we' refer to here?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's divide those under the scope of 'we' into two categories: &lt;EM&gt;Potential Victims&lt;/EM&gt; and &lt;EM&gt;Potential Combatants&lt;/EM&gt;, and&amp;nbsp;then sub-divide these into&amp;nbsp;&lt;EM&gt;Individuals&lt;/EM&gt;, &lt;EM&gt;Organizations&lt;/EM&gt; and &lt;EM&gt;Governments&lt;/EM&gt;,&amp;nbsp;to see just what they can do: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Individuals&lt;/STRONG&gt;: Ensure&amp;nbsp;you are&amp;nbsp;well aware of things, &amp;amp; have properly protected yourself&amp;nbsp;&amp;amp;&amp;nbsp;assets you own&amp;nbsp;/ are responsible for. Try to imbibe security awareness into others&amp;nbsp;&amp;amp; promote good measures.&amp;nbsp;If you detect threats, report them to your organization / government,&amp;nbsp;and attempt to counter them if you're authorized to.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Organizations&lt;/STRONG&gt;:&amp;nbsp;Set &amp;amp; enforce policies to ensure your assets are properly protected,&amp;nbsp;&amp;amp; your people kept aware&amp;nbsp;&amp;amp; trained to respond / react to IT threats properly. Report threats and comply with regulations of the government.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Governments:&lt;/STRONG&gt; Set &amp;amp; enforce&amp;nbsp;regulations&amp;nbsp;to ensure&amp;nbsp;that all entities (individuals&amp;nbsp;&amp;amp; organizations) keep themselves aware of&amp;nbsp;IT threats, properly protect themselves, and report these. Respond to reports, &amp;amp; control threats and threat vectors as required.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;(There's also a third main category:&amp;nbsp;&lt;EM&gt;Spectators ---&lt;/EM&gt;&amp;nbsp;those smart enough not to be victimized, but&amp;nbsp;not keen on combating or reporting threats, particularly if there's little support from a higher level)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For combined efforts to be effective,&amp;nbsp;everyone has to play their part properly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 06:50:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9961#M859</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-05-01T06:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9963#M860</link>
      <description>&lt;P&gt;Correction to my earlier post :&amp;nbsp; &amp;nbsp;John's question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 07:29:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9963#M860</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-05-01T07:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: How do we combat this, if the illicit bad community are making more money than legal companies?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9994#M863</link>
      <description>&lt;P&gt;Yes, the whole community needs to be involved.&amp;nbsp;&amp;nbsp; It also needs to be a collaboration, or team work i.e. organisations working together to combat these issues.&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 19:42:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-do-we-combat-this-if-the-illicit-bad-community-are-making/m-p/9994#M863</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-05-01T19:42:57Z</dc:date>
    </item>
  </channel>
</rss>

