SlideShare a Scribd company logo
VULNERABILITIES AND THEIR
SURROUNDING ETHICAL QUESTIONS:
A CODE OF ETHICS FOR THE PRIVATE SECTOR
HackIT 2016, October 7th, Kharkiv, Ukraine
Alfonso De Gregorio, Zeronomicon
#VULNETHICS
@ZERONOMICON
Discuss
#HACKIT2016 #HACKITUA
Agenda
1. The Vulnerability Supply Chain
2. The Surrounding Ethical Questions
3. Code of Ethics: Principles and Standards
4. Concluding Remarks and Debate
SUPPLY CHAIN
THE VULNERABILITIES
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
VULNERABILITIES ARE LIKE POLLUTANTS
INCENTIVES
IT’S WHY WE DO THINGS
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
VULNERABILITY DUMPING
UNRESTRAINED
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
VULNERABILITY DUMPING
UNRESTRAINED
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
INCENTIVE
PERVERSE
– David Rice
β€œpatching allows software manufacturers
to optimize market and legal
protections by "re-negotiating" contract
terms buyers could not
negotiate in the first place”
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
ETHICAL QUESTIONS
THE SURROUNDING
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
THE MORAL LOW GROUND?
WHO HOLDS
THAT EXPLOIT US THE MOST?
WHO ARE THE ONES
IF OUR GOVERNMENTS INTRODUCE TRADE
CONTROLS TO ADMINISTER THE EXPORT OF
INTRUSION SOFTWARE, SHOULD WE DEMAND
SOFTWARE MANUFACTURERS TO INTERNALISE THE
COST OF THE INSECURE SOFTWARE THAT WE
IMPORT INTO OUR LIVES, FOR REASONS OF
SYMMETRY?
SHOULD WE MAKE THEM LIABLE FOR THE DEFECTS
AND FLAWS THAT ALLOW THE INTRUSION IN THE
FIRST PLACE?
WITH INCOMPLETE KNOWLEDGE ABOUT THE REAL-
WORLD SECURITY OF SYSTEMS WE ENTRUST OUR
BUSINESS, IS IT ETHICAL TO REFRAIN US FROM
HUNTING VULNERABILITIES OR PREVENT OTHERS
FROM DOING LIKEWISE?
AND, WHAT SHOULD DO A SECURITY RESEARCHER
WITH THE VULNERABILITIES WHEN THEY GET
FOUND?
IS FULL DISCLOSURE AN ACCEPTABLE COURSE OF
ACTION?
DOES FULL DISCLOSURE BECOMES MORE
ACCEPTABLE IF THE AFFECTED VENDOR IGNORES
THE VULNERABILITIES THAT WERE REPORTED
RESPONSIBLY OR FAILS TO PROVIDE A TIMELY
PATCH?
DOES COORDINATED VULNERABILITY DISCLOSURE
PROVIDE A MORE ETHICALLY SOUND PATH TO BE
TAKEN?
DOES THE SAME PATH REMAINS MORALLY
PREFERABLE IF ONE OF THE PARTIES, WHO RECEIVES
THE VULNERABILITY INFORMATION FROM THE
COORDINATOR PRIOR TO ITS PUBLIC DISCLOSURE,
DECIDES TO USE IT TO EXPLOIT VULNERABLE
ENTITIES?
ARE BUG BOUNTY PROGRAMS EXPLOITING BOUNTY
HUNTERS?
A Data Point
Target: Microsoft Outlook on the web (OWA)
Exploit: Remote Code Execution
Price: $200,000 USD
Expires on: November 30th, 2016

https://www.zeronomi.com/campaigns.html
SHOULD BUG HUNTERS PRETEND TO GET PAID IF
THE OTHER PARTY HAS NOT ASKED THEM TO DO
THEIR WORK?
WHAT GOVERNMENT SECURITY AGENCIES SHOULD
DO WITH VULNERABILITIES?
SHOULD THEY EXPLOIT THEM OR SHOULD THEY LET
EVERYBODY ELSE MITIGATE THEM, IN THE WAY THEY
ALREADY DO?
SHOULD THEY TAKE ADVANTAGE OF THOSE
VULNERABILITIES TO BENEFIT A LIMITED NUMBER
OF STAKEHOLDERS, OR SHOULD THEY DISCLOSE
THEM TO ALL AFFECTED CONSTITUENTS?
HAS THE POWER INEQUITY IN THE VULNERABILITY
EQUATION TO BE BALANCED?
WITH ENTITIES AFFECTED BY VULNERABILITIES
SPREAD ALL AROUND THE WORLD, HOW TO INFORM
THE PUBLIC?
WITH VENDORS THREATENING LEGAL ACTION AND
SUPPORTED BY THEIR SIGNIFICANT FINANCIAL
RESOURCES, HOW TO PROTECT THE SECURITY
RESEARCHERS?
WITH OUR SOCIETY GROWING MORE DATA
INTENSIVE, HOW TO OVERSEE NOT ONLY MATERIAL
AND TECHNOLOGY BUT ALSO KNOWLEDGE?
HOW DO THE ATTEMPTS TO STRIKE A BALANCE
BETWEEN SCIENTIFIC OPENNESS AND NATIONAL
SECURITY […] REDEFINE SCIENCE-SECURITY
RELATIONS?
HOW DOES SCIENTIFIC KNOWLEDGE BECOME
SUBJECT TO SECURITY GOVERNANCE?
HOW DOES THIS DYNAMIC AFFECT THE LINKS
AMONG SCIENTIFIC KNOWLEDGE, SECURITY
EXPERTISE AND POLITICAL DECISION?
CAN WE REGARD HACKING TO BE AN ETHICAL
PRACTICE AND CONDEMN, AT THE SAME TIME, THE
TRADE OF CAPABILITIES ENABLING THIS PRACTICE
AS IMMORAL?
WHAT TO DO?
THE NON-ZERO SOCIETAL RISKS
NOT IPSO FACTO GOOD OR BAD
NOT IPSO FACTO GOOD OR BAD
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Depending from which side of the playing field we look at things, the use of the same capability might be considered differently if it goes towards the creation or the detriment of
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
CULTURE OF RESPONSIBILITY
CODE OF ETHICS
SIX PRINCIPLES
EIGHT STANDARDS
THE PRINCIPLES ARE
ASPIRATIONAL GOALS AIMED AT
GUIDING AND INSPIRING THE
CONDUCT OF BUSINESS
THE ETHICAL STANDARDS ARE
ENFORCEABLE RULES FOR THE
DAY-TO-DAY BUSINESS
OPERATIONS.
PRINCIPLE A: 

CLEAN HANDS
R e s p e c t a l l h u m a n r i g h t s
proclaimed by international human
rights treaties, including The
International Bill of Human Rights,
and strive to ensure no complicity in
any human rights abuses.
STANDARD 1: VETTING AND
MONITORING OF CUSTOMERS
Do not engage in any business with
entities known for abusing human
rights and reserves the right to
s u s p e n d o r c e a s e b u s i n e s s
operations with entities found to be
involved at a later time in human
rights abuses.
PRINCIPLE B: 

DO NOT POSE A DANGER TO
HUMAN HEALTH
Champion the health of human beings and
commit to do not enable your Customer entities
with capabilities that may pose a direct danger
to human health.
STANDARD 2: 

INADMISSIBLE CAPABILITIES
Do not engage in any trade of capabilities that
exploit vulnerabilities in medical devices or in
systems to which human life is entrusted, unless
the Vendor of the affected device or system is the
Acquiring Entity or the Acquiring Entity was
authorised by the Vendor to be the recipient of
the vulnerability disclosure process, vulnerability
information, or risk mitigation strategy.
STANDARD 3: 

TRADE SECRETS
You will never trade in stolen trade secrets, and
require your suppliers to certify that they have
independently found the vulnerability and
autonomously developed any related technology,
and that they are not employees of the targeted
software manufacturer, nor have they received
access to the confidential information through a
disclosure by the same.
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
PRINCIPLE C: 

AVOID CONFLICTS OF INTEREST
Strive to benefit those with whom you do
business and take care to avoid possible
conflicts of interest that could cause your
Company, its Employees, or Contractors to
pursue goals not in the interest of the
Company business peers.
STANDARD 4: 

OVEREXPLOITATION
You will protect the value of the traded capabilities.
You will specify the maximum number of entities to
which the same capabilities may be sold, within a
given time-frame (unless in case the capabilities are
intended for risk prevention).



Furthermore, you shall strive not to sell a
vulnerability to one party, and the technology to
defend against that vulnerability to another party
which is a likely target of the first.

STANDARD 5: 

UNINTENDED USE
Prohibit yourself, employees and contractors to use
the information or the capabilities, traded in the
fulfilment of the service, for the pursuit of personal
goals. Authorised personnel shall use such
capabilities only to test and validate them, and
more generally only for research and development
purposes.

PRINCIPLE D: 

OBEY THE LAW
Comply with all applicable legal requirements
and understands the major laws and
regulations that apply to your business,
including laws related to: trade controls, anti-
bribery, competition, trade secret, money
laundering and insider trading.
STANDARD 6: 

EXPORTING
Comply with trade laws controlling where
the you can send products and services,
strive to meet the criteria required to hold
export licenses, where applicable, and stay
alert to changes to the applicable export
licensing systems.
PRINCIPLE E: 

PRESERVE CONFIDENTIALITY
Protect the confidentiality of the identity of
entities you do business with and the the
confidentiality of the information and
intellectual properties received from, or
provided to, your business peers in the
fulfilment of your Service. At the same time,
recognize that the extent and limits of
confidentiality may be regulated by applicable
laws and regulations.
STANDARD 7: 

MAINTAINING CONFIDENTIALITY
At the extent and limits regulated by
applicable laws and regulations, preserve
the confidentiality of the identity of entities
you do business with. Restrict access to
the information and the intellectual property
received from or provided to your business
partners on a need-to-know basis,
enforcing a principle of least privilege
PRINCIPLE F: DOCTRINE OF
DOUBLE EFFECT AND DUAL USE
Acknowledge that the capabilities you provide may be used within
goods that, just like any and all information security tools, are
inherently dual purpose and potentially dual use, and therefore may
serve also military purposes, police investigations and the like; the
military use of the traded capabilities may have a double effect: the
intended effect and the foreseen but genuinely unintended
consequence. While discouraging against harmful side effects, you
acknowledge the inherent duality of the effects resulting from the
use of those capabilities and you trade them, unless they are in
conflict with other principles set forth in the present Ethics Code.
STANDARD 8: DUALITY
Acknowledge that the capabilities you provide can
be used within goods that are inherently dual
purpose and accept to supply them, as long as it is
foreseeable that those capabilities will be used only
for legitimate purposes in line with international
standards for the respect of human rights, and
unless their trade is in conflict with principles set
out in the present Ethics Code.
CONCLUDING REMARKS
AND DEBATE
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
– Ayn Rand
β€œEvery aspect of Western culture needs a
new code of ethics β€” a rational ethics β€” as
a precondition of rebirth.”
Every aspect of the vulnerabilities
supply chain needs a new code of ethics
β€” a rational ethics β€” as a precondition
of rebirth.
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector
– Earl Warren
β€œIn a civilised life, law floats in a sea of
ethics.”
– Steven Aftergood
β€œExpanding the scope of ethical deliberation over new
technology may seem like a daunting prospect bound to impede
innovation.”
THANK YOU!
ANY QUESTIONS?
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector

More Related Content

PDF
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Β 
PPTX
Лариса ΠœΠ°Ρ‚Π²Π΅Π΅Π²Π° - Π₯Π°ΠΊΠ΅Ρ€Ρ‹ ΠΈ уголовная ΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ: ΠΊΠ°ΠΊ ΠΈΠ·Π±Π΅ΠΆΠ°Ρ‚ΡŒ Π½Π΅Π³Π°Ρ‚ΠΈΠ²Π½Ρ‹Ρ…...
PDF
Π’Π»Π°Π΄ΠΈΠΌΠΈΡ€ ΠœΠ°Ρ…ΠΈΡ‚ΠΊΠΎ - Automotive security. New challenges
PPTX
АлСксСй Ясинский - ΠžΠΏΡ‹Ρ‚ расслСдования соврСмСнных ΠΊΠΈΠ±Π΅Ρ€-Π°Ρ‚Π°ΠΊ Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π΅ Black...
PPTX
Ник БСлогорский - Π‘ΡƒΠ΄Π½ΠΈ ΠšΡ€Π΅ΠΌΠ½ΠΈΠ΅Π²ΠΎΠΉ Π”ΠΎΠ»ΠΈΠ½Ρ‹. Π˜ΡΡ‚ΠΎΡ€ΠΈΡ ΠΊΠ°Ρ€ΡŒΠ΅Ρ€Ρ‹ Ника, Π±ΠΎΡ€ΡŒΠ±Π° с Ρ…Π°ΠΊ...
PPT
Andrew Dodson - Smart grids are stupid ideas
PDF
АлСксСй Π‘Ρ‚Π°Ρ€ΠΎΠ² - Как ΠΏΡ€ΠΎΠ²ΠΎΠ΄ΠΈΡ‚ΡŒ кибСрраслСдования?
PPTX
Andrew Auernheimer - Hacktivism for profit and glory
Vulnerabilities and their Surrounding Ethical Questions: A Code of Ethics for...
Β 
Лариса ΠœΠ°Ρ‚Π²Π΅Π΅Π²Π° - Π₯Π°ΠΊΠ΅Ρ€Ρ‹ ΠΈ уголовная ΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ: ΠΊΠ°ΠΊ ΠΈΠ·Π±Π΅ΠΆΠ°Ρ‚ΡŒ Π½Π΅Π³Π°Ρ‚ΠΈΠ²Π½Ρ‹Ρ…...
Π’Π»Π°Π΄ΠΈΠΌΠΈΡ€ ΠœΠ°Ρ…ΠΈΡ‚ΠΊΠΎ - Automotive security. New challenges
АлСксСй Ясинский - ΠžΠΏΡ‹Ρ‚ расслСдования соврСмСнных ΠΊΠΈΠ±Π΅Ρ€-Π°Ρ‚Π°ΠΊ Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π΅ Black...
Ник БСлогорский - Π‘ΡƒΠ΄Π½ΠΈ ΠšΡ€Π΅ΠΌΠ½ΠΈΠ΅Π²ΠΎΠΉ Π”ΠΎΠ»ΠΈΠ½Ρ‹. Π˜ΡΡ‚ΠΎΡ€ΠΈΡ ΠΊΠ°Ρ€ΡŒΠ΅Ρ€Ρ‹ Ника, Π±ΠΎΡ€ΡŒΠ±Π° с Ρ…Π°ΠΊ...
Andrew Dodson - Smart grids are stupid ideas
АлСксСй Π‘Ρ‚Π°Ρ€ΠΎΠ² - Как ΠΏΡ€ΠΎΠ²ΠΎΠ΄ΠΈΡ‚ΡŒ кибСрраслСдования?
Andrew Auernheimer - Hacktivism for profit and glory

Viewers also liked (13)

PPTX
АндрСй АваданСй - Как с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ honeypot Π·Π°Ρ‰ΠΈΡ‚ΠΈΡ‚ΡŒ критичСскиС Π°ΠΊΡ‚ΠΈΠ²Ρ‹ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ
PDF
Webapplicationsecurity05 2010 100601100553 Phpapp02
PDF
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
PDF
Alan kakareka. insight into russian black market
PPTX
Π‘ Ρ‡Π΅Π³ΠΎ Π½Π°Ρ‡Π°Ρ‚ΡŒ свой ΠΏΡƒΡ‚ΡŒ этичного Ρ…Π°ΠΊΠ΅Ρ€Π°? - Π’Π°Π΄ΠΈΠΌ Чакрян
PDF
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
PPTX
АлСксСй Барановский - ΠžΠ±ΡƒΡ‡Π΅Π½ΠΈΠ΅ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ ΠšΠΈΠ±Π΅Ρ€Π‘Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅: ΠΏΡ€ΠΎ...
PDF
Π’Π΅Ρ…Π½ΠΈΠΊΠΈ пСнтСста для Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ - Николай ΠžΠ²Ρ‡Π°Ρ€ΡƒΠΊ
PPTX
Vulnerability Intelligence and Assessment with vulners.com
PPTX
Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ ΠœΠΎΠΌΠΎΡ‚ - Π‘ΠΎΠ²Ρ€Π΅ΠΌΠ΅Π½Π½Ρ‹Π΅ способы Π°Ρ‚Π°ΠΊ Π½Π° сотовыС сСти, ΠΈΡ… послСдствия ΠΈ ΠΏΡ€...
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PDF
Spot the Web Vulnerability
PPSX
Ibrahim balic cyber-weapons
АндрСй АваданСй - Как с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ honeypot Π·Π°Ρ‰ΠΈΡ‚ΠΈΡ‚ΡŒ критичСскиС Π°ΠΊΡ‚ΠΈΠ²Ρ‹ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ
Webapplicationsecurity05 2010 100601100553 Phpapp02
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
Alan kakareka. insight into russian black market
Π‘ Ρ‡Π΅Π³ΠΎ Π½Π°Ρ‡Π°Ρ‚ΡŒ свой ΠΏΡƒΡ‚ΡŒ этичного Ρ…Π°ΠΊΠ΅Ρ€Π°? - Π’Π°Π΄ΠΈΠΌ Чакрян
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
АлСксСй Барановский - ΠžΠ±ΡƒΡ‡Π΅Π½ΠΈΠ΅ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΡΡ‚ΠΈ ΠšΠΈΠ±Π΅Ρ€Π‘Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅: ΠΏΡ€ΠΎ...
Π’Π΅Ρ…Π½ΠΈΠΊΠΈ пСнтСста для Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎΠΉ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ - Николай ΠžΠ²Ρ‡Π°Ρ€ΡƒΠΊ
Vulnerability Intelligence and Assessment with vulners.com
Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ ΠœΠΎΠΌΠΎΡ‚ - Π‘ΠΎΠ²Ρ€Π΅ΠΌΠ΅Π½Π½Ρ‹Π΅ способы Π°Ρ‚Π°ΠΊ Π½Π° сотовыС сСти, ΠΈΡ… послСдствия ΠΈ ΠΏΡ€...
Advanced Persistent Threats (APTs) - Information Security Management
Spot the Web Vulnerability
Ibrahim balic cyber-weapons
Ad

Similar to Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector (20)

PDF
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters
Vulnerabilities a...
Β 
PPTX
Ковбой Π­Π½Π΄ΠΈ, Π ΠΈΠΊ Π”Π΅ΠΊΠ°Ρ€Π΄ ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ ΠΎΡ…ΠΎΡ‚Π½ΠΈΠΊΠΈ Π·Π° Π½Π°Π³Ρ€Π°Π΄ΠΎΠΉ
PDF
Advanced IT Governance
PDF
Equifax, the FTC Act, and Vulnerability Scanning
PPTX
chapter_six_ethics and proffesionalism_new-1.pptx
PPT
Super billing computer ethics, privacy and security
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PPT
Ethical And Social Issues in MIS - Management Information System
PPTX
Presentation
PPTX
Accountability – Managing the Risks of Innovation Procurement
PDF
Cybersecurity Slides
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PPTX
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
PDF
U0501.pdf
PDF
Outsourcing Agreement Checklist By Lisa Abe-Oldenburg
PDF
Cybersecurity and continuous intelligence
PPTX
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
PDF
JacksonvilleJUG_CVE101.pdf
PDF
Presentation sofianopoulos ess
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters
Vulnerabilities a...
Β 
Ковбой Π­Π½Π΄ΠΈ, Π ΠΈΠΊ Π”Π΅ΠΊΠ°Ρ€Π΄ ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ ΠΎΡ…ΠΎΡ‚Π½ΠΈΠΊΠΈ Π·Π° Π½Π°Π³Ρ€Π°Π΄ΠΎΠΉ
Advanced IT Governance
Equifax, the FTC Act, and Vulnerability Scanning
chapter_six_ethics and proffesionalism_new-1.pptx
Super billing computer ethics, privacy and security
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Ethical And Social Issues in MIS - Management Information System
Presentation
Accountability – Managing the Risks of Innovation Procurement
Cybersecurity Slides
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
U0501.pdf
Outsourcing Agreement Checklist By Lisa Abe-Oldenburg
Cybersecurity and continuous intelligence
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
JacksonvilleJUG_CVE101.pdf
Presentation sofianopoulos ess
Ad

More from HackIT Ukraine (20)

PPTX
"CyberGuard β€” ΠΏΡ€ΠΎΠ΅ΠΊΡ‚ государствСнно-частного партнСрства ΠΏΠΎ созданию ΠΊΠΈΠ±Π΅Ρ€Ρ†Π΅Π½...
PPTX
"Π’ поисках уязвимостСй ΠΌΠΎΠ±ΠΈΠ»ΡŒΠ½Ρ‹Ρ… ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ", АлСксСй Π“ΠΎΠ»ΡƒΠ±Π΅Π²
PPTX
"Π‘Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ ΠΈ Π½Π°Π΄Π΅ΠΆΠ½ΠΎΡΡ‚ΡŒ ПО Π² Ρ‚Π΅Ρ…Π½ΠΎΠ³Π΅Π½Π½ΠΎΠΌ ΠΌΠΈΡ€Π΅", Π’Π»Π°Π΄ΠΈΠΌΠΈΡ€ ΠžΠ±Ρ€ΠΈΠ·Π°Π½
PDF
"ВСхнология Π±Π»ΠΎΠΊΡ‡Π΅ΠΉΠ½: Π½ΠΎΠ²Ρ‹Π΅ возмоТности ΠΈ Π½ΠΎΠ²Ρ‹Π΅ уязвимости", Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Кайдалов
PDF
"БСзопасныС Π‘ΠΈΡ‚ΠΊΠΎΠΈΠ½-Ρ‚Ρ€Π°Π½Π·Π°ΠΊΡ†ΠΈΠΈ Π±Π΅Π· ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ оборудования", АлСксСй ΠšΠ°Ρ€Π°ΠΊΡƒΠ»ΠΎΠ²
PDF
"Growth hack Π² ΠΌΠ°Ρ€ΠΊΠ΅Ρ‚ΠΈΠ½Π³Π΅ ΠΈ бизнСсС", Максим ΠœΠΈΡ€ΠΎΡˆΠ½ΠΈΡ‡Π΅Π½ΠΊΠΎ
PPTX
"Как ловят Ρ…Π°ΠΊΠ΅Ρ€ΠΎΠ² Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅", Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Гадомский
PPTX
"Security Requirements Engineering", Oleksii Baranovskyi
PDF
"Наступну Π°Ρ‚Π°ΠΊΡƒ ΠΌΠΎΠΆΠ½Π° ΠΏΠΎΠΏΠ΅Ρ€Π΅Π΄ΠΈΡ‚ΠΈ", ΠžΠ»Π΅ΠΊΡΠ°Π½Π΄Ρ€ Π§ΡƒΠ±Π°Ρ€ΡƒΠΊ
PPTX
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
PPTX
"How to make money with Hacken?", Dmytro Budorin
PPTX
"Using cryptolockers as a cyber weapon", Alexander Adamov
PPTX
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
PPTX
"Bypassing two factor authentication", Shahmeer Amir
PPTX
"БистСмы ΡƒΠ½ΠΈΠΊΠ°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Π΅ΠΉ Π² сСти. ΠœΠ΅Ρ‚ΠΎΠ΄Ρ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΎΡ‚ ...
PPTX
"Introduction to Bug Hunting", Yasser Ali
PDF
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
PDF
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
PPTX
Π’Π°Π΄ΠΈΠΌ Ковкин - БСзопасный ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ‚ΠΎΡ€: ΠΌΠΈΡ„ ΠΈΠ»ΠΈ Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΡΡ‚ΡŒ?
PPTX
ДСнис Π¨ΠΎΠΊΠΎΡ‚ΡŒΠΊΠΎ - ΠžΠΏΡ‹Ρ‚ создания ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π° Π² области ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности.
"CyberGuard β€” ΠΏΡ€ΠΎΠ΅ΠΊΡ‚ государствСнно-частного партнСрства ΠΏΠΎ созданию ΠΊΠΈΠ±Π΅Ρ€Ρ†Π΅Π½...
"Π’ поисках уязвимостСй ΠΌΠΎΠ±ΠΈΠ»ΡŒΠ½Ρ‹Ρ… ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ", АлСксСй Π“ΠΎΠ»ΡƒΠ±Π΅Π²
"Π‘Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡ‚ΡŒ ΠΈ Π½Π°Π΄Π΅ΠΆΠ½ΠΎΡΡ‚ΡŒ ПО Π² Ρ‚Π΅Ρ…Π½ΠΎΠ³Π΅Π½Π½ΠΎΠΌ ΠΌΠΈΡ€Π΅", Π’Π»Π°Π΄ΠΈΠΌΠΈΡ€ ΠžΠ±Ρ€ΠΈΠ·Π°Π½
"ВСхнология Π±Π»ΠΎΠΊΡ‡Π΅ΠΉΠ½: Π½ΠΎΠ²Ρ‹Π΅ возмоТности ΠΈ Π½ΠΎΠ²Ρ‹Π΅ уязвимости", Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Кайдалов
"БСзопасныС Π‘ΠΈΡ‚ΠΊΠΎΠΈΠ½-Ρ‚Ρ€Π°Π½Π·Π°ΠΊΡ†ΠΈΠΈ Π±Π΅Π· ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ оборудования", АлСксСй ΠšΠ°Ρ€Π°ΠΊΡƒΠ»ΠΎΠ²
"Growth hack Π² ΠΌΠ°Ρ€ΠΊΠ΅Ρ‚ΠΈΠ½Π³Π΅ ΠΈ бизнСсС", Максим ΠœΠΈΡ€ΠΎΡˆΠ½ΠΈΡ‡Π΅Π½ΠΊΠΎ
"Как ловят Ρ…Π°ΠΊΠ΅Ρ€ΠΎΠ² Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅", Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Гадомский
"Security Requirements Engineering", Oleksii Baranovskyi
"Наступну Π°Ρ‚Π°ΠΊΡƒ ΠΌΠΎΠΆΠ½Π° ΠΏΠΎΠΏΠ΅Ρ€Π΅Π΄ΠΈΡ‚ΠΈ", ΠžΠ»Π΅ΠΊΡΠ°Π½Π΄Ρ€ Π§ΡƒΠ±Π°Ρ€ΡƒΠΊ
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"How to make money with Hacken?", Dmytro Budorin
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Bypassing two factor authentication", Shahmeer Amir
"БистСмы ΡƒΠ½ΠΈΠΊΠ°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Π΅ΠΉ Π² сСти. ΠœΠ΅Ρ‚ΠΎΠ΄Ρ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΎΡ‚ ...
"Introduction to Bug Hunting", Yasser Ali
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
Π’Π°Π΄ΠΈΠΌ Ковкин - БСзопасный ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ‚ΠΎΡ€: ΠΌΠΈΡ„ ΠΈΠ»ΠΈ Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΡΡ‚ΡŒ?
ДСнис Π¨ΠΎΠΊΠΎΡ‚ΡŒΠΊΠΎ - ΠžΠΏΡ‹Ρ‚ создания ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π° Π² области ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности.

Recently uploaded (20)

PPTX
web development for engineering and engineering
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Welding lecture in detail for understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PPT on Performance Review to get promotions
PPTX
Construction Project Organization Group 2.pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
web development for engineering and engineering
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lecture Notes Electrical Wiring System Components
OOP with Java - Java Introduction (Basics)
Operating System & Kernel Study Guide-1 - converted.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Welding lecture in detail for understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT on Performance Review to get promotions
Construction Project Organization Group 2.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
additive manufacturing of ss316l using mig welding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions - A Code of Ethics for the Private Sector

  • 1. VULNERABILITIES AND THEIR SURROUNDING ETHICAL QUESTIONS: A CODE OF ETHICS FOR THE PRIVATE SECTOR HackIT 2016, October 7th, Kharkiv, Ukraine Alfonso De Gregorio, Zeronomicon
  • 3. Agenda 1. The Vulnerability Supply Chain 2. The Surrounding Ethical Questions 3. Code of Ethics: Principles and Standards 4. Concluding Remarks and Debate
  • 50. – David Rice β€œpatching allows software manufacturers to optimize market and legal protections by "re-negotiating" contract terms buyers could not negotiate in the first place”
  • 72. THE MORAL LOW GROUND? WHO HOLDS
  • 73. THAT EXPLOIT US THE MOST? WHO ARE THE ONES
  • 74. IF OUR GOVERNMENTS INTRODUCE TRADE CONTROLS TO ADMINISTER THE EXPORT OF INTRUSION SOFTWARE, SHOULD WE DEMAND SOFTWARE MANUFACTURERS TO INTERNALISE THE COST OF THE INSECURE SOFTWARE THAT WE IMPORT INTO OUR LIVES, FOR REASONS OF SYMMETRY?
  • 75. SHOULD WE MAKE THEM LIABLE FOR THE DEFECTS AND FLAWS THAT ALLOW THE INTRUSION IN THE FIRST PLACE?
  • 76. WITH INCOMPLETE KNOWLEDGE ABOUT THE REAL- WORLD SECURITY OF SYSTEMS WE ENTRUST OUR BUSINESS, IS IT ETHICAL TO REFRAIN US FROM HUNTING VULNERABILITIES OR PREVENT OTHERS FROM DOING LIKEWISE?
  • 77. AND, WHAT SHOULD DO A SECURITY RESEARCHER WITH THE VULNERABILITIES WHEN THEY GET FOUND?
  • 78. IS FULL DISCLOSURE AN ACCEPTABLE COURSE OF ACTION?
  • 79. DOES FULL DISCLOSURE BECOMES MORE ACCEPTABLE IF THE AFFECTED VENDOR IGNORES THE VULNERABILITIES THAT WERE REPORTED RESPONSIBLY OR FAILS TO PROVIDE A TIMELY PATCH?
  • 80. DOES COORDINATED VULNERABILITY DISCLOSURE PROVIDE A MORE ETHICALLY SOUND PATH TO BE TAKEN?
  • 81. DOES THE SAME PATH REMAINS MORALLY PREFERABLE IF ONE OF THE PARTIES, WHO RECEIVES THE VULNERABILITY INFORMATION FROM THE COORDINATOR PRIOR TO ITS PUBLIC DISCLOSURE, DECIDES TO USE IT TO EXPLOIT VULNERABLE ENTITIES?
  • 82. ARE BUG BOUNTY PROGRAMS EXPLOITING BOUNTY HUNTERS?
  • 83. A Data Point Target: Microsoft Outlook on the web (OWA) Exploit: Remote Code Execution Price: $200,000 USD Expires on: November 30th, 2016
 https://www.zeronomi.com/campaigns.html
  • 84. SHOULD BUG HUNTERS PRETEND TO GET PAID IF THE OTHER PARTY HAS NOT ASKED THEM TO DO THEIR WORK?
  • 85. WHAT GOVERNMENT SECURITY AGENCIES SHOULD DO WITH VULNERABILITIES?
  • 86. SHOULD THEY EXPLOIT THEM OR SHOULD THEY LET EVERYBODY ELSE MITIGATE THEM, IN THE WAY THEY ALREADY DO?
  • 87. SHOULD THEY TAKE ADVANTAGE OF THOSE VULNERABILITIES TO BENEFIT A LIMITED NUMBER OF STAKEHOLDERS, OR SHOULD THEY DISCLOSE THEM TO ALL AFFECTED CONSTITUENTS?
  • 88. HAS THE POWER INEQUITY IN THE VULNERABILITY EQUATION TO BE BALANCED?
  • 89. WITH ENTITIES AFFECTED BY VULNERABILITIES SPREAD ALL AROUND THE WORLD, HOW TO INFORM THE PUBLIC?
  • 90. WITH VENDORS THREATENING LEGAL ACTION AND SUPPORTED BY THEIR SIGNIFICANT FINANCIAL RESOURCES, HOW TO PROTECT THE SECURITY RESEARCHERS?
  • 91. WITH OUR SOCIETY GROWING MORE DATA INTENSIVE, HOW TO OVERSEE NOT ONLY MATERIAL AND TECHNOLOGY BUT ALSO KNOWLEDGE?
  • 92. HOW DO THE ATTEMPTS TO STRIKE A BALANCE BETWEEN SCIENTIFIC OPENNESS AND NATIONAL SECURITY […] REDEFINE SCIENCE-SECURITY RELATIONS?
  • 93. HOW DOES SCIENTIFIC KNOWLEDGE BECOME SUBJECT TO SECURITY GOVERNANCE?
  • 94. HOW DOES THIS DYNAMIC AFFECT THE LINKS AMONG SCIENTIFIC KNOWLEDGE, SECURITY EXPERTISE AND POLITICAL DECISION?
  • 95. CAN WE REGARD HACKING TO BE AN ETHICAL PRACTICE AND CONDEMN, AT THE SAME TIME, THE TRADE OF CAPABILITIES ENABLING THIS PRACTICE AS IMMORAL?
  • 98. NOT IPSO FACTO GOOD OR BAD
  • 99. NOT IPSO FACTO GOOD OR BAD
  • 102. Depending from which side of the playing field we look at things, the use of the same capability might be considered differently if it goes towards the creation or the detriment of
  • 117. THE PRINCIPLES ARE ASPIRATIONAL GOALS AIMED AT GUIDING AND INSPIRING THE CONDUCT OF BUSINESS
  • 118. THE ETHICAL STANDARDS ARE ENFORCEABLE RULES FOR THE DAY-TO-DAY BUSINESS OPERATIONS.
  • 119. PRINCIPLE A: 
 CLEAN HANDS R e s p e c t a l l h u m a n r i g h t s proclaimed by international human rights treaties, including The International Bill of Human Rights, and strive to ensure no complicity in any human rights abuses.
  • 120. STANDARD 1: VETTING AND MONITORING OF CUSTOMERS Do not engage in any business with entities known for abusing human rights and reserves the right to s u s p e n d o r c e a s e b u s i n e s s operations with entities found to be involved at a later time in human rights abuses.
  • 121. PRINCIPLE B: 
 DO NOT POSE A DANGER TO HUMAN HEALTH Champion the health of human beings and commit to do not enable your Customer entities with capabilities that may pose a direct danger to human health.
  • 122. STANDARD 2: 
 INADMISSIBLE CAPABILITIES Do not engage in any trade of capabilities that exploit vulnerabilities in medical devices or in systems to which human life is entrusted, unless the Vendor of the affected device or system is the Acquiring Entity or the Acquiring Entity was authorised by the Vendor to be the recipient of the vulnerability disclosure process, vulnerability information, or risk mitigation strategy.
  • 123. STANDARD 3: 
 TRADE SECRETS You will never trade in stolen trade secrets, and require your suppliers to certify that they have independently found the vulnerability and autonomously developed any related technology, and that they are not employees of the targeted software manufacturer, nor have they received access to the confidential information through a disclosure by the same.
  • 125. PRINCIPLE C: 
 AVOID CONFLICTS OF INTEREST Strive to benefit those with whom you do business and take care to avoid possible conflicts of interest that could cause your Company, its Employees, or Contractors to pursue goals not in the interest of the Company business peers.
  • 126. STANDARD 4: 
 OVEREXPLOITATION You will protect the value of the traded capabilities. You will specify the maximum number of entities to which the same capabilities may be sold, within a given time-frame (unless in case the capabilities are intended for risk prevention).
 
 Furthermore, you shall strive not to sell a vulnerability to one party, and the technology to defend against that vulnerability to another party which is a likely target of the first.

  • 127. STANDARD 5: 
 UNINTENDED USE Prohibit yourself, employees and contractors to use the information or the capabilities, traded in the fulfilment of the service, for the pursuit of personal goals. Authorised personnel shall use such capabilities only to test and validate them, and more generally only for research and development purposes.

  • 128. PRINCIPLE D: 
 OBEY THE LAW Comply with all applicable legal requirements and understands the major laws and regulations that apply to your business, including laws related to: trade controls, anti- bribery, competition, trade secret, money laundering and insider trading.
  • 129. STANDARD 6: 
 EXPORTING Comply with trade laws controlling where the you can send products and services, strive to meet the criteria required to hold export licenses, where applicable, and stay alert to changes to the applicable export licensing systems.
  • 130. PRINCIPLE E: 
 PRESERVE CONFIDENTIALITY Protect the confidentiality of the identity of entities you do business with and the the confidentiality of the information and intellectual properties received from, or provided to, your business peers in the fulfilment of your Service. At the same time, recognize that the extent and limits of confidentiality may be regulated by applicable laws and regulations.
  • 131. STANDARD 7: 
 MAINTAINING CONFIDENTIALITY At the extent and limits regulated by applicable laws and regulations, preserve the confidentiality of the identity of entities you do business with. Restrict access to the information and the intellectual property received from or provided to your business partners on a need-to-know basis, enforcing a principle of least privilege
  • 132. PRINCIPLE F: DOCTRINE OF DOUBLE EFFECT AND DUAL USE Acknowledge that the capabilities you provide may be used within goods that, just like any and all information security tools, are inherently dual purpose and potentially dual use, and therefore may serve also military purposes, police investigations and the like; the military use of the traded capabilities may have a double effect: the intended effect and the foreseen but genuinely unintended consequence. While discouraging against harmful side effects, you acknowledge the inherent duality of the effects resulting from the use of those capabilities and you trade them, unless they are in conflict with other principles set forth in the present Ethics Code.
  • 133. STANDARD 8: DUALITY Acknowledge that the capabilities you provide can be used within goods that are inherently dual purpose and accept to supply them, as long as it is foreseeable that those capabilities will be used only for legitimate purposes in line with international standards for the respect of human rights, and unless their trade is in conflict with principles set out in the present Ethics Code.
  • 136. – Ayn Rand β€œEvery aspect of Western culture needs a new code of ethics β€” a rational ethics β€” as a precondition of rebirth.”
  • 137. Every aspect of the vulnerabilities supply chain needs a new code of ethics β€” a rational ethics β€” as a precondition of rebirth.
  • 139. – Earl Warren β€œIn a civilised life, law floats in a sea of ethics.”
  • 140. – Steven Aftergood β€œExpanding the scope of ethical deliberation over new technology may seem like a daunting prospect bound to impede innovation.”