id sid tid token lemma pos www-nytimes-com-5258 1 1 Nations nation NNS www-nytimes-com-5258 1 2 Buying Buying NNP www-nytimes-com-5258 1 3 as as IN www-nytimes-com-5258 1 4 Hackers hacker NNS www-nytimes-com-5258 1 5 Sell sell VBP www-nytimes-com-5258 1 6 Flaws Flaws NNPS www-nytimes-com-5258 1 7 in in IN www-nytimes-com-5258 1 8 Computer Computer NNP www-nytimes-com-5258 1 9 Code Code NNP www-nytimes-com-5258 1 10 - - , www-nytimes-com-5258 1 11 The the DT www-nytimes-com-5258 1 12 New New NNP www-nytimes-com-5258 1 13 York York NNP www-nytimes-com-5258 1 14 Times Times NNP www-nytimes-com-5258 1 15 SectionsSEARCH sectionssearch CD www-nytimes-com-5258 1 16 Skip Skip NNP www-nytimes-com-5258 1 17 to to IN www-nytimes-com-5258 1 18 contentSkip contentSkip NNP www-nytimes-com-5258 1 19 to to TO www-nytimes-com-5258 1 20 site site VB www-nytimes-com-5258 1 21 index index NN www-nytimes-com-5258 1 22 Europe Europe NNP www-nytimes-com-5258 1 23 Today Today NNP www-nytimes-com-5258 1 24 ’s ’s NNP www-nytimes-com-5258 1 25 Paper Paper NNP www-nytimes-com-5258 1 26 Europe|Nations europe|nation NNS www-nytimes-com-5258 1 27 Buying buying NN www-nytimes-com-5258 1 28 as as IN www-nytimes-com-5258 1 29 Hackers hacker NNS www-nytimes-com-5258 1 30 Sell sell VBP www-nytimes-com-5258 1 31 Flaws Flaws NNPS www-nytimes-com-5258 1 32 in in IN www-nytimes-com-5258 1 33 Computer Computer NNP www-nytimes-com-5258 1 34 Code Code NNP www-nytimes-com-5258 1 35 https://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html https://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html NN www-nytimes-com-5258 1 36 Advertisement Advertisement NNP www-nytimes-com-5258 1 37 Continue Continue NNP www-nytimes-com-5258 1 38 reading read VBG www-nytimes-com-5258 1 39 the the DT www-nytimes-com-5258 1 40 main main JJ www-nytimes-com-5258 1 41 story story NN www-nytimes-com-5258 1 42 Supported support VBN www-nytimes-com-5258 1 43 by by IN www-nytimes-com-5258 1 44 Continue Continue NNP www-nytimes-com-5258 1 45 reading read VBG www-nytimes-com-5258 1 46 the the DT www-nytimes-com-5258 1 47 main main JJ www-nytimes-com-5258 1 48 story story NN www-nytimes-com-5258 1 49 Nations nation NNS www-nytimes-com-5258 1 50 Buying Buying NNP www-nytimes-com-5258 1 51 as as IN www-nytimes-com-5258 1 52 Hackers hacker NNS www-nytimes-com-5258 1 53 Sell sell VBP www-nytimes-com-5258 1 54 Flaws Flaws NNPS www-nytimes-com-5258 1 55 in in IN www-nytimes-com-5258 1 56 Computer Computer NNP www-nytimes-com-5258 1 57 Code Code NNP www-nytimes-com-5258 1 58 Luigi Luigi NNP www-nytimes-com-5258 1 59 Auriemma Auriemma NNP www-nytimes-com-5258 1 60 looks look VBZ www-nytimes-com-5258 1 61 for for IN www-nytimes-com-5258 1 62 flaws flaw NNS www-nytimes-com-5258 1 63 in in IN www-nytimes-com-5258 1 64 computer computer NN www-nytimes-com-5258 1 65 codes code NNS www-nytimes-com-5258 1 66 that that IN www-nytimes-com-5258 1 67 his -PRON- PRP$ www-nytimes-com-5258 1 68 customers customer NNS www-nytimes-com-5258 1 69 can can MD www-nytimes-com-5258 1 70 exploit exploit VB www-nytimes-com-5258 1 71 . . . www-nytimes-com-5258 1 72 Credit credit NN www-nytimes-com-5258 1 73 ... ... : www-nytimes-com-5258 1 74 Gianni Gianni NNP www-nytimes-com-5258 1 75 Cipriano Cipriano NNP www-nytimes-com-5258 1 76 for for IN www-nytimes-com-5258 1 77 The the DT www-nytimes-com-5258 1 78 New New NNP www-nytimes-com-5258 1 79 York York NNP www-nytimes-com-5258 1 80 Times Times NNP www-nytimes-com-5258 1 81 By by IN www-nytimes-com-5258 1 82 Nicole Nicole NNP www-nytimes-com-5258 1 83 Perlroth Perlroth NNP www-nytimes-com-5258 1 84 and and CC www-nytimes-com-5258 1 85 David David NNP www-nytimes-com-5258 1 86 E. E. NNP www-nytimes-com-5258 1 87 Sanger Sanger NNP www-nytimes-com-5258 1 88 July July NNP www-nytimes-com-5258 1 89 13 13 CD www-nytimes-com-5258 1 90 , , , www-nytimes-com-5258 1 91 2013 2013 CD www-nytimes-com-5258 1 92 On on IN www-nytimes-com-5258 1 93 the the DT www-nytimes-com-5258 1 94 tiny tiny JJ www-nytimes-com-5258 1 95 Mediterranean mediterranean JJ www-nytimes-com-5258 1 96 island island NN www-nytimes-com-5258 1 97 of of IN www-nytimes-com-5258 1 98 Malta Malta NNP www-nytimes-com-5258 1 99 , , , www-nytimes-com-5258 1 100 two two CD www-nytimes-com-5258 1 101 Italian italian JJ www-nytimes-com-5258 1 102 hackers hacker NNS www-nytimes-com-5258 1 103 have have VBP www-nytimes-com-5258 1 104 been be VBN www-nytimes-com-5258 1 105 searching search VBG www-nytimes-com-5258 1 106 for for IN www-nytimes-com-5258 1 107 bugs bug NNS www-nytimes-com-5258 1 108 — — : www-nytimes-com-5258 1 109 not not RB www-nytimes-com-5258 1 110 the the DT www-nytimes-com-5258 1 111 island island NN www-nytimes-com-5258 1 112 ’s ’s POS www-nytimes-com-5258 1 113 many many JJ www-nytimes-com-5258 1 114 beetle beetle NN www-nytimes-com-5258 1 115 varieties variety NNS www-nytimes-com-5258 1 116 , , , www-nytimes-com-5258 1 117 but but CC www-nytimes-com-5258 1 118 secret secret JJ www-nytimes-com-5258 1 119 flaws flaw NNS www-nytimes-com-5258 1 120 in in IN www-nytimes-com-5258 1 121 computer computer NN www-nytimes-com-5258 1 122 code code NN www-nytimes-com-5258 1 123 that that WDT www-nytimes-com-5258 1 124 governments government NNS www-nytimes-com-5258 1 125 pay pay VBP www-nytimes-com-5258 1 126 hundreds hundred NNS www-nytimes-com-5258 1 127 of of IN www-nytimes-com-5258 1 128 thousands thousand NNS www-nytimes-com-5258 1 129 of of IN www-nytimes-com-5258 1 130 dollars dollar NNS www-nytimes-com-5258 1 131 to to TO www-nytimes-com-5258 1 132 learn learn VB www-nytimes-com-5258 1 133 about about IN www-nytimes-com-5258 1 134 and and CC www-nytimes-com-5258 1 135 exploit exploit VB www-nytimes-com-5258 1 136 . . . www-nytimes-com-5258 2 1 The the DT www-nytimes-com-5258 2 2 hackers hacker NNS www-nytimes-com-5258 2 3 , , , www-nytimes-com-5258 2 4 Luigi Luigi NNP www-nytimes-com-5258 2 5 Auriemma Auriemma NNP www-nytimes-com-5258 2 6 , , , www-nytimes-com-5258 2 7 32 32 CD www-nytimes-com-5258 2 8 , , , www-nytimes-com-5258 2 9 and and CC www-nytimes-com-5258 2 10 Donato Donato NNP www-nytimes-com-5258 2 11 Ferrante Ferrante NNP www-nytimes-com-5258 2 12 , , , www-nytimes-com-5258 2 13 28 28 CD www-nytimes-com-5258 2 14 , , , www-nytimes-com-5258 2 15 sell sell VB www-nytimes-com-5258 2 16 technical technical JJ www-nytimes-com-5258 2 17 details detail NNS www-nytimes-com-5258 2 18 of of IN www-nytimes-com-5258 2 19 such such JJ www-nytimes-com-5258 2 20 vulnerabilities vulnerability NNS www-nytimes-com-5258 2 21 to to IN www-nytimes-com-5258 2 22 countries country NNS www-nytimes-com-5258 2 23 that that WDT www-nytimes-com-5258 2 24 want want VBP www-nytimes-com-5258 2 25 to to TO www-nytimes-com-5258 2 26 break break VB www-nytimes-com-5258 2 27 into into IN www-nytimes-com-5258 2 28 the the DT www-nytimes-com-5258 2 29 computer computer NN www-nytimes-com-5258 2 30 systems system NNS www-nytimes-com-5258 2 31 of of IN www-nytimes-com-5258 2 32 foreign foreign JJ www-nytimes-com-5258 2 33 adversaries adversary NNS www-nytimes-com-5258 2 34 . . . www-nytimes-com-5258 3 1 The the DT www-nytimes-com-5258 3 2 two two CD www-nytimes-com-5258 3 3 will will MD www-nytimes-com-5258 3 4 not not RB www-nytimes-com-5258 3 5 reveal reveal VB www-nytimes-com-5258 3 6 the the DT www-nytimes-com-5258 3 7 clients client NNS www-nytimes-com-5258 3 8 of of IN www-nytimes-com-5258 3 9 their -PRON- PRP$ www-nytimes-com-5258 3 10 company company NN www-nytimes-com-5258 3 11 , , , www-nytimes-com-5258 3 12 ReVuln revuln NN www-nytimes-com-5258 3 13 , , , www-nytimes-com-5258 3 14 but but CC www-nytimes-com-5258 3 15 big big JJ www-nytimes-com-5258 3 16 buyers buyer NNS www-nytimes-com-5258 3 17 of of IN www-nytimes-com-5258 3 18 services service NNS www-nytimes-com-5258 3 19 like like IN www-nytimes-com-5258 3 20 theirs -PRON- PRP www-nytimes-com-5258 3 21 include include VBP www-nytimes-com-5258 3 22 the the DT www-nytimes-com-5258 3 23 National National NNP www-nytimes-com-5258 3 24 Security Security NNP www-nytimes-com-5258 3 25 Agency Agency NNP www-nytimes-com-5258 3 26 — — : www-nytimes-com-5258 3 27 which which WDT www-nytimes-com-5258 3 28 seeks seek VBZ www-nytimes-com-5258 3 29 the the DT www-nytimes-com-5258 3 30 flaws flaw NNS www-nytimes-com-5258 3 31 for for IN www-nytimes-com-5258 3 32 America America NNP www-nytimes-com-5258 3 33 ’s ’s POS www-nytimes-com-5258 3 34 growing grow VBG www-nytimes-com-5258 3 35 arsenal arsenal NN www-nytimes-com-5258 3 36 of of IN www-nytimes-com-5258 3 37 cyberweapons cyberweapon NNS www-nytimes-com-5258 3 38 — — : www-nytimes-com-5258 3 39 and and CC www-nytimes-com-5258 3 40 American american JJ www-nytimes-com-5258 3 41 adversaries adversary NNS www-nytimes-com-5258 3 42 like like IN www-nytimes-com-5258 3 43 the the DT www-nytimes-com-5258 3 44 Revolutionary Revolutionary NNP www-nytimes-com-5258 3 45 Guards Guards NNPS www-nytimes-com-5258 3 46 of of IN www-nytimes-com-5258 3 47 Iran Iran NNP www-nytimes-com-5258 3 48 . . . www-nytimes-com-5258 4 1 All all RB www-nytimes-com-5258 4 2 over over IN www-nytimes-com-5258 4 3 the the DT www-nytimes-com-5258 4 4 world world NN www-nytimes-com-5258 4 5 , , , www-nytimes-com-5258 4 6 from from IN www-nytimes-com-5258 4 7 South South NNP www-nytimes-com-5258 4 8 Africa Africa NNP www-nytimes-com-5258 4 9 to to IN www-nytimes-com-5258 4 10 South South NNP www-nytimes-com-5258 4 11 Korea Korea NNP www-nytimes-com-5258 4 12 , , , www-nytimes-com-5258 4 13 business business NN www-nytimes-com-5258 4 14 is be VBZ www-nytimes-com-5258 4 15 booming boom VBG www-nytimes-com-5258 4 16 in in IN www-nytimes-com-5258 4 17 what what WP www-nytimes-com-5258 4 18 hackers hacker NNS www-nytimes-com-5258 4 19 call call VBP www-nytimes-com-5258 4 20 “ " `` www-nytimes-com-5258 4 21 zero zero CD www-nytimes-com-5258 4 22 days day NNS www-nytimes-com-5258 4 23 , , , www-nytimes-com-5258 4 24 ” " '' www-nytimes-com-5258 4 25 the the DT www-nytimes-com-5258 4 26 coding code VBG www-nytimes-com-5258 4 27 flaws flaw NNS www-nytimes-com-5258 4 28 in in IN www-nytimes-com-5258 4 29 software software NN www-nytimes-com-5258 4 30 like like IN www-nytimes-com-5258 4 31 Microsoft Microsoft NNP www-nytimes-com-5258 4 32 Windows Windows NNP www-nytimes-com-5258 4 33 that that WDT www-nytimes-com-5258 4 34 can can MD www-nytimes-com-5258 4 35 give give VB www-nytimes-com-5258 4 36 a a DT www-nytimes-com-5258 4 37 buyer buyer NN www-nytimes-com-5258 4 38 unfettered unfettered JJ www-nytimes-com-5258 4 39 access access NN www-nytimes-com-5258 4 40 to to IN www-nytimes-com-5258 4 41 a a DT www-nytimes-com-5258 4 42 computer computer NN www-nytimes-com-5258 4 43 and and CC www-nytimes-com-5258 4 44 any any DT www-nytimes-com-5258 4 45 business business NN www-nytimes-com-5258 4 46 , , , www-nytimes-com-5258 4 47 agency agency NN www-nytimes-com-5258 4 48 or or CC www-nytimes-com-5258 4 49 individual individual JJ www-nytimes-com-5258 4 50 dependent dependent JJ www-nytimes-com-5258 4 51 on on IN www-nytimes-com-5258 4 52 one one CD www-nytimes-com-5258 4 53 . . . www-nytimes-com-5258 5 1 Just just RB www-nytimes-com-5258 5 2 a a DT www-nytimes-com-5258 5 3 few few JJ www-nytimes-com-5258 5 4 years year NNS www-nytimes-com-5258 5 5 ago ago RB www-nytimes-com-5258 5 6 , , , www-nytimes-com-5258 5 7 hackers hacker NNS www-nytimes-com-5258 5 8 like like IN www-nytimes-com-5258 5 9 Mr. Mr. NNP www-nytimes-com-5258 5 10 Auriemma Auriemma NNP www-nytimes-com-5258 5 11 and and CC www-nytimes-com-5258 5 12 Mr. Mr. NNP www-nytimes-com-5258 5 13 Ferrante Ferrante NNP www-nytimes-com-5258 5 14 would would MD www-nytimes-com-5258 5 15 have have VB www-nytimes-com-5258 5 16 sold sell VBN www-nytimes-com-5258 5 17 the the DT www-nytimes-com-5258 5 18 knowledge knowledge NN www-nytimes-com-5258 5 19 of of IN www-nytimes-com-5258 5 20 coding code VBG www-nytimes-com-5258 5 21 flaws flaw NNS www-nytimes-com-5258 5 22 to to IN www-nytimes-com-5258 5 23 companies company NNS www-nytimes-com-5258 5 24 like like IN www-nytimes-com-5258 5 25 Microsoft Microsoft NNP www-nytimes-com-5258 5 26 and and CC www-nytimes-com-5258 5 27 Apple Apple NNP www-nytimes-com-5258 5 28 , , , www-nytimes-com-5258 5 29 which which WDT www-nytimes-com-5258 5 30 would would MD www-nytimes-com-5258 5 31 fix fix VB www-nytimes-com-5258 5 32 them -PRON- PRP www-nytimes-com-5258 5 33 . . . www-nytimes-com-5258 6 1 Last last JJ www-nytimes-com-5258 6 2 month month NN www-nytimes-com-5258 6 3 , , , www-nytimes-com-5258 6 4 Microsoft Microsoft NNP www-nytimes-com-5258 6 5 sharply sharply RB www-nytimes-com-5258 6 6 increased increase VBD www-nytimes-com-5258 6 7 the the DT www-nytimes-com-5258 6 8 amount amount NN www-nytimes-com-5258 6 9 it -PRON- PRP www-nytimes-com-5258 6 10 was be VBD www-nytimes-com-5258 6 11 willing willing JJ www-nytimes-com-5258 6 12 to to TO www-nytimes-com-5258 6 13 pay pay VB www-nytimes-com-5258 6 14 for for IN www-nytimes-com-5258 6 15 such such JJ www-nytimes-com-5258 6 16 flaws flaw NNS www-nytimes-com-5258 6 17 , , , www-nytimes-com-5258 6 18 raising raise VBG www-nytimes-com-5258 6 19 its -PRON- PRP$ www-nytimes-com-5258 6 20 top top JJ www-nytimes-com-5258 6 21 offer offer NN www-nytimes-com-5258 6 22 to to IN www-nytimes-com-5258 6 23 $ $ $ www-nytimes-com-5258 6 24 150,000 150,000 CD www-nytimes-com-5258 6 25 . . . www-nytimes-com-5258 7 1 But but CC www-nytimes-com-5258 7 2 increasingly increasingly RB www-nytimes-com-5258 7 3 the the DT www-nytimes-com-5258 7 4 businesses business NNS www-nytimes-com-5258 7 5 are be VBP www-nytimes-com-5258 7 6 being be VBG www-nytimes-com-5258 7 7 outbid outbid NN www-nytimes-com-5258 7 8 by by IN www-nytimes-com-5258 7 9 countries country NNS www-nytimes-com-5258 7 10 with with IN www-nytimes-com-5258 7 11 the the DT www-nytimes-com-5258 7 12 goal goal NN www-nytimes-com-5258 7 13 of of IN www-nytimes-com-5258 7 14 exploiting exploit VBG www-nytimes-com-5258 7 15 the the DT www-nytimes-com-5258 7 16 flaws flaw NNS www-nytimes-com-5258 7 17 in in IN www-nytimes-com-5258 7 18 pursuit pursuit NN www-nytimes-com-5258 7 19 of of IN www-nytimes-com-5258 7 20 the the DT www-nytimes-com-5258 7 21 kind kind NN www-nytimes-com-5258 7 22 of of IN www-nytimes-com-5258 7 23 success success NN www-nytimes-com-5258 7 24 , , , www-nytimes-com-5258 7 25 albeit albeit IN www-nytimes-com-5258 7 26 temporary temporary JJ www-nytimes-com-5258 7 27 , , , www-nytimes-com-5258 7 28 that that IN www-nytimes-com-5258 7 29 the the DT www-nytimes-com-5258 7 30 United United NNP www-nytimes-com-5258 7 31 States States NNP www-nytimes-com-5258 7 32 and and CC www-nytimes-com-5258 7 33 Israel Israel NNP www-nytimes-com-5258 7 34 achieved achieve VBD www-nytimes-com-5258 7 35 three three CD www-nytimes-com-5258 7 36 summers summer NNS www-nytimes-com-5258 7 37 ago ago RB www-nytimes-com-5258 7 38 when when WRB www-nytimes-com-5258 7 39 they -PRON- PRP www-nytimes-com-5258 7 40 attacked attack VBD www-nytimes-com-5258 7 41 Iran Iran NNP www-nytimes-com-5258 7 42 ’s ’s POS www-nytimes-com-5258 7 43 nuclear nuclear JJ www-nytimes-com-5258 7 44 enrichment enrichment NN www-nytimes-com-5258 7 45 program program NN www-nytimes-com-5258 7 46 with with IN www-nytimes-com-5258 7 47 a a DT www-nytimes-com-5258 7 48 computer computer NN www-nytimes-com-5258 7 49 worm worm NN www-nytimes-com-5258 7 50 that that WDT www-nytimes-com-5258 7 51 became become VBD www-nytimes-com-5258 7 52 known know VBN www-nytimes-com-5258 7 53 as as IN www-nytimes-com-5258 7 54 “ " `` www-nytimes-com-5258 7 55 Stuxnet Stuxnet NNP www-nytimes-com-5258 7 56 . . . www-nytimes-com-5258 7 57 ” " '' www-nytimes-com-5258 7 58 The the DT www-nytimes-com-5258 7 59 flaws flaw NNS www-nytimes-com-5258 7 60 get get VBP www-nytimes-com-5258 7 61 their -PRON- PRP$ www-nytimes-com-5258 7 62 name name NN www-nytimes-com-5258 7 63 from from IN www-nytimes-com-5258 7 64 the the DT www-nytimes-com-5258 7 65 fact fact NN www-nytimes-com-5258 7 66 that that IN www-nytimes-com-5258 7 67 once once RB www-nytimes-com-5258 7 68 discovered discover VBD www-nytimes-com-5258 7 69 , , , www-nytimes-com-5258 7 70 “ " `` www-nytimes-com-5258 7 71 zero zero CD www-nytimes-com-5258 7 72 days day NNS www-nytimes-com-5258 7 73 ” " '' www-nytimes-com-5258 7 74 exist exist VBP www-nytimes-com-5258 7 75 for for IN www-nytimes-com-5258 7 76 the the DT www-nytimes-com-5258 7 77 user user NN www-nytimes-com-5258 7 78 of of IN www-nytimes-com-5258 7 79 the the DT www-nytimes-com-5258 7 80 computer computer NN www-nytimes-com-5258 7 81 system system NN www-nytimes-com-5258 7 82 to to TO www-nytimes-com-5258 7 83 fix fix VB www-nytimes-com-5258 7 84 them -PRON- PRP www-nytimes-com-5258 7 85 before before IN www-nytimes-com-5258 7 86 hackers hacker NNS www-nytimes-com-5258 7 87 can can MD www-nytimes-com-5258 7 88 take take VB www-nytimes-com-5258 7 89 advantage advantage NN www-nytimes-com-5258 7 90 of of IN www-nytimes-com-5258 7 91 the the DT www-nytimes-com-5258 7 92 vulnerability vulnerability NN www-nytimes-com-5258 7 93 . . . www-nytimes-com-5258 8 1 A a DT www-nytimes-com-5258 8 2 “ " `` www-nytimes-com-5258 8 3 zero zero CD www-nytimes-com-5258 8 4 - - HYPH www-nytimes-com-5258 8 5 day day NN www-nytimes-com-5258 8 6 exploit exploit NN www-nytimes-com-5258 8 7 ” " '' www-nytimes-com-5258 8 8 occurs occur VBZ www-nytimes-com-5258 8 9 when when WRB www-nytimes-com-5258 8 10 hackers hacker NNS www-nytimes-com-5258 8 11 or or CC www-nytimes-com-5258 8 12 governments government NNS www-nytimes-com-5258 8 13 strike strike VBP www-nytimes-com-5258 8 14 by by IN www-nytimes-com-5258 8 15 using use VBG www-nytimes-com-5258 8 16 the the DT www-nytimes-com-5258 8 17 flaw flaw NN www-nytimes-com-5258 8 18 before before IN www-nytimes-com-5258 8 19 anyone anyone NN www-nytimes-com-5258 8 20 else else RB www-nytimes-com-5258 8 21 knows know VBZ www-nytimes-com-5258 8 22 it -PRON- PRP www-nytimes-com-5258 8 23 exists exist VBZ www-nytimes-com-5258 8 24 , , , www-nytimes-com-5258 8 25 like like IN www-nytimes-com-5258 8 26 a a DT www-nytimes-com-5258 8 27 burglar burglar NN www-nytimes-com-5258 8 28 who who WP www-nytimes-com-5258 8 29 finds find VBZ www-nytimes-com-5258 8 30 , , , www-nytimes-com-5258 8 31 after after IN www-nytimes-com-5258 8 32 months month NNS www-nytimes-com-5258 8 33 of of IN www-nytimes-com-5258 8 34 probing probing NN www-nytimes-com-5258 8 35 , , , www-nytimes-com-5258 8 36 that that IN www-nytimes-com-5258 8 37 there there EX www-nytimes-com-5258 8 38 is be VBZ www-nytimes-com-5258 8 39 a a DT www-nytimes-com-5258 8 40 previously previously RB www-nytimes-com-5258 8 41 undiscovered undiscovered JJ www-nytimes-com-5258 8 42 way way NN www-nytimes-com-5258 8 43 to to TO www-nytimes-com-5258 8 44 break break VB www-nytimes-com-5258 8 45 into into IN www-nytimes-com-5258 8 46 a a DT www-nytimes-com-5258 8 47 house house NN www-nytimes-com-5258 8 48 without without IN www-nytimes-com-5258 8 49 sounding sound VBG www-nytimes-com-5258 8 50 an an DT www-nytimes-com-5258 8 51 alarm alarm NN www-nytimes-com-5258 8 52 . . . www-nytimes-com-5258 9 1 “ " `` www-nytimes-com-5258 9 2 Governments government NNS www-nytimes-com-5258 9 3 are be VBP www-nytimes-com-5258 9 4 starting start VBG www-nytimes-com-5258 9 5 to to TO www-nytimes-com-5258 9 6 say say VB www-nytimes-com-5258 9 7 , , , www-nytimes-com-5258 9 8 ‘ ' `` www-nytimes-com-5258 9 9 In in IN www-nytimes-com-5258 9 10 order order NN www-nytimes-com-5258 9 11 to to TO www-nytimes-com-5258 9 12 best good JJS www-nytimes-com-5258 9 13 protect protect VB www-nytimes-com-5258 9 14 my -PRON- PRP$ www-nytimes-com-5258 9 15 country country NN www-nytimes-com-5258 9 16 , , , www-nytimes-com-5258 9 17 I -PRON- PRP www-nytimes-com-5258 9 18 need need VBP www-nytimes-com-5258 9 19 to to TO www-nytimes-com-5258 9 20 find find VB www-nytimes-com-5258 9 21 vulnerabilities vulnerability NNS www-nytimes-com-5258 9 22 in in IN www-nytimes-com-5258 9 23 other other JJ www-nytimes-com-5258 9 24 countries country NNS www-nytimes-com-5258 9 25 , , , www-nytimes-com-5258 9 26 ’ ' '' www-nytimes-com-5258 9 27   _SP www-nytimes-com-5258 9 28 ” " '' www-nytimes-com-5258 9 29 said say VBD www-nytimes-com-5258 9 30 Howard Howard NNP www-nytimes-com-5258 9 31 Schmidt Schmidt NNP www-nytimes-com-5258 9 32 , , , www-nytimes-com-5258 9 33 a a DT www-nytimes-com-5258 9 34 former former JJ www-nytimes-com-5258 9 35 White White NNP www-nytimes-com-5258 9 36 House House NNP www-nytimes-com-5258 9 37 cybersecurity cybersecurity NN www-nytimes-com-5258 9 38 coordinator coordinator NN www-nytimes-com-5258 9 39 . . . www-nytimes-com-5258 10 1 “ " `` www-nytimes-com-5258 10 2 The the DT www-nytimes-com-5258 10 3 problem problem NN www-nytimes-com-5258 10 4 is be VBZ www-nytimes-com-5258 10 5 that that IN www-nytimes-com-5258 10 6 we -PRON- PRP www-nytimes-com-5258 10 7 all all DT www-nytimes-com-5258 10 8 fundamentally fundamentally RB www-nytimes-com-5258 10 9 become become VBP www-nytimes-com-5258 10 10 less less RBR www-nytimes-com-5258 10 11 secure secure JJ www-nytimes-com-5258 10 12 . . . www-nytimes-com-5258 10 13 ” " '' www-nytimes-com-5258 10 14 A a DT www-nytimes-com-5258 10 15 zero zero CD www-nytimes-com-5258 10 16 - - HYPH www-nytimes-com-5258 10 17 day day NN www-nytimes-com-5258 10 18 bug bug NN www-nytimes-com-5258 10 19 could could MD www-nytimes-com-5258 10 20 be be VB www-nytimes-com-5258 10 21 as as RB www-nytimes-com-5258 10 22 simple simple JJ www-nytimes-com-5258 10 23 as as IN www-nytimes-com-5258 10 24 a a DT www-nytimes-com-5258 10 25 hacker hacker NN www-nytimes-com-5258 10 26 ’s ’s , www-nytimes-com-5258 10 27 discovering discover VBG www-nytimes-com-5258 10 28 an an DT www-nytimes-com-5258 10 29 online online JJ www-nytimes-com-5258 10 30 account account NN www-nytimes-com-5258 10 31 that that WDT www-nytimes-com-5258 10 32 asks ask VBZ www-nytimes-com-5258 10 33 for for IN www-nytimes-com-5258 10 34 a a DT www-nytimes-com-5258 10 35 password password NN www-nytimes-com-5258 10 36 but but CC www-nytimes-com-5258 10 37 does do VBZ www-nytimes-com-5258 10 38 not not RB www-nytimes-com-5258 10 39 actually actually RB www-nytimes-com-5258 10 40 require require VB www-nytimes-com-5258 10 41 typing type VBG www-nytimes-com-5258 10 42 one one CD www-nytimes-com-5258 10 43 to to TO www-nytimes-com-5258 10 44 get get VB www-nytimes-com-5258 10 45 in in RB www-nytimes-com-5258 10 46 . . . www-nytimes-com-5258 11 1 Bypassing bypass VBG www-nytimes-com-5258 11 2 the the DT www-nytimes-com-5258 11 3 system system NN www-nytimes-com-5258 11 4 by by IN www-nytimes-com-5258 11 5 hitting hit VBG www-nytimes-com-5258 11 6 the the DT www-nytimes-com-5258 11 7 “ " `` www-nytimes-com-5258 11 8 Enter enter VB www-nytimes-com-5258 11 9 ” " '' www-nytimes-com-5258 11 10 key key NN www-nytimes-com-5258 11 11 becomes become VBZ www-nytimes-com-5258 11 12 a a DT www-nytimes-com-5258 11 13 zero zero CD www-nytimes-com-5258 11 14 - - HYPH www-nytimes-com-5258 11 15 day day NN www-nytimes-com-5258 11 16 exploit exploit NN www-nytimes-com-5258 11 17 . . . www-nytimes-com-5258 12 1 The the DT www-nytimes-com-5258 12 2 average average JJ www-nytimes-com-5258 12 3 attack attack NN www-nytimes-com-5258 12 4 persists persist VBZ www-nytimes-com-5258 12 5 for for IN www-nytimes-com-5258 12 6 almost almost RB www-nytimes-com-5258 12 7 a a DT www-nytimes-com-5258 12 8 year year NN www-nytimes-com-5258 12 9 — — : www-nytimes-com-5258 12 10 312 312 CD www-nytimes-com-5258 12 11 days day NNS www-nytimes-com-5258 12 12 — — : www-nytimes-com-5258 12 13 before before IN www-nytimes-com-5258 12 14 it -PRON- PRP www-nytimes-com-5258 12 15 is be VBZ www-nytimes-com-5258 12 16 detected detect VBN www-nytimes-com-5258 12 17 , , , www-nytimes-com-5258 12 18 according accord VBG www-nytimes-com-5258 12 19 to to IN www-nytimes-com-5258 12 20 Symantec Symantec NNP www-nytimes-com-5258 12 21 , , , www-nytimes-com-5258 12 22 the the DT www-nytimes-com-5258 12 23 maker maker NN www-nytimes-com-5258 12 24 of of IN www-nytimes-com-5258 12 25 antivirus antivirus NN www-nytimes-com-5258 12 26 software software NN www-nytimes-com-5258 12 27 . . . www-nytimes-com-5258 13 1 Until until IN www-nytimes-com-5258 13 2 then then RB www-nytimes-com-5258 13 3 it -PRON- PRP www-nytimes-com-5258 13 4 can can MD www-nytimes-com-5258 13 5 be be VB www-nytimes-com-5258 13 6 exploited exploit VBN www-nytimes-com-5258 13 7 or or CC www-nytimes-com-5258 13 8 “ " `` www-nytimes-com-5258 13 9 weaponized weaponize VBN www-nytimes-com-5258 13 10 ” " '' www-nytimes-com-5258 13 11 by by IN www-nytimes-com-5258 13 12 both both DT www-nytimes-com-5258 13 13 criminals criminal NNS www-nytimes-com-5258 13 14 and and CC www-nytimes-com-5258 13 15 governments government NNS www-nytimes-com-5258 13 16 to to TO www-nytimes-com-5258 13 17 spy spy VB www-nytimes-com-5258 13 18 on on IN www-nytimes-com-5258 13 19 , , , www-nytimes-com-5258 13 20 steal steal VBP www-nytimes-com-5258 13 21 from from IN www-nytimes-com-5258 13 22 or or CC www-nytimes-com-5258 13 23 attack attack VB www-nytimes-com-5258 13 24 their -PRON- PRP$ www-nytimes-com-5258 13 25 target target NN www-nytimes-com-5258 13 26 . . . www-nytimes-com-5258 14 1 Ten ten CD www-nytimes-com-5258 14 2 years year NNS www-nytimes-com-5258 14 3 ago ago RB www-nytimes-com-5258 14 4 , , , www-nytimes-com-5258 14 5 hackers hacker NNS www-nytimes-com-5258 14 6 would would MD www-nytimes-com-5258 14 7 hand hand VB www-nytimes-com-5258 14 8 knowledge knowledge NN www-nytimes-com-5258 14 9 of of IN www-nytimes-com-5258 14 10 such such JJ www-nytimes-com-5258 14 11 flaws flaw NNS www-nytimes-com-5258 14 12 to to IN www-nytimes-com-5258 14 13 Microsoft Microsoft NNP www-nytimes-com-5258 14 14 and and CC www-nytimes-com-5258 14 15 Google Google NNP www-nytimes-com-5258 14 16 free free JJ www-nytimes-com-5258 14 17 , , , www-nytimes-com-5258 14 18 in in IN www-nytimes-com-5258 14 19 exchange exchange NN www-nytimes-com-5258 14 20 for for IN www-nytimes-com-5258 14 21 a a DT www-nytimes-com-5258 14 22 T t NN www-nytimes-com-5258 14 23 - - HYPH www-nytimes-com-5258 14 24 shirt shirt NN www-nytimes-com-5258 14 25 or or CC www-nytimes-com-5258 14 26 perhaps perhaps RB www-nytimes-com-5258 14 27 for for IN www-nytimes-com-5258 14 28 an an DT www-nytimes-com-5258 14 29 honorable honorable JJ www-nytimes-com-5258 14 30 mention mention NN www-nytimes-com-5258 14 31 on on IN www-nytimes-com-5258 14 32 a a DT www-nytimes-com-5258 14 33 company company NN www-nytimes-com-5258 14 34 ’s ’s POS www-nytimes-com-5258 14 35 Web web NN www-nytimes-com-5258 14 36 site site NN www-nytimes-com-5258 14 37 . . . www-nytimes-com-5258 15 1 Even even RB www-nytimes-com-5258 15 2 today today NN www-nytimes-com-5258 15 3 , , , www-nytimes-com-5258 15 4 so so RB www-nytimes-com-5258 15 5 - - HYPH www-nytimes-com-5258 15 6 called call VBN www-nytimes-com-5258 15 7 patriotic patriotic JJ www-nytimes-com-5258 15 8 hackers hacker NNS www-nytimes-com-5258 15 9 in in IN www-nytimes-com-5258 15 10 China China NNP www-nytimes-com-5258 15 11 regularly regularly RB www-nytimes-com-5258 15 12 hand hand VBP www-nytimes-com-5258 15 13 over over RP www-nytimes-com-5258 15 14 the the DT www-nytimes-com-5258 15 15 information information NN www-nytimes-com-5258 15 16 to to IN www-nytimes-com-5258 15 17 the the DT www-nytimes-com-5258 15 18 government government NN www-nytimes-com-5258 15 19 . . . www-nytimes-com-5258 16 1 Now now RB www-nytimes-com-5258 16 2 , , , www-nytimes-com-5258 16 3 the the DT www-nytimes-com-5258 16 4 market market NN www-nytimes-com-5258 16 5 for for IN www-nytimes-com-5258 16 6 information information NN www-nytimes-com-5258 16 7 about about IN www-nytimes-com-5258 16 8 computer computer NN www-nytimes-com-5258 16 9 vulnerabilities vulnerability NNS www-nytimes-com-5258 16 10 has have VBZ www-nytimes-com-5258 16 11 turned turn VBN www-nytimes-com-5258 16 12 into into IN www-nytimes-com-5258 16 13 a a DT www-nytimes-com-5258 16 14 gold gold JJ www-nytimes-com-5258 16 15 rush rush NN www-nytimes-com-5258 16 16 . . . www-nytimes-com-5258 17 1 Disclosures disclosure NNS www-nytimes-com-5258 17 2 by by IN www-nytimes-com-5258 17 3 Edward Edward NNP www-nytimes-com-5258 17 4 J. J. NNP www-nytimes-com-5258 17 5 Snowden Snowden NNP www-nytimes-com-5258 17 6 , , , www-nytimes-com-5258 17 7 the the DT www-nytimes-com-5258 17 8 former former JJ www-nytimes-com-5258 17 9 N.S.A. N.S.A. NNP www-nytimes-com-5258 18 1 consultant consultant NN www-nytimes-com-5258 18 2 who who WP www-nytimes-com-5258 18 3 leaked leak VBD www-nytimes-com-5258 18 4 classified classify VBN www-nytimes-com-5258 18 5 documents document NNS www-nytimes-com-5258 18 6 , , , www-nytimes-com-5258 18 7 made make VBD www-nytimes-com-5258 18 8 it -PRON- PRP www-nytimes-com-5258 18 9 clear clear JJ www-nytimes-com-5258 18 10 that that IN www-nytimes-com-5258 18 11 the the DT www-nytimes-com-5258 18 12 United United NNP www-nytimes-com-5258 18 13 States States NNP www-nytimes-com-5258 18 14 is be VBZ www-nytimes-com-5258 18 15 among among IN www-nytimes-com-5258 18 16 the the DT www-nytimes-com-5258 18 17 buyers buyer NNS www-nytimes-com-5258 18 18 of of IN www-nytimes-com-5258 18 19 programming programming NN www-nytimes-com-5258 18 20 flaws flaw NNS www-nytimes-com-5258 18 21 . . . www-nytimes-com-5258 19 1 But but CC www-nytimes-com-5258 19 2 it -PRON- PRP www-nytimes-com-5258 19 3 is be VBZ www-nytimes-com-5258 19 4 hardly hardly RB www-nytimes-com-5258 19 5 alone alone JJ www-nytimes-com-5258 19 6 . . . www-nytimes-com-5258 20 1 Israel Israel NNP www-nytimes-com-5258 20 2 , , , www-nytimes-com-5258 20 3 Britain Britain NNP www-nytimes-com-5258 20 4 , , , www-nytimes-com-5258 20 5 Russia Russia NNP www-nytimes-com-5258 20 6 , , , www-nytimes-com-5258 20 7 India India NNP www-nytimes-com-5258 20 8 and and CC www-nytimes-com-5258 20 9 Brazil Brazil NNP www-nytimes-com-5258 20 10 are be VBP www-nytimes-com-5258 20 11 some some DT www-nytimes-com-5258 20 12 of of IN www-nytimes-com-5258 20 13 the the DT www-nytimes-com-5258 20 14 biggest big JJS www-nytimes-com-5258 20 15 spenders spender NNS www-nytimes-com-5258 20 16 . . . www-nytimes-com-5258 21 1 North North NNP www-nytimes-com-5258 21 2 Korea Korea NNP www-nytimes-com-5258 21 3 is be VBZ www-nytimes-com-5258 21 4 in in IN www-nytimes-com-5258 21 5 the the DT www-nytimes-com-5258 21 6 market market NN www-nytimes-com-5258 21 7 , , , www-nytimes-com-5258 21 8 as as IN www-nytimes-com-5258 21 9 are be VBP www-nytimes-com-5258 21 10 some some DT www-nytimes-com-5258 21 11 Middle middle JJ www-nytimes-com-5258 21 12 Eastern eastern JJ www-nytimes-com-5258 21 13 intelligence intelligence NN www-nytimes-com-5258 21 14 services service NNS www-nytimes-com-5258 21 15 . . . www-nytimes-com-5258 22 1 Countries country NNS www-nytimes-com-5258 22 2 in in IN www-nytimes-com-5258 22 3 the the DT www-nytimes-com-5258 22 4 Asian Asian NNP www-nytimes-com-5258 22 5 Pacific Pacific NNP www-nytimes-com-5258 22 6 , , , www-nytimes-com-5258 22 7 including include VBG www-nytimes-com-5258 22 8 Malaysia Malaysia NNP www-nytimes-com-5258 22 9 and and CC www-nytimes-com-5258 22 10 Singapore Singapore NNP www-nytimes-com-5258 22 11 , , , www-nytimes-com-5258 22 12 are be VBP www-nytimes-com-5258 22 13 buying buy VBG www-nytimes-com-5258 22 14 , , , www-nytimes-com-5258 22 15 too too RB www-nytimes-com-5258 22 16 , , , www-nytimes-com-5258 22 17 according accord VBG www-nytimes-com-5258 22 18 to to IN www-nytimes-com-5258 22 19 the the DT www-nytimes-com-5258 22 20 Center Center NNP www-nytimes-com-5258 22 21 for for IN www-nytimes-com-5258 22 22 Strategic Strategic NNP www-nytimes-com-5258 22 23 and and CC www-nytimes-com-5258 22 24 International International NNP www-nytimes-com-5258 22 25 Studies Studies NNPS www-nytimes-com-5258 22 26 in in IN www-nytimes-com-5258 22 27 Washington Washington NNP www-nytimes-com-5258 22 28 . . . www-nytimes-com-5258 23 1 To to TO www-nytimes-com-5258 23 2 connect connect VB www-nytimes-com-5258 23 3 sellers seller NNS www-nytimes-com-5258 23 4 and and CC www-nytimes-com-5258 23 5 buyers buyer NNS www-nytimes-com-5258 23 6 , , , www-nytimes-com-5258 23 7 dozens dozen NNS www-nytimes-com-5258 23 8 of of IN www-nytimes-com-5258 23 9 well well RB www-nytimes-com-5258 23 10 - - HYPH www-nytimes-com-5258 23 11 connected connect VBN www-nytimes-com-5258 23 12 brokers broker NNS www-nytimes-com-5258 23 13 now now RB www-nytimes-com-5258 23 14 market market VBP www-nytimes-com-5258 23 15 information information NN www-nytimes-com-5258 23 16 on on IN www-nytimes-com-5258 23 17 the the DT www-nytimes-com-5258 23 18 flaws flaw NNS www-nytimes-com-5258 23 19 in in IN www-nytimes-com-5258 23 20 exchange exchange NN www-nytimes-com-5258 23 21 for for IN www-nytimes-com-5258 23 22 a a DT www-nytimes-com-5258 23 23 15 15 CD www-nytimes-com-5258 23 24 percent percent NN www-nytimes-com-5258 23 25 cut cut NN www-nytimes-com-5258 23 26 . . . www-nytimes-com-5258 24 1 Some some DT www-nytimes-com-5258 24 2 hackers hacker NNS www-nytimes-com-5258 24 3 get get VBP www-nytimes-com-5258 24 4 a a DT www-nytimes-com-5258 24 5 deal deal NN www-nytimes-com-5258 24 6 collecting collect VBG www-nytimes-com-5258 24 7 royalty royalty NN www-nytimes-com-5258 24 8 fees fee NNS www-nytimes-com-5258 24 9 for for IN www-nytimes-com-5258 24 10 every every DT www-nytimes-com-5258 24 11 month month NN www-nytimes-com-5258 24 12 their -PRON- PRP$ www-nytimes-com-5258 24 13 flaw flaw NN www-nytimes-com-5258 24 14 is be VBZ www-nytimes-com-5258 24 15 not not RB www-nytimes-com-5258 24 16 discovered discover VBN www-nytimes-com-5258 24 17 , , , www-nytimes-com-5258 24 18 according accord VBG www-nytimes-com-5258 24 19 to to IN www-nytimes-com-5258 24 20 several several JJ www-nytimes-com-5258 24 21 people people NNS www-nytimes-com-5258 24 22 involved involve VBN www-nytimes-com-5258 24 23 in in IN www-nytimes-com-5258 24 24 the the DT www-nytimes-com-5258 24 25 market market NN www-nytimes-com-5258 24 26 . . . www-nytimes-com-5258 25 1 Some some DT www-nytimes-com-5258 25 2 individual individual JJ www-nytimes-com-5258 25 3 brokers broker NNS www-nytimes-com-5258 25 4 , , , www-nytimes-com-5258 25 5 like like IN www-nytimes-com-5258 25 6 one one CD www-nytimes-com-5258 25 7 in in IN www-nytimes-com-5258 25 8 Bangkok Bangkok NNP www-nytimes-com-5258 25 9 who who WP www-nytimes-com-5258 25 10 goes go VBZ www-nytimes-com-5258 25 11 by by IN www-nytimes-com-5258 25 12 “ " `` www-nytimes-com-5258 25 13 the the DT www-nytimes-com-5258 25 14 Grugq Grugq NNPS www-nytimes-com-5258 25 15 ” " '' www-nytimes-com-5258 25 16 on on IN www-nytimes-com-5258 25 17 Twitter Twitter NNP www-nytimes-com-5258 25 18 , , , www-nytimes-com-5258 25 19 are be VBP www-nytimes-com-5258 25 20 well well RB www-nytimes-com-5258 25 21 known known JJ www-nytimes-com-5258 25 22 . . . www-nytimes-com-5258 26 1 But but CC www-nytimes-com-5258 26 2 after after IN www-nytimes-com-5258 26 3 the the DT www-nytimes-com-5258 26 4 Grugq Grugq NNPS www-nytimes-com-5258 26 5 spoke speak VBD www-nytimes-com-5258 26 6 to to IN www-nytimes-com-5258 26 7 Forbes Forbes NNP www-nytimes-com-5258 26 8 last last JJ www-nytimes-com-5258 26 9 year year NN www-nytimes-com-5258 26 10 , , , www-nytimes-com-5258 26 11 his -PRON- PRP$ www-nytimes-com-5258 26 12 business business NN www-nytimes-com-5258 26 13 took take VBD www-nytimes-com-5258 26 14 a a DT www-nytimes-com-5258 26 15 hit hit NN www-nytimes-com-5258 26 16 from from IN www-nytimes-com-5258 26 17 the the DT www-nytimes-com-5258 26 18 publicity publicity NN www-nytimes-com-5258 26 19 , , , www-nytimes-com-5258 26 20 according accord VBG www-nytimes-com-5258 26 21 to to IN www-nytimes-com-5258 26 22 a a DT www-nytimes-com-5258 26 23 person person NN www-nytimes-com-5258 26 24 familiar familiar JJ www-nytimes-com-5258 26 25 with with IN www-nytimes-com-5258 26 26 the the DT www-nytimes-com-5258 26 27 impact impact NN www-nytimes-com-5258 26 28 , , , www-nytimes-com-5258 26 29 primarily primarily RB www-nytimes-com-5258 26 30 because because IN www-nytimes-com-5258 26 31 buyers buyer NNS www-nytimes-com-5258 26 32 demand demand VBP www-nytimes-com-5258 26 33 confidentiality confidentiality NN www-nytimes-com-5258 26 34 . . . www-nytimes-com-5258 27 1 A a DT www-nytimes-com-5258 27 2 broker broker NN www-nytimes-com-5258 27 3 ’s ’s POS www-nytimes-com-5258 27 4 approach approach NN www-nytimes-com-5258 27 5 need nee MD www-nytimes-com-5258 27 6 not not RB www-nytimes-com-5258 27 7 be be VB www-nytimes-com-5258 27 8 subtle subtle JJ www-nytimes-com-5258 27 9 . . . www-nytimes-com-5258 28 1 “ " `` www-nytimes-com-5258 28 2 Need need VB www-nytimes-com-5258 28 3 code code NN www-nytimes-com-5258 28 4 execution execution NN www-nytimes-com-5258 28 5 exploit exploit VB www-nytimes-com-5258 28 6 urgent urgent JJ www-nytimes-com-5258 28 7 , , , www-nytimes-com-5258 28 8 ” " '' www-nytimes-com-5258 28 9 read read VBD www-nytimes-com-5258 28 10 the the DT www-nytimes-com-5258 28 11 subject subject JJ www-nytimes-com-5258 28 12 line line NN www-nytimes-com-5258 28 13 of of IN www-nytimes-com-5258 28 14 an an DT www-nytimes-com-5258 28 15 e e NN www-nytimes-com-5258 28 16 - - NN www-nytimes-com-5258 28 17 mail mail NN www-nytimes-com-5258 28 18 sent send VBN www-nytimes-com-5258 28 19 from from IN www-nytimes-com-5258 28 20 one one CD www-nytimes-com-5258 28 21 contractor contractor NN www-nytimes-com-5258 28 22 ’s ’s POS www-nytimes-com-5258 28 23 intermediary intermediary JJ www-nytimes-com-5258 28 24 last last JJ www-nytimes-com-5258 28 25 year year NN www-nytimes-com-5258 28 26 to to IN www-nytimes-com-5258 28 27 Billy Billy NNP www-nytimes-com-5258 28 28 Rios Rios NNP www-nytimes-com-5258 28 29 , , , www-nytimes-com-5258 28 30 a a DT www-nytimes-com-5258 28 31 former former JJ www-nytimes-com-5258 28 32 security security NN www-nytimes-com-5258 28 33 engineer engineer NN www-nytimes-com-5258 28 34 at at IN www-nytimes-com-5258 28 35 Microsoft Microsoft NNP www-nytimes-com-5258 28 36 and and CC www-nytimes-com-5258 28 37 Google Google NNP www-nytimes-com-5258 28 38 who who WP www-nytimes-com-5258 28 39 is be VBZ www-nytimes-com-5258 28 40 now now RB www-nytimes-com-5258 28 41 a a DT www-nytimes-com-5258 28 42 director director NN www-nytimes-com-5258 28 43 at at IN www-nytimes-com-5258 28 44 Cylance Cylance NNP www-nytimes-com-5258 28 45 , , , www-nytimes-com-5258 28 46 a a DT www-nytimes-com-5258 28 47 security security NN www-nytimes-com-5258 28 48 start start NN www-nytimes-com-5258 28 49 - - HYPH www-nytimes-com-5258 28 50 up up NN www-nytimes-com-5258 28 51 . . . www-nytimes-com-5258 29 1 “ " `` www-nytimes-com-5258 29 2 Dear dear JJ www-nytimes-com-5258 29 3 Friend friend NN www-nytimes-com-5258 29 4 , , , www-nytimes-com-5258 29 5 ” " '' www-nytimes-com-5258 29 6 the the DT www-nytimes-com-5258 29 7 e e NN www-nytimes-com-5258 29 8 - - NN www-nytimes-com-5258 29 9 mail mail NN www-nytimes-com-5258 29 10 began begin VBD www-nytimes-com-5258 29 11 . . . www-nytimes-com-5258 30 1 “ " `` www-nytimes-com-5258 30 2 Do do VBP www-nytimes-com-5258 30 3 you -PRON- PRP www-nytimes-com-5258 30 4 have have VB www-nytimes-com-5258 30 5 any any DT www-nytimes-com-5258 30 6 code code NN www-nytimes-com-5258 30 7 execution execution NN www-nytimes-com-5258 30 8 exploit exploit NN www-nytimes-com-5258 30 9 for for IN www-nytimes-com-5258 30 10 Windows Windows NNP www-nytimes-com-5258 30 11 7 7 CD www-nytimes-com-5258 30 12 , , , www-nytimes-com-5258 30 13 Mac Mac NNP www-nytimes-com-5258 30 14 , , , www-nytimes-com-5258 30 15 for for IN www-nytimes-com-5258 30 16 applications application NNS www-nytimes-com-5258 30 17 like like IN www-nytimes-com-5258 30 18 Browser Browser NNP www-nytimes-com-5258 30 19 , , , www-nytimes-com-5258 30 20 Office Office NNP www-nytimes-com-5258 30 21 , , , www-nytimes-com-5258 30 22 Adobe Adobe NNP www-nytimes-com-5258 30 23 , , , www-nytimes-com-5258 30 24 SWF SWF NNP www-nytimes-com-5258 30 25 any any DT www-nytimes-com-5258 30 26 . . . www-nytimes-com-5258 30 27 ” " '' www-nytimes-com-5258 30 28 “ " `` www-nytimes-com-5258 30 29 If if IN www-nytimes-com-5258 30 30 yes yes UH www-nytimes-com-5258 30 31 , , , www-nytimes-com-5258 30 32 ” " '' www-nytimes-com-5258 30 33 the the DT www-nytimes-com-5258 30 34 e e NN www-nytimes-com-5258 30 35 - - NN www-nytimes-com-5258 30 36 mail mail NN www-nytimes-com-5258 30 37 continued continue VBN www-nytimes-com-5258 30 38 , , , www-nytimes-com-5258 30 39 “ " `` www-nytimes-com-5258 30 40 payment payment NN www-nytimes-com-5258 30 41 is be VBZ www-nytimes-com-5258 30 42 not not RB www-nytimes-com-5258 30 43 an an DT www-nytimes-com-5258 30 44 issue issue NN www-nytimes-com-5258 30 45 . . . www-nytimes-com-5258 30 46 ” " '' www-nytimes-com-5258 30 47 For for IN www-nytimes-com-5258 30 48 start start NN www-nytimes-com-5258 30 49 - - HYPH www-nytimes-com-5258 30 50 ups up NNS www-nytimes-com-5258 30 51 eager eager JJ www-nytimes-com-5258 30 52 to to TO www-nytimes-com-5258 30 53 displace displace VB www-nytimes-com-5258 30 54 more more RBR www-nytimes-com-5258 30 55 established establish VBN www-nytimes-com-5258 30 56 military military JJ www-nytimes-com-5258 30 57 contractors contractor NNS www-nytimes-com-5258 30 58 , , , www-nytimes-com-5258 30 59 selling sell VBG www-nytimes-com-5258 30 60 vulnerabilities vulnerability NNS www-nytimes-com-5258 30 61 — — : www-nytimes-com-5258 30 62 and and CC www-nytimes-com-5258 30 63 expertise expertise VBP www-nytimes-com-5258 30 64 about about IN www-nytimes-com-5258 30 65 how how WRB www-nytimes-com-5258 30 66 to to TO www-nytimes-com-5258 30 67 use use VB www-nytimes-com-5258 30 68 them -PRON- PRP www-nytimes-com-5258 30 69 — — : www-nytimes-com-5258 30 70 has have VBZ www-nytimes-com-5258 30 71 become become VBN www-nytimes-com-5258 30 72 a a DT www-nytimes-com-5258 30 73 lucrative lucrative JJ www-nytimes-com-5258 30 74 opportunity opportunity NN www-nytimes-com-5258 30 75 . . . www-nytimes-com-5258 31 1 Firms firm NNS www-nytimes-com-5258 31 2 like like IN www-nytimes-com-5258 31 3 Vupen vupen VB www-nytimes-com-5258 31 4 in in IN www-nytimes-com-5258 31 5 Montpellier Montpellier NNP www-nytimes-com-5258 31 6 , , , www-nytimes-com-5258 31 7 France France NNP www-nytimes-com-5258 31 8 ; ; : www-nytimes-com-5258 31 9 Netragard Netragard NNP www-nytimes-com-5258 31 10 in in IN www-nytimes-com-5258 31 11 Acton Acton NNP www-nytimes-com-5258 31 12 , , , www-nytimes-com-5258 31 13 Mass. Massachusetts NNP www-nytimes-com-5258 32 1 ; ; : www-nytimes-com-5258 32 2 Exodus Exodus NNP www-nytimes-com-5258 32 3 Intelligence Intelligence NNP www-nytimes-com-5258 32 4 in in IN www-nytimes-com-5258 32 5 Austin Austin NNP www-nytimes-com-5258 32 6 , , , www-nytimes-com-5258 32 7 Tex Tex NNP www-nytimes-com-5258 32 8 . . . www-nytimes-com-5258 33 1 ; ; : www-nytimes-com-5258 33 2 and and CC www-nytimes-com-5258 33 3 ReVuln ReVuln NNP www-nytimes-com-5258 33 4 , , , www-nytimes-com-5258 33 5 Mr. Mr. NNP www-nytimes-com-5258 33 6 Auriemma Auriemma NNP www-nytimes-com-5258 33 7 ’s ’s , www-nytimes-com-5258 33 8 and and CC www-nytimes-com-5258 33 9 Mr. Mr. NNP www-nytimes-com-5258 33 10 Ferrante Ferrante NNP www-nytimes-com-5258 33 11 ’s ’s POS www-nytimes-com-5258 33 12 Maltese maltese JJ www-nytimes-com-5258 33 13 firm firm NN www-nytimes-com-5258 33 14 , , , www-nytimes-com-5258 33 15 freely freely RB www-nytimes-com-5258 33 16 advertise advertise VBP www-nytimes-com-5258 33 17 that that IN www-nytimes-com-5258 33 18 they -PRON- PRP www-nytimes-com-5258 33 19 sell sell VBP www-nytimes-com-5258 33 20 knowledge knowledge NN www-nytimes-com-5258 33 21 of of IN www-nytimes-com-5258 33 22 the the DT www-nytimes-com-5258 33 23 flaws flaw NNS www-nytimes-com-5258 33 24 for for IN www-nytimes-com-5258 33 25 cyberespionage cyberespionage NN www-nytimes-com-5258 33 26 and and CC www-nytimes-com-5258 33 27 in in IN www-nytimes-com-5258 33 28 some some DT www-nytimes-com-5258 33 29 cases case NNS www-nytimes-com-5258 33 30 for for IN www-nytimes-com-5258 33 31 cyberweapons cyberweapon NNS www-nytimes-com-5258 33 32 . . . www-nytimes-com-5258 34 1 Outside outside IN www-nytimes-com-5258 34 2 Washington Washington NNP www-nytimes-com-5258 34 3 , , , www-nytimes-com-5258 34 4 a a DT www-nytimes-com-5258 34 5 Virginia Virginia NNP www-nytimes-com-5258 34 6 start start VB www-nytimes-com-5258 34 7 - - HYPH www-nytimes-com-5258 34 8 up up NN www-nytimes-com-5258 34 9 named name VBN www-nytimes-com-5258 34 10   _SP www-nytimes-com-5258 34 11 Endgame Endgame NNP www-nytimes-com-5258 34 12 — — : www-nytimes-com-5258 34 13 in in IN www-nytimes-com-5258 34 14 which which WDT www-nytimes-com-5258 34 15 a a DT www-nytimes-com-5258 34 16 former former JJ www-nytimes-com-5258 34 17 director director NN www-nytimes-com-5258 34 18 of of IN www-nytimes-com-5258 34 19 the the DT www-nytimes-com-5258 34 20 N.S.A. N.S.A. NNP www-nytimes-com-5258 35 1 is be VBZ www-nytimes-com-5258 35 2 playing play VBG www-nytimes-com-5258 35 3 a a DT www-nytimes-com-5258 35 4 major major JJ www-nytimes-com-5258 35 5 role role NN www-nytimes-com-5258 35 6 — — : www-nytimes-com-5258 35 7 is be VBZ www-nytimes-com-5258 35 8 more more RBR www-nytimes-com-5258 35 9 elusive elusive JJ www-nytimes-com-5258 35 10 about about IN www-nytimes-com-5258 35 11 its -PRON- PRP$ www-nytimes-com-5258 35 12 abilities ability NNS www-nytimes-com-5258 35 13 . . . www-nytimes-com-5258 36 1 But but CC www-nytimes-com-5258 36 2 it -PRON- PRP www-nytimes-com-5258 36 3 has have VBZ www-nytimes-com-5258 36 4 developed develop VBN www-nytimes-com-5258 36 5 a a DT www-nytimes-com-5258 36 6 number number NN www-nytimes-com-5258 36 7 of of IN www-nytimes-com-5258 36 8 tools tool NNS www-nytimes-com-5258 36 9 that that WDT www-nytimes-com-5258 36 10 it -PRON- PRP www-nytimes-com-5258 36 11 sells sell VBZ www-nytimes-com-5258 36 12 primarily primarily RB www-nytimes-com-5258 36 13 to to IN www-nytimes-com-5258 36 14 the the DT www-nytimes-com-5258 36 15 United United NNP www-nytimes-com-5258 36 16 States States NNP www-nytimes-com-5258 36 17 government government NN www-nytimes-com-5258 36 18   _SP www-nytimes-com-5258 36 19 to to TO www-nytimes-com-5258 36 20 discover discover VB www-nytimes-com-5258 36 21 vulnerabilities vulnerability NNS www-nytimes-com-5258 36 22 , , , www-nytimes-com-5258 36 23 which which WDT www-nytimes-com-5258 36 24 can can MD www-nytimes-com-5258 36 25 be be VB www-nytimes-com-5258 36 26 used use VBN www-nytimes-com-5258 36 27 for for IN www-nytimes-com-5258 36 28 fighting fight VBG www-nytimes-com-5258 36 29 cyberespionage cyberespionage NN www-nytimes-com-5258 36 30 and and CC www-nytimes-com-5258 36 31 for for IN www-nytimes-com-5258 36 32 offensive offensive JJ www-nytimes-com-5258 36 33 purposes purpose NNS www-nytimes-com-5258 36 34 . . . www-nytimes-com-5258 37 1 Like like IN www-nytimes-com-5258 37 2 ReVuln ReVuln NNP www-nytimes-com-5258 37 3 , , , www-nytimes-com-5258 37 4 none none NN www-nytimes-com-5258 37 5 of of IN www-nytimes-com-5258 37 6 the the DT www-nytimes-com-5258 37 7 companies company NNS www-nytimes-com-5258 37 8 will will MD www-nytimes-com-5258 37 9 disclose disclose VB www-nytimes-com-5258 37 10 the the DT www-nytimes-com-5258 37 11 names name NNS www-nytimes-com-5258 37 12 of of IN www-nytimes-com-5258 37 13 their -PRON- PRP$ www-nytimes-com-5258 37 14 customers customer NNS www-nytimes-com-5258 37 15 . . . www-nytimes-com-5258 38 1 But but CC www-nytimes-com-5258 38 2 Adriel Adriel NNP www-nytimes-com-5258 38 3 Desautels Desautels NNPS www-nytimes-com-5258 38 4 , , , www-nytimes-com-5258 38 5 the the DT www-nytimes-com-5258 38 6 founder founder NN www-nytimes-com-5258 38 7 of of IN www-nytimes-com-5258 38 8 Netragard Netragard NNP www-nytimes-com-5258 38 9 , , , www-nytimes-com-5258 38 10 said say VBD www-nytimes-com-5258 38 11 that that IN www-nytimes-com-5258 38 12 his -PRON- PRP$ www-nytimes-com-5258 38 13 clients client NNS www-nytimes-com-5258 38 14 were be VBD www-nytimes-com-5258 38 15 “ " `` www-nytimes-com-5258 38 16 strictly strictly RB www-nytimes-com-5258 38 17 U.S. U.S. NNP www-nytimes-com-5258 38 18 based base VBN www-nytimes-com-5258 38 19 ” " '' www-nytimes-com-5258 38 20 and and CC www-nytimes-com-5258 38 21 that that IN www-nytimes-com-5258 38 22 Netragard Netragard NNP www-nytimes-com-5258 38 23 ’s ’s , www-nytimes-com-5258 38 24 “ " `` www-nytimes-com-5258 38 25 exploit exploit NNP www-nytimes-com-5258 38 26 acquisition acquisition NN www-nytimes-com-5258 38 27 program program NN www-nytimes-com-5258 38 28 ” " '' www-nytimes-com-5258 38 29 had have VBD www-nytimes-com-5258 38 30 doubled double VBN www-nytimes-com-5258 38 31 in in IN www-nytimes-com-5258 38 32 size size NN www-nytimes-com-5258 38 33 in in IN www-nytimes-com-5258 38 34 the the DT www-nytimes-com-5258 38 35 past past JJ www-nytimes-com-5258 38 36 three three CD www-nytimes-com-5258 38 37 years year NNS www-nytimes-com-5258 38 38 . . . www-nytimes-com-5258 39 1 The the DT www-nytimes-com-5258 39 2 average average JJ www-nytimes-com-5258 39 3 flaw flaw NN www-nytimes-com-5258 39 4 now now RB www-nytimes-com-5258 39 5 sells sell VBZ www-nytimes-com-5258 39 6 from from IN www-nytimes-com-5258 39 7 around around IN www-nytimes-com-5258 39 8 $ $ $ www-nytimes-com-5258 39 9 35,000 35,000 CD www-nytimes-com-5258 39 10 to to TO www-nytimes-com-5258 39 11 $ $ $ www-nytimes-com-5258 39 12 160,000 160,000 CD www-nytimes-com-5258 39 13 . . . www-nytimes-com-5258 40 1 Image image NN www-nytimes-com-5258 40 2 Donato Donato NNP www-nytimes-com-5258 40 3 Ferrante Ferrante NNP www-nytimes-com-5258 40 4 , , , www-nytimes-com-5258 40 5 a a DT www-nytimes-com-5258 40 6 partner partner NN www-nytimes-com-5258 40 7 in in IN www-nytimes-com-5258 40 8 the the DT www-nytimes-com-5258 40 9 business business NN www-nytimes-com-5258 40 10 . . . www-nytimes-com-5258 41 1 Such such JJ www-nytimes-com-5258 41 2 ventures venture NNS www-nytimes-com-5258 41 3 are be VBP www-nytimes-com-5258 41 4 booming boom VBG www-nytimes-com-5258 41 5 worldwide worldwide RB www-nytimes-com-5258 41 6 . . . www-nytimes-com-5258 41 7 Credit credit NN www-nytimes-com-5258 41 8 ... ... . www-nytimes-com-5258 41 9 Ryan Ryan NNP www-nytimes-com-5258 41 10 Enn Enn NNP www-nytimes-com-5258 41 11 Hughes Hughes NNP www-nytimes-com-5258 41 12 for for IN www-nytimes-com-5258 41 13 The the DT www-nytimes-com-5258 41 14 New New NNP www-nytimes-com-5258 41 15 York York NNP www-nytimes-com-5258 41 16 Times Times NNP www-nytimes-com-5258 41 17 Chaouki Chaouki NNP www-nytimes-com-5258 41 18 Bekrar Bekrar NNP www-nytimes-com-5258 41 19 , , , www-nytimes-com-5258 41 20 the the DT www-nytimes-com-5258 41 21 founder founder NN www-nytimes-com-5258 41 22 of of IN www-nytimes-com-5258 41 23 Vupen Vupen NNP www-nytimes-com-5258 41 24 , , , www-nytimes-com-5258 41 25 said say VBD www-nytimes-com-5258 41 26 his -PRON- PRP$ www-nytimes-com-5258 41 27 company company NN www-nytimes-com-5258 41 28 did do VBD www-nytimes-com-5258 41 29 not not RB www-nytimes-com-5258 41 30 sell sell VB www-nytimes-com-5258 41 31 to to IN www-nytimes-com-5258 41 32 countries country NNS www-nytimes-com-5258 41 33 that that WDT www-nytimes-com-5258 41 34 are be VBP www-nytimes-com-5258 41 35 “ " `` www-nytimes-com-5258 41 36 subject subject JJ www-nytimes-com-5258 41 37 to to IN www-nytimes-com-5258 41 38 European European NNP www-nytimes-com-5258 41 39 Union Union NNP www-nytimes-com-5258 41 40 , , , www-nytimes-com-5258 41 41 United United NNP www-nytimes-com-5258 41 42 States States NNP www-nytimes-com-5258 41 43 or or CC www-nytimes-com-5258 41 44 United United NNP www-nytimes-com-5258 41 45 Nations Nations NNP www-nytimes-com-5258 41 46 restrictions restriction NNS www-nytimes-com-5258 41 47 or or CC www-nytimes-com-5258 41 48 embargoes embargo NNS www-nytimes-com-5258 41 49 . . . www-nytimes-com-5258 41 50 ” " '' www-nytimes-com-5258 41 51 He -PRON- PRP www-nytimes-com-5258 41 52 also also RB www-nytimes-com-5258 41 53 said say VBD www-nytimes-com-5258 41 54 revenue revenue NN www-nytimes-com-5258 41 55 was be VBD www-nytimes-com-5258 41 56 doubling double VBG www-nytimes-com-5258 41 57 every every DT www-nytimes-com-5258 41 58 year year NN www-nytimes-com-5258 41 59 as as IN www-nytimes-com-5258 41 60 demand demand NN www-nytimes-com-5258 41 61 surged surge VBD www-nytimes-com-5258 41 62 . . . www-nytimes-com-5258 42 1 Vupen Vupen NNP www-nytimes-com-5258 42 2 charges charge NNS www-nytimes-com-5258 42 3 customers customer NNS www-nytimes-com-5258 42 4 an an DT www-nytimes-com-5258 42 5 annual annual JJ www-nytimes-com-5258 42 6 $ $ $ www-nytimes-com-5258 42 7 100,000 100,000 CD www-nytimes-com-5258 42 8 subscription subscription NN www-nytimes-com-5258 42 9 fee fee NN www-nytimes-com-5258 42 10 to to TO www-nytimes-com-5258 42 11 shop shop VB www-nytimes-com-5258 42 12 through through IN www-nytimes-com-5258 42 13 its -PRON- PRP$ www-nytimes-com-5258 42 14 catalog catalog NN www-nytimes-com-5258 42 15 , , , www-nytimes-com-5258 42 16 and and CC www-nytimes-com-5258 42 17 then then RB www-nytimes-com-5258 42 18 charges charge VBZ www-nytimes-com-5258 42 19 per per IN www-nytimes-com-5258 42 20 sale sale NN www-nytimes-com-5258 42 21 . . . www-nytimes-com-5258 43 1 Costs cost NNS www-nytimes-com-5258 43 2 depend depend VBP www-nytimes-com-5258 43 3 on on IN www-nytimes-com-5258 43 4 the the DT www-nytimes-com-5258 43 5 sophistication sophistication NN www-nytimes-com-5258 43 6 of of IN www-nytimes-com-5258 43 7 the the DT www-nytimes-com-5258 43 8 vulnerability vulnerability NN www-nytimes-com-5258 43 9 and and CC www-nytimes-com-5258 43 10 the the DT www-nytimes-com-5258 43 11 pervasiveness pervasiveness NN www-nytimes-com-5258 43 12 of of IN www-nytimes-com-5258 43 13 the the DT www-nytimes-com-5258 43 14 operating operating NN www-nytimes-com-5258 43 15 system system NN www-nytimes-com-5258 43 16 . . . www-nytimes-com-5258 44 1 ReVuln revuln NN www-nytimes-com-5258 44 2 specializes specialize VBZ www-nytimes-com-5258 44 3 in in IN www-nytimes-com-5258 44 4 finding find VBG www-nytimes-com-5258 44 5 remote remote JJ www-nytimes-com-5258 44 6 vulnerabilities vulnerability NNS www-nytimes-com-5258 44 7 in in IN www-nytimes-com-5258 44 8 industrial industrial JJ www-nytimes-com-5258 44 9 control control NN www-nytimes-com-5258 44 10 systems system NNS www-nytimes-com-5258 44 11 that that WDT www-nytimes-com-5258 44 12 can can MD www-nytimes-com-5258 44 13 be be VB www-nytimes-com-5258 44 14 used use VBN www-nytimes-com-5258 44 15 to to TO www-nytimes-com-5258 44 16 access access VB www-nytimes-com-5258 44 17 — — : www-nytimes-com-5258 44 18 or or CC www-nytimes-com-5258 44 19 disrupt disrupt VBP www-nytimes-com-5258 44 20 — — : www-nytimes-com-5258 44 21 water water NN www-nytimes-com-5258 44 22 treatment treatment NN www-nytimes-com-5258 44 23 facilities facility NNS www-nytimes-com-5258 44 24 , , , www-nytimes-com-5258 44 25 oil oil NN www-nytimes-com-5258 44 26 and and CC www-nytimes-com-5258 44 27 gas gas NN www-nytimes-com-5258 44 28 pipelines pipeline NNS www-nytimes-com-5258 44 29 and and CC www-nytimes-com-5258 44 30 power power NN www-nytimes-com-5258 44 31 plants plant NNS www-nytimes-com-5258 44 32 . . . www-nytimes-com-5258 45 1 “ " `` www-nytimes-com-5258 45 2 They -PRON- PRP www-nytimes-com-5258 45 3 are be VBP www-nytimes-com-5258 45 4 engaging engage VBG www-nytimes-com-5258 45 5 in in IN www-nytimes-com-5258 45 6 willful willful JJ www-nytimes-com-5258 45 7 blindness blindness NN www-nytimes-com-5258 45 8 , , , www-nytimes-com-5258 45 9 ” " '' www-nytimes-com-5258 45 10 said say VBD www-nytimes-com-5258 45 11 Christopher Christopher NNP www-nytimes-com-5258 45 12 Soghoian Soghoian NNP www-nytimes-com-5258 45 13 , , , www-nytimes-com-5258 45 14 a a DT www-nytimes-com-5258 45 15 senior senior JJ www-nytimes-com-5258 45 16 policy policy NN www-nytimes-com-5258 45 17 analyst analyst NN www-nytimes-com-5258 45 18 at at IN www-nytimes-com-5258 45 19 the the DT www-nytimes-com-5258 45 20 American American NNP www-nytimes-com-5258 45 21 Civil Civil NNP www-nytimes-com-5258 45 22 Liberties Liberties NNPS www-nytimes-com-5258 45 23 Union Union NNP www-nytimes-com-5258 45 24 . . . www-nytimes-com-5258 46 1 Many many JJ www-nytimes-com-5258 46 2 technology technology NN www-nytimes-com-5258 46 3 companies company NNS www-nytimes-com-5258 46 4 have have VBP www-nytimes-com-5258 46 5 started start VBN www-nytimes-com-5258 46 6 “ " `` www-nytimes-com-5258 46 7 bug bug NNP www-nytimes-com-5258 46 8 bounty bounty NNP www-nytimes-com-5258 46 9 ” " '' www-nytimes-com-5258 46 10 programs program NNS www-nytimes-com-5258 46 11 in in IN www-nytimes-com-5258 46 12 which which WDT www-nytimes-com-5258 46 13 they -PRON- PRP www-nytimes-com-5258 46 14 pay pay VBP www-nytimes-com-5258 46 15 hackers hacker NNS www-nytimes-com-5258 46 16 to to TO www-nytimes-com-5258 46 17 tell tell VB www-nytimes-com-5258 46 18 them -PRON- PRP www-nytimes-com-5258 46 19 about about IN www-nytimes-com-5258 46 20 bugs bug NNS www-nytimes-com-5258 46 21 in in IN www-nytimes-com-5258 46 22 their -PRON- PRP$ www-nytimes-com-5258 46 23 systems system NNS www-nytimes-com-5258 46 24 rather rather RB www-nytimes-com-5258 46 25 than than IN www-nytimes-com-5258 46 26 have have VB www-nytimes-com-5258 46 27 the the DT www-nytimes-com-5258 46 28 hackers hacker NNS www-nytimes-com-5258 46 29 keep keep VB www-nytimes-com-5258 46 30 the the DT www-nytimes-com-5258 46 31 flaws flaw NNS www-nytimes-com-5258 46 32 to to IN www-nytimes-com-5258 46 33 themselves -PRON- PRP www-nytimes-com-5258 46 34 — — : www-nytimes-com-5258 46 35 or or CC www-nytimes-com-5258 46 36 worse bad JJR www-nytimes-com-5258 46 37 , , , www-nytimes-com-5258 46 38 sell sell VB www-nytimes-com-5258 46 39 them -PRON- PRP www-nytimes-com-5258 46 40 on on IN www-nytimes-com-5258 46 41 the the DT www-nytimes-com-5258 46 42 black black JJ www-nytimes-com-5258 46 43 market market NN www-nytimes-com-5258 46 44 . . . www-nytimes-com-5258 47 1 Nearly nearly RB www-nytimes-com-5258 47 2 a a DT www-nytimes-com-5258 47 3 decade decade NN www-nytimes-com-5258 47 4 ago ago RB www-nytimes-com-5258 47 5 the the DT www-nytimes-com-5258 47 6 Mozilla Mozilla NNP www-nytimes-com-5258 47 7 Foundation Foundation NNP www-nytimes-com-5258 47 8 started start VBD www-nytimes-com-5258 47 9 one one CD www-nytimes-com-5258 47 10 of of IN www-nytimes-com-5258 47 11 the the DT www-nytimes-com-5258 47 12 first first JJ www-nytimes-com-5258 47 13 bounty bounty NN www-nytimes-com-5258 47 14 programs program NNS www-nytimes-com-5258 47 15 to to TO www-nytimes-com-5258 47 16 pay pay VB www-nytimes-com-5258 47 17 for for IN www-nytimes-com-5258 47 18 bugs bug NNS www-nytimes-com-5258 47 19 in in IN www-nytimes-com-5258 47 20 its -PRON- PRP$ www-nytimes-com-5258 47 21 Firefox Firefox NNP www-nytimes-com-5258 47 22 browser browser NN www-nytimes-com-5258 47 23 . . . www-nytimes-com-5258 48 1 Since since IN www-nytimes-com-5258 48 2 then then RB www-nytimes-com-5258 48 3 , , , www-nytimes-com-5258 48 4 Google Google NNP www-nytimes-com-5258 48 5 , , , www-nytimes-com-5258 48 6 Facebook Facebook NNP www-nytimes-com-5258 48 7 and and CC www-nytimes-com-5258 48 8 PayPal PayPal NNP www-nytimes-com-5258 48 9 have have VBP www-nytimes-com-5258 48 10 all all DT www-nytimes-com-5258 48 11 followed follow VBN www-nytimes-com-5258 48 12 suit suit NN www-nytimes-com-5258 48 13 . . . www-nytimes-com-5258 49 1 In in IN www-nytimes-com-5258 49 2 recent recent JJ www-nytimes-com-5258 49 3 months month NNS www-nytimes-com-5258 49 4 , , , www-nytimes-com-5258 49 5 bounties bounty NNS www-nytimes-com-5258 49 6 have have VBP www-nytimes-com-5258 49 7 soared soar VBN www-nytimes-com-5258 49 8 . . . www-nytimes-com-5258 50 1 In in IN www-nytimes-com-5258 50 2 2010 2010 CD www-nytimes-com-5258 50 3 , , , www-nytimes-com-5258 50 4 Google Google NNP www-nytimes-com-5258 50 5 started start VBD www-nytimes-com-5258 50 6 paying pay VBG www-nytimes-com-5258 50 7 hackers hacker NNS www-nytimes-com-5258 50 8 up up IN www-nytimes-com-5258 50 9 to to TO www-nytimes-com-5258 50 10 $ $ $ www-nytimes-com-5258 50 11 3,133.70 3,133.70 CD www-nytimes-com-5258 50 12 — — : www-nytimes-com-5258 50 13 the the DT www-nytimes-com-5258 50 14 number number NN www-nytimes-com-5258 50 15 is be VBZ www-nytimes-com-5258 50 16 hacker hacker NN www-nytimes-com-5258 50 17 code code NN www-nytimes-com-5258 50 18 for for IN www-nytimes-com-5258 50 19 “ " `` www-nytimes-com-5258 50 20 elite elite JJ www-nytimes-com-5258 50 21 ” " '' www-nytimes-com-5258 50 22 — — : www-nytimes-com-5258 50 23 for for IN www-nytimes-com-5258 50 24 bugs bug NNS www-nytimes-com-5258 50 25 in in IN www-nytimes-com-5258 50 26 its -PRON- PRP$ www-nytimes-com-5258 50 27 Web Web NNP www-nytimes-com-5258 50 28 browser browser NN www-nytimes-com-5258 50 29 Chrome Chrome NNP www-nytimes-com-5258 50 30 . . . www-nytimes-com-5258 51 1 Last last JJ www-nytimes-com-5258 51 2 month month NN www-nytimes-com-5258 51 3 , , , www-nytimes-com-5258 51 4 Google Google NNP www-nytimes-com-5258 51 5 increased increase VBD www-nytimes-com-5258 51 6 its -PRON- PRP$ www-nytimes-com-5258 51 7 cash cash NN www-nytimes-com-5258 51 8 prize prize NN www-nytimes-com-5258 51 9 to to IN www-nytimes-com-5258 51 10 $ $ $ www-nytimes-com-5258 51 11 20,000 20,000 CD www-nytimes-com-5258 51 12 for for IN www-nytimes-com-5258 51 13 flaws flaw NNS www-nytimes-com-5258 51 14 found find VBN www-nytimes-com-5258 51 15 in in IN www-nytimes-com-5258 51 16 some some DT www-nytimes-com-5258 51 17 of of IN www-nytimes-com-5258 51 18 its -PRON- PRP$ www-nytimes-com-5258 51 19 widely widely RB www-nytimes-com-5258 51 20 used use VBN www-nytimes-com-5258 51 21 products product NNS www-nytimes-com-5258 51 22 . . . www-nytimes-com-5258 52 1 Facebook Facebook NNP www-nytimes-com-5258 52 2 began begin VBD www-nytimes-com-5258 52 3 a a DT www-nytimes-com-5258 52 4 similar similar JJ www-nytimes-com-5258 52 5 program program NN www-nytimes-com-5258 52 6 in in IN www-nytimes-com-5258 52 7 2011 2011 CD www-nytimes-com-5258 52 8 and and CC www-nytimes-com-5258 52 9 has have VBZ www-nytimes-com-5258 52 10 since since IN www-nytimes-com-5258 52 11 paid pay VBN www-nytimes-com-5258 52 12 out out RP www-nytimes-com-5258 52 13 $ $ $ www-nytimes-com-5258 52 14 1 1 CD www-nytimes-com-5258 52 15 million million CD www-nytimes-com-5258 52 16 . . . www-nytimes-com-5258 53 1 ( ( -LRB- www-nytimes-com-5258 53 2 One one CD www-nytimes-com-5258 53 3 payout payout NN www-nytimes-com-5258 53 4 included include VBD www-nytimes-com-5258 53 5 $ $ $ www-nytimes-com-5258 53 6 2,500 2,500 CD www-nytimes-com-5258 53 7 to to IN www-nytimes-com-5258 53 8 a a DT www-nytimes-com-5258 53 9 13-year 13-year CD www-nytimes-com-5258 53 10 - - HYPH www-nytimes-com-5258 53 11 old old JJ www-nytimes-com-5258 53 12 . . . www-nytimes-com-5258 54 1 The the DT www-nytimes-com-5258 54 2 most most JJS www-nytimes-com-5258 54 3 it -PRON- PRP www-nytimes-com-5258 54 4 has have VBZ www-nytimes-com-5258 54 5 paid pay VBN www-nytimes-com-5258 54 6 for for IN www-nytimes-com-5258 54 7 a a DT www-nytimes-com-5258 54 8 single single JJ www-nytimes-com-5258 54 9 bug bug NN www-nytimes-com-5258 54 10 is be VBZ www-nytimes-com-5258 54 11 $ $ $ www-nytimes-com-5258 54 12 20,000 20,000 CD www-nytimes-com-5258 54 13 . . . www-nytimes-com-5258 54 14 ) ) -RRB- www-nytimes-com-5258 55 1 “ " `` www-nytimes-com-5258 55 2 The the DT www-nytimes-com-5258 55 3 program program NN www-nytimes-com-5258 55 4 undermines undermine VBZ www-nytimes-com-5258 55 5 the the DT www-nytimes-com-5258 55 6 incentive incentive NN www-nytimes-com-5258 55 7 to to TO www-nytimes-com-5258 55 8 hold hold VB www-nytimes-com-5258 55 9 on on RP www-nytimes-com-5258 55 10 to to IN www-nytimes-com-5258 55 11 a a DT www-nytimes-com-5258 55 12 bug bug NN www-nytimes-com-5258 55 13 that that WDT www-nytimes-com-5258 55 14 might may MD www-nytimes-com-5258 55 15 be be VB www-nytimes-com-5258 55 16 worth worth JJ www-nytimes-com-5258 55 17 nothing nothing NN www-nytimes-com-5258 55 18 in in IN www-nytimes-com-5258 55 19 a a DT www-nytimes-com-5258 55 20 day day NN www-nytimes-com-5258 55 21 , , , www-nytimes-com-5258 55 22 ” " '' www-nytimes-com-5258 55 23 said say VBD www-nytimes-com-5258 55 24 Joe Joe NNP www-nytimes-com-5258 55 25 Sullivan Sullivan NNP www-nytimes-com-5258 55 26 , , , www-nytimes-com-5258 55 27 Facebook Facebook NNP www-nytimes-com-5258 55 28 ’s ’s POS www-nytimes-com-5258 55 29 chief chief JJ www-nytimes-com-5258 55 30 security security NN www-nytimes-com-5258 55 31 officer officer NN www-nytimes-com-5258 55 32 . . . www-nytimes-com-5258 56 1 It -PRON- PRP www-nytimes-com-5258 56 2 had have VBD www-nytimes-com-5258 56 3 also also RB www-nytimes-com-5258 56 4 had have VBN www-nytimes-com-5258 56 5 the the DT www-nytimes-com-5258 56 6 unintended unintended JJ www-nytimes-com-5258 56 7 effect effect NN www-nytimes-com-5258 56 8 of of IN www-nytimes-com-5258 56 9 encouraging encourage VBG www-nytimes-com-5258 56 10 ethical ethical JJ www-nytimes-com-5258 56 11 hackers hacker NNS www-nytimes-com-5258 56 12 to to TO www-nytimes-com-5258 56 13 turn turn VB www-nytimes-com-5258 56 14 in in RP www-nytimes-com-5258 56 15 others other NNS www-nytimes-com-5258 56 16 who who WP www-nytimes-com-5258 56 17 planned plan VBD www-nytimes-com-5258 56 18 to to TO www-nytimes-com-5258 56 19 use use VB www-nytimes-com-5258 56 20 its -PRON- PRP$ www-nytimes-com-5258 56 21 bugs bug NNS www-nytimes-com-5258 56 22 for for IN www-nytimes-com-5258 56 23 malicious malicious JJ www-nytimes-com-5258 56 24 use use NN www-nytimes-com-5258 56 25 . . . www-nytimes-com-5258 57 1 “ " `` www-nytimes-com-5258 57 2 We -PRON- PRP www-nytimes-com-5258 57 3 ’ve have VB www-nytimes-com-5258 57 4 seen see VBN www-nytimes-com-5258 57 5 people people NNS www-nytimes-com-5258 57 6 back back JJ www-nytimes-com-5258 57 7 - - HYPH www-nytimes-com-5258 57 8 stab stab NN www-nytimes-com-5258 57 9 other other JJ www-nytimes-com-5258 57 10 hackers hacker NNS www-nytimes-com-5258 57 11 by by IN www-nytimes-com-5258 57 12 ratting rat VBG www-nytimes-com-5258 57 13 out out RP www-nytimes-com-5258 57 14 a a DT www-nytimes-com-5258 57 15 bug bug NN www-nytimes-com-5258 57 16 that that WDT www-nytimes-com-5258 57 17 another another DT www-nytimes-com-5258 57 18 person person NN www-nytimes-com-5258 57 19 planned plan VBD www-nytimes-com-5258 57 20 to to TO www-nytimes-com-5258 57 21 use use VB www-nytimes-com-5258 57 22 maliciously maliciously RB www-nytimes-com-5258 57 23 , , , www-nytimes-com-5258 57 24 ” " '' www-nytimes-com-5258 57 25 he -PRON- PRP www-nytimes-com-5258 57 26 said say VBD www-nytimes-com-5258 57 27 . . . www-nytimes-com-5258 58 1 Microsoft Microsoft NNP www-nytimes-com-5258 58 2 , , , www-nytimes-com-5258 58 3 which which WDT www-nytimes-com-5258 58 4 had have VBD www-nytimes-com-5258 58 5 long long RB www-nytimes-com-5258 58 6 resisted resist VBN www-nytimes-com-5258 58 7 such such PDT www-nytimes-com-5258 58 8 a a DT www-nytimes-com-5258 58 9 program program NN www-nytimes-com-5258 58 10 , , , www-nytimes-com-5258 58 11 did do VBD www-nytimes-com-5258 58 12 an an DT www-nytimes-com-5258 58 13 about about NN www-nytimes-com-5258 58 14 - - HYPH www-nytimes-com-5258 58 15 face face NN www-nytimes-com-5258 58 16 last last JJ www-nytimes-com-5258 58 17 month month NN www-nytimes-com-5258 58 18 when when WRB www-nytimes-com-5258 58 19 it -PRON- PRP www-nytimes-com-5258 58 20 announced announce VBD www-nytimes-com-5258 58 21 that that IN www-nytimes-com-5258 58 22 it -PRON- PRP www-nytimes-com-5258 58 23 would would MD www-nytimes-com-5258 58 24 pay pay VB www-nytimes-com-5258 58 25 hackers hacker NNS www-nytimes-com-5258 58 26 as as RB www-nytimes-com-5258 58 27 much much RB www-nytimes-com-5258 58 28 as as IN www-nytimes-com-5258 58 29 $ $ $ www-nytimes-com-5258 58 30 150,000 150,000 CD www-nytimes-com-5258 58 31 for for IN www-nytimes-com-5258 58 32 information information NN www-nytimes-com-5258 58 33 about about IN www-nytimes-com-5258 58 34 a a DT www-nytimes-com-5258 58 35 single single JJ www-nytimes-com-5258 58 36 flaw flaw NN www-nytimes-com-5258 58 37 , , , www-nytimes-com-5258 58 38 if if IN www-nytimes-com-5258 58 39 they -PRON- PRP www-nytimes-com-5258 58 40 also also RB www-nytimes-com-5258 58 41 provided provide VBD www-nytimes-com-5258 58 42 a a DT www-nytimes-com-5258 58 43 way way NN www-nytimes-com-5258 58 44 to to TO www-nytimes-com-5258 58 45 defend defend VB www-nytimes-com-5258 58 46 against against IN www-nytimes-com-5258 58 47 it -PRON- PRP www-nytimes-com-5258 58 48 . . . www-nytimes-com-5258 59 1 Apple Apple NNP www-nytimes-com-5258 59 2 still still RB www-nytimes-com-5258 59 3 has have VBZ www-nytimes-com-5258 59 4 no no DT www-nytimes-com-5258 59 5 such such JJ www-nytimes-com-5258 59 6 program program NN www-nytimes-com-5258 59 7 , , , www-nytimes-com-5258 59 8 but but CC www-nytimes-com-5258 59 9 its -PRON- PRP$ www-nytimes-com-5258 59 10 vulnerabilities vulnerability NNS www-nytimes-com-5258 59 11 are be VBP www-nytimes-com-5258 59 12 some some DT www-nytimes-com-5258 59 13 of of IN www-nytimes-com-5258 59 14 the the DT www-nytimes-com-5258 59 15 most most RBS www-nytimes-com-5258 59 16 coveted coveted JJ www-nytimes-com-5258 59 17 . . . www-nytimes-com-5258 60 1 In in IN www-nytimes-com-5258 60 2 one one CD www-nytimes-com-5258 60 3 case case NN www-nytimes-com-5258 60 4 , , , www-nytimes-com-5258 60 5 a a DT www-nytimes-com-5258 60 6 zero zero CD www-nytimes-com-5258 60 7 - - HYPH www-nytimes-com-5258 60 8 day day NN www-nytimes-com-5258 60 9 exploit exploit NN www-nytimes-com-5258 60 10 in in IN www-nytimes-com-5258 60 11 Apple Apple NNP www-nytimes-com-5258 60 12 ’s ’s POS www-nytimes-com-5258 60 13 iOS ios JJ www-nytimes-com-5258 60 14 operating operating NN www-nytimes-com-5258 60 15 system system NN www-nytimes-com-5258 60 16 sold sell VBN www-nytimes-com-5258 60 17 for for IN www-nytimes-com-5258 60 18 $ $ $ www-nytimes-com-5258 60 19 500,000 500,000 CD www-nytimes-com-5258 60 20 , , , www-nytimes-com-5258 60 21 according accord VBG www-nytimes-com-5258 60 22 to to IN www-nytimes-com-5258 60 23 two two CD www-nytimes-com-5258 60 24 people people NNS www-nytimes-com-5258 60 25 briefed brief VBN www-nytimes-com-5258 60 26 on on IN www-nytimes-com-5258 60 27 the the DT www-nytimes-com-5258 60 28 sale sale NN www-nytimes-com-5258 60 29 . . . www-nytimes-com-5258 61 1 Still still RB www-nytimes-com-5258 61 2 , , , www-nytimes-com-5258 61 3 said say VBD www-nytimes-com-5258 61 4 Mr. Mr. NNP www-nytimes-com-5258 61 5 Soghoian Soghoian NNP www-nytimes-com-5258 61 6 of of IN www-nytimes-com-5258 61 7 the the DT www-nytimes-com-5258 61 8 A.C.L.U. a.c.l.u. NN www-nytimes-com-5258 61 9 , , , www-nytimes-com-5258 61 10 “ " `` www-nytimes-com-5258 61 11 The the DT www-nytimes-com-5258 61 12 bounties bounty NNS www-nytimes-com-5258 61 13 pale pale JJ www-nytimes-com-5258 61 14 in in IN www-nytimes-com-5258 61 15 comparison comparison NN www-nytimes-com-5258 61 16 to to IN www-nytimes-com-5258 61 17 what what WP www-nytimes-com-5258 61 18 the the DT www-nytimes-com-5258 61 19 government government NN www-nytimes-com-5258 61 20 pays pay VBZ www-nytimes-com-5258 61 21 . . . www-nytimes-com-5258 61 22 ” " '' www-nytimes-com-5258 61 23 The the DT www-nytimes-com-5258 61 24 military military JJ www-nytimes-com-5258 61 25 establishment establishment NN www-nytimes-com-5258 61 26 , , , www-nytimes-com-5258 61 27 he -PRON- PRP www-nytimes-com-5258 61 28 said say VBD www-nytimes-com-5258 61 29 , , , www-nytimes-com-5258 61 30 “ " `` www-nytimes-com-5258 61 31 created create VBN www-nytimes-com-5258 61 32 Frankenstein Frankenstein NNP www-nytimes-com-5258 61 33 by by IN www-nytimes-com-5258 61 34 feeding feed VBG www-nytimes-com-5258 61 35 the the DT www-nytimes-com-5258 61 36 market market NN www-nytimes-com-5258 61 37 . . . www-nytimes-com-5258 61 38 ” " '' www-nytimes-com-5258 61 39 In in IN www-nytimes-com-5258 61 40 many many JJ www-nytimes-com-5258 61 41 ways way NNS www-nytimes-com-5258 61 42 , , , www-nytimes-com-5258 61 43 the the DT www-nytimes-com-5258 61 44 United United NNP www-nytimes-com-5258 61 45 States States NNP www-nytimes-com-5258 61 46 government government NN www-nytimes-com-5258 61 47 created create VBD www-nytimes-com-5258 61 48 the the DT www-nytimes-com-5258 61 49 market market NN www-nytimes-com-5258 61 50 . . . www-nytimes-com-5258 62 1 When when WRB www-nytimes-com-5258 62 2 the the DT www-nytimes-com-5258 62 3 United United NNP www-nytimes-com-5258 62 4 States States NNP www-nytimes-com-5258 62 5 and and CC www-nytimes-com-5258 62 6 Israel Israel NNP www-nytimes-com-5258 62 7 used use VBD www-nytimes-com-5258 62 8 a a DT www-nytimes-com-5258 62 9 series series NN www-nytimes-com-5258 62 10 of of IN www-nytimes-com-5258 62 11 flaws flaw NNS www-nytimes-com-5258 62 12 — — : www-nytimes-com-5258 62 13 including include VBG www-nytimes-com-5258 62 14 one one CD www-nytimes-com-5258 62 15 in in IN www-nytimes-com-5258 62 16 a a DT www-nytimes-com-5258 62 17 Windows Windows NNP www-nytimes-com-5258 62 18 font font NN www-nytimes-com-5258 62 19 program program NN www-nytimes-com-5258 62 20 — — : www-nytimes-com-5258 62 21 to to TO www-nytimes-com-5258 62 22 unleash unleash VB www-nytimes-com-5258 62 23 what what WP www-nytimes-com-5258 62 24 became become VBD www-nytimes-com-5258 62 25 known know VBN www-nytimes-com-5258 62 26 as as IN www-nytimes-com-5258 62 27 the the DT www-nytimes-com-5258 62 28 Stuxnet Stuxnet NNP www-nytimes-com-5258 62 29 worm worm NN www-nytimes-com-5258 62 30 , , , www-nytimes-com-5258 62 31 a a DT www-nytimes-com-5258 62 32 sophisticated sophisticated JJ www-nytimes-com-5258 62 33 cyberweapon cyberweapon NN www-nytimes-com-5258 62 34 used use VBN www-nytimes-com-5258 62 35 to to TO www-nytimes-com-5258 62 36 temporarily temporarily RB www-nytimes-com-5258 62 37 cripple cripple VB www-nytimes-com-5258 62 38 Iran Iran NNP www-nytimes-com-5258 62 39 ’s ’s POS www-nytimes-com-5258 62 40 ability ability NN www-nytimes-com-5258 62 41 to to TO www-nytimes-com-5258 62 42 enrich enrich VB www-nytimes-com-5258 62 43 uranium uranium NN www-nytimes-com-5258 62 44 , , , www-nytimes-com-5258 62 45 it -PRON- PRP www-nytimes-com-5258 62 46 showed show VBD www-nytimes-com-5258 62 47 the the DT www-nytimes-com-5258 62 48 world world NN www-nytimes-com-5258 62 49 what what WP www-nytimes-com-5258 62 50 was be VBD www-nytimes-com-5258 62 51 possible possible JJ www-nytimes-com-5258 62 52 . . . www-nytimes-com-5258 63 1 It -PRON- PRP www-nytimes-com-5258 63 2 also also RB www-nytimes-com-5258 63 3 became become VBD www-nytimes-com-5258 63 4 a a DT www-nytimes-com-5258 63 5 catalyst catalyst NN www-nytimes-com-5258 63 6 for for IN www-nytimes-com-5258 63 7 a a DT www-nytimes-com-5258 63 8 cyberarms cyberarm NNS www-nytimes-com-5258 63 9 race race NN www-nytimes-com-5258 63 10 . . . www-nytimes-com-5258 64 1 When when WRB www-nytimes-com-5258 64 2 the the DT www-nytimes-com-5258 64 3 Stuxnet Stuxnet NNP www-nytimes-com-5258 64 4 code code NN www-nytimes-com-5258 64 5 leaked leak VBD www-nytimes-com-5258 64 6 out out IN www-nytimes-com-5258 64 7 of of IN www-nytimes-com-5258 64 8 the the DT www-nytimes-com-5258 64 9 Natanz Natanz NNP www-nytimes-com-5258 64 10 nuclear nuclear JJ www-nytimes-com-5258 64 11 enrichment enrichment NN www-nytimes-com-5258 64 12 plant plant NN www-nytimes-com-5258 64 13 in in IN www-nytimes-com-5258 64 14 Iran Iran NNP www-nytimes-com-5258 64 15 in in IN www-nytimes-com-5258 64 16 the the DT www-nytimes-com-5258 64 17 summer summer NN www-nytimes-com-5258 64 18 of of IN www-nytimes-com-5258 64 19 2010 2010 CD www-nytimes-com-5258 64 20 , , , www-nytimes-com-5258 64 21 the the DT www-nytimes-com-5258 64 22 flaws flaw NNS www-nytimes-com-5258 64 23 suddenly suddenly RB www-nytimes-com-5258 64 24 took take VBD www-nytimes-com-5258 64 25 on on RP www-nytimes-com-5258 64 26 new new JJ www-nytimes-com-5258 64 27 value value NN www-nytimes-com-5258 64 28 . . . www-nytimes-com-5258 65 1 Subsequent subsequent JJ www-nytimes-com-5258 65 2 discoveries discovery NNS www-nytimes-com-5258 65 3 of of IN www-nytimes-com-5258 65 4 sophisticated sophisticated JJ www-nytimes-com-5258 65 5 state state NN www-nytimes-com-5258 65 6 - - HYPH www-nytimes-com-5258 65 7 sponsored sponsor VBN www-nytimes-com-5258 65 8 computer computer NN www-nytimes-com-5258 65 9 viruses virus NNS www-nytimes-com-5258 65 10 named name VBN www-nytimes-com-5258 65 11 Flame Flame NNP www-nytimes-com-5258 65 12 and and CC www-nytimes-com-5258 65 13 Duqu Duqu NNP www-nytimes-com-5258 65 14 that that WDT www-nytimes-com-5258 65 15 used use VBD www-nytimes-com-5258 65 16 flaws flaw NNS www-nytimes-com-5258 65 17 to to TO www-nytimes-com-5258 65 18 spy spy VB www-nytimes-com-5258 65 19 on on IN www-nytimes-com-5258 65 20 computers computer NNS www-nytimes-com-5258 65 21 in in IN www-nytimes-com-5258 65 22 Iran Iran NNP www-nytimes-com-5258 65 23 have have VBP www-nytimes-com-5258 65 24 only only RB www-nytimes-com-5258 65 25 fueled fuel VBN www-nytimes-com-5258 65 26 interest interest NN www-nytimes-com-5258 65 27 . . . www-nytimes-com-5258 66 1 “ " `` www-nytimes-com-5258 66 2 I -PRON- PRP www-nytimes-com-5258 66 3 think think VBP www-nytimes-com-5258 66 4 it -PRON- PRP www-nytimes-com-5258 66 5 is be VBZ www-nytimes-com-5258 66 6 fair fair JJ www-nytimes-com-5258 66 7 to to TO www-nytimes-com-5258 66 8 say say VB www-nytimes-com-5258 66 9 that that IN www-nytimes-com-5258 66 10 no no DT www-nytimes-com-5258 66 11 one one NN www-nytimes-com-5258 66 12 anticipated anticipate VBD www-nytimes-com-5258 66 13 where where WRB www-nytimes-com-5258 66 14 this this DT www-nytimes-com-5258 66 15 was be VBD www-nytimes-com-5258 66 16 going go VBG www-nytimes-com-5258 66 17 , , , www-nytimes-com-5258 66 18 ” " '' www-nytimes-com-5258 66 19 said say VBD www-nytimes-com-5258 66 20 one one CD www-nytimes-com-5258 66 21 person person NN www-nytimes-com-5258 66 22 who who WP www-nytimes-com-5258 66 23 was be VBD www-nytimes-com-5258 66 24 involved involve VBN www-nytimes-com-5258 66 25 in in IN www-nytimes-com-5258 66 26 the the DT www-nytimes-com-5258 66 27 early early JJ www-nytimes-com-5258 66 28 American american JJ www-nytimes-com-5258 66 29 and and CC www-nytimes-com-5258 66 30 Israeli israeli JJ www-nytimes-com-5258 66 31 strategy strategy NN www-nytimes-com-5258 66 32 . . . www-nytimes-com-5258 67 1 “ " `` www-nytimes-com-5258 67 2 And and CC www-nytimes-com-5258 67 3 today today NN www-nytimes-com-5258 67 4 , , , www-nytimes-com-5258 67 5 no no DT www-nytimes-com-5258 67 6 one one NN www-nytimes-com-5258 67 7 is be VBZ www-nytimes-com-5258 67 8 sure sure JJ www-nytimes-com-5258 67 9 where where WRB www-nytimes-com-5258 67 10 it -PRON- PRP www-nytimes-com-5258 67 11 is be VBZ www-nytimes-com-5258 67 12 going go VBG www-nytimes-com-5258 67 13 to to TO www-nytimes-com-5258 67 14 end end VB www-nytimes-com-5258 67 15 up up RP www-nytimes-com-5258 67 16 . . . www-nytimes-com-5258 67 17 ” " '' www-nytimes-com-5258 67 18 In in IN www-nytimes-com-5258 67 19 a a DT www-nytimes-com-5258 67 20 prescient prescient NN www-nytimes-com-5258 67 21 paper paper NN www-nytimes-com-5258 67 22 in in IN www-nytimes-com-5258 67 23 2007 2007 CD www-nytimes-com-5258 67 24 , , , www-nytimes-com-5258 67 25 Charlie Charlie NNP www-nytimes-com-5258 67 26 Miller Miller NNP www-nytimes-com-5258 67 27 , , , www-nytimes-com-5258 67 28 a a DT www-nytimes-com-5258 67 29 former former JJ www-nytimes-com-5258 67 30 N.S.A. n.s.a. NN www-nytimes-com-5258 68 1 employee employee NN www-nytimes-com-5258 68 2 , , , www-nytimes-com-5258 68 3 described describe VBD www-nytimes-com-5258 68 4 the the DT www-nytimes-com-5258 68 5 profitable profitable JJ www-nytimes-com-5258 68 6 alternatives alternative NNS www-nytimes-com-5258 68 7 for for IN www-nytimes-com-5258 68 8 hackers hacker NNS www-nytimes-com-5258 68 9 who who WP www-nytimes-com-5258 68 10 may may MD www-nytimes-com-5258 68 11 have have VB www-nytimes-com-5258 68 12 otherwise otherwise RB www-nytimes-com-5258 68 13 turned turn VBN www-nytimes-com-5258 68 14 their -PRON- PRP$ www-nytimes-com-5258 68 15 information information NN www-nytimes-com-5258 68 16 about about IN www-nytimes-com-5258 68 17 flaws flaw NNS www-nytimes-com-5258 68 18 over over RP www-nytimes-com-5258 68 19 to to IN www-nytimes-com-5258 68 20 the the DT www-nytimes-com-5258 68 21 vendor vendor NN www-nytimes-com-5258 68 22 free free JJ www-nytimes-com-5258 68 23 , , , www-nytimes-com-5258 68 24 or or CC www-nytimes-com-5258 68 25 sold sell VBD www-nytimes-com-5258 68 26 it -PRON- PRP www-nytimes-com-5258 68 27 for for IN www-nytimes-com-5258 68 28 a a DT www-nytimes-com-5258 68 29 few few JJ www-nytimes-com-5258 68 30 thousand thousand CD www-nytimes-com-5258 68 31 dollars dollar NNS www-nytimes-com-5258 68 32 to to IN www-nytimes-com-5258 68 33 programs program NNS www-nytimes-com-5258 68 34 like like IN www-nytimes-com-5258 68 35 Tipping Tipping NNP www-nytimes-com-5258 68 36 Point Point NNP www-nytimes-com-5258 68 37 ’s ’s NNP www-nytimes-com-5258 68 38 Zero Zero NNP www-nytimes-com-5258 68 39 Day Day NNP www-nytimes-com-5258 68 40 Initiative Initiative NNP www-nytimes-com-5258 68 41 , , , www-nytimes-com-5258 68 42 now now RB www-nytimes-com-5258 68 43 run run VB www-nytimes-com-5258 68 44 by by IN www-nytimes-com-5258 68 45 Hewlett Hewlett NNP www-nytimes-com-5258 68 46 - - HYPH www-nytimes-com-5258 68 47 Packard Packard NNP www-nytimes-com-5258 68 48 , , , www-nytimes-com-5258 68 49 which which WDT www-nytimes-com-5258 68 50 used use VBD www-nytimes-com-5258 68 51 them -PRON- PRP www-nytimes-com-5258 68 52 to to TO www-nytimes-com-5258 68 53 enhance enhance VB www-nytimes-com-5258 68 54 their -PRON- PRP$ www-nytimes-com-5258 68 55 security security NN www-nytimes-com-5258 68 56 research research NN www-nytimes-com-5258 68 57 . . . www-nytimes-com-5258 69 1 He -PRON- PRP www-nytimes-com-5258 69 2 described describe VBD www-nytimes-com-5258 69 3 how how WRB www-nytimes-com-5258 69 4 one one CD www-nytimes-com-5258 69 5 American american JJ www-nytimes-com-5258 69 6 government government NN www-nytimes-com-5258 69 7 agency agency NN www-nytimes-com-5258 69 8 offered offer VBD www-nytimes-com-5258 69 9 him -PRON- PRP www-nytimes-com-5258 69 10 $ $ $ www-nytimes-com-5258 69 11 10,000 10,000 CD www-nytimes-com-5258 69 12 for for IN www-nytimes-com-5258 69 13 a a DT www-nytimes-com-5258 69 14 Linux Linux NNP www-nytimes-com-5258 69 15 bug bug NN www-nytimes-com-5258 69 16 . . . www-nytimes-com-5258 70 1 He -PRON- PRP www-nytimes-com-5258 70 2 asked ask VBD www-nytimes-com-5258 70 3 another another DT www-nytimes-com-5258 70 4 for for IN www-nytimes-com-5258 70 5 $ $ $ www-nytimes-com-5258 70 6 80,000 80,000 CD www-nytimes-com-5258 70 7 , , , www-nytimes-com-5258 70 8 which which WDT www-nytimes-com-5258 70 9 agreed agree VBD www-nytimes-com-5258 70 10 “ " `` www-nytimes-com-5258 70 11 too too RB www-nytimes-com-5258 70 12 quickly quickly RB www-nytimes-com-5258 70 13 , , , www-nytimes-com-5258 70 14 ” " '' www-nytimes-com-5258 70 15 Mr. Mr. NNP www-nytimes-com-5258 70 16 Miller Miller NNP www-nytimes-com-5258 70 17 wrote write VBD www-nytimes-com-5258 70 18 . . . www-nytimes-com-5258 71 1 “ " `` www-nytimes-com-5258 71 2 I -PRON- PRP www-nytimes-com-5258 71 3 had have VBD www-nytimes-com-5258 71 4 probably probably RB www-nytimes-com-5258 71 5 not not RB www-nytimes-com-5258 71 6 asked ask VBN www-nytimes-com-5258 71 7 for for IN www-nytimes-com-5258 71 8 enough enough JJ www-nytimes-com-5258 71 9 . . . www-nytimes-com-5258 71 10 ” " '' www-nytimes-com-5258 71 11 Because because IN www-nytimes-com-5258 71 12 the the DT www-nytimes-com-5258 71 13 bug bug NN www-nytimes-com-5258 71 14 did do VBD www-nytimes-com-5258 71 15 not not RB www-nytimes-com-5258 71 16 work work VB www-nytimes-com-5258 71 17 with with IN www-nytimes-com-5258 71 18 a a DT www-nytimes-com-5258 71 19 particular particular JJ www-nytimes-com-5258 71 20 flavor flavor NN www-nytimes-com-5258 71 21 of of IN www-nytimes-com-5258 71 22 Linux Linux NNP www-nytimes-com-5258 71 23 , , , www-nytimes-com-5258 71 24 Mr. Mr. NNP www-nytimes-com-5258 71 25 Miller Miller NNP www-nytimes-com-5258 71 26 eventually eventually RB www-nytimes-com-5258 71 27 sold sell VBD www-nytimes-com-5258 71 28 it -PRON- PRP www-nytimes-com-5258 71 29 for for IN www-nytimes-com-5258 71 30 $ $ $ www-nytimes-com-5258 71 31 50,000 50,000 CD www-nytimes-com-5258 71 32 . . . www-nytimes-com-5258 72 1 But but CC www-nytimes-com-5258 72 2 the the DT www-nytimes-com-5258 72 3 take take NN www-nytimes-com-5258 72 4 - - HYPH www-nytimes-com-5258 72 5 away away NN www-nytimes-com-5258 72 6 for for IN www-nytimes-com-5258 72 7 him -PRON- PRP www-nytimes-com-5258 72 8 and and CC www-nytimes-com-5258 72 9 his -PRON- PRP$ www-nytimes-com-5258 72 10 fellow fellow JJ www-nytimes-com-5258 72 11 hackers hacker NNS www-nytimes-com-5258 72 12 was be VBD www-nytimes-com-5258 72 13 clear clear JJ www-nytimes-com-5258 72 14 : : : www-nytimes-com-5258 72 15 There there EX www-nytimes-com-5258 72 16 was be VBD www-nytimes-com-5258 72 17 serious serious JJ www-nytimes-com-5258 72 18 money money NN www-nytimes-com-5258 72 19 to to TO www-nytimes-com-5258 72 20 be be VB www-nytimes-com-5258 72 21 made make VBN www-nytimes-com-5258 72 22 selling sell VBG www-nytimes-com-5258 72 23 the the DT www-nytimes-com-5258 72 24 flaws flaw NNS www-nytimes-com-5258 72 25 . . . www-nytimes-com-5258 73 1 At at IN www-nytimes-com-5258 73 2 their -PRON- PRP$ www-nytimes-com-5258 73 3 conventions convention NNS www-nytimes-com-5258 73 4 , , , www-nytimes-com-5258 73 5 hackers hacker NNS www-nytimes-com-5258 73 6 started start VBD www-nytimes-com-5258 73 7 flashing flash VBG www-nytimes-com-5258 73 8 signs sign NNS www-nytimes-com-5258 73 9 that that WDT www-nytimes-com-5258 73 10 read read VBP www-nytimes-com-5258 73 11 , , , www-nytimes-com-5258 73 12 “ " `` www-nytimes-com-5258 73 13 No no RB www-nytimes-com-5258 73 14 more more RBR www-nytimes-com-5258 73 15 free free JJ www-nytimes-com-5258 73 16 bugs bug NNS www-nytimes-com-5258 73 17 . . . www-nytimes-com-5258 73 18 ” " '' www-nytimes-com-5258 73 19 Hackers hacker NNS www-nytimes-com-5258 73 20 like like IN www-nytimes-com-5258 73 21 Mr. Mr. NNP www-nytimes-com-5258 73 22 Auriemma Auriemma NNP www-nytimes-com-5258 73 23 , , , www-nytimes-com-5258 73 24 who who WP www-nytimes-com-5258 73 25 once once RB www-nytimes-com-5258 73 26 gave give VBD www-nytimes-com-5258 73 27 away away RB www-nytimes-com-5258 73 28 their -PRON- PRP$ www-nytimes-com-5258 73 29 bugs bug NNS www-nytimes-com-5258 73 30 to to IN www-nytimes-com-5258 73 31 software software NN www-nytimes-com-5258 73 32 vendors vendor NNS www-nytimes-com-5258 73 33 and and CC www-nytimes-com-5258 73 34 antivirus antivirus NN www-nytimes-com-5258 73 35 makers maker NNS www-nytimes-com-5258 73 36 , , , www-nytimes-com-5258 73 37 now now RB www-nytimes-com-5258 73 38 sound sound VBP www-nytimes-com-5258 73 39 like like IN www-nytimes-com-5258 73 40 union union NN www-nytimes-com-5258 73 41 organizers organizer NNS www-nytimes-com-5258 73 42 declaring declare VBG www-nytimes-com-5258 73 43 their -PRON- PRP$ www-nytimes-com-5258 73 44 rights right NNS www-nytimes-com-5258 73 45 . . . www-nytimes-com-5258 74 1 “ " `` www-nytimes-com-5258 74 2 Providing provide VBG www-nytimes-com-5258 74 3 professional professional JJ www-nytimes-com-5258 74 4 work work NN www-nytimes-com-5258 74 5 for for IN www-nytimes-com-5258 74 6 free free JJ www-nytimes-com-5258 74 7 to to IN www-nytimes-com-5258 74 8 a a DT www-nytimes-com-5258 74 9 vendor vendor NN www-nytimes-com-5258 74 10 is be VBZ www-nytimes-com-5258 74 11 unethical unethical JJ www-nytimes-com-5258 74 12 , , , www-nytimes-com-5258 74 13 ” " '' www-nytimes-com-5258 74 14 Mr. Mr. NNP www-nytimes-com-5258 74 15 Auriemma Auriemma NNP www-nytimes-com-5258 74 16 said say VBD www-nytimes-com-5258 74 17 . . . www-nytimes-com-5258 75 1 “ " `` www-nytimes-com-5258 75 2 Providing provide VBG www-nytimes-com-5258 75 3 professional professional JJ www-nytimes-com-5258 75 4 work work NN www-nytimes-com-5258 75 5 almost almost RB www-nytimes-com-5258 75 6 for for IN www-nytimes-com-5258 75 7 free free JJ www-nytimes-com-5258 75 8 to to IN www-nytimes-com-5258 75 9 security security NN www-nytimes-com-5258 75 10 companies company NNS www-nytimes-com-5258 75 11 that that WDT www-nytimes-com-5258 75 12 make make VBP www-nytimes-com-5258 75 13 their -PRON- PRP$ www-nytimes-com-5258 75 14 business business NN www-nytimes-com-5258 75 15 with with IN www-nytimes-com-5258 75 16 your -PRON- PRP$ www-nytimes-com-5258 75 17 research research NN www-nytimes-com-5258 75 18 is be VBZ www-nytimes-com-5258 75 19 even even RB www-nytimes-com-5258 75 20 more more RBR www-nytimes-com-5258 75 21 unethical unethical JJ www-nytimes-com-5258 75 22 . . . www-nytimes-com-5258 75 23 ” " '' www-nytimes-com-5258 75 24 Experts expert NNS www-nytimes-com-5258 75 25 say say VBP www-nytimes-com-5258 75 26 there there EX www-nytimes-com-5258 75 27 is be VBZ www-nytimes-com-5258 75 28 limited limited JJ www-nytimes-com-5258 75 29 incentive incentive NN www-nytimes-com-5258 75 30 to to TO www-nytimes-com-5258 75 31 regulate regulate VB www-nytimes-com-5258 75 32 a a DT www-nytimes-com-5258 75 33 market market NN www-nytimes-com-5258 75 34 in in IN www-nytimes-com-5258 75 35 which which WDT www-nytimes-com-5258 75 36 government government NN www-nytimes-com-5258 75 37 agencies agency NNS www-nytimes-com-5258 75 38 are be VBP www-nytimes-com-5258 75 39 some some DT www-nytimes-com-5258 75 40 of of IN www-nytimes-com-5258 75 41 the the DT www-nytimes-com-5258 75 42 biggest big JJS www-nytimes-com-5258 75 43 participants participant NNS www-nytimes-com-5258 75 44 . . . www-nytimes-com-5258 76 1 “ " `` www-nytimes-com-5258 76 2 If if IN www-nytimes-com-5258 76 3 you -PRON- PRP www-nytimes-com-5258 76 4 try try VBP www-nytimes-com-5258 76 5 to to TO www-nytimes-com-5258 76 6 limit limit VB www-nytimes-com-5258 76 7 who who WP www-nytimes-com-5258 76 8 you -PRON- PRP www-nytimes-com-5258 76 9 do do VBP www-nytimes-com-5258 76 10 business business NN www-nytimes-com-5258 76 11 with with IN www-nytimes-com-5258 76 12 , , , www-nytimes-com-5258 76 13 there there EX www-nytimes-com-5258 76 14 ’s ’ VBZ www-nytimes-com-5258 76 15 the the DT www-nytimes-com-5258 76 16 possibility possibility NN www-nytimes-com-5258 76 17 you -PRON- PRP www-nytimes-com-5258 76 18 will will MD www-nytimes-com-5258 76 19 get get VB www-nytimes-com-5258 76 20 shut shut VBN www-nytimes-com-5258 76 21 out out RP www-nytimes-com-5258 76 22 , , , www-nytimes-com-5258 76 23 ” " '' www-nytimes-com-5258 76 24 Mr. Mr. NNP www-nytimes-com-5258 76 25 Schmidt Schmidt NNP www-nytimes-com-5258 76 26 said say VBD www-nytimes-com-5258 76 27 . . . www-nytimes-com-5258 77 1 “ " `` www-nytimes-com-5258 77 2 If if IN www-nytimes-com-5258 77 3 someone someone NN www-nytimes-com-5258 77 4 comes come VBZ www-nytimes-com-5258 77 5 to to IN www-nytimes-com-5258 77 6 you -PRON- PRP www-nytimes-com-5258 77 7 with with IN www-nytimes-com-5258 77 8 a a DT www-nytimes-com-5258 77 9 bug bug NN www-nytimes-com-5258 77 10 that that WDT www-nytimes-com-5258 77 11 could could MD www-nytimes-com-5258 77 12 affect affect VB www-nytimes-com-5258 77 13 millions million NNS www-nytimes-com-5258 77 14 of of IN www-nytimes-com-5258 77 15 devices device NNS www-nytimes-com-5258 77 16 and and CC www-nytimes-com-5258 77 17 says say VBZ www-nytimes-com-5258 77 18 , , , www-nytimes-com-5258 77 19 ‘ ' `` www-nytimes-com-5258 77 20 You -PRON- PRP www-nytimes-com-5258 77 21 would would MD www-nytimes-com-5258 77 22 be be VB www-nytimes-com-5258 77 23 the the DT www-nytimes-com-5258 77 24 only only JJ www-nytimes-com-5258 77 25 one one CD www-nytimes-com-5258 77 26 to to TO www-nytimes-com-5258 77 27 have have VB www-nytimes-com-5258 77 28 this this DT www-nytimes-com-5258 77 29 if if IN www-nytimes-com-5258 77 30 you -PRON- PRP www-nytimes-com-5258 77 31 pay pay VBP www-nytimes-com-5258 77 32 my -PRON- PRP$ www-nytimes-com-5258 77 33 fee fee NN www-nytimes-com-5258 77 34 , , , www-nytimes-com-5258 77 35 ’ ' '' www-nytimes-com-5258 77 36 there there EX www-nytimes-com-5258 77 37 will will MD www-nytimes-com-5258 77 38 always always RB www-nytimes-com-5258 77 39 be be VB www-nytimes-com-5258 77 40 someone someone NN www-nytimes-com-5258 77 41 inclined inclined JJ www-nytimes-com-5258 77 42 to to TO www-nytimes-com-5258 77 43 pay pay VB www-nytimes-com-5258 77 44 it -PRON- PRP www-nytimes-com-5258 77 45 . . . www-nytimes-com-5258 77 46 ” " '' www-nytimes-com-5258 77 47 “ " `` www-nytimes-com-5258 77 48 Unfortunately unfortunately RB www-nytimes-com-5258 77 49 , , , www-nytimes-com-5258 77 50 ” " '' www-nytimes-com-5258 77 51 he -PRON- PRP www-nytimes-com-5258 77 52 said say VBD www-nytimes-com-5258 77 53 , , , www-nytimes-com-5258 77 54 “ " `` www-nytimes-com-5258 77 55 dancing dance VBG www-nytimes-com-5258 77 56 with with IN www-nytimes-com-5258 77 57 the the DT www-nytimes-com-5258 77 58 devil devil NN www-nytimes-com-5258 77 59 in in IN www-nytimes-com-5258 77 60 cyberspace cyberspace NN www-nytimes-com-5258 77 61 has have VBZ www-nytimes-com-5258 77 62 been be VBN www-nytimes-com-5258 77 63 pretty pretty RB www-nytimes-com-5258 77 64 common common JJ www-nytimes-com-5258 77 65 . . . www-nytimes-com-5258 77 66 ” " '' www-nytimes-com-5258 77 67 Advertisement Advertisement NNP www-nytimes-com-5258 77 68 Continue Continue NNP www-nytimes-com-5258 77 69 reading read VBG www-nytimes-com-5258 77 70 the the DT www-nytimes-com-5258 77 71 main main JJ www-nytimes-com-5258 77 72 story story NN www-nytimes-com-5258 77 73 Site Site NNP www-nytimes-com-5258 77 74 Index Index NNP www-nytimes-com-5258 77 75 Site Site NNP www-nytimes-com-5258 77 76 Information Information NNP www-nytimes-com-5258 77 77 Navigation Navigation NNP www-nytimes-com-5258 77 78 © © NNP www-nytimes-com-5258 77 79   _SP www-nytimes-com-5258 77 80 2021 2021 CD www-nytimes-com-5258 77 81   _SP www-nytimes-com-5258 77 82 The the DT www-nytimes-com-5258 77 83 New New NNP www-nytimes-com-5258 77 84 York York NNP www-nytimes-com-5258 77 85 Times Times NNP www-nytimes-com-5258 77 86 Company Company NNP www-nytimes-com-5258 77 87 NYTCo NYTCo VBZ www-nytimes-com-5258 77 88 Contact contact NN www-nytimes-com-5258 77 89 Us Us NNP www-nytimes-com-5258 77 90 Accessibility accessibility NN www-nytimes-com-5258 77 91 Work work VBP www-nytimes-com-5258 77 92 with with IN www-nytimes-com-5258 77 93 us -PRON- PRP www-nytimes-com-5258 77 94 Advertise Advertise NNP www-nytimes-com-5258 77 95 T T NNP www-nytimes-com-5258 77 96 Brand brand NN www-nytimes-com-5258 77 97 Studio studio NN www-nytimes-com-5258 77 98 Your -PRON- PRP$ www-nytimes-com-5258 77 99 Ad ad NN www-nytimes-com-5258 77 100 Choices choice NNS www-nytimes-com-5258 77 101 Privacy Privacy NNP www-nytimes-com-5258 77 102 Policy Policy NNP www-nytimes-com-5258 77 103 Terms term NNS www-nytimes-com-5258 77 104 of of IN www-nytimes-com-5258 77 105 Service service NN www-nytimes-com-5258 77 106 Terms term NNS www-nytimes-com-5258 77 107 of of IN www-nytimes-com-5258 77 108 Sale sale NN www-nytimes-com-5258 77 109 Site Site NNP www-nytimes-com-5258 77 110 Map Map NNP www-nytimes-com-5258 77 111 Canada Canada NNP www-nytimes-com-5258 77 112 International International NNP www-nytimes-com-5258 77 113 Help Help NNP www-nytimes-com-5258 77 114 Subscriptions subscription NNS