The New Vandal

Search

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
christmas-bulbsgif
460690594.jpg
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
Cyber vandals are individuals who damage information infrastructures purely for their own enjoyment and pleasure. Their primary motivation is not financial; it is the desire to prove that the feat could be accomplished. Once inside they leave their mark so there is no denying their presence. At first brush this may seem more of a prank than an attack aimed at destruction. The effect on business, however, is undeniable. These types of attacks fall into the category of DOS or Denial of Service attack. The affected site must be shut down and repaired before it can be returned to normal operation. The massages left behind vary in tone: sometimes racial, sometimes profane, and sometimes political. Whatever the message, the effect is always disruptive.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
[h=2]Traditional Vandalism[/h]One of the terms used to describe traditional vandalism is "Graffiti." Webster's dictionary defines graffiti as "A drawing or inscription made on a wall in a public place. Graffiti has been with us since the beginning of history and its evidence can be seen in most of the explorations of the early cave dwellings. Early man painted the animals on which he depended for sustenance, his weapons of war and hunting as well as his everyday life. Graffiti can undeniably be referred to as a tool used for communicating.
The term vandal derives its roots from the early period between 406 and 572 when the Germanic barbarians completed their migrations into the West. As the Roman world collapsed, many Germanic tribes reached a peak of brief glory; others were destroyed in a series of little-known wars. To the Germanic people, this was considered to be the "heroic age" which was a time of adventure and great displays of power.
The Vandals were a Germanic tribe of Jutland (now in Denmark), who migrated to the valley of the Odra (Oder) River about the 5th century BC. During the 2nd and 3rd centuries AD they settled along the Danube River. This is approximately when they began their conquests over Rome. Today's usage of the word "vandal" reflects the dread and hostility the tribe precipitated in against other people, especially the Romans, by their looting and pillaging of the many villages they conquered. (Source: http://campus.edu.history/webchron/westeurope/vandals.html)
Modern vandalism, while not evoking the same fear as the earlier namesake, evoked feelings of anger and frustration from residents, businesses and governmental agencies who seemed to have no answer to the endless displays of artistry. Steps were taken to counteract this growing phenomenon. Special paints were developed for Subway trains and stations making it easy to remove these unwanted symbols. This worked largely to eliminate the behavior in the subways but above ground the tradition continued.
Community pride and awareness programs were undertaken in an effort to stop the practice in neighborhoods. While this approach achieved some level of success, it did not succeed in eliminating the practice that was used mostly by gangs as a means to communicate turf ownership and gang affiliations.
Vandalism is far more frightening in some of the other scenarios that we have seen over the years. Vandals break into churches; cemeteries and homes to express racial and ethnic hate. This type of behavior is more ominous because it carries with it a certain degree of violence.



Recent Events:

  • The emblem on Rochester High School, which is located on Walton Boulevard and Livernois, has paint splattered all over it, and the skylight on the roof of the building has several swastikas painted on the windows. A parent of a student at the school in Rochester Hills called News4 about the vandalism after he saw it when he took his daughter to orientation on Monday. The sheriff's department confirmed that this was the work of vandals and said that they are taking this very seriously. The sheriff's department said that they also found a painted beer can on the roof of the building and that they are going to dust it for fingerprints.
  • A series of church vandalisms over the weekend has stumped authorities in the Portland, Oregon area. An investigation is now underway at the ten vandalized churches, six of which were LDS chapels. Investigators are looking into the case as a possible hate crime. "I'm comfortable with the belief that there has got to be some connection. There's too many for it to be coincidental," said one local authority.
  • Hamblin Hall, Davis Fine Arts Building, and the Student Cafeteria have all been attacked by a string of vandalism, graffiti, spray painting and other acts of destruction. Hamblin and Davis were attacked twice, and the cafeteria attacked once, all by unknown assailant(s). The assailant(s) gained access, destroyed equipment and spray painted property, according to Flores.

Geography as well as social factors limit these types of vandalistic acts. They tend not to escalate as quickly as cyber vandals who are not limited by geographic boundaries. The numbers of people who can commit these acts of vandalism are limited to their proximity to the sites, while cyber vandals can attack any site connected to the Internet.


 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
[h=2]Effect of the Internet on Vandals[/h]The Internet age has spawned a new type of vandal, commonly referred to as cyber vandals. This medium has allowed the vandal to extend his/her reach beyond the boundaries of city, state and, indeed, continents. The cyber vandal can spread messages of hate and way beyond the traditional boundaries. The impact now is not the defacing of structures and buildings, but now on the business frontier, cyberspace.
The explosion of cyber vandals has had a profound impact on both government and industry. The focus thus far has been on the impact of vandals on industry so let's now consider the impact on government.
The attempt to exploit the relatively open character of the Internet to cripple targeted sites is an act of sabotage that can have no progressive merit. Moreover, it can only strengthen those commercial and government forces that want to clamp down on the World Wide Web and restrict the free flow of information and debate along this powerful international medium. These acts of cyber vandalism play directly into the hands of government agencies that have been pressing for increased police powers over the Internet. The FBI investigation will doubtless be used to test the ability of the state to monitor Internet traffic and pinpoint the origin of messages. The FBI has already begun examining the records of the target companies and their partners on the Web and collecting logs from Internet service providers that can show where transmissions originated.
FBI Director Louis Freeh has been pushing for Congress to grant the bureau greater power to make the nation's telephone and computer networks more accessible to wiretaps and other forms of surveillance. Last July, the Clinton administration circulated a plan for an extensive software system to monitor government computers and possibly those of private industry. The network, known as the Federal Intrusion Detection Network, or Fidnet, alarmed civil libertarians who said it could be used to curtail privacy on the Internet. The Justice Department was requesting an additional $37 million in next year's budget to fight the growing problem of computer crime.

These ideas will no doubt gain momentum and strength as the economy becomes affected by this and other forms of intrusion. So far, the disruptions appear to have had a somewhat limited effect on the stocks of the affected companies. But they have, however, made investors nervous, and market analysts say the disruptions contributed to a selloff of Internet stocks.

The cyber vandal has also spawned a new niche for technology companies by allowing the area of data protection to become increasingly popular. The target market for these software companies are no longer limited exclusively to businesses as the home computer market is now seen as another area that needs protection. As more and more people add broad band "always on" access to their home networks it becomes increasingly important to protect the data that resides on the local machines. Listed below is an advertisement for a software company that seeks to cover this growing market.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
President Barack Obama may have just been being true to his inner lawyer, seeking more linguistic precision when he [FONT=Tiempos, Georgia, serif]characterized[/FONT] the North Korean hack attack on Sony Pictures as being more like “cybervandalism” than an act of war. But he should not have said it.

In the first place, it served no beneficial purpose to minimize what Kim Jong Un’s minions had done — which was nothing less than the first significant state-sponsored destructive cyberattack on the United States — except to attempt to reduce the growing pressure on himself and his administration to take retaliatory action. But more importantly, we are at a critical juncture in the dawning days of the cyber era, and it is a moment when U.S. interests would be better served by a message from the White House that was strong enough to be an effective deterrent against future attacks. Indeed, the Sony hack demonstrates the urgency with which the United States must develop policies that send a clear signal to would-be attackers that they will pay a high price for seeking to strike the United States and that the U.S. government is relentlessly committed to protecting our assets and making it increasingly difficult for future attacks to succeed. And the events of the past few days indicate that we have yet to develop such policies.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
Equating the attack with vandalism pushes it into the realm of criminal behavior to be left to lawyers and the courts. This is consistent with the U.S. response to a Chinese hack earlier this year in which we identified the perpetrators and indicted five of them on charges that they too hacked U.S. businesses. This action was seen as largely symbolic and toothless because, of course, none of those perpetrators will ever go any place where we would actually be able to apprehend or prosecute them. It was an empty threat. And that’s just the problem. Despite years of discussions of the growing importance of cyber-risks, the United States still does not have an effective or even very clear stance on how it will deal with cyberattacks, particularly those against private targets.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
In fact, last week’s events stood as a kind of poignant commentary on U.S. national security policy. We were so busy celebrating a long-overdue milestone in setting aside our failed Cold War relic of a Cuba policy that we neglected to fully address the fact that we were once again caught unprepared at the dawn of what I have previously called the Cool War. The Cold War was a period in which the threat of nuclear catastrophe kept enemies off the battlefield. In the era of Cool War, the absence of effective deterrents could well usher in an era of permanent conflict in which countless adversaries chip away at each other, sometimes with little effect, sometimes with invisible but substantial economic or social costs, sometimes producing calamity and the loss of life.
The problem of developing the right kind of deterrent policies is not an easy one. But it is just the kind of urgent hard problem with which we should be grappling both within the government and in a public-private national conversation. For example, as the North Korean instance reveals, in cyberconflict, asymmetry offers special challenges. Whereas a kinetic attack from a smaller adversary may lead a larger country to also respond kinetically, which, even if “proportional,” can be more devastating to that smaller adversary than the initial attack may have been, in the case of cyberattacks, the smaller actor may be home to many fewer cybertargets, perhaps none comparable — especially if they are a nonstate actor or are supported by a small infrastructure, as in the case of a poor rogue state like North Korea.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
Further, we are a free country and, as we hopefully have realized, must be on guard against excessive government interference in the connective tissue, the nervous system, of our information society. That means we must be careful among the limited options we have not to embrace any that might compromise the openness of our society that we are seeking to protect.
In addition, especially in such asymmetric attacks like the Sony hack, our options are pretty limited. Economic sanctions are likely to be ineffective because the North Koreans are pretty much sanctioned up the wazoo already and because the regime in Pyongyang has already indicated it is willing without flinching to pass on economic hardships to its people while preserving the excesses enjoyed by its leaders. Legal options, as discussed above, are unlikely to work.
Global pressure is also tough to wield against an isolated nation. In a well done and revealing exclusive report in the New York Times, David Sanger, Nicole Perlroth, and Eric Schmitt describe how the Obama administration sought Beijing’s help “in blocking North Korea’s ability to launch cyberattacks.” One can only imagine how awkward that exchange was, given the fact that the United States has been beating up on the Chinese for several years now on the same subject. The Times reported: “So far, the Chinese have not responded. Their response would be critical, since virtually all of North Korea’s telecommunications run through Chinese-operated networks.”
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
The report also noted that the president’s top national security officials spent much of last week engaged in meetings trying to develop options for responding to the North Korean attack. The fact that such an incident was utterly predictable and happens thousands of times a year (though never before on this scale or with such significant consequences) reveals a serious flaw in the planning efforts of the U.S. government in this respect — especially since a quick, decisive response would help send a message to future attackers that the United States was prepared to deal with them too. (The failure to communicate effectively with Sony about the potential consequences of its infamous decision to pull The Interview from theaters was also a problem given the message the action sent. The president was tough on this point after the fact. But given that the CEO of Sony Pictures and his top associate were both big Obama financial bundlers, it would seem logical that the White House could have tried to guide them in a better direction earlier. In fact, given that relationship, I’d love to see the full extent of the communications between Sony’s leadership and its friends in the West Wing.)
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
Another problem comes with the fact that the attack was on a private company. Some in the media suggested that this meant it was not really the business of the U.S. government. First, the U.S. government has already acknowledged the attack was its business. In meetings with Chinese leaders in California last June, it was just such attacks (by a foreign actor on U.S. private-sector interests) that was the primary focus of cyber-related discussions. Because the United States is the world’s largest and most advanced economy, it possesses many more such targets than anywhere else in the world — tempting for criminals, rivals, and enemies alike. And for those who might suggest that a hack attack by a foreign government or terrorist group should not be a subject for national security officials, ask what might be done if the attack were done with explosives.
In such an attack, particularly if it were very costly, there would be no hesitation about considering U.S. military options among those weighed in response. This is well known. It reduces our risk of such attacks. In fact, it is just such a policy that made the likelihood of North Korean attacks on U.S. theaters showing The Interview so unlikely. If it could be proved the North Koreans were behind it, in fact, there would have been no other option but for the United States to strike back militarily.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
I am not suggesting that we should go to war with North Korea over the Sony cyberattack. Nor am I suggesting traditional military action — though I believe that we should send the message that it is always an option that we will consider when it is essential to our national defense. But I do believe that if we do not demonstrate to the hackers and cybergenerals of this world that there are very real consequences to attacking the United States, be it a public or private target, then for all the reasons cited above, such attackers might think they can act with impunity, and we may well enter a period of war without end and permanent national insecurity.
In the New York Times piece, it is reported that the White House has ruled out a “demonstration strike” on a North Korean target that would clearly signal our willingness and capability of responding in kind. That is, I believe, an error. For example, one potential target described in the article is Yongbyon — “the center of North Korea’s nuclear program, where the state has invested huge sums to produce plutonium and uranium fuel for its small arsenal of nuclear weapons.” It is noted that a potential attack on the Yongbyon facility would be more difficult for U.S. cyberwarriors than the one conducted against Iran as part of the Stuxnet operation. But that does not mean it should not be considered, especially since it would be a twofer: It would set North Korea’s nuclear program back and would do so in a way unlikely to affect North Korean civilians.
Whether the target were Yongbyon or some other facility, sooner rather than later it is important for cyberadversaries to get the message that the United States is going to do more than hurl the expected “we’re considering all options” book at them — when they know how little that means. And while it is true that the United States has many more vulnerable targets, that vulnerability should not be allowed to cow us into inaction — a measure that only compounds the risk of further attacks.
The United States needs to accept that we are in a new era and that future such attacks – high-profile attacks with significant social, economic, and political consequences — are inevitable. The president and his team should seize this moment to develop in advance not only cybercapabilities but an array of public, diplomatic, military, and other responses that will actually create the most effective deterrent to future attacks that is possible. And then, beyond that, it is time the United States considered something like the big Civil Defense push of the early nuclear era in which the U.S. government launched a major effort to work with the private sector to increase awareness of risks and to promote hardening our assets and honing our responses to future attacks in a far more comprehensive way than we had done to date. (Some sectors, particularly those associated with critical infrastructure, have been working with the government. But as the Sony situation indicated, the best preventive work has been done in only a few sectors — like finance — and even in these, much more needs to be done.)
This should be a big initiative of the White House, the Department of Homeland Security, the Justice Department, and the rest of the government. Further, its effectiveness would be enhanced greatly if key allies were enlisted within the private-sector community. For example, insurance companies, institutional investors, and others should be encouraged to weigh cyberpreparedness as they evaluate the risks of individual companies — creating incentives for them to move faster and to be smarter. Boards should get the clear message that lack of cyberpreparedness will invite liability that no company should tolerate. The program should build on existing efforts, but the events of the past week should underscore that much more can and should be done.
These are the early days of the cyber era. This administration could not be expected to have fully formed ideas on these issues, and indeed, they have made some important initiatives in this area. But it is clear that much work still needs to be done. Just as we belatedly closed the book on one of the last vestiges of our Cold War policy, yet another relationship that is a throwback to that era reminded us that it is time to start writing a new playbook and that the longer we delay, the more likely it is that further and more damaging illustrations of our lack of preparation will manifest themselves.
Chip Somodevilla/Getty Images News
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
john-mccain.jpg


On CNN’s “State of the Union,” Sen. John McCain (R-Arizona) countered President Obama’s characterization of the hacking attack on Sony Pictures Entertainment as “cyber-vandalism.”
“The president does not understand that this is … a manifestation of a new form of warfare,” McCain told Candy Crowley. “When you destroy economies, when you are able to impose censorship on the world and especially the United States of America, it’s more than vandalism.”
“It’s a new form of warfare that we’re involved in, and we need to react and react vigorously, including reimposing sanctions that were lifted under the Bush administration, including other actions and that will squeeze them for economically. But most of all, we have to really work together with the president and the Congress to come up with counters and abilities to respond, but more importantly to prevent.”
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
(Reuters) - China said on Monday it opposed all forms of cyberattacks but there was no proof that North Korea was responsible for the hacking of Sony Pictures, as the United States has said.
 

New member
Joined
Nov 10, 2010
Messages
78,682
Tokens
[h=1]North Korea partially back online after internet collapse[/h]
_79902401_79902399.jpg



_79902401_79902399.jpg
North Korea's state news agency has seen service restored


Some internet services have been restored in North Korea after an almost unprecedented internet outage, amid a cyber security row with the US.
Though there has been no comment from the authorities in Pyongyang, US experts reported the restoration.
Some analysts say the country's web access was cut entirely for a time.
Washington said it would launch a proportional response to a cyber-attack on Sony Pictures, which made a comedy about North Korean leader Kim Jong-un.
Officials would not comment on any US involvement in the current outages.
Meanwhile, China's permanent representative to the United Nations has called for all sides to avoid an escalation of tension on the Korean Peninsula after the UN security council put the North's human rights record on its agenda.


 

Forum statistics

Threads
1,119,810
Messages
13,573,488
Members
100,871
Latest member
Legend813
The RX is the sports betting industry's leading information portal for bonuses, picks, and sportsbook reviews. Find the best deals offered by a sportsbook in your state and browse our free picks section.FacebookTwitterInstagramContact Usforum@therx.com