Crime is still Crime!
Article from Network World: http://www.networkworld.com/news/2011/012011-retaliation-answer-cyber-attacks.html?hpg1=bn
This may come off as somewhat of a rant but.. Disclosure given in advance.
In this Handlers opinion there is no such thing as benevolent crime. Network world is running a piece that states "Is retaliation the answer to cyber attacks?" Pretty sure that I can speak for the handler team that if that was the answer we would be doing it. It might be a little bold to state that but I guarantee you that most of us have at least thought it occasionally.
Now after reading this article in depth it does make some significant arguments for and against but law is the law. We have common international law, regional law and local law. It seems that government and local law enforcement should be the responsible parties for "retaliation or investigation." If we are at a point of taking the law into our own hands then perhaps it is evident that pressure should be placed on local and regional government to take Cybercrime serious.
The article reminds me of a time in US History usually referred to as "The Old West" when law was sometimes conducted in what we here in the US of A call "Frontier Justice." There is probably reference to this in most cultural history and it seems that the Internet may still be in this phase of growth.
The Internet Storm Center is dedicated to understanding and defending against the threat and before heeding the advice of "Retaliate" remember that you may be breaking the law in your local region. In several SANS classes they teach "Get Written Permission from the owner of the network." We teach this for a reason.
So, to conclude, a quote from one of my favorite movies "You want that gun, pick it up. I wish you would." -- Rio Bravo, said by the late John Wayne as the character Chance. The concept that needs to be brought across is that things escalate, and you should weigh your decisions carefully as well as legal responsibilities.
Question to the Diary readers? What are your thoughts on the subject?
Richard Porter
--- ISC Handler on Duty
Updated:
A reader wrote in brought up a valid point about countries not will in to give up rights. I will concede to the fact that governments do not cooperate enough however do not feel that regional and local government need to give up their authority. In fact it could be argued that government and law enforcement need to cooperate even more on a global scale.
The reader also commented that malicious traffic coming into a certain country was disconnected at ingress/egress points and attacks drastically dropped. This is something that governments can do is control what comes and goes from their country and in my opinion, for better or worse, includes data streams.
Thanks for the long reply Simon! I it was a pleasure to read it this morning!
Comments
Anonymous
Dec 3rd 2022
9 months ago
Anonymous
Dec 3rd 2022
9 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
https://defineprogramming.com/
Dec 26th 2022
9 months ago
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
https://defineprogramming.com/
Dec 26th 2022
9 months ago
rthrth
Jan 2nd 2023
8 months ago