IBM X-Force 2012 Trend and Risk Report March 2013 IBM Security Systems IBM X-Force 2012 Trend and Risk Report

Total Page:16

File Type:pdf, Size:1020Kb

IBM X-Force 2012 Trend and Risk Report March 2013 IBM Security Systems IBM X-Force 2012 Trend and Risk Report IBM X-Force 2012 Trend and Risk Report March 2013 IBM Security Systems IBM X-Force 2012 Trend and Risk Report Contributors Contributors Producing the IBM X-Force Trend and Risk Report is a dedication in collaboration across all of IBM. We would like to thank the following individuals for their attention and contribution to the publication of this report. About IBM X-Force IBM X-Force® research and development teams Contributor Title study and monitor the latest threat trends Andrew Franklin Senior Incident Response Analyst, IBM Professional Services including vulnerabilities, exploits and active Brad Sherrill Manager, IBM X-Force Database Team attacks, viruses and other malware, spam, Bryan Ivey Team Lead, MSS Cyber Threat and Intelligence Analyst phishing, and malicious web content. In addition Carsten Hagemann IBM X-Force Software Engineer, Content Security to advising customers and the general public Cynthia Schneider Technical Editor, IBM Security Systems about emerging and critical threats, IBM X-Force David McMillen Security Intelligence Analyst—IBM Security Services also delivers security content to help protect IBM customers from these threats. David Merrill STSM, IBM Security Solutions, CISA Dr. Jens Thamm Database Management Content Security Gina Stefanelli IBM X-Force Marketing Manager Jason Kravitz Techline Specialist for IBM Security Systems Jay Bretzmann WW Market Segment Manager John Kuhn Senior Threat Analyst—IBM Security Services Larry Oliver Senior Cyber Threat/Security Intelligence Analyst Leslie Horacek IBM X-Force Threat Response Manager Marc Noske Database Administration, Content Security Mark E. Wallis Senior Information Developer, IBM Security Systems Mark Yason IBM X-Force Advanced Research Michael Montecillo Managed Security Services Threat Research and Intelligence Principal Ralf Iffert Manager IBM X-Force Content Security Randy Stone Engagement Lead, IBM Emergency Response Services (ERS) Robert Freeman Manager, IBM X-Force Advanced Research Robert Lelewski Engagement Lead for IBM Emergency Response Services (ERS) Scott Craig Team Lead—IBM Security Services—Data Intelligence Scott Moore IBM X-Force Software Developer and IBM X-Force Database Team Lead Veronica Shelley Identity and Access Management Segment Marketing Manager 2 IBM Security Systems IBM X-Force 2012 Trend and Risk Report IBM Security collaboration IBM Security collaboration IBM Security represents several brands that provide a broad spectrum of security competency. • IBM X-Force research and development team discovers, analyzes, monitors, and records a broad range of computer security threats, vulnerabilities, and the latest trends and methods used by attackers. Other groups within IBM use this rich data to develop protection techniques for our customers. • IBM X-Force content security team independently scours and categorizes the web by means of crawling, independent discoveries, and through the feeds provided by IBM Managed Security Services (MSS). • IBM MSS is responsible for monitoring exploits related to endpoints, servers (including web servers), and general network infrastructure for its clients. MSS tracks exploits delivered over multiple vectors including web, email and instant messaging. • IBM Professional Security Services (PSS) delivers enterprise-wide security assessment, design, and deployment consulting services to help build effective information security solutions. 3 IBM Security Systems IBM X-Force 2012 Trend and Risk Report Contents Contents Contributors 2 About IBM X-Force 2 Exploit kits: the Java connection 31 IBM Security collaboration 3 CVE-2012-0507 timeline 32 CVE-2012-1723 timeline 33 Executive Overview 6 CVE-2012-4681 timeline 34 Interest in Java exploits 35 2012 highlights 7 But why Java? 35 Threats 7 Conclusion and action steps 36 Operational security practices 8 Web content trends 38 Emerging trends in security 9 Analysis methodology 38 IPv6 deployment for websites 38 Section I—Threats 10 Internet usage by content category 40 Rising tide of security incidents 10 Internet penetration of social networks 42 Varying level of sophistication 11 Spam and phishing 43 ABC’s and DDoS’s 13 Slightly increased spam volume in the second term of 2012 43 What have we learned? 17 Major spam trends 44 IBM Managed Security Services—A global threat landscape 19 Email scams and phishing 45 MSS—2012 security incident trends 20 Spam—country of origin trends 47 Malicious code 23 Attacker reaction to botnet take downs 49 Probes and scans 24 Unauthorized access attempts 25 Inappropriate use 26 Denial of service (DoS) 27 Injection attacks 29 4 IBM Security Systems IBM X-Force 2012 Trend and Risk Report Contents Contents Section II—Operational security practices 50 Vulnerability disclosures in 2012 50 Identity and access intelligence for the enterprise 81 Web applications 51 The importance of protecting data and reputations 81 Exploits 54 Reduce risk with identity and access governance 83 CVSS scoring 56 Security intelligence for managing insider threats 83 Vulnerabilities in enterprise software 57 Summary 84 Chaos or coordination: how to facilitate an incident response team 61 Risk modeling, assessment and management: brought to you by the letter “T” 66 Section III—Emerging trends in security 85 Treat the Threat 67 Mobile computing devices should be more secure than Transfer the Threat 69 traditional user computing devices by 2014 85 Terminate the Threat 70 Application sandboxing 86 Tolerate the Threat 71 Signed code controls 87 Example server root access threat mitigation 72 Remote device or data wipe 87 Social media and intelligence gathering 74 Biocontextual authentication 87 Introduction 74 Separation of personas or roles 88 Intelligence collection background 75 Secure mobile application development 90 Data availability/vulnerabilities 76 Mobile Enterprise Application Platform (MEAP) 90 Enterprises as a collection of Individuals 77 Mobile Enterprise Management (MEM) 91 Individual privacy 77 Prediction conclusion 91 Tools for assistance 78 Mobile security controls—where are we now? 91 Protecting your enterprise 79 Conclusion 80 5 IBM Security Systems IBM X-Force 2012 Trend and Risk Report Executive overview Executive overview Over the past year, the IT security space has had we looked at some of the pitfalls and perils of for installing malware on end-user systems. Java numerous mainstream headlines. From the implementing BYOD programs without strict vulnerabilities have become a key target for exploit discovery of sophisticated toolkits with ominous formulations of policy and governance to support the kits as attackers take advantage of three key names like Flame to cross-platform zero-day use of these devices. That said, recent developments elements: reliable exploitation, unsandboxed code vulnerabilities, both consumers and corporations have indicated that while these dangers still exist, execution, and cross-platform availability across were inundated with advisories and alerts regarding we believe mobile devices should be more secure multiple operating systems. Java exploits have emerging threats. The frequency of data breaches than traditional user computing devices by 2014. become key targets in 2012 and IBM X-Force and incidents—which had already hit a new high in predicts this attack activity to continue into 2013. 2011—continued their upward trajectory. While this prediction may seem far fetched on the surface, it is based on security control trends and As we reported in the mid-year, spam volume At the mid-year of 2012, we predicted that the requirements that are being driven into the market remained nearly flat in 2012, with India claiming the explosive nature of attacks and security breaches by knowledgeable security executives. In this top country of origin for spam distribution, but the seen in the first half would continue. Indeed this report, we explore how security executives are nature of spam is changing. Broadly targeted was the case. advocating the separation of personas or roles on phishing scams, as well as more personalized employee-owned devices. We also discuss some spear-phishing efforts continue to fool end users While talk of sophisticated attacks and widespread secure software mobile application development with crafty social-engineering email messages that distributed denial-of-service (DDoS) attempts made initiatives that are taking place today. look like legitimate businesses. Also, fake banking the year’s headlines, a large percentage of alerts and package delivery service emails have breaches relied on tried and true techniques such The distribution and installation of malware on been effective as attackers refine their messages to as SQL injection. What continues to be clear is that end-user systems has been greatly enabled by the look like the authentic messages that customers attackers, regardless of operational sophistication, use of Web browser exploit kits built specifically for might normally receive. Whether the target is will pursue a path-of-least-resistance approach to this purpose. Exploit kits first began to appear in individuals or the enterprise, once again, we remind reach their objectives. 2006 and are provided or sold by their authors to readers that many breaches were a result of poorly attackers that want to install malware on a large applied security fundamentals and policies and Integration of mobile devices into the enterprise number of systems. They continue to be popular could have been mitigated by putting some basic continues to be a challenge. In the previous
Recommended publications
  • X-Men Evolution Jumpchain V 1.0 by Multiversecrossover Welcome to a Earth-11052. Unlike Most of the Other Universes This Univers
    X-Men Evolution Jumpchain V 1.0 By MultiverseCrossover Welcome to a Earth-11052. Unlike most of the other universes this universe focuses solely on the familiar X-Men with a twist. Most of the team is in school and just now are learning to control their powers. But don’t let the high school feel let you become complacent. Espionage, conspiracies, and hatred burn deep underneath the atmosphere and within a few months, the floodgates will open for the world to see. You begin on the day when a young Nightcrawler joins up with the X-Men along with a meddling toad thrown into the mix. You might wanna take this if you want to survive. +1000 Choice Points Origins All origins are free and along with getting the first 100 CP perk free of whatever your origin is you even get 50% off the rest of those perks in that same origin. Drop-In No explanation needed. You get dropped straight into your very own apartment located next to the Bayville High School if you so wish. Other than that you got no ties to anything so do whatever you want. Student You’re the fresh meat in this town and just recently enrolled here. You may or may not have seen a few of the more supernatural things in this high school but do make your years here a memorable one. Scholar Whether you’re a severely overqualified professor teaching or a teacher making new rounds at the local school one thing is for sure however. Not only do you have the smarts to back up what you teach but you can even make a change in people’s lives.
    [Show full text]
  • Brendan Lacy M.Arch Thesis.Indb
    The Green Scare: Radical environmental activism and the invention of “eco-terror- ism” in American superhero comics from 1970 to 1990 by Brendan James Lacy A thesis presented to the University of Waterloo in fulfi llment of the thesis requirement for the degree of Master of Architecture Waterloo, Ontario, Canada, 2021 © Brendan James Lacy 2021 Author’s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required fi nal revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. iii Abstract American environmentalism became a recognizable social move- ment in the 1960s. In the following two decades the movement evolved to represent a diverse set of philosophies and developed new protest methods. In the early 1990s law enforcement and govern- ment offi cials in America, with support from extraction industries, created an image of the radical environmental movement as danger- ous “eco-terrorists.” Th e concept was deployed in an eff ort to de-val- ue the environmental movement’s position at a time of heightened environmental consciousness. With the concept in place members of the movement became easier to detain and the public easier to deter through political repression. Th e concept of “eco-terrorism” enters popular media relatively quickly indicated by the proliferation of superhero comics in the ear- ly 1990s that present villainous environmental activists as “eco-ter- rorists.” Th is imagery contrasts comics from 1970 which depicted superheroes as working alongside activists for the betterment of the world.
    [Show full text]
  • Marvel-Phile: Über-Grim-And-Gritty EXTREME Edition!
    10 MAR 2018 1 Marvel-Phile: Über-Grim-and-Gritty EXTREME Edition! It was the best of times, it was the worst of times. It 90s, but you’d be wrong. Then we have Nightwatch, a was a dark time for the Republic. In short, it was...the bald-faced ripoff of Todd MacFarlane’s more ‘90s. The 1990s were an odd time for comic books. A successful Spawn. Next, we have Necromancer… the group of comic book artists, including the likes of Jim Dr. Strange of Counter-Earth. And best for last, Lee and hate-favorite Rob Liefield, splintered off from there’s Adam X the X-TREME! Oh dear Lord -- is there Marvel Comics to start their own little company called anything more 90s than this guy? With his backwards Image. True to its name, Image Comics featured comic baseball cap, combustible blood, a costume seemingly books light on story, heavy on big, flashy art (often made of blades, and a title that features not one but either badly drawn or heavily stylized, depending on TWO “X”s, this guy that was teased as the (thankfully who you ask), and a grim and gritty aesthetic that retconned) “third Summers brother” is literally seemed to take all the wrong lessons from renowned everything about the 90s in comics, all rolled into one. works such as Frank Miller’s Dark Knight Returns. Don’t get me wrong, there were a few gems in the It wasn’t long until the Big Two and other publishers 1990s. Some of my favorite indie books were made hopped on the bandwagon, which was fueled by during that time.
    [Show full text]
  • ABSTRACT the Pdblications of the Marvel Comics Group Warrant Serious Consideration As .A Legitimate Narrative Enterprise
    DOCU§ENT RESUME ED 190 980 CS 005 088 AOTHOR Palumbo, Don'ald TITLE The use of, Comics as an Approach to Introducing the Techniques and Terms of Narrative to Novice Readers. PUB DATE Oct 79 NOTE 41p.: Paper' presented at the Annual Meeting of the Popular Culture Association in the South oth, Louisville, KY, October 18-20, 19791. EDFS PRICE MF01/PCO2 Plus Postage." DESCRIPTORS Adolescent Literature:,*Comics (Publications) : *Critical Aeading: *English Instruction: Fiction: *Literary Criticism: *Literary Devices: *Narration: Secondary, Educition: Teaching Methods ABSTRACT The pdblications of the Marvel Comics Group warrant serious consIderation as .a legitimate narrative enterprise. While it is obvious. that these comic books can be used in the classroom as a source of reading material, it is tot so obvious that these comic books, with great economy, simplicity, and narrative density, can be used to further introduce novice readers to the techniques found in narrative and to the terms employed in the study and discussion of a narrative. The output of the Marvel Conics Group in particular is literate, is both narratively and pbSlosophically sophisticated, and is ethically and morally responsible. Some of the narrative tecbntques found in the stories, such as the Spider-Man episodes, include foreshadowing, a dramatic fiction narrator, flashback, irony, symbolism, metaphor, Biblical and historical allusions, and mythological allusions.4MKM1 4 4 *********************************************************************** * Reproductions supplied by EDRS are the best that can be made * * from the original document. * *********************************************************************** ) U SOEPANTMENTO, HEALD.. TOUCATiONaWELFARE NATIONAL INSTITUTE CIF 4 EDUCATION THIS DOCUMENT was BEEN N ENO°. DOCEO EXACTLY AS .ReCeIVED FROM Donald Palumbo THE PE aSON OR ORGANIZATIONORIGuN- ATING T POINTS VIEW OR OPINIONS Department of English STATED 60 NOT NECESSARILY REPRf SENT OFFICIAL NATIONAL INSTITUTE OF O Northern Michigan University EDUCATION POSITION OR POLICY CO Marquette, MI.
    [Show full text]
  • (“Spider-Man”) Cr
    PRIVILEGED ATTORNEY-CLIENT COMMUNICATION EXECUTIVE SUMMARY SECOND AMENDED AND RESTATED LICENSE AGREEMENT (“SPIDER-MAN”) CREATIVE ISSUES This memo summarizes certain terms of the Second Amended and Restated License Agreement (“Spider-Man”) between SPE and Marvel, effective September 15, 2011 (the “Agreement”). 1. CHARACTERS AND OTHER CREATIVE ELEMENTS: a. Exclusive to SPE: . The “Spider-Man” character, “Peter Parker” and essentially all existing and future alternate versions, iterations, and alter egos of the “Spider- Man” character. All fictional characters, places structures, businesses, groups, or other entities or elements (collectively, “Creative Elements”) that are listed on the attached Schedule 6. All existing (as of 9/15/11) characters and other Creative Elements that are “Primarily Associated With” Spider-Man but were “Inadvertently Omitted” from Schedule 6. The Agreement contains detailed definitions of these terms, but they basically conform to common-sense meanings. If SPE and Marvel cannot agree as to whether a character or other creative element is Primarily Associated With Spider-Man and/or were Inadvertently Omitted, the matter will be determined by expedited arbitration. All newly created (after 9/15/11) characters and other Creative Elements that first appear in a work that is titled or branded with “Spider-Man” or in which “Spider-Man” is the main protagonist (but not including any team- up work featuring both Spider-Man and another major Marvel character that isn’t part of the Spider-Man Property). The origin story, secret identities, alter egos, powers, costumes, equipment, and other elements of, or associated with, Spider-Man and the other Creative Elements covered above. The story lines of individual Marvel comic books and other works in which Spider-Man or other characters granted to SPE appear, subject to Marvel confirming ownership.
    [Show full text]
  • Hulk Smash! September, 2020, Vol
    Journal of Criminal Justice and Popular Culture Hulk Smash! September, 2020, Vol. 20 (Issue 1): pp. 28 - 42 Clevenger and Acquaviva Copyright © 2020 Journal of Criminal Justice and Popular Culture All rights reserved. ISSN: 1070-8286 Hulk Smash! Violence in The Incredible Hulk Comics Shelly Clevenger Sam Houston State University & Brittany L. Acquaviva Sam Houston State University 28 Journal of Criminal Justice and Popular Culture Hulk Smash! September, 2020, Vol. 20 (Issue 1): pp. 28 - 42 Clevenger and Acquaviva Abstract “Hulk smash!” is one of the most iconic phrases uttered in the pages of comic books. The Incredible Hulk is one of comics’ most violent characters as the Hulk smashes first and asks questions later. The popularity of the comic book genre has exploded within past decades and the interest in comics has increased. But exactly how violent is The Incredible Hulk and what does that mean for readers? This research examines the occurrence of violence in the Incredible Hulk comics through a thematic content analysis of 248 issues. Specifically, such themes as violence against men and women, unpunished violence, formal punishments of violence, interventions to stop violence and the justification provided for violence were assessed. The goal of the research was to determine the amount and level of violence within the comic and in what context it occurred. Results indicate that there is a large amount of violence occurring within the pages of the Incredible Hulk, but that this violence is often justified and committed by the Hulk to protect himself and others. A discussion is provided regarding the potential impact this may have on a reader and their view of violence, crime and justice.
    [Show full text]
  • The Incredible Hulk
    The Incredible Hulk Monster, Man, Hero Dana McKnight Texas Christian University hen Marvel Comics introduced The Incredible Hulk in 1962, the following question was displayed prominently within a bold yellow question mark on W the front page: “Is he man or monster or…is he both?”1 Today, it seems easy to dismiss questions about the Incredible Hulk being a monster by merit of the popular Marvel Universe films, which brought the Incredible Hulk to a wide audience. I suspect that most Americans recognize the Incredible Hulk as a member of the Avengers: a hero, not a monster. However, when the Incredible Hulk first made his debut, Stan Lee expected his readers to wonder whether or not the Hulk would be a villain or a hero.2 Drawing from the first six issues of The Incredible Hulk I will discuss how the Incredible Hulk is simultaneously a hero and a monster, both an allegory of the military might of the United States in the atomic age and of the tenuous relationship between security and safety manifest in the uncontrolled destructive power of nuclear weapons. I will close with a glimpse into the contemporary post-9/11 Hulk. Man or Monster? First, it is cogent to get back to the “man or monster” question posed by Stan Lee in the very first issue of The Incredible Hulk, because the Hulk was both a man, Bruce Banner, and a monster, the Hulk. The “man-or-monster” question is not new and was 1 Stan Lee and Jack Kirby, “The Coming of the Hulk,” The Incredible Hulk, no.
    [Show full text]
  • A Movie Review
    A Movie Review: Release: February 2016 Rating: 15 Director: Tim Miller Cast: Ryan Reynolds, Morena Baccarin, Ed Skrein, Brianna Hildebrand, TJ Miller, Stefan Kapicic Plot: After developing multiple inoperable tumours, Wade Wilson undertakes an experiment to cure him. After suffering drastic side effects, he sets out to seek revenge on the man who ruined his life. Development hell. That unsavoury purgatory from which most films never escape. After more than 10 years in development, involving multiple rewrites, recastings and even a PG-13 version, Deadpool finally escapes, thanks to some "leaked" test footage which saw Fox greenlight the picture within 24 hours. And it's been a long time coming. Right from the spectacular opening credits (which will surely go down as some of the best ever made) it's clear that director Tim Miller and star Ryan Reynolds have got Deadpool's spirit spot on. Reynolds is an absolute joy to watch; he's clearly having a much better time here than in 2009's disastrous X-Men: Origins (which he has since stated he felt "blackmailed" into doing). The Merc With a Mouth is exactly that; there are in-jokes, pop culture references and fourth-wall breaks abound (even an Inception-esque fourth- wall break within a fourth-wall break). Little escapes unmentioned, Deadpool opting to take the mickey out of just about everything that springs to mind, including Reynolds' turn as Green Lantern, Reynolds himself, Hugh Jackman, and there's even a cheeky reference to the Marvel Cinematic Universe. In terms of character, Deadpool is perfect. The film doesn't fall short in its story aspect either; instead of opting for a standard "the world is in immediate danger and only the hero can stop it" story, Miller rolls with more of an action-romance, and it's much better for it.
    [Show full text]
  • Creating a Superheroine: a Rhetorical Analysis of the X-Men Comic Books
    CREATING A SUPERHEROINE: A RHETORICAL ANALYSIS OF THE X-MEN COMIC BOOKS by Tonya R. Powers A Thesis Submitted in Partial Fulfillment Of the Requirements for the Degree MASTER OF ARTS Major Subject: Communication West Texas A&M University Canyon, Texas August, 2016 Approved: __________________________________________________________ [Chair, Thesis Committee] [Date] __________________________________________________________ [Member, Thesis Committee] [Date] __________________________________________________________ [Member, Thesis Committee] [Date] ____________________________________________________ [Head, Major Department] [Date] ____________________________________________________ [Dean, Fine Arts and Humanities] [Date] ____________________________________________________ [Dean, Graduate School] [Date] ii ABSTRACT This thesis is a rhetorical analysis of a two-year X-Men comic book publication that features an entirely female cast. This research was conducted using Kenneth Burke’s theory of terministic screens to evaluate how the authors and artists created the comic books. Sonja Foss’s description of cluster criticism is used to determine key terms in the series and how they were contributed to the creation of characters. I also used visual rhetoric to understand how comic book structure and conventions impacted the visual creation of superheroines. The results indicate that while these superheroines are multi- dimensional characters, they are still created within a male standard of what constitutes a hero. The female characters in the series point to an awareness of diversity in the comic book universe. iii ACKNOWLEDGEMENTS I wish to thank my thesis committee chair, Dr. Hanson, for being supportive of me within the last year. Your guidance and pushes in the right direction has made the completion of this thesis possible. You make me understand the kind of educator I wish to be. You would always reply to my late-night emails as soon as you could in the morning.
    [Show full text]
  • Wolverine Logan, of the X-Men and the New Avengers
    Religious Affiliation of Comics Book Characters The Religious Affiliation of Comic Book Character Wolverine Logan, of the X-Men and the New Avengers http://www.adherents.com/lit/comics/Wolverine.html Wolverine is the code name of the Marvel Comics character who was long known simply as "Logan." (Long after his introduction, the character's real name was revealed to be "James Howlett.") Although originally a relatively minor character introduced in The Incredible Hulk #180-181 (October - November, 1974), the character eventually became Marvel's second-most popular character (after Spider-Man). Wolverine was for many years one of Marvel's most mysterious characters, as he had no memory of his earlier life Above: Logan and the origins of his distinctive (Wolverine) prays at a Adamantium skeleton and claws. Like Shinto temple in Kyoto, much about the character, his religious Japan. affiliation is uncertain. It is clear that [Source: Wolverine: Wolverine was raised in a devoutly Soultaker, issue #2 (May Christian home in Alberta, Canada. His 2005), page 6. Written by family appears to have been Protestant, Akira Yoshida, illustrated although this is not certain. At least by Shin "Jason" Nagasawa; reprinted in into his teen years, Wolverine had a Wolverine: Soultaker, strong belief in God and was a Marvel Entertainment prayerful person who strived to live by Group: New York City specific Christian ethics and moral (2005).] teachings. Above: Although Logan (Wolverine) is not a Catholic, and Over the many decades since he was a Nightcrawler (Kurt Wagner) is not really a priest, Logan child and youth in 19th Century nevertheless was so troubled by Alberta, Wolverine's character has his recent actions that he changed significantly.
    [Show full text]
  • Narratives of Contamination and Mutation in Literatures of the Anthropocene Dissertation Presented in Partial
    Radiant Beings: Narratives of Contamination and Mutation in Literatures of the Anthropocene Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University By Kristin Michelle Ferebee Graduate Program in English The Ohio State University 2019 Dissertation Committee Dr. Thomas S. Davis, Advisor Dr. Jared Gardner Dr. Brian McHale Dr. Rebekah Sheldon 1 Copyrighted by Kristin Michelle Ferebee 2019 2 Abstract The Anthropocene era— a term put forward to differentiate the timespan in which human activity has left a geological mark on the Earth, and which is most often now applied to what J.R. McNeill labels the post-1945 “Great Acceleration”— has seen a proliferation of narratives that center around questions of radioactive, toxic, and other bodily contamination and this contamination’s potential effects. Across literature, memoir, comics, television, and film, these narratives play out the cultural anxieties of a world that is itself increasingly figured as contaminated. In this dissertation, I read examples of these narratives as suggesting that behind these anxieties lies a more central anxiety concerning the sustainability of Western liberal humanism and its foundational human figure. Without celebrating contamination, I argue that the very concept of what it means to be “contaminated” must be rethought, as representations of the contaminated body shape and shaped by a nervous policing of what counts as “human.” To this end, I offer a strategy of posthuman/ist reading that draws on new materialist approaches from the Environmental Humanities, and mobilize this strategy to highlight the ways in which narratives of contamination from Marvel Comics to memoir are already rejecting the problematic ideology of the human and envisioning what might come next.
    [Show full text]
  • Holocaust Avengers: from "The Master Race" to Magneto I Kathrin Bower I
    University of Richmond UR Scholarship Repository Languages, Literatures, and Cultures Faculty Languages, Literatures, and Cultures Publications 2004 Holocaust Avengers: From "The aM ster Race" to Magneto Kathrin M. Bower University of Richmond, [email protected] Follow this and additional works at: http://scholarship.richmond.edu/mlc-faculty-publications Part of the European History Commons, Illustration Commons, and the Place and Environment Commons Recommended Citation Bower, Kathrin M. "Holocaust Avengers: From "The asM ter Race" to Magneto." International Journal of Comic Art 6, no. 2 (2004): 182-94. This Article is brought to you for free and open access by the Languages, Literatures, and Cultures at UR Scholarship Repository. It has been accepted for inclusion in Languages, Literatures, and Cultures Faculty Publications by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. 182 Holocaust Avengers: From "The Master Race" to Magneto I Kathrin Bower I In the classic genealogy of the superhero, trauma is often the explanation ' or motivation for the hero's pursuit of justice or revenge. Origin stories for superheroes and supervillains frequently appear in the plots of comic books long after the characters were created and with the shift in the stable of artists involved, different and sometimes competing events in the characters' biographies are revealed. This is particularly true of series that have enjoyed long periods of popularity or those that were phased out and then later revived. The stimulus for this m1icle was the origin story conceived for the X-Men supervillain Magneto under Chris Claremont's plotting, after the series was resurrected in 197 5 and by the foregrounding of Magneto's Holocaust past in the opening sequence to Bryan Singer's 2000 filmX-Men.
    [Show full text]