The Target Breach – Case Study, Lessons Learned and the Lockheed Martin Intrusion Kill Chain Model

Total Page:16

File Type:pdf, Size:1020Kb

The Target Breach – Case Study, Lessons Learned and the Lockheed Martin Intrusion Kill Chain Model The Target Breach – Case Study, Lessons Learned and the Lockheed Martin Intrusion Kill Chain Model . Improve your AIX Security by learning from the analysis of this breach . Stephen Dominguez, WW AIX and LoP Security Lead for IBM Lab Services . Sept 21st, 2016 Who am I ? Peyton Manning/Broncos fan and also love jazz World-wide AIX and Linux on Power Security Lead for IBM Lab Services Worked with Power for 19 years, specifically security for 13 I've worked with around 400+ corporate customers throughout the world Obtained US Top Secret Security Clearance in 2011 I have a security blog, www.securitysteve.net Who am I ? I have a security blog, www.securitysteve.net You can follow me on twitter, @Secur1tySteve IBM Lab Services is a cost center that works closely with IBM development to assist Power customers with their systems To learn about all Lab Services' security services: www.securitysteve.net/consulting-services/ We have several flexible funding IBM programs available to provide security consulting services at no charge to eligible customers If you'd like for me to setup a conference call so we can chat about security, shoot me an email at [email protected] Agenda Recent statistics on security breaches Introduction to the Target Breach The Lockheed Martin Intrusion Kill Chain Model The 13 Phases of the Breach 5 Major Lessons from the Target Breach Countering the Breach in AIX Recent Statistics on Security Breaches From the June 2016 Ponemon Institute's: “2016 Cost of Data Breach Study: Global Analysis” Abstract of Ponemon Institute's Findings 383 companies surveyed from 12 different countries Average cost of security breach of large company globally: $4 million Since 2013, the costs have risen globally by 29% Average cost of stolen record globally is $158 Ponemon Institute's 7 Global Megatrends 1. The cost of a data breach hasn't fluctuated significantly since starting research 2. The biggest financial consequence to organizations that experienced a data breach is lost business ie regain and retain customers' trust 3. Most data breaches continue to be caused by criminal and malicious attacks. These breaches also take the most time to detect and contain. They have the highest cost per record. 4. Investments are being made in technologies and in-house expertise to reduce the time to detect and contain 5. Regulated industries, such as healthcare and financial services, have the most costly data breaches 6. Improvements in data governance programs will reduce the cost of a data breach. For example: Incident response plans, appointment of a CISO, employee training and awareness programs 7. Investment in certain data loss prevention controls and activities such as encryption and endpoint security solutions are important for preventing data breaches. Introduction to the Target Breach Primary Reference • Main reference for this session is “Case Study: Critical Controls that Could Have Prevented Target Breach” by Teri Radichel, [email protected] • Permission has been obtained from Teri to abstract from her case study • Target never released official details of the breach. This reference references around 50 other references. • You can download the PDF of the case study off of: www.securitysteve.net/links 9 Secondary Reference • Secondary reference for this session is “The Target Store Data Breaches – Examination and Insight” by Marianna Hardy • This is a book available from Amazon 10 Third Reference • Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Lockheed Martin Corp • Whitepaper. There's a link for this from my links section of my blog, www.securitysteve.net/links/ 11 Abstract • In December 2013, 40 millions credit card numbers were stolen from 2000 Target stores by accessing data on point of sale (POS) systems • On January 10th Target also announced that PII data ie names, addresses, phone numbers, and email addresses of up to 70 million customers was stolen • There was an overlap of 12 million people between the two types of data stolen, so 98 million people total were affected in one way or the other • 11 GB of data was stolen • The customer data was sold on online black market forums known as “card shops” • The Senate Committee on Commerce in March 2014 concluded that Target missed opportunities to prevent the breach • Target reported the breach cost them $61 million 12 Abstract continued ... • The Target security staff made their misgivings known about the vulnerabilities of their POS systems before the breach • The attackers had access to Target systems for over a month • Independent sources make a rough estimate as to the cost of fraudulent charges resulting from the stolen credit card numbers from $250 million to $2.2 billion • 80 lawsuits filed against Target • The Payment Cards Industry (PCI) Council could have fined Target $400 million to $1.1 billion • This was among the largest data breaches in U.S. history 13 Breach Aftermath • CEO and CIO lost their jobs • Target's board of directors were threatened with removal • Banks payed $200 million to customers affected by the breach • Banks sued Target's PCI compliance auditor, Trustwave • Target has dealt with investigations from the Department of Justice, the FTC, and SEC. • Target hit by PCI compliance fines and State fines 14 The Lockheed Martin Intrusion Kill Chain Model From Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Advanced Persistent Threat (APT) • Initial security threats posed from self-propagating code (virus). Anti-virus technology has reduced that risk. • A new class of threat has emerged, the APT • The APT is when an adversary is well funded, highly skilled, focuses their attack manually (not-automated), and can attack over months or years “In February 2010, iSec Partners noted that current approaches such as anti-virus and patching are not sufficient, end users are directly targeted, and threat actors are after sensitive intellectual property. (Stamos, 2010)” - from Lockheed White Paper • The Lockheed Whitepaper says: “Yet APT actors continually demonstrate the capability to compromise systems by using advanced tools, customized malware, and 'zero day' exploits that anti-vrus and patching cannot detect or mitigate.” • The Target hackers used “advanced tools, customized malware and 'zero day' exploits that anti-virus and patching cannot detect ..” 16 What is a Kill Chain • “A kill chain is a systematic process to target and engage an adversary to create desired effects”. • The kill chain concept comes from the military • Lockheed adapted the Kill chain concept for providing a structure to analyze intrusions • We can use kill chains to understand how to deploy Computer Network Defense (CND). CND is a set of processes used to detect, monitor, analyze, and defend against network intrusions. • The kill chain is an end-to-end, integrated process where a deficiency in one segment of the chain can interrupt the entire process. • Multiple kill chains can occur within an adversary's campaign • Helps understand the iterative nature of intelligence gathering 17 Breach Phase 4: Establish a C2 System • Attacks used the vendor portal as a pivot to other systems • The attackers performed reconnaissance from this C2 to system to look for vulnerabilities on other systems • The attackers further infiltrated the target network from this system • Attackers performed additional reconnaissance from the system using network command tools • Attackers downloaded additional hacking tools to the system • Kill Chain 1 Phase 7 (Actions on Objectives) • Kill Chain 2 Phase 1 (Reconnaissance) 19 The 13 Phases of the Breach Breach Phase 1: Reconnaissance • Google search used to learn about Target interacts with vendors • Search revealed information about a vendor portal and a list of HVAC and refrigeration companies • Google search also revealed a case study on Microsoft site that described Target's use of Microsoft virtualization software, centralized name resolution, and Microsoft System Center Configuration Manager (SCCM), to deploy patches. • This Microsoft case study revealed Target's technical infrastructure, including POS system information, in significant detail • Kill Chain 1 Phase 1 - Reconnaissance 23 Breach Phase 2: Phishing Attack • Email sent to refrigeration vendor, Fazio Mechanical, 2 months before the breach • Fazio could have prevented the malware via real-time malware prevention tooling. Instead, they were using the free version of Malwarebytes Anti-Malware • Malware, believed to be Citadel, installed on vendor computer. • Malware embedded in PDF or Microsoft document • Citadel is a password-stealing bot program • Citadel obtained the login credentials for the online vendor portal • Kill Chain1 Phase 2 & 3 (Weaponization & Delivery) 24 Breach Phase 3: Access Target via Vendor Portal • Attackers use stolen login credentials to gain initial Target network access • A former Target security team member indicated that it was probably Target's web portal: Ariba external billing system • According to the same source, this portal was not fully isolated from the rest of Target's network • The attackers used an administrative application BMC account with its default username and password to move within the network. • By using possibly NetCat.exe raw commands were issued on various systems. NetCat.exe could have been used to load hacking related commands to compromised systems • Access to the Target network
Recommended publications
  • CATCHING CAREER CRIMINALS:· a STUDY of the REPEAT OFFENDER PROJECT TECHNICAL REPORT Patrick V. Murphy President
    If you have issues viewing or accessing this file contact us at NCJRS.gov. CATCHING CAREER CRIMINALS:· A STUDY OF THE REPEAT OFFENDER PROJECT TECHNICAL REPORT .' by Susan E. Martin Report to the National Institute of Justice The Honora~le James K. Ste~art~ Director • P~arch 29 ~ 1985 Police Foundation PatricK V. Murphy President • 98821 U.S. Department of JUstice National Institute of JUstice This document has been reprOduced exactly as received from the person or organization originating it. Paints of view or opinions stated in this document are those of the authors and do not necessarily Justice.represent the official position or POlicies of the National Institute of Permission to reproduce this coPyffgMted- material has been granted by Eub J j ~-DOmai.ni-NLI ____ ~_~ __ _ U-rS-r--Depa-r-tment-_-OLJusti.ce_ to the National Criminal Justice Reference SerVice (NGJRS). • Further reproduction outside of ttle NCJRS system reqUIres permis­ sion of the~ri§l;l~ owner. This study was conducted under Grant Number 82-IJ~-0063 from the National Institute of Justice. Points of view in this document are those of the author and do not necessarily represent the position or policies of the U.S. Department of Justice, the Metropolitan Police Department of Washington, D.C., or the Police Foundation • • •• Acknowledgements • Many persons worked on various phases of the ROP study. The contributions of the following consultants and Police Foundation staff members is gratefully acknowledged: Sampson Annan Phyll is Boston Kim Boyd Carol Bridgeforth Jenifer Cheeseman Gail Giovannucci Ear 1 Hami lton Richard Oldlakowski Antony Pat~ Doug Smith Faye Taxman Paul Zipper Sally Page, William Parker, and Mildred Banks performed the arduous task of producing the Final Report.
    [Show full text]
  • Science-Based Target Setting Manual Version 4.1 | April 2020
    Science-Based Target Setting Manual Version 4.1 | April 2020 Table of contents Table of contents 2 Executive summary 3 Key findings 3 Context 3 About this report 4 Key issues in setting SBTs 5 Conclusions and recommendations 5 1. Introduction 7 2. Understand the business case for science-based targets 12 3. Science-based target setting methods 18 3.1 Available methods and their applicability to different sectors 18 3.2 Recommendations on choosing an SBT method 25 3.3 Pros and cons of different types of targets 25 4. Set a science-based target: key considerations for all emissions scopes 29 4.1 Cross-cutting considerations 29 5. Set a science-based target: scope 1 and 2 sources 33 5.1 General considerations 33 6. Set a science-based target: scope 3 sources 36 6.1 Conduct a scope 3 Inventory 37 6.2 Identify which scope 3 categories should be included in the target boundary 40 6.3 Determine whether to set a single target or multiple targets 42 6.4 Identify an appropriate type of target 44 7. Building internal support for science-based targets 47 7.1 Get all levels of the company on board 47 7.2 Address challenges and push-back 49 8. Communicating and tracking progress 51 8.1 Publicly communicating SBTs and performance progress 51 8.2 Recalculating targets 56 Key terms 57 List of abbreviations 59 References 60 Acknowledgments 63 About the partner organizations in the Science Based Targets initiative 64 Science-Based Target Setting Manual Version 4.1 -2- Executive summary Key findings ● Companies can play their part in combating climate change by setting greenhouse gas (GHG) emissions reduction targets that are aligned with reduction pathways for limiting global temperature rise to 1.5°C or well-below 2°C compared to pre-industrial temperatures.
    [Show full text]
  • Criminal Procedure, the Police, and the Wire As Dissent
    Brooklyn Law School BrooklynWorks Faculty Scholarship 2018 Criminal Procedure, the Police, and The irW e as Dissent I. Bennett aC pers Brooklyn Law School, [email protected] Follow this and additional works at: https://brooklynworks.brooklaw.edu/faculty Part of the Criminal Law Commons, and the Criminal Procedure Commons Recommended Citation 2018 U. Chi. Legal F. 65 (2018) This Article is brought to you for free and open access by BrooklynWorks. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of BrooklynWorks. Criminal Procedure, the Police, and The Wire as Dissent Bennett Caperst The Wire is rich with metaphors. There is the physical wire in the opening credits, a metaphor for surveillance more generally. There is the metaphor of the wire in the sense of a modern tightrope-another filmic work, Man on a Wire,1 comes to mind-where any minute one can lose one's balance. There is even the metaphor of the wire in the 2 sense that the criminal justice system is all connected or networked. Indeed, thinking about our criminal justice system as a complex net- work allows us to see that many of the perceived flaws in the criminal justice system-racial disparities in charging3 and sentencing,4 and t Visiting Professor of Law, Boston University School of Law (Fall 2017); Stanley A. August Professor of Law, Brooklyn Law School. B.A. Princeton University; J.D. Columbia Law School. Assistant U.S. Attorney, Southern District of New York 1995-2004. E-mail: bennett.capers @brooklaw.edu. ' See generally MAN ON A WIRE (Magnolia Pictures 2008) (documentary about Phillipe Pet- it's successful attempt, on August 7, 1974, to walk on a wire suspended between the towers of the World Trade Center; his act would later be described as the "artistic crime of the century").
    [Show full text]
  • The Wire the Complete Guide
    The Wire The Complete Guide PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 29 Jan 2013 02:03:03 UTC Contents Articles Overview 1 The Wire 1 David Simon 24 Writers and directors 36 Awards and nominations 38 Seasons and episodes 42 List of The Wire episodes 42 Season 1 46 Season 2 54 Season 3 61 Season 4 70 Season 5 79 Characters 86 List of The Wire characters 86 Police 95 Police of The Wire 95 Jimmy McNulty 118 Kima Greggs 124 Bunk Moreland 128 Lester Freamon 131 Herc Hauk 135 Roland Pryzbylewski 138 Ellis Carver 141 Leander Sydnor 145 Beadie Russell 147 Cedric Daniels 150 William Rawls 156 Ervin Burrell 160 Stanislaus Valchek 165 Jay Landsman 168 Law enforcement 172 Law enforcement characters of The Wire 172 Rhonda Pearlman 178 Maurice Levy 181 Street-level characters 184 Street-level characters of The Wire 184 Omar Little 190 Bubbles 196 Dennis "Cutty" Wise 199 Stringer Bell 202 Avon Barksdale 206 Marlo Stanfield 212 Proposition Joe 218 Spiros Vondas 222 The Greek 224 Chris Partlow 226 Snoop (The Wire) 230 Wee-Bey Brice 232 Bodie Broadus 235 Poot Carr 239 D'Angelo Barksdale 242 Cheese Wagstaff 245 Wallace 247 Docks 249 Characters from the docks of The Wire 249 Frank Sobotka 254 Nick Sobotka 256 Ziggy Sobotka 258 Sergei Malatov 261 Politicians 263 Politicians of The Wire 263 Tommy Carcetti 271 Clarence Royce 275 Clay Davis 279 Norman Wilson 282 School 284 School system of The Wire 284 Howard "Bunny" Colvin 290 Michael Lee 293 Duquan "Dukie" Weems 296 Namond Brice 298 Randy Wagstaff 301 Journalists 304 Journalists of The Wire 304 Augustus Haynes 309 Scott Templeton 312 Alma Gutierrez 315 Miscellany 317 And All the Pieces Matter — Five Years of Music from The Wire 317 References Article Sources and Contributors 320 Image Sources, Licenses and Contributors 324 Article Licenses License 325 1 Overview The Wire The Wire Second season intertitle Genre Crime drama Format Serial drama Created by David Simon Starring Dominic West John Doman Idris Elba Frankie Faison Larry Gilliard, Jr.
    [Show full text]
  • Test of an Internal Wire Target at the Hera Proton Ring
    TEST OF AN INTERNAL WIRE TARGET AT THE HERA PROTON RING THOMAS LOHSE MPIftir Kemphysik ffeiddberg, 69Of?9, ccrmcng 1. INTRODUCTION Shortly after the HERA machine started its luminosity operation a working group was formed to study the possibility of exploiting the HERA proton beam for a high statistics B experiment able to discover CP violation in the B system. The efTort resulted in two detailed reports I,’ submitted to the DESY PRC. HERA has four intersction paints, two of which are occupied by the two large exper- iments HI and ZEUS, and one which is planned to be used by the HERMES experiment. The fourth interaction zone is currently available and suited to house a dedicated B de$ector. In principle, HERA has two independent rings and one could investigate the possibility of proton proton collisions (with asymmetric energies). Since this would, however, interfere with the routine e-p operation, we concentrated on the fixed target option in which protons from the beam halo intersct with massive internal targets, e.g., thin wires grouped around the beam center at distances of about 4 r.m.s. beam sizes. In the fixed target mode, the center of mass energy is only slightly above 40 GeV. This is quite close to the b&threshold and thus the B cross-section is tiny; about 10 to 20 nb are expected theoretically. The charm cross section- a dangerous background- is three orders of magnitude larger and the total inelastic cross section dominstes by 6 orders of magnitude. In order to get a precision of 0.05 in sin(2p), one thus has.
    [Show full text]
  • HERC HOLDINGS INC. 27500 Riverview Center Blvd
    INFORMATION STATEMENT HERC HOLDINGS INC. 27500 Riverview Center Blvd. Bonita Springs, Florida 34134 Hertz Global Holdings, Inc. (“Hertz Holdings”) is furnishing this information statement to its stockholders in connection with the spin-off (the “Spin-Off”) by Hertz Holdings to its stockholders of all of the issued and outstanding shares of common stock of Hertz Rental Car Holding Company, Inc. (“New Hertz”). The Spin-Off will result in the separation of Hertz Holdings’ global equipment rental business, which following the Spin-Off will continue to be operated by HERC Holdings (as defined below) through its operating subsidiaries, including Hertz Equipment Rental Corporation (to be renamed Herc Rentals Inc., “HERC”), from its global car rental business, which following the Spin-Off will continue to be operated by New Hertz through its operating subsidiaries, including The Hertz Corporation (“Hertz”). For every five common shares of Hertz Holdings you hold of record as of the close of business on June 22, 2016, the record date for the distribution, you will be entitled to receive one share of New Hertz common stock. Hertz Holdings will distribute the shares of New Hertz common stock in book-entry form, which means that we will not issue physical stock certificates. Stockholders will not receive fractional shares in connection with the Spin-Off. Instead, New Hertz’s transfer agent will aggregate all fractional shares and sell them as soon as practicable after the Spin-Off at the then-prevailing prices on the open market. After the transfer agent’s completion of such sale, stockholders would receive a cash payment from the transfer agent in an amount equal to their respective pro rata shares of the total net proceeds for that sale, without interest for the period of time between the effective time of the Spin-Off and the payment date.
    [Show full text]
  • Drug Markets, Fringe Markets, and the Lessons of Hamsterdam Lance Mcmillian
    Washington and Lee Law Review Volume 69 | Issue 2 Article 11 Spring 3-1-2012 Drug Markets, Fringe Markets, and the Lessons of Hamsterdam Lance McMillian Follow this and additional works at: https://scholarlycommons.law.wlu.edu/wlulr Part of the Commercial Law Commons Recommended Citation Lance McMillian, Drug Markets, Fringe Markets, and the Lessons of Hamsterdam, 69 Wash. & Lee L. Rev. 849 (2012), https://scholarlycommons.law.wlu.edu/wlulr/vol69/iss2/11 This Article is brought to you for free and open access by the Washington and Lee Law Review at Washington & Lee University School of Law Scholarly Commons. It has been accepted for inclusion in Washington and Lee Law Review by an authorized editor of Washington & Lee University School of Law Scholarly Commons. For more information, please contact [email protected]. Drug Markets, Fringe Markets, and the Lessons of Hamsterdam Lance McMillian* Abstract The Wire is the greatest television series of all-time. Not only that, it is the most important. One of the most memorable story arcs from The Wire’s five seasons is the rise and fall of Hamsterdam—a quasi-legalized drug zone in West Baltimore. Stories are powerful teaching tools because they marry information and context. By seeing how the application of law affects characters we know and care about, we become more attune to the potential effects of legal decisions in the real world. The story of Hamsterdam—which is essentially an attempt to transform a black market into a fringe market—presents just such an opportunity. When considering the various dimensions of the fringe economy, life in Hamsterdam imparts three critical insights: (1) Markets arise wherever there exists market demand.
    [Show full text]
  • And All the Pieces Matter: Thoughts on the Wire and the Criminal Justice System
    And All the Pieces Matter: Thoughts on The Wire and the Criminal Justice System Susan A. Bandes* "Whatever it was, they don't teach it in law school."' I. INTRODUCTION The standard police procedural, even including great dramas like NYPD Blue and Hill Street Blues, adheres to time-honored narrative conventions. It focuses on good, if sometimes imperfect, cops trying to find the real bad guys-the perpetrators-and bring them to justice. The episode begins when a crime ruptures the social fabric, and ends when guilt is determined and things are put to right. The standard procedural is concerned mainly with individual fault and individual heroism. It does not raise disquieting questions about the criminal justice system, the legal system, or the social and political arrangements that lead to a permanent underclass. There are eight million stories in the Naked City,2 and in the police procedural, every one of them stands on its own. This standard cop show narrative reflects and reaffirms a deeply ingrained, reassuring view of the world. The Wire is a different kind of television. It aims not to reassure but to unsettle, or as David Simon once put it, "to pick[] a fight."3 On its surface a police procedural, The Wire has been aptly described as a portrayal of "the social, political, and economic life of an American city with the scope, observational precision, and moral vision of great literature." Unlike the standard police procedural, which presents and resolves a discrete problem every week, The * Distinguished Research Professor, DePaul University College of Law.
    [Show full text]
  • Resteasy JAX-RS
    RESTEasy JAX-RS RESTFul Web Services for Java 3.0.16.Final Preface ............................................................................................................................. ix 1. Overview ...................................................................................................................... 1 2. License ........................................................................................................................ 3 3. Installation/Configuration ............................................................................................ 5 3.1. Upgrading Resteasy Within JBoss AS 7 ............................................................... 5 3.2. Upgrading Resteasy Within JBoss EAP 6.1 .......................................................... 5 3.3. Upgrading Resteasy Within Wildfly ...................................................................... 5 3.4. Configuring in JBoss AS 7, EAP, and Wildfly ........................................................ 5 3.4.1. Resteasy Modules in AS7, EAP6.1, Wildfly ................................................ 6 3.5. Standalone Resteasy in Servlet 3.0 Containers .................................................... 7 3.6. Standalone Resteasy in Older Servlet Containers ................................................. 8 3.7. Configuration Switches ........................................................................................ 9 3.8. javax.ws.rs.core.Application ..............................................................................
    [Show full text]
  • Criminal Procedure, the Police, and the Wire As Dissent
    University of Chicago Legal Forum Volume 2018 Article 4 2019 Criminal Procedure, the Police, and The irW e as Dissent Bennett aC pers Follow this and additional works at: https://chicagounbound.uchicago.edu/uclf Recommended Citation Capers, Bennett (2019) C" riminal Procedure, the Police, and The irW e as Dissent," University of Chicago Legal Forum: Vol. 2018 , Article 4. Available at: https://chicagounbound.uchicago.edu/uclf/vol2018/iss1/4 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in University of Chicago Legal Forum by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. Criminal Procedure, the Police, and The Wire as Dissent Bennett Capers† The Wire is rich with metaphors. There is the physical wire in the opening credits, a metaphor for surveillance more generally. There is the metaphor of the wire in the sense of a modern tightrope—another filmic work, Man on a Wire,1 comes to mind—where any minute one can lose one’s balance. There is even the metaphor of the wire in the sense that the criminal justice system is all connected or networked.2 Indeed, thinking about our criminal justice system as a complex net- work allows us to see that many of the perceived flaws in the criminal justice system—racial disparities in charging3 and sentencing,4 and ! Visiting Professor of Law, Boston University School of Law (Fall 2017); Stanley A. August Professor of Law, Brooklyn Law School. B.A. Princeton University; J.D.
    [Show full text]
  • 1 'It Can't Be a Lie': the Wire As Breaching Experiment Joshua
    1 ‘It Can’t Be a Lie’: The Wire as Breaching Experiment Joshua Page & Joe Soss University of Minnesota The Politics of HBOs’ The Wire: Everything is Connected (2015), Eds. Shirin Deylami and Jonathan Havercroft. New York: Routledge, Ch.1, pp. 11-40. The five seasons of The Wire are widely recognized as a landmark event in the history of media efforts to portray life in America’s poor, racially segregated communities. The show was especially momentous for scholars, such as us, who study urban poverty and the various ways authorities work to manage its problems and populations. Here, finally, was a dramatic depiction of the world we knew through our research and tried to convey in our teaching and public engagement. Here, finally, was a nuanced, humane account of the lives and lived realities—of cops and drug dealers and teachers and addicts and students and parents and more—that intersect and shape one another in the most marginalized neighborhoods of our nation’s cities. Here, finally, was a wildly popular, critically acclaimed, nationally televised cry of dissent from the “thriving cultural industry of fear of the poor, led by such television programs as ‘America’s Most Wanted’ and ‘Cops.’”1 More even than most documentaries, The Wire offers a realistic depiction of life inside the “hyperghetto,” a social space defined by stark racial segregation, severely diminished jobs and social services, inadequate schools, rampant poverty, open-air drug markets, widespread housing foreclosures, and pervasive depression and dilapidation.2 From the show’s inception, 1 Loïc Wacquant, Punishing the Poor: The Neoliberal Government of Social Insecurity (Durham: Duke University Press, 2009) 131-32.
    [Show full text]
  • I:\28531 Ind Law Rev 46-2\46Masthead.Wpd
    THE WIRE AND ALTERNATIVE STORIES OF LAW AND INEQUALITY ROBERT C. POWER* INTRODUCTION The Wire was a dramatic television series that examined the connections among crime, law enforcement, government, and business in contemporary Baltimore, Maryland.1 It was among the most critically praised television series of all time2 and continues to garner substantial academic attention in the form of scholarly articles,3 academic conferences,4 and university courses.5 One aspect * Professor, Widener University School of Law. A.B., Brown University; J.D., Northwestern University Law School. Professor Power thanks Alexander Meiklejohn and John Dernbach for their comments on an earlier draft of this Article. He also thanks Lucas Csovelak, Andrea Nappi, Gabor Ovari, Ed Sonnenberg, and Brent Johnson for research assistance. 1. Substantial information about the series is available at HBO.COM, http://www.hbo.com/ the-wire/episodes#/the-wire/index.html [hereinafter Wire HBO site]. This site contains detailed summaries of each episode. Subsequent references to specific episodes in this Article refer to the season, followed by the number of the episode counting from the beginning of season one, and then the name of the episode. For example, the first episode of season four, which introduces the four boys who serve as protagonists in season four, is The Wire: Boys of Summer (HBO television broadcast Sept. 10, 2006) [hereinafter Episode 4-38, Boys of Summer]. Additional information is available at The Wire, IMDB.COM, http://www.imdb.com/ title/tt0306414/ (last visited Mar. 26, 2013) [hereinafter Wire IMDB site]. Several books contain essays and other commentaries about the series.
    [Show full text]