A Common Architecture for Cyber Offences and Assaults - (Organized Advanced Multi-Vector Persistent Attack)

Total Page:16

File Type:pdf, Size:1020Kb

A Common Architecture for Cyber Offences and Assaults - (Organized Advanced Multi-Vector Persistent Attack) ROYAL HOLLOWAY MSc PROJECT R. Osman Tekes Student Number: 100682179 Supervisor: John Austen A Common Architecture for Cyber Offences and Assaults - (Organized Advanced Multi-Vector Persistent Attack): Cyber War Cyber Intelligence, Espionage, and Subversion Cyber Crime SEPTEMBER 2011 Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature Date ACKNOWLEDGEMENTS I would like to thank John Austen, my Project Supervisor, for his invaluable encouragement and guidance in helping me to achieve better results in the MSc in general and in completing this project. RHUL ISG MSc. Information Security Project O Tekes Table of Contents ABSTRACT .................................................................................................................................................. 6 1. INTRODUCTION............................................................................................................................... 8 1.1. OBJECTIVES ................................................................................................................................. 9 1.2. THE MOTIVATION ....................................................................................................................... 10 1.3. METHODOLOGY OVERVIEW ....................................................................................................... 10 1.4. OVERVIEW OF THE CHAPTERS.................................................................................................... 13 2. THE BACKGROUND AND CONTINUUMS................................................................................ 14 2.1. THE HUMANISTIC VIEW ............................................................................................................. 15 2.2. THE HISTORICAL AND ANTHROPOLOGICAL PERSPECTIVE: ......................................................... 16 2.3. THE TWO CONTINUUMS ............................................................................................................. 16 2.3.1 CONTINUUM ONE: THE SCALE OF ESCALATION - INTENSITY OF COERCION............................... 16 2.3.2 CONTINUUM TWO: THE SCALE OF LEGITIMACY......................................................................... 18 3. ANALYSIS: STRATEGIC SCOPE - CONTEXTUAL VIEW – ROW 1 OF ZACHMAN’S FRAMEWORK .......................................................................................................................................... 19 3.1. USA........................................................................................................................................... 19 3.1.1 U.S. CYBER STRATEGY:............................................................................................................. 19 3.1.2 US CYBER COMMAND................................................................................................................ 23 3.1.3 NSA........................................................................................................................................... 25 3.1.4 AN EVALUATION OF ALIGNMENTS, MISALIGNMENTS, GAPS, AND CONFLICTS .......................... 26 3.2. CHINA ........................................................................................................................................ 27 3.3. RUSSIA ....................................................................................................................................... 28 3.4. STRATEGIC SCOPE: THE MAIN POINTS....................................................................................... 31 4. ANALYSIS: ENTERPRISE MODEL CONCEPTUAL VIEW – ROW 2 OF ZACHMAN’S FRAMEWORK .......................................................................................................................................... 33 4.1. CYBER WAR............................................................................................................................... 34 4.1.1 FIRST CUT DATA MODEL ........................................................................................................... 34 4.1.2 FIRST CUT PROCESS MODEL ...................................................................................................... 35 4.2. CYBER INTELLIGENCE, ESPIONAGE AND SUBVERSION ............................................................... 38 4.2.1 THE OBJECTIVES OF INTELLIGENCE, ESPIONAGE AND SUBVERSION OPERATIONS ..................... 39 4.2.2 FIRST CUT DATA MODEL ........................................................................................................... 39 4.2.3 FIRST CUT PROCESS MODEL ...................................................................................................... 41 4.3. CYBER CRIME ............................................................................................................................ 42 4.3.1 THE OBJECTIVES OF CYBER CRIME ORGANIZATIONS................................................................. 42 4.3.2 FIRST CUT DATA MODEL ........................................................................................................... 43 4.3.3 FIRST CUT PROCESS MODEL ...................................................................................................... 45 4.4. CONCEPTUAL ANALYSIS: THE MAIN POINTS -SUMMARY .......................................................... 46 5. SYNTHESIS: ENTERPRISE MODEL CONCEPTUAL VIEW – ROW 2 OF ZACHMAN’S FRAMEWORK .......................................................................................................................................... 47 5.1. WHY: (OFFENCE TYPES) (OBJECTIVES) X (OFFENCE TYPES) (OBJECTIVES) MATRIX – SAMPLE 47 5.2. WHAT: (OFFENCE TYPES) (OBJECTIVES) X (ENTITY TYPES) MATRIX – SAMPLE ...................... 50 5.3. HOW: (OFFENCE TYPES) (OBJECTIVES) X (PROCESS MATRIX) – SAMPLE ................................. 52 6. CONCLUSION ................................................................................................................................. 54 6.1. THE PURPOSE OF THIS PROJECT.................................................................................................. 54 6.2. THE MAIN FINDINGS .................................................................................................................. 54 6.3. THE MAIN RESULTS ................................................................................................................... 55 6.3.1 RESULTS FROM THE SYNTHESIS MATRICES................................................................................ 55 6.3.2 THE MOTIVATIONS: THE WHY MATRIX - WHAT IS THE DEGREE OF SIMILARITY AMONG THE OBJECTIVES? ............................................................................................................................................ 56 6.3.3 THE ORGANIZATIONAL CONCEPTS AND DATA: THE WHAT MATRIX - WHAT IS THE DEGREE OF ALIGNMENT AND SUPPORT PROVIDED BY THE ENTITY TYPES? .................................................................. 57 6.3.4 THE ORGANIZATIONAL PROCESS AND VALUE CHAIN: THE HOW MATRIX - WHAT IS THE DEGREE OF ALIGNMENT AND SUPPORT PROVIDED BY THE PROCESSES?..................................................... 58 2011-08-31 13:09:53 Final Draft Osman Tekes 20110831 3 / 152 RHUL ISG MSc. Information Security Project O Tekes 6.3.5 SUMMARY OF MAIN RESULTS FROM THE SYNTHESIS MATRICES ............................................... 60 6.3.6 ADDITIONAL OBSERVATIONS AND CONCLUSIONS...................................................................... 60 6.3.6.1 Who............................................................................................................................................ 60 6.3.6.2 When.......................................................................................................................................... 60 6.3.6.3 Where......................................................................................................................................... 61 6.3.6.4 Additional Observations for Cyber War and Active Defence .................................................... 61 6.4. THE PROJECT OBJECTIVES AND THE PROJECT RESULTS ............................................................. 62 6.5. CONTRIBUTION TO KNOWLEDGE................................................................................................ 64 6.6. THE FUTURE OF THE CYBER WAR; CYBER INTELLIGENCE, ESPIONAGE AND SUBVERSION; AND CYBER CRIME........................................................................................................................................... 65 CONCLUDING REMARKS:.................................................................................................................... 66 REFERENCES ........................................................................................................................................... 67 APPENDICES ............................................................................................................................................ 92 1. AN OVERVIEW OF ENTERPRISE ARCHITECTURE APPROACH AND ZACHMAN’S FRAMEWORK ............... 92 2. SOME POLITICAL THOUGHTS ON INJUSTICE,
Recommended publications
  • Memetics of Deception: Spreading Local Meme Hoaxes During COVID-19 1St Year
    future internet Article Memetics of Deception: Spreading Local Meme Hoaxes during COVID-19 1st Year Raúl Rodríguez-Ferrándiz 1,* , Cande Sánchez-Olmos 1,* , Tatiana Hidalgo-Marí 1 and Estela Saquete-Boro 2 1 Department of Communication and Social Psychology, University of Alicante, 03690 Alicante, Spain; [email protected] 2 Department of Software and Computing Systems, University of Alicante, 03690 Alicante, Spain; [email protected] * Correspondence: [email protected] (R.R.-F.); [email protected] (C.S.-O.) Abstract: The central thesis of this paper is that memetic practices can be crucial to understanding deception at present when hoaxes have increased globally due to COVID-19. Therefore, we employ existing memetic theory to describe the qualities and characteristics of meme hoaxes in terms of the way they are replicated by altering some aspects of the original, and then shared on social media platforms in order to connect global and local issues. Criteria for selecting the sample were hoaxes retrieved from and related to the local territory in the province of Alicante (Spain) during the first year of the pandemic (n = 35). Once typology, hoax topics and their memetic qualities were identified, we analysed their characteristics according to form in terms of Shifman (2014) and, secondly, their content and stance concordances both within and outside our sample (Spain and abroad). The results show, firstly, that hoaxes are mainly disinformation and they are related to the pandemic. Secondly, despite the notion that local hoaxes are linked to local circumstances that are difficult to extrapolate, our conclusions demonstrate their extraordinary memetic and “glocal” capacity: they rapidly adapt Citation: Rodríguez-Ferrándiz, R.; other hoaxes from other places to local areas, very often supplanting reliable sources, and thereby Sánchez-Olmos, C.; Hidalgo-Marí, T.; demonstrating consistency and opportunism.
    [Show full text]
  • Catalogue:March 2020 #1
    CATALOGUE: MARCH 2020 #1 - A large collection of over 500 mostly pulp novels and magazines in Ottoman language, influenced by the Western roaring 20s, especially by the Silent Movies. - Books on the early 20th Century Magic and Supernatural from the Islamic World. - A series of books by the most prominent representative of Turkish avantgarde Nâzım Hikmet. - Turkish Mid Century book and poster design - Slovenian books by contemporary artists - And Much More… www.pahor.de Antiquariat Daša Pahor GbR Alexander Johnson, Ph.D. & Daša Pahor, Ph.D. Jakob-Klar-Str. 12 Germany - 80796 München +49 89 27 37 23 52 www.pahor.de [email protected] ANSWERS TO THE MOST COMMON QUESTIONS - We offer worldwide free shipping. - We cover the customs fees, provide all the paperwork and deal with the customs. We send outside the EU daily and we are used to taking over the control of exporting and importing. - For all the manuscripts, ordered from outside the EU, please give us approximately 10 days to deal with the additional paperwork. - We offer a 20% institutional discount. - In case you spot an item, that you like, but the end of the fiscal year is approaching, please do not be afraid to ask. We would be glad to put any objects from our offer aside for you and deal with it at your convenience. - We offer original researches and high resolution scans of our maps and prints, which we are happy to forward to the buyers and researchers on request. - For any questions, please e-mail us at: [email protected]. In 2019 we would like to invite you to our stand at the ASEEES Annual Convention in San Francisco, from November 23rd to 26th.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • Lies, Bullshit and Fake News: Some Epistemological Concerns
    Postdigital Science and Education https://doi.org/10.1007/s42438-018-0025-4 COMMENTARIES Open Access Lies, Bullshit and Fake News: Some Epistemological Concerns Alison MacKenzie1 & Ibrar Bhatt1 # The Author(s) 2018 What is the difference between a lie, bullshit, and a fake news story? And is it defensible to lie, bullshit, or spread fake stories? The answers are, unsurprisingly, complex, often defy simple affirmative or negative answers, and are often context dependent. For present purposes, however, a lie is a statement that the liar knows or believes to be false, stated with the express intention of deceiving or misleading the receiver for some advantageous gain on the part of the liar. On the standard definition of a lie, the liar’s chief accomplishment is deception—and it can be artful: When we undertake to deceive others intentionally, we communicate messages meant to mislead them, meant to make them believe what we ourselves do not believe. We can do so through gesture, through disguise, by means of action or inaction, even through silence. (Bok 1999[1978]: 13) The standard definition has, in the Western philosophical tradition, antecedents stretching all the way back to St Augustine. However, the classic definition may be too restrictive as not all lies are stated with the intention to deceive. Any number of statements can mislead through misapprehension, incomprehension, poor understand- ing of, or partial access to the facts. To mislead, further, is not the same as lying, or as serious, and we can rely less on a liar than we can on a person who misleads.
    [Show full text]
  • The 'Argentine Problem' : an Analysis of Political Instability in a Modern Society
    THE 'ARGENTINE PROBLEM7: AN ANALYSIS OF POLITICAL INSTABILITY IN A MODERN SOCIETY Alphonse Victor Mallette B.A., University of Lethbridge, 1980 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS @ Alphonse Victor Mallette 1986 SIMON FRASER UNIVERSITY June, 1986 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. PARTIAL COPYRIGHT LICENSE I hereby grant to Simon Fraser University the right to lend my thesis, proJect or extended essay (the title of which is shown below) to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. I further agree that permission for multiple copying of this work for scholarly purposes may be granted by me or the Dean of Graduate Studies. It is understood that copying or publication of this work for flnanclal gain shall not be allowed without my written permission. Title of Thesis/Project/Extended Essay Author: -. - rJ (date) -.-.--ABSTRACT This thesis is designed to explain, through political and historical analysis, a phenomenon identified by scholars of pol- itical development as the "Argentine Problem". Argentina is seen as a paradox, a nation which does not display the political stab- ility commensurate with its level of socio-economic development. The work also seeks to examine the origins and policies of the most serious manifestation of dictatorial rule in the nation's history, the period of military power from 1976 to 1983.
    [Show full text]
  • Many People Are Saying…”: Applying the Lessons of Naïve Skepticism to the Fight Against Fake News and Other “Total Bullshit”1
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by PhilPapers “Many people are saying…”: Applying the lessons of naïve skepticism to the fight against fake news and other “total bullshit”1 Jake Wright, Ph.D. [email protected] Abstract: ‘Fake news’ has become an increasingly common refrain in public discourse. The term itself has several uses, at least one of which constitutes Frankfurtian bullshit. After examining what sorts of fake news appeals do and do not count as bullshit, I discuss strategies for overcoming our openness to such bullshit. I do so by drawing a parallel between openness to bullshit and naïve skepticism—one’s willingness to reject the concept of truth on unsupported or ill- considered grounds—and suggest that this parallel indicates three principles for how we ought to combat our openness to fake news and other bullshit. First, the root causes of bullshit openness are not monolithic; we should adopt anti-bullshit strategies in recognition of this fact. Second, our efforts to overcome bullshit openness should be collaborative efforts to create an environment that allows for sustained interrogation of our bullshit openness, rather than a confrontational provision of contrary evidence, despite the fact that such strategies are more time- intensive. Third, social media is unlikely to be a fertile ground on which we will make meaningful progress in the fight against bullshit because of the inherent nature of social media platforms as spaces for short, declarative, confrontational claims. Keywords: fake news, bullshit, naïve skepticism, social media, epistemology of ignorance 1.
    [Show full text]
  • Taksim Square As 'Heritage Site' and the 2013 Gezi Protests
    Whitehead C, Bozoğlu G. Protest, Bodies, and the Grounds of Memory: Taksim Square as 'heritage site' and the 2013 Gezi Protests. Heritage and Society (2017) DOI: https://doi.org/10.1080/2159032X.2017.1301084 Copyright: This is an Accepted Manuscript of an article published by Taylor & Francis in Heritage and Society on 30/03/2017, available online: https://doi.org/10.1080/2159032X.2017.1301084 Date deposited: 11/04/2017 Embargo release date: 30 September 2018 This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence Newcastle University ePrints - eprint.ncl.ac.uk This is an Accepted Manuscript of an article published by Taylor & Francis Group in Heritage and Society on 30/04/2017, available online: http://www.tandfonline.com/doi/full/10.1080/2159032X.2017.1301084 Protest, Bodies and the Grounds of Memory: Taksim Square as ‘heritage site’ and the 2013 Gezi Protests Christopher Whitehead and Gönül Bozoğlu Media, Culture, Heritage, Newcastle University Place incarnates the experiences and aspirations of a people. Place is not only a fact to be explained in the broader frame of space, but it is also a reality to be clarified and understood from the perspectives of the people who have given it meaning. (Yi-Fu Tuan Space and Place, 1979: 387) The current protest movement isn’t about the past; it is about today and tomorrow. It started because a new generation wanted to defend Gezi Park, a public green space, against the violent, abusive manner in which the government sought to sacrifice it to the gods of neo-liberalism and neo- Ottomanism with a plan to build a replica of Ottoman barracks, a shopping mall and apartments (Edhem Eldem, ‘Turkey’s False Nostalgia’, New York Times, 2013).
    [Show full text]
  • Mass Media and the Transformation of American Politics Kristine A
    Marquette Law Review Volume 77 | Issue 2 Article 7 Mass Media and the Transformation of American Politics Kristine A. Oswald Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Kristine A. Oswald, Mass Media and the Transformation of American Politics, 77 Marq. L. Rev. 385 (2009). Available at: http://scholarship.law.marquette.edu/mulr/vol77/iss2/7 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. MASS MEDIA AND THE TRANSFORMATION OF AMERICAN POLITICS I. INTRODUCTION The importance of the mass media1 in today's society cannot be over- estimated. Especially in the arena of policy-making, the media's influ- ence has helped shape the development of American government. To more fully understand the political decision-making process in this coun- try it is necessary to understand the media's role in the performance of political officials and institutions. The significance of the media's influ- ence was expressed by Aleksandr Solzhenitsyn: "The Press has become the greatest power within Western countries, more powerful than the legislature, the executive, and the judiciary. One would then like to ask: '2 By what law has it been elected and to whom is it responsible?" The importance of the media's power and influence can only be fully appreciated through a complete understanding of who or what the media are.
    [Show full text]
  • V. 2.1 Gaslighting Citizens Eric Beerbohm and Ryan Davis1
    v. 2.1 Gaslighting Citizens Eric Beerbohm and Ryan Davis1 [L]eaders...have argued that if their followers or subjects are not strong enough to stick to the resolution themselves, they—the leaders—ought to help them avoid contact with the misleading evidence. For this reason, they have urged or compelled people not to read certain books, writings, and the like. But many people need no compulsion. They avoid reading things, and so on. — Saul Kripke, “On Two Paradoxes of Knowledge” Politics invariably involves disagreement—some of it, unreasonable. If deep enough and fundamental enough, disagreement might be taken as a sign not only that one of the opposing disputants must be incorrect, but that someone may be somehow failing to respond to the available evidence in a minimally rational way. So begins a much sharper allegation: that one’s opponent is not just mistaken, but crazy. In a partisan world, the rhetorical force of this accusation is easily weaponized. If one’s opponents lack basic epistemic capacities, one does them no wrong by ignoring them, and encouraging others to ignore them as well. “Gaslighting”—or attempting to cause people to doubt their own attitudes or capacities—has quickly gained popularity as an explicitly political charge.2 Antagonists on the right and left both mutually accuse each other of gaslighting. They define the term similarly, so the disagreement looks substantive.3 But the opposing outlooks may share little besides the concept. This essay aims to understand gaslighting as a political phenomenon. It proceeds in six parts. First, we will sketch the concept of gaslighting as it has been developed in the philosophical literature.
    [Show full text]
  • S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
    Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN.
    [Show full text]
  • Bowl Round 3
    2017-2018 IHBB Beta Bowl 2017-2018 Bowl Round 3 Bowl Round 3 – Middle School First Quarter (1) During this war, Matthew Ridgeway replaced a general who masterminded a decisive landing at Inchon, Douglas MacArthur. A demilitarized zone was created after an armistice was signed, though there has still been no peace treaty to end this war. For ten points, name this 1950s conflict on an Asian peninsula. ANSWER: Korean War (2) This man survived an assassination attempt in which a blind musician struck out at him with a heavy lute. The ascension of this man marked the end of the Warring States period, and he was buried alongside thousands of terracotta warriors. For ten points, name this first emperor of the Qin dynasty. ANSWER: Qin Shi Huangdi (3) During this battle, one side’s housecarls made a stand on Senlac Hill until their leader was struck in the eye by an arrow. This battle arose out of a dispute over whom Edward the Confessor named as his successor. The Bayeux Tapestry depicts the death of Harold Godwinson in, for ten points, what battle that confirmed William the Conqueror’s rule over England in 1066? ANSWER: Battle of Hastings (4) In this nation, the captain of the Bounty, William Bligh, was deposed in the Rum Rebellion. An island in this country was first reached by Abel Tasman in 1642. At Botany Bay, convicts and Aborigines met in what became an English penal colony. For ten points, name this country where, in 1770, James Cook landed near what is now the city of Sydney.
    [Show full text]
  • 2018-2019 National History Bowl Round 2
    NHBB C-Set Bowl 2018-2019 Bowl Round 2 Bowl Round 2 First Quarter (1) This group was the first target of Justinian's reconquest wars. These people, along with the Alans, were led by Genseric. These people captured Carthage in 439 AD, making it the capital of their North African empire. Pope Leo I was able to limit, but not stop, these people's 455 sack of Rome. For ten points, name this Germanic tribe whose name has become synonymous with defacing and destroying property. ANSWER: Vandals (2) In one scheme, this man attempted to negotiate a secret rebate with railroad companies by creating the South Improvement Company. A company founded by this man was subject of a muckraking expose by Ida Tarbell. This man grew his business through horizontal integration after establishing a series of refineries in Ohio, but his flagship company was eventually broken up by the Supreme Court in 1911. For ten points, name this founder of the Standard Oil company. ANSWER: John D. Rockefeller (3) In 2012, this country temporarily occupied the Heglig oil field of its northern neighbor. The President of this country has been known for his fondness for Stetson hats since he received one as a gift from George W. Bush in 2006. Civil war broke out in this country in 2013 shortly after Riek Machar was accused of plotting a coup d'etat by President Salva Kiir. For ten points, name this African country that declared its independence in 2011. ANSWER: Republic of South Sudan (do not accept or prompt on Sudan alone) (4) One holder of this position, John Lindsay, switched parties to mount a failed bid for the Democratic nomination for President in 1972.
    [Show full text]