It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
“A lie can travel half way around the world while the truth is putting on its shoes.” Mark Twain
The FBI’s conclusion is questioned by security and computer networking experts. They say North Korea does not have the ability to launch this sort of attack. David Kennedy, founder of the security consulting firm TrustedSec LLC, said North Korea “is still very shut off and secretive, so it struggles with getting the technology it needs to launch major cyberattacks.” On Saturday, an FBI-connected cyber security expert tweeted out his opinion that North Korea is simply not capable of the Sony attack.
“Christopher M Davis @DavisSec Follow As a guy that works with the FBI on cyber crime fairly often, I still can't help but feel like they got this wrong. NK lacks this ability. 12:28 PM - 19 Dec 2014 “
Others argue that the sheer weight of the data stolen would have crippled North Korea’s fledgling ISP. “Look at the bandwidth going into North Korea. I mean, the pipelines, the pipes going in, handling data, they only have one major ISP across their entire nation. That kind of information flowing at one time would have shut down North Korean Internet completely,” Hector Monsegur told CBS. (Monsegur, aka Sabu, is the supposed Anonymous hacker who served as a stool pigeon for the government.) “For something like this to happen, it had to happen over a long period of time. You cannot just exfiltrate one terabyte or 100 terabytes of data in a matter of weeks,” Monsegur said. “It’s not possible. It would have taken months, maybe even years, to exfiltrate something like 100 terabytes of data without anyone noticing.”
There is only one “omnivore of staggering capabilities” able to suck up this much data in short order — the National Security Agency. According to NSA whistleblower William Binney, the agency’s computers in Utah can suck up 20 terabytes – the equivalent of the Library of Congress – per minute.
In addition to a lack of technology, North Korea is not especially adept when it comes to cyber attacks. In March, 2013 SophosLabs identified malware used in an internet attack that disrupted banking and television network systems in South Korea. Dubbed DarkSeoul, the malware was “not particularly sophisticated,” according to Graham Cluley, writing for Sophos’ Naked Security.
Following the FBI allegation, Obama promised “proportional” retaliation “at a time and place” of U.S. government choosing. That retaliation, although unspecified, may include action against China, the real object of concern for the elite. North Korea poses absolutely no threat while China is a primary geostrategic obstacle. Obama left unstated for now the connection between North Korea and China.
Shortly before an election, a spin-doctor and a Hollywood producer join efforts to fabricate a war in order to cover up a presidential sex scandal.
First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, it’s generally because they’ve made mistakes or because a cohort got arrested and turned informant.
originally posted by: Xcathdra
a reply to: Willtell
To dismiss North Korea in this area is dangerous. N. Korea does have military units tasked for cyber operations and has had them for some time now.
But in their initial public statement, whoever hacked Sony made no mention of North Korea or the film. And in an email sent to Sony by the hackers, found in documents they leaked, there is also no mention of North Korea or the film. The email was sent to Sony executives on Nov. 21, a few days before the hack went public. Addressed to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives, it appears to be an attempt at extortion, not an expression of political outrage or a threat of war.
UPDATE 2:45 pm ET Friday: "The FBI announced today, and we can confirm, that North Korea engaged in this attack" against Sony Pictures Entertainment, President Barack Obama said Friday (Dec. 19) in a televised national address. However, the evidence the FBI cited in its press statement — that some of the malware, and some of the network infrastructure, used to hit Sony Pictures resembled those used in previous suspected North Korean attacks — was not enough to convince skeptical experts. "All of the evidence [the] FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK," tweeted Brett Thomas, chief technology officer of Redwood City, California-based online-services company Vindicia, referring to North Korea by the acronym of its formal name, the Democratic People's Republic of Korea. "The U.S. security-intelligence complex is running amok once again," Sean Sullivan, a security adviser at Finnish antivirus firm F-Secure, tweeted. "Washington, D.C., is incapable of saying 'we don't know.'"
originally posted by: Willtell
a reply to: Answer
You’d be surprised at the ineptness of governments in cyber technology
Including a country called America that let some college drop out computer technician take data to Russia.
originally posted by: mOjOm
a reply to: Willtell
I'm totally with you on this one Will. Something is amiss here and I don't think NK is behind this either.
The most telling reasons are the huge amount of data that was pulled with their less than capable technical ability to do that (unless they had inside help) and the fact that nobody is playing this in the way that makes any sense.
The NK angle was never there until we gave it to them through the media either.
There is definitely something else going on here besides State Sponsored Cyber Terrorism.
"Sony's perceived abuse of the legal system in targeting reverse-engineer George Hotz infuriated hacker groups," said Randy Abrams, director of technical education at ESET, an IT security firm.
Sony had drummed up "significant antipathy" as the result of a 2005 scandal involving Sony CDs that automatically installed a rootkit that made users' computers vulnerable to attack.
The PlayStation Network attack appears to have set off an avalanche of follow-ups.
"Other hackers and hacking groups realized they could jump on the bandwagon and break into other Sony properties and get in the news," said Richard Wang, manager of Sophos Labs, a security vendor.
"Prior to the PSN hack, the loosely organized Anonymous group had waged war against Sony, reflecting the opinion of a significant share of netizens who got infuriated by Sony's corporate attitude," said Guillaume Lovet, a senior manager of the threat response team at Fortinet. "But now, from being a target for opinion reasons only, it also became a target 'just for the lulz,' for [hacker group] lulzsecurity and others."