

SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.


Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."
Dear Common Dreams reader, It’s been nearly 30 years since I co-founded Common Dreams with my late wife, Lina Newhouser. We had the radical notion that journalism should serve the public good, not corporate profits. It was clear to us from the outset what it would take to build such a project. No paid advertisements. No corporate sponsors. No millionaire publisher telling us what to think or do. Many people said we wouldn't last a year, but we proved those doubters wrong. Together with a tremendous team of journalists and dedicated staff, we built an independent media outlet free from the constraints of profits and corporate control. Our mission has always been simple: To inform. To inspire. To ignite change for the common good. Building Common Dreams was not easy. Our survival was never guaranteed. When you take on the most powerful forces—Wall Street greed, fossil fuel industry destruction, Big Tech lobbyists, and uber-rich oligarchs who have spent billions upon billions rigging the economy and democracy in their favor—the only bulwark you have is supporters who believe in your work. But here’s the urgent message from me today. It's never been this bad out there. And it's never been this hard to keep us going. At the very moment Common Dreams is most needed, the threats we face are intensifying. We need your support now more than ever. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. When everyone does the little they can afford, we are strong. But if that support retreats or dries up, so do we. Will you donate now to make sure Common Dreams not only survives but thrives? —Craig Brown, Co-founder |
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."