Dec 26, 2014
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."
Join Us: News for people demanding a better world
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
Lauren McCauley
Lauren McCauley is a former senior editor for Common Dreams covering national and international politics and progressive news. She is now the Editor of Maine Morning Star. Lauren also helped produce a number of documentary films, including the award-winning Soundtrack for a Revolution and The Hollywood Complex, as well as one currently in production about civil rights icon James Meredith. Her writing has been featured on Newsweek, BillMoyers.com, TruthDig, Truthout, In These Times, and Extra! the newsletter of Fairness and Accuracy in Reporting. She currently lives in Kennebunk, Maine with her husband, two children, a dog, and several chickens.
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."
Lauren McCauley
Lauren McCauley is a former senior editor for Common Dreams covering national and international politics and progressive news. She is now the Editor of Maine Morning Star. Lauren also helped produce a number of documentary films, including the award-winning Soundtrack for a Revolution and The Hollywood Complex, as well as one currently in production about civil rights icon James Meredith. Her writing has been featured on Newsweek, BillMoyers.com, TruthDig, Truthout, In These Times, and Extra! the newsletter of Fairness and Accuracy in Reporting. She currently lives in Kennebunk, Maine with her husband, two children, a dog, and several chickens.
Security experts are claiming that, despite official rhetoric, North Korea was likely not behind the Sony hack that spurred patriotic zeal and widespread rallying around the Christmas Day release of the comedy film The Interview.
The Sony Pictures film, which on Thursday opened in 331 theaters and was made available for online viewing, boasted sold out crowds, $1 million in sales, and was the number one downloaded movie on all the digital platforms on which it was released: Google Play, YouTube Movies, Microsoft's Xbox Video, as well as on a Sony website.
Moviegoers cited "patriotism" and defense of the First Amendment as reasons for watching the film, which was reportedly the motive behind the recent security breach. The film is a satire about a plot to assassinate North Korean leader Kim Jong-un.
However, security researchers are questioning whether North Korea was really behind the hack and, alternately, are saying it looks like a possible "inside job."
Citing numerous experts, New York Times reporter Nicole Perlroth details why these claims against North Korea are so dubious, despite accusations by both President Obama and the FBI. Perlroth reports:
For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.
For another, Sony's attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.
They also point out that whoever attacked Sony had a keen understanding of its computer systems -- the names of company servers and passwords were all hard-coded into the malware -- suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.
Because of the flimsy evidence presented, skeptics of the North Korea's claim are attacking President Obama for vowing a "proportional response" against the rogue nation.
"[I]n the post-Watergate/post-Snowden world the U.S. government can no longer simply say 'trust us,'" writes conservative columnist and former national security official Paul Rosenzweig at the Lawfare blog.
Rosenzweig argues that if the government is "going to speak to the issue at all it has to release information that persuades."
He continues: "Otherwise it should stand silent and act (or not) as it sees fit without trying to justify it's actions. That silence will come at a significant cost, of course -- in even greater skepticism. But if the judgement is to disclose, then it must be more fulsome, with all the attendant costs of that as well."
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.