{"id":110746,"date":"2017-11-30T14:35:00","date_gmt":"2017-11-30T14:35:00","guid":{"rendered":""},"modified":"2023-01-08T11:03:40","modified_gmt":"2023-01-08T11:03:40","slug":"traced-to-pyongyang","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/traced-to-pyongyang\/","title":{"rendered":"Traced to Pyongyang"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>When Sony Pictures was hacked late last year, there was considerable  speculation as to the groups&#8211;or nation&#8211;that was responsible for the  cyber-attack.<\/p>\n<p>After the FBI became involved, the agency quickly announced that North  Korea was behind the hack, citing the use of malware associated with  previous cyber-strikes conducted by Pyongyang.&nbsp; But other security  experts disagreed, claiming the &#8220;evidence&#8221; offered by the FBI was  skimpy, at best, and suggested that &#8220;hacktivist&#8221; groups might be  responsible. <\/p>\n<p><a href=\"http:\/\/formerspook.blogspot.com\/2014\/12\/rethinking-hack.html\">We took a slightly different approach<\/a>, noting that the bureau had access to information unavailable to other experts. <\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\">Fact  is, the FBI maintains a close working relationship with NSA on  cyber-security issues and can draw upon that agency&#8217;s vast expertise in  that field. &nbsp; In fact, some members of the FBI&#8217;s cyber division are  stationed at NSA HQ at Fort Meade, MD, to facilitate liaision efforts  between the organizations.&nbsp; It&#8217;s a safe bet the FBI&#8217;s &#8220;North&nbsp; Korea&#8221;&nbsp;  analysis was based, at least in part, on data provided by NSA, and so  far, the feds have said virtually nothing about the role of the SIGINT  agency in the Sony investigation. If the assessment is based on NSA  data, it would add more credence to the North Korean angle.<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">In  fact, the NSA has active partnerships with a number of tech firms,  allowing it to probe for potential weaknesses and monitor activity from  various hacker groups, including those sponsored by nation-states.&nbsp;  Author Shane Harris recently detailed the extent of these relationships  in his book <i>@War: the Rise of the Military-Internet Complex:&nbsp;<\/i><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\">The NSA helps the companies find weaknesses in their products. But it  also pays the companies not to fix some of them. Those weak spots give  the agency an entry point for spying or attacking foreign governments  that install the products in their intelligence agencies, their  militaries, and their critical infrastructure. Microsoft, for instance,  shares zero day vulnerabilities in its products with the NSA before  releasing a public alert or a software patch, according to the company  and U.S. officials. Cisco, one of the world\u2019s top network equipment  makers, leaves backdoors in its routers so they can be monitored by U.S.  agencies, according to a cyber security professional who trains NSA  employees in defensive techniques. And McAfee, the Internet security  company, provides the NSA, the CIA, and the FBI with network traffic  flows, analysis of malware, and information about hacking trends. <\/p>\n<p>Companies that promise to disclose holes in their products only to the  spy agencies are paid for their silence, say experts and officials who  are familiar with the arrangements. To an extent, these openings for  government surveillance are required by law. Telecommunications  companies in particular must build their equipment in such a way that it  can be tapped by a law enforcement agency presenting a court order,  like for a wiretap. But when the NSA is gathering intelligence abroad,  it is not bound by the same laws. Indeed, the surveillance it conducts  via backdoors and secret flaws in hardware and software would be illegal  in most of the countries where it occurs.&nbsp;&nbsp;<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Today&#8217;s edition of <a href=\"http:\/\/www.nytimes.com\/2015\/01\/19\/world\/asia\/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html\"><i>The New York Times<\/i><\/a> offered additional insights into the NSA&#8217;s cyber-capabilities, disclosing that the spy agency <a href=\"http:\/\/www.nytimes.com\/2015\/01\/19\/world\/asia\/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html\">first penetrated North Korea&#8217;s on-line networks as early as 2010<\/a>: &nbsp;<\/span><\/span><\/span><\/span><\/p>\n<div class=\"story-body-text story-content\" data-para-count=\"488\" data-total-count=\"808\" itemprop=\"articleBody\"><span style=\"font-size: xx-small;\">Spurred  by growing concern about North Korea\u2019s maturing capabilities, the  American spy agency drilled into the Chinese networks that connect North  Korea to the outside world, picked through connections in Malaysia  favored by North Korean hackers and penetrated directly into the North  with the help of South Korea and other American allies, according to  former United States and foreign officials, computer experts later  briefed on the operations and <a href=\"http:\/\/www.spiegel.de\/media\/media-35679.pdf\">a newly disclosed N.S.A. document<\/a>.<\/span><\/div>\n<p><span style=\"font-size: xx-small;\">    <\/span><\/p>\n<aside class=\"marginalia related-coverage-marginalia nocontent robots-nocontent\" data-marginalia-type=\"sprinkled\" role=\"complementary\">\n<div class=\"nocontent robots-nocontent\"><span style=\"font-size: xx-small;\"><br \/><\/span><\/div>\n<\/aside>\n<p><span style=\"font-size: xx-small;\"><\/span><\/p>\n<div class=\"story-body-text story-content\" data-para-count=\"476\" data-total-count=\"1284\" id=\"story-continues-2\" itemprop=\"articleBody\"><span style=\"font-size: xx-small;\">A  classified security agency program expanded into an ambitious effort,  officials said, to place malware that could track the internal workings  of many of the computers and networks used by the North\u2019s hackers, a  force that South Korea\u2019s military recently said numbers roughly 6,000  people. Most are commanded by the country\u2019s main intelligence service,  called the Reconnaissance General Bureau, and Bureau 121, its secretive  hacking unit, with a large outpost in China.<\/span><\/div>\n<div class=\"story-body-text story-content\" data-para-count=\"476\" data-total-count=\"1284\" id=\"story-continues-2\" itemprop=\"articleBody\"><\/div>\n<div class=\"story-body-text story-content\" data-para-count=\"476\" data-total-count=\"1284\" id=\"story-continues-2\" itemprop=\"articleBody\"><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Of  course, these new revelations beg a rather important question: given  NSA&#8217;s detailed knowledge of North Korean neworks and hacking  capabilities, why wasn&#8217;t more done to blunt or even defeat the DPRK  threat? &nbsp;Actually, there are two major reasons. &nbsp;First, the U.S.  government is still trying to figure out the level of protection that  NSA can offer to commercial IT infrastructure. &nbsp;And beyond that, NSA is  acutely aware that intervention not only reveals details of its  defensive capabilities, it also compromises a valuable intelligence  source.<\/span><\/span><br \/><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\"><br \/><\/span><\/span><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">It&#8217;s  no consolation to Sony, but if the company had been a public utility or  in the financial sector, it would have likely received great assistance,  and at an earlier juncture in the attack. &nbsp;But as we&#8217;ve learned in  recent weeks, attacks on non-critical targets can also create havoc.  &nbsp;Accordingly, the nation must decide how much help it needs from  organizations like the NSA and what it is willing to give up in the name  of cyber defense.<\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>When Sony Pictures was hacked late last year, there was considerable speculation as to the groups&#8211;or nation&#8211;that was responsible for the cyber-attack. After the FBI became involved, the agency quickly announced that North Korea was behind the hack, citing the use of malware associated with previous cyber-strikes conducted by Pyongyang.&nbsp; But other security experts disagreed, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110746"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110746"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110746\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}