Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Printable Version +- Deep Politics Forum (https://deeppoliticsforum.com/fora) +-- Forum: Deep Politics Forum (https://deeppoliticsforum.com/fora/forum-1.html) +--- Forum: Propaganda (https://deeppoliticsforum.com/fora/forum-12.html) +--- Thread: Who Would Think To Make A Comedy About Assassinating A Current National Leader?! (/thread-13465.html) |
Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Magda Hassan - 21-12-2014 Peter Lemkin Wrote:They also claim the attack came from a NK IP address - but that is very easy for any hacker anywhere to do. No one would do this. It's like robbing your local bank branch where everyone knows you not wearing a balaclava waving and smiling at the CCTV and wearing a name tag on your work uniform and driving your own car registered to your home address to do a bank robbery. Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Lauren Johnson - 21-12-2014 Quote:Remember how long [months] before anyone even ventured to say where the stuxnet attack came from...but this was determined in about 24 hours or less.....it smells bad. It wouldn't even surprise me if we find out that some intel agency had the idea to make a film with this theme to begin with...though I know of no such evidence. I think there is a lot more to this story that will (not?) come out? It smells, doesn't it? Last year, the film Zero Dark Thirty, a POS movie, wins the academy award. It gets lots of publicity and lots of it was about a gifted female director (gasp!) -- Katherine Bigelow. I finally rented it from Netflix and quickly realized it was nothing but an improvisation on from The Mighty Wurlitzer. I see this film as part of the Obama campaign for global chaos and regime change. Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Albert Doyle - 21-12-2014 Zero dark 30 sounds like a good name for the 12:30pm assassination hour of President Kennedy. Isn't this sort of like the bastards indirectly bragging about their accomplishment? America scares me because it is like a pack of propagandized retards gobbling up this wicked covert poetic symbolism without realizing they are being mocked by it. Just jingo it up and turn on the John Wayne music and they'll buy anything. The speed at which gov't discovered the North Korean source reminds me of the quick identification of Lee Harvey Oswald. Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Lauren Johnson - 21-12-2014 Albert Doyle Wrote:Zero dark 30 sounds like a good name for the 12:30pm assassination hour of President Kennedy. Isn't this sort of like the bastards indirectly bragging about their accomplishment? America scares me because it is like a pack of propagandized retards gobbling up this wicked covert poetic symbolism without realizing they are being mocked by it. Just jingo it up and turn on the John Wayne music and they'll buy anything. Actually, Zero Dark Thirty is a riff on a slang military term of O Dark Thirty. I've heard it before from a former special forces guy I know. Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Peter Lemkin - 23-12-2014 All internet was shut down in N. Korea for about 24 hours. BBC had the temerity to suggest it was just due to bad 'infrastructure' in N. Korea and not an attack by the NSA [or similar]. ::willynilly:: Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Magda Hassan - 23-12-2014 Peter Lemkin Wrote:All internet was shut down in N. Korea for about 24 hours. BBC had the temerity to suggest it was just due to bad 'infrastructure' in N. Korea and not an attack by the NSA [or similar]. ::willynilly:: Yes. Heard that too. They can't have it both ways. That same poor infrastructure also eliminates them as a hacking suspect. Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Magda Hassan - 23-12-2014 In Plain English: Five Reasons Why Security Experts Are Skeptical North Korea Masterminded The Sony Attack1. The Original Messages from the Hackers were About Layoffs, Not "The Interview"The attackers originally sent messages to Sony referencing layoffs and demanding financial compensation. The tone was highly personal and did not reference "The Interview" movie at all. That's one reason why security experts (on private mailing lists) have been saying that disgruntled ex-employees are a likely candidate. The attackers only mentioned "The Interview" movie after the press suggested there was a connection. This is the original threat letter sent via email to Sony executives on November 21: "[M]monetary compensation we want," the email read. "Pay the damage, or Sony Pictures will be bombarded as a whole. You know us very well. We never wait long. You'd better behave wisely." 2. Underground Hackers Share Code and Tools The FBI claims that there are similarities to other attacks attributed to North Korea. Security experts say that those attacks may not even have been North Korean in origin. However, even if they were  underground hackers share and sell code with each other. It's unsurprising that there would be overlap between cyberattacks. 3. IP Addresses Are Poor Evidence The FBI cites similarities between IP Addresses used in this attack and in other attacks associated with North Korea. This is sloppy analysis because those IP addresses are public and don't have any special affiliation with North Korea. Plus, skilled hackers can fake IP addresses. So this is not a reliable piece of evidence. 4. The "Clues" Leading to North Korea Could Have Been Faked Trickery and "trolling" are part of underground hacker culture. Deception is part of criminal culture. So why is the FBI so willing to take the code left by Sony's hackers at face value? Whether it's the presence of Korean language or a connection to a North Korean computer, the clues leading to North Korea could have been faked. Imagine that you are at the scene of a crime and someone had written "North Korea was here" on the walls. While that's a good reason to take a look at North Korea, it's not proof either. The FBI cites similarities in "specific lines of code, encryption algorithms, data deletion methods, and compromised networks." Those could all be explained by cooperation (or sales) between hackers  or by intentionally making the hack point to North Korea. Not all attacks are done by criminals who want credit. Sometimes they pin the blame on someone else. If you hacked Sony, would you want the world to know? 5. North Korea but Not the Government It could have been North Koreans but not connected to the government. According to security expert Bruce Schneier, "reusing old attack code is a sign of a more conventional hacker being behind this." There is consensus among security experts that there was nothing about this hack that required the resources of a nation-state. Both the US Government and Sony Have Political Reasons to Blame North Korea Sony faces the possibility of numerous lawsuits as a result of sensitive data from employees, ex-employees and various partners being exposed. According to Jonathan Zittrain, professor of law and computer science at Harvard University, Sony might have some immunity from these lawsuits if this attack was part of an act of war. The government has every reason to blame North Korea as well. That is certainly stronger positioning than admitting that the hackers hid themselves well. This also discourages other nation-states from trying something similar. Unfortunately, this also sends a message to hackers that they can get away with attacks if they can cast the blame on the right rogue nation-state. Bruce Schneier raises the possibility that the government has classified intel that it's withholding. The NSA has been paying close attention to North Korea  who knows what documents they have that they choose not to disclose. However, it's dangerous for us as American citizens to accept the government's decision to accuse North Korea  a rogue country with nuclear aspirations  without a more legitimate body of evidence supporting this conclusion. A multitude of security experts and tech-savvy journalists have covered this in great detail. Marc Rogers of Cloudflare has one of the best. This piece by Bruce Shneier is one of the more comprehensive pieces that is also (relatively) accessible without a security background. http://www.businessinsider.com/why-security-experts-are-skeptical-that-north-korea-masterminded-the-sony-attack-2014-12?IR=T Who Would Think To Make A Comedy About Assassinating A Current National Leader?! - Magda Hassan - 23-12-2014 The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didn't tell you.20 December 2014tags: cybercrime, cyberwar, information operations, internet, north korea, propaganda, sony by Editor of the Fabius Maximus website Summary: The government blames North Korea of the Axis of Evil for the attack on Sony, a claim quite like the bogus claims of the past we so credulously believed. No matter how often they lie to us, Americans believe what the government tells us. They lie, we believe, their lies are exposed rinse, repeat. It makes us easy to govern, incapable of self-government, and quite different than our skeptical unruly forebearers. We can do better. This is a great day to begin. Read this and decide for yourself. This is the most complete collection of information I've found on this story. Second post in this series; see links to the others at the end. Contents
(1) Articles questioning the FBI's story.While most journalists report official government statements, and cite only approving voices, there are a few who quote dissenters. We should pay attention to these few, considering the long list of government lies attributing evil deeds to designated foes. Learning from experience is the beginning of strength.
(2) About the attack.Hewett Packard posted an excellent summary of the attack and North Korea's capabilities and possible role. See their August 2014 report about North Korea's cyber capabilities. They discuss the Chongryon, a group of North Koreans in Japan who run its some of its most important cyber and intelligence programs. Also see the detailed analysis posted by Risk Based Security. Why does the government tell us so little of the evidence? Some speculate that the NSA provided much of the evidence, but they're keeping this SIGINT secret (e.g., Nicholas Weaver at Mashable). That's logical. The pseudonymous but well-known information security expert going by the handle "the gugq" agrees: "I'll accept the Feeb's answer, I just don't believe they've shown their work. Mostly because it's not their work, they just copied from NSA." As you see below, after more thought he became more skeptical. So should you. History suggests skepticism about these stories, given the history of US government and its corporate allies exaggerating the power of designated US foes. The Soviet Union was ominous superpower until it collapsed after years of internal rot (unnoticed by our lavishly funded intel agencies). Brian Honan (info security expert; bio here) reminds us of the 1998 "Solar Sunrise" attack by Iraq on US Army websites? US Deputy Defense Secretary John Hamre said it was "the most organized and systematic attack to date" on US military systems. A massive multi-agency task force eventually arrested 4 teenage boys. See the details here. (3) Dissenting voices to the official story(a) The best summary I've seen in rebuttal to the FBI's story Excerpt from Marc Rogers's article (red emphasis added):
Jeffrey Carr, cybersecurity expert {see Wikipedia} and CEO of Taia Global, is one of the skeptics. He told Mashable that "one of the biggest mistakes is that because an attack can be traced to the North Korean Internet that somehow means it's the North Korean government. That's a false assumption, because the North Korean Internet is basically provided by outside companies, in this case a Thai company. Nothing presented excludes alternate scenarios, so why jump to the most serious one?" © More from Jeffrey Carr, from his Digital Dao articles:Carr notes that it appears the FBI is getting most of its intelligence from private security companies, without vetting or verifying that information. He added: "The White House is now getting ready to take some kind of action, as if it's a sure thing that the North Korean government is involved. Meanwhile you have the hackers who actually are responsible laughing because this is the most epic false flag ever." Is North Korea responsible for the Sony breach? I can't imagine a more unlikely scenario than that one, and for many of the same reasons that Kim Zetter detailed in her excellent article for Wired. {December 17} There is a common misconception that North Korea's ITC is a closed system therefore anything in or out must be evidence of a government run campaign. In fact, the DPRK has contracts with foreign companies to supply and sustain its networks. … For the DPRK, that's Loxley, based in Bangkok. The geolocation of the first leak of the Sony data on December 2 at 12:25am was traced to the St. Regis hotel in Bangkok, an approximately 13 minute drive from Loxley offices. This morning, Trend Micro announced that the hackers probably spent months collecting passwords and mapping Sony's network. That in addition to the fact that the attackers never mentioned the movie until after the media did pretty much rules out "The Interview" as Pyongyang's alleged reason for retaliation. If one or more of the hackers involved in this attack gained trusted access to Loxley Pacific's network as an employee, a vendor, or simply compromised it as an attacker, they would have unfettered access to launch attacks from the DPRK's network against any target that they wish. Every attack would, of course, point back to the hated Pyongyang government. Under international law, "the fact that a cyber operation has been routed via the cyber infrastructure located in a State is not sufficient evidence for attributing the operation to that State" (Rule 8, The Tallinn Manual). (December 19} (d) From the grugq's post (bio here; his website): This is a media blitz campaign by a group that is steeped in Internet culture and knows how to play to it. They can manipulate it to maximum effect. This is definitely far more sophisticated than the usual rhetoric from North Korea. … To handle this sophisticated media / Internet campaign so well would require a handler with strong English skills, deep knowledge of the Internet and western culture. This would be someone quite senior and skilled. That is, I can't see DPRK putting this sort of valuable resource onto what is essentially a petty attack against a company that has no strategic value for DPRK. (e) Robert Graham (CEO of Errata Security) provides another perspective at their website. Here are two excerpts.While there may be more things we don't know, on its face {the FBI press release is} complete nonsense. It sounds like they decided on a conclusion and are trying to make the evidence fit. They don't use straight forward language, but confusing weasel words, like saying "North Korea actors" instead of simply "North Korea". They don't give details. The reason it's nonsense is that the hacker underground shares code. They share everything: tools, techniques, exploits, owned-systems, botnets, and infrastructure. Different groups even share members. It is implausible that North Korea would develop it's own malware from scratch. (19 December 2014) My story … better explains the evidence in the Sony case than the FBI's story of a nation-state attack. In both cases, there are fingerprints leading to North Korea. In my story, North Korea is a customer. In the FBI's story, North Korea is in charge. However, my story better explains how everything is in English, how there are also Iranian fingerprints, and how the threats over The Interview came more than a week after the attack. The FBI's story is weak and full of holes, my story is rock solid. (f) From the Tom's Guide article:I scan the Internet. I find compromised machines all over the place. Hackers have crappy opsec, so that often leads me to their private lairs (i.e. their servers and private IRC chat rooms). There are a lot of SPECTRE-like organizations throughout the world, in Eastern Europe, South America, the Islamic world, and Asia. At the bottom, we see idiot kids defacing websites. The talented move toward the top of the organization, which has nebulous funding likely from intelligence operations or Al Qaeda, though virtually none of their activities are related to intelligence/cyberwar/cyberterror (usually, stealing credit cards for porn sites). My point is this. Our government has created a single story of "nation state hacking". When that's the only analogy that's available, all the evidence seems to point in that direction. But hacking is more complex than that. In this post, I present a different analogy, one that better accounts for all the evidence, but one in which North Korea is no longer the perpetrator. (19 December 2014) "There's no evidence pointing to North Korea, not even the barest of hints," Robert Graham, CEO of Atlanta-based Errata Security, told Tom's Guide. "Some bit of code was compiled in Korea but that's South Korean (banned in North Korea, [which] uses Chinese settings). Sure, they used threats to cancel The Interview but after the FBI said they might." (g) Update: Comment by Marcus Ranum, cyber-security expert (bio here) and on the FM website's team of authors.The movie angle only cropped up 3 days into the attack, at which point the attackers latched onto it like a bunch of gamergaters who'd found another excuse for misogyny. Prior to the movie angle, there was no North Korea evidence, then it starts popping up. Marcus sent me a follow-up note:The malware used is not specifically North Korean. It's run of the mill stuff using techniques that were notoriously used in the shamoon' attack against Saudi Aramco (does that make it Israeli?). The "common elements" the FBI boneheads are talking about is the disk wipe module, which is the most popular scriptable disk wipe; I've used it myself. Please, nobody point the finger at me for this attack in spite of the "common elements" This bears all the hallmarks of a bunch of sociopathic American hackers; more like something from the former "anti-sec" crew than anything state-sponsored. I'm guessing the FBI doesn't want to talk about those "common elements" because anti-sec was being run by the FBI when they attacked Brazilian police and oil exploration assets. If we ever find out who's behind it, my money is on some badly adjusted American nihilists in the 20-30 year old unemployed trouble-maker or "security consultant" demographic. These attacks are not sophisticated; what makes them so bad is that they got a very deep foothold in Sony before they started causing trouble, and Sony's infrastructure was deeply compromised. Most American companies, attacked in a focused manner, would fall just like Sony has. The attacks almost certainly (in my mind) are the work of some American sociopaths, probably guys pretty much like the antisec crew (which was led by an FBI informant). The tools in use are irrelevant; it would be like saying "the attacker used a gun, which points at Germany because it was an H&K" or "the attacker used a gun, which point to the US because Americans are gun nuts". (h) Others experts have expressed skepticism, but with no details. Such Brett Thomas (CTO of internet services provider Vindicia; his bio):The Korean in the malware comments appears to have been planted there as a deliberate red herring; it's google translate quality. It would be like saying that"Ñто фигнÑ" shows I'm a KGB agent. All of the evidence FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK http://t.co/hkZ3D7ZfxK .Brett Thomas (@the_quark) December 19, 2014 Another cautionary note, by Sean Sullivan (security advisor to Finnish internet security firm F-Secure): The US security-intelligence complex is running amok once again. Washington D.C. is incapable of saying "we don't know." #ConfirmationBias Update: Robert M. Lee (Co-Founder at Dragos Security LLC , First Lieutenant USAF cyberspace Operations Officer; bio here):Sean Sullivan (@5ean5ullivan) December 19, 2014 "FBI Update on Sony Investigation" http://t.co/SzHJNBnE5N > Having been in the IC I know how valuable sources are but this doesn't cut it. .Robert M. Lee (@RobertMLee) December 19, 2014 (4) Remember this before you believe |