Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

Fuente: Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election


WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador

Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.

Fuente: WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador


Norway accuses group linked to Russia of carrying out cyber-attack | World news | The Guardian

Norway’s foreign ministry, army and other institutions have been targeted in a cyber-attack by a group suspected of having links to Russian authorities, according to Norwegian intelligence, which was one of the targets.

Fuente: Norway accuses group linked to Russia of carrying out cyber-attack | World news | The Guardian


The hacking is 21st-century, but US-Russia relations are stuck in the past | Simon Jenkins | Opinion | The Guardian

While Moscow’s cyberwar capacity is cutting-edge, the flurry of expulsions and misguided sanctions simply rehash the mistakes of the cold war

Fuente: The hacking is 21st-century, but US-Russia relations are stuck in the past | Simon Jenkins | Opinion | The Guardian


En qué consisten las sanciones aprobadas por EE.UU. contra Rusia por los ciberataques ocurridos durante la campaña electoral – El Mostrador

La Casa Blanca aprobó severas medidas para castigar a Moscú por sus supuestos intentos de influir en las elecciones presidenciales de noviembre pasado. Donald Trump dijo que el país debe “ocuparse de cosas más grandes y mejores”, aunque anunció que se reunirá la próxima semana con los jefes de inteligencia para informarse sobre el caso.

Fuente: En qué consisten las sanciones aprobadas por EE.UU. contra Rusia por los ciberataques ocurridos durante la campaña electoral – El Mostrador


DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian

The cyber-attack that brought down much of America’s internet last week was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history, experts said.

Fuente: DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian


Chinese webcam maker recalls devices after cyberattack link | Technology | The Guardian

An enormous DDoS attack was a network of hacked Internet of Things devices, many of which were made by Xiongmai

Fuente: Chinese webcam maker recalls devices after cyberattack link | Technology | The Guardian


Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian

The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.

Fuente: Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian


Payments networks battle new breed of criminals in cyber attacks – FT.com

Payments networks — whether Swift or the latest peer-to-peer money transfer app — are only as trustworthy as their weakest link. Even if data are encrypted in transit, each bank or individual on a network must be able to reliably prove who they are — and authentication in payments still has a way to go.

Fuente: Payments networks battle new breed of criminals in cyber attacks – FT.com


Someone Is Learning How to Take Down the Internet – Schneier on Security

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.

Fuente: Someone Is Learning How to Take Down the Internet – Schneier on Security


WikiLeaks advierte que están “bajo ataque sostenido” por publicación de documentos de Turquía – FayerWayer

La situación política de Turquía y el fallido golpe de Estado del pasado viernes 15 de julio en Estambul y Ankara contra el presidente Recep Tayyip Erdogan, llamó la atención de la plataforma WikiLeaks, quien a través de su cuenta en Twitter anunció la publicación de más de 100.000 documentos de la política interna turca.

Fuente: WikiLeaks advierte que están “bajo ataque sostenido” por publicación de documentos de Turquía – FayerWayer


“La ciberguerra sería una forma de terrorismo de Estado”

El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.

Fuente: “La ciberguerra sería una forma de terrorismo de Estado”


Asalto al tren del dinero virtual

Cada vez más entidades financieras son atracadas desde una silla, a través de una pantalla y sin que el ciberdelincuente se mueva de su asientoHablamos con un experto en ciberseguridad para saber cual es el modus operandi de los criminales, por dónde entran y cómo lo hacen

Fuente: Asalto al tren del dinero virtual


La defensa del caso Anonymous insiste en pedir la nulidad del juicio por la desproporcionalidad del proceso

A las nueve y media de la mañana arrancó el juicio por el caso Anonymous en la sala de vistas 14 del Juzgado de lo Penal número 3 de Gijón, en el Palacio de Justicia. Ante una sala casi al límite de su capacidad, se han podido oír las declaraciones de los tres acusados y el testimonio de dos funcionarios de la Policía Nacional. Además, también han testificado el director de Recursos Humanos de la empresa donde estuvo trabajando uno de los acusados y el jefe de TIC en el Congreso de los Diputados en el período en que fue atacada la página de esta institución, así como los dos peritos informáticos designados por la defensa.

Fuente: La defensa del caso Anonymous insiste en pedir la nulidad del juicio por la desproporcionalidad del proceso


Hackeada la base de datos del Banco Nacional de Qatar

Entre los datos filtrados hay información relacionada con agentes del MI6, miembros de la familia real qatarí y del gabinete del gobiernoLa brecha de seguridad afecta a más de 100.000 cuentas bancarias que contienen cerca de 15.000 documentos, con números de tarjeta de créditos, PIN e información personal

Fuente: Hackeada la base de datos del Banco Nacional de Qatar


Qatar National Bank hit by cyber attack — FT.com

Qatar National Bank, the gas-rich Gulf state’s leading lender, has been rocked by a data leak that has exposed the personal details of many of its clients in a file posted on social media that singles out some Al Jazeera staff and purports to identify security officials. The leak contains references to thousands of alleged transactions records of QNB customers, including remittance data to global banks with thousands of alleged beneficiary names and account numbers.

Fuente: Qatar National Bank hit by cyber attack — FT.com


Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador

El Ejército alemán contará con una división encargada de combatir los ataques cibernéticos, anunció esta semana la ministra de Defensa Ursula von der Leyen.

Fuente: Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador


Panamá Papers: las formas en las que los ricos y poderosos esconden riquezas y evaden impuestos – El Mostrador

Millones de documentos filtrados de la compañía panameña Mossack Fonseca muestran cómo la firma ayudó a clientes a lavar esconcer dinero y evadir impuestos.

Fuente: Panamá Papers: las formas en las que los ricos y poderosos esconden riquezas y evaden impuestos – El Mostrador


Malicious attacks account for bulk of data loss – FT.com

Malware and hacking have overtaken employee error as the leading cause of data loss at companies, according to research from Beazley, the insurer. Malicious attacks accounted for a third of data breaches last year, up from 18 per cent in 2014.

Fuente: Malicious attacks account for bulk of data loss – FT.com


Website hosting company Easily hit by cyber attack – FT.com

Easily.co.uk, one of the UK’s largest website hosting companies, has become the latest group to suffer a serious cyber attack. The company, which hosts 100,000 websites, 65,000 of them in the UK, confirmed on Thursday that it had been hacked. “A

Fuente: Website hosting company Easily hit by cyber attack – FT.com


La gran amenaza de los ‘cibercapos’ | Internacional | EL PAÍS

La gran amenaza de los ‘cibercapos’ | Internacional | EL PAÍS.


El director de Europol alerta de que hay entre 100 y 1.000 cabecillas de redes delictivas detrás de los ataques virtuales que proliferan en todo el mundo

Un hombre teclea en una ordenador en Varsovia (Polonia). / REUTERS (KACPEL PEMPEL)

Un nuevo vandalismo recorre el globo en un mundo cada vez más conectado. Los ciberataques contra grandes compañías y organismos, pero también contra ciudadanos y Gobiernos, se incrementaron en 2014 en un 48%, hasta alcanzar la inimaginable cifra de 42,8 millones de incidentes, según un informe de la consultora PwC, la cifra más alta desde 2010. La procedencia de los ataques los define: desde China, los piratas informáticos se concentran en el robo de propiedad intelectual. Desde Rusia, las organizaciones delictivas virtuales prefieren el espionaje puro, la destrucción y la criminalidad a secas de toda la vida, pero ahora con nuevos medios.

Como ha advertido el director de Europol, Robin Wainwright, el cibercrimen se ha convertido en la mayor amenaza para la seguridad europea junto al terrorismo. “La amenaza es enorme. Es ahora la prioridad número uno, junto al terror. Se está convirtiendo en un problema global y necesitamos más que nunca instrumentos para hacerle frente”, dijo Wainwright el viernes, último día de la Conferencia Global sobre el Ciberespacio celebrada la semana pasada en La Haya. Durante dos jornadas, más de 1.800 participantes entre expertos, activistas, gigantes de la web como Microsoft o Facebook, políticos de todos los continentes y padres de Internet como Vinton Cerf se reunieron en la ciudad holandesa, convertida esos días en una auténtica ventana al futuro.

Muchos de los ataques, según el director de Europol, se dirigen contra grandes bancos y entidades financieras y son cada vez más importantes por su “sofisticación en cuanto al malware (software maligno) utilizado y por la sofisticada ingeniería social para identificar a los empleados de los bancos” y asegura que, aunque varios de estos casos han saltado a las páginas de los periódicos, muchos no llegan a conocerse. Según sus datos, hay entre 100 y 1.000 capos detrás de estos atentados, la mayoría procedentes de Rusia o de Ucrania. “Es peligroso porque ha habido pérdidas multimillonarias. Pero lo importante es que pone de manifiesto una capacidad cada vez mayor”, aseguró.


Cyber criminals lead race to innovate – FT.com

Cyber criminals lead race to innovate – FT.com.

 

Devices to simulate cyber crimes are displayed at Interpol Global Complex for Innovation (IGCI) at its newly built building during the inauguration opening ceremony in Singapore on April 13, 2015. The Interpol Global Centre for Innovation opened its doors with officials hoping it will strengthen global efforts to fight increasingly tech-savvy international criminals. AFP PHOTO / ROSLAN RAHMAN©AFP

Cyber criminals are advancing faster than companies can defend themselves, with denial of service attacks worsening, ransoms on the rise and data breaches targeting more high-profile retailers, according to two widely followed reports from cyber security companies.

Five out of six large companies were targeted by an advanced hacker last year, up 40 per cent from the year before, according to a report compiled by Symantec, the internet security company.

He said the cyber world was similar to the business world, with criminals selling more ways to attack companies to meet demand, and copying their rivals’ most lucrative tactics.Kevin Haley, director of Symantec’s security response product and an author of the report, said the threat continued to rise because criminals had been so successful.

 


Chinese anti-censorship group Greatfire.org suffers massive hack | Technology | The Guardian

Chinese anti-censorship group Greatfire.org suffers massive hack | Technology | The Guardian.

 A Chinese national flag flies in front of the Google China headquarters in Beijing.Google’s headquarters in Beijing. Surfers in China might have found it harder to access an uncensored Google via Greatfire.org since the attack. Photograph: Sinopix/REX

An advocacy group that helps internet users inside China bypass blocks on censored content says it is suffering a denial-of-service attack disrupting its operations.

US-subsidised Greatfire.org says the attack started two days ago and traffic is 2,500 times above normal. It has affected “mirror”, or duplicate, websites that it has set up via encrypted web services offered by companies such as Amazon.

Greatfire.org said the attack has interfered with visitors to sites including Boxun.com, which publicises allegations of corruption and human rights abuses inside China, German provider Deutsche Welle, and Google.

The statement from a co-founder of the group, who goes by the pseudonym Charlie Smith, said it’s not clear who is behind the attack, but it coincides with increased pressure on the organization over the last few months and public criticism from Chinese authorities.


FBI probes possible China military involvement in cyber attack – FT.com

FBI probes possible China military involvement in cyber attack – FT.com.

hacking hackers chinese registry.com©Dreamstime

The FBI is investigating possible Chinese military involvement in a cyber hack at Register.com, which manages more than 1.4m website addresses for businesses around the world.

Hackers, who appear to have stolen network and employee passwords, have accessed Register’s network for about a year, said people familiar with the probe. But the breach, which the company reported to the FBI but not to customers or investors, is not known to have caused disruptions or resulted in any theft of client data.

Although the investigative trail has pointed to Chinese military involvement, it is unclear what China would want to accomplish by hacking the site. Some current and former law enforcement officials said, however, that the hack could be aimed at obtaining the ability to undermine large parts of internet infrastructure.That has bolstered investigators’ belief that the hackers are state-sponsored rather than criminals intent on making money from credit card data or social security information.

 


Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise – The Intercept

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise – The Intercept.

Featured photo - Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise

The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.

In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document.

These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.

By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content:

Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect.

The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists:

INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting:

A = Indian Diplomatic & Indian Navy
B = Central Asian diplomatic
C = Chinese Human Rights Defenders
D = Tibetan Pro-Democracy Personalities
E = Uighur Activists
F = European Special Rep to Afghanistan and Indian photo-journalism
G = Tibetan Government in Exile

In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.”


España es, tras EE UU y Reino Unido, el país que sufre más ciberataques | España | EL PAÍS

España es, tras EE UU y Reino Unido, el país que sufre más ciberataques | España | EL PAÍS.


Margallo revela que en 2014 se registraron más de 70.000 incidentes cibernéticos

España fue en 2014 el tercer país con más ciberataques. / KACPER PEMPEL (REUTERS)

Con más de 70.000 ciberincidentes, España fue el año pasado el tercer país del mundo, tras Estados Unidos y Reino Unido, que más ataques cibernéticos sufrió. Así lo ha revelado este jueves el ministro de Asuntos Exteriores, José Manuel García-Margallo, durante la presentación del monográfico sobre ciberguerra editado por Vanguardia Dossier. El ministro no ha detallado la gravedad de estos ataques, sus orígenes o destinatarios, pero ha dicho que afectaron tanto a la Administración como a ciudadanos particulares y empresas, incluidas las responsables de gestionar infraestructuras críticas.

Margallo ha asegurado que España está respondiendo “en tiempo real al desafío que suponen las ciberamenazas” y ha anunciado que está en elaboración un Plan Nacional de Ciberseguridad, que tendrá en cuenta las estrategias sobre esta materia de la UE y la OTAN, por parte del Consejo Nacional de Ciberseguridad, que preside el director del Centro Nacional de Inteligencia (CNI), el general Félix Sanz. Además, Defensa ha puesto en marcha un Mando Conjunto de Ciberdefensa y Exteriores participa en el grupo internacional de expertos en ciberseguridad en el marco de Naciones Unidas.


EE.UU. ‘quebrantó’ las redes informáticas de Corea del Norte en 2010 – El Mostrador

EE.UU. ‘quebrantó’ las redes informáticas de Corea del Norte en 2010 – El Mostrador.

La Agencia de Seguridad Nacional logró romper las barreras informáticas en 2010 y entrar en los sistemas norcoreanos a través de las redes chinas que conectan a este país con el resto del mundo.

eeuucoreadelnorte

Estados Unidos “quebrantó” las redes informáticas de Corea del Norte en 2010 y por eso supo que el país estaba detrás del ataque a Sony Pictures, reportaron The New York Times y Der Spiegel.

Corea del Norte dedicó dos meses a entrar en los sistemas de Sony después de que la empresa anunciara sus planes para producir una comedia sobre el asesinato del líder de este país, titulada “The Interview”.

La Agencia de Seguridad Nacional logró romper las barreras informáticas en 2010 y entrar en los sistemas norcoreanos a través de las redes chinas que conectan a este país con el resto del mundo.

Corea del Norte ha negado repetidamente su responsabilidad en el ciberataque contra Sony.


NSA Played Key Role Linking North Korea to Sony Hack – The Intercept

NSA Played Key Role Linking North Korea to Sony Hack – The Intercept.

Featured photo - NSA Played Key Role Linking North Korea to Sony Hack

National Security Agency data and technical analysis assisted in the U.S. government’s attribution of the Sony cyber attack to North Korea, Admiral Michael Rogers said on Thursday.

“We partner with the Department of Homeland Security and FBI in various areas and this is one such area,” Rogers, the NSA director, said in response to a question from a reporter with The Daily Beast about the agency’s role, if any, in the attribution of the Sony attack to North Korea.


Piratas informáticos roban datos de miles de clientes en un banco de Suiza – BioBioChile

Piratas informáticos roban datos de miles de clientes en un banco de Suiza – BioBioChile.

 

Banco Cantonal de Ginebra | Fabrice Coffrini | AFP

Banco Cantonal de Ginebra | Fabrice Coffrini | AFP

 

Publicado por Alberto Gonzalez | La Información es de Agencia AFP

 

Piratas informáticos robaron los datos de miles de clientes del Banco Cantonal de Ginebra (BCGE), anunció este jueves la entidad, que se declara víctima de una extorsión por lo que ha presentado una querella. Autoridades confirmaron que se ha abierto una investigación judicial.

El ataque informático se produjo al principio de semana a través de la página web del banco, que fue reivindicado por el grupo de hackers Rex Mundi a través de Twitter. La organización reclama 10.000 euros para el viernes porque de lo contrario amenaza con publicar los 30.000 correos electrónicos robados de clientes, según el diario suizo Le Temps.


North Korea responds with fury to US sanctions over Sony hack | World news | The Guardian

North Korea responds with fury to US sanctions over Sony hack | World news | The Guardian.


Pyongyang denies involvement in Sony Pictures hack and accuses US of stirring up hostility

Obama and Kim
The US president, Barack Obama, and North Korean leader, Kim Jong-un. Photograph: Michael Nelson/KCNA/EPA

North Korea has furiously denounced the United States for imposing sanctions in retaliation for the Pyongyang regime’s alleged cyber-attack on Sony Pictures.

North Korea’s foreign ministry reiterated that it did not have any role in the breach of tens of thousands of confidential Sony emails and business files and accused the US of “groundlessly” stirring up hostility towards Pyongyang. He said the new sanctions would not weaken the country’s 1.2 million-strong military.

“The policy persistently pursued by the US to stifle the DPRK [North Korea], groundlessly stirring up bad blood towards it, will only harden its will and resolution to defend the sovereignty of the country,” North’s state-run KCNA news agency quoted the unnamed spokesman as saying on Sunday.

On Friday, the US sanctioned 10 North Korean government officials and three organisations, including Pyongyang’s primary intelligence agency and state-run arms dealer, in what the White House described as an opening move in the response towards the Sony cyber-attack. It was the first time the US has imposed sanctions on another nation in direct retaliation for hacking an American company. Barack Obama also warned that the US was considering whether to put the authoritarian regime back on its list of state sponsors of terrorism.

North Korea expressed fury over The Interview, a Sony comedy about a fictional CIA plot to kill Kim Jong-un, slamming it as an “act of terror”. It denied hacking Sony, but called the act a “righteous deed”.

There have been doubts in the cyber community about the extent of North Korea’s involvement in the hacking. Many experts have said it is possible that hackers or even Sony insiders could be the culprits, and questioned how the FBI could point the finger so conclusively.

Pyongyang has demanded a joint investigation into the attack and claimed US rejection of the proposal was proof of its guilty conscience and that it was seeking a pretext for further isolating North Korea.


Obama autoriza sanciones a Corea del Norte tras el ciberataque a Sony | Internacional | EL PAÍS

Obama autoriza sanciones a Corea del Norte tras el ciberataque a Sony | Internacional | EL PAÍS.

Un canal de Corea del Sur emite una noticia sobre Sony. / AHN YOUNG-JOON (AP)

El presidente de Estados Unidos, Barack Obama, ha dado este viernes su autorización para aumentar las sanciones contra el régimen de Corea del Norte. Según ha explicado la Casa Blanca, la medida es una respuesta a las “continuadas acciones y políticas provocadoras, desestabilizadoras y represivas” de Pyongyang. Especialmente, ha subrayado, por el “ciberataque coercitivo y destructivo contra Sony Pictures” tras la producción de la película La Entrevista.

Esta comedia sobre dos periodistas reclutados por la CIA para asesinar al líder norcoreano, Kim Jong-un, desató las iras y amenazas de Corea del Norte el mes pasado, hasta el punto de que Sony llegó a cancelar su estreno en cartelera, previsto el día de Navidad. Finalmente, tras fuertes críticas por el paso atrás, incluso de Obama, la cinta fue exhibida en varios centenares de cine independientes y a través de plataformas digitales de pago, en lo que fue descrito en EE UU como una manera de defender la libertad de expresión.

Aunque algunos especialistas en informática han puesto en duda la versión oficial, el Gobierno de Obama y el FBI insisten en señalar a Pyongyang como el responsable del ataque informático contra Sony a finales de noviembre. Una posición reiterada este viernes por altos funcionarios del Gobierno al desgranar las sanciones autorizadas por Obama, quien reafirma de esta manera también su señalamiento hacia Corea del Norte.

“Mientras el FBI continúa su investigación sobre el ciberataque, estas nuevas medidas dejan claro que haremos uso de un amplio abanico de herramientas para defender los negocios estadounidenses y a sus ciudadanos, y para responder a los intentos de minar nuestros valores o de amenazar la seguridad nacional de EE UU”, ha declarado por su parte el secretario del Tesoro, Jacob Lew.

Su departamento es el encargado de aplicar las nuevas sanciones, que afectan a tres empresas norcoreanas y a diez altos funcionarios del régimen de Kim y responsables de las entidades afectadas. Su designación bloquea cualquier activo de los afectados en territorio estadounidense y les deniega también otro tipo de acceso al sistema financiero norteamericano. Además, prohíbe a cualquier empresa o ciudadano de EE UU realizar cualquier tipo de transacción con los sancionados.


North Korea/Sony Story Shows How Eagerly U.S. Media Still Regurgitate Government Claims – The Intercept

North Korea/Sony Story Shows How Eagerly U.S. Media Still Regurgitate Government Claims – The Intercept.

BY GLENN GREENWALD 

Featured photo - North Korea/Sony Story Shows How Eagerly U.S. Media Still Regurgitate Government Claims

The identity of the Sony hackers is still unknown. President Obama, in a December 19 press conference, announced: “We can confirm that North Korea engaged in this attack.” He then vowed: “We will respond. . . . We cannot have a society in which some dictator some place can start imposing censorship here in the United States.”

The U.S. Government’s campaign to blame North Korea actually began two days earlier, when The New York Times – as usual – corruptly granted anonymity to “senior administration officials” to disseminate their inflammatory claims with no accountability. These hidden “American officials” used the Paper of Record to announce that they “have concluded that North Korea was ‘centrally involved’ in the hacking of Sony Pictures computers.” With virtually no skepticism about the official accusation, reporters David Sanger and Nicole Perlroth deemed the incident a “cyberterrorism attack” and devoted the bulk of the article to examining the retaliatory actions the government could take against the North Koreans.

The same day, The Washington Post granted anonymity to officials in order to print this:

Other than noting in passing, deep down in the story, that North Korea denied responsibility, not a shred of skepticism was included byPost reporters Drew Harwell and Ellen Nakashima. Like the NYT, the Postdevoted most of its discussion to the “retaliation” available to the U.S.


When it comes to surveillance, there is everything to play for | James Ball | Comment is free | theguardian.com

When it comes to surveillance, there is everything to play for | James Ball | Comment is free | theguardian.com.

Against a backdrop of hacks and terror attacks, it’s possible that surveillance powers will be further strengthened
Man looking through binoculars
‘Major players are starting to regard privacy as a selling point: Google and others are encrypting ever more of their traffic.’ Photograph: Tom Jenkins

Looking back at 2014 from the perspective of a surveillance reformer is a short and dispiriting task: almost nothing good happened.


Sony hack: sacked employees could be to blame, researchers claim | Film | The Guardian

Sony hack: sacked employees could be to blame, researchers claim | Film | The Guardian.

Sony cancelled the release of the Interview in major cinemas, believing it had been hacked by North Korea in retaliation for the film’s depiction of its leader Kim Jong-un being assasinated Photograph: Veronique Dupont/Getty

Security experts investigating the devastating hack against Sony Pictures appear to be moving away from the theory that the attack was a carried out by North Korea, focusing instead on disgruntled former employees of the firm.

Researchers at Norse cybersecurity claim that six former employees could have compromised the company’s networks, arguing that accessing and navigating selective information would take a detailed knowledge of Sony’s systems.

Norse is not part of the official FBI investigation, but did brief the government on Monday, the company said. Though noting that the findings are “hardly conclusive”, Norse senior vice president Kurt Stammberger told the Security Ledger that nine researchers had begun to explore the theory that an insider with motive against Sony would be best placed to execute a hack.

“The FBI points to reused code from previous attacks associated with North Korea, as well as similarities in the networks used to launch the attacks,” said writer Bruce Schneier. “This sort of evidence is circumstantial at best. It’s easy to fake, and it’s even easier to interpret it wrong. In general, it’s a situation that rapidly devolves into storytelling, where analysts pick bits and pieces of the ‘evidence’ to suit the narrative they already have worked out in their heads.”

 

Schneier also said that diplomatically, it may suit the US government to be “overconfident in assigning blame for the attack” to try and discourage future attacks by nation states.

 

He also pointed to comments by Harvard law professor Jonathan Zittrain, who said Sony might be encouraged to present the hack as an act or terrorism to help fend of likely lawsuits from current and former employees damaged by leaked material.

“If Sony can characterize this as direct interference by or at the behest of a nation-state, might that somehow earn them the kind of immunity from liability that you might see other companies getting when there’s physical terrorism involved, sponsored by a state?” Zittrain told AP.