Subscribe

Was North Korea behind the Sony hack? Not all experts agree. (+video)

Some cyber specialists aren't convinced that North Korea was the culprit. One critic calls the the FBI’s evidence 'weak' and 'at best, speculation.' Others back the FBI claims.

The outrage over the hack of Sony Pictures, and the widespread difference of professional opinion about who actually did it has neatly illustrated one of the biggest challenges for US military officials who spend their days thinking about cyberwarfare and its implications: How do you figure out who, precisely, is responsible for an attack and, equally important, what is the appropriate response?

The FBI released a statement Friday saying that the North Koreans were definitely the ones responsible for the Sony hack, because the agency “now has enough information” to make its case.

“Though the FBI has seen a wide variety and increasing number of cyber intrusions,” the “destructive nature” of the attack made it particularly egregious, the agency statement said. 

North Korea’s actions were intended to “suppress the right of American citizens to express themselves,” the statement notes. “Such acts of intimidation fall outside the bounds of acceptable state behavior.” 

On Monday, the Internet-monitoring group Dyn Research reported broad Internet outages across North Korea, though the cause was not immediately known.

Interestingly, many cyber specialists still weren’t convinced that North Korea was the culprit in the Sony hack.

North Korea denied the attack, and yet they normally revel in poking the US in the eye, many cyber analysts point out.

Mark Rogers, who is part of a jury that decides who gets to present papers at DEF CON, the premier hacking conference, calls the FBI’s evidence “weak” and “at best, speculation.” 

The FBI cites IP addresses matching those used in the past by North Korea, but proxy addresses “could be used by just about anyone” to hide their location, Mr. Rogers notes in a blog post.

This is a point that Pentagon officials, too, grapple with in the cyberwarfare realm. Former Deputy Secretary of Defense William Lynn noted as far back as 2010, for example, that “traditional arms control agreements would likely fail to deter cyber attacks because of the challenges of attribution, which make the verification of compliance almost impossible.” 

In other words, “If you don’t know who to attribute an attack to, you can’t retaliate against that attack,” he said. “You can’t deter through punishment, you can’t deter by retaliating against the attack.”

The complexities of cyberwarfare even caused Mr. Lynn to lament the good old days of “nuclear missiles, which of course come with a return address.”

But in the several years since then, the Pentagon and the FBI have learned a few things, says James Lewis, a cyber expert and director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington.

“The United States realized that figuring out who was doing an attack was going to be crucial to a defensive response and put immense capabilities into it,” he says. When it comes to attribution, North Korea, Iran, and China have become particular areas of focus for the US intelligence community, he adds. 

This likely helped them determine that North Korea was the culprit in the Sony hack, Lewis says – a determination with which he concurs. 

“You have people who have no trouble believing everything [former National Security Agency-employed leaker Edward] Snowden says about NSA surveillance of the American people, and yet they question” the FBI’s statements about North Korea carrying out the Sony attack.

“The USA spies on some people all of the time,” Lewis says. “North Korea is a place that gets lots of attention.”

But the threats that prompted theaters to refuse to release the Sony film that sparked the hack – namely, that North Korea would carry out a 9/11-style attack as a punishment for those who did – are more ridiculous, Lewis says.

“You can turn out lights and erase data, but no one can do a ‘cyber-9/11’ – not even us,” he says. 

“The North Koreans are famous for making these bombastic threats – you can see them on YouTube – threatening to blow up L.A., New York, the White House,” he adds. “They love making these threats.” 

The proper response to the hack, and these sorts of bombastic threats, is not a military or even an equivalent response, Lewis argues. 

“I don’t think the Pentagon has a role here, but we need to send a message to North Korea that they can’t get away with it," he says. Pentagon officials tend to feel the same way. 

“I mean, clearly if you take down significant portions of our economy we would probably consider that an attack,” Lynn said. “But an intrusion stealing data, on the other hand, probably isn’t an attack. And there are [an] enormous number of steps in between.”

To this end, US law enforcement agencies could bore into the front companies and criminal networks that support North Korean leadership by their funneling of hard currency into the country, he adds.

This might also involve pumping information into the country by decidedly less high-tech means. In a country so notoriously cut off from the Internet, it might involve DVDs smuggled in from China or “Voice of America” style broadcasts, letting North Koreans know that there is a movement from the rest of the world, through the United Nations, to bring their leadership to trial for war crimes.

“The fact that they respond so violently to attacks on their ‘dear leader,’ ” Lewis says, “also tells us exactly where we should be pushing."

About these ads
Sponsored Content by LockerDome
 
 
Make a Difference
Inspired? Here are some ways to make a difference on this issue.
FREE Newsletters
Get the Monitor stories you care about delivered to your inbox.
 

We want to hear, did we miss an angle we should have covered? Should we come back to this topic? Or just give us a rating for this story. We want to hear from you.

Loading...

Loading...

Loading...

Save for later

Save
Cancel

Saved ( of items)

This item has been saved to read later from any device.
Access saved items through your user name at the top of the page.

View Saved Items

OK

Failed to save

You reached the limit of 20 saved items.
Please visit following link to manage you saved items.

View Saved Items

OK

Failed to save

You have already saved this item.

View Saved Items

OK