logo
Weather page
GET THE APP
ePaper
google_play
app_store
  • Login
  • E-Edition
  • News
  • Sports
  • Obits
  • Opinion
  • Classifieds
    • Place an Ad
    • All Listings
    • Jobs
  • Special Sections
  • Photo Gallery
  • Contests
  • Lifestyle/Entertainment
  • Games
    • News
      • Local News
      • PA State News
      • Nation/World
    • Sports
      • Local
      • College Sports
      • State
      • National
    • Obits
    • Opinion
      • News
        • Local News
        • PA State News
        • Nation/World
      • Sports
        • Local
        • College Sports
        • State
        • National
      • Obits
      • Opinion
    logo
    • Classifieds
      • Place an Ad
      • All Listings
      • Jobs
    • E-Edition
    • Subscribe
    • Login
      • Classifieds
        • Place an Ad
        • All Listings
        • Jobs
      • E-Edition
      • Subscribe
      • Login
    UPDATE: Write-in votes making a difference in the primary
    Breaking News, Local News, News
    UPDATE: Write-in votes making a difference in the primary
    Marcie Schellhammer marcie@bradfordera.com 
    May 21, 2025
    Unofficial results from the McKean County primary election are in — except for the write-ins. Countywide voter turnout was just 18.68% in total. There...
    Home Lifestyles Who hacked Sony becomes Internet's new mystery
    Who hacked Sony becomes Internet’s new mystery
    Entertainment, Lifestyles
    TAMI ABDOLLAH Associated Press  
    December 24, 2014

    Who hacked Sony becomes Internet’s new mystery

    LOS ANGELES (AP) — Everyone has a theory about who really hacked Sony Pictures Entertainment Inc.

    Despite President Barack Obama’s conclusion that North Korea was the culprit, the Internet’s newest game of whodunit continues. Top theories include disgruntled Sony insiders, hired hackers, other foreign governments or Internet hooligans. Even some experts are undecided, with questions about why the communist state would steal and leak gigabytes of data, email threats to some Sony employees and their families and then threaten moviegoers who planned to watch “The Interview” on Christmas.

    “Somebody’s done it. And right now this knowledge is known to God and whoever did it,” said Martin Libicki, a cyber security expert at RAND in Arlington, Virginia, who thinks it probably was North Korea. “So we gather up a lot of evidence, and the evidence that the FBI has shown so far doesn’t allow one to distinguish between somebody who is North Korea and somebody who wants to look like North Korea.”

    Perhaps the only point of agreement among those guessing is that even the most dramatic cybercrimes can be really, really hard to solve convincingly. When corporations are breached, investigators seldom focus on attributing the crime because their priority is assessing damage and preventing it from happening again.

    “Attribution is a very hard game to play,” said Mike Fey, president of security company Blue Coat Systems Inc. and former chief technology officer at McAfee Inc. “Like any criminal activity, how they get away with it is a very early step in the planning process, and framing another organization or individual is a great way to get away with something.

    Fey added: “If they’re smart enough and capable enough to commit a high profile attack, they’re very often smart enough and capable enough to masquerade as someone else. It can be very difficult to find that true smoking gun.”

    In a report earlier this month, Fey’s company described a malicious software tool called Inception, in which attackers suggested a link to China, used home routers in South Korea, included comments in Hindi, with text in Arabic, the words “God_Save_The_Queen” in another string, and used other techniques to show links to the United States, Ukraine or Russia.

    Unlike crimes in the physical world, forensic investigators in the cyber world can’t dust for fingerprints or corroborate evidence by interviewing suspects. In prior closed-book cases, cyber criminals caught bragging online were only charged after evidence was found on their hard drives.

    “The NSA (National Security Agency) has penetrated a lot of computers, but until Ed Snowden came around, nobody was certain because the NSA has the world’s best operational security. They know how to cover their tracks and fingerprints very well,” Libicki said.

    After Sony was hacked, investigators analyzed network logs, the hacking tool and the remains of their crippled network. The investigation began after the attackers announced themselves and wiped the systems by crippling Sony’s hard drives. Security professionals discovered that the hackers had been conducting surveillance on it since the spring. And if not for the theatrics of the Guardians of Peace, as the hackers call themselves, the breach could have easily continued for months without knowledge of the compromise.

    Because North Korea is so isolated and its Internet infrastructure is not directly connected to the outside world, it’s more difficult to trace attacks originating there. North Korea has vehemently denied that it was responsible for the attack.

    To complicate matters, roughly 10 percent of home computers are compromised by hackers, allowing their use to conduct attacks on others, said Clifford Neuman, a director of the University of Southern California Center for Computer Systems Security. These compromised machines become networks of computers controlled remotely by hackers and borrowed or rented in an underground economy.

    Botnets “could be used by cyber terrorists or nation states to steal sensitive data, raise funds, limit attribution of cyber attacks or disrupt access to critical national infrastructure,” Gordon Snow, then-assistant director of the FBI’s cyber division, told a Senate panel in 2011.

    The FBI worked with other U.S. agencies, including the National Security Agency, on the Sony investigation to trace the attacks. The FBI said clues included similarities to other tools developed by North Korea in specific lines of computer code, encryption algorithms and data deletion methods. It also discovered that computer Internet addresses known to be operated by North Korea were communicating directly with other computers used to deploy and control the hacking tools and collect the stolen Sony files.

    The FBI said some of its evidence against North Korea was so sensitive it couldn’t be revealed. Neuman said that could include reviewing evidence of communications or even recorded conversations between suspected hackers before or during the breach and subsequent leaks of Sony’s confidential business information.

    “Attribution to any high degree of certainty will always be impossible,” said Chris Finan, a former White House cyber security adviser. “At some point these are always judgment calls. You can do things like corroborate using intelligence sources and methods. But ultimately you’re still looking at a pool of evidence and you’re drawing a conclusion.”

    Even knowing North Korea was involved doesn’t mean others weren’t, too.

    “It’s very difficult to understand the chain of command in something like this,” Fey said. “Is this a hacking-for-hire scenario? Is it truly delivered by an organization? Or, is it possible there’s some alternate nefarious plot under way none of us understand yet.”

    He later added: “One last idea. What if all this is just a movie-goer (who) can’t stand the idea of another Seth Rogan movie?”

    ___

    Tami Abdollah can be reached at http://www.twitter.com/latams.

    Tags:

    entertainment lifestyles

    The Bradford Era

    Local & Social
    Latest news for you
    Planning a perennial garden
    Lifestyles
    Planning a perennial garden
    By REBECCA NORTON RYAN  Penn State Extension Master Gardener  
    May 22, 2025
    While picking up your annual plants, the geraniums, petunias and vines, at the garden center you may see perennial Shasta daisies, peonies or hollyhoc...
    Read More...
    {"to-print":"To print", "bradfordera-website":"Website"}
    Bird dog training successful at Rolfe Beagle Club
    Local Sports, Outdoors, Sports, ...
    Bird dog training successful at Rolfe Beagle Club
    May 22, 2025
    JOHNSONBURG —  “It was awesome to have great training grounds and access to people with the training skills I wanted,” said Mike Dietz, a bird dog han...
    Read More...
    {"to-print":"To print", "bradfordera-website":"Website"}
    Keeping focus on the fun
    Local Sports, Outdoors, Sports
    Keeping focus on the fun
    By WADE ROBERTSON 
    May 22, 2025
    Pop Hayes and I sat quietly in camp after a big breakfast of bacon, eggs and home fries, just the two of us. That’s a breakfast I loved then and still...
    Read More...
    {"newsletters":"Newsletters", "newsletter-sports":"Sports", "to-print":"To print", "bradfordera-website":"Website"}
    Restocking pill bags and boxes
    Lifestyles
    Restocking pill bags and boxes
    May 22, 2025
    Dear Heloise: When it's time to restock your pill dispenser from your personal pharmacy, it can be challenging to remember which time of day to take t...
    Read More...
    {"to-print":"To print", "bradfordera-website":"Website"}
    Years of horrific abuse have required a lifetime of recovery
    Lifestyles
    Years of horrific abuse have required a lifetime of recovery
    May 22, 2025
    DEAR ABBY: I see a psychiatrist and psychologist for generalized anxiety disorder, major depression disorder and borderline personality disorder. Acco...
    Read More...
    {"to-print":"To print", "bradfordera-website":"Website"}
    ‘Round the Square: The Civilian Conservation Corps
    News, Round the Square
    ‘Round the Square: The Civilian Conservation Corps
    May 22, 2025
    CCC: A recent Lumber Heritage Region newsletter had a fascinating story we wanted to share. It's about the Civilian Conservation Corps, the CCC, launc...
    Read More...
    ePaper
    google_play
    app_store
    This Week's Ads
    Current e-Edition
    ePaper
    google_play
    app_store
    Already a subscriber? Click the image to view the latest e-edition.
    Don't have a subscription? Click here to see our subscription options.
    Mobile App

    Download Now

    The Bradford Era mobile app brings you the latest local breaking news, updates, and more. Read the Bradford Era on your mobile device just as it appears in print.

    ePaper
    google_play
    app_store
    Trending Recipes

    Help Our Community

    Please help local businesses by taking an online survey to help us navigate through these unprecedented times. None of the responses will be shared or used for any other purpose except to better serve our community. The survey is at: www.pulsepoll.com $1,000 is being awarded. Everyone completing the survey will be able to enter a contest to Win as our way of saying, "Thank You" for your time. Thank You!

    Get in touch with The Bradford Era
    Submit Content
    • Submit News
    • Letter to the Editor
    • Place Wedding Announcement
      • Submit News
      • Letter to the Editor
      • Place Wedding Announcement
    Advertise
    • Place Birth Announcement
    • Place Anniversary Announcement
    • Place Obituary Call (814) 368-3173
      • Place Birth Announcement
      • Place Anniversary Announcement
      • Place Obituary Call (814) 368-3173
    Subscribe
    • Start a Subscription
    • e-Edition
    • Contact Us
      • Start a Subscription
      • e-Edition
      • Contact Us
    CMG | Community Media Group
    Illinois
    • Hancock Journal-Pilot
    • Iroquois Times-Republic
    • Journal-Republican
    • The News-Gazette
      • Hancock Journal-Pilot
      • Iroquois Times-Republic
      • Journal-Republican
      • The News-Gazette
    Indiana
    • Fountain Co. Neighbor
    • Herald Journal
    • KV Post News
    • Newton Co. Enterprise
    • Rensselaer Republican
    • Review-Republican
      • Fountain Co. Neighbor
      • Herald Journal
      • KV Post News
      • Newton Co. Enterprise
      • Rensselaer Republican
      • Review-Republican
    Iowa
    • Atlantic News Telegraph
    • Audubon Advocate-Journal
    • Barr’s Post Card News
    • Burlington Hawk Eye
    • Collector’s Journal
    • Fayette County Union
    • Ft. Madison Daily Democrat
    • Independence Bulletin-Journal
    • Keokuk Daily Gate City
    • Oelwein Daily Register
    • Vinton Newspapers
    • Waverly Newspapers
      • Atlantic News Telegraph
      • Audubon Advocate-Journal
      • Barr’s Post Card News
      • Burlington Hawk Eye
      • Collector’s Journal
      • Fayette County Union
      • Ft. Madison Daily Democrat
      • Independence Bulletin-Journal
      • Keokuk Daily Gate City
      • Oelwein Daily Register
      • Vinton Newspapers
      • Waverly Newspapers
    Michigan
    • Iosco County News-Herald
    • Ludington Daily News
    • Oceana’s Herald-Journal
    • Oscoda Press
    • White Lake Beacon
      • Iosco County News-Herald
      • Ludington Daily News
      • Oceana’s Herald-Journal
      • Oscoda Press
      • White Lake Beacon
    New York
    • Finger Lakes Times
    • Olean Times Herald
    • Salamanca Press
      • Finger Lakes Times
      • Olean Times Herald
      • Salamanca Press
    Pennsylvania
    • Bradford Era
    • Clearfield Progress
    • Courier Express
    • Free Press Courier
    • Jeffersonian Democrat
    • Leader Vindicator
    • Potter Leader-Enterprise
    • The Wellsboro Gazette
      • Bradford Era
      • Clearfield Progress
      • Courier Express
      • Free Press Courier
      • Jeffersonian Democrat
      • Leader Vindicator
      • Potter Leader-Enterprise
      • The Wellsboro Gazette
    © Copyright The Bradford Era 43 Main St, Bradford, PA  | Terms of Use  | Privacy Policy
    Powered by TECNAVIA