PaulSpoerry.com

Social Media, technology, and geeky stuff for your brain.

  • Home
  • About
    • Privacy Policy
  • Categories
    • Google+ Posts
    • Site news
    • Tech
      • Android
      • Apple
      • Chrome
      • Gadgets
      • Hacking
      • Linux
      • OSX
      • Privacy
      • Web Life
        • Bittorrent
        • Facebook
        • FireFox
        • GMail
        • Google
        • Google+
        • Twitter
        • WordPress
        • Windows
          • Windows 7
    • Google+: Getting Started Guides
    • Games
    • Meditation
    • Politics
    • Science
    • That’s freakin hilarious
  • Code
    • FreeImageZoom
    • Post Editor for Google+™
    • The Plus Editor
  • Contact
You are here: Home / Google+ Posts / So the NSA can breach foreign countries, but when North Korea does it it's bad?

So the NSA can breach foreign countries, but when North Korea does it it's bad?

January 19, 2015 by Paul Spoerry 14 Comments



N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say – NYTimes.com
Evidence gathered by software hidden by the N.S.A. to monitor North Korean activities proved critical in persuading President Obama to accuse the government of ordering the cyberattack on Sony, officials said.

I think it's clear at this point that Cyber Warfare is the new arms race. The NYT is reporting that the reason the US was so confident that North Korea was to blame for the Sony hacks is that the NSA had been hacking and implanting malware on North Korean hackers since 2010.

Clearly we need to take all of this very seriously, but this raises some questions for me. Should we be putting our resources into offensive strategies or defensive? If we're on the offense (breaking into other nation states) can we really lay blame when they get caught doing the same? If we get caught and they retaliate does this mean that we escalate into WWIII, just all IP based?

Check this out on Google+

Filed Under: Google+ Posts Tagged With: CyberWarfare, Japan, monday, Sony

About Paul Spoerry

I’m a groovy cat who’s into technology, Eastern Thought, and house music. I’m a proud and dedicated father to the coolest little guy on the planet (seriously, I'm NOT biased). I’m fascinated by ninjas, the Internet, and anybody who can balance objects on their nose for long periods of time.

I have a utility belt full of programming languages and a database of all my knowledge on databases... I practice code fu. Oh, I've also done actual Kung Fu, and have a black belt in Tae Kwon Do.

I run. I meditate. I dance. I blog at PaulSpoerry.com, tweet @PaulSpoerry, and I'm here on Google+.

I'm currently work for IBM developing web enabled insurance applications for IBM and support and develop a non-profit called The LittleBigFund.

Comments

  1. Travis Owens says

    January 19, 2015 at 9:50 am

    Integrity and foreign policy… US fails at both

  2. Evan Dierlam says

    January 19, 2015 at 10:16 am

    If cyber warfare is the new arms race, I fear the day someone invents the atomic bomb.

  3. Thomas Wrobel says

    January 19, 2015 at 10:16 am

    I dought North Korean hackers are even remotely a threat to the US. Their whole country runs of a intranet – their simply isn't the breading ground for people to develop that sort of skillset.
    Other countries? sure.
    And no, no pro-active moves against a country is ever justified. Not spying. No military. Nothing. Defensive only is moral.
    Also worth noting the NSA spying shit is likely largely economic anyway. Its all about moneys.

  4. Thomas Wrobel says

    January 19, 2015 at 10:17 am

    +Evan Dierlam A atomic bomb for whiping out electrics and hard drives would be a atomic bomb 😛

  5. Paul Spoerry says

    January 19, 2015 at 10:34 am

    Or a giant EMP.

  6. Thomas Wrobel says

    January 19, 2015 at 10:55 am

    +Paul Spoerry Out of interest, fiction aside, has there been a EMP weapon made without other effects? ie. a nuke effect without the explosion or radiation.

  7. Rust Cohle says

    January 19, 2015 at 11:08 am

    I would imagine this sort of warfare will become more hazardous when the internet if things is fully developed.

  8. STEVEN REID says

    January 19, 2015 at 11:19 am

    you are not suppose to get caught. that is how spying works.

  9. Trilithon Stone says

    January 19, 2015 at 12:09 pm

    not to forget this is still asymmetrical combat… the west, and the U.S. in particular, has far more infrastructure targets at risk … and as unappealing as it is to consider, Nigerian 419 scams are not the worst thing out there… so, not being naive,… there is no doubt that the conflict in this shadow world is every bit as hot as the cold war ever was…

  10. Flo H says

    January 19, 2015 at 1:15 pm

    Everyone spies on everyone. Depends on what u do with info

  11. Paul Spoerry says

    January 19, 2015 at 2:15 pm

    +Thomas Wrobel I think so… according to Wikipedia they exist, though they all require a chemical explosion to kick it off.

    http://en.wikipedia.org/wiki/Electromagnetic_pulse#Non-nuclear_electromagnetic_pulse_.28NNEMP.29

  12. Thomas Wrobel says

    January 19, 2015 at 2:36 pm

    interesting

  13. King Johnny says

    January 20, 2015 at 8:06 pm

    That's not the story you demonic
    liars, willing to cheat GOD a fair
    say here regardless.. No evidence
    is given by the magic TVs, of this
    false accusing Satanic enemy
    of good will to do right.. Not
    war Democracies for the worst
    of military dictatorships, that
    deny the right of one to be
    freely educated on Justice
    securing victory for everyone.
    The Golden Rule is what we
    call it, of the Christian Jew
    Muslim crews… Vote Johnny.

  14. Daniel W says

    January 21, 2015 at 7:17 am

    POLICY. It is DoD policy that:
    a. Military platforms, systems, subsystems, and equipment will be mutually compatible in
    their electromagnetic operational environment (EMOE).
    (1) Military systems will meet their operational performance requirements without
    experiencing unacceptable performance degradation from E3 or causing unacceptable
    performance degradation to other systems.
    (2) Joint-Service E3 control will be attained by implementing common DoD-wide
    philosophies, approaches, and tactics, techniques, and procedures (TTPs) in the development,
    design, production, testing, and operation of military platforms, systems, subsystems, and
    equipment to address unacceptable degradation from E3.
    (3) Rather than relying on after-the-fact remedial measures, built-in safety by design and
    electromagnetic interference (EMI) mitigation techniques will be addressed in the acquisition
    process.
    b. Requirements to control E3, including those used to mitigate the impact of high-power
    microwave and electromagnetic pulse (EMP), will be implemented throughout the acquisition
    life cycle of military platforms, systems, subsystems, and equipment.
    (1) Requirements to control E3 will be developed during the risk reduction phase of the
    acquisition life cycle of military platforms, systems, subsystems, and equipment, and fully
    defined and evaluated before production and deployment.
    (2) Joint Capabilities Integration and Development System (JCIDS) and acquisition
    system documents will be used to specify, define, and verify requirements to control E3. These
    documents include the initial capabilities document (ICD), capability development document
    (CDD), capability production document (CPD), equipment specification, information support
    plan (ISP), acquisition strategy (AS), system engineering plans, and test and evaluation master
    plan (TEMP).
    c. E3 control and mitigation techniques will be validated and verified for military platforms,
    systems, subsystems, and equipment using the implementation and tailoring of applicable
    military or industry standards, procedures, and handbooks of test requirements. Vulnerabilities
    and limitations will be documented and reported during critical design and milestone reviews.
    d. Hazards of electromagnetic radiation to ordnance (HERO), personnel (HERP), and fuel
    (HERF) will be mitigated before the administration of military exercises, operations, and
    activities.
    e. Military E3 standards, specifications, and handbooks stressing interface and verification
    requirements will follow the guidance in DoD 4120.24-M (Reference (d)).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Copyright © 2023 · Epik on Genesis Framework · WordPress · Log in