more interesting thoughts from nimmo (really my favourite analyst, despite his libertarianism)

Globalist Competitor China Will Be Blamed for Sony Attack
Kurt Nimmo, Infowars, Dec 20 2014

For Pindostan, it’s official. North Korea is responsible for the cyber attack on Sony. Period. As usual, the government expects you to take its word on faith and refuses to provide evidence. The FBI says it used “sensitive sources and methods” to pin the blame on North Korea, but refuses to name its sources and the methods it used. The FBI’s conclusion is questioned by security and computer networking experts. They say North Korea does not have the ability to launch this sort of attack. David Kennedy, founder of the security consulting firm TrustedSec LLC, said North Korea “is still very shut off and secretive, so it struggles with getting the technology it needs to launch major cyber-attacks.” On Saturday, an FBI-connected cyber-security expert tweeted out his opinion that North Korea is simply not capable of the Sony attack.

Others argue that the sheer weight of the data stolen would have crippled North Korea’s fledgling ISP. Hector Monsegur, aka Sabu, the supposed Anonymous hacker who served as a stool pigeon for the government, told CBS:

Look at the bandwidth going into North Korea. I mean, the pipelines, the pipes going in, handling data, they only have one major ISP across their entire nation. That kind of information flowing at one time would have shut down North Korean Internet completely. For something like this to happen, it had to happen over a long period of time. You cannot just exfiltrate one terabyte or 100 terabytes of data in a matter of weeks. It’s not possible. It would have taken months, maybe even years, to exfiltrate something like 100 terabytes of data without anyone noticing.

There is only one “omnivore of staggering capabilities” able to suck up this much data in short order: the NSA. According to NSA whistleblower William Binney, the agency’s computers in Utah can suck up 20 terabytes, the equivalent of the Library of Congress, per minute. In addition to a lack of technology, North Korea is not especially adept when it comes to cyber attacks.In Mar 2013, SophosLabs identified malware used in an internet attack that disrupted banking and television network systems in South Korea. Dubbed DarkSeoul, the malware was “not particularly sophisticated,” according to Graham Cluley, writing for Sophos’ Naked Security.

While the government and the corporate media were pointing fingers at under-powered and, as DarkSeoul reveals, pathetically inept North Korea, it failed to report on a story about the real innovator of malicious software, the NSA and its partner GCHQ, Britain’s signals intelligence organization. The story concerns Regin, described by Symantec as “a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers and private individuals.” Further research into Edward Snowden’s revelation that the NSA and GCHQ were involved in hacking attacks on Belgacom, a Belgian phone and internet services provider, and on EU computer systems, discovered the use of the sophisticated Regin malware. Jeffrey Carr, founder and CEO of Seattle cybersecurity consulting firm Taia Global, writes:

Is North Korea responsible for the Sony breach? I can’t imagine a more unlikely scenario than that one. My advice to journalists, business executives, policymakers, and the general public is to challenge everything that you hear or read about the attribution of cyber-attacks. Demand to see the evidence, not scrubbed ‘indicators of compromise’ that can’t be validated.


Because the corporate media operates as a propaganda conduit for the Pindosi government and its national security apparatus, all such warnings will be ignored as blame is turned on North Korea. Following the FBI allegation, Obama promised “proportional” retaliation “at a time and place” of Pindosi government choosing. That retaliation, although unspecified, may include action against China, the real object of concern for the elite. North Korea poses absolutely no threat while China is a primary geostrategic obstacle. Obama left unstated for now the connection between North Korea and China. The Times of India reported on Saturday:

Amid speculation that China, which patronizes the maverick North Korean regime, may also be connected to the events, Obama said that Pindostan had no indication North Korea was acting in conjunction with another country.

And while Obama dealt in ambiguity and generalization, unnamed officials in the government were not as reluctant. The Telegraph reported on Friday:

China may have helped North Korea carry out the hacking attack on Sony Pictures, a Pindosi official has told Reuters. The official, who spoke on condition of anonymity, said the conclusion of the Pindosi investigation was to be announced later by federal authorities.


  1. Posted December 21, 2014 at 2:11 pm | Permalink

    … You cannot just exfiltrate one terabyte or 100 terabytes of data in a matter of weeks. It’s not possible. It would have taken months, maybe even years, to exfiltrate something like 100 terabytes of data without anyone noticing. …

    Yes, there is something fishy about this story…, if it involved the theft of terabytes of data then I would have a hard time believing that it was a network hack. If the data theft was actually terabytes in size, then the most likely source of the data would be backup tapes or drives, in my opinion. Backups are often stored offsite so could be intercepted in transit and copied or maybe just stolen from a backup storage site.

    Another concern, the trail back to North Korea is a bit too easy to follow, this is from an FBI report.

    … The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack. …


    And this report just adds to a vague feeling of unease that I have about the story. 🙂

    … While the United States government seems convinced by technical analysis and intelligence sources that the North Koreans were behind the attack, skeptics could be forgiven for having doubts about this conclusion. It is interesting to note that the attackers initially made no mention of The Interview, and instead demanded payment from Sony to forestall the release of sensitive corporate data. It wasn’t until well after the news media pounced on the idea that the attack was in apparent retribution for The Interview that we saw the attackers begin to mention the Sony movie. …

  2. niqnaq
    Posted December 21, 2014 at 2:16 pm | Permalink

    Moonkins, sometimes you make me feel really guilty. I do everything by instinct, otherwise I couldn’t possibly cover the amount of terrain that I do. But you sit there and work it out logically.

  3. niqnaq
    Posted December 21, 2014 at 2:21 pm | Permalink

    Notice, too many flat notes:

  4. Posted December 21, 2014 at 2:54 pm | Permalink

    Yes well when one sees such delivish deviousness one can’t help wondering…, n’est-ce pas? 🙂

  5. franta
    Posted December 23, 2014 at 1:20 pm | Permalink

    Looks like Good ‘Ole USA is looking for another enemy after Russian adventure, which might bring unpleasant results for them too.

    Korean Commies are much easeir foe, and meanwhile it might piss off China too.

    Besides I do believe with others here that so called Korean Cyber attack is US made, Yanks are good at manufacturing provocations – remember Tonkin incident, Saddams nukes and so on.

  6. niqnaq
    Posted December 23, 2014 at 2:02 pm | Permalink


    Merry Xmas – doubtless there will be some more attention-grabbing headlines over the holiday. I shall try to keep up with at least the most outrageous and ridiculous ones, because that is all I really claim to do here.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.