{"id":9478,"date":"2024-04-04T12:44:16","date_gmt":"2024-04-04T12:44:16","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=9478"},"modified":"2024-04-04T12:44:16","modified_gmt":"2024-04-04T12:44:16","slug":"a-vigilante-hacker-took-down-north-koreas-internet-now-hes-taking-off-his-mask","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=9478","title":{"rendered":"A Vigilante Hacker Took Down North Korea\u2019s Internet. Now He\u2019s Taking Off His Mask"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">\u201cThat is not good, and it\u2019s not a very good norm,\u201d says Schneider. She says that a lot of the US authorities\u2019s gradual strategy to cyberattacks stems from its care to make sure it avoids unintentionally hitting civilians in addition to breaking worldwide legislation or triggering harmful blowback.<\/p>\n<p class=\"paywall\">Nonetheless, Schneider concedes that Caceres and Angus have some extent: The US could possibly be utilizing its cyber forces extra, and a few of the explanations for why it doesn\u2019t quantity to paperwork. \u201cThere are good causes, after which there are dangerous causes,\u201d says Schneider. &#8220;Like, we&#8217;ve got difficult organizational politics, we don\u2019t know easy methods to do issues otherwise, we\u2019re dangerous at utilizing this sort of expertise, we\u2019ve been doing it this fashion for 50 years, and it labored nicely for dropping bombs.\u201d<\/p>\n<p class=\"paywall\">America\u2019s offensive hacking has, by all appearances, gotten much less aggressive and fewer nimble over the previous half decade, Schneider factors out. Beginning in 2018, as an example, Common Paul Nakasone, then the top of Cyber Command, advocated a \u201cdefend ahead\u201d technique aimed toward taking cyber battle to the enemy\u2019s community fairly than ready for it to happen on America\u2019s turf. In these years, Cyber Command launched disruptive hacking operations designed to <a href=\"https:\/\/www.wired.com\/story\/cyber-command-ira-strike-sends-signal\/\">cripple Russia\u2019s disinformation-spouting Internet Research Agency troll farm<\/a> and take <a href=\"https:\/\/www.wired.com\/story\/cyber-command-hackers-trickbot-botnet-precedent\/\">down the infrastructure of the Trickbot ransomware group<\/a>, which some feared on the time could be used to intrude within the 2020 election. Since then, nevertheless, Cyber Command and different US navy hackers seem to have gone comparatively quiet, usually leaving the response to international hackers to legislation enforcement companies just like the FBI, which face way more authorized constraints.<\/p>\n<p class=\"paywall\">Caceres isn\u2019t solely unsuitable to criticize that extra conservative stance, says Jason Healey, who till February served as a senior cybersecurity strategist on the US Cybersecurity and Infrastructure Safety Company. He responds to Caceres\u2019 cyberhawk arguments by citing the Subversive Trilemma, an thought specified by a 2021 paper by the researcher Lennart Maschmeyer: Hacking operations have to decide on amongst depth, pace, and management. Even in earlier, extra aggressive years, US Cyber Command has tended to show up the dial for management, Healey says, prioritizing it over these different variables. However he notes there might in reality be sure targets\u2014comparable to ransomware gangs or hackers working for Russia\u2019s no-holds-barred GRU navy intelligence company\u2014who may warrant resetting these dials. \u201cFor these targets,\u201d says Healey, \u201cyou actually can launch the hounds.\u201d<\/p>\n<h2 class=\"paywall\">P4x Is Useless, Viva P4x<\/h2>\n<p class=\"paywall\">As for Caceres himself, he says he\u2019s not against American hacking companies taking a conservative strategy to limiting their injury or defending civilians\u2014so long as they take motion. \u201cThere&#8217;s being conservative,\u201d he says, \u201cafter which there&#8217;s doing fuck all.\u201d<\/p>\n<p class=\"paywall\">On the argument that extra aggressive cyberattacks would result in escalation and counterattacks from international hackers, Caceres factors to the assaults these international hackers are already finishing up. The ransomware group AlphV&#8217;s <a href=\"https:\/\/www.wired.com\/story\/alphv-change-healthcare-ransomware-payment\/\">catastrophic attack on Change Healthcare<\/a> in February, as an example, crippled medical declare platforms for a whole bunch of suppliers and hospitals, results about as disruptive for civilians as any cyberattack may be. \u201cThat escalation is already taking place,\u201d Caceres says. \u201cWe\u2019re not doing something, and so they\u2019re nonetheless escalating.\u201d<\/p>\n<p class=\"paywall\">Caceres says he hasn\u2019t solely given up on convincing somebody within the US authorities to undertake his extra gloves-off strategy. Ditching the P4x deal with and revealing his actual identify is, in some sense, his last-ditch try and get the US authorities\u2019s consideration and restart the dialog.<\/p>\n<p class=\"paywall\">However he additionally says he gained\u2019t be ready for the Pentagon\u2019s approval earlier than he continues that strategy on his personal. \u201cIf I preserve going with this alone, or with just some folks that I belief, I can transfer quite a bit sooner,\u201d he says. \u201cI can fuck shit up for the individuals who deserve it, and I haven&#8217;t got to report back to anybody.\u201d<\/p>\n<p class=\"paywall\">The P4x deal with could also be lifeless, in different phrases. However the P4x doctrine of cyberwarfare lives on.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/p4x-north-korea-internet-hacker-identity-reveal\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThat is not good, and it\u2019s not a very good norm,\u201d says Schneider. She says that a lot of the US authorities\u2019s gradual strategy to cyberattacks stems from its care to make sure it avoids unintentionally hitting civilians in addition to breaking worldwide legislation or triggering harmful blowback. Nonetheless, Schneider concedes that Caceres and Angus [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9480,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[6481,772,3506,4578,4975,192,8313],"class_list":["post-9478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-hacker","tag-hes","tag-internet","tag-koreas","tag-mask","tag-north","tag-vigilante"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/9478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9478"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/9478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/9480"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}