The truth about proving who's hacking whom in the wild

“Really the only way is, once you go in and raid someone and knock down their door and seize their computers, you find the code on their computers,” said Clifford Neuman , director of the University of Southern California’s Center for Computer System Security. “That’s the only way to absolutely attribute.”

(Source)

So, when they say "Russia, Russia, Russia" or "China, China, China" or "North Korea, North Korea, North Korea," the truth is, they don't really know whether it's Russia or China or North Korea or some 400 pound guy on his couch with no governmental connection at all or the NSA itself doing a false-flag attack.

  • Subscribe
  • Tom Usher

    About Tom Usher

    Employment: 2008 - present, website developer and writer. 2015 - present, insurance broker. Education: Arizona State University, Bachelor of Science in Political Science. City University of Seattle, graduate studies in Public Administration. Volunteerism: 2007 - present, president of the Real Liberal Christian Church and Christian Commons Project.
    This entry was posted in Uncategorized. Bookmark the permalink.