TIDBIT: SONY AND MASSIVE CYBER ATTACKS A WEEK AGO

Ms. P.H., a regular reader here, shared this article, which I thought was interesting in the light of our internet-based problems a week ago during our vidchat. It seems there was some sort of massive attack under way, from London's Heathrow Airport to... SONY:

Sony Pictures suspends filming after massive hack 'affects payments'

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".

3 Comments

  1. Mike on December 22, 2014 at 11:52 am

    Here is some interesting insight into the Sony hack posted to the blog at Wayne Madson Report (http://www.waynemadsenreport.com) behind the paywall. Basically because the amount of data involved is so large there are only a few ways this information could be obtained, which probably narrows the culprit list.

    “The Sony breach was an inside job. 100 terabytes is too big to transmit over the Internet. At top broadband speeds it would take 661 24/7 days at top US speed; and, 2,315 day to transmit to S. Korea (and general Asia Pac Rim) at their top transmission speed. This breach is not
    perpetrated by hackers. 100 terabytes of is basically a snapshot or complete system back-up of all the information on disk arrays. All that is required is physical access to the monitor that triggers the back-up of Sony’s data. It is likely that Sony is running off of a cloud architecture. It is doubtful that Sony has its own cloud data center. Rather, it is using a service from big players like (Google, Amazon, IBM, etc. – many of these cloud facilities are also off-shore).

    Getting a copy of the back-up can occur at the data center of cloud by two types of players. The first is any employee that is part of the maintenance staff of the cloud. The second is the maintenance personnel of the hardware vendors of the disk arrays. As a vendor maintaining the disk drives, it is reasonable to do a full system back-up in the event that something goes wrong in the maintenance process such that the back-up data is immediately on-hand in order to restore the content of the drives. The players could be complicit cloud facility employees or imposters.

    A second area where a system back-up can be acquire is through the archive facility. Back-ups are stored off-site in the event the cloud facility is damaged or destroyed in which case the off-site back-up is not compromised and can be installed at a different location. There are several 3rd party vendors that offer storing back-ups. An example, is that 30,000 Lois Lerner IRS emails were recovered by the back-up 3rd party vendor. These facilities are less secure than the data center of the cloud. Stealing a one of the back-ups is easier and arms length. In addition, the best way is the acquire the data is to steal an old snapshot versus the current one which could easily be discovered.

    It is worth looking at who is behind the breach and why. Several Christmas release movies were leaked with the exception of “Interview”. Why? In parallel with the breach, the CIA torture expose was released (CIA knew it was going to happen for a while which threatens their on-going existence). “Interview” through a comedy that shows that the CIA is in the business of taking out leaders of countries (through a movie is also exposes the seamy side of the agency – as a Holiday movie is would be view by a wide reaching audience). Putting the two together is very damning for the agency. N. Korea and other effected countries (e.g. S. America) would have everything to gain to have it exposed that the CIA assassinates leaders of nations. While the CIA has everything to loose if this facet was added to the torture escapades.

    The CIA would have the wherewithal (and has the M.O. to infiltrate either the cloud facility or the back-up facilities) and the motive to pull off the breach and the subsequent leaks. In addition, it would be trivial to sabotage other operational systems with internal access.”



  2. DanaThomas on December 19, 2014 at 10:05 am

    As Marcos says the playbook is getting dog-eared, and for this Sony news items you have to read the “lines between the lines between the lines” to get any meaning out of it.
    So for “cyber attacks”, it must be China; for “terror”, the “Arabs”; for “nuclear threats”, N. Korea; for horrible diseases, the “Africans”; for general-purpose nastiness, the Kremlin.
    On the other hand, Cuba is no longer on the “nasties” list and I am worried about what the oligarchs have in store for that country.



  3. marcos toledo on December 19, 2014 at 9:17 am

    Totally shocking Sony hack for putting out a comic film about icing a foreign leader the USA don’t like and thinking acts like that funny. Though I doubt North Korea had any hand in this supposedly cyber attack this looks like the suppose China hack just a change in name of the attacker. Yellow Perl Fu Manchu anyone or is this just the CIA-NSA message to Hollywood to be more sycophantic than usual or Sony had a turkey on it’s hands. And why not kill two birds with stone save some money and spread more terror porn among the sheeple.



Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events