LETTERS TO THE EDITOR

LETTERS/COLUMNS: SEND LETTERS TO THE EDITOR FOR PUBLISHING TO FRONTPAGENEWS1@YAHOO.COM. PLEASE INCLUDE DAY/EVENING/ CELL NUMBER, HOME NUMBER, AND EMAIL. CONTACT VAN STONE: FRONTPAGENEWS1@YAHOO.COM OR (215) 821-9147 TO SUBMIT A REQUEST FOR ANY WRITER. PLEASE DO NOT CONTACT THE WRITER DIRECTLY! ALL APPEARANCE REQUEST WILL GO THROUGH THE MANAGING EDITOR'S OFFICE. COPYRIGHT: THE USE OF ANY SUBMISSIONS APPEARING ON THIS SITE FOR MONETARY GAINS IS STRICTLY PROHIBITED. TO LEARN MORE: PHILADELPHIA FRONT PAGE NEWS WWW.FPNNEWS.ORG. YOUR TOP STORIES OF THE DAY (215) 821-9147.

Wednesday, July 8, 2009

US officials eye North Korea in cyber attack

US officials eye North Korea in cyber attack

AP Photo
Shawn White, Director of External Operations for mobile and Web site monitoring company Keynote Systems, is shown in the data storage room at Keynote headquarters in San Mateo, Calif., Wednesday, July 8, 2009. The company publishes data detailing outages on Web sites, including 40 government sites it watches.

WASHINGTON (AP) -- U.S. authorities on Wednesday eyed North Korea as the origin of the widespread cyber attack that overwhelmed government Web sites in the United States and South Korea, although they warned it would be difficult to definitively identify the attackers quickly.

The powerful attack that targeted dozens of government and private sites underscored how unevenly prepared the U.S. government is to block such multipronged assaults.

While Treasury Department and Federal Trade Commission Web sites were shut down by the software attack, which lasted for days over the holiday weekend, others such as the Pentagon and the White House were able to fend it off with little disruption.

The North Korea link, described by three officials, more firmly connected the U.S. attacks to another wave of cyber assaults that hit government agencies Tuesday in South Korea. The officials said that while Internet addresses have been traced to North Korea, that does not necessarily mean the attack involved the Pyongyang government.

The officials spoke on condition of anonymity because they were not authorized to speak publicly on the matter.

South Korea intelligence officials have identified North Korea as a suspect in those attacks and said that the sophistication of the assault suggested it was carried out at a higher level that just rogue or individual hackers.

U.S. officials would not go that far and declined to discuss publicly who may have instigated the intrusion or how it was done.

In an Associated Press interview, Philip Reitinger, deputy under secretary at the Homeland Security Department, said the far-reaching attacks demonstrate the importance of cybersecurity as a critical national security issue.

The fact that a series of computers were involved in an attack, Reitinger said, "doesn't say anything about the ultimate source of the attack."

"What it says is that those computers were as much a target of the attack as the eventual Web sites that are targets," said Reitinger, who heads DHS cybersecurity operations. "They're just zombies that are being used by some unseen third party to launch attacks against government and nongovernment Web sites."

Targets of the most widespread cyber offensive of recent years also included the National Security Agency, Homeland Security Department and State Department, the Nasdaq stock market and The Washington Post, according to an early analysis of the software used in the attacks.

The Associated Press obtained the target list from security experts analyzing the attacks. They provided the list on condition of anonymity because they were not authorized to discuss the investigation.

Other experts in cyber assaults said the incident shined a harsh light on the U.S. government's efforts to protect all of its agencies against Web-based attacks.

James Lewis, a senior fellow at the Center for Strategic and International Studies, said that the fact that both the White House and Defense Department were attacked but didn't go down points to the need for coordinated government network defenses.

"It says that they were ready and the other guys weren't ready," he said. "We are disorganized. In the event of an attack, some places aren't going to be able to defend themselves."

The wave of cyber assaults are known as "denial of service" attacks. Such attacks against Web sites are not uncommon and are caused when sites are so deluged with Internet traffic that they are effectively taken off-line. Mounting such an attack can be relatively easy and inexpensive, using widely available hacking programs, and they become far more serious if hackers infect and tie thousands of computers together into "botnets."

Joe Stewart, director of malware research for the counterthreat unit of SecureWorks Inc., said there's no indication yet of a claim of responsibility hidden anywhere in the program behind the attacks. Stewart and other researchers are analyzing the code for clues about the attacker's identity.

Stewart noted that the attacks on U.S. government sites appeared to expand after the initial assaults over the holiday weekend failed to generate any publicity. He said the "target list" contained in the program's code only had five U.S. government sites on it on July 5, but were broadened the next day to include nongovernment sites inside the U.S.

The following day, the South Korean Web sites were added.

"It seems to me they thought the first round wasn't successful ... they felt they weren't getting enough attention because nobody was talking about their attacks," Stewart said.

The cyber assault on the White House site had "absolutely no effect on the White House's day-to-day operations," said spokesman Nick Shapiro. He said that preventive measures kept whitehouse.gov stable and available to the general public but that Internet visitors from Asia may have experienced problems.

All federal Web sites were back up and running, Shapiro said. A State Department spokesman said the agency's site was up but still experiencing problems. A Web site for the U.S. Secret Service had experienced access problems but did not crash, the agency's spokesman said.

The cyber attack did not appear, at least at the outset, to target internal or classified files or systems, but instead aimed at agencies' public sites, creating a nuisance both for officials and the Web consumers who use them.

Ben Rushlo, director of Internet technologies at Keynote Systems, said problems with the Transportation Department site began Saturday and continued until Monday, while the FTC site was down Sunday and Monday.

Keynote Systems is a mobile and Web site monitoring company based in San Mateo, Calif. The company publishes data detailing outages on Web sites, including 40 government sites it watches.

According to Rushlo, the Transportation Web site was "100 percent down" for two days, so that no Internet users could get through. The FTC site, meanwhile, started to come back online late Sunday, but even on Tuesday Internet users still were unable to get to the site 70 percent of the time.

Dale Meyerrose, former chief information officer for the U.S. intelligence community, said that at least one of the federal agency Web sites got saturated with as many as 1 million hits per second per attack - amounting to 4 billion Internet hits at once. He would not identify the agency, but he said the Web site is generally capable of handling a level of about 25,000 users.

Meyerrose, who is now vice president at Harris Corp., said the characteristics of the attack suggest the involvement of between 30,000 to 60,000 computers.

The widespread attack was "loud and clumsy," which suggests it was carried out by an unsophisticated organization, said Amit Yoran, chief executive at NetWitness Corp. and the former U.S. government cybersecurity chief. "This is not the elegance we would expect from sophisticated adversaries."

Officials agreed, however, that the incident brings to the forefront a key 21st century threat.

"It tells you that cyber attacks are real. It's a very serious problem and one of the more serious facing us, along with terrorism, and China and Russia are the main threats," said Rep. Dutch Ruppersburger, D-Md., who was briefed on the incident.




Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID
Click on the logo to learn about the non-profit status

BECOME OUR VLOGGER OF THE MONTH: VIDEO NEWS CONTENT PUBLISHED ON ANY TOPIC BELOW

Latest edition of Talk Live Philly With Van Stone

VAN STONE PERFORMANCE PROMOTION VIDEO AT WEST PHILADELPHIA HS 1999 - BELOW

FPN NEWS “TAKE TIME FOR WINNERS IN ANY COMMUNITY!”

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection
Family Modeling -modelado de la familia

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

WE'RE #1

WE'RE #1

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones
Family Modeling -modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud
Family Modeling -Modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Child Images -Van Stones Niño hermoso Imágenes

WE'RE #1

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre
Family Modeling -modelado de la familia

Like Us On Facebook

We"re Looking For Volunteers

News, and more about youth, education, political analyst, schools, anti-violence, social justice, grass roots democracy, ecological protection, seniors, Historic Preservation & Restoration, (Black, Latinos, Asian, Pakistani, Italian, and other)Arts, Books, Super Heroes, Trading Cards, Youth, College, and Pro Sports, Nonprofits and Real-estate.

Blog Archive

About Us

  • FPN can reach out to Representatives from your side of: The Village, The Township, or The City
  • FPN features
    Sports
    Cars
    Family Entertainment
    Neighborhood News
    Scholastic News
    Regional News
    National News
    Citywide News
    Legal News
    Alternative Green Energy Education News
    Superhero & Comic Strip News
  • Teen Stars
  • Humanitarian/Ministers/Political
  • Community Services
  • Women & Men & Kids

  • You acknowledge and agree that you may not copy, distribute, sell, resell or exploit for any commercial purposes, any portion of the Newspaper or Services. Unless otherwise expressly provided in our Newspaper, you may not copy, display or use any trademark without prior written permission of the trademark owner.

    FPN/VSP® is in no way responsible for the content of any site owned by a third party that may be listed on our Website and/or linked to our Website via hyperlink. VSP/FPN® makes no judgment or warranty with respect to the accuracy, timeliness or suitability of the content of any site to which the Website may refer and/or link, and FPN/VSP® takes no responsibility therefor. By providing access to other websites, FPN/VSP® is not endorsing the goods or services provided by any such websites or their sponsoring organizations, nor does such reference or link mean that any third party websites or their owners are endorsing FPN/VSP® or any of the Services. Such references and links are for informational purposes only and as a convenience to you.

    FPN/VSP® reserves the right at any time to modify or discontinue, temporarily or permanently, the Website and/or Services (or any part thereof) with or without notice to you. You agree that neither FPN/VSP® nor its affiliates shall be liable to you or to any third party for any modification, suspension or discontinuance of the Website and/or Services.

    You agree to indemnify and hold harmless FPN/VSP®, its subsidiaries, and affiliates, and their respective officers, directors, employees, shareholders, legal representatives, agents, successors and assigns, from and against any and all claims, actions, demands, causes of action and other proceedings arising from or concerning your use of the Services (collectively, "Claims") and to reimburse them on demand for any losses, costs, judgments, fees, fines and other expenses they incur (including attorneys' fees and litigation costs) as a result of any Claims.

    The Website is © 2009 by VSP®, or its designers. All rights reserved. Your rights with respect to use of the Website and Services are governed by the Terms and all applicable laws, including but not limited to intellectual property laws.

    Any contact information for troops overseas and/or soldiers at home provided to you by FPN/VSP® is specifically and solely for your individual use in connection with the services provide by Van Stone Productions Foundation VSP.

    FPN/VSP® soldiers contact information for any other purpose whatsoever, including, but not limited to, copying and/or storing by any means (manually, electronically, mechanically, or otherwise) not expressly authorized by FPN/VSP is strictly prohibited. Additionally, use of FPN/VSP® contact information for any solicitation or recruiting purpose, or any other private, commercial, political, or religious mailing, or any other form of communication not expressly authorized by FPN/VSP® is strictly prohibited.