{"id":5685,"date":"2018-09-17T15:00:57","date_gmt":"2018-09-17T19:00:57","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5685"},"modified":"2020-06-04T20:52:31","modified_gmt":"2020-06-04T20:52:31","slug":"state-sanctioned-hacks-ever-justice","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/state-sanctioned-hacks-ever-justice\/","title":{"rendered":"State-Sanctioned Hacks: Is there ever any justice?"},"content":{"rendered":"<p><span style=\"color: #000000;font-family: Calibri\">Late last week, the United States Department of Justice <a href=\"http:\/\/\uf0de\thttps:\/\/www.npr.org\/2018\/09\/06\/645247376\/feds-charge-north-korean-cyber-operative-in-sony-hack-ransomware-attack\">officially filed charges<\/a> in the 2014 Sony Hack. <a href=\"http:\/\/\uf0de\thttps:\/\/www.riskbasedsecurity.com\/2014\/12\/a-breakdown-and-analysis-of-the-december-2014-sony-hack\/\">Sony Corporation was hacked<\/a> on November 25<sup>th<\/sup>, 2014 by an organization calling itself the Guardians of Peace (GOP). The GOP stole employee Social Security numbers, confidential emails, and unreleased films. The GOP then released the emails and films online where the films were downloaded over a hundred thousand times. <\/span><br \/>\n<span style=\"color: #000000;font-family: Calibri\">At the time of the hack, the FBI suspected that North Korean was to blame. The theory was that North Korea hacked Sony as a preventative measure to deter Sony from releasing the film, \u201cThe Interview\u201d. \u201cThe Interview\u201d followed the story of \u201ctwo celebrity TV hosts [who got] a chance to interview Kim Jong-un. Before heading to North Korea, the[] hosts are asked by the C.I.A. to assassinate [the North Korean leader].\u201d Despite its comedic effect, \u201cNorth Korea . . . stated that if the movie were released, they would consider it an \u2018act of war\u2019\u201d. When asked if it were behind the attack, North Korean officials stated that the U.S. should \u201cwait and see\u201d. In response to the troubling accusation, President Barack Obama imposed sanctions on several individuals and entities associated with the North Korean government. <\/span><br \/>\n<span style=\"font-family: Calibri\"><span style=\"color: #000000\">In addition to those sanctions, the United States government charged Park Jin Hyok with conspiracy to commit wire fraud. He is the first individual to be formally charged in connection with this crime and likely will not be prosecuted in any American court. U.S. Officials believe that Park resides in North Korea but do not expect the regime to extradite him. This unsurprising reality raises questions about the role of justice in state sanctioned cyber-attacks.\u00a0 <\/span><\/span><br \/>\n<span style=\"color: #000000;font-family: Calibri\">Advocates and critics alike realize the complicated nature of cyber warfare. On one hand, the United States wants to display strength and must adequately respond to state sanctioned attacks. While on the other hand, the United States does not want to escalate tensions between major world powers. Be that as it may, many argue that the United States\u2019 response to cyber-attacks has never been, and will never be, sufficient.<\/span><br \/>\n<span style=\"color: #000000;font-family: Calibri\">Critics argue that economic sanctions on countries like North Korea and Russia woefully fail to deter and punish those officials for their actions. Because these countries have such independent economies, U.S. sanctions tend to amount to nothing more than diplomatic gestures that simply make the American people feel good. Critics further argue that when the United States attempts to respond in proportion to the harm done, it risks facing legal battles like it did with the Stuxnet hack. Furthermore, critics argue that the unprecedented charges against Park will fail to materialize and lead to but one conclusion \u2013 that there will never be real penalties for state-sanctioned hacks. <\/span><br \/>\n<span style=\"color: #000000;font-family: Calibri\">Advocates however, are optimistic about the future of cyber-warfare and the government\u2019s ability to hold state actors accountable. A white house spokesman stated that the Sony hack is a \u201cnational security matter\u201d. A cybersecurity expert noted that \u201cThings will never get better unless there are penalties\u201d. And Senate intelligence committee Vice Chairman, Mark Warner, remarked that Park\u2019s criminal charges are \u201can important step in making clear to our adversaries that these kinds of criminal activities are unacceptable\u201d. <\/span><br \/>\n<span style=\"color: #000000;font-family: Calibri\">Given that the U.S. government has formally charged an individual for crimes connected to the Sony hack in conjunction with the novelty of this act, one might reasonably conclude that, one day soon, there will be real penalties for state sanction hackers. However, only time will tell, but, if history shows us anything, it\u2019s that we ought to be skeptical of such a possibility. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late last week, the United States Department of Justice officially filed charges in the 2014 Sony Hack. Sony Corporation was hacked on November 25th, 2014 by an organization calling itself the Guardians of Peace (GOP). The GOP stole employee Social Security numbers, confidential emails, and unreleased films. The GOP then released the emails and films <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/state-sanctioned-hacks-ever-justice\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5686,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5685"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5685"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5685\/revisions"}],"predecessor-version":[{"id":6929,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5685\/revisions\/6929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5686"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}