Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

The Best Nintendo Switch 2 Controllers

20 July 2025

The Best Dolby Atmos Experience Could Be Waiting in Your Driveway

20 July 2025

How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether

20 July 2025
Facebook X (Twitter) Instagram
Just In
  • The Best Nintendo Switch 2 Controllers
  • The Best Dolby Atmos Experience Could Be Waiting in Your Driveway
  • How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether
  • The Hunt for a Fundamental Theory of Quantum Gravity
  • This Is the Commodore Comeback Fans Have Waited for—but the Odds Are Still Against It
  • Chrome OS Will Merge With Android and Sony Surprises With a New Camera
  • At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds
  • Security News This Week: China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
News

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

News RoomBy News Room4 April 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

“That’s not nice, and it’s not a good norm,” says Schneider. She says that much of the US government’s slow approach to cyberattacks stems from its care to ensure it avoids unintentionally hitting civilians as well as breaking international law or triggering dangerous blowback.

Still, Schneider concedes that Caceres and Angus have a point: The US could be using its cyber forces more, and some of the explanations for why it doesn’t amount to bureaucracy. “There are good reasons, and then there are bad reasons,” says Schneider. “Like, we have complicated organizational politics, we don’t know how to do things differently, we’re bad at using this type of talent, we’ve been doing it this way for 50 years, and it worked well for dropping bombs.”

America’s offensive hacking has, by all appearances, gotten less aggressive and less nimble over the past half decade, Schneider points out. Starting in 2018, for instance, General Paul Nakasone, then the head of Cyber Command, advocated a “defend forward” strategy aimed at taking cyber conflict to the enemy’s network rather than waiting for it to occur on America’s turf. In those years, Cyber Command launched disruptive hacking operations designed to cripple Russia’s disinformation-spouting Internet Research Agency troll farm and take down the infrastructure of the Trickbot ransomware group, which some feared at the time might be used to interfere in the 2020 election. Since then, however, Cyber Command and other US military hackers appear to have gone relatively quiet, often leaving the response to foreign hackers to law enforcement agencies like the FBI, which face far more legal constraints.

Caceres isn’t entirely wrong to criticize that more conservative stance, says Jason Healey, who until February served as a senior cybersecurity strategist at the US Cybersecurity and Infrastructure Security Agency. He responds to Caceres’ cyberhawk arguments by citing the Subversive Trilemma, an idea laid out in a 2021 paper by the researcher Lennart Maschmeyer: Hacking operations have to choose among intensity, speed, and control. Even in earlier, more aggressive years, US Cyber Command has tended to turn up the dial for control, Healey says, prioritizing it over those other variables. But he notes there may in fact be certain targets—such as ransomware gangs or hackers working for Russia’s no-holds-barred GRU military intelligence agency—who might warrant resetting those dials. “For those targets,” says Healey, “you really can release the hounds.”

P4x Is Dead, Viva P4x

As for Caceres himself, he says he’s not opposed to American hacking agencies taking a conservative approach to limiting their damage or protecting civilians—as long as they take action. “There’s being conservative,” he says, “and then there’s doing fuck all.”

On the argument that more aggressive cyberattacks would lead to escalation and counterattacks from foreign hackers, Caceres points to the attacks those foreign hackers are already carrying out. The ransomware group AlphV’s catastrophic attack on Change Healthcare in February, for instance, crippled medical claim platforms for hundreds of providers and hospitals, effects about as disruptive for civilians as any cyberattack can be. “That escalation is already happening,” Caceres says. “We’re not doing anything, and they’re still escalating.”

Caceres says he hasn’t entirely given up on convincing someone in the US government to adopt his more gloves-off approach. Ditching the P4x handle and revealing his real name is, in some sense, his last-ditch attempt to get the US government’s attention and restart the conversation.

But he also says he won’t be waiting for the Pentagon’s approval before he continues that approach on his own. “If I keep going with this alone, or with just a few people that I trust, I can move a lot faster,” he says. “I can fuck shit up for the people who deserve it, and I don’t have to report to anyone.”

The P4x handle may be dead, in other words. But the P4x doctrine of cyberwarfare lives on.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOnePlus Launches AI Eraser Tool, Follows Google and Samsung’s Footsteps in AI Race
Next Article Klipsch Nashville review: a rugged, backpack-ready Bluetooth speaker

Related Articles

News

The Best Nintendo Switch 2 Controllers

20 July 2025
News

The Best Dolby Atmos Experience Could Be Waiting in Your Driveway

20 July 2025
News

How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether

20 July 2025
News

The Hunt for a Fundamental Theory of Quantum Gravity

20 July 2025
News

This Is the Commodore Comeback Fans Have Waited for—but the Odds Are Still Against It

20 July 2025
News

Chrome OS Will Merge With Android and Sony Surprises With a New Camera

19 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024102 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

Chrome OS Will Merge With Android and Sony Surprises With a New Camera

News Room19 July 2025
News

At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds

News Room19 July 2025
News

Security News This Week: China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

News Room19 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024102 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

The Hunt for a Fundamental Theory of Quantum Gravity

20 July 2025

This Is the Commodore Comeback Fans Have Waited for—but the Odds Are Still Against It

20 July 2025

Chrome OS Will Merge With Android and Sony Surprises With a New Camera

19 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.