Attackers can still conceal their point of origin by looping or leap-frogging severalcomputersystems in several countries before finally going into the system that is being attacked as well as those pursuing them.
Media outlets including The New York Times, The Wall Street Journal and The Washington Post have all said this year that their computersystems were breached, while several NBC websites were briefly hacked in November.