Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

US Busts Military Network Hacker 466

yorgasor writes " KATU has an article announcing the case of a mysterious hacker who has broken into roughly 100 military networks has been solved. The hacker is a British citizen and authorities were considering extradition for the case. Although no networks containing classified information were compromised, they do consider the hacker to be a professional rather than recreational due to the large number of networks he hacked."
This discussion has been archived. No new comments can be posted.

US Busts Military Network Hacker

Comments Filter:
  • zerg (Score:5, Funny)

    by Lord Omlette ( 124579 ) on Tuesday November 12, 2002 @12:58AM (#4648580) Homepage
    Huh? Something must have been left out of the blurb. If I wank 100 times a day to porn, does that mean I'm a professional wanker?
    • Re:zerg (Score:2, Funny)

      by Anonymous Coward
      Well, if that's what you'd like to be referred to. Then again, after wanking 100 times in a 24 hour period and causing all that stress on your wang, I think it'd be more accurate to say you 'were' a professional wanker.
    • Re:zerg (Score:5, Funny)

      by pyrote ( 151588 ) on Tuesday November 12, 2002 @01:03AM (#4648623) Journal
      and you said it was the keyboard that gave you Carpal Tunnel.

  • couldn't have been anything THAT serious

    Any military insiders/Brit HaX0rs care to describe some US Military systems?

    • by Anonymous Coward
      They're a bunch of computers connected together with "cat-5" cable. We run high tech programs like "MS Outlook" and "Microsoft Office" coordinated by a really fucking slow "Exchange Server." Pretty trippy huh?

      Tracer
      USMC
      Not Commanding
    • You're right. It couldn't have been anything "THAT" serious.
      Want to know why? Do a google search on SIPRNET.
      There's a nice, safe air-gap between your local Internet connection and anything "THAT" serious on military networks.
      • There's a nice, safe air-gap between your local Internet connection and anything "THAT" serious on military networks.
        yeah, until some yahoo with clearance takes his personal laptop and plugs it into SIPRNET. And yes, it has happened. I think Bruce Schneier mentioned dumb stuff like this in a cryptopane issue...
      • by jonbrewer ( 11894 ) on Tuesday November 12, 2002 @02:02AM (#4648931) Homepage
        There's a nice, safe air-gap between your local Internet connection and anything "THAT" serious on military networks.

        Of course there is a safe-air gap, but unless every machine allowed to connect to those networks is physically locked down, every IO port disabled, and every removable media drive locked with a physical device, you're going to have people downloading sensitive material and moving it on to unsecured networks.

        Granted it's been a few years, but I have seen young underpaid geeks walk up to such systems wearing paper badges with "NO CLEARANCE" stamped in red ink on them, and proceed to insert floppy disks into said systems in order to defragment drives or install drivers.

        A chain is only as strong as its weakest link.
    • by Anonymous Coward
      It's a pretty MS-centric environment, at least from the user end. Outlook, MS Word, IE, etc, etc. Somebody already mentioned Exchange.

      However, there are some non-MS systems in use, including some unix variants. Geeks are geeks, military or not... they need something to play with.

      I'm not a systems guy, just a geek in an allied field. I have not even attempted to look around our network for one main reason: Even looking will get you a visit from the OSI, or some other type of spook... not fun. I would rather not be doing my job in a federal prison complex somewhere.

      I always rap with the systems types when they come around to reimage a system or some other support task. They were NOT supportive when I was discussing the feasibility of running NMAP behind the firewall. Nice guys though...
  • by Anonymous Coward on Tuesday November 12, 2002 @01:01AM (#4648603)
    Wow! It took'em 100 or more tries to notice something was not quite right?

    They probably had to bait and switch to catch him...

  • British Hacker ... (Score:3, Interesting)

    by SuperDuG ( 134989 ) <be@@@eclec...tk> on Tuesday November 12, 2002 @01:01AM (#4648608) Homepage Journal
    hehehehe okay ... even though the term hacker was used "incorrectly" I do find it amusing to be phrased in a new feared term of "BRITISH HACKER".

    Obviously a pro, anyone who bats higher than 100 hacks is destined for the pros. Is there sponsorship for this wonderful sport of hacking?

  • By George (Score:2, Funny)

    by IEforLinux ( 462061 )
    He must've been looking for the secret blueprints for the prevention of tooth decay...
    • by sql*kitten ( 1359 ) on Tuesday November 12, 2002 @08:02AM (#4649929)
      He must've been looking for the secret blueprints for the prevention of tooth decay...

      Just be thankful that the geniuses at MIT invented the elasticated waist and made America safe for Truth, Justice and the Chicken Parm Sub.
  • by dirvish ( 574948 ) <(dirvish) (at) (foundnews.com)> on Tuesday November 12, 2002 @01:02AM (#4648610) Homepage Journal
    I know the military is a big target and all but 1 GUY, 100 NETWORKS? Those military network security folks must be pretty lame. Seems like the could have tracked him down a lot sooner if they knew what they were doing.
    • One might not imagine how loosy office networks are, no matter what kind of department behind it. Policies usually restrict the transfer of confidential data from restricted area to office environment. However, no security policies can safeguard confidential data from human stupidity. :)

      I'm pretty sure this guy has gathered a lot confidential information(aka profitable) this way. :)
    • by Anonymous Coward on Tuesday November 12, 2002 @03:10AM (#4649192)
      Well, jokes about "Military Intelligence" aside, there's also the possilility that they took that long to gather enough evidence to create an airtight, "slam-dunk" case.

      I work for a company that's cooperating with the FBI in a particular financial investigation. They know exactly who the bad guy is: name, address, MO, everything. They've known for a while, they're just waiting to gather more evidence, and are probably hoping the bad guy will lead them to more bad guys...

      Keep in mind also the potential difficulty of getting foreign ISPs and LE agencies to cooperate. Even if they're willing, that kind of organization is *very* difficult, when there aren't pre-existing lines of communication, procedures, etc.
  • by ejunek ( 562968 ) on Tuesday November 12, 2002 @01:04AM (#4648626) Homepage
    Does that come with a 401k plan and a good dental plan? It still probably has a better retirement plan than Enron :P
  • Better link (Score:4, Informative)

    by Anonymous Cowdog ( 154277 ) on Tuesday November 12, 2002 @01:05AM (#4648632) Journal
  • 100 Sites? (Score:5, Insightful)

    by dubious9 ( 580994 ) on Tuesday November 12, 2002 @01:06AM (#4648636) Journal
    He must have been pretty damn good to evade capture and continue to crack 100 sites. Makes me wonder home they caught him. If you are a professional and can break into 100 US military sites, what's to stop you? I figure if you are good enough to crack 10 or twenty without messing up, they are probably not going to catch you.

    Anybody have any good stories of catching elusive hackers, or insights into how they might have got him?
    • Re:100 Sites? (Score:2, Informative)

      by nich37ways ( 553075 )
      The more you hack/crack?? into a set of networks more and more information will be stored about how you did it, presumably.
      Thus it should be easier to figure out where you are from after 100 than it is with 1.

      This is also true with reality attacks.
      eg. For recent news the Washington Sniper as he shot at more and more people more and more information can be gathered making it easier and easier to figure out who he is.

      • Re:100 Sites? (Score:5, Insightful)

        by Minna Kirai ( 624281 ) on Tuesday November 12, 2002 @01:20AM (#4648724)
        Yeah, and that shows he wasn't a professional, but someone out for fun. A professional cracker would've gotten his data, got out, and collected his paycheck.

        Same with the snipers- the police can hardly claim to have beaten them. (the number of bodies they left behind made it a phyrric victory at best). A professional assasin would've killed his target, got out, and collected his paycheck.

        So far we can barely defend ourselves from recreation "hackers" and gunmen. If some real terrorist group starts funding some, it will be much much worse.
        • Re:100 Sites? (Score:3, Insightful)

          by kiwimate ( 458274 )
          A professional assasin would've killed his target, got out, and collected his paycheck.

          Yes and no. Mostly yes -- a professional assassin is typically hired to kill a specific target. A true mercenary does the job purely for financial gain, not for ideological purposes, and so the motivation to escape is obviously high.

          But what if your aim is to instill fear? Suicide bombers don't care about getting out; they want to take as many with them as possible. Similarly, I wouldn't be surprised if we discover the motivation for the snipers was to instill as much fear as possible in the American population. To that end, it was a big success -- no apparent link between the targets, which meant anyone could be next, and they just kept on going day after day with no-one having a clue who they were.

          So, the lesson is that, while professional is usually taken to mean that one gets paid for the task, that's not the only definition. It can refer to someone who performs a task to high standards and with a certain degree of expertise (look it up on Merriam-Webster [m-w.com]).

          (Oh, and it's Pyrrhic, not phyrric. Even without the correct spelling, it still refers to Pyrrhus, so you should at least capitalize it as a proper noun. Classical education ain't what it were.)
    • Re:100 Sites? (Score:4, Interesting)

      by nlinecomputers ( 602059 ) on Tuesday November 12, 2002 @01:21AM (#4648727)
      100 sites seems a bit much to me. I wonder if they let him work for some time before moving in just so they could judge how good he was or perhaps who else he was connected to. Sort of a military honey pot.

      NO! NO! don't mod me! I'm too young to die a troll. {click} Oh the pain, the pain...
    • by Goonie ( 8651 ) <robert.merkel@be ... g ['ra.' in gap]> on Tuesday November 12, 2002 @01:23AM (#4648741) Homepage
      The article was vague. Maybe he made a mistake and gave the investigators something that identified him. Equally likely, maybe the infosec guys decided the payoff for letting him continue hacking for a while (firm up the evidence for a conviction, be able to convict him for more serious offences, and most importantly figure out what his motives and techniques were) was more important than having him arrested immediately.
    • Re:100 Sites? (Score:5, Informative)

      by Anonymous Coward on Tuesday November 12, 2002 @01:38AM (#4648810)
      > Anybody have any good stories of catching elusive hackers, or insights into how they might have got him?

      The Cuckoo's Egg by Clifford Stoll is an engaging story of a grad student assigned to track down a 75 cent discrepency in computing resources. He eventually uncovers a ring of crackers working out of Germany for the KGB.

      Read a review [ercb.com] .
    • by scotch ( 102596 )
      He must have been pretty damn good to evade capture and continue to crack 100 sites.

      Actually, he cracked one site consisting of a 100 node beowolf cluster. Imagine ... his surprise when he got caught.

      This post broght to you by the laws of physics.

    • Re:100 Sites? (Score:5, Interesting)

      by ArmedGeek ( 562115 ) on Tuesday November 12, 2002 @02:36AM (#4649057) Homepage Journal
      This is the problem with the criminal mentality (unfortunatley it sometimes affects us geeks as well). I have worked in law-enforcement in the past and there is something that people who break the law really should understand.
      Just because they haven't come for you, doesn't mean they don't know.
      Generally, law enforcement (usually with organized crime or the white-collar variety) will track a suspect for a while, gathering evidence. You'd be amazed at the truckload of intelligence data amassed during a large narcotics investigation. (I never worked computer crimes).

      The point is, why bust the guy after the first "penetration" so he gets probation? If you feel he's a threat, then you wait, let him continue to add to the charges, then pop him and put him away for a long stretch. They probably "had him" long before they busted him.

      note: anyone cracking US government networks, either has an agenda or is incredibly self-destructive.

    • If you are a professional and can break into 100 US military sites, what's to stop you?

      The key here is that he broke into "unclassified" sites. These sites can often be adminstrated by people who are just learning how to use a computer. Well, I currently work at an unclassified site and it sure feels that way around here. Unclassified sites often will not even have a properly functioning firewall.

      It sounds much more impressive than the actual task really would have been. The real trick is to learn about the sites. My site (for instance) doesn't even really think about computer related security... there's nothing here anyone would want anyhow.

      Now the trick is, you break into a horde of "unclassified" sites and hope you caught one that is going to go "classified" then you have a backdoor into a classified network. But, even this wouldn't get you anything truly juicy.

      The really good stuff is kept on an isolated network and even the cat 5 wires have to be kept a minimum of six inches from any other electronic devices not on that network. So, if you want the real stuff you have to cross an "air-gap" and I don't know of any networking protocol that can do that.
  • by RebelTycoon ( 584591 ) on Tuesday November 12, 2002 @01:08AM (#4648650) Homepage
    All your bases are belong to us...

  • Extradition (Score:3, Interesting)

    by funkdancer ( 582069 ) <funkyNO@SPAMfunkdancer.com> on Tuesday November 12, 2002 @01:12AM (#4648676)
    It will be interesting to see if the US are actually able to extradite a Brit for having commited cyber crimes. Wouldn't the penalties be a fair bit harsher over the pond than in Europe?
  • Is it just me... (Score:4, Insightful)

    by alargeduck ( 540045 ) on Tuesday November 12, 2002 @01:15AM (#4648691)
    Or is this really dirty:

    Once, the FBI tricked two Russian computer experts, Vasily Gorshkov and Alexey Ivanov, into traveling to the United States so they could be arrested rather than extradited. The Russians were indicted in April 2001 on charges they hacked into dozens of U.S. banks and e-commerce sites, and then demanding money for not publicizing the break-ins.

    FBI agents, posing as potential customers from a mock company called Invita Computer Security, lured the Russians to Seattle and asked the pair for a hacking demonstration, then arrested them. Gorshkov was sentenced to three years in prison; Ivanov has pleaded guilty but hasn't been sentenced.

    Why not just extradite them? The US has a extrdition treaty with Russia I'm sure. Now I'm not saying that arresting them was "wrong", but why resort to deceptive law enforcement tactics like this?

    • Is it just me... Or is this really dirty: [snip]

      You mean, you don't read slashdot? [slashdot.org]

    • Well, one reason to lure them to the States would be a certain lack of confidence in the Russians' ability or willingness to arrest and extradite the pair.

      BTW, luring criminals that way isn't "dirty". As far as I knw, it's fairly common. I've read of local police forces doing something similar to herd together folks who have skipped out on their child support payments.
    • I'd be awfully surprised if there were such a treaty -- here's a reference that there's not [freedomforum.org] There's still a pretty big difference in each's concept of justice, and they were bitter enemies until a few minutes ago.

      There's no problem with deceptive law enforcement so long as it is not entrapment or go so far as to violate the constitution. For many types of crime it is the only practical way to get a collar. It depend son the circumstances. One of my favorites were a bunch of guys who owed child support; the cops had arrest warrants and called them all to tell them they'd won the lottery and all they had to do was claim the prize. It was a slaughter....

      Interestingly, some countries are unwilling to extradite to the U.S., Russia, or other countries that practice capital punishment. This is a background issue re 9/11 prosecutions.
    • Why not just extradite them? The US has a extrdition treaty with Russia I'm sure. Now I'm not saying that arresting them was "wrong", but why resort to deceptive law enforcement tactics like this?


      Stings like this are done all the time within our own country. Creating a "new" crime that has a well-documented beginning and arrest becomes a more solid conviction. Proof of activity across the Internet by multiple people at undocumented times leads to reasonable doubt in the minds of jurors.

  • by Minna Kirai ( 624281 ) on Tuesday November 12, 2002 @01:16AM (#4648697)
    Throw some military sysadmins to a court-martial for dereliction of duty!

    Ok, don't be that harsh on them. Scare em a little, then let the go with a warning. But national western militaries cannot continue to run their networks like this. It's dangerously irresponsible.

    For a national military to assume they can use police arrests (force of arms) to secure their networks is folly. Armed force only works against attacks that are perpetrated from inside your range of military dominance. For the US that's a big area, but there's still many places where they can neither call in a SWAT team, nor direct an unmanned plane to assasinate the target.

    If this fellow had been a professional (earning money from these hacks), then he'd be living in a secret compound provided by his employers in Iraq/Korea/China. True, the internet bandwidth isn't that great there, but a good hacker doesn't need it. He can just compromise some broadband PCs in the US or UK (possibly with the help of an agent on scene- a retailer who sells trojaned machines for instance) and use that to leapfrog to the real targets.

    (If this guy was any good, we'll find out that this British suspect was just a patsy)

    One big argument against more stringent computer-crime laws in the US is that they permit businesses and the military to postpone installing real network security. Why bother defending yourself, if the FBI just busts the punks for you?

    This sets us up for disaster in 20 years, when the economy really needs the internet to survive day-to-day, and China has caught up to our 2005-era connectivity levels. If President Bush the 3rd angers China and they set 200 top computer professionals at making mischief, the damage could be real.

    ("Vaccinate now! Free Heckenkamp")
    • by Klaruz ( 734 ) on Tuesday November 12, 2002 @01:54AM (#4648885)
      Court martial military sysadmins? No way. It's not their fault.

      Hear me out here. The people running these systems (from my ex-air force perspective) are between kids out of high school (Airmen) and 20-sometings that have been doing military computer stuff since high school (NCOs). All they know is what the military trained them to do. Guess who decides what to train them in? NCOs and Officers. That's for the military people. There are civilians too, usually retired military. They all have to abide by policies set out by the DOD which are something short sited and not very well thought out. They also leave very little room to impliment no ideas and take care of important problems right away.

      The best and the brightest who can actually secure a system don't go into the military. When they do, they're ignored because they're 'young' and have no 'experience'. I fell in the later catagory. There's nothing like the feeling of fixing somebody else's screw up (usually a contractor) and 30 minutes later be taking out the trash or doing some other degrading duty. Needless to say I got out and now make alot more money with alot less hassle, have a boss who listens to me (mostly), and can actually advance in the company and my career without having to wait X number of years and take a test on things that have nothing to do with my job.

      Anyway, without going off topic. You can't blame these guys, most of them don't have a clue, those with a clue have their hands tied by stupid policies.

      If you want to blame somebody, blame the high ranking Officers, they make the policies and the training programs that made this happen. Of course, that would never happen, some poor Airmen or overworked NCO will get railroaded.

      Oh well, I'm free and clear now. At least I got a jump start on life and some free college out of the deal.
      • by PhxBlue ( 562201 ) on Tuesday November 12, 2002 @11:11AM (#4650750) Homepage Journal

        Well-said!

        I'll add--the reason this guy didn't get into any classified information is because the military doesn't store classified information on the NIPRNet, that is, Unclassified but sensitive Internet Protocol Router Network. This NIPRNet is the Internet that DARPA originally developed and that everyone here uses today. Classified information is transmitted only along a SIPRNet, or Secret Internet Protocol Router Network, which is not actually connected to the public Internet.

        Releasing or altering classified information would almost certainly require physical access to one of the computers that's already linked to the military SIPRNet. If the rest of the computers across the military are protected in similar fashion to the ones where I work--behind a foot-thick wall of steel with armed guards stationed at the entrances--I feel pretty good about the security of our classified information networks.

    • Maybe you're misunderstanding what he had access to and what professional means? Supposedly anything really juicy isn't connected to the internet anywhere and professional means he's getting paid, that's it.

      That doesn't mean that there isn't a lot of profitable data on the connected network. My pops works for a company that does about 80% of its business with the military. I'm sure that if the Brit got one of their proposals off a network share, there's a rival firm with a slimy exec out there who'll buy it to undercut the contract.

      That seems a lot more likely than him selling troop movements and materials checklists to the Iraqis. Also seems that they'd be willing to track this activity long enough to make a strong criminal case rather than simply disappear you.

    • by lommer ( 566164 ) on Tuesday November 12, 2002 @03:41AM (#4649279)
      "(If this guy was any good, we'll find out that this British suspect was just a patsy)"

      No actually, if this guy is any good we won't find out that this Brit is just a facade...
  • Kinda OT (Score:5, Interesting)

    by teamhasnoi ( 554944 ) <teamhasnoi AT yahoo DOT com> on Tuesday November 12, 2002 @01:17AM (#4648703) Journal
    When someone can bust into ONE HUNDRED MILITARY SITES and only get caught on the 101st, it makes me really doubt the 'security' of our electronic voting systems which are:

    Closed Source
    Admin'd by a Private Buisiness
    Secured by Microsoft
    Run by volunteers at each polling place.

    Kinda makes you wonder if you really did/will vote, eh?

    If this guy does get extradited to the US, I bet he'll be working for someone in a five-sided building real soon.

    • Re:Kinda OT (Score:5, Funny)

      by wadetemp ( 217315 ) on Tuesday November 12, 2002 @01:23AM (#4648736)
      Damn. You're right. I knew I shouldn't have given my ballot to that bearded guy carrying the 80s-era Soviet anti-tank missle launcher.
    • Re:Kinda OT (Score:5, Insightful)

      by ceejayoz ( 567949 ) <cj@ceejayoz.com> on Tuesday November 12, 2002 @02:43AM (#4649094) Homepage Journal
      You can hardly compare the electronic voting systems to military servers. The military servers are connected to the public internet - the best way of securing a computer is to smash its network card into itty bitty pieces.

      The voting machines, on the other hand, aren't connected to the internet - they save the votes onto removable cards (compactflash cards, IIRC) that get taken (under guard) to a location where they're all downloaded and the results determined.

      They're two completely different problems.
      • the best way of securing a computer is to smash its network card into itty bitty pieces.


        Alternatively you could just take it out of the computer.

      • Re:Kinda OT (Score:3, Interesting)

        by silvaran ( 214334 )
        Nonetheless, I can't wait to see a bug that causes the voting system to count down and give 4294967295 votes to a single candidate.
  • Makes me wonder... (Score:5, Insightful)

    by rovingeyes ( 575063 ) on Tuesday November 12, 2002 @01:20AM (#4648719)
    I am told that the US govt. spends lot of (tax payers) money on security especially after 9/11. Now, I do understand that it is difficult to keep up with all the changes in technology and come up with ways to thwart the efforst of these crackers. But, what the govt ends up doing is catch these guys and throw 'em in jail. WHY? Just becoz they broke in to the so called secure system? All they do in jail is do some menial odd jobs.

    I say throw these guys some more computers and some fat internet pipe and ask them to find all the vulnerabilities in the system.They are obviously good probably too good, but why waste their talent and energy. I say focus it in the right direction. The more you find these kind of guys, the more they'll spring in the horizon.

  • Security (Score:5, Insightful)

    by MacAndrew ( 463832 ) on Tuesday November 12, 2002 @01:20AM (#4648723) Homepage
    I hate to slip in a serious question with all these hormones flowing (is it the time of night?) but can anyone tell me whether the military is still strictly enforcing an air-gap policy, where no machine with classified info is attached to an outside network? I'm curious about the policy, not the occasional John Deutsches or Wen Ho Lees (allegedly!) or Aldritch Ameses who might deliberately or stupidly compromise security.

    I'm sure there could otherwise be some very unfunny security breaches. Even our allies (even the British?!?) spy on us. Some leaks like the Pentagon Papers may be a good thing, but I digress.

    (Um, also, could /. come up with a special mod code for "all your base are belong to us" jokes, so i could filter them? It's kinda worn out, like the guys on Car Talk saying "you go girl" -- true story)
    • Re:Security (Score:5, Informative)

      by Anonymous Coward on Tuesday November 12, 2002 @01:35AM (#4648791)

      Yes, there are several distinct levels of classification (the main ones being Unclassfied, Confidential, Secret, Top Secret, and SCI). Almost anything of any importance at all is classified at the Secret level, and kept on the SIPRnet (Secure Internet Protocol Network), the secret-classified general purpose network. The SIPRnet is a completely seperate WAN connected through highly encrypted circuits. There are also other networks that coorospond to higher levels of classification for different purposes, but there are no "general purpose" networks such as those.

      The key thing to remember, though, is that there is something called "information segmentation" which means that while a whole of something may be classified, its parts may not be. For example, lets say you're building a missle. The missle itself is classified, but the specifics of its guidance system, or propulsion unit, or manuvering system are not, as long as they are not put together in the context of a missle. That way, you can have scientists, techs, or mechanics work on parts at an unclassified pay-rate, and not have to pay more for someone that's cleared. Same thing goes for troop movements, ship schedules, etc. etc.

      This is where network security becomes paramount. Someone that has access to various file servers at different locations, may be able to put the pieces together and get the bigger, far more important picture together.

      • Re:Security (Score:5, Informative)

        by Call Me Black Cloud ( 616282 ) on Tuesday November 12, 2002 @02:00AM (#4648921)
        SCI is not a classification but a distribution control (like NOFORN, NOCONTRACT, LIMDIS, and the old WNINTEL). link [doe.gov]

        The key thing to remember, though, is that there is something called "information segmentation" which means that while a whole of something may be classified, its parts may not be.

        You left out the key acronym here: EEFI, or Essential Elements of Friendly Information.

        "Taken separately, EEFI in themselves _are not_ necessarily classified; that is, there will be participating forces or organizations in a field exercise that are not in themselves classified information. However, specific answers to validly formulated EEFI are generally classified responses..." link [fas.org]

      • Re:Security (Score:4, Insightful)

        by Minna Kirai ( 624281 ) on Tuesday November 12, 2002 @03:18AM (#4649221)
        And even if InfoSec is the policy, you can't be sure everyone will follow it precisely [infowar.com].

        A host of human errors can lead to someone accidentally violating his clearance and bringing classified content onto an unsecure system. It happens, and if enemy "hackers" get more sophisticated, it could be a problem. Suppose one of the big-spreading viruses decides that instead of crashing 1000s of machines, it'll just quietly install a little file-watcher and start to pattern-match against the regular spook keywords: "Telex codes Arnett HAMASMOIS Ron Brown LABLINK 22nd SAS White House threat high security lynch IRA terrorism", transmitting any file with multiple matches back to its home base?

        Unlikely, but lets rely on more than luck to protect us.
        (Hey, one good start could be forbidding Classified data to be stored in Microsoft file formats... yeah... Classified Word(tm) documents are just begging for trouble)
  • AP story... (Score:5, Insightful)

    by dubious9 ( 580994 ) on Tuesday November 12, 2002 @01:38AM (#4648809) Journal
    Not a knock on KATU or anything, but when it's an AP story, why don't we call it an AP story? All the people at KATU did was post the wire. Note that the yahoo news story is exactly the same. It's how AP stories work. Why anybody modded up the guy that posted the yahoo news link is beyond me. It's the same freakin story. Now I know that the AP doesn't run it's own AP wire site (rather they link to local newspapers) but wouldn't it be better to say "The AP is running a story on blah blah blah catch it at (insert AP paper here)"?
  • Terrorist (Score:4, Insightful)

    by Jacer ( 574383 ) on Tuesday November 12, 2002 @01:53AM (#4648883) Homepage
    by the patriot act, wouldn't this guy be a terrorist rather than a hacker? oh wait, brit, he's probably caucasian....
    • For instance, take "Sending friendly operatives subvertedly into enemy territory to disrupt military installations and infrastructure during a state of war." Pretty neutral.

      Since a US-Iraqi war is brewing, you hear about it both ways, only differently.

      If it's the USA, it's called "Sending in the marines to assist or execute surgical warfare."

      If it's Iraq, it's called "Smuggling in terrorists to aid or commit acts of terror."

      I don't mean to say they're exactly the same thing either, but there's a few more shades of gray than black or white. Of course, since I'm telling you this, I must be:

      Propaganda Minister
      Axis of Evil
  • Tsutomu Shimomura takes the credit and turns it into a book and a movie... just to make some extra cash.
  • hmmm. (Score:5, Interesting)

    by _ph1ux_ ( 216706 ) on Tuesday November 12, 2002 @02:13AM (#4648985)
    military cyber-guards.

    I was watching this discovery channel documentary and there was this military type, jar-head cyber guard guy. He was standing there talking about how they monitor all the traffic on their networks, and keep a close eye out for any signatures of attack.

    He was stressing how secret they keep all their information about their networks - that they dont let anyone know even their IP sets assigned to different networks, and that this information could help an attacker find out the machines they would need to attack.

    The whole time he was talking about this - he was standing in front of a bunch of monitors, and the ones to the left of him was scrolling some sort of log and it was showing IPs to hostname mappings and some traceroutes as well. They were all in the really low IPs - and their hostnames were all .mil and *all* of it was easily readable by the viewer....

    and i do not think it was something that was done on purpose and made to look like an accident. Not by the way these people were acting.

    especially since they avoided filming any of the screens that people were working on.

    So I am not too surprised.
    • You can bet your sweet ass that was sanitized screens you where looking at. When I worked in the navy command center we where frequently visited by the press and if they had camera's we threw bogus stuff on the screens to sanitize the area before entry. So what you see is completely bogus smoke and mirrors.
  • "professional" (Score:5, Insightful)

    by g4dget ( 579145 ) on Tuesday November 12, 2002 @02:24AM (#4649013)
    they do consider the hacker to be a professional rather than recreational due to the large number of networks he hacked.

    Sleeping with a lot of men/women makes someone a slut; it requires getting paid for it to be considered a professional.

    • Re:"professional" (Score:3, Insightful)

      by infiniti99 ( 219973 )
      Not necessarily. I visited Merriam-Webster [m-w.com] to check on this, and "receiving financial return" is just one of the many definitions of a professional.

      I believe there was a related debate on a recent Slashdot poll involving programming, where two of the options were "Professional" and "Open Source". This was a poor choice of words, since the two are not mutually exclusive.
  • by Jeremiah Blatz ( 173527 ) on Tuesday November 12, 2002 @02:35AM (#4649050) Homepage
    Hrm, "they do consider the hacker to be a professional rather than recreational due to the large number of networks he hacked."

    Wow, I guess I'm a professional /. reader? This is so cool! I thought I was unemployed, but no, here I am, practicing my profession *right now!* Rawk!
    • by Anonymous Coward
      Wow, I guess I'm a professional /. reader? This is so cool! I thought I was unemployed, but no, here I am, practicing my profession *right now!* Rawk!

      The bad news is that you only get paid with Karma.

      The good news is that is may be more valueable than VA's stock.
  • by Zemran ( 3101 ) on Tuesday November 12, 2002 @03:28AM (#4649252) Homepage Journal
    Professional (adj) - practicing for a livelihood.

    Either this person was making his money from this (which I doubt) or this is another case of "they don't know the what they are saying".

    Just like the abuse of the words "theft" and "pirate" in relation to software when no one is permenantly deprived of anything.

    These terms are being misused, not out of ignorance (although the ignorance is obvious) but out of a desire to create a false impression and make the crime seem worse than it is.
  • Extradition? (Score:4, Insightful)

    by panurge ( 573432 ) on Tuesday November 12, 2002 @04:23AM (#4649407)
    We all know that the US govt. will not sign up to the International Criminal Court, yet tries to extend US jurisdiction outside its borders. But this is ridiculous. If the actions took place in the EU, on what basis could there be extradition to the US? Extradition is in respect of a crime committed in the country requesting the extradition.

    Basically what he did was sit at a keyboard typing and looking at a screen in, presumably, the UK. At what point was the crime committed? When he hit the return key, or when he viewed the resulting data? I would suggest that is the case, and any prosecution should take place in the UK - there is plenty of existing legislation.
    I am sure that someone will start bleating on about the theft of CPU cycles, or whatever. But this is extremely abstract. If the sites were non-secure, then presumably they had public access. If we are going to pass laws that people can only view websites as the designer intended, it may suit the kind of Government idiots that once threatened someone with prosecution for telling them they had an open SQL port with anonymous login on a military server, but is hardly going to promote good design (or be enforceable).

    This is exactly the kind of case that makes the notion of a World Court reasonable. But I can just imagine his lawyers going to the EU Courts to argue that (a) the US is refusing to allow its citizens to be subject to the ICC, thus demonstrating that US law is not even-handed, (b) in the present climate of hysteria he could in any case not get a fair trial, (c) that US law is in conflict with EU human rights legislation.

    It seems to me we have more to fear from the kind of idiots that go in for the kneejerk "This guy looked at a Govt. site! He is a terrorist!" reaction. The word for them is Stalinists, and the last thing we want is for the delightful security and political policies of the former Soviet Union to gain a foothold in the Republican Party.

  • by divide overflow ( 599608 ) on Tuesday November 12, 2002 @05:33AM (#4649561)

    Q: How can you tell a professional hacker has hacked into your network?

    A: You can't. That's why he's a professional.
  • by varjag ( 415848 ) on Tuesday November 12, 2002 @05:49AM (#4649599)
    ..about this story, is that noone of slashdotters objected this time to use of word 'hacker' as a label to 'cracker'.

    Oh well...
  • by LazLong ( 757 ) on Tuesday November 12, 2002 @05:50AM (#4649604)
    Classified networks are air-gapped from unclassified networks, which the Internet is by definition.

    I love it when some U.S. gov't computer getting hacked makes headlines....The most sensitive info a hacker could ever get would be HR type info.
  • Echelon (Score:4, Insightful)

    by Martin S. ( 98249 ) on Tuesday November 12, 2002 @07:42AM (#4649885) Journal
    So let me see if I have this right.

    The US Military want to prosecute somebody for doing something they've been doing [echelonwatch.org] for years ?
  • by Nintendork ( 411169 ) on Tuesday November 12, 2002 @05:11PM (#4653996) Homepage
    Here's the latest [wired.com]

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...