Author: expatter

10 years for Hacking the U.S Army ? [Copy link] 中文

Rank: 8Rank: 8

Post time 2008-11-6 15:44:45 |Display all floors
Originally posted by expatter at 2008-11-5 16:34
China and America have been heard to mention that the other is trying to hack their computers and we would be surprised if they didn't try.  It is called spying.  You know, James Bond stuff and bee ...

what the HECK
What's on your mind now........ooooooooooooooo la la....Kind Regards

Use magic tools Report

Rank: 8Rank: 8

Medal Medal of honor Gold Medal July's Best Writer 2012 October's Best Writer 2012

Post time 2008-11-6 16:41:26 |Display all floors


I just think the whole thing is excessive and poorly handled.  Once the damage was done there could possibly have been a more beneficial way to look at this. Even if only to get a fresh perspective on where the system was caused to fail.  There is a real danger for America that someone might one day actually hack their computers for far more sensitive stuff. They are only machines.

After WWII many dodgy supporters of the defeated regime were shipped back to America to assist with flight programs and other scientific work and they went on to lead ordinary lives.  So it's not that America doesn't value enterprising and resourceful thinkers.

As regards the punishment.  Just think of the sort of vicious crime you would have to commit to get 10 years or more.

Just seems all out of proportion.  Of course I don't know the whole deal, but on the data presented it looks like this geek was just stupid and went to far in a seemingly innocent quest.


Use magic tools Report

Rank: 8Rank: 8

Medal Medal of honor Gold Medal July's Best Writer 2012 October's Best Writer 2012

Post time 2008-11-6 16:44:37 |Display all floors


what the HECK


where is the CHECK ?


In the POST  

Use magic tools Report

Rank: 8Rank: 8

Post time 2008-11-6 18:42:11 |Display all floors

It's actually been excellently handled. NS prosecutions are like copyright suits in that, if you do not pursue them, there is a steady erosion of your ability to do so in the future.

That's likely the only relevant question. Not sending a message, not even really punishing anyone; they just need to make sure that no judge looks askance at their prosecutions next time.

[ Last edited by interesting at 2008-11-6 04:28 PM ]
"Justice prevails... evil justice."

Use magic tools Report

Rank: 8Rank: 8

Medal Medal of honor Gold Medal July's Best Writer 2012 October's Best Writer 2012

Post time 2008-11-6 20:48:23 |Display all floors


I took a bit more time to snoop some more details and the results are quite remarkable.  In a BBC forum with numerous posts, 99% of the posts call for no extradition as The U.K has never successfully extradited anyone from the U.S even IRA men and claim that the U.S has only itself to blame.  A smattering of U.S posters on the same forum are looking for this guy to do 60 years in the U.S prison system.  Chalk and cheese!

To get to this stage and the amount of time involved proves that it has been badly handled and should have been attended to better. ... 9/weekend7.weekend2

He sat in his girlfriend Tamsin's aunt's house in Crouch End, and he began to hack. He downloaded a program that searched for computers that used the Windows operating system, scanned addresses and pinpointed administrator user names that had no passwords. Basically, what Gary was looking for - and found time and again - were network administrators within high levels of the US government and military establishments who hadn't bothered to give themselves passwords. That's how he got in.

No passwords on a system for NATIONAL SECURITY.  An open door! ... ds_ruling_analysis/

McKinnon was told he'd face a sentence of between three and four years if he cooperated with the authorities and pleaded guilty against a possible eight to 10 years after a US trial. Play ball, McKinnon was told, and you'll get six to 12 months in a low-security prison in the US after which there were good prospects of repatriation and a total time behind bars of two years. Oppose us and you'll get eight to 10 years or more in a US high-security prison with the potential of just 15 per cent off for good behaviour.

NOW, they want 10 - 60 years!
Hacker fears 'UFO cover-up'  

In 2002, Gary McKinnon was arrested by the UK's national high-tech crime unit, after being accused of hacking into Nasa and the US military computer networks.
He says he spent two years looking for photographic evidence of alien spacecraft and advanced power technology.

America now wants to put him on trial, and if tried there he could face 60 years behind bars.

Banned from using the internet, Gary spoke to Click presenter Spencer Kelly to tell his side of the story, ahead of his extradition hearing on Wednesday, 10 May. You can read what he had to say here.

Spencer Kelly: Here's your list of charges: you hacked into the Army, the Navy, the Air Force, the Department of Defense, and Nasa, amongst other things. Why?

Gary McKinnon: I was in search of suppressed technology, laughingly referred to as UFO technology. I think it's the biggest kept secret in the world because of its comic value, but it's a very important thing.

Old-age pensioners can't pay their fuel bills, countries are invaded to award oil contracts to the West, and meanwhile secretive parts of the secret government are sitting on suppressed technology for free energy.

SK: How did you go about trying to find the stuff you were looking for in Nasa, in the Department of Defense?

GM: Unlike the press would have you believe, it wasn't very clever. I searched for blank passwords, I wrote a tiny Perl script that tied together other people's programs that search for blank passwords, so you could scan 65,000 machines in just over eight minutes.

SK: So you're saying that you found computers which had a high-ranking status, administrator status, which hadn't had their passwords set - they were still set to default?

GM: Yes, precisely.

SK: Were you the only hacker to make it past the slightly lower-than-expected lines of defence?

GM: Yes, exactly, there were no lines of defence. There was a permanent tenancy of foreign hackers. You could run a command when you were on the machine that showed connections from all over the world, check the IP address to see if it was another military base or whatever, and it wasn't.

SK: Over what kind of period were you hacking into these computers? Was it a one-time only, or for the course of a week?

GM: Oh no, it was a couple of years.

SK: And you went unnoticed for a couple of years?

GM: Oh yes. I used to be careful about the hours.

SK: So you would log on in the middle of the night, say?

GM: Yes, I'd always be juggling different time zones. Doing it at night time there's hopefully not many people around. But there was one occasion when a network engineer saw me and actually questioned me and we actually talked to each other via WordPad, which was very, very strange.

SK: So what did he say? And what did you say?

GM: He said "What are you doing?" which was a bit shocking. I told him I was from Military Computer Security, which he fully believed.

SK: Did you find what you were looking for?

GM: Yes.

SK: Tell us about it.

GM: There was a group called the Disclosure Project. They published a book which had 400 expert witnesses ranging from civilian air traffic controllers, through military radar operators, right up to the chaps who were responsible for whether or not to launch nuclear missiles.
They are some very credible, relied upon people, all saying yes, there is UFO technology, there's anti-gravity, there's free energy, and it's extra-terrestrial in origin, and we've captured spacecraft and reverse-engineered it.

SK: What did you find inside Nasa?

GM: One of these people was a Nasa photographic expert, and she said that in building eight of Johnson Space Centre they regularly airbrushed out images of UFOs from the high-resolution satellite imaging. What she said was there was there: there were folders called "filtered" and "unfiltered", "processed" and "raw", something like that.

I got one picture out of the folder, and bearing in mind this is a 56k dial-up, so a very slow internet connection, in dial-up days, using the remote control programme I turned the colour down to 4bit colour and the screen resolution really, really low, and even then the picture was still juddering as it came onto the screen.

But what came on to the screen was amazing. It was a culmination of all my efforts. It was a picture of something that definitely wasn't man-made.

It was above the Earth's hemisphere. It kind of looked like a satellite. It was cigar-shaped and had geodesic domes above, below, to the left, the right and both ends of it, and although it was a low-resolution picture it was very close up.

This thing was hanging in space, the earth's hemisphere visible below it, and no rivets, no seams, none of the stuff associated with normal man-made manufacturing.

SK: Is it possible this is an artist's impression?

GM: I don't know... For me, it was more than a coincidence. This woman has said: "This is what happens, in this building, in this space centre". I went into that building, that space centre, and saw exactly that.

SK: Do you have a copy of this? It came down to your machine.

GM: No, the graphical remote viewer works frame by frame. It's a Java application, so there's nothing to save on your hard drive, or at least if it is, only one frame at a time.

SK: So did you get the one frame?

GM: No.

SK: What happened?

GM: Once I was cut off, my picture just disappeared.

SK: You were actually cut off the time you were downloading the picture?

GM: Yes, I saw the guy's hand move across.

SK: You acknowledge that what you did was against the law, it was wrong, don't you?

GM: Unauthorised access is against the law and it is wrong.

SK: What do you think is a suitable punishment for someone who did what you did?

GM: Firstly, because of what I was looking for, I think I was morally correct. Even though I regret it now, I think the free energy technology should be publicly available.

I want to be tried in my own country, under the Computer Misuse Act, and I want evidence brought forward, or at least want the Americans to have to provide evidence in order to have to provide evidence in order to extradite me, because I know there is no evidence of damage.

It is not POSIBLE to cause $700,000 worth of damage by looking through harddrives. ... 9/weekend7.weekend2

"Once you're on the network, you can do a command called NetStat - Network Status - and it lists all the connections to that machine. There were hackers from Denmark, Italy, Germany, Turkey, Thailand ..."

"All on at once?" I ask. "You could see hackers from all over the world, snooping around, without the spaceniks or the military realising?"

"Every night," he says, "for the entire five to seven years I was doing this."

"Do you think they're still there? Are they still at it? Or have they been arrested, too?"

Gary says he doesn't know.

"What was the most exciting thing you saw?" I ask.

"I found a list of officers' names," he claims, "under the heading 'Non-Terrestrial Officers'."

How can the U.S government be so incompetent and want to take this out on a hacker.  After all he did not go into the computers to damage them. He was looking for info on UFOs.

The U.S is looking for a scapegoat for its own stupidity. How can National Security computers not have passwords.  If you leave a door open people will peek in.

Use magic tools Report

Rank: 6Rank: 6

Post time 2008-11-6 22:14:41 |Display all floors
Interesting story.

Seems like the Pentagon is very cheesed off about this particular hacker, perhaps even sending paid bloggers on an online mission to demand 60 years for something that should be rewarded.

My concern is that, once in a U.S. prison, he'll be dealt with in such a way that he won't be able to speak to anyone again.

What doesn't add up is why an extra-terrestial intelligence would waste its time on such nasty, spiteful bone-headed ignoramuses.

Use magic tools Report

Rank: 8Rank: 8

Post time 2008-11-6 22:45:35 |Display all floors
Originally posted by expatter at 11/5/2008 03:34 AM
China and America have been heard to mention that the other is trying to hack their computers and we would be surprised if they didn't try.  It is called spying.  You know, James Bond stuff and bee ...

fl1.f indlaw.c om/news.f df

Gary managed to break the first rule of hacking, never leave a trail back to you.  Not exactly seeing the Hacking Community rallying around him.

Honestly, this reminds me of the West German hacking case from back the late 1980's/early 1990's.

time.c om/time/magazine/article/0,9171,967260,00.h tml
China's Eccentric 'Uncle Laowai' from Chicago, IL

Use magic tools Report

You can't reply post until you log in Log in | register

Contact us:Tel: (86)010-84883548, Email:
Blog announcement:| We reserve the right, and you authorize us, to use content, including words, photos and videos, which you provide to our blog
platform, for non-profit purposes on China Daily media, comprising newspaper, website, iPad and other social media accounts.