Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

bananas

(27,509 posts)
Wed May 7, 2014, 04:23 PM May 2014

Nuclear reactor sysadmin accused of hacking 220,000 US Navy sailors' details

Source: The Register

A former US Navy sysadmin who worked in an aircraft carrier's nuclear reactor department has been charged with hacking into government networks using the USN's own computers.

Prosecutors have alleged that Nicholas Paul Knight, 27, of Chantilly, Virginia, and his co-accused, 20-year-old Daniel Trenton of Salem, Illinois, were leading members of a blackhat group called Team Digi7al.

<snip>

Prosecutors said: "Knight called himself a 'nuclear black hat' who fought for the people of the United States, not the government."

<snip>

Their alleged targets include the USN's Navy-SWM database, containing private information about 220,000 USN sailors; the United States National Geospatial-Intelligence Agency, which provides mapping information to the military, and Los Alamos National Laboratory, the government-run institution which built the atomic bombs dropped on Hiroshima and Nagasaki at the end of World War Two.

Naval tech bods had to spend $514,000 to fix the problems caused by Team Digi7al's hack into the Navy's systems and even had to set up a call centre to help sailors who were affected by the attack.

<snip>

Read more: http://www.theregister.co.uk/2014/05/07/us_navy_sysadmin_accused_of_hacking_220k_sailors_details/

6 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Nuclear reactor sysadmin accused of hacking 220,000 US Navy sailors' details (Original Post) bananas May 2014 OP
If the NSA does it and it's OK... Helen Borg May 2014 #1
I was wondering who would be the first Blue_Tires May 2014 #2
Uh...they scanned for security holes. If the holes had been fixed like they should have been in the jtuck004 May 2014 #3
Back in October, US officials revealed that hackers ... bananas May 2014 #5
So, when patches and anti-virus software aren't enough... jtuck004 May 2014 #6
Expect to see this on an episode of NCIS shortly. nt Hekate May 2014 #4

Blue_Tires

(55,445 posts)
2. I was wondering who would be the first
Wed May 7, 2014, 04:59 PM
May 2014

to voice support for these two... And it came in the first reply -- Congratulations...

 

jtuck004

(15,882 posts)
3. Uh...they scanned for security holes. If the holes had been fixed like they should have been in the
Wed May 7, 2014, 06:52 PM
May 2014

first place, they would have had no success. The tools to scan them are used frequently by Navy computer security people (they are some of the best network security people in the world, btw - which isn't that comforting here) so why weren't they used first by the good guys? Those tools are used everywhere else. Well, except for Target, perhaps.


...
"Naval tech bods had to spend $514,000 to fix the problems caused by Team Digi7al's hack into the Navy's systems and even had to set up a call centre to help sailors who were affected by the attack.

Prosecutors said many of the hacks followed the same pattern. First, a team member scanned websites for security holes, taking "a particular interest in hacking government websites including military, educational, intelligence, homeland security and critical infrastructure"."
...


So they would have left these holes open for others if it hadn't been for this? nu-uh, This is money they should have spent before this ever happened.

They should also take a look at the continued employment of anyone that was responsible for these systems, and if they left the holes open or didn't apply patches properly, fire them. And maybe charge them with negligence.

But obtaining and sharing info...that is a whole 'nother category.





bananas

(27,509 posts)
5. Back in October, US officials revealed that hackers ...
Wed May 7, 2014, 07:06 PM
May 2014

Check out the last two paragraphs of this story:

http://www.itproportal.com/2014/05/07/nuclear-reactor-admin-arrested-for-running-anti-government-hacking-ring/

Nuclear reactor admin arrested for running anti-government hacking ring
07 May 2014 by Paul Cooper

A US Navy systems administrator has been arrested on charges of acting as the ringleader of an anti-government hacking group.

<snip>

Back in October, US officials revealed that hackers either working for or on behalf of the Iranian government had infiltrated the largest internal computer network in the world, the The Navy and Marine Corps Intranet (NMCI).

Days later, an Iranian cyber commander was found dead in the city of Karaj.

 

jtuck004

(15,882 posts)
6. So, when patches and anti-virus software aren't enough...
Wed May 7, 2014, 09:53 PM
May 2014

"It's also possible that an assassination of such a senior cyber defence specialist could be designed to reduce Iran's ability to defend itself against cyber-attacks like the Stuxnet worm that was unleashed on its nuclear centrifuges and discovered in 2010.

Read more: http://www.itproportal.com/2013/10/03/iranian-cyber-commander-found-dead-days-after-us-navy-hack/#ixzz315JDJfaU
"

A lot of countries would benefit from that, in their little games. Wish we could direct all that talent to figuring out how to quit screwing up the climate, or ending hunger, or getting rid of banksters, or something.


Latest Discussions»Latest Breaking News»Nuclear reactor sysadmin ...