Originally posted by Mailman
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Reply to: Gary McKinnon
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "Gary McKinnon"
Collapse
-
Originally posted by DimPrawn View PostNot to be confused with http://upthegary.org.uk/
Leave a comment:
-
Originally posted by ace00 View Post
Further info : http://freegary.org.uk/
Leave a comment:
-
Originally posted by DimPrawn View PostIn my mind it is similar to leaving a £300K Ferrari outside your house with the doors slightly ajar and the keys on the seat and then crying foul when someone jumps in and takes it for a spin.
The US IT staff should be the ones facing a trial.
Anyone in networks can see this is a frame up by the IT bods at DoD.
He did commit an offence, but the reaction is entirely OTT.
Further info : http://freegary.org.uk/
Leave a comment:
-
Originally posted by ace00 View PostThat's the whole point this guy is no Hacker.
FFS My current gig pays this external company ten grand per intrusion test - it's like one days work, if that. I've told them what I think of this, but they persist in paying anyway.
Leave a comment:
-
In my mind it is similar to leaving a £300K Ferrari outside your house with the doors slightly ajar and the keys on the seat and then crying foul when someone jumps in and takes it for a spin.
The US IT staff should be the ones facing a trial.
Leave a comment:
-
Originally posted by DodgyAgent View PostHe's going to earn a fortune testing and designing security systems and hacking into computers of enemies of the US of A
That's the whole point this guy is no Hacker.
Leave a comment:
-
Originally posted by ace00 View PostFYI, here's most of the original inditement:
"Assistant U.S. Attorney Scott S. Christie.
The seven-count Virginia Indictment charges McKinnon for intrusions into 92 computer systems belonging to the U.S. Army, Navy, Air Force, Department of Defense and NASA. As a result of the intrusions into the U.S. military networks, McKinnon rendered the network for the Military District of Washington inoperable. McKinnon is also charged in the Virginia indictment with intrusions into two computers located at the Pentagon. The Virginia Indictment also charges McKinnon for intrusions into six private companies’ networks. McKinnon is charged in Virginia with causing approximately $900,000 in damages to computers located in 14 states. ... Concerning the New Jersey charges, McKinnon’s series of computer network intrusions had a profound effect on Naval Weapons Station Earle’s (NWS Earle) ability to accomplish its mission in the immediate aftermath of the Sept. 11 terrorist attacks, according to U.S. Attorney Christie. The entire network of 300 computers at NWS Earle, located in Colts Neck, N.J., was effectively shut down for an entire week, according to military officials at NWS Earle. For another three weeks afterward, military personnel and government civilian employees at NWSE were only able to send and receive internal e-mail. It was only approximately a month after McKinnon’s last intrusion into the network that NWS Earle was able to automatically route Naval message traffic and access the Internet, according to military officials at NWS Earle. This was a grave intrusion into a vital military computer system at a time when we, as a nation, had to summon all of our defenses against further attack, Christie said. McKinnon faces a maximum penalty of five years in federal prison and a $250,000 fine. Efforts are under way to extradite McKinnon from the United Kingdom to stand trial on the charge, said U.S. Attorney Christie. The NWS Earle is a command of the U.S. Navy responsible for replenishing munitions and supplies for the Atlantic fleet. To assist in carrying out its mission, NWS Earle maintains and operates a network of approximately 300 computers in Colts Neck for the use of its military personnel and government civilian employees. The Indictment charges that on April 7, 2001, McKinnon hacked into the NWS Earle computer network through the Port Services computer, the primary computer used by NWS Earle for monitoring the identity, location, physical condition, staffing, battle readiness and resupply of Navy ships in and near the NWS Earle Pier Complex. At that time, he is alleged to have installed the software program RemotelyAnywhere on the Port Services computer and on other computers connected to the NWS Earle network. RemotelyAnywhere is a commercially available software program that allows an individual to remotely control a computer from any other computer via an Internet connection. The Indictment further charges that during the period of June 18, 2001 through June 21, 2001, McKinnon obtained unauthorized access to the Port Services computer on several occasions via an Internet connection and, through use of the previously-installed RemotelyAnywhere software, stole approximately 950 passwords stored on server computers connected to the NWS Earle network.
In addition, the Indictment charges that on Sept. 23, 2001, McKinnon again broke into the NWS Earle computer network by accessing the previously-installed RemotelyAnywhere software and using the stolen passwords. During this intrusion into the network, McKinnon allegedly caused approximately $290,431 in damage to NWS Earle by deleting computer files needed to power up some of the computers on the network, deleting computer logs that documented his intrusion into the network, and compromising the security of the network by leaving it vulnerable to him and other intruders via the RemotelyAnywhere software
-------------------------------------------------------
Highlighted some of the specific technical charges.
Seems to me to be a grossly disproportianate response from the authorities.
Perhaps they would do better to focus on getting a network admin, or you know maybe a firewall or something crazy like that?
He's going to earn a fortune testing and designing security systems and hacking into computers of enemies of the US of A
Leave a comment:
-
Gary McKinnon
FYI, here's most of the original inditement:
"Assistant U.S. Attorney Scott S. Christie.
The seven-count Virginia Indictment charges McKinnon for intrusions into 92 computer systems belonging to the U.S. Army, Navy, Air Force, Department of Defense and NASA. As a result of the intrusions into the U.S. military networks, McKinnon rendered the network for the Military District of Washington inoperable. McKinnon is also charged in the Virginia indictment with intrusions into two computers located at the Pentagon. The Virginia Indictment also charges McKinnon for intrusions into six private companies’ networks. McKinnon is charged in Virginia with causing approximately $900,000 in damages to computers located in 14 states. ... Concerning the New Jersey charges, McKinnon’s series of computer network intrusions had a profound effect on Naval Weapons Station Earle’s (NWS Earle) ability to accomplish its mission in the immediate aftermath of the Sept. 11 terrorist attacks, according to U.S. Attorney Christie. The entire network of 300 computers at NWS Earle, located in Colts Neck, N.J., was effectively shut down for an entire week, according to military officials at NWS Earle. For another three weeks afterward, military personnel and government civilian employees at NWSE were only able to send and receive internal e-mail. It was only approximately a month after McKinnon’s last intrusion into the network that NWS Earle was able to automatically route Naval message traffic and access the Internet, according to military officials at NWS Earle. This was a grave intrusion into a vital military computer system at a time when we, as a nation, had to summon all of our defenses against further attack, Christie said. McKinnon faces a maximum penalty of five years in federal prison and a $250,000 fine. Efforts are under way to extradite McKinnon from the United Kingdom to stand trial on the charge, said U.S. Attorney Christie. The NWS Earle is a command of the U.S. Navy responsible for replenishing munitions and supplies for the Atlantic fleet. To assist in carrying out its mission, NWS Earle maintains and operates a network of approximately 300 computers in Colts Neck for the use of its military personnel and government civilian employees. The Indictment charges that on April 7, 2001, McKinnon hacked into the NWS Earle computer network through the Port Services computer, the primary computer used by NWS Earle for monitoring the identity, location, physical condition, staffing, battle readiness and resupply of Navy ships in and near the NWS Earle Pier Complex. At that time, he is alleged to have installed the software program RemotelyAnywhere on the Port Services computer and on other computers connected to the NWS Earle network. RemotelyAnywhere is a commercially available software program that allows an individual to remotely control a computer from any other computer via an Internet connection. The Indictment further charges that during the period of June 18, 2001 through June 21, 2001, McKinnon obtained unauthorized access to the Port Services computer on several occasions via an Internet connection and, through use of the previously-installed RemotelyAnywhere software, stole approximately 950 passwords stored on server computers connected to the NWS Earle network.
In addition, the Indictment charges that on Sept. 23, 2001, McKinnon again broke into the NWS Earle computer network by accessing the previously-installed RemotelyAnywhere software and using the stolen passwords. During this intrusion into the network, McKinnon allegedly caused approximately $290,431 in damage to NWS Earle by deleting computer files needed to power up some of the computers on the network, deleting computer logs that documented his intrusion into the network, and compromising the security of the network by leaving it vulnerable to him and other intruders via the RemotelyAnywhere software
-------------------------------------------------------
Highlighted some of the specific technical charges.
Seems to me to be a grossly disproportianate response from the authorities.
Perhaps they would do better to focus on getting a network admin, or you know maybe a firewall or something crazy like that?Tags: None
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Secondary NI threshold sinking to £5,000: a limited company director’s explainer Dec 24 09:51
- Reeves sets Spring Statement 2025 for March 26th Dec 23 09:18
- Spot the hidden contractor Dec 20 10:43
- Accounting for Contractors Dec 19 15:30
- Chartered Accountants with MarchMutual Dec 19 15:05
- Chartered Accountants with March Mutual Dec 19 15:05
- Chartered Accountants Dec 19 15:05
- Unfairly barred from contracting? Petrofac just paid the price Dec 19 09:43
- An IR35 case law look back: contractor must-knows for 2025-26 Dec 18 09:30
- A contractor’s Autumn Budget financial review Dec 17 10:59
Leave a comment: