-Caveat Lector-

Hackers steal military source code

http://www.vnunet.com/News/1119140

15 Mar 2001

US government contractor Exigent Software Technology has admitted that
unidentified hackers broke into a restricted military computer system and
stole the source codes controlling satellite and missile guidance systems.
Hackers got away with two thirds of the code when the target computer at
the Naval Research Lab in Washington was attacked on Christmas Eve. The
military detected the break-in three days later.

The theft was made public when Swedish police searched the servers of
internet service provider Carbonide on suspicion that hackers used the
company's Freebox Web email service to distribute the code to others.

Carbonide chief executive Eric Wickborn said: "We didn't know it was there,
and we didn't know it was source code. Immediately after the search we
deleted the code." He added that law enforcement officials could fit the
data onto a single floppy disk.

Wickborn said that although the hacker used the name 'Leeif' on the system,
the account was stolen. Carbonide was able to trace the attack on its
network to a server at the University of Kaiserslautern in Germany.

The German federal office for criminal affairs said that an investigation
is underway. Kaiserslautern is home to several US military installations,
including Ramstein Air Force Base.

Exigent developed the OS/Comet program for the US Air Force which uses it
on the Navstar Global Positioning System at the Colorado Springs Monitor
Station, part of the Air Force Space Command.

The FBI downplayed the attack, however, saying the software was
unclassified. Spokesman Chris Murray said the code was secret when first
used but is now available commercially.

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to