-Caveat Lector- Hackers steal military source code http://www.vnunet.com/News/1119140 15 Mar 2001 US government contractor Exigent Software Technology has admitted that unidentified hackers broke into a restricted military computer system and stole the source codes controlling satellite and missile guidance systems. Hackers got away with two thirds of the code when the target computer at the Naval Research Lab in Washington was attacked on Christmas Eve. The military detected the break-in three days later. The theft was made public when Swedish police searched the servers of internet service provider Carbonide on suspicion that hackers used the company's Freebox Web email service to distribute the code to others. Carbonide chief executive Eric Wickborn said: "We didn't know it was there, and we didn't know it was source code. Immediately after the search we deleted the code." He added that law enforcement officials could fit the data onto a single floppy disk. Wickborn said that although the hacker used the name 'Leeif' on the system, the account was stolen. Carbonide was able to trace the attack on its network to a server at the University of Kaiserslautern in Germany. The German federal office for criminal affairs said that an investigation is underway. Kaiserslautern is home to several US military installations, including Ramstein Air Force Base. Exigent developed the OS/Comet program for the US Air Force which uses it on the Navstar Global Positioning System at the Colorado Springs Monitor Station, part of the Air Force Space Command. The FBI downplayed the attack, however, saying the software was unclassified. Spokesman Chris Murray said the code was secret when first used but is now available commercially. <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om