ITEM ONE
US Navy malware infection risked submarine prang
Disgruntled contractor donned black hat after losing business
By Lewis Page → More by this author
Published Wednesday 18th April 2007 09:46 GMT
Like this story? Receive others like it in your inbox
An American contractor holding top-level security clearance has been convicted of sabotaging critical US Navy computers used for submarine traffic control.
Richard F Sylvestre, from Massachusetts, installed malware on a computer network at the Italian HQ of the US 6th Fleet, America's standing taskforce in the Mediterranean.
He later told investigators that he was upset after his company Ares Systems, which he then owned, had failed to win important naval business.
"If we can't trust people with top-security clearance, where are we?" lamented District Judge Rebecca B Smith when sentencing Sylvestre. Perhaps ironically, the hearing took place earlier this month at Norfolk, Virginia, one of the US Navy's biggest bases. Events were reported by the Virginian Pilot.
The computer network in question was used to track and record the actual and planned movements of US and allied submarines. A nuclear submarine proceeding at high speed underwater has very little ability to avoid collisions, as its sonar is typically blinded by the flow of water over its hull. Thus, it is normal practice for submarines to deconflict their journeys using a central traffic control system in which details of planned movements are stored. It was a system of this type that Sylvestre attacked.
The contractor turned saboteur apparently only intended to bring the system down, rather than extract highly-classified sub movements data from it. According to reports, he successfully crippled three machines of a possible five. Had all five succumbed "the Navy would have been blind", according to the prosecution.
Rear Admiral Jeffrey L Fowler, second in command of the 6th Fleet, broadly supported this position in a letter to the judge. The admiral wrote that malware infections in the systems at issue impaired "the ability of submarines to prevent collisions, and could result in loss of life". He also said that extra security procedures had been implemented since the incident.
After being nabbed by naval investigators, Sylvestre folded easily and pleaded guilty to a single count of damaging protected computers. That could have got him as much as 10 years in the federal pen, but his attorneys submitted a wide range of mitigating testimony. Sylvestre paid the Navy $25,000 towards repairs before appearing in court, and a psychiatrist said he suffered from depression and bipolar disorder. This might put the trick-cyclist concerned in dispute with the vetters who gave Sylvestre his clearance in the first place, assuming the testimony wasn't mere renta-psych court manoeuvring.
Perhaps most tellingly of all, the errant techie's sister also testified on his behalf. Ms Nancy Rapaport stated that if she had been asked to choose between aliens landing or her brother copping a felony rap, she would have assessed the alien arrival as the more likely event. There was no word on Ms Rapaport's overall opinion on the likelihood of an alien landing in the near future.
Sylvestre was sentenced to 12 to 18 months in federal prison and fined $10,000
ITEM TWO
Disgruntled techie attempts Californian power blackout
Counter-terror feds swoop after data centre sabotage
By Lewis Page → More by this author
Published Friday 20th April 2007 14:12 GMT
Receive the days biggest stories by email
A cheesed-off American IT worker was seized by an FBI Joint Terrorism Task Force on Wednesday for attacking the Californian electric power grid.
Lonnie Charles Denison, of Sacramento, allegedly meddled with computers at the California Independent System Operator (ISO) agency. He is also accused of making a malicious bomb threat against the organisation. ISO controls the state's power transmission lines and runs its energy trading markets.
According to the feds, Denison became upset last week after a dispute with his employer, Science Applications International. Science Applications provides IT services to ISO.
Denison first attempted a remote attack against the ISO data centre on Sunday, but this was unsuccessful. He then reverted to simpler means, and entered the facility physically using his security card key late on Sunday night. Once inside, he smashed the glass plate covering an emergency power cut-off, shutting down much of the data centre through the early hours of Monday morning. This denied ISO access to the energy trading market, but didn't affect the transmission grid directly. Nor did his emailed bomb threat, delivered later on Monday, though it did lead to the ISO offices being evacuated and control passed to a different facility.
However, the feds reckon that if Denison had carried out his data-centre attack during normal business hours, "electric consumers in the Western United States would have experienced disruptions in their electrical supply". After arresting Denison they slapped him with a felony rap, destruction of an energy facility. The disgruntled techie, if found guilty, could be looking at the wrong end of a maximum five-year stretch, or perhaps a $5,000 fine.
This case could be another sign that America's terrorist threats can come from within as well as from beyond its borders. Denison is the second American IT worker to appear before federal beaks in recent days for sabotaging key US computers, joining Richard F Sylvestre.
Sylvestre's vandalism could have resulted in a nuclear-submarine collision and landed him in the jug for a decade, but in the end he got sent away for just 12 to 18 months. Denison could get off relatively lightly too, if he receives similar treatment.
It'll be interesting to compare the two Americans' cases with that of Gary McKinnon, the UFO-fancying Scottish hacker currently being extradited by the US to face trial for a string of computer intrusions some years ago. He doesn't seem to have threatened any power blackouts or sub wrecks, though he is accused of causing $700k-worth of damage to various US-government systems. America has hinted that he won't be treated as a terrorist, however.
Based on Sylvestre's short sentence and Denison's worst-case five years, McKinnon might not be compelled to enjoy the feds' hospitality for all that long a time – assuming that US justice is consistent.
ITEM THREE
'Pentagon hacker' wants to see Bush's John Hancock
Nothing less will do
By Mark Ballard → More by this author
Published Wednesday 15th February 2006 21:46 GMT
Research library - All papers free to download.
Alleged Pentagon Hacker Gary McKinnon was told in court today that the US Embassy would write a letter to help him avoid the full wrath of presidential anti-terror laws, if he were extradited for prosecution.
McKinnon (aka Solo) was facing extradition proceedings in Bow Street Magistrates Court this morning so that he could be tried in US courts for allegedly hacking into 97 US military and NASA computers, disabling the Washington computer network, and leaving a message that read: "US foreign policy is akin to government sponsored terrorism these days... I am SOLO. I will continue to disrupt at the highest levels".
The case was adjourned until March 14.
Karen Todner, representing McKinnon for Kaim Todner Solicitors, told El Reg that without the president's signature, the letter would be worthless, because only the president could waive a privileged presidential power.
Todner fears that an extradition without presidential assurances to the contrary, could see Solo face solitary confinement in Guantanemo Bay or 30 years imprisonment under the president's special powers, Military Commission Order #1.
If McKinnon's extradition is refused, he could still face up to three years in prison under the Misuse of Computers Act.
The prosecution has stated that he is not being treated as a terrorist, but has also made their case on his intention to "endanger the public safety" by "causing harm to the US government".
Todner said the prosecution had promised a "diplomatic note" from the US Embassy providing the assurances she wanted.
"We say that's not sufficient because the only person who can decide is the president, so it must come from the president himself," she said.
The case was adjourned while the court awaits the conclusion of another extradition case - that of the three former NatWest investment bankers who are up for extradition over an alleged Enron-linked fraud.
The defences in all cases are arguing that the extradition treaty between the US and UK is lopsided because the US has not signed up to its obligations, but is expecting full co-operation in its turn.
The US Embassy refused to comment
US Navy malware infection risked submarine prang
Disgruntled contractor donned black hat after losing business
By Lewis Page → More by this author
Published Wednesday 18th April 2007 09:46 GMT
Like this story? Receive others like it in your inbox
An American contractor holding top-level security clearance has been convicted of sabotaging critical US Navy computers used for submarine traffic control.
Richard F Sylvestre, from Massachusetts, installed malware on a computer network at the Italian HQ of the US 6th Fleet, America's standing taskforce in the Mediterranean.
He later told investigators that he was upset after his company Ares Systems, which he then owned, had failed to win important naval business.
"If we can't trust people with top-security clearance, where are we?" lamented District Judge Rebecca B Smith when sentencing Sylvestre. Perhaps ironically, the hearing took place earlier this month at Norfolk, Virginia, one of the US Navy's biggest bases. Events were reported by the Virginian Pilot.
The computer network in question was used to track and record the actual and planned movements of US and allied submarines. A nuclear submarine proceeding at high speed underwater has very little ability to avoid collisions, as its sonar is typically blinded by the flow of water over its hull. Thus, it is normal practice for submarines to deconflict their journeys using a central traffic control system in which details of planned movements are stored. It was a system of this type that Sylvestre attacked.
The contractor turned saboteur apparently only intended to bring the system down, rather than extract highly-classified sub movements data from it. According to reports, he successfully crippled three machines of a possible five. Had all five succumbed "the Navy would have been blind", according to the prosecution.
Rear Admiral Jeffrey L Fowler, second in command of the 6th Fleet, broadly supported this position in a letter to the judge. The admiral wrote that malware infections in the systems at issue impaired "the ability of submarines to prevent collisions, and could result in loss of life". He also said that extra security procedures had been implemented since the incident.
After being nabbed by naval investigators, Sylvestre folded easily and pleaded guilty to a single count of damaging protected computers. That could have got him as much as 10 years in the federal pen, but his attorneys submitted a wide range of mitigating testimony. Sylvestre paid the Navy $25,000 towards repairs before appearing in court, and a psychiatrist said he suffered from depression and bipolar disorder. This might put the trick-cyclist concerned in dispute with the vetters who gave Sylvestre his clearance in the first place, assuming the testimony wasn't mere renta-psych court manoeuvring.
Perhaps most tellingly of all, the errant techie's sister also testified on his behalf. Ms Nancy Rapaport stated that if she had been asked to choose between aliens landing or her brother copping a felony rap, she would have assessed the alien arrival as the more likely event. There was no word on Ms Rapaport's overall opinion on the likelihood of an alien landing in the near future.
Sylvestre was sentenced to 12 to 18 months in federal prison and fined $10,000
ITEM TWO
Disgruntled techie attempts Californian power blackout
Counter-terror feds swoop after data centre sabotage
By Lewis Page → More by this author
Published Friday 20th April 2007 14:12 GMT
Receive the days biggest stories by email
A cheesed-off American IT worker was seized by an FBI Joint Terrorism Task Force on Wednesday for attacking the Californian electric power grid.
Lonnie Charles Denison, of Sacramento, allegedly meddled with computers at the California Independent System Operator (ISO) agency. He is also accused of making a malicious bomb threat against the organisation. ISO controls the state's power transmission lines and runs its energy trading markets.
According to the feds, Denison became upset last week after a dispute with his employer, Science Applications International. Science Applications provides IT services to ISO.
Denison first attempted a remote attack against the ISO data centre on Sunday, but this was unsuccessful. He then reverted to simpler means, and entered the facility physically using his security card key late on Sunday night. Once inside, he smashed the glass plate covering an emergency power cut-off, shutting down much of the data centre through the early hours of Monday morning. This denied ISO access to the energy trading market, but didn't affect the transmission grid directly. Nor did his emailed bomb threat, delivered later on Monday, though it did lead to the ISO offices being evacuated and control passed to a different facility.
However, the feds reckon that if Denison had carried out his data-centre attack during normal business hours, "electric consumers in the Western United States would have experienced disruptions in their electrical supply". After arresting Denison they slapped him with a felony rap, destruction of an energy facility. The disgruntled techie, if found guilty, could be looking at the wrong end of a maximum five-year stretch, or perhaps a $5,000 fine.
This case could be another sign that America's terrorist threats can come from within as well as from beyond its borders. Denison is the second American IT worker to appear before federal beaks in recent days for sabotaging key US computers, joining Richard F Sylvestre.
Sylvestre's vandalism could have resulted in a nuclear-submarine collision and landed him in the jug for a decade, but in the end he got sent away for just 12 to 18 months. Denison could get off relatively lightly too, if he receives similar treatment.
It'll be interesting to compare the two Americans' cases with that of Gary McKinnon, the UFO-fancying Scottish hacker currently being extradited by the US to face trial for a string of computer intrusions some years ago. He doesn't seem to have threatened any power blackouts or sub wrecks, though he is accused of causing $700k-worth of damage to various US-government systems. America has hinted that he won't be treated as a terrorist, however.
Based on Sylvestre's short sentence and Denison's worst-case five years, McKinnon might not be compelled to enjoy the feds' hospitality for all that long a time – assuming that US justice is consistent.
ITEM THREE
'Pentagon hacker' wants to see Bush's John Hancock
Nothing less will do
By Mark Ballard → More by this author
Published Wednesday 15th February 2006 21:46 GMT
Research library - All papers free to download.
Alleged Pentagon Hacker Gary McKinnon was told in court today that the US Embassy would write a letter to help him avoid the full wrath of presidential anti-terror laws, if he were extradited for prosecution.
McKinnon (aka Solo) was facing extradition proceedings in Bow Street Magistrates Court this morning so that he could be tried in US courts for allegedly hacking into 97 US military and NASA computers, disabling the Washington computer network, and leaving a message that read: "US foreign policy is akin to government sponsored terrorism these days... I am SOLO. I will continue to disrupt at the highest levels".
The case was adjourned until March 14.
Karen Todner, representing McKinnon for Kaim Todner Solicitors, told El Reg that without the president's signature, the letter would be worthless, because only the president could waive a privileged presidential power.
Todner fears that an extradition without presidential assurances to the contrary, could see Solo face solitary confinement in Guantanemo Bay or 30 years imprisonment under the president's special powers, Military Commission Order #1.
If McKinnon's extradition is refused, he could still face up to three years in prison under the Misuse of Computers Act.
The prosecution has stated that he is not being treated as a terrorist, but has also made their case on his intention to "endanger the public safety" by "causing harm to the US government".
Todner said the prosecution had promised a "diplomatic note" from the US Embassy providing the assurances she wanted.
"We say that's not sufficient because the only person who can decide is the president, so it must come from the president himself," she said.
The case was adjourned while the court awaits the conclusion of another extradition case - that of the three former NatWest investment bankers who are up for extradition over an alleged Enron-linked fraud.
The defences in all cases are arguing that the extradition treaty between the US and UK is lopsided because the US has not signed up to its obligations, but is expecting full co-operation in its turn.
The US Embassy refused to comment