Former prosecutor: UFO hack looked like terrorist attack
Investigative resources diverted in crucial weeks, months after Sept. 11
Computerworld - After the computer network at the Naval Weapons Station Earle in New Jersey was breached and crashed just a few weeks after the terrorist attacks of Sept. 11, 2001, investigators thought it might be part of a larger al-Qaeda plot against the United States.
Investigators worked around the clock to figure out who had been in and out of the system that runs the weapons station for about five months, stealing passwords, installing remote access software, deleting data and ultimately shutting down the network of 300 computers for an entire week. That weeklong shutdown meant that for that period of time -- in the aftermath of attacks on the U.S. -- the station couldn't do its job of replenishing munitions and supplies to the Atlantic fleet.
Was the break-in organized by a nation-state? A terrorist group? After throwing critical resources at the probe when the government was already investigating not only the 9/11 attacks but the anthrax killings, investigators didn't track the breach to al-Qaeda. They tracked it to an unemployed system administrator in the U.K. -- Gary McKinnon, who was subsequently charged with hacking into 92 computer systems at the U.S. Army, the U.S. Air Force, the Department of Defense and NASA.
It has been seven years since the break-ins and about six since the charges were leveled against McKinnon, 42, of London, Since then, he has been fighting extradition to the U.S., but just last week the highest British court dismissed his latest appeal against the extradition.
McKinnon, who has said he broke into U.S. military computers hoping to uncover evidence of UFOs, plans to appeal the decision to the European Court of Human Rights. According to his attorney, Karen Todner, it's the last appeal he can file.
A resource drain at the worst time
Scott Christie , who at the time was an assistant U.S. attorney in New Jersey, was the first prosecutor brought into the case. Christie, who now leads the information technology group at law firm McCarter & English LLP, said McKinnon simply is "grasping at straws" with his latest appeal.
"I think it reinforces the fact that arguments against extradition had no merit and that he is continuing to avoid the inevitable," said Christie, who worked with investigators from the Naval Criminal Investigative Service on the case. "It is a very significant intrusion case, because it reinforces the fact that a lone individual who is motivated can cause significant damage to the military preparedness of this country. It showed unfortunately that security on computers at military installations was not as robust as it should have been.... If that's in fact true, it gives one concern as to what organized groups with sophisticated hacking tools who may be sponsored by organized crime or foreign governments could achieve in this area."
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts