Information Security News mailing list archives

Navy investigating hacker attack, theft


From: InfoSec News <isn () C4I ORG>
Date: Mon, 5 Mar 2001 01:19:27 -0600

Forwarded by: Thomas Roy Garner <trgarner () yta attmil ne jp>

Navy investigating hacker attack, theft
March 2, 2001

WASHINGTON (AP) -- Naval officials are investigating how hackers broke
into a computer at a Navy research facility in Washington and stole
the source codes to a missile guidance program, officials said Friday.

The Navy has been working with the FBI and police forces in Germany
and other unnamed countries since December 24, when officials believe
the break-in occurred. An FBI spokesman downplayed the theft, saying
the software stolen was unclassified.

"We are trying to see who's responsible," said Paul O'Donnell of the
Naval Criminal Investigative Service. "This has led us to several
foreign countries."

O'Donnell said the target was an unclassified computer.

FBI spokesman Chris Murray confirmed that the guidance system source
codes -- the building blocks of a program -- had been stolen. Murray
said that the target computer was at the Naval Research Laboratory in
Washington.

Exigent Software built stolen program

Representatives of Exigent Software Technology, based in Melbourne,
Florida, said Friday that they built the stolen program, called
"OS/COMET." The Air Force has installed OS/COMET, which can also be
used to guide satellites and spacecraft, to a Global Positioning
Satellite system in Colorado Springs, Colorado, according to Exigent.

O'Donnell confirmed that Exigent is also a subcontractor for the Navy.

Murray said the software was secret when it was first used in the
1980s, but is now sold commercially. He said the intruder only got
about two-thirds of the source codes.

"It is not the intelligence disaster along the lines of Robert
Hanssen," Murray said, referring to the FBI counterintelligence agent
charged with spying for Russia.

Investigation underway

A spokesman for the German federal office for criminal affairs told
The Associated Press that an investigation is underway there, and is
in the hands of the state prosecutor's office in Kaiserslautern. The
city is the home of several U.S. military installations, including
Ramstein Air Force Base.

The Swedish newspaper Expressen, which first reported news of the
break-in, said that the perpetrator is believed to have used a
computer at Kaiserslautern University in Germany, as well as an
account with Carbonide, a Swedish Internet service provider.

Carbonide chief executive Erik Wickbom told the AP that the company,
based in Stockholm, has cooperated with authorities.

Also Friday, a congressional panel requested that 15 federal
departments and agencies report how they are testing and protecting
their computers from hacking attacks.

The Defense Department was not included in the list.


--
Thomas Roy Garner
Yokota Air Base, Japan
ICQ 4580576

ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV () SecurityFocus com with a message body of
"SIGNOFF ISN".


Current thread: