<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d13691723\x26blogName\x3daryveron\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://tyazmanians.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://tyazmanians.blogspot.com/\x26vt\x3d8987670759279455026', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
      

Thursday, July 28, 2005

UK hacker fights US extradition

A UK man described as the 'world's biggest hacker' appeared in court today to fight an attempt to extradite him to the US to face charges of hacking military computers.
Gary McKinnon, 39, allegedly broke into 97 US government computers causing $700,000 worth of damage. Among the charges, he is accused of deleting system files and logs at a US Navy base, leaving its 300 plus computers inoperable.
Lawyer for the US Government, Mark Summers, said the hacking was 'intentional and calculated to influence and affect the US government by intimidation and coercion'.
McKinnon left a note on one computer, criticising US foreign policy as 'akin to government sponsored terrorism' and pledging to continue his campaign of disruption. Following his arrest he admitted that his ultimate goal was to access the military's classified information network. He later told The Guardian that he hacked the computers to prove that the US had evidence of UFOs
Having gained access to the computers, he installed remote access and admin software that allowed him to subsequently control the machines undetected.
'He effectively owned those computers,' said Summers.
Simon Aughton

0 Comments:

Post a Comment

<< Home