1998-05-10 - Re: U.S. Navy caught hacking into British marine charity Web site

Header Data

From: Spam the President <president@whitehouse.gov>
To: cypherpunks@toad.com
Message Hash: 54101178c23fa6b61b8366271e26289b8cd8e2da6fab5399cf7e795d9b9a8096
Message ID: <3554E2BF.5C3E2646@whitehouse.gov>
Reply To: N/A
UTC Datetime: 1998-05-10 00:11:32 UTC
Raw Date: Sat, 9 May 1998 17:11:32 -0700 (PDT)

Raw message

From: Spam the President <president@whitehouse.gov>
Date: Sat, 9 May 1998 17:11:32 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: U.S. Navy caught hacking into British marine charity Web site
Message-ID: <3554E2BF.5C3E2646@whitehouse.gov>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 9 May 1998, Bill Frantz wrote:

> At 4:48 AM -0800 5/9/98, Spam the President wrote:
> >http://www.infoworld.com/cgi-bin/displayStory.pl?98058.winavy.htm
> >
> >  U.S. Navy caught hacking
> >  into British marine
> >  charity Web site
> >
> >  By Kristi Essick
> >  InfoWorld Electric
> >
> >  Posted at 3:07 PM PT, May 8, 1998
> >  ...
> >
> >  "I think whoever it was within the U.S. Navy
> >  facility would have better things to do rather than
> >  try and hack into our computers," said Chris
> >  Stroud, the organization's director of campaigns,
> >  in a statement. "If they were seeking reports on
> >  the Black Sea, we shall be freely publishing these
> >  in the near future anyway."
>
> Consider the possibility that someone hacked into the Navy's computer and
> then used it as a base to hack the Marine Mammal Charity site.
>
> -------------------------------------------------------------------------
> Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
> (408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
> frantz@netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA

It wouldn't make any sense. Why would a hacker use a military
site that is actively monitored to hack into a site with less security?

And why the requests to get the document originating from the same
source?

Also, from what I have read, the DoD needs come first in everything,
especially Defence Security related issues. No holds barred when they
want something.

This sounds exactly like the kind of information that they would 
want and consider essential, and could thus justify themselves to
get it by any means available. 

Of course, if this was a hacker playing tricks to the US military,
then I'm sure we can expect the military will publish this serious
a security breach, in order to get more money to protect themselves
against any Internet terrorist attacks in the future.

But I bet there will be no public comments or explanation given.
-----
pentagon-gw-e0.nci.net (198.253.200.2)
donhq-gw.nci.net (198.253.203.11)  
donhqns1.hq.navy.mil (164.224.250.80) 

Trying 164.224.250.80...
Connected to 164.224.250.80.
Escape character is '^]'.
    W A R N I N G     W A R N I N G     W A R N I N G     W A R N I N G

    USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
                    CONSENT TO MONITORING AT ALL TIMES

This is a Department of Navy (DON) interest computer system.  All DON
interest
computer systems and related equipment are intended for the
communication,
transmission, processing, and storage of official U.S. Government or
other
authorized information only.  All DON interest computer systems are
subject
to  monitoring at all times to ensure proper functioning of equipment
and
systems including security devices and systems, to prevent unauthorized
use
and violations of statutes and security regulations, to deter criminal
activity, and for other similar purposes.  Any user of a DON interest
computer
system should be aware that any information placed in the system is
subject
to monitoring and is not subject to any expectation of privacy.

If monitoring of this or any other DON interest computer system reveals
possible evidence of violation of criminal statutes, this evidence and
any
other related information, including identification information about
the
user, may be provided to law enforcement officials.

If monitoring of this or any other DON interest computer system reveals
violations of security regulations or unauthorized use, employees who
violate
security regulations or make unauthorized use of DON interest computer
systems are subject to appropriate disciplinary action.

    USE OF THIS OR ANY OTHER DOD INTEREST COMPUTER SYSTEM CONSTITUTES A
                    CONSENT TO MONITORING AT ALL TIMES

    W A R N I N G     W A R N I N G     W A R N I N G     W A R N I N G

Username:





Thread