Hacker Gets Hold of Top Secret U.S. Space Codes For Space Ships, Rockets, and Satellites

greenspun.com : LUSENET : Grassroots Information Coordination Center (GICC) : One Thread

Friday March 2 9:27 AM ET Hacker Gets Hold of Top Secret U.S. Space Codes

STOCKHOLM (Reuters) - An unidentified computer hacker has got hold of top secret U.S. computer system codes for guiding space ships, rockets and satellites, a lawyer in Sweden said Friday.

Computer experts raided the offices of an information technology company in Stockholm last month and found a copy of the source codes for the software program OS/COMET developed by U.S. firm Exigent Software Technology, Johan Starell, legal counsel for Exigent in Sweden, told Reuters.

A source code contains full details of how a software program works.

OS/COMET has been deployed by the U.S. Air Force on the NAVSTAR Global Positioning System (GPS) Colorado Springs Monitor Station, Exigent said in a statement in December.

The suspected source codes theft, carried out remotely over the Internet on Christmas Eve last year from the U.S. Naval Research Laboratory in Washington D.C., was detected on December 27.

The U.S. Federal Bureau of Investigation (FBI (news - web sites)) was put on the case. The trail led to Freebox.com, an Internet Web server run by the Swedish IT company Carbonide, Starell said.

``A stolen source code was found on their server but nothing indicates they had anything to do with getting it there,'' Starell told Reuters.

Analyses of the Carbonide server accessed by the hacker known only by the username ``LEEIF'' showed that the perpetrator had been able to hide his or her true identity by breaking into the account of a genuine Freebox.com client and using that person's Internet account.

``We couldn't get any further information about where it came from or find out if it had been copied and sent elsewhere,'' he said.

``Sweden seems like a closed chapter. We can't get any further here,'' he added.

The OS/COMET source code could be used by terrorists to disturb computer systems guiding various space programs or it could have been stolen in industrial espionage for commercial advantage, the Swedish tabloid Expressen reported. http://dailynews.yahoo.com/h/nm/20010302/tc/crime_space_dc_1.html

-- Carl Jenkins (somewherepress@aol.com), March 02, 2001


Navy investigating hacker attack, theft

By D. IAN HOPPER The Associated Press 3/2/01 4:13 PM

WASHINGTON (AP) -- Naval officials are investigating how hackers broke into a computer at a Navy research facility in Washington and stole the source codes to a missile guidance program, officials said Friday.

The Navy has been working with the FBI and police forces in Germany and other unnamed countries since Dec. 24, when officials believe the break-in occurred. An FBI spokesman downplayed the theft, saying the software stolen was unclassified.

"We are trying to see who's responsible," said Paul O'Donnell of the Naval Criminal Investigative Service. "This has led us to several foreign countries."

O'Donnell said the target was an unclassified computer.

FBI spokesman Chris Murray confirmed that the guidance system source codes -- the building blocks of a program -- had been stolen. Murray said that the target computer was at the Naval Research Laboratory in Washington.

Representatives of Exigent Software Technology, based in Melbourne, Fla., said Friday that they built the stolen program, called "OS/COMET." The Air Force has installed OS/COMET, which can also be used to guide satellites and spacecraft, to a Global Positioning Satellite system in Colorado Springs, Colo., according to Exigent.

O'Donnell confirmed that Exigent is also a subcontractor for the Navy.

Murray said the software was secret when it was first used in the 1980s, but is now sold commercially. He said the intruder only got about two-thirds of the source codes.

"It is not the intelligence disaster along the lines of Robert Hanssen," Murray said, referring to the FBI counterintelligence agent charged with spying for Russia.

In a statement, Exigent confirmed that only a portion of the program was taken, and that it was an older version of the software.

A spokesman for the German federal office for criminal affairs told The Associated Press that an investigation is underway there, and is in the hands of the state prosecutor's office in Kaiserslautern. The city is the home of several U.S. military installations, including Ramstein Air Force Base.

The Swedish newspaper Expressen, which first reported news of the break-in, said that the perpetrator is believed to have used a computer at Kaiserslautern University in Germany, as well as an account with Carbonide, a Swedish Internet service provider.

Carbonide chief executive Erik Wickbom told the AP that the company, based in Stockholm, has cooperated with authorities.

Also Friday, a congressional panel requested that 15 federal departments and agencies report how they are testing and protecting their computers from hacking attacks. The Defense Department was not included in the list.


On the Net: Naval Criminal Investigative Service: http://www.ncis.navy.mil

http://www.oregonlive.com/newsflash/index.ssf?/cgi- free/getstory_ssf.cgi?a0637_BC_Navy-Hacker&&news&newsflash-washington

-- Martin Thompson (mthom1927@aol.com), March 02, 2001.

Moderation questions? read the FAQ