It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by vonspurter
If Gary McKinnon really did uncover something - you would never have heard his name, let alone his case.
Using Remotely Anywhere to access random IP addresses (alocated to US Mil institutes - open to anyone to find) in the hope of discovering a Windows Server to try and log into? Hardly hacking is it? Any joker can do that. Having a blank admin password should have the sysadmin sacked however.
Because of my first line, I think this is a non event - I don't care what happens to him - he's just a kid messing about - he found nothing.
Frankly, if a computer belonging to any Government unit has extremely sensitive information on it - do you think it would be connected directly to the internet? Firewalled or otherwise? Of course it wouldn't. Do you think a NASA server with proof of alien life JPEG'S on it requires to update the Yahoo Weather every 5 minutes?
Hackers can try as hard as they like - they'll get nowhere without physical access. McKinnon is an idiot. Hackers shouldn't make a stand for him, he's just someone who can use a mouse and with his destructive mentality, given the capability he'd probably be writing viruses 24/7.
[edit on 15/10/09 by vonspurter]
Originally posted by Detailed Perfection
That is until, and you quoted it yourself directly, "Analysis of the appellant’s home computer confirmed these allegations", because with the proof to back up the allegations, they became Evidence to be presented in a court of law.
And as far as your claim that "the U.S. has not even been required to provide such evidence" is a false statement. They contacted the proper UK authorities with their findings from their investigation, the "allegations". That UK authority investigated those "allegations" and they found the evidence to prove the allegations as Fact. Once they became fact, they became Evidence, that WILL be presented to the Judge in a court of law.
Hearing dates: 9, 10 June 2009; 14 July 2009 Approved Judgment
Originally posted by Majiq
First of all I would like to say that I would love to join this guys fan-club because I truly do believe in his cause. NASA, and the U.S. Government have many secrets that the people should know about, and I applaud him for having the guts to go after that truth.
That being said, now I have to state my opinions which will have the doors to his fan-club forever slammed in my face.
Originally posted by fromunclexcommunicate
reply to post by Merriman Weir
I'm wondering just how the extradition will effect the prospects for a fair trial as well. Will there be an extravition of british witnesses and evidence? How will the jurors be selected?
Originally posted by StinkyFeet
This guy has pulled out all the stops to get sympathy from people, so he won't have to face his just desserts. He pulls out the sympathy card more than Jessie Jackson and Rev. Al Sharpton pull out the race card.
If he didn't want his butt tossed in prison maybe he shouldn't have been haking our computers. DUH!
The appellant’s alleged criminality
11. Using his home computer the appellant, through the internet, identified US Government network computers with an open Microsoft Windows connection and from those extracted the identities of certain administrative accounts and associated passwords. Having gained access to those accounts he installed unauthorised remote access and administrative software called "remotely anywhere" that enabled him to access and alter data upon the American computers at any time and without detection by virtue of the programme masquerading as a Windows operating system. Once "remotely anywhere" was installed, he then installed software facilitating both further compromises to the computers and also the concealment of his own activities. Using this software he was able to scan over 73,000 US Government computers for other computers and networks susceptible to similar compromise. He was thus able to lever himself from network to network and into a number of significant Government computers in different parts of the USA.
12. The 97 computers the appellant accessed were: 53 army computers, including computers based in Virginia and Washington that control the army's military district of Washington network and are used in furtherance of national defence and security; 26 navy computers, including US Naval Weapons Station Earle, New Jersey, which was responsible for replenishing munitions and supplies for the deployed Atlantic fleet; 16 NASA computers; one Department of Defense computer; and one US Air Force computer.
13. Having gained access to these computers the appellant deleted data from them including critical operating system files from nine computers, the deletion of which shut down the entire US Army's Military District of Washington network of over 2000 computers for 24 hours, significantly disrupting
Draft 31 July 2009 09:48 Page 3
Judgment Approved by the court for handing down. McKinnon v Home Secretary
Governmental functions; 2,455 user accounts on a US Army computer that controlled access to an Army computer network, causing these computers to reboot and become inoperable; and logs from computers at US Naval Weapons Station Earle, one of which was used for monitoring the identity, location, physical condition, staffing and battle readiness of Navy ships, deletion of these files rendering the Base's entire network of over 300 computers inoperable at a critical time immediately following 11 September 2001 and thereafter leaving the network vulnerable to other intruders.
14. The appellant also copied data and files onto his own computers, including operating system files containing account names and encrypted passwords from 22 computers comprising: 189 files from US Army computers, 35 files from US Navy computers (including some 950 passwords from server computers at Naval Weapons Station Earle); and six files from NASA computers.
15. The appellant's conduct was alleged to be intentional and calculated to influence the US Government by intimidation and coercion. It damaged computers by impairing their integrity, availability and operation of programmes, systems, information and data, rendering them unreliable. The cost of repair was alleged to total over $700,000.
16. Analysis of the appellant's home computer confirmed these allegations. During his interviews under caution, moreover, he admitted responsibility (although not that he had actually caused damage). He stated that his targets were high level US Army, Navy and Air Force computers and that his ultimate goal was to gain access to the US military classified information network. He admitted leaving a note on one army computer reading:
“US foreign policy is akin to government-sponsored terrorism these days . . . It was not a mistake that there was a huge security stand down on September 11 last year . . . I am SOLO. I will continue to disrupt at the highest levels . . .[\quote]
link
* Note the bold, and your asking that he should be considred as a freedom of information fighter. Sorry we have other plans. Welcome to the U.S.
[edit on 16-10-2009 by tristar]
Originally posted by tristar
Obviously people are either afraid or simply skipping through the post...
Originally posted by Malcram
Originally posted by tristar
Obviously people are either afraid or simply skipping through the post...
Not really. Those are the allegation of the U.S. Govt, made in order to meet the criteria for extradition.
An allegation is not a fact, especially when it comes from the U.S. Govt. and is made to achieve a desired goal.
WMD's anyone?
[edit on 16-10-2009 by Malcram]
Originally posted by tristar
If you have read the transcript you will and have or will have understood his acknowledgment into accessing an authorized area. Is this that difficult for the U.K. or who ever is an advocate to understand .
Hypothetical Scenario: how would you feel if you woke only to hear / read / viral news , find out that we have been there done that long before ?