Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Pacifist Hacker "was looking for evidence of UFOs"
Muswell Hill Journal ^ | June 8, 2005 | nlnews@archant.co.uk

Posted on 06/09/2005 3:31:44 AM PDT by Cincinatus' Wife

A Wood Green man accused of being the "world's biggest computer hacker" caused $700,000 dollars worth of damage after hacking his way into 97 of the US Government's most secure computers, a court heard.

Unemployed engineer Gary McKinnon allegedly used software available on the internet to break into systems at the at the Pentagon, NASA, US Army, US Navy and US Air force.

The US Army Military District of Washington network had to be shut down at one stage amid fears the hacking was the work of the al-Qaeda terror network.

McKinnon claims he was searching for evidence that the US Government had covered up visits from aliens to Earth.

Bow Street Magistrates' Court heard that the 39-year-old, of Whittington Road, Wood Green, was arrested at 6.30am on June 7 by Scotland Yard's extradition squad and faces 20 charges of computer-related crimes.

If extradited and found guilty McKinnon - known on the internet as "Solo" - faces a maximum penalty of 70 years in prison.

The US first issued an indictment against him in 2002 and his solicitor, Karen Todner, claimed outside court that a decision was then taken "at the highest level" not to pursue the case any further.

She said the decision to revive the case by the US Government was politically motivated and that McKinnon was "very disappointed and surprised" to now be facing charges.

Janet Boston, for the US government, told the court: "Mr McKinnon accessed, without authorisation, some 97 US Government computers, and installed unauthorised software, including a program called Remotely Anywhere.

"That permitted him in effect to control completely the computers and it was installed in such a way that the fact this has happened could not be detected.

"This caused damage to the computers which were accessed by impairing the integrity and operation of programming systems.

"In one incident the US Army Military District of Washington network became inoperable.

"The actual cost of repairing all this damage was some $700,000."

McKinnon's barrister, Mohammed Khamisa, said his client had started a temporary computing job only yesterday.

District Judge Christopher Pratt granted McKinnon bail on condition that he lives at home, reports daily to police, provides a £5,000 security, does not apply for travel documents and does not use any computer equipment affording access to the internet.

McKinnon's full extradition hearing is due to take place at the same court on July 27.

Mrs Todner said afterwards: "He has an interest in UFOs and that was certainly part of his motivation. He believes there are UFOs and that the US Government knew about this and had been concealing it.

"He also wanted to expose weaknesses in the American security systems because he is a pacifist and has strong feelings in relation to that.

"Gary McKinnon and his family are very disappointed and surprised that it has taken the authorities here four years since the allegations were first made against him to bring this matter to court.

"This request for his extradition is driven by the American Government.

"Mr McKinnon intends to contest the extradition most vigorously. Of particular concern to him is the treatment of other British nationals under the American justice system, which inspires little confidence.

"We believe that as a British national he should be tried here in our courts by a British jury and not in the US.


TOPICS: Crime/Corruption; Front Page News; Government; News/Current Events; United Kingdom; War on Terror
KEYWORDS: garymckinnon; hacker; khamisa; mohammedkhamisa; nasa; nationalsecurity; remotelyanywhere; securitybreaches; solo; ufo
Navigation: use the links below to view more comments.
first 1-2021-38 next last
Earlier thread: 'Military computer hacker' faces extradition to US***……..Part of the indictment said he hacked into a US army computer at Fort Myer, Virginia, obtained administrator privileges and transmitted codes, information and commands before deleting around 1,300 user accounts.

It was alleged he also "deleted critical system files" on the computer, copied a file containing usernames and encrypted passwords for the computer, and installed tools to gain unauthorised acess to other machines.

Further allegations include that he modified US navy and air force computers and copied other files. In New Jersey, he was accused of hacking into a network of 300 computers at the Earle naval weapons station in Colts Neck and stealing 950 passwords.

Because of the alleged break-in, which occurred immediately after the September 11 2001 terrorist attacks on New York and Washington, the whole system was effectively shut down for a week, officials said……***

1 posted on 06/09/2005 3:31:44 AM PDT by Cincinatus' Wife
[ Post Reply | Private Reply | View Replies]

To: Cincinatus' Wife

The article says he used programs available on the internet to hack the computers. I know such programs exist but I thought they were low level. Either there's some serious material available on the internet or the govt. computers had zero protection.


2 posted on 06/09/2005 3:37:37 AM PDT by Arkie2 (No, I never voted for Bill Clinton. I don't plan on voting Republican again!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife

Under the Constitution (which incorporates British Common Law as of 1789,) the jurisdiction for prosecution of a crime is the location of the criminal when the crime was committed, not the location of the effects of the crime. Were it otherwise, China would have every right under the US Constitution to extradite anyone who broke its laws with respect to what may and may not be published on the internet (as just one example.)


3 posted on 06/09/2005 3:37:43 AM PDT by sourcery ("Compelling State Interest" is the refuge of judicial activist traitors against the Constitution)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife

What would the Navy weapon's locker in New Jersey have to do with UFO's? I'm sure his barrister has a logical explanation...


4 posted on 06/09/2005 3:37:55 AM PDT by ABG(anybody but Gore) (I don't hate anybody, except the French....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife

Punish him accordingly, but those who sold and ran the computer systems must also be accountable.


5 posted on 06/09/2005 3:41:39 AM PDT by SteveMcKing
[ Post Reply | Private Reply | To 1 | View Replies]

To: BurbankKarl; lainie; Petronski; oceanperch; Ernest_at_the_Beach; agitator

"McKinnon claims he was searching for evidence that the US Government had covered up visits from aliens to Earth."

Words fail me Ping.


6 posted on 06/09/2005 3:45:07 AM PDT by bd476
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife
after hacking his way into 97 of the US Government's most secure computers

If they are the "most secure", why were they hacked?

7 posted on 06/09/2005 3:49:47 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ABG(anybody but Gore)

No kidding!

Pull the other one.


8 posted on 06/09/2005 3:50:13 AM PDT by Cincinatus' Wife
[ Post Reply | Private Reply | To 4 | View Replies]

To: bd476

Hey Good to see ya back!


9 posted on 06/09/2005 3:51:19 AM PDT by oceanperch (A perfect sunny and cool day on the Oregon Coast!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Cincinatus' Wife
McKinnon's barrister, Mohammed Khamisa, said his client had started a temporary computing job

Hrmmm... I wonder what the background is of this "barrister" ... And is it possible that McKinnon's information could be valuable to others in terms of "HOWTO" ?
10 posted on 06/09/2005 3:55:01 AM PDT by pyx (Rule #1. The LEFT lies. Rule #2. See Rule #1.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pyx

Interesting, no?


11 posted on 06/09/2005 3:56:19 AM PDT by Cincinatus' Wife
[ Post Reply | Private Reply | To 10 | View Replies]

To: Cincinatus' Wife
A Wood Green man accused of being the "world's biggest computer hacker"

Well?  No wonder he was looking for UFOs.  He simply wanted to catch a ride back home to his own planet ruled by Wood Green men.

12 posted on 06/09/2005 3:56:35 AM PDT by DH
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife
This guy is a traitor and a wannnnabe terrorist without any cajones. Lock his ass up after closing his hands in the door by mistake a couple of times. Give him a roommate who likes other guys.
13 posted on 06/09/2005 3:58:54 AM PDT by rodguy911 (Time to get rid of the UN and the ACLU)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife
Interesting, yes.
14 posted on 06/09/2005 3:59:45 AM PDT by pyx (Rule #1. The LEFT lies. Rule #2. See Rule #1.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Cincinatus' Wife
He also wanted to expose weaknesses in the American security systems because he is a pacifist and has strong feelings in relation to that.

This sentence makes no sense. Maybe his lawyer, Mohammed Abu Jihad Ibn Al Qaida could explain.

15 posted on 06/09/2005 4:03:45 AM PDT by SIDENET ("You knew the job was dangerous when you took it, Fred.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cincinatus' Wife
Hmmm... a lawyer named Mohammed and a crime done just after 9-11...

Is "pacifist" the new code for a dhimmi who submits?

16 posted on 06/09/2005 4:05:45 AM PDT by niteowl77 (I see seven senators badly in need of emergency RINOplasty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne
If they are the "most secure", why were they hacked?
My exact thoughts too. It's either lousy reporting or even worse security.
17 posted on 06/09/2005 4:12:30 AM PDT by oh8eleven
[ Post Reply | Private Reply | To 7 | View Replies]

To: Cincinatus' Wife
..."The actual cost of repairing all this damage was some $700,000."...

Repairing? More than likely it's for implementing security measures that should have been in place beforehand.

18 posted on 06/09/2005 4:28:03 AM PDT by FReepaholic (When I read about the evils of drinking, I gave up reading)
[ Post Reply | Private Reply | To 1 | View Replies]

To: oh8eleven; Izzy Dunne

The question is not why but how. The answer is, as any computer security expert will tell you, there is no such thing as a hacker proof system that is connected to a network. Difficult and time consuming yes, impossible, no.


19 posted on 06/09/2005 6:05:33 AM PDT by Personal Responsibility (Why is it that the wackiest people get to define reality?)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Arkie2

"The article says he used programs available on the internet to hack the computers. I know such programs exist but I thought they were low level. Either there's some serious material available on the internet or the govt. computers had zero protection."

He used a remote control program that is legal. He had to exploit a Microsoft security defect to get into the computer first.


20 posted on 06/09/2005 6:12:20 AM PDT by dljordan
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-38 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson