|
|
Department of Defense Crackdown on Security
|
| Monday, January 5, 2009 |
The first commander of the Department of Defense has ordered the operations of the network just a crackdown on security. According to a recent article by NetworkWorld on January 16.2006, Lieutenant General Charles Croom is quoted as saying: "The attacks come from everywhere and they are better." His speech was the opening speech at the Ministry of Cyber Defense Conference held on Crime January 9 - 14, 2005 in Clearwater, Florida. The event is sponsored by the Defense Cyber Crime Center and the Joint Task Force. More than 500 specialists in crime The FBI and the military attended the event. The crackdown is linked to a recent arrest of a "Computer Virus Broker" named Jeanson James Ancheta. The further investigation, the Department of Justice press release of November 3rd, 2005 offers the following information about this incident, " In the first prosecution of its kind in the nation, a well known member of the "botmaster underground" has been indicted on Federal Charges to benefit from the use of "botnets" - armies of computers that are under the control of the botmaster and are used to launch destructive attacks or send huge quantities of spam across the Internet. Jeanson James Ancheta, 20, Downey, California, was arrested this morning by special agents with the Federal Bureau of Investigation. Ancheta was indicted yesterday in two conspiracies, as well as charges of attempting to cause damage to protected computers, causing damage to computers used by the federal government in national defense, access to protected computers without the authorization to commit fraud and money laundering. " The press release goes on to describe details of the scheme which clearly show why the Ministry of Defense is concerned (for more information, go to: http://www.usdoj.gov/criminal/cybercrime/ anchetaArrest.htm) "Ancheta was an affiliate of several companies of advertising services, business and paid him a commission based on the number of facilities. To avoid detection by network administrators, security analysts and law enforcement, Ancheta could vary the download times and rates of the adware installations. When companies hosting Ancheta adware servers discovered the malicious activity, Ancheta redirected his botnet armies to a different server he controlled to pick up adware. To generate some $ 60,000 he received in advertising affiliate products, Ancheta caused the surreptitious installation of adware on approximately 400,000 compromised computers. Ancheta used the product of affiliate advertising he won to pay between other things, the large number of servers used to conduct its programs. Ancheta used programs powerful enough to cause infection of computers at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computers belonging to the Defense Information Systems Agency, a component of the U.S. Department Defense. Both networks are used exclusively by the federal government for national defense. After being arrested this morning at the FBI office in Los Angeles, Ancheta was transported to the United States District Court in Los Angeles. It is unclear if he made his first court appearance this afternoon or tomorrow. Ancheta is charged with two counts of conspiracy, two counts of attempted transmission of code to a protected computer, two counts of transmission of code to a government computer, five counts of protecting access to a computer to commit fraud and five counts of money laundering. Count 17 of the indictment seeks forfeiture of more than $ 60,000 in cash, a BMW automobile and computer equipment that the indictment are the proceeds and instrumentalities of Ancheta illegal activity. "
Some of the latest news. Ancheta pleaded guilty to conspiracy to violate anti-spam and abuse laws, and fraud and serve 4-6 years in prison under the plea agreement - plus heavy fines. |
posted by neptunus @ 2:03 AM
 |
|
|
|
|
Post a Comment