SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Qualcomm-News Only
QCOM 172.29-2.2%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: EepOpp who started this subject7/8/2000 2:55:00 PM
From: Labrador  Read Replies (2) of 426
 
FBI probes attacks by hacker on Qualcomm


By Bruce V. Bigelow
UNION-TRIBUNE STAFF WRITER
July 7, 2000

The FBI is conducting a criminal investigation into a series of illegal hacker attacks on computer systems at Qualcomm, according to documents filed in San Diego federal court.

The electronic intrusions, which apparently penetrated Qualcomm's fire wall and other network defenses last fall, compromised several high-end "server" computers used to store proprietary information.

The alleged intruder, a graduate student in computer science at the University of Wisconsin, replaced several files on Qualcomm computers and inserted so-called "back doors" that enabled him to re-enter the system in more than one way.

The FBI raided the student's dormitory room at the university's main campus in Madison during final exams Dec. 9, seizing his computer.

Brian Mattmiller, a university spokesman, said yesterday that the student is no longer enrolled. The university awarded the student an undergraduate degree in mathematics in 1998. The spokesman declined to disclose any further information, saying it was classified as "a disciplinary case" and the student's privacy was protected under federal law.

No charges have been filed.

Agents recovered files from the student's computer documenting the electronic intrusions into Qualcomm from Oct. 12 through Dec. 9. The escapade was discovered Dec. 3.

The files also showed the student had compromised computer networks operated by NetOptions, a Los Angeles-based Internet service provider; CISNet of Youngstown, Ohio; and the TeX Users Group, a Massachusetts-based organization for computer users interested in text typesetting and font design.

In court documents filed June 28, authorities asked a federal judge to order CISNet to turn over subscriber information, user names, logs and other data to investigators.

Details concerning the extent of the intruder's foray into Qualcomm's network and the type of compromised information were not disclosed. Christine Trimble, a Qualcomm spokeswoman, said the company has no comment because the matter is being investigated.

The court filings noted, however, that the student "has demonstrated the ability to tamper with and destroy computer information."

Qualcomm often has been targeted by outlaw hackers, largely because of the company's expertise in developing software and other technologies to provide high-bandwidth Internet access for the next generation of wireless devices.

"I don't really know a whole lot about what happened," said a senior engineer at Qualcomm. "This kind of stuff goes on at a lot of places. It's getting kind of old, actually."

Notorious outlaw hacker Kevin Mitnick, who was released from federal prison in January, was suspected of similar break-ins at Qualcomm in 1994.

Federal authorities maintain that Mitnick cost high-technology companies and other institutions millions of dollars by stealing their software and altering computer information. Mitnick, who has been banned from using computers, recently sought federal approval to launch a media career.

Mitch Dembin, the federal prosecutor overseeing the investigation into the new intrusion, declined to comment.

Under computer crime statutes, federal investigations can be triggered if the estimated loss or damage exceeds $5,000. As a practical matter, however, the U.S. Attorney's Office in San Diego generally launches investigations when the potential damage is far more significant.

"Once they get inside and get at proprietary information, you can usually show there were significant losses," said Alan Paller, director of research at the SANS Institute. "There could be millions at stake."

The SANS Institute is a cooperative research and education organization for more than 96,000 system administrators, computer security professionals and network administrators.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext