British man charged with hacking U.S. military networks

NEW YORK Mon Oct 28, 2013 3:24pm EDT

Related Topics

NEW YORK (Reuters) - A British man has been arrested in England and charged by the United States and Britain with hacking into U.S. government computer systems, including those run by the military, to steal confidential data and disrupt operations, authorities said.

Lauri Love and three co-conspirators allegedly infiltrated thousands of systems including those of the Pentagon's Missile Defense Agency, the U.S. Army Corps of Engineers, the U.S. space agency NASA and the U.S. Environmental Protection Agency, according to a U.S. grand jury indictment made public on Monday.

Love, 28, and the unnamed co-conspirators, including two in Australia and one in Sweden, then left "back doors" in the networks to later retrieve data, and intended that their activity "disrupt the operations and infrastructure of the United States government," according to the indictment.

"Such conduct endangers the security of our country and is an affront to those who serve," U.S. Attorney Paul Fishman in New Jersey, who announced the charges, said in a statement.

Love was charged in Britain with violating the Computer Misuse Act, and charged in the United States with accessing a U.S. government computer without permission and conspiracy, authorities said.

Fishman said the hacking took place from October 2012 until this month. He said it compromised personal data of U.S. military personnel, and information on defense budgets, contract bidding, and the demolition and disposal of military facilities, and caused millions of dollars of losses.

The arrest comes as authorities worldwide coordinate efforts to combat cybercrime. On October 10, U.S. Defense Secretary Chuck Hagel issued a memorandum emphasizing a need to safeguard even unclassified technical data against cyber intrusions to help protect U.S. military superiority.

"The cyber threat presents a significant risk to national security and military operations," Pentagon spokesman Lieutenant Colonel Damien Pickart said. "We take this threat seriously and work diligently to prevent future intrusions."

CHAT ROOMS

Love lives in the Suffolk village of Stradishall, about 70 miles northeast of London. He was arrested at his home on October 25 by the cybercrime unit of Britain's National Crime Agency and other officials, authorities said. He has been released on bail until February 2014, an NCA spokeswoman said.

U.S. prosecutors said the scheme by Love and his co-conspirators involved the installation of malware in the hacked systems, creating "shells" and "back doors" that allowed them to return later to steal data.

The indictment described how Love, who was also known as "nsh" and "route" and "peace," at times allegedly used internet chat rooms to discuss the hacking and efforts to conceal it.

In an October 2012 conversation described in the indictment, Love discussed the hacking of an Army Corps database that might have yielded 400,000 email addresses, and asked a co-conspirator to "grab one email for curiosity."

Nine months later, in July 2013, he appeared to boast about accessing a NASA database, telling another co-conspirator "ahaha, we owning lots of nasa sites," the indictment said.

Later that month, he told the same co-conspirator after another hacking: "This ... stuff is really sensitive. ... It's basically every piece of information you'd need to do full identity theft on any employee or contractor for the (agency)," according to the indictment.

Prosecutors said hacked systems were located in places including Vicksburg, Mississippi, and the U.S. Army's Aberdeen Proving Ground in Maryland, and also included a server containing information about military personnel at Fort Monmouth in New Jersey.

Love faces up to five years in prison and a fine on each U.S. criminal count. Prosecutors said he faces additional charges in federal court in Alexandria, Virginia, stemming from other unspecified "intrusions."

The cases are U.S. v. Love, U.S. District Court, District of New Jersey; and U.S. v. Love, U.S. District Court, Eastern District of Virginia, No. 13-mj-00657.

(Additional reporting by Andrea Shalal-Esa in Washington; Editing by Will Dunham)

FILED UNDER:
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (8)
Bhanwara wrote:
“U.S. prosecutors said that between October 2012 and October 2013, Love and co-conspirators placed hidden “shells” or “back doors” within the hacked networks,”

Will these “US authorities” be charging the NSA as well?

Oct 28, 2013 10:26am EDT  --  Report as abuse
Wana-B wrote:
And…..
so, How does it feel ???

Oct 28, 2013 10:33am EDT  --  Report as abuse
WhyMeLord wrote:
Well NSA, how does it feel to have someone else playing your game?
While we’re busy looking into other people’s business, we leave our doors open for others to come and go as they please and walk off with our “precious secrets”. LOL OMG, when are we going to learn that we’re not the only parinoid country with a ‘peeping-tom’ mentality?
In my opinion, justice has been served, and KARMA still rules the land.

Oct 28, 2013 10:39am EDT  --  Report as abuse
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.