|
BugTraq
Major hack attack on the U.S. Senate Jan 22 2004 05:25PM Richard M. Smith (rms computerbytesman com) (2 replies) Re: Major hack attack on the U.S. Senate Jan 23 2004 03:28PM Brian C. Lane (bcl brianlane com) (2 replies) Re: [work] Re: Major hack attack on the U.S. Senate Jan 24 2004 06:46PM opticfiber (opticfiber topsight net) (1 replies) Re: [work] Re: Major hack attack on the U.S. Senate Jan 24 2004 08:27PM Jonathan A. Zdziarski (jonathan nuclearelephant com) Re: Major hack attack on the U.S. Senate Jan 23 2004 08:59PM Kevin Reardon (Kevin Reardon oracle com) Re: Major hack attack on the U.S. Senate Jan 23 2004 03:29AM ~Kevin Davis³ (computerguy cfl rr com) (3 replies) Re: Major hack attack on the U.S. Senate Jan 23 2004 07:58PM Kirk Spencer (kspencer ngrl org) (1 replies) |
|
Privacy Statement |
> This was clearly not a "hack attack". The title and opening content of this
> article is quite intentionally misleading. The phrases "infiltration",
> "monitoring secret memos", "exploited computer glitch", "hack attack" are
> used. If you read the entire article you will find out the following:
>
> First, "A technician hired by the new judiciary chairman, Patrick Leahy,
> Democrat of Vermont, apparently made a mistake that allowed anyone to access
> newly created accounts on a Judiciary Committee server shared by both
> parties -- even though the accounts were supposed to restrict access only to
> those with the right password."
>
> Which means the Democrats screwed up setting up their own share point and
> allowed public access to it. There was no "computer glitch" which was
> "exploited". This was completely a human screw-up. And there was no
> hacking ("exploitation of a computer glitch") done by the Republicans.
> Unless you wish to call clicking on a share point configured with public
> access and opening it up "hacking".
AFAIK, "hacking" is legally defined in the USA as being unauthorized
access to computer resources. It doesn't matter if the resource was
adequately protected (or protected at all) in first place or not. If you
were not given permission to make use of that resource, you are
criminally liable.
--
Daniel C. Sobral
[ reply ]