TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

U.S. Army Soldier Arrested in AT&T, Verizon Extortions

289 点作者 mmsc4 个月前

17 条评论

perihelions4 个月前
Additional comments here,<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42251799">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42251799</a> (<i>&quot;Hacker in Snowflake extortions may be a U.S. soldier (krebsonsecurity.com)&quot;</i>; 34 days ago, 195 comments)
评论 #42558247 未加载
jcpham24 个月前
“Law Enforcement wants to put you in jail for a very long time”<p>The CFAA[1][2] is an arcane and ancient piece of legislation that could use an overhaul, especially with some of the vague language it contains. A person would definitely want to make sure they are authorized prior to touching a computer or even data that may not have authorization for.<p>Unauthorized use of a computer is the easiest felony to commit accidentally it would seem. Although in this case I don’t think that’s a legitimate argument to be made. This person or persons knew they were committing crimes.<p>I’m not defending the hacker either, the quote at the end of the article rings true.<p>[1] <a href="https:&#x2F;&#x2F;www.justice.gov&#x2F;jm&#x2F;jm-9-48000-computer-fraud" rel="nofollow">https:&#x2F;&#x2F;www.justice.gov&#x2F;jm&#x2F;jm-9-48000-computer-fraud</a><p>[2] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Computer_Fraud_and_Abuse_Act" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Computer_Fraud_and_Abuse_Act</a>
评论 #42559070 未加载
评论 #42563614 未加载
评论 #42559874 未加载
mktemp-d4 个月前
Telegram users spinning up their own honeypots and blindly trusting a client&#x2F;server message encryption system is never not a great idea for new grass root criminal enterprises.
评论 #42559787 未加载
评论 #42557817 未加载
siva74 个月前
So what was his opsec mistake so that we can learn something from this case?
评论 #42558343 未加载
评论 #42557689 未加载
评论 #42558244 未加载
评论 #42557959 未加载
评论 #42558336 未加载
评论 #42558366 未加载
评论 #42557640 未加载
评论 #42559126 未加载
评论 #42557633 未加载
评论 #42558325 未加载
xyst4 个月前
So this person, “kiberphant0m”, was just a middleman to sell the data? At best, he is a skid and low level foot soldier.<p>Government using this to send a loud message to future skiddies - “don’t fuck with us”
smrtinsert4 个月前
“I know that young people involved in cybercrime will read these articles,” Nixon said. “You need to stop doing stupid shit and get a lawyer. Law enforcement wants to put all of you in prison for a long time.”<p>I think law enforcement types are just built differently. Fearless even when threats are being made against them.
评论 #42559783 未加载
MarkusWandel4 个月前
Curious: What happens to a military service member who does this? Punished within the military and then booted out (and with what kind of discharge?) Or booted out first (with what kind of discharge?) and then punished in the regular civilian system? Or possibly even retained in the military?
评论 #42558737 未加载
评论 #42558694 未加载
评论 #42558668 未加载
JohnnyLarue4 个月前
If this dink were Chinese, he&#x27;d be called a &quot;state-sponsored hacking group&quot;
chmod7754 个月前
Am I the only one who feels that Brian&#x27;s tendency to include lots of personal details (of suspects and people he doesn&#x27;t like) in his articles is weird and creepy?<p>His reporting looks more and more like the Daily Mail of cybersecurity.<p>Occasionally very good investigative journalism, yet always aggressively devoid of class.
评论 #42559612 未加载
评论 #42560588 未加载
评论 #42559715 未加载
评论 #42560163 未加载
评论 #42561101 未加载
评论 #42560722 未加载
评论 #42559749 未加载
评论 #42562975 未加载
评论 #42559836 未加载
fifteen15064 个月前
Thank god EU is going to take this in consideration next time ChatControl is being proposed.<p>&#x2F;s
评论 #42557993 未加载
c64d81744074dfa4 个月前
For some reason I find this kind of sad. This kid seems like a Dunning Kruger effect poster boy.<p>I mean, when I was younger I would have been gleeful about some bragging idiot getting busted but now, *shrug*, everyone just has some &quot;condition&quot;.
datavirtue4 个月前
That bold font needs to die in a fire.
profsummergig4 个月前
Here&#x27;s the tragedy: the free world actually needs people with his skills working on their side.
评论 #42558495 未加载
评论 #42558785 未加载
评论 #42558888 未加载
daghamm4 个月前
I first heard about this dude many months ago. Why did it take so long to bring him in? He was pretty open about who he is and what he is doing.
评论 #42557789 未加载
boomskats4 个月前
So does anyone know whether he did the full Cornholio impression when they arrested him?
9cb14c1ec04 个月前
So an army soldier who was clearly part of military intelligence services goes rogue and does some hacking on his own. I&#x27;ve always wondered what it would look like if an NSA-type went rogue. Now we know.
评论 #42560597 未加载
评论 #42558898 未加载
评论 #42558760 未加载
spooky7774 个月前
The recent arrest of a U.S. Army soldier accused of extorting AT&amp;T and Verizon highlights a troubling misallocation of resources by law enforcement, especially when juxtaposed against critical nation-state cyber threats. While prosecuting such crimes is necessary, it diverts attention from larger systemic vulnerabilities, such as the recent breach of the U.S. Treasury Department and nine major American telecommunications companies by Chinese state actors. These breaches granted access to sensitive communications and revealed the glaring weaknesses in American cybersecurity infrastructure. Corporations like AT&amp;T and Verizon, entrusted with protecting sensitive data, have often failed to implement robust defenses, leaving systems exposed to exploitation and forcing law enforcement into a reactive cleanup role.<p>This misdirected focus is particularly concerning given the escalating geopolitical tensions and the strategic importance of cybersecurity in national defense. Nation-state actors like China are leveraging advanced capabilities to outpace U.S. defenses, eroding trust in American institutions and diminishing global standing. With the potential for conflict over Taiwan and other critical flashpoints, resources spent on low-value cybercrime cases should instead fortify critical infrastructure and counter nation-state threats. A proactive approach is essential to prevent breaches, hold corporations accountable, and ensure the U.S. remains resilient in an increasingly volatile cyber landscape.