'Computer genius' jailed for hacking Pentagon

Powered by SC Magazine
 

A Californian man was sentenced to four months in prison for hacking into the computer systems of federal agencies and defacing websites in April 2002.

21-year-old Robert Lyttle, who was known as half of "The Deceptive Duo," unlawfully accessed computer systems of various federal agencies in April 2002, including the Department of Defense's Defense Logistic Information Service (DLIS) and Office of Health Affairs (OHA) and the National Aeronautic and Space Administration's (NASA) Ames Research Center (ARC).

Speaking in court, Tony Serra, Lyttle's attorney said the defendant was a "computer genius" who misguidedly believed he was helping the government by exposing vulnerabilities in its systems. The prosecutor likened Lyttle to a burglar breaking into a home.

U.S. District Court Judge D. Lowell Jensen handed down the sentence following a guilty plea on five counts of unauthorized access to government computers. As well as the four month prison sentence, Lyttle will also have to spend a further four months electronically tagged in home confinement and pay $71,181 in restitution. He will also undergo a three year period of supervised release. The defendant will begin serving his sentence on August 24, 2005.

Last week, Spanish police arrested a 26-year-old engineer in connection with hacking security mechanisms in software applications. The arrest in Galicia followed a nine-month investigation by the Brigada de Investigacion Tecnologica de la policia nacional (BIT).

www.usdoj.gov/usao/can/

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote