Department of Defense Crackdown on Security

The leading leader of the department of Defense network operations simply bought a crackdown on security. Over 500 computer system criminal activity professionals from the FBI and the military participated in the occasion.

The crackdown was connected to a current arrest of a “Computer Virus Broker” called Jeanson James Ancheta. On additional examination, a Department of Justice news release from Nov 3rd, 2005 provided the following details on this occurrence, “In the very first prosecution of its kind in the country, a popular member of the “botmaster underground” has actually been prosecuted on federal charges for benefiting from using “botnets” – armies of computer systems that are under the control of the botmaster and are utilized to release damaging attacks or to send out big amounts of spam throughout the Internet.

Jeanson James Ancheta, 20, of Downey, California, was apprehended today by unique representatives with the Federal Bureau of Investigation. Ancheta was arraigned the other day in 2 different conspiracies, in addition to substantive charges of trying to trigger damage to secured computer systems, triggering damage to computer systems utilized by the federal government in nationwide defense, accessing secured computer systems without permission to dedicate scams and cash laundering.”

Journalism release goes on to explain more information of this plan that plainly reveal why the Deparment of Defense is so worried (to find out more go to: http://www.usdoj.gov/criminal/cybercrime/anchetaArrest.htm )

When business hosting Ancheta’s adware servers found the destructive activity, Ancheta rerouted his botnet armies to a various server he managed to select up adware. To produce the approximately $60,000 he got in marketing affiliate earnings, Ancheta triggered the surreptitious setup of adware on around 400,000 jeopardized computer systems.

Ancheta utilized programs effective enough to trigger the infection of computer systems at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computer systems belonging to the Defense Information Systems Agency, an element of the United States Department of Defense. Ancheta is charged with 2 counts of conspiracy, 2 counts of tried transmission of code to a secured computer system, 2 counts of transmission of code to a federal government computer system, 5 counts of accessing a safeguarded computer system to dedicate scams and 5 counts of cash laundering. Count 17 of the indictment looks for the loss of more than $60,000 in money, a BMW car and computer system devices that the indictment declares are the profits and instrumentalities of Ancheta’s unlawful activity.”

Some current news. Ancheta pleaded guilty to charges of conspiring to breach anti-spam and computer system abuse laws, and scams and will serve from 4-6 years in jail, under the plea contract – plus heavy fines.

When business hosting Ancheta’s adware servers found the harmful activity, Ancheta rerouted his botnet armies to a various server he managed to choose up adware. To create the approximately $60,000 he got in marketing affiliate earnings, Ancheta triggered the surreptitious setup of adware on roughly 400,000 jeopardized computer systems. Ancheta utilized programs effective enough to trigger the infection of computer systems at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computer systems belonging to the Defense Information Systems Agency, a part of the United States Department of Defense. Ancheta is charged with 2 counts of conspiracy, 2 counts of tried transmission of code to a safeguarded computer system, 2 counts of transmission of code to a federal government computer system, 5 counts of accessing a secured computer system to dedicate scams and 5 counts of cash laundering.