Feeds

Intel 'hacker' clears his name

12 year fight ends in victory for 'white hat' password cracker

Secure remote control for conventional and virtual desktops

A former Intel contractor has succeeded in crushing charges that he hacked into the chip giant's systems after a legal fight that lasted over a decade.

The conviction against Randal L. Schwartz was "set aside" at the beginning of February by an Oregon court, clearing his name after 12 years.

Schwartz had worked as a security consultant at the Intel Supercomputer Systems Division but left under something of a cloud, News.com reports.

Rather ill-advisedly, the Perl-programming guru (who's written several books on the subject) tried to prove his worth by running a password cracking package after he'd left in order to produce evidence that security practices had deteriorated since his departure. Instead of re-hiring Schwartz, as he hoped, Intel called in the police and he was charged with hacking offences.

Schwartz was convicted of three counts of computer hacking in late 1995, sentenced to five years probation, and a 480 hour community service order. He was also ordered to pay Intel a fine of $68,000, as well as being obliged to stump up $170,000 in defence costs. Following an appeal, the restitution order was dropped in 2001 but the court declined to quash the conviction, which it sent back to the lower court to be re-examined.

The lower court agreed to expunge this conviction last month (PDF) in a legal move that means Schwartz is no longer saddled with a criminal record, a status that's affected his ability to travel or work normally for more than a decade.

More background on the case can be found on the Friends of Randal Schwartz website. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.