Feeds

US Navy malware infection risked submarine prang

Disgruntled contractor donned black hat after losing business

Choosing a cloud hosting partner with confidence

An American contractor holding top-level security clearance has been convicted of sabotaging critical US Navy computers used for submarine traffic control.

Richard F Sylvestre, from Massachusetts, installed malware on a computer network at the Italian HQ of the US 6th Fleet, America's standing taskforce in the Mediterranean.

He later told investigators that he was upset after his company Ares Systems, which he then owned, had failed to win important naval business.

"If we can't trust people with top-security clearance, where are we?" lamented District Judge Rebecca B Smith when sentencing Sylvestre. Perhaps ironically, the hearing took place earlier this month at Norfolk, Virginia, one of the US Navy's biggest bases. Events were reported by the Virginian Pilot.

The computer network in question was used to track and record the actual and planned movements of US and allied submarines. A nuclear submarine proceeding at high speed underwater has very little ability to avoid collisions, as its sonar is typically blinded by the flow of water over its hull. Thus, it is normal practice for submarines to deconflict their journeys using a central traffic control system in which details of planned movements are stored. It was a system of this type that Sylvestre attacked.

The contractor turned saboteur apparently only intended to bring the system down, rather than extract highly-classified sub movements data from it. According to reports, he successfully crippled three machines of a possible five. Had all five succumbed "the Navy would have been blind", according to the prosecution.

Rear Admiral Jeffrey L Fowler, second in command of the 6th Fleet, broadly supported this position in a letter to the judge. The admiral wrote that malware infections in the systems at issue impaired "the ability of submarines to prevent collisions, and could result in loss of life". He also said that extra security procedures had been implemented since the incident.

After being nabbed by naval investigators, Sylvestre folded easily and pleaded guilty to a single count of damaging protected computers. That could have got him as much as 10 years in the federal pen, but his attorneys submitted a wide range of mitigating testimony. Sylvestre paid the Navy $25,000 towards repairs before appearing in court, and a psychiatrist said he suffered from depression and bipolar disorder. This might put the trick-cyclist concerned in dispute with the vetters who gave Sylvestre his clearance in the first place, assuming the testimony wasn't mere renta-psych court manoeuvring.

Perhaps most tellingly of all, the errant techie's sister also testified on his behalf. Ms Nancy Rapaport stated that if she had been asked to choose between aliens landing or her brother copping a felony rap, she would have assessed the alien arrival as the more likely event. There was no word on Ms Rapaport's overall opinion on the likelihood of an alien landing in the near future.

Sylvestre was sentenced to 12 to 18 months in federal prison and fined $10,000. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.