Feeds

Sweden to prosecute alleged Cisco, NASA hacker

Stakkato's abrupt transfer

Secure remote control for conventional and virtual desktops

The prosecution of a Swedish man charged with breaching the computer networks of NASA and Cisco Systems and making off with sensitive source code will be transferred to Swedish authorities, US federal prosecutors said Monday.

Philip Gabriel Pettersson, aka "Stakkato," was indicted last May and accused of hacking into Cisco and stealing source code related to the company's widely used IOS, or Internetworking Operating System. He was just 16 at the time of the alleged theft.

Pettersson was also accused of breaching two NASA systems, one in May 2004 at the Ames Research Center and the other the following October at the Advanced Supercomputing Division.

The indictment charged Pettersson with five felonies, each carrying a maximum sentence of 10 years in prison and a fine of $250,000.

Federal prosecutors in San Francisco, where the case was filed, said Monday the case was being transferred to authorities in Sweden. They did not explain the reason for the change.

"When the intrusions were committed Mr. Pettersson was a juvenile," Swedish prosecutor Chatrine Rudstrom wrote in a letter agreeing to accept the case. "He has already been convicted of several computer intrusions during the same period of time as the intrusions to Cisco Company and NASA and he received a conditional sentence. Either Mr. Pettersson will be prosecuted, and a court will try the case, or the prosecutor will decide to forbear to prosecute."

Under Swedish law, prosecutors can decline to press charges if there is an earlier conviction that provided a sentence that is "sufficient for the new crimes as well," Rudstrom stated.

The 2004 theft of Cisco IOS created a stir in security circles because it was feared the disclosure could make it easier for criminals to trespass on private networks that used the company's routers. News of the misappropriation surfaced after reports someone had filled IRC channels with some 800MB of code involving Cisco IOS 12.3 and 12.3t.

Cisco officials have said that since then, they don't believe customer or partner information or financial systems were affected. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.