Free Essay

Project 1

In:

Submitted By aichadoudou
Words 1239
Pages 5
Case Study 1: The Curious Case of Gary McKinnon
By
Aicha Doudou
CCJS 390
Professor Daniel Draz
University of Maryland University College

Gary McKinnon was a Scottish hacker who hacks into NASA computers to search for evidence of aliens and extraterrestrial technology. He believes the NASA and other US government were hiding something from the public and that they had classified documents about Unidentified Flying Objects (UFOs).
It all started in 2000 when he decided to look for UFO evidence on the U.S. government's computer systems. He began obsessively researching ways to break into the machines. Using the Perl programming language, he wrote a small script that he says allowed him to scan up to 65 000 machines for passwords in under 8 minutes. After dialing up the government systems, he ran the code and made an astonishing discovery: Many federal workers failed to change the default passwords on their computers. On these unsecure machines, McKinnon installed a software program called Remotely Anywhere, which allows remote access and control of computers over the Internet. McKinnon could then browse through the machines at his leisure and transfer or delete files. Because he was able to monitor all activity on the computers, he could log off the moment he saw anyone else logging on.
It is claimed that between February 2001 and March 2002, Gary McKinnon hacked into dozens of US army, navy, air force, and Department of Defense computers, as well as 16 NASA computers. At one point he brought down the U.S. Army's entire Washington, D.C., network, taking about 2000 computers out of service for three days. U.S. attorney Paul McNulty called his operation “the biggest military computer hack of all time.” The Americans allege he altered and deleted files at a US naval air station not long after the terrorist attacks on 11 September 2001. They describe Gary McKinnon’s hacking as “intentional and calculated to influence and affect the US government by intimidation and coercion”. But Gary McKinnon said he is no web vandal, nor virus writer, and he never acted with malicious intent. He just wanted to find the evidence he believes the NASA were hiding about UFO, aliens and extraterrestrial technology. He was convinced those alien technology could save us in the form of a free, clean, pollution-free energy. He thought if the Americans were hiding such a thing, then it was unconstitutional under American law.
Despite his expertise, McKinnon didn’t try to cover his tracks. He even used his own email. He said he wanted to be caught that the obsession was driving him crazy. The UK National Hi-Tech Crime Unit arrested him on March 2002 at his flat in Wood Green, north London. He thought he would be tried in the UK, but the Americans wanted him to be extradited to US to face trial. If he was found guilty in the US court he could face up to 70 years in federal prison, but if prosecuted in the UK, he would face 3-4 years jail sentence. He was diagnosed with Asperger’s syndrome (a form of autism) in August 2008. McKinnon's lawyers argue that his criminal behavior was a result of his disorder, and they have asked courts to judge him with leniency as a result. The case of Gary McKinnon extradition drags on for 10 years until in May 2010 when Theresa May was appointed the new Home Secretary.
The Home Secretary Theresa May decided against the UFO hacker’s extradition to the US in October 2010 citing that he suffered from depressive illness and is seriously ill. She said the fact that Gary would kill himself if send to the US were a sufficient ground to keep him in the UK. She said that sending Gary to the US is a breached to his human rights, She has also announced her plans to change extradition rules to allow courts to block extradition attempts if it is in the best interest of justice.
Gary McKinnon got his inspiration from The Hacker’s Handbook by Hugo Cornwall. He claim that even without this book he would still have hacked into the NASA because he strongly believe the government should not keep UFO related technology from the public. He claims to have found evidence of UFOs in the NASA system in a book called The Disclosure Project. According to McKinnon this book contains 400 testimonials from everyone who works there. The statements talk about reverse-technology taken from captured or destroyed UFO craft. I don’t know whether to believe this or not. The thing surrounding UFO legends is that those who see believe in it, whereas those who have never come in contact with it doesn’t believe in it.
I think that the Americans effort to have Gary McKinnon extradited to the United States is a way of prosecuting international cyber criminals. I strongly believe that if a cyber criminal in one country commits a crime against another nation, then he/she needs to be extradited to that nation and prosecuted. My reason is because every nation has different law on how to prosecute cyber criminals. Just look at the case of Gary McKinnon if he were prosecuted in the US he would spend up to 70 years in jail, but in the UK he only faces 3-4 years of jail time. After 10 years of legal battle Theresa May decided not to extradite him to the US nor prosecute him in the UK. On second thought, I fear that the government's method of dealing with this situation does not serve in the best interest of national security. These government entities seem to attempt to draw attention away from their security flaws by strongly condemning and prosecuting those who exposed the flaws. Those who have truly malicious intentions will not be deterred by such tactics and will exploit every security flaw they can to reap their havoc and attain their goals. The security of the people and government servers would be better served focusing more effort on securing these systems.
Our network system should be protected at all time to prevent such attacks. The best methods to prevent similar incident from happening include: * Staying on top of changes that could affect the security of your network security. * Properly configure firewalls * Installing anti-virus software and make sure to update regularly or if possible on a daily basis. * Implementing and using password policies. * Installing proper scanning software programs to identify all entry points from the Internet into the internal network of the company. * Performing attack and penetration tests to identify those vulnerable points in the network that can be easily accessed.

References

(2012). Gary McKinnon saved from extradition to the United States; Gary McKinnon was today dramatically saved from extradition to the United States by Theresa May. The Telegraph Online.

Kushner, D. (2011, June 27). The Autistic Hacker. Retrieved October 15, 2014, from http://spectrum.ieee.org/telecom/internet/the-autistic-hacker/0

Yutani, W. (Ed.). (2013, November 19). An incredible story of a Scottish hacker who hacks NASA computers and claims to have found evidence of alien technology. Retrieved information includes mentions of mysterious "Extraterrestrial Officers". Retrieved October 16, 2014, from http://www.unacknowledged.info/gary-mckinnon-nasa-hack/

'UFO Hacker' Gary McKinnon Tells What He Found. (2013, January 1). Retrieved October 17, 2014, from http://www.cosmostv.org/2013/02/hacker-gary-mckinnon-tells-what-he-found.html

Similar Documents

Premium Essay

Project Part 1

...Project Part 1 I am the project manager for Global Communications, a multinational company that installs communication systems using a wide variety of communication technologies, ranging from stringing wire to fiber optics. While the corporate offices of Global Communications are located in the U.S., there are other divisions operating in the UK, Russia, Germany, France, Italy, China, India, Japan, Egypt, Mexico, and Argentina. The composition of project teams in Global Communications varies depending upon the project. However, a typical project team comprises a hardware engineer, a software engineer, a testing engineer, a network administrator, human resources for training, administrative support personnel, and computer programmers. A typical project involves drafting and design, procurement, and transportation and logistics. Recently, the Ministry of Communication of a small country in the Caribbean has approached Global Communications. The country has had a communication hardware failure that caused a breakdown of its entire communication system. My task as a project manager is to put together a project team that will ascertain the extent of the damage and recommend a course of action for the country to follow. I will begin this project by identifying the critical success factors (CSFs) necessary for the success of the project. Virtual teams are more complex because they cross boundaries related to time, distance, and organization (Duarte & Snyder, p. 9)...

Words: 585 - Pages: 3

Premium Essay

Pm592 Project 1

...the only regional shelter in the Greater Cleveland area that provide resume writing, dress for success, interview techniques, computer classes, life skills training workshops, parenting classes, employment and educational resources, information and referrals to off-site services, job preparation, drug counseling, financial counseling, communication skills building, and personal and child welfare information. The overall cost for this project is $3.0 million. Most of our funding will come in the form of government grants. I have secure 2.6 million from the County, State, Federal and private fund. In order to get this project up and running and to expand our business we need to secure a building and have this project up and running in 48 weeks. CSTLO need to shift their operations to meet consumer’s demands. We will be doing the right thing by restructuring the way we do business and we will be taking actions and making decisions about the future that will put our organization on a path to long-term viability. Table of Contents Project Description 4 WBS 5 Cost Estimate 6 Advanced Cost Estimating Technique 6 Cost Assumptions 7 Financial Analysis 7 Schedule 9 Conclusion 10 References 11 Appendices 12 Appendix A – WBS 12 Appendix B – Cost Assumptions 13 Appendix C – Resource Sheet 14 Appendix D – Gantt chart 15...

Words: 2608 - Pages: 11

Premium Essay

Oresund Bridge Project 1

...Course project 1 contains my responses to the nine questions related to the Oresund Bridge project. I have answered them to the best of my ability. 1. What process would you use for identifying project risks for a second Oresund Bridge project? What risks would you raise for each alternative? For such an extremely large project like this to identify project risks, I would start with the basic premise of a conducting a SWOT analysis which allows for identifying Strengths, Weaknesses, Opportunities, and Threats. Once SWOT analysis is completed, I would move forward to defining control of the project to indicate the following variances such as cost, schedule, scope and quality. Furthermore, bring in Subject Matter Experts (SME) to provide their input for mitigation strategy. Lastly, other risks to be raised for each alternative is to develop a risk management plan, project planning outputs, risk categories, historical information. By using these deliverables under the PMBOK risk processes called Risk identification. 2. What process would you use for categorizing project risks for a second Oresund Bridge project? How would you actually categorize them? I would use the qualitative risk analysis process for categorizing project risks because from a high level standpoint it allows me to evaluate each risk and designate the severity of the impact of the project and estimate the probability of the risk occurring in terms of high, medium and low. For categorizing project risks,...

Words: 1038 - Pages: 5

Premium Essay

Project Management Assignment 1

...PROJECT MANAGEMENT: PERSPECTIVE, PLANNING AND IMPLEMENTATION CASE STUDY REPORTS: 1. Team Problems 2. An Electronics Company CONTENTS Section Description Page 1 team problems 1 1.1 executive summary 1 1.2 INTRODUCTION 1 1.3 PROBLEM ANALYSIS 2 1.4 HANDLING CONFLICT 3 1.4.1 Avoiding or Withdrawing 3 1.4.2 Competing or Forcing 3 1.4.3 Accommodating or Smoothing 4 1.4.4 Compromising 4 1.4.5 Collaborating, Confronting, or Problem Solving 4 1.5 PROBLEM SOLVING 4 1.6 PREVENTING CONFLICT 5 1.7 CONCLUSION 6 team problems \ 1 executive summary A case study was presented involving a problem within a project team responsible for designing hardware and software systems. Symptoms of the problem were marked by a delay in the project schedule causing the team to be set back by a month. The working environment had also been adversely affected by the conflict. The case study made mention of the fact that the Project Manager had an open-door policy and conducted weekly project team meetings. In spite of this fact, the Project Manager was unaware of the setback to the schedule although he was conscious of the fact that one of the Project Team Leaders was under a due amount of stress as a...

Words: 1499 - Pages: 6

Premium Essay

Assessment 1 - Project Management

...Assessment 1 – Presentation Instructions: You have been assigned to set update the website for Windsor Institute. It is not required to have skills of developing websites however it is required that you may do some research or discuss with your trainer to identify tasks involved in such projects or processes. You may also visit the current Windsor website (www.windsor-ic.com.au) to identify organisational vision/strategy and needs for the update. You need to demonstrate (present) your ability to identify the strategic and operational needs of the IT project and develop a project plan including scheduling and project control plans like quality and risk management plan. During this demonstration (presentation) you also need to determine project approach or project phases. Duration: Trainer will set the duration of the assessment. Evidence required: Tasks Evidence Submission Task At least 25- 30 presentation slides on the topics listed below. Use screen shots for the plans and the charts to fit them in one slide. Presentation in front of the class and the trainer. Also in printing Your tasks: Prepare some (20-22) presentation slides to present the following items to your trainer:             Windsor’s strategic and operational needs for the project Project operational environment Laws/legislation might need to be considered for the project (e.g. Privacy law, Web content accessibility etc.) Project approach or...

Words: 582 - Pages: 3

Premium Essay

Pm592 Course Project 1

...Project Proposal: Local Grind To Investors Investing PM592 – Summer 2011 Executive Summary When you think of coffee in the Northwest, most people know there is Starbucks and small coffee shops. Coffee shops have become a familiar feature of American communities, not only for the purchase of a morning cup of coffee and snacks, but for mid-day and evening as well. With the introduction of fancy espresso-based coffee and drinks, people are spending between $3 and $6 for their cappuccino, mocha latte, vanilla ice blended drink, or other flavored drink that may be coffee based. Privately owned coffee houses have been on the increase for over 20 years because they are relatively recession proof. Leading companies, such as Starbucks and Peet’s, are located in almost every major city in the US. Small unique coffee shops like the Local Grind are able to compete with these larger chains; they are able to develop competitive advantages by catering to the specific demographics of their location and by personalizing their services to cater local needs. Our goal is to provide quality coffee related services and products by capitalizing on an untapped demographic that has many potential un-serviced customer. To accomplish our goals, we are requesting $100,000 from your company, as an initial investment to set up operations. We plan to invest an additional 20% from our own resources, up front, for the start up operational costs. Local Grind is scheduled to open for business...

Words: 2591 - Pages: 11

Premium Essay

Project Management Week 1 Personal

...TUGAS PERSONAL 1 (Minggu 1/ Sesi 1) IAN GUMILANG (1801491195) PART I 1. B. Time, cost, and quality and/or scope 2. 3. C. Meeting at least 75 percent of specification requirements 4. A. The project manager 5. A. Flexibility in the project’s end date PART II 1. Attributes that a project manager should have are : a. Show their worth b. Understand business strategy c. Overcome hurdles d. Improve team performance Yes an individual can be trained to become project manager, a. Make sure that they are suitably qualified and have the right character in the first place, if not get them trained up or get rid of them (It may sound harsh, but not everyone is capable or wants to be a PM, however some may just be attracted by the salary). If you don't get rid of the inappropriate people, they will soon drag your other PMs down - asking them questions, causing havoc that others need to clean up or loosing you business. b. On the job training is the best, but don't throw your best potential in the deep end, make sure you start them off with smaller projects with mentors and coaches. c. Make sure they have a personal development plan, you have some money to continually train them or provide them training opportunities - e.g a PM Library of good texts is a good and cheap starting point. d. Make sure that they share their good and bad experiences with each other - lunch and learns is another good example - you provide the free lunch, they learn...

Words: 440 - Pages: 2

Free Essay

Project Management Assign 1

...Research and read an article on recent recipients of the project management institute’s project of the year award (2013 PMI winners – Adelaide Desalination Project). Summarize how the project manager or team exhibited exceptional and ethical project management practices. Discuss the role of the project manager or team, the organizational setting, the recipient’s approach to project integration management, and obstacles that had the potential of adversely impacting the triple constraints Ugbe Maurice Ugbe Stratford University (Falls Church, Virginia) Abstract The Adelaide Desalination Project involves the construction of a 100 GL per annum desalination plant, including the seawater intake and outfall tunnels and structures, and associated infrastructure including the transfer pipeline, power supply works and interconnection and upgrade works at Happy Valley Water Treatment Plant. Research and read an article on recent recipients of the project management institute’s project of the year award (2013 PMI winners – Adelaide Desalination Project). Summarize how the project manager or team exhibited exceptional and ethical project management practices. Discuss the role of the project manager or team, the organizational setting, the recipient’s approach to project integration management, and obstacles that had the potential of adversely impacting the triple constraints. Introduction Traditionally, South Australia has always relied on the River Murray...

Words: 1109 - Pages: 5

Premium Essay

Information Security Project 1

...Project: Information Security Project 1 Name: Ashiqul Abir Class: NT2580 Date: 02/28/2013 Information security best practice project: The information security best project was housed within the Oxford University computer emergency response team. The project sought build on the knowledge, commentary and information gathered during the 2009 self-assessment exercise. One of the main objectives of the project was to develop an information security toolkit, which includes the policies, guidelines, documentation and education and awareness programmers. Information security: In a devolved environment, such as a collegiate university, it is imperative that policy should not go into retail about how those objectives should be met. It also defines the scope of the policy and identifies roles and responsibilities for security. Information security toolkit: The example polies can be tailored to suit the individual needs of your department, college or hall. The toolkit focuses on some areas like, IT management Operations Network Management Physical Security Building on the 2009 self-Assessment: The 2009 Self-Assessment exercise asked unit within the collegiate university to assess their current approach to IT operations, management and security against recommended best practice guidelines. The information gathered helped the advisory group to understand where further attention, resource, and best practice...

Words: 280 - Pages: 2

Premium Essay

Pm592 Course Project 1

...PM 592 Project Cost and Schedule Control Executive Summary After reviewing the project costs, schedules, and earned values I have realized that there are some concerns with the schedule and costs. I have found that there are some tasks that have put the project behind schedule and over budget. After reviewing the project closely and making the adjustments by requesting and adding additional percentage for resources to the builder, plumber, electrician, hvac, and the ferris wheel supplier it will bring the project back on track and under budget. Which if you review the revised schedule you will find that the new schedule will still allow the theme park to open on time and within budget. Schedule 1 [pic] Performance Analysis Based on the Earned Value Management I have found that there are a couple stages behind schedule and once complete will end up over budget. Phase 1.5 Joists and Roof Deck is currently at 76% completion and is behind schedule, according to the charts once this is complete will end up finishing late and over budget. The responsibility of this task is on the Builder. Phase 1.7 Rough Carpentry is currently at 65% completion and also is behind schedule, this phase also will end up finishing late and over budget. Once again this task responsibility is on the Builder. Phase 1.11 Elevator is currently at 76% completion and also is behind schedule, this phase also will end up finishing late and over budget. Once again this task responsibility is on...

Words: 970 - Pages: 4

Premium Essay

Project Prposal Week 1

...Project Proposal Fred Kelly Jr CMGT 410 March 2, 2015 Charles Selin University of Phoenix Turbo Tech, Inc. | To: | Management, all corporate team members and employees of all departments | From: | Fred Kelly Jr | CC: | Managers of each branch location | Date: | 3/2/2015 | Re: | New Companywide Compliance System and Policies | Comments: | Due to the nature of an expanding company, a new corporation-wide compliance system is needed for Turbo Tech, Inc. In an extension to the new conformity system, new compliance policies will be introduced. Every manager will be required to train properly to complete their jobs as well as ensure their underlings perform properly. This training will be coordinated and undertaken as part of the Turbo project. Project Stakeholders The Turbo project affects a multitude of individuals both directly and indirectly. The main participants of this program include all of the managers at each branch district across the country. The supervisors are affected precisely since they will be attending the training sessions. Each of the employees at the branch locations across the company will not be immediately affected by the Turbo project. The training the managers receive will be passed on to each of their respective employees. The CEO of Turbo Tech, Inc. will not be immediately affected by this project. The CEO requires feedback to evaluate training sessions and, therefore, is an important factor to...

Words: 626 - Pages: 3

Premium Essay

Risk Management Project Part 1 Task 1

...Tony Stark Risk Management Project Part 1 Task 1 Introduction A risk management plan is important for any business or organization regardless of the business’s or organization’s size. In the case of the Defense Logistics Information Service (DLIS), a risk management plan is critical in making sure the data that DLIS handles is protected. Loss or stolen information from DLIS can affect military assets. A plan needs to be made to be able to follow procedures in the event of an incident and to help mitigate data loss. Risk Management Outline 1.0 Introduction 2.1 Purpose and Objectives 2.0 Identify Threats 3.2 Attacks from the Internet 3.3 Hardware or software failures 3.4 Loss of Internet connectivity 3.5 Nature 3.0 Identify Vulnerabilities 4.6 Lack of firewall 4.7 Lack of intrusion detection 4.8 Lack of antivirus software 4.9 Lack of server updates 4.10 Lack of antivirus updates 4.0 Assign Responsibilities 5.0 Identify the cost of an outage 6.0 Provide recommendations 7.0 Identify the cost of recommendations 8.0 Provide a cost-benefit analysis (CBA) 9.0 Document accepted recommendations 10.0 Track implementation 11.0 Create POAM Scope The Scope of this risk management plan is the existing hardware and software currently in place. This is to include the current personnel, contractors, and vendors. The scope will have to be redefined if...

Words: 612 - Pages: 3

Premium Essay

Chapter 1: Modern Project Management

...Chapter 1: Modern Project Management 1. Define a project. What are five characteristics that help differentiate projects from other functions carried out in the daily operations of the organization? A project is a complex, no routine, off-time effort limited by time, budget, resources, and performance specifications designed to meet customer needs • An established objective • A defined life span with a beginning and an end • Involvement of several departments • Doing something unique • Time, cost , and performance requirements • To serve customers’ needs 2. Compression of the product life cycle, Global competition, Knowledge explosion, corporate downsizing, increased customer focus, and small projects represent big problems are all environmental factors. 3. It is important to strategic planning and the project manager because with a project there is so much going on between so many different people so the manager has to be able to implement a plan and have people follow it. This is the only way a project can run smoothly and with the least amount of problems. If the manager is able to get the best success with good project implementation. 4. The technical side of the coin represents the science side of project management while the sociocultural side of the coin represents the art of managing a project. In order for a manger to be successful they must be a master of both sides of the coin. While some managers tend to focus on the technical side rather than the...

Words: 326 - Pages: 2

Premium Essay

Project Planning 1 Seitz Corp

...Project Planning 1 Seitz Corp Scott T. Walker Keller Graduate School PM586: Project Management Professor Gary Gross Introduction In January 2008 the board of directors of SEITZ Corporation authorized the expenditure of $2,750,000 to construct a new plant in Huntsville Alabama that was to be completed and delivering product by 2010. Janis Clark was selected to be the project manager. Janice was given access to several key resources within the company including functional elements of the corporations Midwest plant and headquarters. She was also assigned key individuals Steve Pokorski, the Vice President of Operations, and Joe Downs, the Director of Plant Engineering. It must also be noted the Steve and Joe had submitted alternate proposals that were rejected. Clark immediately called her team together and set forth with plans to kick off the project. They first started by establishing and organizations structure and placing internal and external requisitions for employees with technical skills. Based on the posturing of Clark and her team there appeared to be some arrogance in their attitude in regard to promotion and location of the project. A preliminary list of task was established; a preliminary product line was established. Also expectations for an early completion of the plant were set in place. And it appeared all activities were set in place or in motion. Janice and her team were just about to schedule their kick off meeting...

Words: 993 - Pages: 4

Premium Essay

Project Management Week 1 Ec311

...EC311 Introduction to Project Management Week 1 Lesson 1 Writing Assignment The job responsibilities of a Project Manager are unlimited. Their duties include being a referee, brainstormer, scheduler, organizer, planner, and many more. The Project Manager’s responsibilities begin as soon as the task is assigned and are not completed until all phases of the project are complete and released to the client. Not only does the Project Manager have to maintain the concrete aspects of the project, but they also have to ensure the other members of the project team are properly maintaining the tasks they are assigned. Social skills are a necessity for the Project Manager in order to maintain a professional and friendly atmosphere for all members of the project team. If there is a friendlier atmosphere, it is more likely all employees will complete their tasks as needed, with a higher standard. It is also very important for the Project Manager to be punctual. There are going to be deadlines in any project. In order to satisfy the client by having the project completed in a timely manner, it is necessary for the Project Manager to be punctual and have a good sense of time management. Project Managers must also be able to multitask. There are several components of every project that require attention. There will be phases that must be worked on simultaneously, which will require the ability to work on more than one thing at a time. If a Project Manager doesn’t take criticism very...

Words: 421 - Pages: 2