Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Military Crime Software Games

Four Charged With Stealing Army Helicopter Training Software 46

itwbennett writes: Four alleged members of an international computer hacking ring face charges in the U.S. of breaking into the computer networks of the U.S. Army and several tech companies and stealing several software packages, including programs used to train Army helicopter pilots, as well as software and data related to the Xbox One gaming console, the Xbox Live online gaming service and popular games such as Call of Duty: Modern Warfare 3 and Gears of War 3.
This discussion has been archived. No new comments can be posted.

Four Charged With Stealing Army Helicopter Training Software

Comments Filter:
  • Stealing US Army software or stealing IP and proprietary data related to Xbox Live? I kind of skimmed through the article, with the photo my first thought was stealing UH60 training material that goes into actual capabilities of the Blackhawk helicopter. Now it looks like gamer software but that may have longer sentences as The Business considers piracy most serious crime.
    • Stealing US Army software or stealing IP and proprietary data related to Xbox Live?

      I suspect that it was the same thing. Perhaps this is part of the "peace dividend"? Full Spectrum Warrior was developed from a military training tool. Perhaps there is similar crossover here.

  • That's odd (Score:5, Funny)

    by Anonymous Coward on Tuesday September 30, 2014 @05:11PM (#48030553)

    I didn't even know you could train helicopters.

    • by K. S. Kyosuke ( 729550 ) on Tuesday September 30, 2014 @05:18PM (#48030613)
      Nope, that's software for helicopter-training your dog.
    • Maybe it's like in Civilization, where if your units get enough experience they can be upgraded to something more powerful. In which case the question becomes, is this the software for training a gyrocopter into a helicopter? Or does it upgrade helicopters into antigrav gunships? If the latter then this could be a serious threat to national security.

  • Between January 2011 and March of this year, the four men and others allegedly hacked into the computer networks of Epic Games, Valve, Zombie Studios and the U.S. Army, as well as partners of Microsoft, using methods including SQL injection and stolen user names and passwords of company employees and software development partners.

    • by Onuma ( 947856 ) on Tuesday September 30, 2014 @05:36PM (#48030743)
      If only the DoD and US Army maintained some kind of security standard like 8570 ... oh wait.

      SQL injections. They deserved what they got.
  • by bzipitidoo ( 647217 ) <bzipitidoo@yahoo.com> on Tuesday September 30, 2014 @05:23PM (#48030639) Journal

    Did the perps really steal the software, or only copy it?

    Not that it matters much. The army loves to go ape on "bad" guys. The army's reputation for paranoid overreaction to any threat involving computers is such that it wouldn't be surprising if the perps end up spending a very long time in Gitmo if the army gets hold of them. They'll be held without trial as, what do they call it, an imminent threat? They'll also be "aggressively interrogated" to find out how they did it. If the army has to hold a trial, they'll be found guilty of stealing, espionage, and of course (cue dramatic music) Hacking.

  • "Between January 2011 and March of this year, the four men and others allegedly hacked into the computer networks .. using methods including SQL injection and stolen user names and passwords"

    No need to guess what Operating System these computer networks run on.
    • SQL injection would work on any OS, it's about badly written software running on the OS.
      So would stealing usernames and passwords.
      Pull the penguin out your ass.
  • Since Xbox Live and all siloed online gaming is a means by which we are tracking the gifted and talented drone pilots and Dalek operators of the future, this is a mission-critical breach. We need to get computers out of the hands of these hacker terrorists, or else parents might get wise.

  • by OakDragon ( 885217 ) on Tuesday September 30, 2014 @05:50PM (#48030839) Journal

    Four Charged With Stealing Army Helicopter...

    Whhuuuuut??!?!?

    ...Training Software

    oh... meh

  • Given all the "they deserve it", "it's not stealing, it's only copying", or comparisons to Civilization, who do you think they could sell it to? EA?

    For anything coming out of the US Army, think China, Russia, India, Israel, the UK, France. It might be real military espionage, or straight commercial thievery. Both are bad.

    In the military context, any inside information is a potential military advantage. I've had to look this up twice in the last week or so, so this time I'm not going to bother, but the Chi

    • For anything coming out of the US Army, think China, Russia, India, Israel, the UK, France. It might be real military espionage, or straight commercial thievery. Both are bad.

      You forgot US corporations & other US agencies from that list.

    • by rtb61 ( 674572 )

      You are talking about fictitious maybe, might be, could have possibly happened consequences. Something that is only really used in corrupted courts by corrupt prosecutors. Stick to the facts, of what actually happened and copying is never theft, copying is copying and theft is the denial of possession. So overall is seems they were far less naughty than the NSA, hugely massively less naughty then the NSA.

      As for hundreds of millions of dollars spent on repairing security breaches, when will government age

To the systems programmer, users and applications serve only to provide a test load.

Working...