[citation][nom]rpenri[/nom]DkzYou have no idea how the US military works, so why are you even commenting on their internal practices?First of all, he did damage to the US by deleting critical files. Just like a company would lose money, time, effort from the loss of data, the US military would also lose.There are people whose jobs depend on that data to be there and when its not, it creates problems that branch out to other departments because a problem in one area inevitably leads to slowdowns and other problems in other areas.The data may not have been SCI level (Sensitive Compartmented Information--which is higher than Top Secret), such as nuclear weapons targeting information or anything dealing with cryptology, but it nevertheless creates a situation in which the US has lost a potential asset because whatever data may have been compromised must be purged or recreated to destroyed because its unknown whether such data has been leaked to the public, or enemies of the US or its allies. Depending on what the data may be, it may cost nothing or the damage may be immeasurable.For instance, in a hypothetical situation, if the North Koreans knew which cities would be targeted first in a nuclear attack, they could launch an attack on the US and then immediately evacuate those cities and move their missiles surreptitiously or immediately after the attack for a second volley. While the US sends nukes to cities that are empty, New York, D.C., Boston and other large cities may be obliterated off the map while N. Korea launches another devastating attack. Because North Korea knew the US had knowledge of where they kept their missiles, they moved them at the last minute to avoid our nukes destroying them and in turn can launch even more nukes at us while we're shooting blind. The potential to damage to the US from this security breach can be catastrophic.The US military has to plan for any and all scenarios and doing so requires intelligence and other assets that cost a lot of money to acquire and would be useless if the enemies knows it. If an American were to hack into MI6 and start deleting data, I'm willing to bet you'd change your position pretty damn fast.[/citation]
Ever hear of a thing called a backup? they actually use them and no the damage they claim did not happen , he did not have to delete any files, they kept default passwords on the routers ect.
using this information he removed the blocks allowing him access to the files.
The only damage was they had to hire someone to find out how he got in and plug up the holes, if they would have set up the network right the first time this would have never happened.
And yes i am a security expert over 25 years in the field.
Bypassing security to look at information is a matter of using exploits in the os , i can bypass windows/linux password system with a simple kernel patch on the fly that deletes nothing on a computer and to gain access i just hit enter on the password prompt and im in after the program deletes itself leaving no trace or damage.
I use this method to gain access to customers machines that forget to tell me the password so i can clean viruses and malware off the system.
Every time they catch a hacker they claim damage any real hacker/security expert knows this is bs its all about exploits.