πŸ‘¨β€πŸ’»McKinnon Overview

Gary "SOLO" McKinnon's extradition case got the most publicity.

Most Well-Known: Gary "SOLO" McKinnon

"The biggest military computer hack of all time." - US prosecuting attorney Paul McNulty

2001-2002 Gary "SOLO" McKinnon, the most well-known UFO hacker, breaks into US Army, US Navy, US Air Force, Department of Defense, and NASA computers by targeting systems with administrator passwords of "Administrator," "password," or blank. Gary accomplishes this using a Perl program to mass scan a /16 IP space and probe the NetBIOS protocol on port 139. He uses a 56K dial-up modem. On some systems, he installs RemotelyAnywhere for remote desktop. He uses Landsearch software to search through all files on all computers across a domain. On a Navy system, he sees spreadsheet tabs with titles such as "non-terrestrial officers" and "fleet-to-fleet transfers", with names of ships not known to be in the US Navy. Also, following Dr. Steven Greer's Disclosure Project and specifically the testimony of Donna Hare, he targets Building 8 at NASA Johnson Space Center where UFOs are reportedly being airbrushed out of satellite photography before the photos are released to the public. He makes it onto a system and sees a 'raw' photo of a smooth cylindrical craft with domes that has no seams or rivets. However, he miscalculates the time zones and is disconnected by a local computer user before he can take a screenshot. Months later, he is arrested by the UK's National Hi-Tech Crimes Unit (who seized his computer) and he is put under an extradition order from the US. It will be a 10-year legal battle before his extradition is finally blocked by the UK over human rights and UK charges are eventually dropped. Gary still faces US charges.

Corroborating Technical Evidence

First, Gary says that he used IPindex.net for reconnaissance. Using the Internet Archive of that site, and comparing it with the specific IPs from his indictment, we can see that the IP ranges in Texas correspond to NASA Johnson Space Center.

139.169.0.0	NASA/Johnson Space Center, TX (NET-JIN)

Next, Gary says he used RemotelyAnywhere to remotely control the NASA JSC desktop. Looking at the 2002 manual for RemotelyAnywhere, remote installation is documented:

Install <–computer COMPUTER> <–path PATH> [-port PORT] [-minimal] [-license FILENAME]

Last, I found this program in an old CD-ROM's contents: About Proxynator screenshot I used these same hacking techniques at around the same time. As seen, the idea is attributed to "SOLO", capitalized the same as Gary's handle.

Last updated