A
Anonymous
Guest
A computer in the office of the Labor MLC Mr Tony Kelly was loaded with password "sniffing" software that could have been used to break into the personal files of the Liberal MP Mr Charlie Lynn, a consultant hired to investigate hacking allegations inside the NSW Parliament has found.
The Herald has confirmed that the 12-page preliminary report by a
Melbourne firm, eSec, commissioned by parliamentary staff and handed to police on Tuesday, recommends a more detailed analysis of the computer files - a move supported by initial police investigations.
......there is evidence of several computer hacking program tools on the system, either downloaded from the Internet or bought commercially.
It supports the concerns first raised by parliamentary IT staff two
weeks ago when they discovered Mr Lynn's name and his computer IP address on the screen of Mr Kelly's office computer.
It is understood initial police investigations of the hard drive, being handled by the computer crime unit of the commercial crime agency, will concur with the eSec findings when finalised, probably today.
The next stage of the investigation will be to conduct a forensic and diagnostic audit to determine if the hacking software has been used to illegally search private files of MPs.
Australia, August 9th, 2001
The Herald has confirmed that the 12-page preliminary report by a
Melbourne firm, eSec, commissioned by parliamentary staff and handed to police on Tuesday, recommends a more detailed analysis of the computer files - a move supported by initial police investigations.
......there is evidence of several computer hacking program tools on the system, either downloaded from the Internet or bought commercially.
It supports the concerns first raised by parliamentary IT staff two
weeks ago when they discovered Mr Lynn's name and his computer IP address on the screen of Mr Kelly's office computer.
It is understood initial police investigations of the hard drive, being handled by the computer crime unit of the commercial crime agency, will concur with the eSec findings when finalised, probably today.
The next stage of the investigation will be to conduct a forensic and diagnostic audit to determine if the hacking software has been used to illegally search private files of MPs.
Australia, August 9th, 2001