BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//archive.cryptologicfoundation.org//NONSGML kigkonsult.se iCalcrea
 tor 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:7c55ef8a-9b00-4404-aa07-5eccfa4ad108
X-WR-CALDESC:28 March 1994: Griffiss Air Force Base found illegal wiretap m
 alware in its Rome laboratory network.\n\nSystem administrators at the Uni
 ted States Air Force (USAF)\, Rome Laboratory on Griffiss Air Force Base d
 iscovered 'sniffer' malware on one of the lab's networks.\n\nThe malware e
 nabled hackers to steal passwords to gain access to additional networks in
 cluding NASA Goddard\, Wright-Patterson Air Force Base\, and NATO headquar
 ters. An investigation\, involving U.S. and U.K. law enforcement agencies\
 , led to “Datastream Cowboy” and “Kuji”\, the hacker handles of British ci
 tizens Richard Pryce and Matthew Bevan.\n\nBevan claimed they hacked Rome 
 Labs and other systems to find evidence of alien anti-gravity technology\,
  which he believed was being used by the U.S. military.\n\nPryce\, only 16
  at the time\, alarmed investigators when he downloaded a Korean nuclear d
 atabase to a USAF system. Air Force investigators feared the database belo
 nged to North Korea and their discovery of the data theft and subsequent t
 race of the transfer to the USAF system would lead to an international con
 frontation. The data turned out to be from the South Korean Atomic Researc
 h Institute which\, while still serious\, was significantly less dangerous
 .\n\nLearn about the incident via the Case Study linked below.
X-WR-RELCALID:2bae4e637e723057403fb5e5f308479a
X-WR-TIMEZONE:America/New_York
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:STANDARD
TZNAME:EST
DTSTART:20251102T020000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RDATE:20261101T020000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:EDT
DTSTART:20260308T020000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RDATE:20270314T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:9ad30b6e-bae3-41a8-9741-18b11718542d
DTSTAMP:20260424T064205Z
DESCRIPTION:28 March 1994: Griffiss Air Force Base found illegal wiretap ma
 lware in its Rome laboratory network.\n\nSystem administrators at the Unit
 ed States Air Force (USAF)\, Rome Laboratory on Griffiss Air Force Base di
 scovered 'sniffer' malware on one of the lab's networks.\n\nThe malware en
 abled hackers to steal passwords to gain access to additional networks inc
 luding NASA Goddard\, Wright-Patterson Air Force Base\, and NATO headquart
 ers. An investigation\, involving U.S. and U.K. law enforcement agencies\,
  led to “Datastream Cowboy” and “Kuji”\, the hacker handles of British cit
 izens Richard Pryce and Matthew Bevan.\n\nBevan claimed they hacked Rome L
 abs and other systems to find evidence of alien anti-gravity technology\, 
 which he believed was being used by the U.S. military.\n\nPryce\, only 16 
 at the time\, alarmed investigators when he downloaded a Korean nuclear da
 tabase to a USAF system. Air Force investigators feared the database belon
 ged to North Korea and their discovery of the data theft and subsequent tr
 ace of the transfer to the USAF system would lead to an international conf
 rontation. The data turned out to be from the South Korean Atomic Research
  Institute which\, while still serious\, was significantly less dangerous.
 \n\nLearn about the incident via the Case Study linked below.
DTSTART;TZID=America/New_York:20260328T000000
DTEND;TZID=America/New_York:20260328T235900
LOCATION:
SUMMARY:1994: Griffiss Air Force Base finds malware
END:VEVENT
END:VCALENDAR
