"Using a computer virus, hackers in 1998 penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. They also inserted malware into the computers. The whole situation was dubbed \"Solar Sunrise\" after the popular vulnerabilities in computers that ran on operating systems called SunSolaris. Initially, it was believed that the attacks were planned by operators in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the defense department took drastic actions to prevent further incidents of this kind."@en . . . . . . . "Using a computer virus, hackers in 1998 penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. They also inserted malware into the computers. The whole situation was dubbed \"Solar Sunrise\" after the popular vulnerabilities in computers that ran on operating systems called SunSolaris. Initially, it was believed that the attacks were planned by operators in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the defense department took drastic actions to prevent further incidents of this kind."@en . "In February 1998, a number of Department of Defense networks were attacked using a well-known vulnerability in the Solaris (UNIX-based) computer system. The attackers probed Defense Department servers to see if the vulnerability existed; exploited the vulnerability and entered the system; planted a program to gather data; and then returned later to collect that data. In the end, two California High School students were arrested and pled guilty. Their mentor, an 18 year-old Israeli, was also arrested and indicted."@en . . "Solar Sunrise"@en . . "In February 1998, a number of Department of Defense networks were attacked using a well-known vulnerability in the Solaris (UNIX-based) computer system. The attackers probed Defense Department servers to see if the vulnerability existed; exploited the vulnerability and entered the system; planted a program to gather data; and then returned later to collect that data. Some of the initial probe activities appeared to originate from Harvard University and the United Arab Emirates (UAE), moving on to Pearl Harbor and a number of Air Force bases: Kirtland, Lackland, Andrews, Columbus, Gunter, and Tyndall. Later intrusion activities were monitored from the UAE, Utah State University, and a commercial Internet website to some of the same Air Force bases. Further activity was monitored at dozens of other U.S. military sites and universities. International activity was monitored in Germany, France, Israel, UAE, and Taiwan. Over 500 computer systems were compromised, including military, commercial, and educational sites, by attackers using only moderately sophisticated tools. In the end, two California High School students were arrested and pled guilty. Their mentor, an 18 year-old Israeli, was also arrested and indicted. Although the Department of Defense called it \"the most organized and systematic attack to date,\" many dismissed its seriousness because \"the Justice Department claimed that no classified information was compromised.\" Lessons some have drawn, however, are that Solar Sunrise confirmed the findings of Eligible Receiver: U.S. information systems are vulnerable. Additionally, others indicate that various legal issues remain unresolved (e.g., statutory restrictions and competing investigative needs and privacy concerns that hinder searches), there are no effective indications and warnings system in place, intrusion detection systems are insufficient, and there is too much government bureaucracy that hinders an effective and timely response."@en .