- InfoSec Dot
- Posts
- Case Study: The 1999 NASA Cyber Attack by Jonathan James
Case Study: The 1999 NASA Cyber Attack by Jonathan James

Background
In 1999, NASA experienced a major cybersecurity breach executed not by a nation-state or organized cybercriminal group, but by a 15-year-old American teenager named Jonathan James, operating under the pseudonym “c0mrade.” James targeted NASA’s Marshall Space Flight Center and the Department of Defense (DoD), exploiting weak security practices to gain unauthorized access to sensitive systems. This case remains one of the earliest and most impactful examples of a juvenile hacking into critical government infrastructure.
Attack Timeline
Date | Event |
Mid-1999 | Jonathan James scans DoD and NASA servers for vulnerabilities. |
Late 1999 | Gains unauthorized access to NASA’s internal network via a backdoor. |
Late 1999 | Installs a sniffer to capture usernames and passwords. |
Late 1999 | Downloads 13 software packages including ISS environmental control code |
Early 2000 | NASA detects unauthorized access; systems are shut down for investigation |
March 2000 | Jonathan James is identified, arrested, and charge |
Technique Used
Jonathan James used a mix of technical exploitation and social engineering tactics:
Vulnerability Exploitation: He exploited weaknesses in Red Hat Linux servers running on government networks.
Backdoor Installation: A trojan was deployed to maintain persistent access to NASA systems.
Packet Sniffing: James used a network sniffer to capture login credentials and escalate access privileges.
Data Exfiltration: He successfully downloaded critical NASA software worth $1.7 million, including code that controlled oxygen and temperature aboard the International Space Station (ISS).
Impact
NASA was forced to shut down operations for 21 days, disrupting research and operations.
Estimated financial damage: $41,000 in system cleanup and investigation.
The ISS’s life-support system software was compromised, posing potential risk to astronauts.
Jonathan James became the first juvenile in the U.S. to be convicted for cybercrime.
Lessons Learned
Critical Infrastructure is a High-Value Target
Even non-commercial systems like NASA's research facilities must be protected like national security assets.Age Does Not Equal Harmless
A teenager caused real-world damage. Security must assume capability regardless of demographics.Monitoring and Intrusion Detection Are Crucial
The breach lasted weeks before detection. Proper IDS could have shortened the attacker’s dwell time.Credential Management is Essential
Plain-text transmission of credentials allowed for easy interception. Encrypted channels and two-factor authentication could have prevented this.Cybersecurity Education Matters
This case pushed law enforcement and education systems to invest in ethical hacking programs to redirect young talent
References / Sources
Department of Justice Press Release (2000)
The New York Times, "Teen Hacker Breaks Into NASA" (1999)
Wired Magazine, “Jonathan James: The Boy Who Hacked NASA”
Cybersecurity & Infrastructure Security Agency (CISA) Archives
Jonathan James Case Files, FBI.gov
Written by: Kushagra Raghav and Karan Kumar
Disclaimer: This post was authored by interns participating in the Infosec Dot Internship Program. Infosec Dot does not verify the accuracy, originality, or authenticity of the content. The views expressed are solely those of the authors and do not necessarily reflect those of Infosec Dot.
Reply