Federal Authorities Charge Individual in Serial Breach of Supreme Court and Department of Veterans Affairs Systems Following Bragging on Social Media

Federal prosecutors have unveiled a comprehensive criminal complaint against an individual identified as Moore, alleging a series of calculated unauthorized intrusions into high-level United States government electronic systems. According to government court filings, the defendant utilized stolen credentials to bypass security protocols at the Supreme Court of the United States, the Department of Veterans Affairs, and the My AmeriCorps portal. The case has drawn significant attention not only for the sensitivity of the compromised data but also for the brazen nature of the defendant’s actions, which included publicly broadcasting the results of the breaches on social media under a handle specifically designed to taunt federal law enforcement.
The investigation reveals a pattern of persistent digital trespassing that spanned several months in 2023. Moore is accused of intentionally accessing the Supreme Court’s electronic filing system without authorization, using the stolen credentials of an authorized user identified in court documents as "GS." This breach was not an isolated incident; rather, it was a sustained campaign. Records indicate that Moore accessed the judicial system on 25 different days, frequently returning to the site multiple times within a single 24-hour period. During these sessions, Moore successfully harvested a wealth of sensitive personal identifiable information (PII) belonging to GS, including their full name, email address, telephone number, residential address, and date of birth. Furthermore, the defendant allegedly obtained private answers to three security questions, a move that cybersecurity experts suggest is often used to facilitate further identity theft or to lock legitimate users out of their own accounts.
Public Disclosure and Social Media Provocation
The gravity of the breaches was compounded by Moore’s decision to publicize his activities. Utilizing an Instagram account with the provocative handle "@ihackedthegovernment," Moore reportedly shared screenshots of the stolen data with his followers. On July 29, August 18, and November 28, 2023, the defendant posted images showing the home page of GS on the Supreme Court’s electronic filing system. These screenshots were not redacted, making GS’s full name and a comprehensive list of their current and past electronic filing records visible to the public.
This "clout-chasing" behavior—a term used to describe criminal activity motivated by a desire for social media notoriety—has become an increasing concern for federal investigators. By tagging his posts with a handle that explicitly claimed responsibility for hacking the government, Moore effectively provided a digital trail for the Federal Bureau of Investigation (FBI) and other agencies. However, the immediate impact on the victims was severe, as their private professional and personal records were exposed to an unknown number of social media users.
Targeting the Department of Veterans Affairs and US Marine Veterans
Beyond the judicial branch, Moore’s alleged activities extended to the Department of Veterans Affairs (VA), where he targeted the "My HealtheVet" platform. This system is a critical component of the VA’s digital infrastructure, allowing veterans to manage their healthcare, view medical records, and communicate with providers. The government alleges that Moore used stolen login credentials belonging to a U.S. Marine Corps veteran, identified as "HW," to access this platform on five separate occasions.
The information obtained from the VA breach was deeply personal and protected under federal health privacy laws. Moore reportedly accessed HW’s prescribed medication lists and blood type. On October 13, 2023, the defendant allegedly sent a screenshot of this health information to an associate, further disseminating the veteran’s private medical data. Following this, Moore utilized his Instagram account to post HW’s full name, home address, service branch, email address, and phone number. The disclosure of a veteran’s medical history and service details represents a significant breach of trust and a violation of the Health Insurance Portability and Accountability Act (HIPAA) standards, although the criminal charges focus primarily on unauthorized access and identity theft.
The AmeriCorps Intrusion and Breadth of Data Theft
The third major pillar of the government’s case involves the My AmeriCorps system, a portal used by participants in the national service program. Moore is accused of using the same methodology—stolen credentials—to infiltrate the account of another victim. In this instance, the scope of the data theft was even broader. The defendant allegedly obtained and publicly posted the user’s name, date of birth, email, residential address, and phone number.
Critically, Moore also accessed and shared the victim’s citizenship status, veteran status, and service history. Most damagingly, the government asserts that Moore posted the last four digits of the individual’s Social Security number. While only a partial number, the combination of this data with the other PII harvested constitutes a "full profile" that can be sold on dark web forums or used to open fraudulent credit accounts.
Chronology of the Alleged Intrusions
The timeline of Moore’s activities suggests a period of intense activity during the latter half of 2023:
- July 29, 2023: Moore allegedly makes his first public post on Instagram featuring screenshots from the Supreme Court electronic filing system.
- August 18, 2023: A second round of screenshots from the SCOTUS system is posted to the "@ihackedthegovernment" account.
- October 13, 2023: Moore reportedly accesses the VA’s "My HealtheVet" system and shares a veteran’s private medication list with an associate.
- October 2023 (Mid-month): Public disclosure of veteran HW’s personal information and service branch on social media.
- November 28, 2023: The final recorded instance of Moore posting SCOTUS filing records to his Instagram account.
- Late 2023: Investigation intensifies as federal agencies correlate the social media posts with unauthorized access logs from the affected departments.
Cybersecurity Implications and Federal Response
The Moore case highlights a persistent vulnerability in federal digital infrastructure: the reliance on traditional credential-based logins. While the government has made strides in implementing Multi-Factor Authentication (MFA), the use of stolen credentials remains the primary vector for data breaches. According to the 2023 Data Breach Investigations Report, over 80% of basic web application attacks can be traced back to stolen or brute-forced credentials.
"The unauthorized access of Supreme Court and VA systems is not just a matter of identity theft; it is an affront to the integrity of our national institutions," noted a former federal prosecutor not involved in the case. "When a defendant uses a handle like ‘@ihackedthegovernment,’ they are essentially challenging the Department of Justice to act. This case demonstrates that even if the ‘hack’ is simply the use of stolen passwords, the legal consequences remain severe."
The Department of Veterans Affairs has since issued statements emphasizing its commitment to veteran privacy. While they did not comment on the specific Moore litigation, a spokesperson for the VA noted that the agency is "continuously enhancing its cybersecurity posture to protect the sensitive health information of those who served." Similarly, the Administrative Office of the U.S. Courts has been working to modernize its electronic filing systems (CM/ECF) to defend against the evolving threat landscape.
Broader Impact on National Security and Privacy
The implications of these breaches extend beyond the immediate victims. The Supreme Court electronic filing system contains sensitive legal documents that, if altered or prematurely disclosed, could impact the judicial process. In the case of the VA, the breach of medical records undermines the confidence veterans have in digital health services. If veterans fear their medication history or service records could be leaked by a "clout-chasing" intruder, they may be less likely to utilize the very tools designed to improve their care.
Furthermore, this case serves as a warning regarding the "human element" of cybersecurity. The credentials used by Moore were stolen from authorized users. This suggests that the initial point of failure may have been a phishing attack, a credential-stuffing campaign, or the use of malware on the victims’ personal devices. It underscores the necessity for all government contractors and employees to adhere to rigorous digital hygiene.
Analysis of Potential Legal Outcomes
Moore faces multiple counts of unauthorized access to a protected computer and aggravated identity theft. Under the Computer Fraud and Abuse Act (CFAA), the unauthorized access of a government computer carries significant prison time, especially when the intent is to obtain information for private financial gain or in furtherance of a criminal act. The aggravated identity theft charges carry a mandatory two-year consecutive sentence for each count if Moore is convicted.
The government’s evidence appears robust, built upon a combination of internal access logs from the SCOTUS and VA servers and the defendant’s own public admissions on Instagram. The digital forensics linking the IP addresses used to access the accounts to Moore’s physical location and devices will likely be the cornerstone of the prosecution’s case.
As federal agencies move toward a "Zero Trust" architecture—as mandated by Executive Order 14028—incidents like the Moore breaches are expected to trigger even faster automated responses. For now, the case stands as a stark reminder of the intersection between cybercrime and social media, where the quest for digital fame can lead directly to federal indictment. The victims, ranging from high-level court filers to Marine veterans, remain the primary focus of recovery efforts as the government seeks to secure their identities and restore the integrity of the compromised systems.







