{"id":5414,"date":"2025-12-18T09:45:57","date_gmt":"2025-12-18T09:45:57","guid":{"rendered":"http:\/\/codeguilds.com\/?p=5414"},"modified":"2025-12-18T09:45:57","modified_gmt":"2025-12-18T09:45:57","slug":"federal-authorities-charge-individual-in-serial-breach-of-supreme-court-and-department-of-veterans-affairs-systems-following-bragging-on-social-media","status":"publish","type":"post","link":"https:\/\/codeguilds.com\/?p=5414","title":{"rendered":"Federal Authorities Charge Individual in Serial Breach of Supreme Court and Department of Veterans Affairs Systems Following Bragging on Social Media"},"content":{"rendered":"<p>Federal prosecutors have unveiled a comprehensive criminal complaint against an individual identified as Moore, alleging a series of calculated unauthorized intrusions into high-level United States government electronic systems. According to government court filings, the defendant utilized stolen credentials to bypass security protocols at the Supreme Court of the United States, the Department of Veterans Affairs, and the My AmeriCorps portal. The case has drawn significant attention not only for the sensitivity of the compromised data but also for the brazen nature of the defendant\u2019s actions, which included publicly broadcasting the results of the breaches on social media under a handle specifically designed to taunt federal law enforcement.<\/p>\n<p>The investigation reveals a pattern of persistent digital trespassing that spanned several months in 2023. Moore is accused of intentionally accessing the Supreme Court\u2019s electronic filing system without authorization, using the stolen credentials of an authorized user identified in court documents as &quot;GS.&quot; This breach was not an isolated incident; rather, it was a sustained campaign. Records indicate that Moore accessed the judicial system on 25 different days, frequently returning to the site multiple times within a single 24-hour period. During these sessions, Moore successfully harvested a wealth of sensitive personal identifiable information (PII) belonging to GS, including their full name, email address, telephone number, residential address, and date of birth. Furthermore, the defendant allegedly obtained private answers to three security questions, a move that cybersecurity experts suggest is often used to facilitate further identity theft or to lock legitimate users out of their own accounts.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Public_Disclosure_and_Social_Media_Provocation\" >Public Disclosure and Social Media Provocation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Targeting_the_Department_of_Veterans_Affairs_and_US_Marine_Veterans\" >Targeting the Department of Veterans Affairs and US Marine Veterans<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/codeguilds.com\/?p=5414\/#The_AmeriCorps_Intrusion_and_Breadth_of_Data_Theft\" >The AmeriCorps Intrusion and Breadth of Data Theft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Chronology_of_the_Alleged_Intrusions\" >Chronology of the Alleged Intrusions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Cybersecurity_Implications_and_Federal_Response\" >Cybersecurity Implications and Federal Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Broader_Impact_on_National_Security_and_Privacy\" >Broader Impact on National Security and Privacy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/codeguilds.com\/?p=5414\/#Analysis_of_Potential_Legal_Outcomes\" >Analysis of Potential Legal Outcomes<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Public_Disclosure_and_Social_Media_Provocation\"><\/span>Public Disclosure and Social Media Provocation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The gravity of the breaches was compounded by Moore\u2019s decision to publicize his activities. Utilizing an Instagram account with the provocative handle &quot;@ihackedthegovernment,&quot; Moore reportedly shared screenshots of the stolen data with his followers. On July 29, August 18, and November 28, 2023, the defendant posted images showing the home page of GS on the Supreme Court\u2019s electronic filing system. These screenshots were not redacted, making GS\u2019s full name and a comprehensive list of their current and past electronic filing records visible to the public. <\/p>\n<p>This &quot;clout-chasing&quot; behavior\u2014a term used to describe criminal activity motivated by a desire for social media notoriety\u2014has become an increasing concern for federal investigators. By tagging his posts with a handle that explicitly claimed responsibility for hacking the government, Moore effectively provided a digital trail for the Federal Bureau of Investigation (FBI) and other agencies. However, the immediate impact on the victims was severe, as their private professional and personal records were exposed to an unknown number of social media users.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Targeting_the_Department_of_Veterans_Affairs_and_US_Marine_Veterans\"><\/span>Targeting the Department of Veterans Affairs and US Marine Veterans<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Beyond the judicial branch, Moore\u2019s alleged activities extended to the Department of Veterans Affairs (VA), where he targeted the &quot;My HealtheVet&quot; platform. This system is a critical component of the VA\u2019s digital infrastructure, allowing veterans to manage their healthcare, view medical records, and communicate with providers. The government alleges that Moore used stolen login credentials belonging to a U.S. Marine Corps veteran, identified as &quot;HW,&quot; to access this platform on five separate occasions.<\/p>\n<p>The information obtained from the VA breach was deeply personal and protected under federal health privacy laws. Moore reportedly accessed HW\u2019s prescribed medication lists and blood type. On October 13, 2023, the defendant allegedly sent a screenshot of this health information to an associate, further disseminating the veteran&#8217;s private medical data. Following this, Moore utilized his Instagram account to post HW\u2019s full name, home address, service branch, email address, and phone number. The disclosure of a veteran\u2019s medical history and service details represents a significant breach of trust and a violation of the Health Insurance Portability and Accountability Act (HIPAA) standards, although the criminal charges focus primarily on unauthorized access and identity theft.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_AmeriCorps_Intrusion_and_Breadth_of_Data_Theft\"><\/span>The AmeriCorps Intrusion and Breadth of Data Theft<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The third major pillar of the government\u2019s case involves the My AmeriCorps system, a portal used by participants in the national service program. Moore is accused of using the same methodology\u2014stolen credentials\u2014to infiltrate the account of another victim. In this instance, the scope of the data theft was even broader. The defendant allegedly obtained and publicly posted the user\u2019s name, date of birth, email, residential address, and phone number. <\/p>\n<p>Critically, Moore also accessed and shared the victim&#8217;s citizenship status, veteran status, and service history. Most damagingly, the government asserts that Moore posted the last four digits of the individual\u2019s Social Security number. While only a partial number, the combination of this data with the other PII harvested constitutes a &quot;full profile&quot; that can be sold on dark web forums or used to open fraudulent credit accounts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Chronology_of_the_Alleged_Intrusions\"><\/span>Chronology of the Alleged Intrusions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The timeline of Moore\u2019s activities suggests a period of intense activity during the latter half of 2023:<\/p>\n<ul>\n<li><strong>July 29, 2023:<\/strong> Moore allegedly makes his first public post on Instagram featuring screenshots from the Supreme Court electronic filing system.<\/li>\n<li><strong>August 18, 2023:<\/strong> A second round of screenshots from the SCOTUS system is posted to the &quot;@ihackedthegovernment&quot; account.<\/li>\n<li><strong>October 13, 2023:<\/strong> Moore reportedly accesses the VA\u2019s &quot;My HealtheVet&quot; system and shares a veteran\u2019s private medication list with an associate.<\/li>\n<li><strong>October 2023 (Mid-month):<\/strong> Public disclosure of veteran HW\u2019s personal information and service branch on social media.<\/li>\n<li><strong>November 28, 2023:<\/strong> The final recorded instance of Moore posting SCOTUS filing records to his Instagram account.<\/li>\n<li><strong>Late 2023:<\/strong> Investigation intensifies as federal agencies correlate the social media posts with unauthorized access logs from the affected departments.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Cybersecurity_Implications_and_Federal_Response\"><\/span>Cybersecurity Implications and Federal Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The Moore case highlights a persistent vulnerability in federal digital infrastructure: the reliance on traditional credential-based logins. While the government has made strides in implementing Multi-Factor Authentication (MFA), the use of stolen credentials remains the primary vector for data breaches. According to the 2023 Data Breach Investigations Report, over 80% of basic web application attacks can be traced back to stolen or brute-forced credentials.<\/p>\n<p>&quot;The unauthorized access of Supreme Court and VA systems is not just a matter of identity theft; it is an affront to the integrity of our national institutions,&quot; noted a former federal prosecutor not involved in the case. &quot;When a defendant uses a handle like &#8216;@ihackedthegovernment,&#8217; they are essentially challenging the Department of Justice to act. This case demonstrates that even if the &#8216;hack&#8217; is simply the use of stolen passwords, the legal consequences remain severe.&quot;<\/p>\n<p>The Department of Veterans Affairs has since issued statements emphasizing its commitment to veteran privacy. While they did not comment on the specific Moore litigation, a spokesperson for the VA noted that the agency is &quot;continuously enhancing its cybersecurity posture to protect the sensitive health information of those who served.&quot; Similarly, the Administrative Office of the U.S. Courts has been working to modernize its electronic filing systems (CM\/ECF) to defend against the evolving threat landscape.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Broader_Impact_on_National_Security_and_Privacy\"><\/span>Broader Impact on National Security and Privacy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The implications of these breaches extend beyond the immediate victims. The Supreme Court electronic filing system contains sensitive legal documents that, if altered or prematurely disclosed, could impact the judicial process. In the case of the VA, the breach of medical records undermines the confidence veterans have in digital health services. If veterans fear their medication history or service records could be leaked by a &quot;clout-chasing&quot; intruder, they may be less likely to utilize the very tools designed to improve their care.<\/p>\n<p>Furthermore, this case serves as a warning regarding the &quot;human element&quot; of cybersecurity. The credentials used by Moore were stolen from authorized users. This suggests that the initial point of failure may have been a phishing attack, a credential-stuffing campaign, or the use of malware on the victims&#8217; personal devices. It underscores the necessity for all government contractors and employees to adhere to rigorous digital hygiene.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Analysis_of_Potential_Legal_Outcomes\"><\/span>Analysis of Potential Legal Outcomes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Moore faces multiple counts of unauthorized access to a protected computer and aggravated identity theft. Under the Computer Fraud and Abuse Act (CFAA), the unauthorized access of a government computer carries significant prison time, especially when the intent is to obtain information for private financial gain or in furtherance of a criminal act. The aggravated identity theft charges carry a mandatory two-year consecutive sentence for each count if Moore is convicted.<\/p>\n<p>The government&#8217;s evidence appears robust, built upon a combination of internal access logs from the SCOTUS and VA servers and the defendant&#8217;s own public admissions on Instagram. The digital forensics linking the IP addresses used to access the accounts to Moore&#8217;s physical location and devices will likely be the cornerstone of the prosecution&#8217;s case.<\/p>\n<p>As federal agencies move toward a &quot;Zero Trust&quot; architecture\u2014as mandated by Executive Order 14028\u2014incidents like the Moore breaches are expected to trigger even faster automated responses. For now, the case stands as a stark reminder of the intersection between cybercrime and social media, where the quest for digital fame can lead directly to federal indictment. The victims, ranging from high-level court filers to Marine veterans, remain the primary focus of recovery efforts as the government seeks to secure their identities and restore the integrity of the compromised systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal prosecutors have unveiled a comprehensive criminal complaint against an individual identified as Moore, alleging a series of calculated unauthorized intrusions into high-level United States government electronic systems. According to government court filings, the defendant utilized stolen credentials to bypass security protocols at the Supreme Court of the United States, the Department of Veterans Affairs, &hellip;<\/p>\n","protected":false},"author":14,"featured_media":5413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[237],"tags":[839,736,840,122,240,832,836,837,831,664,239,833,378,238,834,841,835,42,231,838],"newstopic":[],"class_list":["post-5414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-industry-news","tag-affairs","tag-authorities","tag-bragging","tag-breach","tag-business","tag-charge","tag-court","tag-department","tag-federal","tag-following","tag-gadgets","tag-individual","tag-media","tag-news","tag-serial","tag-social","tag-supreme","tag-systems","tag-tech","tag-veterans"],"_links":{"self":[{"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/posts\/5414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5414"}],"version-history":[{"count":0,"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/posts\/5414\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=\/wp\/v2\/media\/5413"}],"wp:attachment":[{"href":"https:\/\/codeguilds.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5414"},{"taxonomy":"newstopic","embeddable":true,"href":"https:\/\/codeguilds.com\/index.php?rest_route=%2Fwp%2Fv2%2Fnewstopic&post=5414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}