No, he got congratulated for finding the flaw. He got in trouble for running a vulnerablity scan afterwards to verify that the flaw was fixed. He ran the vulnerability scan without the system administrators knowledge or permission. I agree that he should have gotten in trouble, maybe not expelled, but in trouble because the vulnerability scan could have crashed or corrupted the system.
Slashdot videos: Now with more Slashdot!
I wouldn't use that stuff! We call it Elephant Snot. After pulling through a conduit with that crap it dries into a cement like blockage in the conduit. Use Pledge on the cables and they pull right through, it doesn't dry and cement everything in the conduit, and it isn't totally disgusting to pull on the cables on the other end of the conduit.
They want to scan outbounds? Stupid, stupid, stupid. You are preventing people from encrypting. (Yes, I know we're talking about the unclassified network. Doesn't matter; an email to your sweetie saying what time you'll be home, is worthy of encryption.)
Considering we are talking about DoD users here, and DoD users include soldiers. Emailing your sweetie to tell what time you will be home is in violation of OPSEC, and should be blocked from going out of the mail server in the first place.
Yeah I got a tip, blackbox.com
Couldn't your home wifi logs save you though. If your ISP is logging your internet connection activity for 2 years, and they find illegal activity, you could show on your logs that a MAC address that you don't own connected. I think it would be a get out of jail card. They couldn't prove that the illegal activity wasn't committed by the non-your MAC.....
Just a thought....
Actually I believe the GP is refering to Internal Combustion Engines. Considering the historical layout of modes of transportation....