Business

Hacker Sentenced to Probation After Supreme Court Filing System Breach

Nicholas Moore, who pleaded guilty to repeated hacks of the U.S. Supreme Court filing system and other government networks, was sentenced to one year of probation.

A former U.S. Supreme Court filing-system hacker has avoided prison after receiving a year of probation for repeated cyber intrusions.

Nicholas Moore pleaded guilty to hacking the U.S.. Supreme Court’s electronic document filing system dozens of times over several months, and was sentenced on Friday to probation.. The case has drawn fresh attention to how government services—often designed for speed and public access—can become targets when credentials are misused or security gaps are left unpatched.

Moore’s reach extended beyond the Supreme Court.. He also hacked AmeriCorps, the government agency that administers stipend volunteer programs, and the Department of Veterans Affairs systems.. Prosecutors described a pattern of access that relied on stolen credentials. allowing him to move from victim systems into the Supreme Court filing environment.

The scheme was documented through Moore’s own social media presence.. He ran an Instagram account, @ihackedthegovernment, where he posted information related to the people he had hacked.. That kind of public bragging is more than vanity: it signals a broader issue around cybercrime ecosystems where stolen data is treated as both leverage and a trophy.

The sentencing outcome was also a reminder that cyber cases can play out differently than the public imagines. Moore faced the prospect of a year in prison and a $100,000 damages fine. Yet prosecutors requested probation, and the judge imposed that lighter sentence.

For readers. the practical impact is straightforward: when cyber incidents hit government systems. the damage can extend beyond a single breach.. Filing systems and service networks are part of how people apply, verify, and receive assistance.. When a system is compromised. operational trust erodes—especially for agencies serving vulnerable groups. such as veterans and participants in public service programs.

From an economic standpoint. these intrusions create indirect costs even when a hack does not immediately trigger widely visible service outages.. Security incident response, system hardening, audits, staff retraining, and legal review all carry real budgets.. There is also a “shadow cost” in reputation—when beneficiaries and partners lose confidence. agencies can see delays. added verification steps. and more friction in everyday processes.

There is another layer with broader market implications: cyber risk influences how organizations think about compliance, insurance, and vendor management.. Governments are not typically evaluated like private companies, but the same operational logic applies.. Repeated intrusions. credential abuse. and cross-agency targeting push agencies toward tighter access controls. stronger identity verification. and improved monitoring of suspicious login patterns.

Looking ahead, cases like this can shape how institutions balance deterrence with the realities of prosecution.. A probation sentence may reflect factors such as the specific legal posture. the evidence available. and the scope of damage proven in court.. Still. the larger message for public-sector systems is hard to miss: electronic services that handle sensitive data and legal workflows must treat credential theft and unauthorized access as the central threat model—not an edge case.

AI, oil shocks and layoffs: how to navigate uncertainty

Jet Fuel Surge Threatens Summer Overseas Travel

Most US farmers can’t afford fertilizer—survey warns of food pressure

Back to top button