Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 1
Page 167
167 / 444
available for download on the internet or for purchase.
The New York Times Intrusion
4, In or about late February 2002, I read an article
on website SecurityFocus.com dated February 26, 2002 and entitled
“New York Times Internal Network Hacked” (the “Article”). The
Article reported that ADRIAN LAMO, the defendant, had hacked into
the New York Times‘ private intranet? (the “NYT Intranet”) and
accessed, among other things, a database containing personal
information (including home telephone numbers and Social Security
numbers) for over 3,000 contributors to the New York Times’ Op-Ed
page. The Article further stated that LAMO had altered that
database by adding a record for ‘Adrian Lamo” along with such
personal information as his cellular telephone number and email
address, and listing his expertise as “computer hacking, national
security, communications intelligence.” According to the
Article, LAMO admitted to the author of the Article in the course
of an interview that LAMO was responsible for the New York Times~
intrusion. LAMO also described in detail how he had gained
access to the system through a proxy server?; and
detailed additional conduct undertaken while inside the NYT
Intranet.
5. In or about late February 2002, I contacted an
employee of The New York Times (“NYT Representative One”)
regarding the intrustion described in the Article. NYT
Representative One informed me of the following, among other
things:
{a) On February 26, 2002 -- prior to the publication of
the Article later that day -- the author of the Article contacted
NYT Representative One and stated that ADRIAN LAMO, the
defendant, had gained access to the NYT Intranet; that LAMO was
able to download the Social Security numbers of New York Times
a An intranet is a computer network belonging to an
organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization.
2 A ‘server" generally is a computer or device on a
network that manages network resources; for example, a file
server is a computer storage device dedicated to storing files.
A “proxy server” is'a server that sits between a client
application, such as a web browser (i.e., Netscape, Internet
Explorer) and a server. Proxy servers have two main purposes:
(1) to improve network performance; and (2) to filter requests.
-3-
FBI(19-cv-1495)-229
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic