Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 2
Page 278
278 / 363
Hacker had WorldCom in his hag! CNET News.com
"Not only are {open proxies) offering anonymity to ail comers, but they are allowing people to
appear as if they are on their trusted network via proxied IP address," Wysopal said.
Using, for the most part, a run-of-the-mill Web browser, Lamo read WorldCom's
documentation on how to use its network and put it to his own use. Lamo “only” gained
access to the company's administrative network, Baker said. But Lamo asserts that a
malicious intruder could have accessed the infrastructure driving the networks of the ISP's
customers, he said.
The access to the administrative network "exposed all the information to dial into these other
networks, inte their routers," Lamo said. Because WorldCom configures many of its
customers’ routers, Lamo asserts that he could have done so as well.
For example, he said, another hacker could have downed the networks of America Online
and Bank of America.
For all his good intentions, though, Lamo isn't exactly on solid legal footing.
Wysopal asserts that poking around the Internet in the way Lamo does aids companies’
security and shouldn't be considered illegal.
"He is not using exploits, merely exploring using public anonymous protocols," Wysopal said.
"This is sort of tike wandering around in the woods not caring about invisible property lines
that aren't posted, yet respecting fences and No Trespassing signs."
For his part, Lamo acknowledges that the situation is legally complex but said that his
personal code of conduct has kept companies from prosecuting him.
"{ don't have any right or moral authority to do what | do," he said. "I know that I'm on more-
than-questionable legal grounds."
That said, Lamo asserts he isn't doing anything wrong. In the end, the hacker said, he's
helping companies secure their networks--and having a good time while he's at it.
“t don't necessarily think that curiosity and corporate interests need to be in conflict,” he said.
“Pragmatically speaking, this is going to happen. It might as well be the least destructive and
least harmful experience for everyone involved,”
Related Quotes Quotes delayed 20+ minutes
NA WCOME NA NA
Quote Lookup: Ester symbol Go! | symbot Lookup Streaming Real Time Quotes
Print story E-mail story Order reprints Send us news tios
Related News
« Microsoft closes window fo customer data October 10, 2001
« Yahoo News hacked, story changed September 20, 2001
© Get this story's "Big Picture"
hitp://news.com.coni/2100- 1001-27671 1 himl?legacy=cnet&tag=mn_hd
Page 2 of 3
Get news by
What j
Content licen
Display news
CNET News.cq
Newg
iv} Enterprise
Senior edi
Kanellos ¢
Servers, at
hardware 1
business. +
Daily Dist
Our award
editors det
stories rigt
inbox. (dat
is
ign.me upl
All News.com ng
7/7/2003
FBI(19-cv-1495)-1051 |
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic